300 episodes

Got a startup? Learn how to secure it. Who are the hot security startups? We got that covered too! This show is for security startups, by security startups! Paul Asadoorian and Michael Santarcangelo will walk you through not only the hot security startups, but how security plays into all startups!

Business Security Weekly (Video) paul@securityweekly.com

    • Tech News
    • 3.5, 2 Ratings

Got a startup? Learn how to secure it. Who are the hot security startups? We got that covered too! This show is for security startups, by security startups! Paul Asadoorian and Michael Santarcangelo will walk you through not only the hot security startups, but how security plays into all startups!

    • video
    SWVHSC: How Security Spending Overlooks the Biggest Risk of All - Matt Ashburn - BSW #183

    SWVHSC: How Security Spending Overlooks the Biggest Risk of All - Matt Ashburn - BSW #183

    Global spending on cyber security totals over $100 billion per year, with no upper limit in sight as adversaries remain successful at compromising even well-resourced organizations. Why do adversaries remain successful despite advances in security technologies and risk frameworks? As it turns out, an often-overlooked architecture from 30 years ago is a common thread among many successful attacks. By re-thinking the ubiquitous web browser and its connection to the internet, CIOs and CISOs can nearly eliminate their internet risk surface, provide users the tools and access they need, and free up incident responders to focus on more advanced threats.
     
    This segment is sponsored by Authentic8. Visit https://www.authentic8.com/bsw to learn more about them!
    To download your copy of "The Billion Dollar Security Blanket" by Matt Ashburn, visit: https://www.authentic8.com/bsw
    Visit https://www.securityweekly.com/bsw for all the latest episodes!
    Show Notes: https://wiki.securityweekly.com/bsw183

    • 28 min
    • video
    Marketing & Selling to the CISO - BSW #182

    Marketing & Selling to the CISO - BSW #182

    Marketing to today’s CISO is no easy task. CISOs have an unprecedented amount of work on their plates with constantly shifting technology, vast amounts of data in motion, regulatory requirements and new threats arising daily. We'll discuss the results of a Merritt Group Survey on Marketing and Selling to the CISO, 2020 Edition.
     
    Visit https://www.securityweekly.com/bsw for all the latest episodes!
    Show Notes: https://wiki.securityweekly.com/bsw182

    • 23 min
    • video
    Cybersecurity Challenges in a Teleworking World - Drew Cohen - BSW #182

    Cybersecurity Challenges in a Teleworking World - Drew Cohen - BSW #182

    Drew Cohen discusses the cybersecurity challenges that have risen with many businesses shifting to WFH environments during the pandemic. We'll review some of the top cybersecurity issues/threats, including home network security, document signing, industrial IoT, and 5G, that businesses should be aware for the second half of 2020.
     
    Visit https://www.securityweekly.com/bsw for all the latest episodes!
    Show Notes: https://wiki.securityweekly.com/bsw182

    • 33 min
    • video
    New CISOs, Overworked CISOs, and 10 Worst Cybersecurity Strategies - BSW #181

    New CISOs, Overworked CISOs, and 10 Worst Cybersecurity Strategies - BSW #181

    In the Leadership and Communications section, CISOs undervalued, overworked, burning out, warns CIISec, The 10 Worst Cybersecurity Strategies, AppSec Becomes A Priority For New CISOs/CSOs, and more! 
     
    Show Notes: https://wiki.securityweekly.com/bsw181
    Visit https://www.securityweekly.com/bsw for all the latest episodes!

    • 25 min
    • video
    Zero Trust Execution as Part of Your Cloud Workload Protection Strategy - Justin Bradley - BSW #181

    Zero Trust Execution as Part of Your Cloud Workload Protection Strategy - Justin Bradley - BSW #181

    The use of Application Control - commonly referred to as whitelisting or Zero Trust Execution - is considered to be a robust and essential Cloud Workload Protection strategy, largely due to the high predictability of cloud environments. But it does not prevent all cyber attacks. Attackers can exploit vulnerabilities in trusted applications or utilize whitelisted apps for malicious intent - referred to as Living off the Land (LotL). App Control also presents some operational headaches for cloud security teams, requiring strict and often unrealistic policies. We will discuss how to build a robust Application Control strategy for your workloads that is informed by these challenges. This segment is sponsored by Intezer.
     
    Show Notes: https://wiki.securityweekly.com/bsw181
    Visit https://securityweekly.com/intezer to learn more about them!
    Visit https://www.securityweekly.com/bsw for all the latest episodes! 

    • 33 min
    • video
    What's Next, Board Discussions, and New Cybersecurity Priorities for 2020 - BSW #180

    What's Next, Board Discussions, and New Cybersecurity Priorities for 2020 - BSW #180

    In the Leadership and Communications section, I'm a CISO, what's next?, The Upside of Virtual Board Meetings, The new cybersecurity priorities of 2020, and more!
     
    Visit https://www.securityweekly.com/bsw for all the latest episodes!
    Show Notes: https://wiki.securityweekly.com/BSWEpisode180

    • 22 min

Customer Reviews

3.5 out of 5
2 Ratings

2 Ratings

8Mc18 ,

Security matters

Keep it up, looking forward to watch new episodes :)

Top Podcasts In Tech News

Listeners Also Subscribed To