Security Weekly Podcast Network (Video)
Technology
Emerging threats are targeting organizations from seemingly every angle. This means security teams must expand their focus to secure as many domains as possible. OpenText is building on its holistic approach to cybersecurity with new innovations that make it easier for organizations to secure themselves against next generation threats.
This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them!
In reaction to the increasing potential of threat actors unaffected by the current state of cybersecurity measures and vulnerability management tools yielding “rarely actioned reports and long lists of generic remediations” as the attack surface continues to expand, Gartner has suggested a new program: CTEM - Continuous Threat Exposure Management. A continuous threat exposure management (CTEM) program is an integrated, iterative approach to prioritizing potential treatments and continually refining security posture improvements. Join Hive Pro’s VP of Product Marketing and former Gartner Analyst, Zaira Pirzada to better understand: - The state of the current threat landscape - The SOC pain points - What Continuous Threat Exposure Management is and best practices to implement it
This segment is sponsored by Hive Pro. Visit https://securityweekly.com/hiveprorsac to learn more about them!
Traditional Managed Detection and Response (MDR) methods, centered on threat-based security, often miss the bigger picture of evolving cyber risks. This segment explores the shift towards a proactive, risk-based MDR approach, emphasizing the importance of anticipating and mitigating risks before they escalate into threats. We'll discuss the benefits of integrating risk management into security strategies and the key factors organizations should weigh when enhancing their cyber risk reduction efforts.
This segment is sponsored by Critical Start. Visit https://securityweekly.com/criticalstartrsac to learn more about them!
Show Notes: https://securityweekly.com/esw-361
Stopping Business Logic Attacks: Why a WAF is no Longer Enough - Karl Triebes - ASW #255
SprySocks, Lazarus, Fortinet, Juniper, CISA, AI Art, More News, & Jason Wood - SWN #326
Board Members Struggling while Cybersecurity Goals Conflict with Business - BSW #320
2023 AT&T Cybersecurity Insights Report: Edge Ecosystem - Theresa Lanowitz, Steve Winterfeld - BSW #320
Breaches, detecting deepfakes, cloning yourself, and cars are a privacy nightmare! - ESW #331
Cyberdog, Pegasus, Webex, Peach Sandstorm, SAP, Caesar, Penn, Aaran Leyland, and More - SWN #325
Detection Difficulty - Why are we still missing attackers? - Chris Sanders - ESW #331
MDR and Self Sabotage - Jason Lassourreille - ESW #331
Cisco 0-Day, Chrome Vulnerability, MGM Shut Down, & More! - PSW #798
Ransomware Infection Vectors - Ryan Chapman - PSW #798
Microsoft Dumps a Key, Grafana Logs a Key, URL Parsers Disagree, Old Bug in Ubuntu - ASW #254
Mopria, Cisco, Seimens , Word, DarkGate, AP Stylebook, More News, and Jason Wood - SWN #324
Building a Scanner and a Community with Zed Attack Proxy - Simon Bennetts - ASW #254
The Secrets of Top Performing CISOs as the Board Expands Cybersecurity Risk Oversight - BSW #319
Identity is the Perimeter - Jeff Reich - BSW #319
The one in which Doug interviews Chat GPT - SWN Vault
Why Data Privacy is Being Overhauled in 2023 - Dan Frechtling - ESW Vault
Interview with Dr. Gene Spafford - Eugene Spafford - PSW Vault
Boardroom Off The Hook, But CISOs Need to Adapt to Take the Heat - BSW #314
Quantum Computing - SWN Vault
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Lex Fridman Podcast
The Unbelivable Truth - Series 1 - 26 including specials and pilot