Thomas Hatch, SaltStack – Application Security Weekly #58

    Thomas is the creator of the Salt open source software project and the CTO of SaltStack, the company behind Salt. He has spent his career writing software to orchestrate and automate the work of securing and maintaining enterprise IT infrastructure from core data center systems to the very edge of the network and […]
The post Thomas Hatch, SaltStack – Application Security Weekly #58 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/wxnwAv2_Dko/

How To Think Like An Investor, Will Lin – Business Security Weekly #124

Will is a Partner and a Founding Investor at ForgePoint Capital. He has been an avid technology enthusiast for decades: building his first computer in elementary school and starting online businesses while completing his bachelor’s degree from the University of California, Berkeley. Full Show Notes Hosts         Announcements Register for our upcoming […]
The post How To Think Like An Investor, Will Lin – Business Security Weekly #124 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/WHW_r1ecBIE/

Security Money – Business Security Weekly #124

    This week we have our quarterly segment to review the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. We also update the Security Weekly 25 index. Let’s understand how the security market is doing.   SCWX   Secureworks PANW   Palo Alto Networks Inc CHKP   Check Point Software […]
The post Security Money – Business Security Weekly #124 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/sSAtt5ZEUZo/

Free Cynet Threat Assessment for Mid-sized and Large Organizations

If you cannot see what’s happening in your network, your ability to make smart security decisions will suffer. Many vendors offer threat assessment options, but they usually require an investment of time and resources. One vendor out there – Cynet – is offering a no-cost threat assessment to qualifying organizations for a limited time only. Based on more than 72-hours of data collection, the assessment gives organizations the ability to benchmark their security posture against their industry peers and provides actionable insights.How do you qualify? If your organization has at least 300 endpoints, you can take advantage of this free offer, to find out what your exposed attack surfaces are and understand what you can do to respond to attacks currently active in your environment. The assessment includes:Live attack indicators such as malware, C&C connections, data exfiltration, phishing link access, user credential thefts attempts, etc.Attack surfaces on host and application surfaces: unpatched vulnerabilities risk ranked  Benchmark of your security posture in comparison to your industry peers:Risk score based on total findings.User identity attack surface: risk ranking of user accounts.Security decision makers can take advantage of this offer to achieve (with no-obligation) full visibility into their actual security posture, highlighting what their needs are and providing a clear picture of risk ranking into threats and vulnerabilities. Given that most threat assessments for mid-sized organizations begin at $25-thousand, and considering what the Cynet assessment provides, this is a very attractive offer for the security-conscious organization.   Cynet has heavily focused efforts into research in the threat landscape, especially among its install base, and over the last few months has seen a clear increase in live attacks during new deployments.  Said Cynet CEO and co-founder Eyal Gruner, “We frequently discover live malicious activity in the networks of organizations when we do initial deployment of the Cynet platform. One of our first tasks upon deploying  is to identify and remediate these risks.”It is important to note that organizations are almost always unaware of the malicious activity, and additionally, most do not understand the capacity of the attacker’s ability to maneuver in stealth mode. This leaves a large gap between what many organizations think is going on in their networks and the actual threat reality, providing them with a false sense of security. With this in mind, the Cynet solution provides a proactive approach to threat assessment and response. Said Gruner, “We decided to offer this threat assessment to organizations, whether they are Cynet customers or not. We believe that instead of waiting for product deployments, organizations will get more benefit by addressing the issues we typically encounter, up-front and before deploying full-scale.”  Educating organizations in cyber security best practices is part of Cynet’s mission. Said Gruner, “We want people to realize that the risks are there, even when you don’t see them. Security has to be more than just buying a product to say you have it. You need visibility, and results with clear, actionable deductions. At Cynet, we want to help organizations achieve this.”Try Cynet’s Free Threat Assessment here.

Link: http://feedproxy.google.com/~r/PentestTools/~3/nSnlxp2L5PU/free-cynet-threat-assessment-for-mid.html

A Year Later, Cybercrime Groups Still Rampant on Facebook

Almost exactly one year ago, KrebsOnSecurity reported that a mere two hours of searching turned up more than 100 Facebook groups with some 300,000 members openly advertising services to support all types of cybercrime, including spam, credit card fraud and identity theft. Facebook responded by deleting those groups. Last week, a similar analysis found some 74 cybercrime groups operating openly on Facebook with more than 385,000 members.

Link: https://krebsonsecurity.com/2019/04/a-year-later-cybercrime-groups-still-rampant-on-facebook/

Post-Perimeter Security , Lookout – Business Security Weekly #123

Michael Murray is the Chief Security Officer at Lookout. Michael joins us today to talk about Post-perimeter Security. Full Show Notes Hosts Announcements Register for our upcoming webcasts with LogRhythm and Recorded Future by going to securityweekly.com/webcasts . If you have missed any of our previously recorded webcasts, you can find our on-demand library at […]
The post Post-Perimeter Security , Lookout – Business Security Weekly #123 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/9hoNDPnu6ig/

OceanLotus, Russia, & Google – Paul’s Security Weekly #599

    In the Security News, Attackers exploiting IMAP to bypass MFA on O365 and G-Suite accounts, Vietnam’s OceanLotus Group Ramps up hacking car companies, UC Browser violates Google Play Store Rules, & how Russia is spoofing GPS Signals on a massive scale! Paul’s Stories Algorithms can now find bugs in computer chips before they […]
The post OceanLotus, Russia, & Google – Paul’s Security Weekly #599 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/2aA2ZuayvmQ/

Mary Beth Borgwing, Cyber Social Club – Paul’s Security Weekly #599

This week, we welcome back Mary Beth Borgwing, President and Founder of of the Cyber Social Club, to talk about Uniting Women in Cyber! Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts             Announcements We just released our 2019 Security Weekly 25 Index Survey. Please go to securityweekly.com and […]
The post Mary Beth Borgwing, Cyber Social Club – Paul’s Security Weekly #599 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/CXN5qcvEXb0/

Threat Hunting & AI Hunter, ACM – Paul’s Security Weekly #599

In the Technical Segment, we welcome back our friend Chris Brenton, Chief Operating Officer at Active Countermeasures, to discuss why threat hunting is the missing link between our protection tools and our response tools, and will take a deep dive into the AI Hunter! To learn more about Active Countermeasures and to get the slides […]
The post Threat Hunting & AI Hunter, ACM – Paul’s Security Weekly #599 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/UoK6jc45GU8/

Security ROI, Endgame – Business Security Weekly #122

Ian McShane, the VP, Product Marketing at Endgame, joins us on Business Security Weekly to talk about security ROI and how to align goals, skills, and budgets to reduce risk. To learn more about Endgame, visit: https://securityweekly.com/endgame Full Show Notes Hosts         Announcements Join us April 1-3, at Disney’s Contemporary Resort for […]
The post Security ROI, Endgame – Business Security Weekly #122 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/1zuZmMBBUXM/