Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
…
continue reading
Netenrich invites security professionals to learn how they can optimize their security operations, remove silos, and gain increased efficiencies with the tools and systems they have. This podcast series is focused on effective detection, investigation, and response techniques where data and analytics is at the foundation. Hear from leading cybersecurity experts on how they’re transforming security ops. Netenrich boosts security and digital operations effectiveness so that organizations can a ...
…
continue reading
1
Cybriant Delivers High Value Security Operations
34:18
34:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:18
Join Netenrich and Cybriant for an engaging conversation on how Cybriant is raising the bar in optimizing threat management and response for their customers. With Resolution Intelligence Cloud, the platform brings real-time data analytics, automation, and multi-tenancy capabilities to streamline processes at speed. For Cybriant, realizing time to v…
…
continue reading
1
Fear, Loathing, and Responsible Disclosure
40:57
40:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
40:57
Vulnerability research and inevitable conflicts with software companies has been a part of hacker culture for at least three decades. In this podcast, we’re joined by Casey John Ellis, co-founder of Bugcrowd and of Disclose.io where we discuss the evolution towards bug bounty programs, what this all means for the world of AI vulnerabilities, and ho…
…
continue reading
1
Script Kiddies or APT: Inside the World of DDoS
32:50
32:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:50
We often think of DDoS as something that is only affecting gamers and is launched by misbehaving youth, but the landscape of people who leverage DDoS runs the gamut all the way up to nation-state actors. Join us as we talk with Richard Hummel of NETSCOUT as we discuss the evolving landscape of DDoS attacks and what's coming next over the horizon.…
…
continue reading
One of the great things about cybersecurity is that there are always new problems to research and try to solve. Join us as we talk with Jaime Blasco on his journey towards trying to solve security challenges in software as a service application.بقلم Netenrich
…
continue reading
1
Cyber Security and Meat Space: Insights From Malware Targeting the Power Grid
1:00:04
1:00:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:00:04
Often when we think of cyber security, we think of financial fraud, ransomware, or data theft. In recent years we've seen an increase in malware targeting industrial control systems such as sewage treatment plants, the power grid, and utilities necessary for basic human life. We are joined by Jimmy Wylie of Dragos to discuss the trends and what he …
…
continue reading
1
Threat Actors and Making DNS Fail Harder and at Greater Scale than Ever Before
38:26
38:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:26
Everything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCart…
…
continue reading
1
25 years of SIEM: The Rocky Journey to Autonomic Security Operations
52:06
52:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
52:06
In this episode, we are joined by Dr. Anton Chuvakin, Office of the CISO, at Google Cloud Security, where we discuss the evolution of SIEM from on-premise to the Cloud, and to autonomic security operations. Can our industry innovate to move beyond current SIEM limitations to reach “ops nirvana” to a data analytics-fueled security operations?…
…
continue reading
1
Toil Reduction as a Service - Improving Automation in Threat Detection and Analytics
53:35
53:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
53:35
We are joined this week by John Giglio, director of cloud security for SADA, with tales from the trenches on how automation has helped threat hunting and threat analytics to improve the lives of security organizations.بقلم Netenrich
…
continue reading
1
Data Dumpster Fires, How to Make Your SIEM Not Suck
49:46
49:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
49:46
For this week’s interview, Netenrich’s John Bambenek chats with Merys Raymer, Partner Engineering at Google Cloud Security. Merys shares her personal journey as a former threat and security analyst, fighting fires in the SOC trenches. She provides real world insights on the need for advanced SIEMs, data analytics, and automation to optimize securit…
…
continue reading
Muddy Waters is an active and prolific APT threat using some unique tactics and malware to actual exfiltrate data. We are joined by Allison Wikoff, who is an expert in this threat actor to discuss what techniques they are using and what it means for enterprise defenses.بقلم Netenrich
…
continue reading
In this episode, we’re joined by Juan Andres Guerrero-Saade discussing how language learning models can be used by security analysts, and those teaching, the next generation of cyber security professionals to aid them, and their work.بقلم Netenrich
…
continue reading
1
Increase Your Threat Research and Analytics Scope with Netenrich
1:52
1:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:52
Host John Pirc discusses how you can increase your threat research and analytics scope with Netenrich.بقلم netenrichresolutionintelligencecloud
…
continue reading
1
Advance Your Security Maturity By Applying Data Analytics and Resolution Intelligence with Google Chronicle
3:34
3:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:34
Host John Pirc discusses how you can advance your security maturity with Google Chronicle.بقلم netenrichresolutionintelligencecloud
…
continue reading
1
How does Resolution Intelligence Cloud work in a cybersecurity mesh architecture?
1:56
1:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:56
Host John Pirc discusses how the Resolution Intelligence Cloud works in cybersecurity mesh architecture.بقلم netenrichresolutionintelligencecloud
…
continue reading
1
What are the key business and operations outcomes gained in using Resolution Intelligence Cloud? Part III
3:36
3:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:36
Host John Pirc discusses the key business and operations outcomes gained when you use the Resolution Intelligence Cloud.بقلم netenrichresolutionintelligencecloud
…
continue reading
1
How does Resolution Intelligence Cloud work? Part II
9:25
9:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:25
Host John Pirc discusses how the Resolution Intelligence Cloud works.بقلم netenrichresolutionintelligencecloud
…
continue reading
1
What key security problems does Resolution Intelligence Cloud help solve? Part I
4:53
4:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:53
Host John Pirc on the security problems that the Netenrich Resolution Intelligence Cloud helps solve.بقلم netenrichresolutionintelligencecloud
…
continue reading
1
Threat Hunting: Finding Malicious Phishing Domains
37:20
37:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:20
John Bambenek covers the rise of domain clustering of malicious phishing domains that security analysts need to care about. He is joined by cybersecurity expert Ed Gibbs, Field CTO at Whois API, who shares enlightening techniques on how to find, investigate and resolve these types of daily attacks.بقلم Netenrich
…
continue reading
1
How business email compromises attack our emotions and bottom line
33:35
33:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:35
John Bambenek talks with security expert Ronnie Tokazowski, Principal Threat Advisor at Cofense, on the rise of behavioral-led attacks impacting organizations. Recent exposures involving romance scams and pig butchering techniques target people and their emotions involving business email compromises. Ronnie delves into the methods organizations can…
…
continue reading
1
Introducing DEATH Labs podcast by Netenrich
0:38
0:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
0:38
Host John Bambenek, threat researcher at Netenrich, interviews leading security experts and threat researchers on the latest cyberattacks and compromises impacting businesses today. Listeners will gain insights on proven techniques and approaches to advanced threat hunting, detection, and response. Listen in to the witty and humorous conversations …
…
continue reading