Security Weekly Podcast Network (Video)
Technology
Emerging threats are targeting organizations from seemingly every angle. This means security teams must expand their focus to secure as many domains as possible. OpenText is building on its holistic approach to cybersecurity with new innovations that make it easier for organizations to secure themselves against next generation threats.
This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them!
In reaction to the increasing potential of threat actors unaffected by the current state of cybersecurity measures and vulnerability management tools yielding “rarely actioned reports and long lists of generic remediations” as the attack surface continues to expand, Gartner has suggested a new program: CTEM - Continuous Threat Exposure Management. A continuous threat exposure management (CTEM) program is an integrated, iterative approach to prioritizing potential treatments and continually refining security posture improvements. Join Hive Pro’s VP of Product Marketing and former Gartner Analyst, Zaira Pirzada to better understand: - The state of the current threat landscape - The SOC pain points - What Continuous Threat Exposure Management is and best practices to implement it
This segment is sponsored by Hive Pro. Visit https://securityweekly.com/hiveprorsac to learn more about them!
Traditional Managed Detection and Response (MDR) methods, centered on threat-based security, often miss the bigger picture of evolving cyber risks. This segment explores the shift towards a proactive, risk-based MDR approach, emphasizing the importance of anticipating and mitigating risks before they escalate into threats. We'll discuss the benefits of integrating risk management into security strategies and the key factors organizations should weigh when enhancing their cyber risk reduction efforts.
This segment is sponsored by Critical Start. Visit https://securityweekly.com/criticalstartrsac to learn more about them!
Show Notes: https://securityweekly.com/esw-361
Have you heard about AI? Lots of AI news. Also, RSA conference, and RooBadges! - ESW #356
Getting Vulnerability Management Back on the Rails - Patrick Garrity - ESW #356
It's A Minifilter! - PSW #823
XZ - Backdoors and The Fragile Supply Chain - PSW #823
Top 10's First Update, Metasploit's Second Update, PHP Prepares Statements, RSA & MS - ASW #279
Lena, XZ, WallEscape, AT&T, OWASP, Google, Microsoft, AI, Josh Marpet, and More - SWN #374
Infosec Myths, Mistakes, and Misconceptions - Adrian Sanabria - ASW #279
CISO Soul Searching: Navigating the Evolving Role of the CISO - Harold Rivas - BSW #344
C-Level Perspective, Communication Failure, and Leadership Misconceptions - BSW #344
Electric Sheep, Exchange, Darcula, NuGet, Rockwell, FTX, Aaran Leyland, and More - SWN #373
Multi-Layered Defense Platforms and other terms we found in security press releases - ESW #355
Why cyber hygiene requires curious talent - Clea Ostendorf - ESW #355
Crypto, Bluetooth Vulns, Unsafe Locks - PSW #822
Are we winning? - Jason Healey - PSW #822
Patrick Stewart, Colorama, Strelastealer, CVSS scores, CHUDS, Josh Marpet, and more - SWN #372
Apps Gone Wild: Re-thinking App and Identity Security for SaaS - Guy Guzner - BSW #343
CSO Role vs. Changing CISO Role as 60% of Both Roles are Omitted from SEC Filings - BSW #343
GoFetch Side Channel, OpenSSF & Security Education, Fuzzing vs. Formal Verification - ASW #278
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354
Successful Security Needs a Streamlined UX - Benedek Gagyi - ASW #278
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast