Afleveringen
-
The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world.
The U.S. Securities and Exchange Commission (SEC) indictment against SolarWinds further emphasised the gravity of the situation, alleging the company misled investors by failing to disclose these vulnerabilities and the subsequent breach adequately.
This lack of transparency raises crucial questions about accountability and risk management in the mobile app development landscape, pushing organisations to re-evaluate their DevSecOps practices and prioritise robust security measures throughout the entire development lifecycle.
In this episode of the EM360 Podcast, Head of Podcast Production Paulina Rios Maya speaks to Richard Stiennon, Chief Research Analyst at IT-Harvest, and Tom Tovar, CEO and Co-Creator of Appdome, to discuss:
The SolarWinds indictment The U.S. SEC 4-day ruleThe impact on DevSecOps practicesBYOD and VPN security The evolving role of cybersecurityBuilding cyber resilience
-
The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good against basic attacks but not enough. Advanced attackers can slip through the cracks, exploiting new weaknesses or mimicking harmless traffic. Thus, businesses are exposed and face potential data breaches, financial ruin, and damaged reputations.
That's where Advanced Threat Intelligence (ATI) comes in – a game-changer in the cybersecurity arsenal. Unlike our old shields, ATI offers real-time intel on the latest threats, how attackers operate, and their ever-evolving tactics.
Recognising the limitations of traditional security solutions, Radware goes beyond basic shields. Imagine a high-powered watchtower constantly scanning the digital horizon, identifying threats before they strike.
In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Arik Atar, Senior Threat Intelligence Researcher at Radware, to discuss:
The Current Threat LandscapeModern Attacker TacticsRomance Scams & Pig ButcheringThe Radware Advantage
-
Zijn er afleveringen die ontbreken?
-
The cloud revolutionised how businesses operate, but managing dynamic, complex environments presents new and unique challenges.
While digital transformation has brought significant benefits, the reality is that organisations now require innovative solutions to effectively navigate intricate, hybrid, multi-cloud environments.
Evolven Software, driven by a mission to simplify complexity and mitigate risk, empowers large organisations to overcome the challenges of governing extensive hybrid ecosystems. By harnessing the power of AI/ML, Evolven enables a more secure, streamlined, and efficient cloud journey with fewer outages or compliance gaps.
In this episode of the EM360 Podcast, industry veteran Tom Croll, advisor at Lionfish Tech Advisors, speaks to Sasha Gilenson, Founder and CEO of Evolven Software, to discuss:
The current state of enterprise cloud architectures and the challenges in managing hybrid multi-cloud environments.Why managing risk in hybrid multi-cloud environments demands a new paradigm.The unique challenges large organizations face in maintaining visibility, control, and governance across their landscapes.How Evolven's AI/ML-driven solution empowers enterprises to overcome this complexity, enhance security, and optimize performance.
-
Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of assessing the readiness of the security infrastructure and guiding prioritized remediation.
But how does this implementation of automation really work to empower human expertise? How does all of this relate to compliance? And what words of wisdom can be given for those looking to level up their security strategy in 2024?
In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Thomas Pore, Director of Product Marketing at Pentera, as they discuss:
The pen-testing landscape How important testing and validating areEmpowering human expertise and remaining compliant
-
It seems like VPN products are consistently the initial access vectors for ransomware groups and targetted attacks.
This was demonstrated in the recent Ivanti Connect Secure zero-day vulnerabilities, as well as Cisco when they admitted last year that Akira Ransomware was specifically targeting their VPNs.
But what is the real problem with VPNs - and are they vulnerable by design? How do they fit into wider security architectures and strategies?
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Benny Lakunishok, Co-Founder and CEO of Zero Networks, to discuss:
The problem with VPNs‘Insecure by default’?ZTNA and remote access solutions
-
Rapid breach response. The art of quickly reacting to a security breach or incident. Key for minimising the impact of attacks and ensuring your team is as effective as possible, rapid breach response is an important part of any security strategy.
With the rise and innovation we see in the automation space right now, how could automation be implemented into a security strategy to level up the efficacy of rapid breach response?
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Devin Johnstone, Security Operations Specialist at Palo Alto Networks, to discuss:
Demystifying rapid breach responseImplementing and leveraging automation in RBRAdvice for SOC teams and shifting mindset
-
The audit process is broken. CISOs and CTOs have faced a multitude of challenges under this outdated audit landscape, and the efficacy of companies are being stunted by a system that desperately needs updating.
But how can technology be leveraged to streamline or even transform that auditing process? And what does the future of infosecurity compliance look like?
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Leith Khanafseh, Managing Director of Assurance and Compliance Products at Thoropass as they discuss:
The old audit landscapeChallenges for CISOs and CTOsMultiframeworks and the future of compliance
-
In the world of complex supply chains, it’s not enough to secure our own data but also ensuring that third party vendors we work with have robust security.
When it comes to proactively stopping threats and mitigating issues, supply chain monitoring and ensuring a secure software supply chain is crucial to keep organizations’ data safe.
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Rahul Sasi, Co-Founder and CEO at CloudSEK, to discuss:
Current state of cloud computing securityCommon vulnerabilities in the software supply chainRemote work, cloud reliance and mitigating risk
-
In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies are beginning to recognise the shift from a reactive stance to a proactive one.
This shift isn’t just a technological upgrade - it’s a fundamental change in mindset that can cause ripples throughout the business.
In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Uri Dorot, Senior Product Marketing Manager at Radware as they discuss:
AI-powered attacksResponsive protection vs proactive protectionHow proactivity works in practice
-
Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats.
By integrating relevant threat intelligence feeds, security teams gain insights into the tactics, techniques, and procedures employed by malicious actors. This aids in swift detection and response to potential incidents.
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Richa Priyanka, Solutions Architect at Palo Alto Networks, to discuss:
Role of threat hunting in SOCTypical threat intelligence feeds for incident investigationThe future of threat hunting
-
Application security is a complex, wide-ranging field.
With attackers using a wide range of attacks from credential stuffing to cookie poisoning, how can you keep up with the ever-evolving landscape?
In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:Main challenges in protecting applicationsGrowing threat landscapeConsistent security across multi-cloud and hybrid environments
-
Doing more with less. The art of optimising your cybersecurity strategy and resources to achieve effective protection against cyber threats.
From assessing and prioritising assets to utilising open source tools, understaffed and overstretched cybersecurity teams are looking at ways to maximise what they’re able to do.
In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Chris Cochran, Advisory CISO and Chief Evangelist at Huntress, to discuss:
Doing more with less - and why that’s necessaryEquipping teams to be proactive Cybersecurity challenges specific to healthcare industry
-
Securing Software as a Service (SaaS) applications is crucial to protect sensitive data, ensure user privacy, and maintain the overall integrity of the service.
From data encryption and identity management to network security and a solid incident response plan, there are some crucial things to consider when employing SaaS as a part of your workflow.
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Guy Guzner, CEO and Co-Founder of Savvy Security, to discuss:
Security challenges with SaaSKey worries from CISOs and CIOsThe problem with existing solutions today
-
Enabling the business to leverage data while preventing breaches are top priorities for CxOs and boards across industries.
However, data security has long relied on legacy architectures and outdated approaches that were developed to protect data on-premises.
By harnessing artificial intelligence and machine learning to automatically learn and holistically protect a company's unique data, new AI-powered data security platforms are revolutionising data security for the cloud era.
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Roland Cloutier, the former Global Chief Security Officer of TikTok & ByteDance, to discuss:
Social media and data privacy conversation Balancing leveraging data with preventing breachesIntelligently harnessing AI and ML for your data strategy
-
No one knows how far gen AI can go in the enterprise but we know that it will be massive. Future platforms will certainly streamline and ensure efficiency, accuracy, and impact.
But there are many questions, including whether open source models perform as well as proprietary research? Will data compliance continue to be the main challenge the industry faces? What does the right to be forgotten mean in a world where gen AI exists?
In this episode of the EM360 Podcast, Analyst Richard Stiennon and Philippe Botteri, Partner at Accel, discuss:
The world of data securityOpen source models vs proprietary researchData compliance todayAccel is a proud partner of Cyera, read more below about how they're addressing the most pressing problems in cloud security.
-
Zero Trust is a security concept and framework that assumes no trust, even among users and systems inside the corporate network.
Traditionally, network security models operated under the assumption that everything inside the corporate network could be trusted and that once someone gained access to the network, they could be trusted to access various resources.
This is no longer viable in 2023 and beyond - with the increase of sophisticated cyber attacks, denying by default has become the norm for companies looking to secure their sensitive data.
In this episode of the EM360 Podcast, Analyst Richard Stiennon is joined by Benny Lakunishok, Co-Founder and CEO of Zero Networks to discuss:What it means to have a true zero trust strategyZero trust challengesMFA and the future of network security
-
XDR isn’t just a fancy term or the latest trend; it represents consolidating security tools, enhancing defences against sophisticated attacks, and reducing response time to safeguard against data breaches.
Starting from a solid foundation of centralized logs, organizations can use XDR as part of their cybersecurity strategy to detect breaches across many different sources of data.
If we look specifically at the financial industry, XDR can be key in stopping attacks rapidly before they cause too much damage. Through reducing complexity and providing stack-wide visibility, SMBs within the banking sector can solve common challenges like understaffed teams and daunting compliance requirements.
In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Matthew Warner, CTO and Co-founder of Blumira, to discuss: Security pain points in the BFSI spaceThe difference between EDR and XDRChoosing the right XDR strategy for your business
-
It’s officially the spooky season - but something scarier than ghosts, vampires and werewolves is striking fear into the hearts of cybersecurity leaders across the globe.
The unique challenges in the security space have been forcing industry leaders to switch up the ways they operate, specifically in the MSP space.
What does it mean to be a cybersecurity leader today? How have cyber attackers been changing their approach?
In this episode of the EM360 Podcast, Analyst Richard Stiennon is joined by Chris Cochran, Advisory CISO and Chief Evangelist at Huntress, to discuss:Current state of cybersecurity leadershipChallenges faced by CISOs and IT Directors are facingCybersecurity horror stories
-
Rapidly accelerating technology advances, the recognized value of data, and increasing data literacy are changing what it means to be "data driven."
The ability to leverage data for day-to-day activities improves decision making, and fosters better innovation, collaboration, and communication.
With deep insight into the data they have, and the confidence that their data is secure, Cyera is enabling enterprises to leverage data to create truly differentiated customer and employee experiences.
In today’s episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Yotam Segev, CEO and Co-Founder at Cyera, to discuss:
Data security Why this is still a challengeStriking a balance between creating new steams
-
Monitoring cyber risk is essential in today's interconnected landscape.
Involving continuous assessment of vulnerabilities, threat detection, and response readiness, companies should be looking at the best way to protect themselves.
But is offence really the best defence? Does a proactive stance provide more of a formidable cybersecurity posture than a reactive stance? And how are the brightest minds in security mastering the art of minimising damage and downtime?
In today’s episode of the EM360 Podcast, Analyst Dr. Eric Cole is joined by Michael Quattrochi, SVP of Defensive Security at CyberMaxx, to discuss:
Offence fueling defenceMonitoring cyber riskCommon exploitation trends
- Laat meer zien