Podcasts about shape security

  • 39PODCASTS
  • 53EPISODES
  • 33mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Feb 27, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about shape security

Latest podcast episodes about shape security

Scale with Strive Podcast
'The Art of Selling a Premium Product' with Usman Gulfaraz

Scale with Strive Podcast

Play Episode Listen Later Feb 27, 2024 75:25


Welcome to the Scale with Strive podcast,  the place where you come to listen to some of the world's most influential leaders of the SaaS industry.

Redefining CyberSecurity
How Risk Management and Human Behavior Shape Security Strategies: The Untold Impact of Cyber Insurance on Businesses | Human-Centered Cybersecurity Series with Co-Host Julie Haney | Redefining CyberSecurity Podcast with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Feb 22, 2024 52:29


Guests: Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead at National Institute of Standards and Technology [@NISTcyber]On Linkedin | https://www.linkedin.com/in/julie-haney-037449119/On Twitter | https://x.com/jmhaney8?s=21&t=f6qJjVoRYdIJhkm3pOngHQJason Nurse, Reader in Cyber Security and Director of Science & Research, University of Kent [@UniKent] and CybSafe [@CybSafe]On Linkedin | https://www.linkedin.com/in/jasonrcnurseOn Twitter | https://twitter.com/jasonnurseOn Mastodon | https://infosec.exchange/@jasonnurse____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesIn this episode of the new (first!) episode of the Human-Centered Research Series on the Redefining CyberSecurity Podcast, host Sean Martin and co-host Julie Haney from the Human Centered Cybersecurity program at NIST, chat with Dr. Jason Nurse, a reader in cybersecurity at the University of Kent in the UK. The discussion revolves around the role of cyber insurance in organizational risk management.Jason elucidates cyber insurance's function as a residual risk mitigation tool when dealing with cyber attacks, helping businesses recover and connect with response teams. They discuss how cyber insurance can incentivize better security practices but highlight challenges related to assessing security postures across diverse businesses. While ransomware features heavily in discussions of cyber risks, Jason points out that insurers don't always encourage ransom payments. Julie raises the issue of accessibility of cyber insurance for small businesses and suggests insurers offer 'pre-breach services'.Sean, Julie, and Jason debate the role of human behavior in cyber risk, and how it affects organizations and insurance policies. They underscore the value of research in enhancing security practices and conclude by pondering ways to bridge the gap between academic research and practical implementation in cybersecurity.Key Questions Addressed:What is the role and impact of cyber insurance in organizational risk management?How does cyber insurance interact with a business's cybersecurity practices, and how could it incentivize better measures?How does human behavior factor into cyber risks and insurance policies, especially in the context of ransomware and small-medium enterprises?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

ITSPmagazine | Technology. Cybersecurity. Society
How Risk Management and Human Behavior Shape Security Strategies: The Untold Impact of Cyber Insurance on Businesses | Human-Centered Cybersecurity Series with Co-Host Julie Haney | Redefining CyberSecurity Podcast with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 22, 2024 52:29


Guests: Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead at National Institute of Standards and Technology [@NISTcyber]On Linkedin | https://www.linkedin.com/in/julie-haney-037449119/On Twitter | https://x.com/jmhaney8?s=21&t=f6qJjVoRYdIJhkm3pOngHQJason Nurse, Reader in Cyber Security and Director of Science & Research, University of Kent [@UniKent] and CybSafe [@CybSafe]On Linkedin | https://www.linkedin.com/in/jasonrcnurseOn Twitter | https://twitter.com/jasonnurseOn Mastodon | https://infosec.exchange/@jasonnurse____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesIn this episode of the new (first!) episode of the Human-Centered Research Series on the Redefining CyberSecurity Podcast, host Sean Martin and co-host Julie Haney from the Human Centered Cybersecurity program at NIST, chat with Dr. Jason Nurse, a reader in cybersecurity at the University of Kent in the UK. The discussion revolves around the role of cyber insurance in organizational risk management.Jason elucidates cyber insurance's function as a residual risk mitigation tool when dealing with cyber attacks, helping businesses recover and connect with response teams. They discuss how cyber insurance can incentivize better security practices but highlight challenges related to assessing security postures across diverse businesses. While ransomware features heavily in discussions of cyber risks, Jason points out that insurers don't always encourage ransom payments. Julie raises the issue of accessibility of cyber insurance for small businesses and suggests insurers offer 'pre-breach services'.Sean, Julie, and Jason debate the role of human behavior in cyber risk, and how it affects organizations and insurance policies. They underscore the value of research in enhancing security practices and conclude by pondering ways to bridge the gap between academic research and practical implementation in cybersecurity.Key Questions Addressed:What is the role and impact of cyber insurance in organizational risk management?How does cyber insurance interact with a business's cybersecurity practices, and how could it incentivize better measures?How does human behavior factor into cyber risks and insurance policies, especially in the context of ransomware and small-medium enterprises?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Scale with Strive Podcast
'Creating a Data Driven Sales Function' with Chris Finan

Scale with Strive Podcast

Play Episode Listen Later Nov 17, 2023 69:21


Welcome to the Scale with Strive Podcast, the place where you come to listen to some of the world's most influential leaders of the SaaS industry.

The Look Back with Host Keith Newman

A real Ted Talk with the one and only Ted Schlein. Ted's excellent adventure was a 25 year roller coaster ride at Tier 1 VC firm Kleiner Perkins, by way of Symantec where he talked the company into entering the cybersecurity business. Now he turns full circle and has started Ballistic Ventures where he serves as Chairman and GP. Ted serves on the Board of Trustees and Board of Overseers of the Engineering School at the University of Pennsylvania, and also serves on the CISA, DHS and NSA Advisory Boards, IQT Board of Trustees, and is founder of the DoD-sponsored DeVenCI program. A few of his successful investments include AlienVault, ArcSight, CarbonBlack, Chegg, LifeLock, Mandiant, Phantom Security, and Shape Security.

Monumental Me Mindshare Podcast - tools to take you from here to there. Thrive in your strengths.

Katie is the Founder and General Partner of Moxxie Ventures. Katie brings us insights from her rich background of experience in and board seats at large media and tech firms, finance and government. She shares her insights and offers tools to thrive from her breadth of experience and current interactions with founders, investors, and entrepreneurs. Prior to Moxxie, Katie served in numerous executive operating roles at Twitter, Google, Yahoo, and Color. She has led teams in marketing, comms, recruiting, product and media. In addition to working in Silicon Valley, Katie served in the (Obama) White House and State Department and began her career as a banker at JP Morgan Chase. Katie sits on the Board of Vivendi, a French multinational media company headquartered in Paris, Yahoo and previously served on the Board of Time Inc. Katie started her venture career as a Founding Partner of #Angels and has invested in 50 early-stage companies including Airtable, Cameo, Carta, Coinbase, Literati, Modern Fertility, Shape Security and Threads. You can follow our series on Apple Podcasts, Spotify, or wherever you get your podcasts and on the Fiftyfaces Hub - fiftyfaceshub.com. This series is hosted by Liana Slater and featured on the Monumental Me website at www.monumentalme.com/podcast. --- Support this podcast: https://anchor.fm/mindshare/support

Through the Noise
E9: Shomik Ghosh - Investing in Enterprise Software

Through the Noise

Play Episode Listen Later May 29, 2022 62:07


Shomik Ghosh is a Principal at Boldstart Ventures, a day one partner for developer first, SaaS, & crypto infrastructure founders backing the likes of Snyk, Blockdaemon, Kustomer, BigID and Superhuman. At Boldstart, Shomik invests in enterprise software with pre-product founders. Prior to Boldstart, Shomik worked as a growth stage investor at Top Tier Capital where he invested in companies like CircleCI, Anaplan, Area 1 Security, and Shape Security. Shomik is also an active angel investor, having invested in Koyfin, Gitpod and Logixboard to name a few. Download the Callin app for iOS and Android to listen to this podcast live, call in, and more! Also available at callin.com

Fuse Show
EP. 52 - A Fireside chat with CEO & Co-Founder at Altitude Networks with Michael Coates

Fuse Show

Play Episode Listen Later Oct 19, 2021 52:00


Michael Coates is the CEO & Co-Founder of Altitude Networks. A disruptor in cybersecurity, bringing the first cloud-native data loss prevention solution for Office365, Google Workspace, and other cloud collaboration platforms. Michael has worked in the information security space for the past 15 years leading security at global organizations such as Twitter and Mozilla, protecting hundreds of millions of people worldwide. Michael was previously the Chief Information Security Officer at Twitter, where his organization worked to protect users, systems, and data for nearly 300 million users. Before Twitter, Michael was the Director of Product Security at Shape Security, acquired by F5 in 2020. Prior, Michael was head of security for Mozilla, where he built and led the security assurance program to protect nearly half a billion Firefox users, Mozilla web applications, and infrastructure. Michael has also served on the global board of directors for OWASP, the largest non-profit application organization in the world. Michael was a member of the board for six years, three of those years as the chairman. Before building and leading security programs, Michael assessed, compromised, and secured applications and networks for some of the largest banks, governments, and enterprises worldwide. Michael is an early-stage investor and advisor to multiple startups and was also honored to be selected as an SC Magazine Influential Security Mind. Michael is based in San Francisco with his wife, two children, and a dog. Feel free to connect with him on LinkedIn here: https://www.linkedin.com/in/mcoates/ Learn more about his business and company links here: https://altitudenetworks.com/ http://altnet.to/CISO

Next Matters Most
The Future Of Low-Code/ No-Code Programming & Development w/ Jarrod Overson

Next Matters Most

Play Episode Listen Later Jul 22, 2021 28:39


Let's welcome to the triangle, Jarrod Overson! Jarrod is a Director of Engineering at Shape Security, where he led Shape's Enterprise Defense development, the industry-leading solution against imitation attacks like credential stuffing. After Shape Security exited for over 1B dollars, Jarrod now frequently speaks on modern web threats and cybercrime and has been quoted by Forbes, the Wall Street Journal, CNET, among others. He's the co-author of O'Reilly's Developing Web Components, creator of Plato, a static analysis tool for web applications, and frequently writes and records topics about reverse engineering and automation In this episode, Nick speaks with Jarrod Overson about his new business, Vino Technologies. Vino is a low code platform that is more sustainable, extensible, and developer-friendly than previous generations. - Want to take this episode with you? anchor.fm/nextmattersmost To learn more about Jarrod Overson & Nick Jordan: nextmattersmost.com/blogs/ We've got more to offer on our social platforms! linktr.ee/_nickjordan Thank you for watching this episode of the Next Matters Most Podcast! What did you think of this episode? Let us know in the comments!

Buu's Hour
JASON LANG RETURNS - Daryl & Buu's Weekly Update - June 7, 2021

Buu's Hour

Play Episode Listen Later Jun 9, 2021 29:00


Jason Lang, Sr Solutions Engineer, Shape Security, finally returns to the Weekly Update. It's been so long that the last time Jason was on, the show was pre-recorded!

We Hack Purple Podcast
We Hack Purple​​ podcast Episode 28 with Guest Jarrod Overson

We Hack Purple Podcast

Play Episode Play 30 sec Highlight Listen Later Mar 12, 2021 58:56


Host Tanya Janca learns what it's like to be a Director of Engineering, with Jarrod Overson! Jarrod is a developer, speaker, and author who most recently led development of Shape Security's application defense platform which was recently acquired by F5 for $1 billion. Thank you to our sponsor Thread Fix! Buy Tanya's new book on #ApplicationSecurity: Alice and Bob learn Application Security. Don’t forget to check out #WeHackPurple Academy’s NEW courses, #AppSec Foundations taught by Tanya Janca! https://academy.wehackpurple.com/Join our Cyber Security community: https://community.wehackpurple.com/A fun and safe place to learn and share your knowledge with other professionals in the field. Subscribe to our newsletter! Sponsorship info: info@wehackpurple.com . #AppSec #SheHacksPurple #DevSecOps #CyberTraining Find us on Apple Podcast, Overcast + Pod

Studio 2G Podcasts
Protecting the Mission: Government Paves a Path to Better Application Security

Studio 2G Podcasts

Play Episode Listen Later Dec 7, 2020 20:02


On this episode of Industry Insights, GEMG's Constance Sayers is joined by Dan Woods, vice president at Shape Security, to discuss the importance of application security — and what steps agencies can take to protect their data.

The Top Entrepreneurs in Money, Marketing, Business and Life
RedSeal Sold 50%+ For $60m This Year doing $50m in Revenues in CyberSecurity Space

The Top Entrepreneurs in Money, Marketing, Business and Life

Play Episode Listen Later Dec 5, 2020 20:10


Ray joined RedSeal as CEO in February 2014. Prior to RedSeal he was a general partner at Venrock, one of RedSeal’s founding investors. At Venrock he invested in 53 companies including over a dozen in cybersecurity including Vontu, PGP, P-Cube, Imperva, Cloudflare, CTERA, and Shape Security. He is on the board of Check Point Software Technology, Ltd. an original Venrock investment, and Team8, both Tel Aviv–based companies.

Buu's Hour
How The Sausage Is Made: Bringing Silverline Shape Defense to Market - Luke Lehman - Buu's Hour: Cloud Edition

Buu's Hour

Play Episode Listen Later Jul 22, 2020 29:35


Luke Lehman is a Senior Product Manager with the F5 Silverline team. With the acquisition of Shape Security, he was tasked with creating a product offering of Shape Security within the Silverline family. This discussion is behind the scenes insights that most people don't get access to as far as what it takes at F5 to bring a product from idea to an actual product offering.   Subscribe to our YouTube channel! - https://www.youtube.com/darylandbuu?sub_confirmation=1   Daryl Montgomery and Buu Lam are the F5 Account Team based in Vancouver, British Columbia covering valued clients across British Columbia, Northwest Territories, Yukon and Nunavut. This weekly show covers recent topics in the world of F5 and information technology in Vancouver. Please consider Subscribing and enabling Notifications. These weekly shows will be live streamed at the beginning of each week. Buu's Hour Live Streams are released throughout the week.   Podcast format on Apple Podcast, Google Play Podcast and Spotify Instagram - https://www.instagram.com/buushour/ LinkedIn - https://www.linkedin.com/in/daryl-montgomery-8876752/ https://www.linkedin.com/in/buulam/ Buu's Hour B Roll Channel - https://www.youtube.com/channel/UCRSFdUbMRvX925MU7_knxSw Website / Newsletter Sign Up - http://darylandbuu.com

Smart Venture Podcast
#6 Promod Haque Senior Managing Partner @Norwest Venture Partners VC Portfolio: Apigee, FireEye

Smart Venture Podcast

Play Episode Listen Later Jul 2, 2020 46:18


#006 Promod Haque - Senior Managing Partner @ Norwest Venture Partners. Promod’s investments at NVP include Apigee (acquired by Google, Nasdaq: APIC); FireEye (Nasdaq: FEYE); Skybox Imaging (acquired by Google for $500 million); Cyan (acquired by Ciena); Cerent (acquired by Cisco for $7.2 billion); Extreme Networks (Nasdaq: EXTR); Shape Security (acquired by F5 Networks) and Health Catalyst (Nasdaq: HCAT). Promod Haque has invested in more than 70 companies during his career as managing partner at Norwest Venture Partners. To date, his investments are worth more than $40 billion in aggregate exit value. Twenty-five of his portfolio companies have gone public and 37 have been acquired (or have gone public and then been acquired). He has appeared on the Forbes Midas List 13 times. He was ranked #1 on the list in 2004 for his performance over the previous decade. In 2014 and 2016, Forbes recognized Promod as a “Hall of Fame” investor. He has been honored with several industry awards, including the 2006 NASSCOM Global Leadership Award, the 2011 Silicon Valley Forum Visionary Award and the 2016 Lifetime Achievement Award from Venture Capital Journal. https://www.SmartVenturePod.com IG/Twitter/FB @GraceGongGG LinkedIn:@GraceGong Join the SVP fam with your host Grace Gong. In each episode, we are going to have conversations with some of the top investors, super star founders, as well as well known tech executives in the silicon valley. We will have a coffee chat with them to learn their ways of thinking and actionable tips on how to build or invest in a successful company.

Ceritanya Developer Podcast
Simak Kiprah Ariya Hidayat Selanjutnya, Setelah Mengantarkan Dua Perusahaan Silicon Valley Exit!

Ceritanya Developer Podcast

Play Episode Listen Later Jun 9, 2020 30:25


Enggak hanya membuat PhantomJS, Ariya Hidayat juga berhasil mengantarkan dua perusahaan di Silicon Valley sampai dibeli perusahaan besar. Dulu, Ariya pernah bergabung dengan Sencha Inc. dan Shape Security. Sencha Inc. adalah perusahaan software penyedia framework JavaScript yang open-source. Sedangkan Shape Security adalah perusahaan teknologi penyedia layanan keamanan cyber bagi perusahaan kelas dunia. Keduanya adalah perusahaan teknologi di Silicon Valley. Di Sencha Inc. Ariya berperan sebagai Engineering Director. Di sana ia berjasa dalam membangun perusahaan ini sampai akhirnya dibeli oleh IDERA Inc. yang berada di bawah naungan Embarcadero, perusahaan pencipta Turbo Pascal, Dephi, dan C++ Builder. Sebelum Secha Inc. dibeli, Ariya sempat dihubungi oleh Co-Founder Shape Security dan memintanya bergabung. Di perusahaan ini, ia berperan sebagai VP of Engineering yang memimpin tim dengan 50 engineer di dalamnya. Kurang dari dua tahun, Ariya beserta timnya berhasil meluncurkan sebuah produk. Setahun kemudian, penjualan produk tersebut melesat. Lalu setahun setelahnya, Shape Security jadi bernilai setara dengan Unicorn. Perusahaan ini pun kemudian dibeli oleh F5 Networks pada beberapa bulan yang lalu dengan nilai seharga 1 miliar dolar. Saat ini, Ariya tengah sibuk memajukan teknologi di Indonesia dengan berbagai cara. Salah satunya dengan membangun Deep Tech Foundation bersama teman-teman lainnya. Ikut terlibat dalam mengembangkan, memajukan, dan mendobrak teknologi di Indonesia adalah hal yang penting dilakukan bagi Ariya. Tujuannya agar Indonesia enggak hanya menjadi konsumen, tapi juga menjadi penggerak dalam pasar teknologi. Yuk, dengar cerita pengalaman dan pelajaran lainnya yang Ariya Hidayat dapatkan sampai bisa mengantar 2 perusahaan teknologi di Silicon Valley diakuisisi. Versi video: https://www.youtube.com/watch?v=ta827eDRSSQ Donasi: https://karyakarsa.com/rizafahmi

Buu's Hour
Weekly Update - May 11, 2020 - Meet Jason Lang

Buu's Hour

Play Episode Listen Later Jun 2, 2020 17:17


This week we welcomed Jason Lang, Solution Architect with Shape Security, now part of F5. Jason is based in Toronto but is responsible for working with customers on automation threats and fraud prevention. Jason will also be joining Buu for a Live Stream on Wednesday (see below). Subscribe to our YouTube channel! - https://www.youtube.com/darylandbuu?sub_confirmation=1 Daryl Montgomery and Buu Lam are the F5 Account Team covering valued clients in British Columbia, Northwest Territories, Yukon and Nunavut. Their weekly show covers recent topics in the world of F5. Please consider Subscribing and enabling Notifications. Weekly Update will be released at the beginning of each week. Buu's Hour Live Streams are released throughout the week. Podcast format on Apple Podcast, Google Play Podcast and Spotify Instagram - https://www.instagram.com/buushour/ LinkedIn - https://www.linkedin.com/in/daryl-montgomery-8876752/ https://www.linkedin.com/in/buulam/ Buu's Hour B Roll Channel - https://www.youtube.com/channel/UCRSFdUbMRvX925MU7_knxSw Website - http://darylandbuu.com   Upcoming Live Streams   Buu's Hour: Cloud Edition May 6, 10am PDT Top 3 Automation Tools to Learn for 2020 with Jon Calalang https://www.youtube.com/watch?v=JBktLySSnf4&feature=youtu.be  Buu's Hour: Community Edition May 7, 3:30pm PDT Jeffrey Hajner – Gym owner, athlete, former military, who gave up a career in corporate finance https://youtu.be/NDMEODQ851w   DevCentral - Using Cloud Templates to Change BIG-IP Versions Concepts: https://devcentral.f5.com/s/articles/Using-Cloud-Templates-to-Change-BIG-IP-Versions Azure: https://devcentral.f5.com/s/articles/Using-Cloud-Templates-to-Change-BIG-IP-Versions-Azure AWS: https://devcentral.f5.com/s/articles/Using-Cloud-Templates-to-Change-BIG-IP-Versions-AWS GCP: https://devcentral.f5.com/s/articles/Using-Cloud-Templates-to-Change-BIG-IP-Versions-Google   BIG-IP v14.1.2.4 is RTW https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/relnote-supplement-bigip-14-1-2-4.html BIG-IQ 7.1 Quickstart on AWS and Azure https://github.com/f5devcentral/f5-big-iq-trial-quick-start   BIG-IQ 7.1 Onboarding with Docker and Ansible https://github.com/f5devcentral/f5-big-iq-onboarding   How to create custom HTTP monitors with Postman, curl, and Python https://devcentral.f5.com/s/articles/how-to-create-custom-http-monitors-with-postman-curl-and-python-20383 F5 Agility registrations have exceeded initial estimates. Register at https://f5.com/agility   F5 Application Services Templates (FAST) released version 1.0 https://github.com/F5Networks/f5-appsvcs-templates Manual Fraud Fueled by Genesis & Magecart: Beyond Automated Attacks Webinar replay – Speaker: Dan Woods https://www.shapesecurity.com/app-security-and-fraud-summit/manual-fraud-fueled-by-genesis-and-magecart Why Kubernetes Needs More Network Visibility And Protection https://www.informationsecuritybuzz.com/articles/why-kubernetes-needs-more-network-visibility-and-protection/ How Netflix brings safer and faster streaming experiences to the living room on crowded networks using TLS 1.3 https://netflixtechblog.com/how-netflix-brings-safer-and-faster-streaming-experience-to-the-living-room-on-crowded-networks-78b8de7f758c  

Innovation in Government
Be aware: Your online services may be suffering from credential stuffing attacks

Innovation in Government

Play Episode Listen Later Jun 2, 2020 28:00


Dan Woods, the vice president of the Shape Intelligence Center with Shape Security, which is now part of F5 Networks, said a credential stuffing attack isn’t about breaking into someone’s account, but rather verifying the credential itself.

Buu's Hour
Weekly Update - April 6, 2020 - Here Is Where We Begin

Buu's Hour

Play Episode Listen Later May 31, 2020 6:04


Daryl & Buu provide a weekly update on all things F5 related. Daryl Montgomery and Buu Lam are the F5 Account Team covering valued clients in British Columbia, Northwest Territories, Yukon and Nunavut. This weekly show covers recent topics in the world of F5. Please consider Subscribing and enabling Notifications. These weekly shows will be released at the beginning of each week. https://www.linkedin.com/in/daryl-montgomery-8876752/ https://www.linkedin.com/in/buulam/ Links from the Weekly Update New Hot Fix Releases BIG-IP v15.0.1.3: https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/relnote-supplement-bigip-15-0-1-3.html BIG-IP v15.1.0.2: https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/relnote-supplement-bigip-15-1-0-2.html BIG-IP v13.1.3.3: https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/relnote-supplement-bigip-13-1-3-3.html BIG-IP v14.1.2 EHF89.37-ENG for BIG-IP Virtual Edition is RTW, an engineering hotfix that is required for Common Criteria certification compliance on the 14.1.2 release SSLO 7.2: https://techdocs.f5.com/kb/en-us/products/ssl-orchestrator/releasenotes/product/relnote-ssl-orchestrator-15-1-0-iapp-7-2.html - Requires BIG-IP v15.1.0 or higher - SSLO analytics enhancements, more TLS1.3 enhancements and HA enhancements Cisco ACI Service Center App Release 2.3 - Release Notes: https://clouddocs.f5.com/f5-aci-servicecenter/latest/release-notes.html - Download from the Cisco DC App Center - The F5 ACI ServiceCenter enables visibility, L2-L3 stitching, and L4-L7 app services between BIG-IP and Cisco Application Centric Infrastructure (ACI). - Video Demos: https://www.youtube.com/playlist?list=PLSKNMFxFwt4SBOc1BkeYtuN2vU64SV5yq   Some Noteworthy Askf5.com Articles K70322942: Securing Network Access VPN: https://support.f5.com/csp/article/K70322942 - Nice overall coverage of using F5 for SSL VPN K05372587: BIG-IP performance check-list: https://support.f5.com/csp/article/K05372587 - With the heavy usage of F5 SSL VPN, this doc has guidance on monitoring and tuning for performance K17160: Achieving consistent high-performance on BIG-IP VE: https://support.f5.com/csp/article/K17160 - This document gives recommended practices on performance tuning on Virtual Editions Other Noteworthy F5 Articles Scaling SSL VPN using BIG-IP Local Traffic Manager: https://devcentral.f5.com/s/articles/Scaling-SSL-VPN-using-BIG-IP-Local-Traffic-Manager-LTM YouTube: Using Bandwidth Controller to Manage VPN Bandwidth Consumption: https://www.youtube.com/watch?v=q4jdUMaF62g&feature=youtu.be DevCentral Connects Live Stream on APM this Thursday!: https://www.youtube.com/watch?v=02UsdE0h-ZQ SSL VPN Split Tunneling for Office 365: https://devcentral.f5.com/s/articles/SSL-VPN-Split-Tunneling-and-Office-365   Industry News   Magecart Hackers Inject iFrame Skimmers in 19 Sites to Steal Payment Data: - https://thehackernews.com/2020/04/magecart-digital-skimmer.html - New campaign happening that has been successful against 19 e-commerce sites. Great use case for Shape Security. Marriott says 5.2 million guests exposed in new data breach: - https://www.reuters.com/article/us-marriott-intnl-data-breach/marriott-says-5-2-million-guests-exposed-in-new-data-breach-idUSKBN21I3DC - This time, 5.2 million guests. After the 2018 breach of 500 million guests.   Subscribe to our YouTube channel! - https://www.youtube.com/darylandbuu?sub_confirmation=1 Daryl Montgomery and Buu Lam are the F5 Account Team covering valued clients in British Columbia, Northwest Territories, Yukon and Nunavut. Their weekly show covers recent topics in the world of F5. Please consider Subscribing and enabling Notifications. Weekly Update will be released at the beginning of each week. Buu's Hour Live Streams are released throughout the week. Instagram - https://www.instagram.com/buushour/ LinkedIn - https://www.linkedin.com/in/daryl-montgomery-8876752/ https://www.linkedin.com/in/buulam/ Buu's Hour B Roll Channel - https://www.youtube.com/channel/UCRSFdUbMRvX925MU7_knxSw Website - http://darylandbuu.com  

The CyberHub Podcast
Tech Corner - Shape Security - Attacker Economics

The CyberHub Podcast

Play Episode Listen Later Apr 30, 2020 36:52


Smriti Kawal Jaggi, Threat Intelligence Analyst at Shape Security joined the podcast for our virtual summit. Sign up for our newsletter to make sure you never miss any of The CyberHub Podcast Content! 

CyberHub Engage Podcast
Tech Corner - Shape Security - Attacker Economics

CyberHub Engage Podcast

Play Episode Listen Later Apr 30, 2020 36:52


Smriti Kawal Jaggi, Threat Intelligence Analyst at Shape Security joined the podcast for our virtual summit.Sign up for our newsletter to make sure you never miss any of The CyberHub Podcast Content! 

The 2020 Network
Tracking, tracing & privacy in a pandemic

The 2020 Network

Play Episode Listen Later Apr 23, 2020 45:33


The COVID19 pandemic is moving quickly, as is the news and information around it. That's why our team on the 2020 Network is focused on giving you some balanced perspective on the story as it develops. On this episode of the 2020 Network, host Jodi Butts speaks with Shuman Ghosemajumder, CTO at Shape Security, about how COVID-19 is influencing our thinking about data privacy, security and our online identities. Shuman Ghosemajumder is the co-founder of the Privacy Council at Google, the co-author of CGI Programming Unleashed, a contributing author to Crimeware, and a regular guest lecturer at Stanford.

The Top Entrepreneurs in Money, Marketing, Business and Life
1718 CyberSecurity CEO: US Election Interference Happening Right Now, Virus Plans and more from RedSeal

The Top Entrepreneurs in Money, Marketing, Business and Life

Play Episode Listen Later Apr 7, 2020 19:13


Ray joined RedSeal as CEO in February 2014. Prior to RedSeal he was a general partner at Venrock, one of RedSeal’s founding investors. At Venrock he invested in 53 companies including over a dozen in cybersecurity including Vontu, PGP, P-Cube, Imperva, Cloudflare, CTERA, and Shape Security. He is on the board of Check Point Software Technology, Ltd. an original Venrock investment, and Team8, both Tel Aviv–based companies.

TechCrunch Startups – Spoken Edition
F5 acquires Shape Security for $1B

TechCrunch Startups – Spoken Edition

Play Episode Listen Later Dec 23, 2019 3:45


F5 got an expensive holiday present today, snagging startup Shape Security for approximately $1 billion. What the networking company gets with a shiny red ribbon is a security product that helps stop automated attacks like credential stuffing. In an article earlier this year, Shape CTO Shuman Ghosemajumder explained what the company does: “We're an enterprise-focused company that protects the majority of large U.S.

Research Saturday
Inside Magecart and Genesis.

Research Saturday

Play Episode Listen Later Dec 21, 2019 21:33


Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona attorney general's office, where he investigated complex fraud. Prior to that, he spent 20 years with federal law enforcement agencies and intelligence organizations, including the CIA and FBI, where he specialized in information operations and cybercrime.

The CyberWire
Inside Magecart and Genesis. — Research Saturday

The CyberWire

Play Episode Listen Later Dec 21, 2019 17:45


Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona attorney general's office, where he investigated complex fraud. Prior to that, he spent 20 years with federal law enforcement agencies and intelligence organizations, including the CIA and FBI, where he specialized in information operations and cybercrime. The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

Kleeen Talk
Kleeen Talk | Sara Hojjat - Director, Product Management at Shape Security

Kleeen Talk

Play Episode Listen Later Nov 12, 2019 51:45


We are pleased to welcome Sara Hojjat as our next guest on Kleeen Talk. Sara is the director of product management at Shape Security. Sara is an experienced product manager and former engineer with a balance of analytical skills and creativity. Her education in product management, marketing and engineering gives her a unique perspective on what it takes to ship enterprise software.

B2B Revenue Acceleration
62: How Sales & Marketing Teams Can Use Persona-Based Marketing w/ Sri Sundaralingam

B2B Revenue Acceleration

Play Episode Listen Later Oct 22, 2019 16:27 Transcription Available


Often, messaging is focused on a product and its features — but it shouldn’t be. Messaging should be focused on a persona, and how that product (or service) impacts them at their level of an organization.   It’s all part of a strategy Sri Sundaralingam calls “persona-based marketing,” which Sri unpacks in this episode.   Sri is a CMO Advisor & Consultant for cybersecurity startups, with previous head of marketing positions at Symantec, Shape Security, and others.   What we talked about: What is persona-based marketing? How persona-based marketing enhances the effectiveness of ABM Example of persona-based marketing without ABM Example of persona-based marketing with ABM Why the sales team has the answers on who your personas are Driving persona-based marketing alignment with the sales team   This is an interview with Sri Sundaralingam, CMO Advisor & Consultant for cybersecurity startups.   To hear this interview, and many more like it, you can subscribe to The B2B Revenue Acceleration Podcast on Apple Podcasts, on Spotify, or on our website.

InnovAItors
Shape Security: Protecting Against Theft And Fraudulent Attacks

InnovAItors

Play Episode Listen Later Oct 22, 2019 40:42


Retailers, banks and airlines can see up to 90% of fraudulent logins attempting to steal some form of value in their systems. How are they protecting themselves against attacks? Derek Smith, CEO of Shape Security, has created a patent botwall service that protects many of the world’s largest banks, airlines, retailers and government agencies against cyberattacks, blocking more than a billion fraudulent login attempts daily. Key takeaways: Shape Security is helping more than 50% of the country’s largest airlines and banks as well as retail businesses like Starbucks by continuously defending against fraudulent login attempts. Shape prevents over a billion fraudulent login attempts every day. Hackers continue to become more sophisticated, but Shape is using advanced machine learning techniques to counteract the ever-improving hacking methodologies. Full show notes at http://wing.vc

Enterprise Security Weekly (Video)
Enterprise News - ESW #154

Enterprise Security Weekly (Video)

Play Episode Listen Later Sep 20, 2019 17:26


In the Enterprise News, hundreds of laid off by Symantec as part of restructuring plan, Infection Monkey Industries first Zero Trust Assesment Tool, Shape Security eyes IPO after raising 51 million at 1 billion evaluation, Lacework secures $42 Million and adds new president, board members and customers, and FireMon announced the introduction of FireMon automation, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode154 Visit https://www.securityweekly.com/esw for all the latest episodes!

Paul's Security Weekly TV
Enterprise News - ESW #154

Paul's Security Weekly TV

Play Episode Listen Later Sep 20, 2019 17:26


In the Enterprise News, hundreds of laid off by Symantec as part of restructuring plan, Infection Monkey Industries first Zero Trust Assesment Tool, Shape Security eyes IPO after raising 51 million at 1 billion evaluation, Lacework secures $42 Million and adds new president, board members and customers, and FireMon announced the introduction of FireMon automation, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode154 Visit https://www.securityweekly.com/esw for all the latest episodes!

E-Commerce Retail Briefing
The Millennial Demographic Provides Major Opportunity to a Range of Industries - 9/18/2019

E-Commerce Retail Briefing

Play Episode Listen Later Sep 18, 2019 3:53


From the Simplr studios in San Francisco, this is your weekly briefing.  IntroductionWith your E-Commerce Retail Briefing for today, Monday Wednesday, September 18, 2019, I'm Vincent Phamvan.Millennials have become infamous for the industries they’re putting out of business, but what about the industries that are thriving? With one of the largest generations in history entering their prime spending years, many industries are finding opportunities to appeal to the demographic.First, here are some retail headlines.Starbucks Announce New Board MembersStarbucks announced adding Domino’s CEO, Nike’s CFO, and Apple’s Managing Director of Greater China to its board. In a statement, Starbucks CEO and President said quote, “their expertise across global technology, retail and customer experience at scale will accelerate our drive to innovate in a way that’s relevant to our customers and inspiring to our partners,” end quote.  Shape Security Raises $51 Million in Series F FundingShape Security has raised $51 million in Series F funding, officially making it a unicorn. The anti-fraud startup, valued now at just over $1 billion, has raised a total of $183 million since the company began in 2011. Shape Security’s chief executive said the new $51 million investment would go toward the company’s international expansion and product development. He also announced the company was preparing to file for an IPO.MoviePass has Stopped OperatingFilm ticket app, MoviePass, has officially stopped operating. The app, which once had millions of subscribers, experienced a series of setbacks that makes this abrupt ending not altogether surprising. The most recent issue took place in August, when TechCrunch reported that MoviePass subscriber’s debit card numbers and other sensitive information had been exposed. They also began to raise prices during popular movie times and even re-enrolled subscribers in new services without their permission. In a statement, Helios and Matheson Analytics said they were considering selling the company, getting rid of individual assets, or possibly reorganizing.      The Millennial Demographic Provides Major Opportunity to a Range of IndustriesMedia coverage often covers the industries millennials are killing, but what about the ones that are thriving? Millennials are one of the largest generations in history and they’re about to enter their prime spending years. Generation Y is set to receive $30 trillion in wealth from baby boomers and Gen X. That transfer of wealth is already producing change across a variety of industries. Those that come out on top will have to shift around the millennial market demographic, which shows a trend of preferring sustainability, affordability, and flexibility in products and services.Camping is an industry that is thriving with the millennial market. Wholesale camping equipment sales rose $2.5 billion in 2018, compared to the less than $2 billion in 2013. And in 2018, a record high of almost 80 million American households went camping. Fitness is another industry that’s thriving, with millennials dropping $7 billion annually. While there’s a lot of opportunity and spending money ready for the taking in the millennial demographic, companies will need to continue innovating and embracing new technology to adapt to the changing landscape.  ClosingThanks for listening to the latest episode of the E-Commerce Retail Briefing. Don't forget, Simplr can help you scale up your customer service with 24/7 support. Find out more at Simplr.ai. Until next time.

Paul's Security Weekly
The Gang's Here - ESW #154

Paul's Security Weekly

Play Episode Listen Later Sep 18, 2019 81:11


This week, in our first segment, John Strand talks Attacking AWS: Elastic Map to Reduce Clusters! In the Enterprise News, hundreds laid off by Symantec as part of restructuring plan, Infection Monkey Industries first Zero Trust Assesment Tool, Shape Security eyes IPO after raising $51 Million at a $1 Billion evaluation, Lacework secures $42 Million and adds new president, board members, and customers, FireMon announced the introduction of FireMon Automation, and more! In our final segment, we talk Cloud Security, and what security products you need in the cloud!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode154 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Enterprise Security Weekly (Audio)
The Gang's Here - ESW #154

Enterprise Security Weekly (Audio)

Play Episode Listen Later Sep 18, 2019 81:11


This week, in our first segment, John Strand talks Attacking AWS: Elastic Map to Reduce Clusters! In the Enterprise News, hundreds laid off by Symantec as part of restructuring plan, Infection Monkey Industries first Zero Trust Assesment Tool, Shape Security eyes IPO after raising $51 Million at a $1 Billion evaluation, Lacework secures $42 Million and adds new president, board members, and customers, FireMon announced the introduction of FireMon Automation, and more! In our final segment, we talk Cloud Security, and what security products you need in the cloud!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode154 Visit https://www.securityweekly.com/esw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

RBC Disruptors
Disrupting Democracy

RBC Disruptors

Play Episode Listen Later Sep 18, 2019 37:48


Technology is transforming the vote. Shuman Ghosemajunder, CTO of Shape Security and former click fraud czar at Google joined us on RBC Disruptors to discuss what technology is doing to democracy, and how technology can fix it.

Building Bridges
8. How Might Business Change if Information Couldn't Be Protected? Pt 2

Building Bridges

Play Episode Listen Later Jun 18, 2019 28:41


This is the second  part of our two-episode conversation about information security, which began with last week’s episode. As we discussed last week, the inability to secure information results in catastrophic incidents every single day. And many business leaders aren’t aware that their security infrastructures are broken. Shuman Ghosemajumder, Shawn Henry, and Mischel Kwon return to help us explore several important themes, including:   How business leaders should think about information security as the volume and use of data are changing. New jobs that should exist in ten years, as well as jobs that should disappear. How companies might operate differently once they realize that it's impossible, and probably not even desirable, to protect 100% of their information 100% of the time.   Shuman Ghosemajumder is Chief Technology Officer for Shape Security. He was previously the click-fraud czar at Google. Shawn Henry is President of CrowdStrike Services. Shawn was previously Executive Assistant Director of the FBI, where he oversaw all criminal and cyber investigations worldwide. Mischel Kwon is the founder and CEO of MKACyber and former director of the US Computer Emergency Readiness Team (US-CERT).  

Building Bridges
8. How Might Business Change if Information Couldn't Be Protected? Pt 2

Building Bridges

Play Episode Listen Later Jun 18, 2019 28:41


This is the second  part of our two-episode conversation about information security, which began with last week’s episode. As we discussed last week, the inability to secure information results in catastrophic incidents every single day. And many business leaders aren’t aware that their security infrastructures are broken. Shuman Ghosemajumder, Shawn Henry, and Mischel Kwon return to help us explore several important themes, including:   How business leaders should think about information security as the volume and use of data are changing. New jobs that should exist in ten years, as well as jobs that should disappear. How companies might operate differently once they realize that it's impossible, and probably not even desirable, to protect 100% of their information 100% of the time.   Shuman Ghosemajumder is Chief Technology Officer for Shape Security. He was previously the click-fraud czar at Google. Shawn Henry is President of CrowdStrike Services. Shawn was previously Executive Assistant Director of the FBI, where he oversaw all criminal and cyber investigations worldwide. Mischel Kwon is the founder and CEO of MKACyber and former director of the US Computer Emergency Readiness Team (US-CERT).  

Building Bridges
8. How Might Business Change if Information Couldn't Be Protected? Pt 2

Building Bridges

Play Episode Listen Later Jun 18, 2019 28:41


This is the second  part of our two-episode conversation about information security, which began with last week’s episode. As we discussed last week, the inability to secure information results in catastrophic incidents every single day. And many business leaders aren’t aware that their security infrastructures are broken. Shuman Ghosemajumder, Shawn Henry, and Mischel Kwon return to help us explore several important themes, including:   How business leaders should think about information security as the volume and use of data are changing. New jobs that should exist in ten years, as well as jobs that should disappear. How companies might operate differently once they realize that it's impossible, and probably not even desirable, to protect 100% of their information 100% of the time.   Shuman Ghosemajumder is Chief Technology Officer for Shape Security. He was previously the click-fraud czar at Google. Shawn Henry is President of CrowdStrike Services. Shawn was previously Executive Assistant Director of the FBI, where he oversaw all criminal and cyber investigations worldwide. Mischel Kwon is the founder and CEO of MKACyber and former director of the US Computer Emergency Readiness Team (US-CERT).  

Building Bridges
7. How Might Business Change if Information Couldn't Be Protected? Pt 1

Building Bridges

Play Episode Listen Later Jun 11, 2019 26:12


The inability to secure information results in catastrophic incidents every single day. Still, many business leaders aren’t even aware their security infrastructures are broken. In part one of this two-part series on information security, our guests — Shuman Ghosemajumder, Shawn Henry, and Mischel Kwon, discuss: The changing nature of cyber threats Impact of new technologies and applications The need for better metrics to understand cyber risks Balancing the costs and benefits of cyber risk mitigation Shuman Ghosemajumder is Chief Technology Officer for Shape Security. He was previously the click-fraud czar at Google. Shawn Henry is President of CrowdStrike Services. Shawn was previously Executive Assistant Director of the FBI, where he oversaw all criminal and cyber investigations worldwide. Mischel Kwon is the founder and CEO of MKACyber and a former director of the US Computer Emergency Readiness Team (US-CERT).

Building Bridges
7. How Might Business Change if Information Couldn't Be Protected? Pt 1

Building Bridges

Play Episode Listen Later Jun 11, 2019 26:12


The inability to secure information results in catastrophic incidents every single day. Still, many business leaders aren’t even aware their security infrastructures are broken. In part one of this two-part series on information security, our guests — Shuman Ghosemajumder, Shawn Henry, and Mischel Kwon, discuss: The changing nature of cyber threats Impact of new technologies and applications The need for better metrics to understand cyber risks Balancing the costs and benefits of cyber risk mitigation Shuman Ghosemajumder is Chief Technology Officer for Shape Security. He was previously the click-fraud czar at Google. Shawn Henry is President of CrowdStrike Services. Shawn was previously Executive Assistant Director of the FBI, where he oversaw all criminal and cyber investigations worldwide. Mischel Kwon is the founder and CEO of MKACyber and a former director of the US Computer Emergency Readiness Team (US-CERT).

Building Bridges
7. How Might Business Change if Information Couldn't Be Protected? Pt 1

Building Bridges

Play Episode Listen Later Jun 11, 2019 26:12


The inability to secure information results in catastrophic incidents every single day. Still, many business leaders aren’t even aware their security infrastructures are broken. In part one of this two-part series on information security, our guests — Shuman Ghosemajumder, Shawn Henry, and Mischel Kwon, discuss: The changing nature of cyber threats Impact of new technologies and applications The need for better metrics to understand cyber risks Balancing the costs and benefits of cyber risk mitigation Shuman Ghosemajumder is Chief Technology Officer for Shape Security. He was previously the click-fraud czar at Google. Shawn Henry is President of CrowdStrike Services. Shawn was previously Executive Assistant Director of the FBI, where he oversaw all criminal and cyber investigations worldwide. Mischel Kwon is the founder and CEO of MKACyber and a former director of the US Computer Emergency Readiness Team (US-CERT).

TechCrunch Startups – Spoken Edition
Shape Security's latest product protects smaller businesses from credential stuffing

TechCrunch Startups – Spoken Edition

Play Episode Listen Later May 8, 2019 3:34


Shape Security has been helping big companies stay safe from fraudulent activities like password reuse and bot traffic on their publicly facing websites and apps. The company now wants to help smaller companies have that same type of protection, and today it announced a new cloud service called Connect aimed at that market.

Paul's Security Weekly TV
Symantec, Veracode, & Thoma Bravo - Enterprise Security Weekly #114

Paul's Security Weekly TV

Play Episode Listen Later Nov 10, 2018 22:43


Symantec boosts security with Javelin Networks, ThreatQuotient integrates Verified Breach Intelligence from Visa, FireMon delivers hybrid cloud security with new visibility and orchestration, StackPath partners with Sectigo, and we have some acquisition & funding updates from Veracode, Shape Security, Thoma Bravo, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode114 Visit http://securityweekly.com/esw for all the latest episodes!

visa symantec cloud security thoma bravo veracode shape security firemon threatquotient stackpath sectigo enterprise security weekly javelin networks verified breach intelligence es episode114 visit breachintelligence
Enterprise Security Weekly (Video)
Symantec, Veracode, & Thoma Bravo - Enterprise Security Weekly #114

Enterprise Security Weekly (Video)

Play Episode Listen Later Nov 9, 2018 22:43


Symantec boosts security with Javelin Networks, ThreatQuotient integrates Verified Breach Intelligence from Visa, FireMon delivers hybrid cloud security with new visibility and orchestration, StackPath partners with Sectigo, and we have some acquisition & funding updates from Veracode, Shape Security, Thoma Bravo, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode114 Visit http://securityweekly.com/esw for all the latest episodes!

visa symantec cloud security thoma bravo veracode shape security firemon threatquotient stackpath sectigo enterprise security weekly javelin networks verified breach intelligence es episode114 visit breachintelligence
Enterprise Security Weekly (Audio)
Locked Up - Enterprise Security Weekly #114

Enterprise Security Weekly (Audio)

Play Episode Listen Later Nov 8, 2018 50:36


This week, Paul and Matt Alderman interview Harry Sverdlove, Chief Technology Officer at Edgewise to talk about Zero Trust Segmentation! In the Enterprise News this week, Symantec boosts security with Javelin Networks, ThreatQuotient integrates Verified Breach Intelligence from Visa, FireMon delivers hybrid cloud security with new visibility and orchestration, StackPath partners with Sectigo, and we have some acquisition & funding updates from Veracode, Shape Security, Thoma Bravo, and more!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode114 Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

founders community security cto visa chief technology officer locked up zero trust symantec cloud security thoma bravo veracode john strand edgewise security weekly esw shape security paul asadoorian firemon threatquotient stackpath sectigo enterprise security weekly matt alderman enterprise news ai hunter javelin networks harrysverdlove verified breach intelligence es episode114 visit breachintelligence
Paul's Security Weekly
Locked Up - Enterprise Security Weekly #114

Paul's Security Weekly

Play Episode Listen Later Nov 8, 2018 50:36


This week, Paul and Matt Alderman interview Harry Sverdlove, Chief Technology Officer at Edgewise to talk about Zero Trust Segmentation! In the Enterprise News this week, Symantec boosts security with Javelin Networks, ThreatQuotient integrates Verified Breach Intelligence from Visa, FireMon delivers hybrid cloud security with new visibility and orchestration, StackPath partners with Sectigo, and we have some acquisition & funding updates from Veracode, Shape Security, Thoma Bravo, and more!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode114 Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

founders community security cto visa chief technology officer locked up zero trust symantec cloud security thoma bravo veracode john strand edgewise security weekly esw shape security paul asadoorian firemon threatquotient stackpath sectigo enterprise security weekly matt alderman enterprise news ai hunter javelin networks harrysverdlove verified breach intelligence es episode114 visit breachintelligence
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Increase in scans for port 15454 https://isc.sans.edu/forums/diary/Request+for+Packets+Port+15454/23888/ Oracle Quarterly Critical Patch Update http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html Venmo Public Transaction API https://publicbydefault.fyi Credential Stuffing Responsible for Majority of Login Attempts http://info.shapesecurity.com/2018-Credential-Spill-Report-by-Shape-Security

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Increase in scans for port 15454 https://isc.sans.edu/forums/diary/Request+for+Packets+Port+15454/23888/ Oracle Quarterly Critical Patch Update http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html Venmo Public Transaction API https://publicbydefault.fyi Credential Stuffing Responsible for Majority of Login Attempts http://info.shapesecurity.com/2018-Credential-Spill-Report-by-Shape-Security

Engineering Culture by InfoQ
Jarrod Overson Offers Advice for Aspirant and Current Technical Leaders

Engineering Culture by InfoQ

Play Episode Listen Later Jun 17, 2018 24:08


In this podcast Shane Hastie, Lead Editor for Culture & Methods, spoke with Jarrod Overson of Shape Security about the reason for and the content in the Beyond Being an Individual Contributor track at QCon San Francisco, and he offers advice for current and aspirant technical leaders. Why listen to this podcast: • Many technologists get the opportunity to move into leadership roles but receive no training or guidance about what skills such a role needs • Solving other people’s problems as quickly as possible is an important aspect of a leadership role – this is very different to being an individual contributor where the focus is on solving your own problems • Advice for aspirant leaders: assume you are in the role you want and practice doing everything you think should be done in that role • There is a bias among software developers against what is perceived as “old” knowledge – practices that have been around for decades and centuries – this is very wrong • The problems of software engineering have not yet all been solved so there is still a lot of learning to be done, you can’t just repeat what has been done elsewhere before and expect it to work • Software engineering is a creative, artistic skill done by creative, artistic people and a leader needs to understand how such people are motivated • Culture and motivation comes from the top of a company and spreads all the way down More on this: Quick scan our curated show notes on InfoQ https://bit.ly/2HXSIXF You can also subscribe to the InfoQ newsletter to receive weekly updates on the hottest topics from professional software development. bit.ly/24x3IVq Subscribe: www.youtube.com/infoq Like InfoQ on Facebook: bit.ly/2jmlyG8 Follow on Twitter: twitter.com/InfoQ Follow on LinkedIn: www.linkedin.com/company/infoq Check the landing page on InfoQ: https://bit.ly/2HXSIXF

Danny In The Valley
Five Questions with... cyber-security expert Dan Woods

Danny In The Valley

Play Episode Listen Later May 31, 2018 32:50


The Sunday Times’ tech correspondent Danny Fortson brings on Dan Woods, cyber security expert at Shape Security, to answer five big question about hacking and online crime. 1. How likely is it that your online details are for sale online right now? (3:10) 2. What are the weirdest scams he has found? (6:40) 3. Are state actors or criminal gangs the biggest threat? (11:35), 4. Why is being a cyber criminal so easy (20:35) and 5. What should you do to protect yourself (24:40). See acast.com/privacy for privacy and opt-out information.

The InfoQ Podcast
Shuman Ghosemajumder on Security and Cyber-Crime

The InfoQ Podcast

Play Episode Listen Later Aug 1, 2016 43:15


In this week's podcast, professor Barry Burd talks to Shuman Ghosemajumder. Ghosemajumder is VP of product management at Shape Security and former click fraud czar for Google. Ghosemajumder is also the co-author of the book CGI Programming Unleashed, and was a keynote speaker at QCon New York 2016 presenting Security War Stories. Why listen to this podcast: With more of our lives conducted online through technology and information retrieval systems, the use of advanced technology gives criminals the opportunity to be able to do things that they weren't able to do. - Cyber-criminals come from all over the world and every socioeconomic background, so long as there's some level of access to computers and technology. - You see organised cyber-crime focusing on large companies because of the fact that they get a much greater sense of efficiency for their attacks. - Cyber-criminals are getting creative, and coming up with ways to interact with websites we haven't thought of before. - You can have very large scale attacks that are completely invisible from the point of view of the application that's being attacked. - The context of what are you are using software for is more important than just going through an understanding of the code level vulnerability. Notes and links can be found on http://bit.ly/2atBFgk The People Behind Cyber-Crime 5:28 - There are all kinds of different personalities and demographics involved. Cyber-criminals come from all over the world and every socioeconomic background, so long as there's some level of access to computers and technology. Even in cases where a cyber criminal doesn't know how to use technology directly, or how to create something like a piece of malware, they can still be involved in a cyber-criminal's scheme. 6:29 - A scheme which uses large groups of individuals and which doesn’t necessarily need to have skills itself, is stealing money from bank accounts. Being able to transfer money using malware on people’s machines from one account to another account that the cyber-criminal controls still involves getting that money out. That last step can involve a set of bank accounts that are assigned to real individuals. More on this: Quick scan our curated show notes on InfoQ. http://bit.ly/2atBFgk You can also subscribe to the InfoQ newsletter to receive weekly updates on the hottest topics from professional software development. http://bit.ly/24x3IVq

Security – Software Engineering Daily
Botnets and Cybercrime with Shuman Ghosemajumder

Security – Software Engineering Daily

Play Episode Listen Later Sep 14, 2015 49:21


Modern automated attacks using widespread botnets have evolved in sophistication, making cybercrime an increasingly relevant threat in today's internet. Security researchers and organizations have to stay vigilant in this cat-and-mouse game. Shuman Ghosemajumder is the VP of Product at Shape Security, which defends applications from malware and bots. He is the former click fraud czar at Google, and he will be speaking at QCon San Francisco. Continue reading… The post Botnets and Cybercrime with Shuman Ghosemajumder appeared first on Software Engineering Daily.

DevSecOps Podcast Series
AppSec USA 2013 - Michael Coates on the AppSensor Project

DevSecOps Podcast Series

Play Episode Listen Later Dec 10, 2013 11:09


Michael Coates has a vision: smart applications that come to their own defense. "We need to get to that point where we realize that our apps are in a military zone, they are being attacked all the time." -- Michael Coates In this segment of OWASP 24/7, I speak with Michael Coates, Chairman of the OWASP Board and the founder of the AppSensor Project. Michael's contention is that applications should be smarter, that an app should "know" when it is being attacked and have a proactive, built-in response. We discuss the AppSensor project in depth: what is it, why was it created. We start our discussion with the background and reasoning behind the project. "The real damage is when they know how your application works. They attack your business logic. They do things to violate the custom aspects of your application." -- Michael Coates About Michael Coates Michael Coates is the Chairman of the OWASP board. In addition, he is the creator of OWASP AppSensor, a project dedicated to creating attack aware applications that leverage real time detection and response capabilities. Michael is also the Director of Product Security at Shape Security, a Silicon Valley startup developing an entirely new type of web security product to protect web sites against modern attacks. Previously, Michael was the Director of Security Assurance at Mozilla where he founded and grew the Security Assurance and Web Security programs to 25 people. Throughout Michael's career he has advised major corporations and governments on secure architecture and software security. He’s also performed hundreds of technical security assessments for financial, enterprise, and cellular customers worldwide. Michael also maintains a security blog at michael-coates.blogspot.com Michael holds a Master of Science degree in Computer, Information and Network Security from DePaul University and a Bachelor of Science degree in Computer Science from the University of Illinois at Urbana-Champaign.