23% of security pros are blind to encrypted traffic threats

According to a Venafi survey conducted at RSA Conference 2017, 23 percent of respondents have no idea how much of their encrypted traffic is decrypted and inspected. “Encryption offers the perfect cover for cyber criminals,” said Kevin Bocek, chief security strategist for Venafi. “It’s alarming that almost one out of four security professionals doesn’t know if his or her organization is looking for threats hiding in encrypted traffic. It’s clear that most IT and security … More Continue reading 23% of security pros are blind to encrypted traffic threats

Can you justify your security spend?

In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT operations and cybersecurity working together, as well as the AtomicEye RQ platform. Here’s a transcript of the podcast for your convenience. We’re going to spend some time today talking about cyber risk. Can you give us a brief introduction to yourself and your perspective on cyber … More Continue reading Can you justify your security spend?

How to harmonize IT GRC controls in your environment

In this podcast recorded at RSA Conference 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about about achieving uniform compliance in risk management through harmonized GRC. Here’s a transcript of the podcast for your convenience. My name is Tim White, I’m the Director of Product Management at Qualys for compliance solutions. Today I’m going to talk about achieving uniform compliance in risk management through harmonized GRC. Heightened complaints in security environments … More Continue reading How to harmonize IT GRC controls in your environment

The impact of highly targeted attacks on modern organizations

In this podcast recorded at RSA Conference 2017, Lance Cottrell, Chief Scientist at Ntrepid, talks about the growing trend of targeted attacks, as well as strategies organizations need to consider as the breakdown of traditional security perimeter continues. Here’s a transcript of the podcast for your convenience. So, Lance, just to start out, can you just give us a little bit of your background and talk about what your path was to Ntrepid? Sure. I’ve … More Continue reading The impact of highly targeted attacks on modern organizations

Cody Pierce on the Future of Exploit Development

Mike Mimoso talks to Cody Pierce, director of vulnerability research and prevention with Endgame, at RSA Conference 2017 about how attackers are changing their techniques in the face of mitigations. Continue reading Cody Pierce on the Future of Exploit Development

Catch emerging strains of ransomware with RansomFree

In this podcast recorded at RSA Conference 2017, Yoel Eilat, Senior Product Manager at Cybereason, talks about RansomFree – the free, anti-ransomware protection software, which works on PCs running Windows 7, 8 and 10, Windows 2010 R2 and Windows 2008 R2. RansomFree uses behavioral analytics and proprietary deception techniques to target the core behaviors typical in ransomware attacks. Here’s a transcript of the podcast for your convenience. My name is Yoel Eilat, I’m a Senior … More Continue reading Catch emerging strains of ransomware with RansomFree

DevSecOps: Building continuous security into IT and app infrastructures

In this podcast recorded at RSA Conference 2017, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about DevSecOps. Instead of making security a trade-off at the end of the cycle when it’s already in production, how can we bring security into the development process, bring security into the DevOps process and make security part of the entire process line from a continuous integration point of view? Here’s a transcript of the … More Continue reading DevSecOps: Building continuous security into IT and app infrastructures

The power of Big Data for security, operations and DDoS protection

DDoS atacks are costly to your reputation and your bottom line. In this podcast recorded at RSA Conference 2017, Avi Freedman, CEO at Kentik, discusses how to recognize attacks quickly and accurately, then shut them down with situation-appropriate mitigation. Here’s a transcript of the podcast for your convenience. I’m Avi Freedman, CEO of a startup called Kentik Technologies, I’m here today, on this podcast, to talk about the power of Big Data for security, operations, … More Continue reading The power of Big Data for security, operations and DDoS protection

Enable self-healing endpoint security with Application Persistence

In this podcast recorded at RSA Conference 2017, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, SVP of Product Development at Absolute Software, talk about Application Persistence. Here’s a transcript of the podcast for your convenience. Richard Henderson: Hi! I’m Richard Henderson, Global Security Strategist at Absolute Software. Todd Wakerley: And I’m Todd Wakerley. I’m the SVP of Product Development at Absolute Software. And today we’re here to talk about Absolute Persistence … More Continue reading Enable self-healing endpoint security with Application Persistence

Automating PKI for the IoT platform

In this podcast recorded at RSA Conference 2017, Jeremy Rowley, Executive VP of Emerging Markets at DigiCert, talks about automating PKI for IoT platform and building scalable solutions for the IoT platform. Here’s a transcript of the podcast for your convenience. Hi, my name is Jeremy Rowley and I’m the Executive Vice President of Emerging Markets at DigiCert. Today I’m going to be talking about automating PKI for IoT platform and building scalable solutions for … More Continue reading Automating PKI for the IoT platform