Securing the cloud is all the rage these days. So many vendors are now offering services in this area, and rightfully so, as getting a handle on the security of SaaS applications is no small chore. When software isn’t hosted in your environment, how do you secure it? Matt and Paul tackle this issue in […]
How do you control outbound egress filtering? What do you use NG firewalls for? Where do proxy servers fit into the mix? Paul and John discuss the ins and outs of network security architecture! Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
Paul and John discuss the Equifax breach and they make a lot of speculations about security risk and security leadership. Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
Don Pezet of ITProTV joins us to discuss network security architecture. How does it affect your enterprise? Secure networks closely depend on its performance, reliability, and security. Common Questions: 1. Where do I tap the network to monitor? 2. Do I run a proxy or not? What should the proxy do or not do? 3. […]
Matt and Michael discuss JASK, Automox, and more vendors that have stood out to them in the realms of security operations and endpoint protection! Jask.ai ProtectWise SecureSet AutoMox Full Show Notes Visit http://secweekly2.wpengine.com/esw for all the latest episodes!