POPULARITY
This episode is a recording of a live interview held on stage at Blu Ventures' Cyber Venture Forum in February. A huge shoutout and thank you to the Blu Ventures team for putting together an awesome event. Bricklayer is building an AI-based agent to assist with security operations workflows. Before Bricklayer, Adam founded ThreatConnect which he led for over a decade. In the conversation we discuss his learnings from his experience at ThreatConnect, acquiring vs. building a new capability, and how he thinks about competition in the AI SOC space.Website: bricklayer.aiSponsor: VulnCheck
How are procurement and IT leaders addressing the growing challenges of cybersecurity in 2024?In this episode, Scott W. Luton is joined by Richard McVay, Senior Director and IT Telecom Subject Matter Expert at OMNIA Partners, to dive into the increasingly complex world of procurement technology and cybersecurity. With cyber threats like ransomware and third-party breaches on the rise, Richard shares how businesses can protect their operations while optimizing procurement strategies.The discussion covers real-world examples of how companies are leveraging advanced procurement tools to streamline processes, safeguard sensitive data, and improve decision-making. Richard also emphasizes the importance of bridging the gap between IT and procurement, the cost of running RFPs, and why aligning these functions is essential to staying competitive. Jump into the conversation:(00:00) Intro(04:26) What the OMNIA partners team does(16:57) The high costs of poor or unsuccessful solutions(22:45) Newer technologies permeating the procurement space(31:18) Cybersecurity threats that supply chain leaders need to be aware of(34:52) The range of cybersecurity solutionsAdditional Links & Resources:Connect with Richard: https://www.omniapartners.com/solutions/industry-experts/it-telecomBecome a member: https://www.omniapartners.com/get-started/membership/industryMaximizing Solutions with Group Purchasing Video: https://www.omniapartners.com/resources/videos/maximizing-it-solutions-with-group-purchasingHow purchasers can protect businesses from impending cyber threats blog post: https://info.omniapartners.com/resources/insights/how-purchasers-can-protect-business-from-impending-cyber-threatConnect with Richard on LinkedIn: https://www.linkedin.com/in/mcvayrichard/ Learn more about OMNIA Partners: https://www.omniapartners.com/ Connect with Scott: https://www.linkedin.com/in/scottwindonluton/ Learn more about Supply Chain Now: https://supplychainnow.com Watch and listen to more Supply Chain Now episodes here: https://supplychainnow.com/program/supply-chain-now Subscribe to Supply Chain Now on your favorite platform: https://supplychainnow.com/join Work with us! Download Supply Chain Now's NEW Media Kit: https://bit.ly/3XH6OVk WEBINAR- Creating the Unified Supply Chain Through the Symbiosis of People and Technology: https://bit.ly/3XDtrejWEBINAR- Defending Your Business from Ransomware and Cyber Threats: https://bit.ly/4d0VGcfWEBINAR- End-to-End Excellence: Integrating Final Mile Logistics: https://bit.ly/3ZlpE7UWEBINAR- AI for SMBs: Unlocking Growth with Netstock's Benchmark Report: https://bit.ly/3AWtoCDWEBINAR- The ABCs of Cargo Security and Loss Prevention: https://bit.ly/3zAirpTWEBINAR- Future-Proof Your Logistics: AI-Powered Solutions for Competitive Edge: https://bit.ly/3BouB5EThis episode was hosted by Scott Luton and produced by Amanda Luton and Katherine Hintz. For additional information, please visit our dedicated show page at: https://supplychainnow.com/enhancing-procurement-strategies-todays-information-technology-challenges-1332
Howdy, y'all! Our guest today is Wade Baker, cybersecurity researcher, entrepreneur, professor… Wade is a Board of Directors member of the FAIR Institute, was an Advisory Board Member at the RSA Conference, was VP of Strategy & Risk Analytics at ThreatConnect, and is now Co-Founder of Cyentia Institute, which aims to advance cybersecurity knowledge and practice through data-driven research. Wade joins Drew and Allan to talk about (go figure!) data-driven cybersecurity. The three smash through a lot of assumptions and get to the heart of what is really going on in cybersecurity. Questions covered: What is the Information Risk Insights Study (IRIS)? (cyentia.com/iris/) What is a good summary of the IRIS Ransomware report? How organizations out there can be more data-driven? Analyst whitepapers vs. real data research – what are the differences? Who else can mine data like this? What truths do people resist or what do they fail to embrace? What are the sacred cows and the “inflatable cows”? Is the cyber job shortage a real, data-backed problem? The desire for “flat math” vs. curves (the 5x5 grid) … Measuring the problem side vs the solution side… Actual best practices vs. common practices… Insurance industry data and why they don't share it… Much of what we do does not affect the realities of our cyber risk. Stepping back from all of this, what is the value in data-driven industry analysis of this sort? How does one sponsor IRIS publications? Y'all be good now!
In this episode, I dive into the critical importance of Cyber Threat Intelligence (CTI) and how it helps organisations stay ahead of attackers. Learn about the practice of gathering, analyzing, and applying information to understand potential or existing threats. I break down the three levels of CTI: strategic, tactical, and operational intelligence, explaining their roles in enhancing security posture. Discover how CTI provides insights into who is attacking, their methods, and their objectives. Explore the process of data collection from various sources, analysis to identify patterns, and dissemination of actionable intelligence within the organization. I also discuss the challenges of implementing CTI, including handling large volumes of data and ensuring effective collaboration. Lastly, I look at the future of CTI, highlighting automation, AI, and predictive intelligence as key trends. Learn about essential tools and platforms like ThreatConnect, Splunk, and Darktrace that support CTI efforts. Join me for an insightful discussion on protecting your organiastion from sophisticated cyber threats. Enjoy! You can listen on: At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/ Do not forget to subscribe to the pod cast so you never miss an episode. #podcast #CyberSecurity #InfoSec #DataProtection #PrivacyMatters #ThreatIntelligence #ZeroTrust #SecureTheFuture #CyberAware #RiskManagement #DigitalDefense #SecurityAwareness #Encryption #ITSecurity #CloudSecurity #HackerDefense #NetworkSecurity #PhishingPrevention #IdentityProtection #SecurityEducation #IncidentResponse #MalwareDefense #IoTSecurity #CyberResilience #SecureSoftware #PatchManagement #CISOInsights CyberHygiene #PasswordSecurity #CyberThreats #DigitalForensics #SecureInfrastructure #ThreatDetection #SecurityConsulting #IncidentResponse #DigitalSecurity #SecureSoftware #CloudSecurity #CyberSafe
In this episode, Charles Gold, Chief Marketing Officer at ThreatConnect, joins Maria and Gianna to discuss why CMOs fail or succeed. To begin, Charles shares his background in running global marketing organizations. He even started a technology company during the dot-com boom time period. Then the group discusses a ton of CMO topics, including how CMOs fail and succeed at the role, and how Charles conducted 30 interviews (!!!) to land the company a superstar employee. Charles' best advice for marketers in security? "If you can understand what the product does and how people use it, that will help you communicate with engineers and have credibility with customers. If you don't have this understanding, it's really limiting." Links: Learn more about Charles Gold. More on Gold's Rules Check out the Washington Post that Charles mentions here. Follow Gianna on LinkedIn. Catch up with Maria on LinkedIn. Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020. Learn more about your ad choices. Visit megaphone.fm/adchoices
The PurpleUrchin freejacking campaign. Bluebottle activity against banks in Francophone Africa. The PyTorch framework sustains a supply-chain attack. 2022's ransomware leaderboard. Cellphone traffic as a source of combat information. FBI Cyber Division AD Bryan Vorndran on the interaction and collaboration of federal agencies in the cyber realm. Our guest Jerry Caponera from ThreatConnect wonders if we need more "Carrots" Than "Sticks" In Cybersecurity Regulation. And two incommensurable views of information security. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/3 Selected reading. An analysis of the PurpleUrchin campaign. (CyberWire) PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources (Unit 42) Bluebottle observed in the wild. (CyberWire) Bluebottle: Campaign Hits Banks in French-speaking Countries in Africa (Symantec) PyTorch incident disclosed, assessed. (CyberWire) PyTorch dependency poisoned with malicious code (Register) Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022. (PyTorch) Most active, impactful ransomware groups of 2022. (CyberWire) 2022 Year in Review: Ransomware (Trustwave) Russia says phone use allowed Ukraine to target its troops (AP NEWS) For Russian Troops, Cellphone Use Is a Persistent, Lethal Danger (New York Times) Kremlin blames own soldiers for Himars barracks strike as official death toll rises (The Telegraph) No Water's Edge: Russia's Information War and Regime Security (Carnegie Endowment for International Peace)
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
Paul Farrell is a longtime entrepreneur, founder, mentor, angel investor, and executive. Most recently, he was the Founder and CEO of Nehemiah Security, which he sold in September 2020. Paul has shepherded a startup from product launch to over a million in annual recurring revenue in less than two years, led a corporate acquisition that yielded a sale five years later at 10X the purchase price, and participated in the explosive growth of a global leader in business communications that yielded an 11X return on investment in just over a year. After successfully selling Nehemiah Security to ThreatConnect, Paul is now leading Pater Holdings. His goal is to invest in companies and help them flourish. In this episode of the Smart Business Revolution Podcast, John Corcoran is joined by Paul Farrell, an entrepreneur and angel investor, to discuss what Paul learned from scaling and selling software firms. They also talk about hiring strategies, preparing for a successful sale, and the dot-com burst of 2003. Stay tuned.
Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151's Infrastructure: Ghostwriter and beyond." Prevailion's Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion's visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign. UNC1151 is likely a state-backed threat actor waging an ongoing and far-reaching influence campaign that has targeted numerous countries across Europe. Their operations typically display messaging in general alignment with the security interests of the Russian Federation; their hallmarks include anti-NATO messaging, intimate knowledge of regional culture and politics, and strategic influence operations (such as hack-and-leak operations used in conjunction with fabricated messaging and/or forged documents). PACT assesses with varying degrees of confidence that there are 81 additional, unreported domains clustered with the activity that FireEye and ThreatConnect detailed in their respective reports. PACT also assesses with High Confidence that UNC1151 has targeted additional European entities outside of the Baltics, Poland, Ukraine and Germany, for which no previous public reporting exists. The research can be found here: Diving Deep into UNC1151's Infrastructure: Ghostwriter and beyond
Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151's Infrastructure: Ghostwriter and beyond." Prevailion's Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion's visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign. UNC1151 is likely a state-backed threat actor waging an ongoing and far-reaching influence campaign that has targeted numerous countries across Europe. Their operations typically display messaging in general alignment with the security interests of the Russian Federation; their hallmarks include anti-NATO messaging, intimate knowledge of regional culture and politics, and strategic influence operations (such as hack-and-leak operations used in conjunction with fabricated messaging and/or forged documents). PACT assesses with varying degrees of confidence that there are 81 additional, unreported domains clustered with the activity that FireEye and ThreatConnect detailed in their respective reports. PACT also assesses with High Confidence that UNC1151 has targeted additional European entities outside of the Baltics, Poland, Ukraine and Germany, for which no previous public reporting exists. The research can be found here: Diving Deep into UNC1151's Infrastructure: Ghostwriter and beyond
When Victor Mata spent time working around a forklift, he couldn't resist the opportunity to learn to operate one himself. It's the same natural curiosity that allows him to thrive today in the professional sales world. Victor, now a highly successful Enterprise Business Development Rep for ThreatConnect, unpacks a compelling personal story starting with his deep roots in Venezuela to his winding journey to the United States in the latest edition of Tech Sales is for Hustlers. Through it all, his disparate cultural immersion and experience in a wide range of initial jobs provided a first-rate education in the ever-elusive and frequently temperamental subject matter: human nature. Tune in to the latest episode to hear Victor explain why he values understanding prospect personas above all else in sales, how early roles as a door-to-door salesman and restaurant server impacted his professional future, and how his quest to never stop asking “Why?” drives him perpetually forward.
Alex Harris, an Account Executive from ThreatConnect, joined us for Episode 3 and gave his insights into why he chose sales as a career and didn't just "fall into it", why it's good to make mistakes, how to create a mindset that allows you to immerse yourself in the role and what he did to land his dream role.
In our first episode, recorded late 2020, we sit down with Alex Harris from ThreatConnect to unpack how he has stayed productive and successful as an SDR during the global pandemic. Alex is one of our founding members of SDR Nation and is based out of the U.K. Connect with Alex: https://www.linkedin.com/in/alex-harris-7a6a17b9/
Lara Meadows, VP Sales Engineering at ThreatConnect, discusses her approach to hiring, onboarding, and managing great talent.
ThreatConnect Integrates with Microsoft Graph Security API to Strengthen Security Automation, Sectigo unveils Sectigo Quantum Labs to help orgs prepare for quantum computers, Trend Micro to offer comprehensive network and endpoint protection for IoT and 5G private networks, Thycotic Releases Thycotic Identity Bridge, and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw195
ThreatConnect Integrates with Microsoft Graph Security API to Strengthen Security Automation, Sectigo unveils Sectigo Quantum Labs to help orgs prepare for quantum computers, Trend Micro to offer comprehensive network and endpoint protection for IoT and 5G private networks, Thycotic Releases Thycotic Identity Bridge, and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw195
With an attack landscape so rife, it's imperative to narrow the cybersecurity skills gap. One way of doing so is by revamping workflows, as well as considering ways that juniors can benefit from their seniors guidance. Joining us to share his thoughts on the matter is Dan Cole, Senior Director of Product Management at ThreatConnect. In particular, Dan delves into the time constraints of training new recruits, before demonstrating how cybersecurity teams can switch up workflows to accommodate the gap and mitigate risks. Finally, Dan shares his recommendations for what juniors can do to take the edge off the skills gap.
This week, we talk Enterprise News, to talk about the MITRE ATT&CK for ICS: A Technical Deep Dive, Tufin Expands Security Automation Capabilities, Strengthen Business and Security Alignment with ThreatConnect, BeyondTrust Privilege Management for Windows and Mac SaaS Accelerates and Enhances Endpoint Security, Re-imaging threat detection, hunting and response with CTI, and more! In our second segment, we welcome Adam Bosnian, Executive Vice President of Global Business Development at CyberArk, discussing What Is The Real Value Of Identity In A Multi-vendor IT Environment? In our final segment, we welcome Zack Moody, Head of Global Cybersecurity & Privacy at AVX Corporation, to talk about how Cybersecurity Is a Mindset That Cannot Be Taught! Show Notes: https://wiki.securityweekly.com/ESWEpisode185 To learn more about CyberArk, visit: https://securityweekly.com/cyberark Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we talk Enterprise News, to talk about the MITRE ATT&CK for ICS: A Technical Deep Dive, Tufin Expands Security Automation Capabilities, Strengthen Business and Security Alignment with ThreatConnect, BeyondTrust Privilege Management for Windows and Mac SaaS Accelerates and Enhances Endpoint Security, Re-imaging threat detection, hunting and response with CTI, and more! In our second segment, we welcome Adam Bosnian, Executive Vice President of Global Business Development at CyberArk, discussing What Is The Real Value Of Identity In A Multi-vendor IT Environment? In our final segment, we welcome Zack Moody, Head of Global Cybersecurity & Privacy at AVX Corporation, to talk about how Cybersecurity Is a Mindset That Cannot Be Taught! Show Notes: https://wiki.securityweekly.com/ESWEpisode185 To learn more about CyberArk, visit: https://securityweekly.com/cyberark Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, MITRE ATT&CK for ICS: A Technical Deep Dive, Tufin Expands Security Automation Capabilities, Strengthen Business and Security Alignment with ThreatConnect, BeyondTrust Privilege Management for Windows and Mac SaaS Accelerates and Enhances Endpoint Security, Re-imaging threat detection, hunting and response with CTI, and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode185
This week, MITRE ATT&CK for ICS: A Technical Deep Dive, Tufin Expands Security Automation Capabilities, Strengthen Business and Security Alignment with ThreatConnect, BeyondTrust Privilege Management for Windows and Mac SaaS Accelerates and Enhances Endpoint Security, Re-imaging threat detection, hunting and response with CTI, and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode185
In the news, ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP! Full Show Notes: https://wiki.securityweekly.com/ES_Episode150 Visit https://www.securityweekly.com/esw for all the latest episodes!
In the news, ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP! Full Show Notes: https://wiki.securityweekly.com/ES_Episode150 Visit https://www.securityweekly.com/esw for all the latest episodes!
This week, Paul is joined by John Strand and Matt Alderman to talk Enterprise News, in which ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP! In our second segment, we air three pre-recorded interviews from BlackHat 2019 with Steve Laubenstein of CoreSecurity, Ian McShane from Endgame, and Peter Smith from Edgewise! In our final segment, we air two more pre-recorded interviews from BlackHat 2019 with Carsten Willems of VMRay and David Etue of BlueVoyant! Full Show Notes: https://wiki.securityweekly.com/ES_Episode150 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul is joined by John Strand and Matt Alderman to talk Enterprise News, in which ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP! In our second segment, we air three pre-recorded interviews from BlackHat 2019 with Steve Laubenstein of CoreSecurity, Ian McShane from Endgame, and Peter Smith from Edgewise! In our final segment, we air two more pre-recorded interviews from BlackHat 2019 with Carsten Willems of VMRay and David Etue of BlueVoyant! Full Show Notes: https://wiki.securityweekly.com/ES_Episode150 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Flexera Acquires RISC Networks, Security stays hot as Imperva grabs Distil Networks, EnSilo is raising a series B to monitor and remediate cyber threats, SentinelOne lands $120 mln Series D, Securonix Partner Program Targets MSSPs, Thycotic Expands Enterprise-Grade Privileged Access Management-as-a-Service Solution, SecureAuth Innovates Secure Identity Management with its Intelligent Identity Cloud Service, and much more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode140 Visit https://securityweekly.com/esw for all the latest episodes!
Flexera Acquires RISC Networks, Security stays hot as Imperva grabs Distil Networks, EnSilo is raising a series B to monitor and remediate cyber threats, SentinelOne lands $120 mln Series D, Securonix Partner Program Targets MSSPs, Thycotic Expands Enterprise-Grade Privileged Access Management-as-a-Service Solution, SecureAuth Innovates Secure Identity Management with its Intelligent Identity Cloud Service, and much more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode140 Visit https://securityweekly.com/esw for all the latest episodes!
This week, Paul is joined by Jeff Man to interview Charles Thompson, Senior Director of Product Management at VIAVI Solution to talk about the importance of response and remediation in a strong security strategy! In our second segment, we talk about Defending Your Environment Against Major Microsoft Vulnerabilities, and four pillars that define a "major" Microsoft vulnerability! In the Enterprise News, Database security for Amazon RDS, Infoblox unveils simplified security platform to detect and stop cyber threats, Palo Alto launches new 'Prisma' cloud security suite, and we have some funding and acquisition updates from Recorded Future, Swinlane, EnSilo, and SentinelOne! To learn more about Viavi Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/ES_Episode140 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul is joined by Jeff Man to interview Charles Thompson, Senior Director of Product Management at VIAVI Solution to talk about the importance of response and remediation in a strong security strategy! In our second segment, we talk about Defending Your Environment Against Major Microsoft Vulnerabilities, and four pillars that define a "major" Microsoft vulnerability! In the Enterprise News, Database security for Amazon RDS, Infoblox unveils simplified security platform to detect and stop cyber threats, Palo Alto launches new 'Prisma' cloud security suite, and we have some funding and acquisition updates from Recorded Future, Swinlane, EnSilo, and SentinelOne! To learn more about Viavi Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/ES_Episode140 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
In the Enterprise news, ThreatConnects new features make creating security playbooks easier, SolarWinds adds password management to security portfolio, Checkpoint Systems announces HALO IoT platform, and BlackHat USA offers an inside look at Intel's security engine! Full Show Notes: https://wiki.securityweekly.com/ES_Episode135 Visit https://securityweekly.com/esw for all the latest episodes!
In the Enterprise news, ThreatConnects new features make creating security playbooks easier, SolarWinds adds password management to security portfolio, Checkpoint Systems announces HALO IoT platform, and BlackHat USA offers an inside look at Intel's security engine! Full Show Notes: https://wiki.securityweekly.com/ES_Episode135 Visit https://securityweekly.com/esw for all the latest episodes!
This week, we welcome Jay Prassl, CEO of Automox joins us to discuss Patch Management struggles and how to overcome them! In our second interview, we're joined by Josh Abraham in studio, who is a Staff Engineer at Praetorian, to talk about the MITRE attack framework for defenders! In the Enterprise news, ThreatConnects new features make creating security playbook's easier, SolarWinds adds password management to security portfolio, Checkpoint Systems announces HALO IoT platform, and BlackHat USA offers an inside look at Intel's security engine! To get involved with Automox, visit: https://securityweekly.com/automox Why Praetorian Benchmarks to MITRE ATT&CK: https://p16.praetorian.com/blog/why-praetorian-benchmarks-to-mitre-attack Full Show Notes: https://wiki.securityweekly.com/ES_Episode135 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Jay Prassl, CEO of Automox joins us to discuss Patch Management struggles and how to overcome them! In our second interview, we're joined by Josh Abraham in studio, who is a Staff Engineer at Praetorian, to talk about the MITRE attack framework for defenders! In the Enterprise news, ThreatConnects new features make creating security playbook's easier, SolarWinds adds password management to security portfolio, Checkpoint Systems announces HALO IoT platform, and BlackHat USA offers an inside look at Intel's security engine! To get involved with Automox, visit: https://securityweekly.com/automox Why Praetorian Benchmarks to MITRE ATT&CK: https://p16.praetorian.com/blog/why-praetorian-benchmarks-to-mitre-attack Full Show Notes: https://wiki.securityweekly.com/ES_Episode135 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Alert Logic transforms Container Security, McAfee announces new enterprise security portfolio, ThreatConnect updates its Playbooks, Optiv Security launches new managed identity service, CA Technologies to become part of Broadcom, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode99 Visit http://securityweekly.com/esw for all the latest episodes!
Alert Logic transforms Container Security, McAfee announces new enterprise security portfolio, ThreatConnect updates its Playbooks, Optiv Security launches new managed identity service, CA Technologies to become part of Broadcom, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode99 Visit http://securityweekly.com/esw for all the latest episodes!
This week, Paul interviews John Moran, Senior Product Manager of DFLabs to talk about SOAR! Paul and John will then wrap up with the Enterprise News to give updates on McAfee, ThreatConnect, Optiv Security, CA Technologies, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode99 Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter! →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul interviews John Moran, Senior Product Manager of DFLabs to talk about SOAR! Paul and John will then wrap up with the Enterprise News to give updates on McAfee, ThreatConnect, Optiv Security, CA Technologies, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode99 Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter! →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
In the latest episode of the Digital Guardian podcast, Andy Pendergast, co-founder and and VP of Product at ThreatConnect, describes the benefits, challenges, and strategies around investing in a threat intelligence program.
Researchers at ThreatConnect have discovered evidence that Fancy Bear, a cyber espionage group generally associated with Russia's military agency GRU, may be spoofing domains belonging to the World Anti-Doping Agency (WADA), the US Anti-Doping Agency (USADA), and the Olympic Council of Asia. Kyle Ehmke is a threat intelligence researcher with ThreatConnect, and he takes us through their work. The CyberWire's Research Saturday is presented by the Hewlett Foundation Cyber Initiative. Learn more at https://www.hewlett.org/cyber/
Researchers at ThreatConnect have discovered evidence that Fancy Bear, a cyber espionage group generally associated with Russia's military agency GRU, may be spoofing domains belonging to the World Anti-Doping Agency (WADA), the US Anti-Doping Agency (USADA), and the Olympic Council of Asia. Kyle Ehmke is a threat intelligence researcher with ThreatConnect, and he takes us through their work.
In today's podcast we hear that credit bureau Equifax had disclosed a massive data breach it discovered on July 29th. Does that mean they're about a month delinquent? WikiLeaks weekly Vault7 dump departs from past practice with respect to content. The ShadowBrokers are back, and offering a twice monthly twofer. Emily Wilson from Terbium Labs with her thoughts on the encryption debate. Alexander Klimburg, author of The Darkening Web. And Intelligence Community leaders agree on at least three things: they need a better security clearance process, they need Section 702, and nowadays all intelligence involves cyber intelligence. Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI & partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
DragonFly 2.0 is up to some very bad things in several nations' power grids. China ramps up cyberespionage against South China Sea rivals. Facebook finds that a Russian front company bought more than $100,000 in influence-ops ads on its service over the last two years. US info ops stumble over a dog. Jonathan Katz on encryption bit depth. Kyle Wilhoit from Domain Tools with the results of a Black Hat survey on "fake news." And a Japanese 13-year-old is in hot water for trying to sell malware. Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI & partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
In today's podcast we hear about a critical vulnerability in Apache Struts. It's been patched—enterprises are advised to apply it as soon as possible. Dragonfly poses a clear and present danger to European and US power grids. Ransomware continues rampant. Latin American social media platform Taringa suffers a breach. Notes from the Intelligence and National Security Summit. Cryptocurrencies in China and Russia. Ben Yelin from UMD CHHS on the resignation of many of President Trump’s cyber security advisors. Guest is Tom Billington promoting the upcoming Billington Cybersecurity event. And say it ain't so, Joe—are the Red Sox stealing signals with an Apple Watch? Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI & partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
In today's podcast, we hear that election influence operations appear to have begun in Germany. Turla's spoor tracked to the Pacifier APT. Cambodia takes an authoritarian turn, possibly extending to domestic spying via RAT. Rival jihadists remain active online; US Cyber Command working to deny them cyberspace safe havens. More exposed AWS S3 databases. MongoDB databases hit with ransom wiper. PrincessLocker and Locky ransomware continue to romp in the wild. Free RAT backdoors criminals. Johannes Ulrich from SANS Technology Institute and the ISC Stormcast podcast on DDoS extortion emails. Disgruntled customer doxes booter service. Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI & partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Nerdio partners with CensorNet, ThreatConnect reveals a new threat intelligence product suite, free cyberthreat hunter, and defender tools for security analysts. Paul and John review the CISO Manifesto and deliver the top 10 rules for security vendors in this week’s episode of Enterprise Security Weekly! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/ES_Episode33 Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John review the CISO Manifesto and deliver the top 10 rules for security vendors. In the news, Nerdio partners with CensorNet, ThreatConnect reveals a new threat intelligence product suite, free cyberthreat hunter and defender tools for security analysts, and more. Stay tuned!
Nerdio partners with CensorNet, ThreatConnect reveals a new threat intelligence product suite, free cyberthreat hunter, and defender tools for security analysts. Paul and John review the CISO Manifesto and deliver the top 10 rules for security vendors in this week’s episode of Enterprise Security Weekly! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/ES_Episode33 Visit http://securityweekly.com/esw for all the latest episodes!
Paul and John review the CISO Manifesto and deliver the top 10 rules for security vendors. In the news, Nerdio partners with CensorNet, ThreatConnect reveals a new threat intelligence product suite, free cyberthreat hunter and defender tools for security analysts, and more. Stay tuned!
In today's podcast, we hear about Yahoo's disclosure of a record-setting breach—over a billion customer accounts are affected. CyberWire editor John Petrik collects industry comments on the breach. Microsoft reports finding "FinFisher-like" spyware in the wild. US investigation of Russian election hacking continues. The case for and against Fancy Bear is being made by observers, but the Intelligence Community says it will keep its conclusions to itself until the investigation is complete. ThreatConnect describes "faketivism." And the ShadowBrokers are back, and their broken English hasn’t gotten more convincing.
Two ThreatConnect personnel join us: John currently serves as a Threat Intelligence Research Analyst, while Alex is the Senior Threat Intelligence Research Engineer. They discuss their experience in the security field and the ThreatConnect platform and research teams. Hear their story here on Paul’s Security Weekly! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode491#Interview:_John_Hurd_and_Alex_Valdivia.2C_ThreatConnect_-_6:00-7:00PM Take the Security Weekly Survey: www.securityweekly.com/survey Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
John Hurd and Alex Valdivia of ThreatConnect join us, Jimmy Mesta of Invoca and OWASP gives tips on containerizing your security operations center, and we talk security news for the week. Stay tuned!
John Hurd and Alex Valdivia of ThreatConnect join us, Jimmy Mesta of Invoca and OWASP gives tips on containerizing your security operations center, and we talk security news for the week. Stay tuned!
Two ThreatConnect personnel join us: John currently serves as a Threat Intelligence Research Analyst, while Alex is the Senior Threat Intelligence Research Engineer. They discuss their experience in the security field and the ThreatConnect platform and research teams. Hear their story here on Paul’s Security Weekly! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode491#Interview:_John_Hurd_and_Alex_Valdivia.2C_ThreatConnect_-_6:00-7:00PM Take the Security Weekly Survey: Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
In today's podcast we hear about DarkOverlord and the data he's selling online. Guccifer 2.0 returns to blogging, and says he's not working for the Russians, but CrowdStrike, ThreatConnect, and SecureWorks present evidence to suggest otherwise. Thompson-Reuters says it's contained the World-Check database leak. Oculus' Twitter account is briefly hijacked (now restored to company control). Point-of-sale breach disclosures are confirmed. Why hackers hack when they do. Some governments' efforts to control information online seem to be having greater than expected success. Level 3's Dale Drew explains the season nature of cyber attacks, and Cytegic's Dan Pastor offers his view on the recent SWIFT banking attacks.
Wade Baker is the Vice President, Strategy and Risk Analytics at ThreatConnect. He believes improving information security starts with improving security information. In keeping with this belief, he’s working to complete his doctoral thesis, “Toward a Decision Support System for Managing Information Risk in Supply Chains”.
Wade Baker is the Vice President, Strategy and Risk Analytics at ThreatConnect. He believes improving information security starts with improving security information. In keeping with this belief, he’s working to complete his doctoral thesis, “Toward a Decision Support System for Managing Information Risk in Supply Chains”.
This week on Security Weekly, we interview Wade Baker, Vice President of ThreatConnect! Paul, Jack, Jeff, and Larry address listener feedback and questions. Paul discusses, Jeremiah Grossman, Apple hiring crypto-wizard Jon Callas to beef up security, Google killing passwords on Android, and lots more in Security News.