Podcast by Tufin
…
continue reading
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
…
continue reading
1
How Threat-Informed Defense Can Shape Your Cyber Strategy - Jon Baker, MITRE
20:05
20:05
Play later
Play later
Lists
Like
Liked
20:05
Cyber defense is complex and easy to get wrong. Threat-informed defense is an approach to cybersecurity that involves gathering and utilizing information about potential threats and adversaries to enhance an organization's security posture. It focuses on understanding the tactics, techniques, and procedures (TTPs) employed by threat actors and usin…
…
continue reading
1
From Air Force to Cybersecurity - The Importance of Diversity of Thought - Larry Whiteside Jr.
19:34
19:34
Play later
Play later
Lists
Like
Liked
19:34
When individuals with different backgrounds, perspectives, and experiences come together, they bring unique insights and approaches to problem-solving, leading to more robust and effective cybersecurity strategies. Larry Whiteside Jr., CISO at RegScale and Co-Founder and President of Cyversity, joins us to talk about the importance of diversity of …
…
continue reading
1
Critical Frameworks and Beyond: How MITRE Supports the Cybersecurity Industry - Wen Masters, MITRE
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:56
MITRE, #1 on our 2022 Cyber Top 20 list, is known for frameworks like MITRE ATT&CK® and MITRE D3FEND™ -- but the organization's scope is far greater. We spoke with Wen Masters, Vice President of Cyber Technologies, MITRE, to learn more about how the not-for-profit organization brings critical resources and frameworks to CISOs and the security commu…
…
continue reading
1
Battling the Bad Bots - Antoine Vastel, DataDome
13:05
13:05
Play later
Play later
Lists
Like
Liked
13:05
Malicious or 'bad' bots are all the rage now. Cybercriminals and scammers use them to hurt users and companies' bottom line. As bot capabilities advance and become more rampant in e-commerce, businesses need to become savvier about their defenses in order to protect their customers. We sat down with Antoine Vastel, Head of Research at DataDome, to …
…
continue reading
1
Uniting to Secure Digital Identities - Julie Smith, IDSA
14:13
14:13
Play later
Play later
Lists
Like
Liked
14:13
Identity-related breaches remain a continual threat to organizations, with 84% experiencing a breach in the last year. We spoke with Julie Smith of the Identity Defined Security Alliance (IDSA) about these new research findings, the importance of securing digital identities in the new connected world, and what the IDSA is doing to rally companies a…
…
continue reading
1
The Human Right to Software Security Transparency - Jeff Williams, Contrast Security
16:22
16:22
Play later
Play later
Lists
Like
Liked
16:22
Software and app security have been black boxes for too long. The attacks on SolarWinds and Colonial Pipeline gave the US federal government more urgency to push for transparency across cybersecurity - from software bill of materials (SBOMs) and mandates. We spoke with Jeff Williams, Co-Founder and CTO of Contrast Security, about what makes softwar…
…
continue reading
1
How the Economy is Affecting Cybersecurity VC Investment - Marcus Bartram, Telstra Ventures
17:52
17:52
Play later
Play later
Lists
Like
Liked
17:52
The economy is shifting, and budgets are tightening. Cybersecurity must shift with it. We sit down with Marcus Bartram, General Partner, Telstra Ventures, to discuss cybersecurity investment in this economic climate, identity-based threats, and what cyber issues CISOs and the industry should keep their eyes on in 2023. All this and more on The Cybe…
…
continue reading
1
Ransomware Slows but Apple MacBooks Can Still Have a Backdoor - Tony Anscombe, ESET
24:54
24:54
Play later
Play later
Lists
Like
Liked
24:54
Guest Tony Anscombe, Chief Security Evangelist, ESET brought some data with him. According to ESET's research, key stats around malware and ransomware have declined, and that's great, but that doesn't tell the full threat story. Apple products have an aura of impenetrability, but a back door in MacOS was recently discovered by ESET. And finally, we…
…
continue reading
1
A Military Mind's Approach to Security Operations - Tom Gorup, Alert Logic
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07
There's a global talent shortage in cybersecurity. So when we hear about an Army veteran's success in security story, we get excited. Tom Gorup, VP of Security Operations at MDR provider Alert Logic, dives into the OCOKA military strategy and how he's applied what he learned from his deployments in Iraq and Afghanistan to his leadership role in sec…
…
continue reading
1
The Cloud Security Multiverse and the Power of Automation - Ruvi Kitov, Tufin
19:24
19:24
Play later
Play later
Lists
Like
Liked
19:24
Cloud security is complicated. But it doesn't have to be. Ruvi Kitov, CEO, Tufin, urges organizations to think differently about cloud security by embracing the 'multiverse' and the power of automation. Ruvi also dives into visibility as a security killer and enabler. All this and more on The Cyber Jack Podcast.…
…
continue reading
1
The Ingredients for Successful Cyber Industry M&A - Sue Graham Johnston, Juniper Networks
16:35
16:35
Play later
Play later
Lists
Like
Liked
16:35
The cyber industry is notorious for merger and acquisition activity. Some go well, some come with collateral damage -- loss of employees, poor technology integration and leadership friction. Getting it right is a sweet science. Sue Graham Johnston, VP & GM of AI-Driven SD-WAN at Juniper Networks, talks with us about coming over from an acquisition …
…
continue reading
1
Consumer Security Online and in the Metaverse - Petros Efstathopoulos, Norton LifeLock
18:42
18:42
Play later
Play later
Lists
Like
Liked
18:42
Consumer security online has become increasingly more complicated - thanks to mass data breaches and hackers understanding that social media can be used as a malicious tool. Petros Efstathopoulos, Global Head of Research at NortonLifeLock, discusses how consumers can keep their sensitive data secure online and what the future might hold for cyberse…
…
continue reading
1
How the Complexity of the Stack Kills Security - CrowdStrike, Amol Kulkarni
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51
CISOs face a huge list of challenges on a daily basis, but what are the most common ones that we can ban together on and attack? Amol Kulkarni, Chief Product Officer at CrowdStrike dives into how complexity is killing effective security and how new, innovative solutions -- like extended detection and response (XDR) -- can help simplify and harden c…
…
continue reading
1
Entering the New Cyber Workforce, Generational Diversity - Arctic Wolf, Ryenn White
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07
The cyber workforce has drastically changed over the past 5 years. Talent shortage aside, we now have individuals entering the new cyber workforce with specific degrees in cybersecurity. In this episode of The Cyber Jack Podcast, we sat down with Ryenn White, Triage Security Analyst Intern at Arctic Wolf, to dive into what it's like to be up-and-co…
…
continue reading
1
Cyber War, Critical Infrastructure and the Culture of Data Breaches - GRIMM, Jennifer Tisdale
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35
The notion of a 'cyber war' has been talked about many times by leaders and mainstream media. But are we thinking about the term in the right way? And is the U.S. doing enough to prepare for what the future might hold? How has our passive consumer culture of data sharing impacted how we think about cyber preparedness? We spoke with Jennifer Tisdale…
…
continue reading
1
Danger Zone: The Cloud Has Changed Supply Chain Security - Palo Alto Networks, Matt Chiodi
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57
Supply chain security has become a hot topic over the past couple of years -- thanks to the complexities of the cloud and a widened attack surface for adversaries to exploit. Matthew Chiodi, Chief Security Officer, Public Cloud at Palo Alto Networks, dives into key insights from a recent supply chain security report and staggering Red Team engageme…
…
continue reading
1
Gov Cyber Response to Nation-States, Fragile Critical Infrastructure - ZeroFox, Adam Darrah
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33
In this episode, Adam Darrah, Director of Intelligence Services at ZeroFox shares insights on the U.S. government's cybersecurity response to recent cyber-attacks, nation-state cyber tensions, and how fragile critical infrastructure security can be. Come get plugged in to cyber.By Jack
…
continue reading
1
Does Ransomware Get Worse Before It Gets Better? - Huntress, John Hammond
15:03
15:03
Play later
Play later
Lists
Like
Liked
15:03
Ransomware attacks have skyrocketed in the past couple of years - and they've been lucrative for cybercriminals. Major attacks from organized ransomware gangs on the supply chain have companies scrambling for protection. But what should organizations be prepared for? Will ransomware get worse before it gets better? Are the U.S. government's actions…
…
continue reading
1
CISOs Aren't Just CISOs Anymore - OneLogin, Vanessa Pegueros
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49
The role and responsibilities of the CISO in organizations have shifted dramatically over the past few years. CISOs aren't just CISOs anymore. We sat down with Vanessa Pegueros, Chief Trust and Security Officer at OneLogin to discuss what is expected of CISOs today, the pressures of the job, and what threats CISOs should be focused on in today's en…
…
continue reading
1
Breaking Employee Burnout in Cybersecurity - VMware Carbon Black, Karen Worstell
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55
Cybersecurity employee burnout is very real. We spoke with Karen Worstell, VMware Carbon Black, who has been studying employee burnout and diversity and inclusion in cyber for the past 10 years. She provides her insights on how cyber companies can beat burnout and create a culture of inclusion.By Jack
…
continue reading
1
Security Policy Management and Hybrid Cloud with Tufin
28:28
28:28
Play later
Play later
Lists
Like
Liked
28:28
Listen to Tufin and Mitch Ashley, analyst at Accelerated Strategies Group, discuss security policy management across hybrid cloud, multi-cloud and cloud-native security. The session includes insights from working with customers during the rapid migration to the cloud. This conversation originally aired on TechStrong TV/DevOps Chat.…
…
continue reading
1
Tufin Chooses Boston as U.S. Headquarters, WBZ News Radio
0:31
0:31
Play later
Play later
Lists
Like
Liked
0:31
Tufin CEO, Ruvi Kitov, tells WBZ News why he chose Boston as the location for Tufin's U.S. headquarters.By Tufin
…
continue reading