Podchaser Logo
Home
Cyber Security Threat Actions This Week

David Senf

Cyber Security Threat Actions This Week

A weekly Technology, Tech News and Podcasting podcast
Good podcast? Give it some love!
Cyber Security Threat Actions This Week

David Senf

Cyber Security Threat Actions This Week

Episodes
Cyber Security Threat Actions This Week

David Senf

Cyber Security Threat Actions This Week

A weekly Technology, Tech News and Podcasting podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of Cyber Security Threat Actions This Week

Mark All
Search Episodes...
Great primer on actions to take: https://www.linkedin.com/pulse/winter-coming-lisa-r-lifshitz/PwC Canada on breach notification: pwc.com/ca/canadamandatorybreachFind Lisa: https://www.linkedin.com/in/lisa-r-lifshitz-93b0398/Find Constantine: ww
David Senf of Cyverity is joined by Mike Davis of CounterTack and Josh Fu from Cylance to net out how our security industry is reshaped by artificial intelligence. We look at machine learning and where it is being embedded and which skills will
I'm joined this week by Jonathan Nguyen-Duy from Fortinet, Travis Barlow and Mike Davis from CounterTack / GoSecure, and Ben Smith from RSA to learn how to plan, react and measure your incident response capabilities. Recorded live at the GoSec
Learn more:https://www.guidewire.com/about-us/news-and-events/eventshttps://main.strom.com/http://ridgecanada.com/
https://www.gosec.net/en/https://www.countertack.com/blog/topic/blogshttps://blog.rackspace.com/rackspace-launches-customer-reliability-engineering-and-managed-security-services-for-google-cloud-platform
Learn more and check out:http://www.devsecops.org/https://www.aporeto.com/blog/https://blog.conjur.org/https://www.arctiq.ca/our-blog/
MITRE ATT&CK:https://attack.mitre.org/wiki/Main_Page4 open-source ATT&CK tools analyzed:https://www.csoonline.com/article/3268545/data-breach/4-open-source-mitre-attandck-test-tools-compared.htmlAnomali blog:https://www.anomali.com/blog
We look for the balance between developers' security responsibility and the security team. Maya Kaczorowski from Google, Shannon Lietz from Intuit and Larry Maccherone from Comcast help weigh the options. 
Read this:https://www.manning.com/books/reactive-application-developmentAttend this:https://www.cyberark.com/impact2018/Join the discussion:https://cloudsecurityalliance.org/group/containerization/#_overview
Ransomware, like any other attack, is not inevitable if you can stop the attacker at even one step along a kill chain. We look specifically at the 5 steps of a ransomware as an example of how to improve your odds of avoiding a breach. Stewart C
Check out:idpro.org/join to connect and share with others on identityaporeto.com/blog for the latest on app identity vs. user identity and many other resourceshttps://gallery.technet.microsoft.com/eBook-Defending-the-New-dcd58679
Cloud ushers in new security challenges, while alleviating others. My guests, Stu Solomon, CTO at Optiv and Allan Liska, senior analyst at Recorded Future apply the NIST Cybersecurity Framework to draw out key elements of consideration for your
See the full report and slides in video format: https://youtu.be/VNgpkQkMi2k
Containers like Docker offer new automation awesomeness, portability and predictability. But traditional security tools and ops are only the start of reducing your risks. John Morello from Twistlock, Alfredo Hickman from Rackspace and Kellman M
If you're new to security threat intelligence or want to refine your threat intel program, get details on the latest tools and techniques in 5 phases of the Threat Intel Lifecycle that my guests explain. Allan Liska from Recorded Future, Tim Ga
Learn how to decide which DDoS provider to select, what operational issues may come up and how to handle them. My guests: Laurent Gil co-founded a leader in DDoS solutions (Oracle Dyn formerly Zenedge) and Stewart Cawthray helped set up a DDoS
Stewart Cawthray and Theo Van Wyk are my guests to help carefully extract our SIEM from the hot soup of new acronyms. Plus the Threat Radar, Frontline Actions and a little on Invisible Identity. Stewart is from Thomson Reuters and Theo is from
Travis Barlow is our expert from an MSSP, GoSecure, with a lens to new threat while Kellman Meghu is our other industry expert from Sycomp.
Travis Barlow is our expert from an MSSP, GoSecure, with a lens to new threat while Kellman Meghu is our other industry expert from Sycomp.
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features