What an incredible season it’s been on the Breakpoint Security Podcast! From decoding API security with Bucchi Reddy to diving into SOC (un)automation with Dr. Anton Chuvakin, this season was packed with insights, stories, and actionable advice from some of the brightest minds in cybersecurity.This video shares some in... more
In this episode of the Breakpoint Security Podcast, we dive into the evolving world of Security Operations Centers (SOC) with Dr. Anton Chuvakin, Security Advisor at the Office of the CISO, Google Cloud.Key discussion points include:Event Correlation: Exploring the automation of correlating security events in real-time... more
When even a seasoned security professional thinks about cryptography, the obvious areas are encryption at rest and in transit. But modern cryptography has penetrated our lives - in the areas we don’t even think about. It works its magic in IoT devices, in the cloud, while we shop, and even in the car we drive! Guest:... more
Guest: Prashant Mahajan, Director for Payatu Australia Pty Ltd and OzHackThe Cybersecurity landscape is driven by the increasing complexity and integration of systems. One major challenge is the proliferation of interconnected devices and platforms, which expand the attack surface and create numerous entry points for m... more
A "notorious hacker" by FOX25 Boston, "World Class Hacker" by National Geographic Breakthrough Series and described as a "paunchy hacker" by Rolling Stone Magazine. He however prefers if people refer to him simply as a Hacker, Helper & Human.This is none other than our Guest- Jayson E. Street, Chief Adversarial Officer... more
In this episode, we're diving deep into "Gamification for Hacking Humans" with Jayson E. Street, Chief Adversarial Officer at Secure Yeti. We discuss how attackers are exploiting human psychology through techniques like #phishing and pretexting and how #AI is making #socialengineering attacks even more sophisticated. W... more
Interested in Cyber Reporting? Check out this episode where we discuss - Interpreting Security Metrics to understand real business Risk.Guest: Runa Desai Dalal, Cyber Risk Leader at AccentureCyber Strategy| CISO Dashboard| Cyber KPI| Cyber Analytics| Business Continuity |Enterprise Risk|Mentor| Coach| Guide|Understandi... more
TOPIC: Mastering Application Threat Modeling at ScaleGuest: Tony UV, CEO & Founder of VerSprite Security, and the Author of Risk Centric Threat Modeling & PASTA MethodologyWe dive deep into everything from effective threat modeling techniques for Agile and waterfall applications to scaling threat modeling across large ... more
In this episode, we delve into the intricate world of AI security, tackling the dual challenge of safeguarding artificial intelligence systems and utilizing AI to enhance cybersecurity. Guest: Tamaghna Basu, Founder & CEO, DeTaSECUREJoin us as we unravel the complexities of AI security and provide valuable insights tha... more
Learn to DevOpsify your Threat Detection Development!Guest: Wasim Halani, Director - Detection Engineering at SecuronixSOC teams face a continuous challenge of evolving threats and a difficulty in developing #analytics to detect such #threats. Recent times have seen the Detection Engineering function evolve along the l... more
Checkout AI for your DevOps pipelines!Guest: Shashank Pramod Dixit, Principal Consultant, Sumeru SolutionsCISO advisory, Product Management, Security leadership, Product Security.There exist many common challenges today for SMBs doing DevSecOps. Organizations are confused among the tools, there are so many options whic... more
What does Proactive API Security Testing encompass and what all you need to enhance your API Security Posture? We discuss all this with our expert guest Buchi Reddy.Guest: Buchi Reddy B, Founder & CEO of Levo.aiProactive API security testing refers to an approach where security testing activities are conducted preempti... more
The proliferation of digital identities and access points has increased the attack surface, making it difficult to monitor and secure user identities effectively. The rising sophistication of cyber threats, including identity theft and credential-based attacks, demands proactive measures to detect and respond to these ... more
Just like cloud is omnipresent in 2023, SaaS sprawl is just as prevalent. A company on an average uses 110 SaaS apps and broadly 70% of the software that is being run is SaaS with issues even more severe at enterprise level. SaaS security today is thought of as an IAM problem solved with an SSO integration but issues ... more
In today's world of rapidly evolving technology and the increasing complexity of software systems, ensuring the security and compliance of applications across the stack has become paramount. The stack has also gotten to be much more complex with the proliferation of APIs on cloud and cloud-native technologies. Tightly ... more
From Chaos to Compliance: Navigating the ISMS Implementation MazeIn this episode, we will be talking about the challenges an organization faces when doing an ISMS implementation. We will talk about this in the context of ISO 27001 implementation and see the practical nuances it entails.Guest: Sripati MS, Assistant Vice... more
MITRE ATT&CK has been the go-to framework for both offensive & defensive security teams. It’s sophistication and vast coverage makes it quite comprehensive, often not easy to fathom, let alone implement to the fullest. In this episode of br3akp0int, we demystify this through practical scenarios & Shweta’s experience of... more
From Zero to One: Bootstrapping Security for your OrganizationWith the rise in the number of digital start ups, many of us in security and engineering find ourselves in a place where we are the first of the lot. We need to not just define, but start and secure our organization and assets from the ever growing set of br... more
The world is getting smarter and the number of IoT devices is growing by the day. Securing such environments presents unique challenges due to the diverse nature of these devices and the complexity of their interactions.Guest: Aseem Jakhar Co-Founder & Dir. Research at PayatuLinkedin: @aseemjakharX: @aseemjakharAseem ... more
TOPIC: DevSecOps for teams building on Steroids Developers have already adopted public cloud in all tech enabled companies and industry verticals. Security teams are mostly for after the fact testing, signaling that compliance is in place or even as a sales aid when selling to large enterprises. If Continuous Delivery ... more
TOPIC: Sprinting Securely: Pentesting Keeping Pace with Agile DevelopmentBuilding Actionable Security Champion Programs & Pentest catching up with speed of agilePodcast Guest: Sanoop Thomas (@s4n7h0)Sanoop Thomas (@s4n7h0) is a seasoned security professional with a diverse background in consulting, teaching, research ... more
Season 02 Episode 01TOPIC: From Threat Actors with Love ! Tackling Malware Attacks for HealthcareThe sophisticated cyber attacks post pandemic opens the door for threat actors to craft more mail spam that spans across different sectors of industry. The rise of attacks towards the healthcare industry targeting health c... more
We're wrapping up season 01 and will be back soon in Season 02!!A big THANK YOU!To all our listeners who have been listening to the episodes for this first season of BP :)To all our Guests for sharing interesting stories & practical takeaways.In this cast, we wrap up Season 01 and share a quick glimpse of what was disc... more
TOPIC: Proactive Threat Prevention with Threat IntelligenceIn this episode, we discuss the challenges of Threat Intelligence in the modern Threat landscape and how security teams can conduct Threat Intelligence to Proactively Stop Advanced Attacks. Guest: Avkash Kathiriya, Sr. VP - Research and Innovation at Cyware Lab... more
TOPIC: Proactive Threat Prevention with Threat IntelligenceIn this episode, we discuss the challenges of Threat Intelligence in the modern Threat landscape and how security teams can conduct Threat Intelligence to Proactively Stop Advanced Attacks. Guest: Avkash Kathiriya, Sr. VP - Research and Innovation at Cyware Lab... more