Federico Simonetti is the CTO of Xiid Corporation. Federico comes on the show to discuss How To Fix Identity & Access Management. Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts
Category: Technical Segment
In the Technical Segment, we welcome back our friend Chris Brenton, Chief Operating Officer at Active Countermeasures, to discuss why threat hunting is the missing link between our protection tools and our response tools, and will take a deep dive into the AI Hunter! To learn more about Active Countermeasures and to get the slides […]
In this segment, we run a Technical Demo with our sponsor DomainTools, all about Domain Investigation with DomainTools Iris! References: http://research.domaintools.com/iris/ https://securityweekly.com/domaintools Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts Announcements SecureWorld Boston is hosting their 15th annual conference March 27-28 @ the Hynes Convention Center. Security Weekly […]
We welcome Peter Smith, Founder and CEO of Edgewise to talk about the evolution of Zero Trust! Smith, Edgewise Founder and CEO, is a serial entrepreneur who built and deployed Harvard University’s first NAC system before it became a security category. Peter brings a security practitioner’s perspective to Edgewise with more than ten years of […]
Joe Vest and Andrew Chiles from MINIS talk about Borrowing data to hide binaries. Joe Vest is the Co-Founder of the security consulting company MINIS LLC. He has over 17 years’ experience with a focus on red teaming, penetration testing, and application security. Joe is the co-author of the SANS SEC564 Red Teaming and Threat […]
Paul asked our Twitter followers about their favorite open-source alternatives to Nagios for monitoring system and service availability, and we listened, of course! Hear Paul’s essential enterprise network monitoring tools in this segment. Twitter poll results for the best free or open-source enterprise network monitoring tools: @securityweekly Librenms (https://t.co/TqhaRFAUQH) and observium (https://t.co/8zZ92gJxDX) before that. — […]
Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting. Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
In an attempt to define some of the basic areas for collecting information relevant to potential attacks, Paul came up with 4 enchanted quadrants. They cover Endpoints, SIEM, Network, and Threat Intelligence. Check out the discussion in this segment! Full Show Notes Visit http://secweekly2.wpengine.com/esw for all the latest episodes!
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly. Full Show Notes Visit http://secweekly2.wpengine.com/esw for all the latest […]
Where do the lines blur between monitoring, configuration, and vulnerability management? What is the best way to monitor systems in an enterprise? How to you manage machine to machine trust? Answers to all those questions and more in this segment! Full Show Notes Visit