Episodios

  • Solving the Complexities of Cyber Insurance for SMBs - Brian Fritton - BSW #356
    Jul 15 2024

    Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach provides implementation guidance on the controls required to maximize your coverage, including premium discounts, higher ransomware supplements, and a reduction is deductibles. If you're struggling with cyber insurance, don't miss this interview.

    In the leadership and communications section, The Board’s understanding of cybersecurity, What does your CEO need to know about cybersecurity?, As CISOs grapple with the C-suite, job satisfaction takes a hit, and more!

    Visit https://www.securityweekly.com/bsw for all the latest episodes!

    Show Notes: https://securityweekly.com/bsw-356

    Más Menos
    1 h y 6 m
  • Autobahn, APT 40, Meliorator, RADIUS, AT&T, Apple, Josh Marpet, and More... - SWN #397
    Jul 12 2024

    Wir fahren auf der AutoBahn, APT 40, Meliorator, RADIUS, AT&T, Apple, Josh Marpet, and More on the Security Weekly News.

    Visit https://www.securityweekly.com/swn for all the latest episodes!

    Show Notes: https://securityweekly.com/swn-397

    Más Menos
    34 m
  • Joiners, Movers, Leavers, and Failures: Why is Identity Management Still Struggling? - Henrique Teixeira - ESW #367
    Jul 12 2024

    I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and shadow IT. Identity is one of the most common entry points for attacks, so we've got to do better as an industry here.

    We'll cover a variety of topics in this interview, including:

    • Why Henrique chose to go to Saviynt from Gartner
    • Vendor risk concentration in identity
    • Resilience in identity, especially when depending on a SaaS IdP
    • Identity attack evolution (and the creation of the ITDR category)
    • What's working in identity to move things forward, and what is holding us back

    This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviynt to learn more about them!

    In this week's enterprise security news,

    1. Seed rounds are getting huge
    2. Lots of funding for niche security vendors
    3. Rapid7 acquires Noetic Cyber
    4. but Rapid7 is also rumored to sell itself!
    5. Slack battles infostealers
    6. The loss of Chevron deference impacts cyber
    7. Should cybersecurity put up a no vacancy sign?
    8. Figma and Google both make some embarrassing mistakes
    9. The RockYou2024 file does NOT contain 10 billion passwords
    10. I introduce a new news category: AI indegestion

    All that and more, on this episode of Enterprise Security Weekly!

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-367

    Más Menos
    1 h y 31 m
  • RFID hacking & More Vulnerability Shenanigans - Iceman - PSW #834
    Jul 11 2024

    Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows.

    Iceman comes on the show to talk about RFID and NFC hacking including the tools, techniques, and hardware. We'll also talk about the ethics behind the disclosure of vulnerabilities and weaknesses in these systems that are used in everything from building access to cars.

    Segment Resources:

    • Youtube channel - https://www.youtube.com/@iceman1001
    • Proxmark3 forums - http://www.proxmark.org/forum/index.php
    • Proxmark3 Repository - https://github.com/rfidresearchgroup/proxmark3
    • Awesome RFID talks - https://github.com/doegox/awesome-rfid-talks

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://securityweekly.com/psw-834

    Más Menos
    3 h y 31 m
  • State Of Application Security 2024 - Sandy Carielli, Janet Worthington - ASW #290
    Jul 9 2024

    Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous speed.

    Segment resources

    • https://www.forrester.com/blogs/ludicrous-speed-because-light-speed-is-too-slow-to-secure-your-apps/
    • They're also conducting a survey on how orgs use Top 10 lists. Provide your response at https://forrester.co1.qualtrics.com/jfe/form/SV_9Z7ARUQjuzNQf0q

    Polyfill loses trust after CDN misuse, an OpenSSH flaw reappears, how to talk about secure design from some old CocoaPods vulns, using LLMs to find bugs, Burp Proxy gets more investment, and more!

    Visit https://www.securityweekly.com/asw for all the latest episodes!

    Show Notes: https://securityweekly.com/asw-290

    Más Menos
    1 h y 13 m
  • Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland... - SWN #396
    Jul 9 2024

    Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland, and more, are on this edition of the Security Weekly News.

    Visit https://www.securityweekly.com/swn for all the latest episodes!

    Show Notes: https://securityweekly.com/swn-396

    Más Menos
    34 m
  • Technology Rationalization in Cybersecurity - Max Shier - BSW #355
    Jul 9 2024

    On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size?

    Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss technology rationalization within cybersecurity. Max will discuss how to inventory your security products, identify overlap, and pick the right products for your organization.

    In the leadership and communications section, Bringing the boardroom to the cyber battlefield, Navigating the CISO Role: Common Pitfalls for New Leaders, Ask Better Questions to be a Better Leader, and more!

    Visit https://www.securityweekly.com/bsw for all the latest episodes!

    Show Notes: https://securityweekly.com/bsw-355

    Más Menos
    1 h y 1 m
  • Binary - SWN Vault
    Jul 5 2024

    Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on July 20, 2017.

    Doug talks about how to count from zero to one!

    Show Notes: https://securityweekly.com/vault-swn-18

    Más Menos
    26 m