Ian McShane, Endgame – Enterprise Security Weekly #113

Ian McShane has nearly two decades of experience in operational IT and security and risk planning for enterprises, service providers and software vendors. Paul, Matt, and Ian talk about the future of the enterprise and Endgame’s enterprise tools!… Continue reading Ian McShane, Endgame – Enterprise Security Weekly #113

Mark Dufresne, Endgame – Paul’s Security Weekly #579

Mark Dufresne explains why MITRE created their tool and what the MITRE attack framework is. Full Show NotesFollow us on Twitter: https://www.twitter.com/securityweekly Hosts
The post Mark Dufresne, Endgame – Paul’s Security Weekly #579 appe… Continue reading Mark Dufresne, Endgame – Paul’s Security Weekly #579

Mike Nichols, Keith McCammon, & Shawn Smith – Paul’s Security Weekly #577

Mike Nichols is the VP of Product Management at Endgame, and he manages the Endgame endpoint protection platform. Keith McCammon is the Chief Security Officer and Co-Founder of Red Canary, and he runs Red Canary’s Security Operation Center. Shawn Smith… Continue reading Mike Nichols, Keith McCammon, & Shawn Smith – Paul’s Security Weekly #577

We can’t rely on black swans: Three areas to improve cyber policy now

What will it take for cybersecurity policy to finally catch up to the digital age? I get this question often, and increasingly I worry that it will take a true “black swan” event to shock the system. Black swan events are rare, come as a surprise, and have a major impact. However, in 2017 alone, we seem to have already spotted a few black swans: WannaCry ransomware disrupted 300,000 machines, and just weeks later we … More Continue reading We can’t rely on black swans: Three areas to improve cyber policy now

Weaponizing machine learning to improve cyber defenses

As defensive technologies based on machine learning become increasingly numerous, so will offensive ones – whether wielded by attackers or pentesters. The idea is the same: train the system/tool with quality base data, and make it able to both extrapolate from it and improvise and try out new techniques. Finding and exploiting vulnerabilities At this year’s edition of DEF CON, researchers from Bishop Fox have demonstrated DeepHack, their own proof-of-concept, open-source hacking AI. “This bot … More Continue reading Weaponizing machine learning to improve cyber defenses

Joe Desimone, Endgame – Paul’s Security Weekly #522

Learn about “fileless” malware, threat actors, evading detection on the endpoint and more! Joe Desimone is a Malware Researcher at Endgame. He focuses on tracking and countering APTs, reverse engineering malware, and developing novel techniques and tools to empower hunt teams. Full Show Notes Subscribe to YouTube Channel

The post Joe Desimone, Endgame – Paul’s Security Weekly #522 appeared first on Security Weekly.

Continue reading Joe Desimone, Endgame – Paul’s Security Weekly #522

Amanda Rousseau, Endgame – Hack Naked News #124

Amanda Rousseau of Endgame joins us to discuss ransomware and malware protection on this episode of Hack Naked News! Full Show Notes Visit http://hacknaked.tv to get all the latest episodes! http://traffic.libsyn.com/hntvaudio/Amanda_Rousseau_Endgame_-… Continue reading Amanda Rousseau, Endgame – Hack Naked News #124

Hyrum Anderson, Endgame – Paul’s Security Weekly #504

Hyrum Anderson is the Technical Director for Data Science at Endgame. He received his PhD in Electrical Engineering from the University of Washington and BS/MS degrees from Brigham Young University. Hyrum also has prior experience at FireEye, Mandiant,… Continue reading Hyrum Anderson, Endgame – Paul’s Security Weekly #504

Cody Pierce on the Future of Exploit Development

Mike Mimoso talks to Cody Pierce, director of vulnerability research and prevention with Endgame, at RSA Conference 2017 about how attackers are changing their techniques in the face of mitigations. Continue reading Cody Pierce on the Future of Exploit Development