Where do we stand today in the following 3 areas when it comes to vulnerability management: 1. Applications – DevOps, containers and applications in general (desktop and SaaS) – What are the new challenges and how do we solve them?2. Infrastructure – We still have infrastructure, operating systems, IoT, network infrastructure, etc…How do […]
In our second segment, the Security Weekly hosts will discuss the Future of Security, such as major changes, evolving threats, and security culture! The Future Of Security What are some of the major changes you hope to see in security over the next 5 years? What are some of the major challenges we’ll […]
In our second segment, the Security Weekly hosts talks about some of our favorite hacker movies, influencers in the community, and what software and devices make appearances in our labs! Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts Announcements RSA Conference 2019 is coming up March […]
CSO of Cisco Systems, Inc. Edna Conway, makes her return to discuss Intellectual Property with Paul, and more on this episode of Business Security Weekly! Full Show NotesVisit http://secweekly2.wpengine.com/category/ssw for all the latest episodes!
Struggling with unplanned work and finding the time to make change? Worry no more, my friends… I’ll share the strategy I introduce to the team I work with. Then Paul and I break down the big exits, huge funding rounds, and innovation trends you need to know about. What problem are we trying to solve? […]
IPFIX stands for Internet Protocol Flow Information Export. It was created due to a need for common, universal standard of export for Internet Protocol flow information from routers, probes, and other devices that are used by meditation systems, accounting/billing systems, and network management systems to facilitate services such as measurement, accounting, and billing. Full Show […]
John gives a Technical Segment this week entitled “Building A Purple Team”. He talks about different MITRE Tools. Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
Doug White, host of Secure Digital Life, comes on the show to talk about five, no six security threats from virtual machines! Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
This week, Keith and Paul discuss Data Security and Bug Bounty programs! They mention the lessons learned from the Uber breach and why Google paid 2.9 million in Bug Bounties in 2017! Full Show Notes Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://secweekly2.wpengine.com Follow us on Twitter: https://www.twitter.comsecurityweekly
This week, Paul and Michael talk about how to be more productive without burning out, what it takes to become a great product manager, what cybersecurity chiefs can learn from Warren Buffett, and the importance of explaining “Why” before “What” when you need help! All that and more, on this week’s episode of Business Security […]