Security Weekly Podcast Network (Video)

Security Weekly Productions
undefined
May 14, 2022 • 32min

Overcoming Challenges in Multinational Phishing Simulations - Omer Taran - ESW #273

According to CybeReady, during such turbulent times, one should regard all emails with extra caution and double-check the sender's address carefully. Beware of requests that ask for technical assistance such as running software or helping to take down websites. These might not only be illegal but may also be used to hack systems on the corporate network. Try to remember that during times of crisis, there is an increase in phishing attempts of all kinds as hackers take advantage of the situation. In this circumstance, employees need to stay updated from both a news and computing perspective. To be proactive in the defense of computing environments, our security experts recommend: 1. Personal computer and phones: Install the latest operating system and security updates. 2. Implement 2FA/MFA: Use a phone number or authentication app as the second factor of authentication to all important applications, social media accounts (Facebook/Meta, Linkedin, Twitter, etc.), and personal email accounts. Backup email and ensure it is recoverable. 3. Change Passwords: If you are reusing a password in sites that hold your personal information, it is a good time to change your passwords. 4. Support a Culture of Security: Train your employees continuously, advise friends and family to do the same, and take an active role in creating a safer internet. 5. Defend Work from Home Environments: Install the operating system and security updates. If these are available you should see a notification on your computer or phone. Especially important to business continuity in these times of uncertainty is the need for automated cybersecurity training that adapts to employee educational needs and accelerates the learning process. Segment Resources: https://cybeready.com/blog https://cybeready.com/resource-center/playbook https://cybeready.com/ultimate-guide-to-phishing-protection Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw273
undefined
May 13, 2022 • 1h 44min

Public Entities & Ransomware, Colonial Pipeline Fine, Nvidia's LHR Limiter, & BIG-IP - PSW #740

In the Security News for this week: Colonial Pipeline facing $1,000,000 fine, cybercrime tracking bill signed into law, Lincoln College Set to Close After Crippling Cyberattack, Nvidia's LHR limiter bypassed, & North Carolina Becomes the First State to Prohibit Public Entities from Paying Ransoms! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw740
undefined
May 13, 2022 • 29min

Protecting Your Environment with Intel vPro® Platform - Yasser Rasheed - ESW #273

In this segment sponsored by Intel, we will explore all things Intel vPro® platform. Learn how Intel vPro® platform can help you keep your computers up-to-date, prevent attacks, provide reports on the status of the firmware in use, and implement advanced hardware security! This segment is sponsored by Intel. Visit https://securityweekly.com/intel to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw273
undefined
May 13, 2022 • 56min

Destructive Malware & Other Threats to Watch - Fleming Shi - PSW #740

In-depth look at destructive malware and other threats the Barracuda team has been monitoring that you need to be aware of. This segment is sponsored by Barracuda Networks. Visit https://securityweekly.com/barracuda to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw740
undefined
May 11, 2022 • 31min

5 Demands, 6 Best Practices, & 7 Deadly Sins - BSW #262

In the Leadership & Communications section: 6 information governance best practices, The Seven Deadly Sins Of Leadership, Secrets to building a healthy CISO-vendor partnership, & more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw262
undefined
May 10, 2022 • 26min

Cyber: The Fifth Domain of War - Mike Ernst - BSW #262

Land, sea, air, space, and–increasingly–cyber. These are the five domains where war is conducted. In March 2022, CISA and other international cyber agencies issued guidance urging private and public organizations alike to harden their security postures in preparation for cyber fallout. However, to date, the cyber fallout from the conflict has been minor, leaving some questioning the seriousness of the threat. ExtraHop VP of Sales Engineering, Mike Ernst, joins Business Security Weekly for a candid discussion about expected impact on private enterprises, and how business leaders and CISO can use this moment to scrutinize their security posture. This segment is sponsored by ExtraHop Networks. Visit https://securityweekly.com/extrahop to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw262
undefined
May 10, 2022 • 37min

Smart Contract Security, Heroku Breach, & Real World Crypto Highlights - ASW #196

In the AppSec News Mike and John discuss: Secure coding practices and smart contracts, lessons from the Heroku breach, Real World Crypto conference highlights, and an entertaining bug in Google Docs, & more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw196
undefined
May 9, 2022 • 37min

Securing SAP: Addressing the Critical & Complex Challenge - Christoph Nagy - ASW #196

With 77 percent of all financial transactions touching an SAP system, SAP is the backbone and heart of most organizations. Add to this the vast amounts of customer facing personal data used within SAP, and you can see why SAP security is critical. However, SAP's complexity - in the form of extensive customization, thousands of configurations, and typical misunderstandings about who and which group is responsible – make SAP security a challenge. Hear SecurityBridge CEO Christoph Nagy discuss with Security Weekly how organizations can navigate and address these challenges by taking critical steps such as patching, creating baselines, and developing roadmaps for risk prioritization and more to become SAP security heroes. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw196
undefined
May 7, 2022 • 34min

Getting Value From SOAR Beyond Phishing Workflows - Ryan Fried - ESW #272

This topic will go over getting value from SOAR beyond just an initial phishing workflow. It will focus on orchestration and response, give ideas for other types of workflows and change the conversation from using SOAR to replace analysts to increasing SOC retention! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw272
undefined
May 7, 2022 • 44min

WeHackPurple, DevSecOps Evolution, Product-Led Growth, & 10 Security Startups - ESW #272

In the Enterprise Security News, Veza raises $110M for Data Security, Traceable raises $60M for API Security, 10 other security startups get funded, Synopsis buys Whitehat for $330M, HackerOne approves a PullRequest, Bright Security acquires WeHackPurple, LexusNexis acquires BehaviorSec, JupiterOne continues to release some compelling books, the DevSecOps evolution, the future of Product-Led Growth, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw272

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app