Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

Cyber Security News

Security News & Information


Follow This Show

Stay in the know about new episodes and updates.
This show discusses the social implications of various security technologies.

Upcoming Broadcasts

Today's security teams and professionals deal with threats and cyber attackers on a constant basis. There are daily fires to put out, as well as necessary forensics investigations to conduct to see what happened and how to mitigate future attacks. While advice for staying ahead of cyber threats abounds, most organizations struggle to keep pace in a consistently evolving threat landscape. This is where Security Orchestration, Automation and Response (SOAR) solutions come into play as they go beyond simple automation, letting security operations teams rise above the daily firefighting. SOAR is an ideal counterpart to the burgeoning problem of having too many security tools, but not enough in-house talent to use them effectively. With SOAR, security operations teams can easily integrate disparate cybersecurity technologies and processes into a more consolidated and cohesive security ecosystem. As all analyst activity (automated and manual) is captured on a single platform, it lets them investigate, analyze and remediate alerts via a single interface. Managers have access to metrics and analytics that can drive continuous improvement across people, process and technology, allowing security teams to work more efficiently against the growing onslaught of cyber threats. Cybersecurity company Siemplify, based in New York City, offers a sophisticated, cutting edge SOAR technology for businesses and corporations alike. During this podcast, we have the honor and privilege of interviewing Nimmy Reichenberg, chief marketing officer of Siemplify. Dial in today to see how you can make the most use of their SOAR offering and stay well ahead of cyber attackers!
  • by Cyber Security News
  • in Technology
  • 01:30
Reminder Edit Reminder

On-Demand Episodes

In the world of Cyber security today, it is literally a cat and mouse game. The hacker is the cat, and the victim is the mouse. It seems like that hardly one Cyber-attack is launched, a new one comes out literally minutes later, which is... more

As we know today, the Cyber Security threat landscape is changing on a daily basis. Hardly one threat comes out, a new one then emerges which is even deadlier, more sophisticated, and worst yet, even more covert. No business is... more

Hello, and welcome to our podcast. As we know, the Cyber Security threat landscape is an ever changing one, and constantly grows deadlier on a daily basis. The Cyber attacker has many ways in order to penetrate the IT... more

To kick things off for this podcast, we are interviewing Mark Godard, Manager of Channel & Customer Success for a Cyber Security company known as Spark Cognition, based out of Austin, TX. In the world of business today, we all know... more

Hello, and welcome to our second podcast in over two years! To kick things off, we are interviewing Dvir Reznik, the Senior Marketing Manager of TowerSec. Do you remember that old song by Gary Numan called ?Cars?? Part of his... more

In the world of IT, security can often be a nebulous topic to be discussed about. For example, where does security start and where does it end? Does it even have an endpoint at all? Many professionals would argue the point that you can... more

Just in the last year alone, the world witnessed many unprecented, security breaches. Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot. Then of course, was the drama brought by... more

Up to this point, most of our podcasts on network security have been about learning how to protect the actual infrastructure of your business - both from the inside and the outside. But, there is also another critical asset which is just as... more

Do the recent events at Sony Corporation have you startled and scared for your own business? You are right in thinking that way. Cyber threats and risks are very real these days, and they can happen at any time, without any notice. No... more

More so than just absolute threats to workstations or servers, security threats and risks posed to a network can have even graver consequences. For example, if your network perimeter goes unprotected, malformed data packets can enter in,... more