Continue Reading... đź”´ LIVE: Paul’s Security Weekly #637
Posted in Cyber Security

đź”´ LIVE: Paul’s Security Weekly #637

This week, in our first segment, we welcome Gene Kim, Founder of ITRevolution, and Author of The Unicorn Project and…

Continue Reading... Migrating Legacy Apps to the Cloud Pt. 1 – ESW #170
Posted in Cyber Security

Migrating Legacy Apps to the Cloud Pt. 1 – ESW #170

Whether you’re trying to migrate a "homegrown" application or an open-source tool, getting into containers and to the cloud can…

Continue Reading... Cybereason, Swimlane, Citrix Scanner – ESW #170
Posted in Cyber Security

Cybereason, Swimlane, Citrix Scanner – ESW #170

This week in the Enterprise Security News, Paul and Matt cover the following stories: Cequence CQ botDefense, Optimizing Your IT…

Continue Reading... Edward Snowden and the Insider Threat – Steven Bay – ESW #170
Posted in Cyber Security

Edward Snowden and the Insider Threat – Steven Bay – ESW #170

Edward Snowden is a prime example of an Insider Threat. Steven Bay was his manager at the time as says:…

Continue Reading... SHAmbles – Security Now 751
Posted in Cyber Security

SHAmbles – Security Now 751

This Week’s Stories: — – Is Apple actually encrypting our iCloud storage backups? — – 250 Million Microsoft Customer Support…

Continue Reading... Windows Defender vs Ransomware
Posted in Software Security

Windows Defender vs Ransomware

Windows Defender vs Ransomware: How well does the free antivirus with Microsoft Windows 10 fare against this type of malware….

Continue Reading... Genetic data and privacy: An interview with Dani Shapiro
Posted in Privacy and Data Rights

Genetic data and privacy: An interview with Dani Shapiro

IAPP Research Director Caitlin Fennessy sat down with bestselling author Dani Shapiro at IAPP headquarters to discuss Shapiro’s personal experience…

Continue Reading... Zombieland 2, NFL Teams Twitter Hacked, Cisco Vulnerability – SWN #7
Posted in Cyber Security

Zombieland 2, NFL Teams Twitter Hacked, Cisco Vulnerability – SWN #7

This week, how all vehicles are on the road to being hackable, Misinformation on the internet? No way!, Jersey police…

Continue Reading... Cyber Insurance – SCW #15
Posted in Cyber Security

Cyber Insurance – SCW #15

Cyber Insurance. Cyberinsurance points to ponder: Relationship and dilution of responsibility between brokers, underwriters, and reinsurance companies, Cost of cyberinsurance,…

Continue Reading... Cyber Insurance, Ransomware, and More Cowbell – SCW #15
Posted in Cyber Security

Cyber Insurance, Ransomware, and More Cowbell – SCW #15

This week in the Security and Compliance Weekly News, Jeff, Matt, Scott, and Josh cover the following stories: Cyber insurance…

Continue Reading... CISO Challenges in a Changing World – Michael Figueroa – BSW #160
Posted in Cyber Security

CISO Challenges in a Changing World – Michael Figueroa – BSW #160

Michael discusses the challenges of CISOs and the differences between large enterprises and small businesses. As the role of the…

Continue Reading... Trust, Community, Competitive Advantage, Employee Appreciation – BSW #160
Posted in Cyber Security

Trust, Community, Competitive Advantage, Employee Appreciation – BSW #160

This week in the leadership articles segment, Matt and Paul cover the following topics: Board members find cybersecurity risk an…

Continue Reading... Dynamically Protecting Mobile Applications With RASP – John Butler – ASW #93
Posted in Cyber Security

Dynamically Protecting Mobile Applications With RASP – John Butler – ASW #93

Mobile applications are a rapidly growing attack surface and the tools and techniques being used to compromise these environments are…

Continue Reading... Pwn2Own In Miami, Cloud Vuln., Deconstructing Web Cache Deception Attacks – ASW #93
Posted in Cyber Security

Pwn2Own In Miami, Cloud Vuln., Deconstructing Web Cache Deception Attacks – ASW #93

Pwn2Own Miami — Schedule and Live Results show just how profitable deserialization, information leaks, and out-of-bounds flaws are, Insecure configurations…

Continue Reading... The Unicorn Project, Bezos, AI Facial, FBI Seizes A Domain – SWN #6
Posted in Cyber Security

The Unicorn Project, Bezos, AI Facial, FBI Seizes A Domain – SWN #6

Welcome to the Security Weekly News Wrap up for the Week of 19 – January – 2020. Bezos got hacked?…

Continue Reading... Dug Song – Engineer to Entrepreneur – Dug Song – PSW #636
Posted in Cyber Security

Dug Song – Engineer to Entrepreneur – Dug Song – PSW #636

Paul, Doug and Tyler interview Dug Song about how he got his start in Information Security, what prompted him to…

Continue Reading... Tomatoes, Jeff Bezos, Vuln. In AMD ATI Radeon, ‘The Rise of Skywalker’ – PSW #636
Posted in Cyber Security

Tomatoes, Jeff Bezos, Vuln. In AMD ATI Radeon, ‘The Rise of Skywalker’ – PSW #636

In the Security News, Microsoft Security Shocker As 250 Million Customer Records Exposed Online, the NSA Offers Guidance on Mitigating…

Continue Reading... Electronic Frontier Foundation (EFF), Godwin’s Law, Freedom of Speech – Mike Godwin – PSW #636
Posted in Cyber Security

Electronic Frontier Foundation (EFF), Godwin’s Law, Freedom of Speech – Mike Godwin – PSW #636

Paul, Doug and Tyler interview Mike Godwin about the creation of the EFF, why it was created and how he…

Continue Reading... Helping young people manage their online identity | Internet Matters
Posted in Online Safety

Helping young people manage their online identity | Internet Matters

Internet Matters Ambassador Dr Linda Papadopoulos shares insight on what online identity is, what it means for young people and…

Continue Reading... SAP Vulnerabilities – Alex Horan, Juan Pablo Perez Etchegoyen – ESW #169
Posted in Cyber Security

SAP Vulnerabilities – Alex Horan, Juan Pablo Perez Etchegoyen – ESW #169

Alex Horan is the Director of Product Management at Onapsis and JP Perez is the CTO at Onapsis. Today they…

Continue Reading... IE Zero-Day, Flashpoint, Malware Sandboxes – ESW #169
Posted in Cyber Security

IE Zero-Day, Flashpoint, Malware Sandboxes – ESW #169

In the Enterprise News, Paul and Matt cover new InfoSec products of the week, CyberArk’s new JIT access capabilities, a…