Security Weekly Podcast Network (Video)
Technology
Emerging threats are targeting organizations from seemingly every angle. This means security teams must expand their focus to secure as many domains as possible. OpenText is building on its holistic approach to cybersecurity with new innovations that make it easier for organizations to secure themselves against next generation threats.
This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them!
In reaction to the increasing potential of threat actors unaffected by the current state of cybersecurity measures and vulnerability management tools yielding “rarely actioned reports and long lists of generic remediations” as the attack surface continues to expand, Gartner has suggested a new program: CTEM - Continuous Threat Exposure Management. A continuous threat exposure management (CTEM) program is an integrated, iterative approach to prioritizing potential treatments and continually refining security posture improvements. Join Hive Pro’s VP of Product Marketing and former Gartner Analyst, Zaira Pirzada to better understand: - The state of the current threat landscape - The SOC pain points - What Continuous Threat Exposure Management is and best practices to implement it
This segment is sponsored by Hive Pro. Visit https://securityweekly.com/hiveprorsac to learn more about them!
Traditional Managed Detection and Response (MDR) methods, centered on threat-based security, often miss the bigger picture of evolving cyber risks. This segment explores the shift towards a proactive, risk-based MDR approach, emphasizing the importance of anticipating and mitigating risks before they escalate into threats. We'll discuss the benefits of integrating risk management into security strategies and the key factors organizations should weigh when enhancing their cyber risk reduction efforts.
This segment is sponsored by Critical Start. Visit https://securityweekly.com/criticalstartrsac to learn more about them!
Show Notes: https://securityweekly.com/esw-361
Secure Code From the Start, Security Validation & Platformization - Maxime Lamothe-Brassard, Volkan Ertürk, Chris Hatter - ESW #363
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More - SWN #389
Unified Identity Security, Identity is Under Attack & Identity is Security - Andre Durand, David Bradbury, Wendy Wu - ESW #363
This Week: short on funding, long on research and analysis - ESW #363
Exploits Make You More Secure - PSW #830
Pen Testing As A Service - Seemant Sehgal - PSW #830
Unpacking XDR & Business Applications - Chris Thomas, Oliver Tavakoli - ASW #286
Big Tech, Fighting a Junta, Keylogger in Microsoft, APT Hackers, Free Laundry, Josh - SWN #388
Node.js Secure Coding - Liran Tal - ASW #286
2024 Cyber Resilience Trends & Leveling the Cybersecurity Playing Field - Theresa Lanowitz, Jim Simpson - BSW #351
Security Money: Rubrick Saves The Index As It Continues To Climb - BSW #351
AI SOC Solutions, Revamp Your Cybersecurity, & Nightwing Introduction - Jon Check, Ricardo Villadiego, Jim McDonough - ESW #362
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & More - SWN #387
Vulnrichment, Hardware Hacking, VPNs - PSW #829
Flexxon Server Defender, Unforeseen Innovation Outcomes, & Security through Data - Jeetu Patel, Amit Sinha, Camellia Chan - ESW #362
The Impacts Of Cryptocurrency - Nicholas Weaver - PSW #829
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! - ESW #362
The Enterprise Browser & AI in Securing Software and Supply Chains - Mike Fey, Josh Lemos - ASW #285
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Josh Marpet... - SWN #386
Inside the OWASP Top 10 for LLM Applications - Sandy Dunn - ASW #285
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Acquired