Paul, Larry, Doug, and Gabe talk about Software Development: Security Do’s and Don’ts.Full Show Notes: https://wiki.securityweekly.com/Episode615 Visit https://www.securityweekly.com/psw for all the latest episodes! To learn more about our sponsors visit: The Security Weekly Sponsor’s Page Hosts Announcements We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an […]
In our second segment, the Security Weekly hosts will discuss the Future of Security, such as major changes, evolving threats, and security culture! The Future Of Security What are some of the major changes you hope to see in security over the next 5 years? What are some of the major challenges we’ll […]
In our second segment, the Security Weekly hosts talks about some of our favorite hacker movies, influencers in the community, and what software and devices make appearances in our labs! Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts Announcements RSA Conference 2019 is coming up March […]
Securing the cloud is all the rage these days. So many vendors are now offering services in this area, and rightfully so, as getting a handle on the security of SaaS applications is no small chore. When software isn’t hosted in your environment, how do you secure it? Matt and Paul tackle this issue in […]
How do you control outbound egress filtering? What do you use NG firewalls for? Where do proxy servers fit into the mix? Paul and John discuss the ins and outs of network security architecture! Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
Paul and John discuss the Equifax breach and they make a lot of speculations about security risk and security leadership. Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
Don Pezet of ITProTV joins us to discuss network security architecture. How does it affect your enterprise? Secure networks closely depend on its performance, reliability, and security. Common Questions: 1. Where do I tap the network to monitor? 2. Do I run a proxy or not? What should the proxy do or not do? 3. […]
Matt and Michael discuss JASK, Automox, and more vendors that have stood out to them in the realms of security operations and endpoint protection! Jask.ai ProtectWise SecureSet AutoMox Full Show Notes Visit http://secweekly2.wpengine.com/esw for all the latest episodes!