Paul and Doug talk about the need for and the pitfalls of egress filtering in your enterprise network (and sweaty lawyers). Full Show Notes Visit http://securityweekly.com/esw for all the latest episodes!
Enterprise Security Weekly
A look at the current state of enterprise security solutions, including new products, features and industry reporting. Visit the complete episode archive for detailed show notes!
Fortinet preps for a next-gen firewall, Samsung no longer mails printers, beware of Cisco training, using the right switches, Kubernetes, requirements and testing, to update or not to update, and more! Fortinet prepping for next-generation firewall – Its next, next generation firewall: “Today is not only about network security anymore,” Xie said. “It’s from the network, to […]
Enterprise Security News Microsoft buys another company, to patch (or not), the shift in the cybersecurity battleground, Carbon Black’s Petya assessment, and more enterprise news! Microsoft confirms its buying Israeli cloud-monitoring startup Cloudyn – The Cloudyn solution will be incorporated into Microsoft’s product portfolio — offering customers the industry’s broadest set of multi-cloud management, security and governance […]
Love it or hate it, Docker (and containers) are here to stay. Embrace change in this segment where Paul and Apollo discuss using Docker in the enterprise. We cover security considerations, deployment scenarios and much more! Enterprise Security Considerations for Docker During this segment we covered the following in great detail: While Docker allows for […]
Apollo Clark discusses the tools and techniques your team can use to manage, monitor and tune your enterprise AWS deployment. How to Manage AWS Cloud Resources The Triangle of Security Success states: “Every good sales pitch involves triangles facing up or down.” – Andy Sutcliffe Inventory Management Resources State Management Default, weak, reused passwords, shared […]
Brian Ventura is a SANS Instructor and infosec architect, while Ted Gary serves as the Product Marketing Manager at Tenable. Brian and Ted have been working on a project that highlights the first five security controls, which are: Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and […]
Five ways to maximize your IT training, pocket-sized printing, 30 years of evasion techniques, Ixia teases advanced visibility solutions, and more enterprise security news! HP brings pocket-sized printing to the UAE – ITP.net – Oh, you will see these in your enterprise. I can just see marketing and HR departments being all over this one. […]
*Should EDR be installed on every system? Servers too? All clients? *How important is the configuration of EDR? *What should your goals be for defense: know malware? unknown malware? ransomware? or are these three different products? *If you have a big name AV install, what should drive you to change it? e.g. Symantec or Mcafee… […]
Carbon Black releases Cb Response 6.1, what to ask yourself before committing to a cybersecurity vendor, Malwarebytes replaces antivirus with endpoint protection, and more enterprise security news! Full Show NotesVisit https://securityweekly.com/esw for all the latest episodes! http://traffic.libsyn.com/eswaudio/News_-_Enterprise_Security_Weekly_49_converted.mp3
Automating all the things, Juniper Networks opens a software-defined security ecosystem, millions of devices are running out-of-date systems, DUO New Zealand and McAfee join forces, and more enterprise news! Full Show NotesVisit https://securityweekly.com/esw for all the latest episodes! http://traffic.libsyn.com/eswaudio/News_-_Enterprise_Security_Weekly_48_converted.mp3