In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network, and Threat Intelligence. Check out the discussion in this segment! Full Show Notes Visit http://securityweekly.com/esw for all the latest episodes!
Enterprise Security Weekly
A look at the current state of enterprise security solutions, including new products, features and industry reporting. Visit the complete episode archive for detailed show notes!
Mike Nichols, Director of Products at Endgame, joins us to discuss EDR, threat detection, and customer relations! Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
Security in the public cloud, the pitfalls of formal education, advanced security for AWS, and more enterprise news! Enterprise News STIX and TAXII: Sharing cyber threat intelligence | LookingGlass – . STIX makes it possible to explicitly characterize a cyber adversary’s motivations, capabilities, and activities, and in doing so, determine how to best defend against them. uhh. really? […]
HashiCorp Vault brings disaster recover to security secrets management, Oracle joins SafeLogic to develop FIPS module for OpenSSL security, and Cylance bringing enterprise security platform technology to home users. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
Paul and John talk about Security Policies and Procedures. They discuss the most fundamental parts of policies and procedures. It is the most difficult to implement, but the most important to structure of the enterprise. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly. Full Show Notes Visit http://securityweekly.com/esw for all the latest […]
Building a SOC with limited resources, the top five barriers to implementation, Qualys is acquiring Nevis Networks, auditing your AWS security policies, and more enterprise news! Enterprise News Top 5 Barriers to Security Implementations Wandera adds two-factor authentication for admins Tips for auditing your AWS security policies, the right way – AlgoSec Blog Build a […]
Ping Look serves as the Executive Advisor of security communications and awareness at Optiv. Ping joins us to discuss security awareness, business diversity, and more! Full Show Notes Visit http://securityweekly.com/esw for all the latest episodes!
Where do the lines blur between monitoring, configuration, and vulnerability management? What is the best way to monitor systems in an enterprise? How to you manage machine to machine trust? Answers to all those questions and more in this segment! Full Show Notes Visit
Malwarebytes revamps their adware removal, Minerva Labs fights against ransomware, EdgeWave announces phishing detection and awareness, and more enterprise news! Enterprise News illusive networks launches its External Incident Application Program Interface RSA NetWitness SIEM Suite Updated to Improve Security Operations GuardiCore Labs To Disclose Vulnerability In VMware vSphere At Black Hat USA 2017: From vSphere […]