Careers Information Security Podcast show

Careers Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 Infoblox's Jesper Andersen on How to Identify Threats Sooner | File Type: audio/mpeg | Duration: Unknown

Infoblox has invested in shifting left in the cybersecurity kill chain with on-premises, cloud and hybrid versions of its BloxOne Threat Defense tools, which help security practitioners find and identify threats earlier and mitigate risks, says President and CEO Jesper Andersen.

 COVID-19's Impact on Cybersecurity Marketing | File Type: audio/mpeg | Duration: Unknown

Marketers rely on events to create brand awareness and generate demand, and physical events are coming back after the COVID-19 pandemic, says Gily Netzer of Perimeter 81. But "not everybody is traveling," she says, so hybrid events - and SaaS-driven corporate networks - are the future for companies.

 Sumedh Thakar on Fusing Vulnerability and Patch Management | File Type: audio/mpeg | Duration: Unknown

Companies continue to struggle with prioritizing which vulnerabilities present the greatest risk to the business and need to be remediated first since vulnerability scoring is too often based on a static set of what could happen if an issue is exploited, says Qualys President and CEO Sumedh Thakar.

 Why XDR Beats SIEM at Spotting Threats in Noisy Environments | File Type: audio/mpeg | Duration: Unknown

SIEM can play a key role in aggregating log data for compliance or auditing purposes, but when it comes to identifying threat activity in an IT environment, nothing beats XDR, which excels at using advanced techniques to pinpoint threats in high volumes of data, says Secureworks' Ryan Alban.

 Why Being Prepared Is the Key to Preventing Cyberattacks | File Type: audio/mpeg | Duration: Unknown

Hybrid war includes cyberattacks, critical infrastructure attacks and efforts to get information. Victoria Beckman, director of Microsoft's Digital Crimes Unit in the Americas, says Ukraine used a national cybersecurity strategy to withstand such attacks from Russia and so can other countries.

 Cyber Operations Keep Affecting Civilians as War Continues | File Type: audio/mpeg | Duration: Unknown

The ISMG Security Report discusses how cyberattacks and operations tied to the Russia-Ukraine war have been affecting civilians since the start of Russia's invasion, whether a practicing cardiologist living in Venezuela is also a ransomware mastermind and effective bot management tooling strategies.

 Secrets in the Code: Open-Source API Security Risks | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," Apiiro's Moshe Zioni, vice president of security research, discusses the company's "Secrets Insights 2022" report on the real-world risks of hardcoded secrets across the software supply chain and how to mitigate the potential damage they can cause.

 Medical Device SBOMs: Attention to Details Matter | File Type: audio/mpeg | Duration: Unknown

It's not enough for medical device makers to provide a software bill of materials - there also needs to be close attention paid to how vulnerabilities in components are communicated and managed, says medical device security expert Ken Hoyme.

 Russia-Ukraine War: Over 300 Cyber Operations Seen So Far | File Type: audio/mpeg | Duration: Unknown

The ongoing Russia-Ukraine war has featured cyber operations being used to target Ukraine as well as Russia. But CyberPeace Institute, which tracks cyberattacks tied to the conflict, has so far seen 27 different countries being affected by more than 300 attacks, and many have affected civilians.

 Hunting the Bad Guys Behind Golden SAML Attacks | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," Yonatan Khanashvili describes in detail how Golden Security Assertion Markup Language attacks occur and how SOC platforms with much greater capacity to cross-correlate data than legacy SIEMs can help defenders detect and hunt for them.

 Okta's Marc Rogers on Why Beating Ransomware Is a Team Sport | File Type: audio/mpeg | Duration: Unknown

Increased collaboration between the public and private sectors hasn't slowed the increased frequency and ease of ransomware intrusions, but efforts to change the financial incentives of ransomware are having "a pretty good effect," says Marc Rogers, vice president of cybersecurity strategy at Okta.

 Arctic Wolf's Dan Schiappa on Cloud Security in a Recession | File Type: audio/mpeg | Duration: Unknown

The impending recession should accelerate cloud adoption as firms look to reduce infrastructure costs, but these moves will introduce a new set of security challenges. Arctic Wolf Chief Product Officer Dan Schiappa predicts many companies will start building security into their applications sooner.

 Reducing Risk by Breaking Down Supply Chain Siloes | File Type: audio/mpeg | Duration: Unknown

Supply chain risk must be part of an enterprisewide risk management program framework, says information security manager Matt Marciniak of financial service firm Quantile. Reducing risk requires an agile approach to supplier management, he says.

 Ransomware: What We Know and What We Don't Know | File Type: audio/mpeg | Duration: Unknown

This edition of the ISMG Security Report analyzes the latest ransomware trends from the European Union Agency for Cybersecurity, findings from the first-ever Cyber Safety Review Board on the Log4j incident, and how security and privacy leaders are harmonizing new U.S. privacy laws.

 The Cryptocurrency Bloodbath and the Future of Crypto | File Type: audio/mpeg | Duration: Unknown

Commodity markets have created a cryptocurrency bloodbath that may not be over, but Richard Bird of SecZetta says economic patterns in history show that crypto "is not invalidated as a mean of commerce and exchange." He discusses the blockchain and the possible future uses of crypto.

Comments

Login or signup comment.