Continue Reading... Network Security Monitoring With Suricata
Posted in Software Security

Network Security Monitoring With Suricata

In this lab i will show you how to setup Suricata IDS to monitor WAN Network traffic Links: How to…

Continue Reading... LIVE: Jazz & Friends National Day of School & Community Readings
Posted in Privacy and Data Rights

LIVE: Jazz & Friends National Day of School & Community Readings

Human Rights Campaign & National Education Association host a Jazz & Friends reading with HRC President Alphonso David and NEA…

Continue Reading... Apple’s Cert Surprise – Security Now 755
Posted in Cyber Security

Apple’s Cert Surprise – Security Now 755

Win 10 Lost Profile Bug, 4G/5G Attack This Week’s Security News: —  More Windows 10 lost profile pain —  A…

Continue Reading... Moving Towards Modern Vulnerability Management – Ed Bellis – RSAC 2020
Posted in Cyber Security

Moving Towards Modern Vulnerability Management – Ed Bellis – RSAC 2020

Ed Bellis, Co-founder and Chief Technology Officer at Kenna Security, discusses the requirements to move beyond traditional vulnerability assessment/management and…

Continue Reading... Open Threat Intelligence – Todd Weller – RSAC 2020
Posted in Cyber Security

Open Threat Intelligence – Todd Weller – RSAC 2020

Todd Weller, Chief Strategy Officer at Bandura Cyber, provides an update on Bandura Cyber and discusses the latest trends and…

Continue Reading... Collaborative Vulnerability Tracking & Remediation – Daniel DeCloss – RSAC 2020
Posted in Cyber Security

Collaborative Vulnerability Tracking & Remediation – Daniel DeCloss – RSAC 2020

Vulnerabilities and exposures come from many different sources. Plextrac allows you to bring in data from anywhere and track those…

Continue Reading... Enabling Developers Without Negatively Impacting Their Velocity – Utsav Sanghani – RSAC 2020
Posted in Cyber Security

Enabling Developers Without Negatively Impacting Their Velocity – Utsav Sanghani – RSAC 2020

Utsav Sanghani, Senior Product Manager from Synopsys, discusses the latest efforts to enable developers in ensuring that software security is…

Continue Reading... CISO Leadership, Culture, and the Evolving Role – Jinan Budge – BSW #164
Posted in Cyber Security

CISO Leadership, Culture, and the Evolving Role – Jinan Budge – BSW #164

Jinan Budge, Principal Analyst at Forrester, discusses CISO Leadership, Security Culture, and the Evolving Role of the CISO. Visit https://www.securityweekly.com/bsw…

Continue Reading... Shadow Risk Elimination – Rob Gurzeev – BSW #164
Posted in Cyber Security

Shadow Risk Elimination – Rob Gurzeev – BSW #164

This interview will cover the idea of Shadow Risk and why it’s something your organization can’t ignore. Specifically, we’ll talk…

Continue Reading... “Out-Of-The-Box” Log Analysis Dashboards – Corey Thuen – RSAC 2020
Posted in Cyber Security

“Out-Of-The-Box” Log Analysis Dashboards – Corey Thuen – RSAC 2020

Dashboards are a great way to enable junior security analysts to be more effective when trying to discover security events….

Continue Reading... Naomi Campbell Honored with HRC Global Advocacy Award at Greater New York Dinner
Posted in Privacy and Data Rights

Naomi Campbell Honored with HRC Global Advocacy Award at Greater New York Dinner

Award-winning supermodel, philanthropist and businesswoman Naomi Campbell is honored with the HRC Global Advocacy Award at the 2020 Greater New…

Continue Reading... IoT Security Through Network Monitoring – Corey Bodzin – RSAC 2020
Posted in Cyber Security

IoT Security Through Network Monitoring – Corey Bodzin – RSAC 2020

Agents and logs don’t play well in an IoT environment, however the network doesn’t lie. Looking at the behaviors of…

Continue Reading... Election Security – Partnering with the DDC – Mike Nichols – RSAC 2020
Posted in Cyber Security

Election Security – Partnering with the DDC – Mike Nichols – RSAC 2020

Mike Nichols, Head of Product at Elastic, discusses election security and their partnership with the DDC to offer 2020 campaigns…

Continue Reading... How to Scale Web Application Security – Kevin Gallagher – RSAC 2020
Posted in Cyber Security

How to Scale Web Application Security – Kevin Gallagher – RSAC 2020

Kevin Gallagher, Chief Revenue Officer at Netsparker, discusses how to scale web application security including asset discovery, application scanning, prioritization…

Continue Reading... Hacking & Securing Elections – Tod Beardsley – RSAC 2020
Posted in Cyber Security

Hacking & Securing Elections – Tod Beardsley – RSAC 2020

It is no secret that elections are under constant attack. Attacks take many shapes and forms, from dis-information to malware…

Continue Reading... Automation as a Solution for Web Application Security – Mark Ralls – RSAC 2020
Posted in Cyber Security

Automation as a Solution for Web Application Security – Mark Ralls – RSAC 2020

Mark Ralls, President and Chief Operating Officer at Acunetix, discusses web security challenges in small and medium enterprises and how…

Continue Reading... Managing Configuration & Patches with SaltStack – Mehul Revankar – RSAC 2020
Posted in Cyber Security

Managing Configuration & Patches with SaltStack – Mehul Revankar – RSAC 2020

Offering open-source and commercial solutions for configuration, patch, and vulnerability management, SaltStack is a must-have! Mehul Ravankar provides us with…

Continue Reading... Chris Eng Interview – What’s New with Veracode – Chris Eng – ASW #97
Posted in Cyber Security

Chris Eng Interview – What’s New with Veracode – Chris Eng – ASW #97

Chris Eng, Chief Research Officer at Veracode, provides an update on Veracode including 2019 growth, new product announcements, Veracode Security…

Continue Reading... Application News – RSA Conference News and Activities – ASW #97
Posted in Cyber Security

Application News – RSA Conference News and Activities – ASW #97

6 of the 10 vendors at Innovation Sandbox are application security companies, F5 Empowers Customers with End-to-End App Security, Checkmarx…

Continue Reading... HRC President Alphonso David Joins MSNBC to Discuss Mobilizing Equality Voters in South Carolina
Posted in Privacy and Data Rights

HRC President Alphonso David Joins MSNBC to Discuss Mobilizing Equality Voters in South Carolina

Continue Reading... Citrix Hacks, RSA Sold, IBM Runs In Terror, D-List Celebrities – SWN #14
Posted in Cyber Security

Citrix Hacks, RSA Sold, IBM Runs In Terror, D-List Celebrities – SWN #14

D-List Celebrities will call you for money, RSA Sold for 2.1B, IBM pulls out of RSA due to fear of…