Security Weekly Podcast Network (Video)
Technology
Emerging threats are targeting organizations from seemingly every angle. This means security teams must expand their focus to secure as many domains as possible. OpenText is building on its holistic approach to cybersecurity with new innovations that make it easier for organizations to secure themselves against next generation threats.
This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them!
In reaction to the increasing potential of threat actors unaffected by the current state of cybersecurity measures and vulnerability management tools yielding “rarely actioned reports and long lists of generic remediations” as the attack surface continues to expand, Gartner has suggested a new program: CTEM - Continuous Threat Exposure Management. A continuous threat exposure management (CTEM) program is an integrated, iterative approach to prioritizing potential treatments and continually refining security posture improvements. Join Hive Pro’s VP of Product Marketing and former Gartner Analyst, Zaira Pirzada to better understand: - The state of the current threat landscape - The SOC pain points - What Continuous Threat Exposure Management is and best practices to implement it
This segment is sponsored by Hive Pro. Visit https://securityweekly.com/hiveprorsac to learn more about them!
Traditional Managed Detection and Response (MDR) methods, centered on threat-based security, often miss the bigger picture of evolving cyber risks. This segment explores the shift towards a proactive, risk-based MDR approach, emphasizing the importance of anticipating and mitigating risks before they escalate into threats. We'll discuss the benefits of integrating risk management into security strategies and the key factors organizations should weigh when enhancing their cyber risk reduction efforts.
This segment is sponsored by Critical Start. Visit https://securityweekly.com/criticalstartrsac to learn more about them!
Show Notes: https://securityweekly.com/esw-361
Material: cybersecurity word of the year, thanks to the SEC - Amer Deeba - ESW #350
Navigating the Cybersecurity Frontier: Insights from a Seasoned Professional - Toby Miller - PSW #817
Panel: Physical Security and Social Engineering - PSW #817
Proactive Compliance, Improving Cybersecurity Culture, and Hiring The Right Skills - BSW #338
Creating Code Security Through Better Visibility - Christien Rioux - ASW #273
LLMs & Security Tools, Shim Vuln, AI Threat Models, Configuration as Code with Pkl - ASW #273
Angry mobs, Azure, Avanti, Rhysida, Warzone, Flipper Zero, Josh Marpet, and More - SWN #362
Fake IDs threaten ID verification services, PANW hits $100B valuation, and other news - ESW #349
RoboJoe, SHIM, Fortinet, FaceOff, Simswap, sudo in Windows, Aaran Leyland, and More - SWN #361
Shim Shady and Algorithm Lovers - PSW #816
Zero-Trust is Meaningless if Your Cryptography is Flakey - Vincent Berk - ESW #349
You Can’t Defend What You Can’t Define - Sergey Bratus - PSW #816
Sorting Out Glibc Vulns, Apple's Security Research Device, BoringSSL, Old C Vulns - ASW #272
Teens Gone Wild, Nintendo, Anydesk, RUST, Google, Deepfakes, Jason Wood, and more - SWN #360
Starting an OWASP Project (That's Not a List!) - Grant Ongers - ASW #272
Pick Your Battles To Avoid Overconsolidation - Jess Burn, Jeff Pollard - BSW #337
Security Money - The Index Comes Roaring Back - BSW #337
E-Coli, Mercedes, Cloudflare, Ivanti, VT, GIGO, AI, Congress, Aaran Leyland and more - SWN #359
The Internet of Shit, AI Funding, Market Struggles, The Cyber Why, and when to Quit - ESW #348
The Elephant in the Pipeline: Securing the Wild, Untamed Software Supply Chain - Pete Morgan - ESW #348
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Lex Fridman Podcast
All-In with Chamath, Jason, Sacks & Friedberg