POPULARITY
Three members of the CyberWire's Hash Table of experts: Rick Doten Kevin Ford Kevin Magee discuss SOAR tools. Resources: “A Brief History of SIEM,” by Stephen Gailey, CyberSecurity Magazine, 19 January 2020. “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” by Eric Hutchins, Michael Cloppert, Rohan Amin, Lockheed Martin Corporation, 2010, last visited 30 April 2020. “Site Reliability Engineering: How Google Runs Production Systems,” by Betsy Beyer, Chris Jones, Jennifer Petoff, and Niall Richard Murphy, Published by O'Reilly Media, 16 April 2016. “The Cybersecurity Canon: The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win,” book review by Rick Howard, Palo Alto Networks, 21 October 2016. “The Evolution of SOAR Platforms,” by Stan Engelbrecht, SecurityWeek, 27 July 2018. “The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win,” by Gene Kim, Kevin Behr, George Spafford, Published by IT Revolution Press, 10 January 2013.
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference, 2020. "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” by Eric Hutchins, Michael Cloppert, Rohan Amin, Lockheed Martin Corporation, 2010, last visited 30 April 2020. “Malware? Cyber-crime? Call the ICOPs!” by Jon Oltsik, CSO, Cybersecurity Snippets, 22 June 2015. “Market Guide for Security Orchestration, Automation and Response Solutions,” by Gartner, ID G00727304, 21 September 2020. “MITRE ATT&CK,” by Mitre. “The Cybersecurity Canon: The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win,” book review by Rick Howard, Palo Alto Networks, 21 October 2016. “The Cyber Kill Chain is making us dumber: A Rebuttal,” by Rick Howard, LinkedIn, 29 July 2017. “The Evolution of SOAR Platforms,” by Stan Engelbrecht, SecurityWeek, 27 July 2018. “What is SOAR (Security Orchestration, Automation, and Response)?” by Kevin Casey, The Enterprisers Project, 30 October 2020.
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference, 2020. "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” by Eric Hutchins, Michael Cloppert, Rohan Amin, Lockheed Martin Corporation, 2010, last visited 30 April 2020. “Malware? Cyber-crime? Call the ICOPs!” by Jon Oltsik, CSO, Cybersecurity Snippets, 22 June 2015. “Market Guide for Security Orchestration, Automation and Response Solutions,” by Gartner, ID G00727304, 21 September 2020. “MITRE ATT&CK,” by Mitre. “The Cybersecurity Canon: The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win,” book review by Rick Howard, Palo Alto Networks, 21 October 2016. “The Cyber Kill Chain is making us dumber: A Rebuttal,” by Rick Howard, LinkedIn, 29 July 2017. “The Evolution of SOAR Platforms,” by Stan Engelbrecht, SecurityWeek, 27 July 2018. “What is SOAR (Security Orchestration, Automation, and Response)?” by Kevin Casey, The Enterprisers Project, 30 October 2020.
James Markarian with SnapLogic joins Justin, Peter, and Don to talk about his vision for a data privacy bill of rights. Also, D3 Security’s Stan Engelbrecht calls in from Canada to discuss what they’ve been up to since we last spoke at RSA in 2018. Finally, we look at the news of the week, including plenty of Microsoft stories.
James Markarian with SnapLogic joins Justin, Peter, and Don to talk about his vision for a data privacy bill of rights. Also, D3 Security’s Stan Engelbrecht calls in from Canada to discuss what they’ve been up to since we last spoke at RSA in 2018. Finally, we look at the news of the week, including plenty of Microsoft stories.
James Markarian with SnapLogic joins Justin, Peter, and Don to talk about his vision for a data privacy bill of rights. Also, D3 Security’s Stan Engelbrecht calls in from Canada to discuss what they’ve been up to since we last spoke at RSA in 2018. Finally, we look at the news of the week, including plenty of Microsoft stories.
James Markarian with SnapLogic joins Justin, Peter, and Don to talk about his vision for a data privacy bill of rights. Also, D3 Security’s Stan Engelbrecht calls in from Canada to discuss what they’ve been up to since we last spoke at RSA in 2018. Finally, we look at the news of the week, including plenty of Microsoft stories.
James Markarian with SnapLogic joins Justin, Peter, and Don to talk about his vision for a data privacy bill of rights. Also, D3 Security’s Stan Engelbrecht calls in from Canada to discuss what they’ve been up to since we last spoke at RSA in 2018. Finally, we look at the news of the week, including plenty of Microsoft stories.
James Markarian with SnapLogic joins Justin, Peter, and Don to talk about his vision for a data privacy bill of rights. Also, D3 Security’s Stan Engelbrecht calls in from Canada to discuss what they’ve been up to since we last spoke at RSA in 2018. Finally, we look at the news of the week, including plenty of Microsoft stories.
Stan Engelbrecht, director of cyber security practice for D3 Security, discusses ATM fraud.
Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.
In today's podcast, we talk about what the Five Eyes see. Implications of North Korean responsibility for WannaCry. Defense and deterrence go with naming and shaming. The Lazarus Group looks to cryptocurrency theft to redress North Korean financial shortfalls. Copperfield cyber espionage campaign in the Middle East. GDPR approaches, and organizations look to get their data houses in order (and buy insurance). Justin Harvey from Accenture on choosing threat intelligence. Guest is Stan Engelbrecht from D3 Security on the vulnerabilities in public transportation. And what to do if your child gets a phone from Santa.