Episoder
-
Gone are the days of merely safeguarding school computers! Censornet, a rising star in the tech industry, has undergone a remarkable transformation. From its roots as an internet security provider for educators, it has emerged as a trailblazing force in digital risk management.
Today, Censornet offers a comprehensive suite of tools designed to confront the dynamic challenges of the digital landscape, ensuring a safer and more secure online environment for all. This evolution stems from recognising that traditional threats are no longer the sole concern. With the proliferation of Shadow IT, unauthorised applications and devices, and the rise of insider threats, organisations face a complex array of risks.
In this episode of the EM360 Podcast, Jonathan Care, Advisor at Lionfish Tech Advisors, speaks to Gareth Lockwood, VP of Product at Censornet, to discuss:
Inspiration behind Censornet Censornet’s Capabilities Censornet’s Clients Shadow-IT Prevention of future vulnerabilities with AI and Censornet
-
Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are failing to keep up with the escalating volume and sophistication of attacks. By implementing Managed Detection and Response (MDR) with automation, Security Operations Centers (SOCs) can optimise workflows, augment analyst capabilities, and significantly enhance the organisation's overall cybersecurity defences.
Palo Alto Networks offers comprehensive MDR services, leveraging its threat intelligence and cutting-edge technology expertise. Unit 42, its esteemed threat intelligence team, is crucial in providing valuable insights into emerging threats and trends, empowering organisations to stay ahead of malicious actors.
In this episode of the EM360 Podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Ophir Karako, Software Engineer (Unit 42) at Palo Alto Networks, to discuss:
Palo Alto’s MDR Services Operational Automation Data EnrichmentThreat Response Job security for SOC AnalystsInterested in learning more about XSOAR and Palo Alto Networks? You can find some additional resources below:
Enloe Medical Center Strengthens Its Security Posture and Improves Efficiency With Unit 42 MDRUnit 42 Managed Detection and Response Service DatasheetA Practical Guide to Deploying SecOps Automation
Chapters00:00 - Introduction and Background
00:57 - MDR Services at Palo Alto Networks
03:20 - Automation in Operations
04:16 - Automating Data Enrichment
05:13 - Intellectual Property Playbooks and Scripts
05:41 - Customized Reports for Customers
06:10 - Automated Threat Response
07:08 - Insights and Lessons Learned from Automation
07:37 - Benefits of Automation for SOC Analysts
08:06 - Collaboration with Product Experts
09:04 - Treating Automation as a CI/CD Process
10:01 - The Future of Automation in Cybersecurity
12:51 - Automation and Job Security for SOC Analysts
14:20 - Cortex XSOAR: Security Orchestration, Automation, and Response Platform
15:46 - Unit 42 MDR Service
16:16 - Conclusion
-
Mangler du episoder?
-
The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world.
The U.S. Securities and Exchange Commission (SEC) indictment against SolarWinds further emphasised the gravity of the situation, alleging the company misled investors by failing to disclose these vulnerabilities and the subsequent breach adequately.
This lack of transparency raises crucial questions about accountability and risk management in the mobile app development landscape, pushing organisations to re-evaluate their DevSecOps practices and prioritise robust security measures throughout the entire development lifecycle.
In this episode of the EM360 Podcast, Head of Podcast Production Paulina Rios Maya speaks to Richard Stiennon, Chief Research Analyst at IT-Harvest, and Tom Tovar, CEO and Co-Creator of Appdome, to discuss:
The SolarWinds indictment The U.S. SEC 4-day ruleThe impact on DevSecOps practicesBYOD and VPN security The evolving role of cybersecurityBuilding cyber resilience
-
The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good against basic attacks but not enough. Advanced attackers can slip through the cracks, exploiting new weaknesses or mimicking harmless traffic. Thus, businesses are exposed and face potential data breaches, financial ruin, and damaged reputations.
That's where Advanced Threat Intelligence (ATI) comes in – a game-changer in the cybersecurity arsenal. Unlike our old shields, ATI offers real-time intel on the latest threats, how attackers operate, and their ever-evolving tactics.
Recognising the limitations of traditional security solutions, Radware goes beyond basic shields. Imagine a high-powered watchtower constantly scanning the digital horizon, identifying threats before they strike.
In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Arik Atar, Senior Threat Intelligence Researcher at Radware, to discuss:
The Current Threat LandscapeModern Attacker TacticsRomance Scams & Pig ButcheringThe Radware Advantage
-
The cloud revolutionised how businesses operate, but managing dynamic, complex environments presents new and unique challenges.
While digital transformation has brought significant benefits, the reality is that organisations now require innovative solutions to effectively navigate intricate, hybrid, multi-cloud environments.
Evolven Software, driven by a mission to simplify complexity and mitigate risk, empowers large organisations to overcome the challenges of governing extensive hybrid ecosystems. By harnessing the power of AI/ML, Evolven enables a more secure, streamlined, and efficient cloud journey with fewer outages or compliance gaps.
In this episode of the EM360 Podcast, industry veteran Tom Croll, advisor at Lionfish Tech Advisors, speaks to Sasha Gilenson, Founder and CEO of Evolven Software, to discuss:
The current state of enterprise cloud architectures and the challenges in managing hybrid multi-cloud environments.Why managing risk in hybrid multi-cloud environments demands a new paradigm.The unique challenges large organizations face in maintaining visibility, control, and governance across their landscapes.How Evolven's AI/ML-driven solution empowers enterprises to overcome this complexity, enhance security, and optimize performance.
-
Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of assessing the readiness of the security infrastructure and guiding prioritized remediation.
But how does this implementation of automation really work to empower human expertise? How does all of this relate to compliance? And what words of wisdom can be given for those looking to level up their security strategy in 2024?
In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Thomas Pore, Director of Product Marketing at Pentera, as they discuss:
The pen-testing landscape How important testing and validating areEmpowering human expertise and remaining compliant
-
It seems like VPN products are consistently the initial access vectors for ransomware groups and targetted attacks.
This was demonstrated in the recent Ivanti Connect Secure zero-day vulnerabilities, as well as Cisco when they admitted last year that Akira Ransomware was specifically targeting their VPNs.
But what is the real problem with VPNs - and are they vulnerable by design? How do they fit into wider security architectures and strategies?
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Benny Lakunishok, Co-Founder and CEO of Zero Networks, to discuss:
The problem with VPNs‘Insecure by default’?ZTNA and remote access solutions
-
Rapid breach response. The art of quickly reacting to a security breach or incident. Key for minimising the impact of attacks and ensuring your team is as effective as possible, rapid breach response is an important part of any security strategy.
With the rise and innovation we see in the automation space right now, how could automation be implemented into a security strategy to level up the efficacy of rapid breach response?
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Devin Johnstone, Security Operations Specialist at Palo Alto Networks, to discuss:
Demystifying rapid breach responseImplementing and leveraging automation in RBRAdvice for SOC teams and shifting mindset
-
The audit process is broken. CISOs and CTOs have faced a multitude of challenges under this outdated audit landscape, and the efficacy of companies are being stunted by a system that desperately needs updating.
But how can technology be leveraged to streamline or even transform that auditing process? And what does the future of infosecurity compliance look like?
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Leith Khanafseh, Managing Director of Assurance and Compliance Products at Thoropass as they discuss:
The old audit landscapeChallenges for CISOs and CTOsMultiframeworks and the future of compliance
-
In the world of complex supply chains, it’s not enough to secure our own data but also ensuring that third party vendors we work with have robust security.
When it comes to proactively stopping threats and mitigating issues, supply chain monitoring and ensuring a secure software supply chain is crucial to keep organizations’ data safe.
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Rahul Sasi, Co-Founder and CEO at CloudSEK, to discuss:
Current state of cloud computing securityCommon vulnerabilities in the software supply chainRemote work, cloud reliance and mitigating risk
-
In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies are beginning to recognise the shift from a reactive stance to a proactive one.
This shift isn’t just a technological upgrade - it’s a fundamental change in mindset that can cause ripples throughout the business.
In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Uri Dorot, Senior Product Marketing Manager at Radware as they discuss:
AI-powered attacksResponsive protection vs proactive protectionHow proactivity works in practice
-
Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats.
By integrating relevant threat intelligence feeds, security teams gain insights into the tactics, techniques, and procedures employed by malicious actors. This aids in swift detection and response to potential incidents.
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Richa Priyanka, Solutions Architect at Palo Alto Networks, to discuss:
Role of threat hunting in SOCTypical threat intelligence feeds for incident investigationThe future of threat hunting
-
Application security is a complex, wide-ranging field.
With attackers using a wide range of attacks from credential stuffing to cookie poisoning, how can you keep up with the ever-evolving landscape?
In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:Main challenges in protecting applicationsGrowing threat landscapeConsistent security across multi-cloud and hybrid environments
-
Doing more with less. The art of optimising your cybersecurity strategy and resources to achieve effective protection against cyber threats.
From assessing and prioritising assets to utilising open source tools, understaffed and overstretched cybersecurity teams are looking at ways to maximise what they’re able to do.
In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Chris Cochran, Advisory CISO and Chief Evangelist at Huntress, to discuss:
Doing more with less - and why that’s necessaryEquipping teams to be proactive Cybersecurity challenges specific to healthcare industry
-
Securing Software as a Service (SaaS) applications is crucial to protect sensitive data, ensure user privacy, and maintain the overall integrity of the service.
From data encryption and identity management to network security and a solid incident response plan, there are some crucial things to consider when employing SaaS as a part of your workflow.
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Guy Guzner, CEO and Co-Founder of Savvy Security, to discuss:
Security challenges with SaaSKey worries from CISOs and CIOsThe problem with existing solutions today
-
Enabling the business to leverage data while preventing breaches are top priorities for CxOs and boards across industries.
However, data security has long relied on legacy architectures and outdated approaches that were developed to protect data on-premises.
By harnessing artificial intelligence and machine learning to automatically learn and holistically protect a company's unique data, new AI-powered data security platforms are revolutionising data security for the cloud era.
In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Roland Cloutier, the former Global Chief Security Officer of TikTok & ByteDance, to discuss:
Social media and data privacy conversation Balancing leveraging data with preventing breachesIntelligently harnessing AI and ML for your data strategy
-
No one knows how far gen AI can go in the enterprise but we know that it will be massive. Future platforms will certainly streamline and ensure efficiency, accuracy, and impact.
But there are many questions, including whether open source models perform as well as proprietary research? Will data compliance continue to be the main challenge the industry faces? What does the right to be forgotten mean in a world where gen AI exists?
In this episode of the EM360 Podcast, Analyst Richard Stiennon and Philippe Botteri, Partner at Accel, discuss:
The world of data securityOpen source models vs proprietary researchData compliance todayAccel is a proud partner of Cyera, read more below about how they're addressing the most pressing problems in cloud security.
-
Zero Trust is a security concept and framework that assumes no trust, even among users and systems inside the corporate network.
Traditionally, network security models operated under the assumption that everything inside the corporate network could be trusted and that once someone gained access to the network, they could be trusted to access various resources.
This is no longer viable in 2023 and beyond - with the increase of sophisticated cyber attacks, denying by default has become the norm for companies looking to secure their sensitive data.
In this episode of the EM360 Podcast, Analyst Richard Stiennon is joined by Benny Lakunishok, Co-Founder and CEO of Zero Networks to discuss:What it means to have a true zero trust strategyZero trust challengesMFA and the future of network security
-
XDR isn’t just a fancy term or the latest trend; it represents consolidating security tools, enhancing defences against sophisticated attacks, and reducing response time to safeguard against data breaches.
Starting from a solid foundation of centralized logs, organizations can use XDR as part of their cybersecurity strategy to detect breaches across many different sources of data.
If we look specifically at the financial industry, XDR can be key in stopping attacks rapidly before they cause too much damage. Through reducing complexity and providing stack-wide visibility, SMBs within the banking sector can solve common challenges like understaffed teams and daunting compliance requirements.
In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Matthew Warner, CTO and Co-founder of Blumira, to discuss: Security pain points in the BFSI spaceThe difference between EDR and XDRChoosing the right XDR strategy for your business
-
It’s officially the spooky season - but something scarier than ghosts, vampires and werewolves is striking fear into the hearts of cybersecurity leaders across the globe.
The unique challenges in the security space have been forcing industry leaders to switch up the ways they operate, specifically in the MSP space.
What does it mean to be a cybersecurity leader today? How have cyber attackers been changing their approach?
In this episode of the EM360 Podcast, Analyst Richard Stiennon is joined by Chris Cochran, Advisory CISO and Chief Evangelist at Huntress, to discuss:Current state of cybersecurity leadershipChallenges faced by CISOs and IT Directors are facingCybersecurity horror stories
- Se mer