Powered by RND
PodcastsTechnologyThe Security Strategist

The Security Strategist

EM360Tech
The Security Strategist
Latest episode

Available Episodes

5 of 151
  • Can You Afford to Ignore Exploitability?
    Takeaways#ExposureManagement involves assessing multiple factors, not just single scans.Organisations must optimise their remediation capacity due to limited resources.Visibility is crucial, but finding the most important exposure is essential.#TraditionalVulnerability management programs are becoming ineffective.Exploitability is the key criterion for prioritising remediation efforts.Automated scanning can provide rapid insights into vulnerabilities.Time taken to remediate is critical for effective security management. SummaryIn this episode of the Security Strategist, Richard Stiennon, Chief Research Analyst at IT Harvest and industry leader, speaks with Marc Gaffan, the CEO of IONIX. They explore the core challenges facing #cybersecurity professionals — particularly in a rapidly evolving digital landscape — and discuss innovative approaches to attack surface management.Gaffan explains exposure management isn't just about looking at one scan, vulnerability, or way an organisation could be exploited. Instead, it takes a holistic approach to understand what "exposure" means for organisations.Listen to the full conversation on how to adapt your security strategy to today's potential threats. Gaffan's expertise provides valuable guidance for any security professional looking to stay ahead of the curve.For more tech insights visit EM360Tech.com
    --------  
    19:21
  • From Peacetime to Wartime: Is Your Cloud Secure?
    Takeaways#Peacetimesecurity is no longer sufficient in modern cloud environments.AI and automation are essential for effective security management.Real-time security platforms can prevent breaches before they occur.Integrating security into the development process is crucial for success.Key metrics include mean time to detect and remediate vulnerabilities.A unified #dataarchitecture is vital for effective security operations.Automation can significantly reduce analyst workload and alert fatigue.Organisations should evaluate vendors based on their ability to adapt to evolving threats.SummaryIs your organisation still relying on outdated “peacetime” security solution strategies in the face of rapidly evolving #cloudthreats? Host Brad LaPorte explores answering this question with guest Ory Segal, Technical Evangelist of Cortex Cloud, Palo Alto Networks. They discuss how the dynamic nature of modern cloud environments and increasing adoption of AI are compelling organisations to move beyond traditional "peacetime" network security measures.In this episode of the Security Strategist, Segal explains the difference between securing traditional monolithic applications and modern cloud-native applications. “Modern cloud native applications, beyond the fact that it's deployed to the cloud, entails something completely different,” Segal states, stressing the complexity of various technological layers in cloud services.Join the conversation as we discuss the shift from static security models to dynamic, real-time protection, and leveraging #AI to mitigate cloud security threats and strengthen network protection. Learn what this means for your organisation and how to adapt your cloud security solutions.For the latest tech insights visit: EM360Tech.com
    --------  
    32:52
  • How to Streamline IT Operations and Enhance Security with RMM and Automation
    Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated Elias Moura, the Head of Product Marketing at Pulseway. “You have automation to enable auto-remediation, built-in remote control, automated patching, mobile device management, and other features that make RMM an effective tool,” he added. “The RMM is usually the central piece to make sure that IT management is consistent and tackling different issues that your end user could face.” In this episode of the Security Strategist podcast, host Shubhangi Dua, B2B Tech Journalist and Podcast Producer from EM360Tech speaks to Moura and Edgar Zacharjev, SVP of Product and Strategy at Pulseway. They discuss contemporary cybersecurity threats, the importance of compliance and protocols, and the role RMM, automation, and AI in IT management. The conversation spotlights the significance of patch management, automation, and the integration of AI in cybersecurity strategies. Real-life examples illustrate how organisations can effectively tackle security challenges, emphasising the need for a proactive approach and continuous awareness training.Watch the podcast to learn why diligent patch management forms your initial and crucial line of defense against exploitation. Explore the power of automation in streamlining security operations, improving response times, and enhancing overall efficiency. TakeawaysThe cybersecurity landscape is constantly evolving, requiring adaptive strategies.Compliance and protocols, while sometimes seen as hindrances, are essential for security.Remote Monitoring and Management (RMM) is crucial for effective IT management.Patching systems regularly is vital to prevent vulnerabilities.Automation can significantly enhance IT efficiency and reduce manual workload.AI is becoming integral in IT and business management, cybersecurity, but organizations must use it wisely.Anomaly detection and user awareness training are critical components of a security strategy.Building a unified IT stack simplifies management and enhances security.Real-life examples demonstrate the effectiveness of proactive cybersecurity measures.CISOs must advocate for cybersecurity investment within their organisations.Chapters00:00 Introduction to Cybersecurity Challenges03:10 Evolving Cybersecurity Strategies05:58 The Importance of Compliance and Protocols08:53 Understanding Remote Monitoring and Management (RMM)11:50 The Role of Patching in Cybersecurity14:58 Advancements in Automation and IT Management17:59 AI in Cybersecurity: Opportunities and Risks20:59 Anomaly Detection and IT Awareness Training24:02 Real-Life Examples of Cybersecurity Solutions27:00 Benefits of RMM for Proactive IT Management29:51 Building a Unified IT Stack32:51 Internal Security Practices and Protocols36:10 Key Takeaways for CISOs
    --------  
    37:26
  • Can You Stop an API Business Logic Attack?
    Application Programming Interface (API) is one of the most critical components of software applications which mediates communication between different applications and exchanges permissible data. APIs, as a fundamental integrant of software, are acutely important to secure, as vulnerabilities can be exploited by threat actors.“When it comes to API-based attacks or API attacks, just within 2024, if we compare the second half of the year to the first half, there was a 188 percent surge in those types of attacks,” articulated Uri Dorot, the Senior Product Marketing Manager at Radware. To ultimately enhance a business’s ability to detect and respond to cyber threats, securing APIs is key. These APIs are also essential in controlling access to sensitive business logic and data – acting as a key attack vector. In this episode of the Security Strategist podcast, Chris Steffen, VP of Research at EMA is joined by Dorot. They discuss the biggest challenges facing API security particularly pertaining to business logic attacks. The speakers address the question – Can organisations truly mitigate targeted attacks against their APIs and application business logic? Dorot breaks down the steps and provides practical security strategies to protect enterprises from not only falling into traps but also using business logic for effective protection against increasingly sophisticated threats.TakeawaysBusiness logic attacks exploit legitimate API calls in illegitimate ways.Visibility into API environments is crucial for effective security.Organizations often lack documentation for their APIs, increasing risk.AI tools can help discover and map API endpoints and business logic.Business logic is complex and constantly evolving, requiring ongoing attention.Attackers use AI to enhance their reconnaissance and exploit strategies.Contextual understanding is key to identifying unusual access patterns.Security solutions must adapt to the dynamic nature of applications.Real-time/runtime mitigation is necessary to respond to evolving threats.HTTP DDoS attacks on API-based applications require specialized behavioral-based protection.Chapters00:00 Introduction to API Security Challenges02:32 Understanding Business Logic Attacks06:11 The Importance of API Visibility12:26 AI's Role in API Security17:52 Trends in API Security with Generative AI21:43 Context and Granularity in Protection28:58 Key Takeaways for Security PractitionersAbout RadwareRadware is a leading cyber security solutions and application delivery solutions company globally. They provide award-winning security and availability for infrastructure, applications, and enterprise IT across physical, cloud, and software-defined data centers. Trusted by over 12,500 enterprises and carriers worldwide to enhance digital experience, ensure business continuity, and maximise productivity with cost-effective solutions.
    --------  
    28:08
  • The Critical Role of MDM in Safeguarding Dedicated Devices
    In this episode of the Security Strategist podcast, Chris Steffen speaks with Sudhir Reddy, the CTO of Esper, about the imperative balance between security and user experience in dedicated devices. They discuss the unique challenges of securing these devices, the role of Mobile Device Management (MDM), compliance issues, and practical steps enterprises can take to optimise their device fleets. The conversation not only spotlights the importance of proactive security measures but also the need for organisations to address vulnerabilities in their dedicated devices.From kiosks and point-of-sale machines to medical devices and airport check-in counters, these ubiquitous tools present idiosyncratic security vulnerabilities that demand proactive strategies. MDM is the first line of defense. Sudhir says, “This is your interface to secure everything that's happening on the device, whether it's bits and bytes that get on the device.” “Whether it's what peripherals are allowed on the device, what device serial numbers of peripherals are allowed to talk to the device,” he added. “All of these are things that managers of large fleets have to think about."Tune into the podcast to hear more about dedicated device security as a critical component of a detailed security strategy and adopting a proactive, data-driven approach to help organisations mitigate risks and ensure harmonious operation of their edge device fleets.TakeawaysDedicated devices present unique security challenges compared to traditional devices.The presence of humans is a key factor in security compliance issues.MDM can enhance both security and user experience.Compliance is crucial for devices handling sensitive data.Patching and updating devices can be challenging due to downtime.Proactive measures can minimise vulnerabilities before exploitation.Organisations should start with smaller, manageable security issues.Gradual rollout of updates can prevent widespread issues.Device management should not be an afterthought.There are tools available to help secure dedicated devices.Chapters00:00 Introduction to Dedicated Devices and Security Challenges03:01 The Unique Landscape of Dedicated Devices05:48 The Role of MDM in Security and User Experience08:57 Compliance and Data Security in Dedicated Devices12:05 Patching and Updating Challenges15:02 Proactive Security Measures for Device Management18:53 Practical Steps for Improving Security Posture25:06 Final Thoughts and Key Takeaways
    --------  
    28:16

More Technology podcasts

About The Security Strategist

Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
Podcast website

Listen to The Security Strategist, Acquired and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

The Security Strategist: Podcasts in Family

Social
v7.16.2 | © 2007-2025 radio.de GmbH
Generated: 4/30/2025 - 7:44:13 PM