Episode 5 of 5: Behavior-based detection and dynamic threat intelligence are essential to enhancing security operations and reducing cyber threat response times, says ThreatLocker CEO Danny Jenkins. This episode is part of a 5-episode series pr
ThreatLocker CEO Danny Jenkins emphasizes the importance of limiting local administrator privileges. He also advocates for Enterprise Privilege Management (EPM) solutions and effective user communication to balance security with productivity.
In this episode, Greg Otto talks with Adam Darrah, director of intelligence at Vigilante, about hacker gangs on the dark web, how they run their ransomware operations, and if the cybersecurity community get ever get past the mindset of shaming
Right before the world drastically changed due to the COVID-19 pandemic, the craziest story in cybersecurity was the Vault 7 trial. With that ending in a mistrial, Greg Otto and Jeff Stone look at how the government failed to get a conviction,
The creator behind the zero-trust network model, John Kindervag, talks about why “trust” has become a vulnerability that needs to be mitigated like other vulnerabilities and where to start. Sponsored by Palo Alto Networks.Guest: John Kinderva
One of the bigger stipulations in GDPR is that third-party service providers, including companies who run the ever-ubiquitous cloud, will also be responsible for following the correct protocols when it comes to protecting EU citizen data.Yet
In the latest CyberScoop Radio podcast, Chris Niggel, Okta's director of security and compliance talks about how identity management can be the catalyst to turn shadow IT into distributed IT. By implementing a strong tool, users can get their w
Global Security Advocate Thomas Fischer talks with CyberScoop's Greg Otto about the mind shift companies are going to have to embrace if they want to be in tune with GDPR once it goes into effect in May.
Henry Sowell, Technical Director for Hortonworks spoke with CyberScoop on how open source systems allow for that flexibility and scalability, especially at a time where the onslaught of threats has never been greater. Sponsored by Hortonworks.
With millions of indicators contained in threat intelligence data, it's important for analysts to stay focused on worthwhile information that could indicate a data breach for their particular organizations, says Jessica Ferguson, director of se
With massive networks at federal government agencies, a workforce clamoring for the ability to work collaboratively and pushes from Congress to move away from legacy systems, cybersecurity is monumental concern.Nearly every federal organizati
Travis Farral, director of security strategy for Anomali, talks about the many benefits of threat intelligence and what is being done to disrupt adversaries through counterintelligence initiatives. Sponsored by Anomali.
Larry Ponemon, chairman and founder of the Ponemon Institute, talks with Wyatt Kash about the growing need for enterprises to leverage the right kind of threat intelligence.