Tag Archives: business

Podcast: Jeff Reed

kiqOBkL__400x400

Jeff Reed

Jeff Reed is Senior Vice President of Product for Cisco’s Security Business. He oversees product management, customer success and technical marketing for the industry’s leading security portfolio.

cisco-logo

I interviewed Jeff at the RSA Security Conference in San Francisco earlier this year and we discussed what’s new with CISCO including their recent acquisition of Duo Security, 2FA, cloud security, zero trust, how Jeff got into security, and his prediction on when we can expect the robot apocalypse.

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

 

 

Tagged , , , , , , , , , , , , ,

Podcast: Patrick Knight

rS4ton93_400x400

Patrick Knight

Patrick Knight is Senior Director of Cyber Strategy and Product Management at Veriato. For over 17 years Patrick has worked for major security leaders developing products and guiding online security policies, including encryption, network intrusion detection and anti-malware threat protection technologies. At Veriato, he is helping organizations across the globe protect sensitive data from risks posed by insiders. Prior to entering the online security industry, he spent 12 years in national security in the U.S. Intelligence Community.

Patrick joined me to speak about insider threats and discuss some of the findings in the recently released Insider Threat Program Maturity Model report by Veriato. The report provides insight into how organizations today are addressing the threat of insiders. By looking at how factors like program support, budget, the presence of a formal team, and privacy impact program maturity, this report can provide a better understanding of what conditions are necessary to achieve the most effective program possible.

InsiderThreatReport-STILL

The Insider Threat Program Maturity Model provides organizations with a way to benchmark their current ability to monitor, detect, mitigate, and respond to insider threats. The Maturity Model also helps to determine a path to further mature the existing program towards a metrics-centric, optimized program.

Download the report free here.

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

Tagged , , , , , , , , , , ,

PODCAST: Adam Kujawa

H3IN5_1k_400x400

Adam Kujawa

Adam Kujawa, Director of Malwarebytes Labs,  is a computer scientist with experience in reverse engineering and malware analysis. He has worked at a number of United States federal and defense agencies, helping these organizations reverse engineer malware and develop defense and mitigation techniques. Adam has also previously taught malware analysis and reverse engineering to personnel in both the government and private sectors.

492061-malwarebytes-logo

Visit the Malwarebytes website for more information.

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

 

 

Tagged , , , , , , , , , , ,

PODCAST: Josh Mayfield

josh-mayfield-largeImage-7-a-2359

Josh Mayfield

Josh Mayfield is Director of Security Strategy at Absolute. Josh works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with a special focus on network security, threat hunting, identity management, and endpoint security. His research has been featured in leading security publications, and he is often cited by business and tech journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

Tagged , , , , , , , , , , , ,

Podcast: Marcus Carey

 

Marcus-J-Carey_400x400

Marcus J. Carey

Marcus J. Carey is a cybersecurity researcher, hacker, and the founder and CEO of Threatcare. He describes himself as a hacker who helps people not suck at cybersecurity. He started his technology voyage in U.S. Navy Cryptology and later went on to refine his knowledge while working at the National Security Agency (NSA).

Tribe of Hackers

Marcus is also the author of a new book with Jennifer Jin entitled Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World. The book is a collection of interviews with 70 top hackers and is available now on Amazon. A free pdf of the book is available here.

Marcus sat down with me at the RSA Security Conference in San Francisco in March to discuss his path to a career in cybersecurity, the NSA, Edward Snowden, his book Tribe of Hackers, the future of the cybersecurity industry and much more.

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

 

Tagged , , , , , , , , , , , , , , , , , ,

PODCAST: Dataminr and The FIREHOSE

dataminr_logo-01

This episode is on Dataminr, a New York-based startup, which is authorized to analyze the entire Twitter “Firehose” of all live tweets and offer clients advanced social media analytics as a service in the form of digests and news updates.

Kerry Flynn (Mashable) and Russell Brandom (The Verge) have both been reporting on Dataminr and join the podcast to discuss its place in the social media landscape.

DarkExclusive access to information and data feeds, which include Twitter’s raw live tweets, allows Dataminr to filter the data to identify important events and business trends as they unfold and also act as an early warning system for major events like terrorist attacks, natural disasters and other public emergencies.

dataminr-product_map
Dataminr is Twitter’s only data partner that is also allowed to resell the complete stream of tweets and their clients include large hedge funds, mainstream news outlets, public relations firms, publicly traded corporations and major government entities including, law enforcement and intelligence agencies.

dataminr_isisThe DHS, FBI, and CIA have used the service to help with tracking  criminals and terrorists, but have also drawn the ire of the ACLU, who have challenged the use of Dataminr’s services by government agencies to monitor domestic protests.

SUBSCRIBE TO VITB PODCAST:

1-logo-itunesstitcher-logogoogleplay-logo

DIRECT DOWNLOAD OF MP3

Follow me on Twitter!

Tagged , , , , , , , , , , , , ,
%d bloggers like this: