John will be talking about the new mimikatz event log clearing feature. Full Show Notes Subscribe to YouTube Channel
It’s the most hackable time of the year! In the news, Paul and John discuss Flexera reimaging open source vulnerability detection, dispelling cybersecurity myths, Amazon to acquire cybersecurity startup Sqrrl, and more on Enterprise Security news! Enterprise News It’s the Most Hackable Time of the Year – Network Critical Flexera reimagines open source vulnerability detection […]
Many roads lead to Active Directory insecurity, such as e-mail phishing, letting go of your foothold, and all of that can be done without getting caught. These problems can be solved with Endpoint Detection, correlating your network, endpoint, log events, and being encrypted. Paul and John discuss their theories on Active Directories and what to […]
Security horror stories, making cloud native a reality, and updates from Ixia, Lacework, Francisco, and more! Enterprise News 9 Security Horror Stories that Will Forever Haunt Our Nightmares Automation is the Key to making Cloud Native a Reality | Twistlock Synopsys : 2017 Coverity Scan Report Finds Significant Adoption of Secure Practices in OSS Projects | […]
Bryan Patton is a Principal Strategic Systems Consultant for Quest Software. Prior to Quest, he worked with International Networking Services performing migrations to Active Directory and Exchange from several source platforms. Full Show Notes
Mary Chaney is the CEO of MBS Information Security Consulting and the Vice President for the International Consortium of Minority Cybersecurity Professionals (ICMCP), working to achieve building pipelines of diverse cybersecurity talent. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
Paul and John talk about a program that would give you a feed on the vulnerabilities that were specific to the software that you were using. Do you think that is still viable to today? John and Paul discuss the topic of Vulnerability tracking and reporting. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
John and Paul talk about low-hanging fruit, but try to determine if the enterprise is more secure because of your consulting on developer awareness. They help the enterprising company determine whether they need security training or not. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly. Full Show Notes Visit http://securityweekly.com/esw for all the latest […]
Don Pezet of ITPro.TV joins Paul and John to discuss deception technologies and honeypots in this episode of Enterprise Security Weekly! Full Show Notes Visit https://securityweekly.com/esw for all the latest episodes! http://traffic.libsyn.com/eswaudio/43_-_Don_Pezet_ITPro.TV_Enterprise_Security_Weekly_converted.mp3