CSO of Cisco Systems, Inc. Edna Conway, makes her return to discuss Intellectual Property with Paul, and more on this episode of Business Security Weekly! Full Show NotesVisit http://secweekly2.wpengine.com/category/ssw for all the latest episodes!
Struggling with unplanned work and finding the time to make change? Worry no more, my friends… I’ll share the strategy I introduce to the team I work with. Then Paul and I break down the big exits, huge funding rounds, and innovation trends you need to know about. What problem are we trying to solve? […]
IPFIX stands for Internet Protocol Flow Information Export. It was created due to a need for common, universal standard of export for Internet Protocol flow information from routers, probes, and other devices that are used by meditation systems, accounting/billing systems, and network management systems to facilitate services such as measurement, accounting, and billing. Full Show […]
John gives a Technical Segment this week entitled “Building A Purple Team”. He talks about different MITRE Tools. Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
Doug White, host of Secure Digital Life, comes on the show to talk about five, no six security threats from virtual machines! Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
This week, Keith and Paul discuss Data Security and Bug Bounty programs! They mention the lessons learned from the Uber breach and why Google paid 2.9 million in Bug Bounties in 2017! Full Show Notes Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://secweekly2.wpengine.com Follow us on Twitter: https://www.twitter.comsecurityweekly
This week, Paul and Michael talk about how to be more productive without burning out, what it takes to become a great product manager, what cybersecurity chiefs can learn from Warren Buffett, and the importance of explaining “Why” before “What” when you need help! All that and more, on this week’s episode of Business Security […]
How do you control outbound egress filtering? What do you use NG firewalls for? Where do proxy servers fit into the mix? Paul and John discuss the ins and outs of network security architecture! Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
John and Paul talk about low-hanging fruit, but try to determine if the enterprise is more secure because of your consulting on developer awareness. They help the enterprising company determine whether they need security training or not. Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!