Ready, Set, Secure Episode 48
Click here to watch the livestream or click here to download the latest episode! As the collective hangover of BlackHat and DefCon finally subsides we’ve rounded up two of our first time attendees to recap! Join us with first time BlackHat attendee, Greg Porterfield, and first time DefCon ...
Continue ReadingReady, Set, Secure Episode 47
Click here to watch the livestream or click here to download the latest episode! When it comes to your external API’s obscurity cannot prevent a breach - it will merely delay one until a more determined attacker comes along. So, what can you do to protect your organization? On this episode ...
Continue ReadingReady, Set, Secure Episode 46
Click here to watch the livestream or click here to download the latest episode! There are a ton of tools and processes for figuring out a bill of materials, finding vulnerabilities, and building remediations for modern software. But doing all of that for firmware is a completely different ...
Continue ReadingBenefits of a Positive Security Model Webinar
Positive Security is a model that enables access to known trusted resources rather than trying to determine what activity or entities have hostile intent. Applying a positive security model when protecting your APIs can offer direct benefits such as reduction in false negatives, lower reliance on ...
Continue ReadingReady, Set, Secure Episode 45
Click here to watch the livestream or click here to download the latest episode! Michael and Greg are back after a short summer hiatus to discuss the latest report from the Kiteworks team around privacy and compliance. They’re joined by Kiteworks CISO Frank Balonis who deep dives into getting ...
Continue ReadingMichael Farnum, Set Solutions: “security tools add to your attack surface just like any other technology”
To help secure sensitive data and the workforce from cyber threats, every company requires a selection of IT security solutions, services, and specialists that can implement them. A cybersecurity system is not only about providing the employees with security tools like VPN connections but should ...
Continue ReadingCompliance Webinar
When it comes to your organizations Cybersecurity defenses, Technology isn’t a cure all. Cybersecurity tools are just one piece of the puzzle of a company’s operational resilience. The key to minimizing your company’s exposure is to ensure that risk is balanced across people, process, and ...
Continue ReadingCybersecurity Insurance Webinar
Insurance companies are doubling premiums, raising deductibles, and denying coverage. The pressure falls on the Information Security team to quickly solve this problem. When these demands get made, Insurance providers typically require: Multi-Factor Authentication Privileged Access ...
Continue ReadingGRC Assessment Review with Michael Seaman
As laws and regulations develop in the cybersecurity space, GRC is becoming a larger part of enterprise organizations overall security program. Today GRC Practice Lead Stephen Alexander and Senior Security Consultant Leo Magallon chat with one of our customers to discuss the process of a GRC ...
Continue ReadingThe Benefits of Cloud Identity Governance
Thanks to the rush to digitally transform themselves, businesses build, deploy, and use more applications than ever. While this growth of applications is undoubtedly helping improve productivity, it’s also increasing digital security risks if organizations are not careful. This is especially true ...
Continue Reading