DirtySecurity artwork

DirtySecurity

21 episodes - English - Latest episode: about 5 years ago - ★★★★★ - 2 ratings

Every week on the DirtySecurity Podcast, we chat with Cylance’s best and brightest about what is happening in the world of cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center.

Technology Business ransomware artificialintelligence cybersecurity cylance machinelearning malware privacy
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Dave Cundiff: CylanceGUARDian of the Galaxy

June 20, 2019 18:49 - 24 minutes - 37.6 MB

Dave Cundiff: CylanceGUARDian of the Galaxy If you are responsible for preventing a cyber attack on your organization… What is the ultimate dilemma for this person that is trying to combat threats 24/7?  This week on DirtySecurity, Edward Preston has a chat with Dave Cundiff on BlackBerrey Cylance’s newest addition to the security family: CylanceGUARD. Take a walk with Edward and Dave to learn more about what BlackBerry Cylance is doing to combine our solutions and services to continue t...

Sherri Davidoff: Data is Hazardous Material… Act Accordingly

June 05, 2019 19:00 - 24 minutes - 39 MB

Sherri Davidoff: Data is Hazardous Material… Act Accordingly If you want to make sure that all the data in your bank is safely secured… who better to talk to than someone who used to break into banks? Sherri Davidoff was a hacker who then turned those skills she learned as a student into a career helping others protect their data and their clients’ data. Over the years, organizations ranging from the Department of Defense to the FDIC have come to her in order to learn from her expertise....

Garret Grajek: Who Does Your Computer Think You Are?

April 17, 2019 19:00 - 29 minutes - 46.1 MB

DirtySecurity: Garret Grajek: Who Does Your Computer Think You Are? Let’s ask our hacker friends… the white hats and the grey and black hats… Do identity validation tools keeping them from achieving their results?  Hardly. Where to Authentication Processes come up short? Why not get the lowdown from a man who has made a career creating and improving access and authentication… On this week’s episode of Dirty Security, Edward Preston gets the skinny on BlackBerry|Cylance VP of Identi...

Kip Boyle: Beware the Cyber-Cooties… Risk Travels

April 03, 2019 19:00 - 31 minutes - 49.6 MB

DirtySecurity: Kip Boyle: Beware the Cyber-Cooties… Risk Travels We all think we are working hard to protect our data inside our corporate networks. But are we putting the same time and effort into protecting ourselves outside those walls? Risk doesn’t stop at the exit. Once those cyber-cooties get on you, they will travel with you everywhere you go. In this week’s episode of DirtySecurity, Edward Preston sits down with Kip Boyle, Founder and CEO at Cyber Risk Opportunities and author of...

Malcolm Harkins: A New Age of BYOD

March 27, 2019 23:59 - 20 minutes - 29.2 MB

DirtySecurity Podcast: Malcolm Harkins: A New Age of BYOD If we delivered a birthday cake to BYOD, how many candles would be on the cake? On this episode of DirtySecurity, we want to talk about personal devices... They are like opinions and…. Something else… everyone has one.  Phones, tablets, fitbits and you could say even say Airpods?   The challenges of BYOD historically, from a risk perspective, include security & privacy… On the flip side has BYOD provided any benefits to an Ent...

Dave Castignola: The Next Chapter in A.I. Cybersecurity

March 06, 2019 15:00 - 25 minutes - 40.7 MB

Dave Castignola: The Next Chapter in A.I. Cybersecurity There’s not a whole lot in the Cybersecurity sales world that David Castignola hasn’t seen. So when BlackBerry came along and purchased Cylance, who better to help guide us through the process than the Chief Revenue Officer at BlackBerry Cylance. Edward Preston finds out how are legendary coach Bo Schembechler, a very active selfie-stick and strong adherence to successful process helping Dave guide the way through this acquisition a...

Chuck Lerch: In Hawaii, Hi Tech Hui’s Customers Are Ohana

February 20, 2019 18:39 - 17 minutes - 28.5 MB

Chuck Lerch: In Hawaii, Hi Tech Hui’s Customers Are Ohana When you think of Hawaii… what do you think of? Do you automatically go to white sands, volcanoes and surfing? Or do you think of a $3,000,000,000 IT industry that includes over 2100 related businesses? Do you think of the 31,000 people employed in the tech industry with an average industry wage that is 71% higher than the state’s annual private sector wage? Maybe it is time to reconsider your view of Hawaii…  On this week...

Gabe Deale: Building a Sales Engineering Team to Save the World

February 13, 2019 18:00 - 25 minutes - 38.3 MB

Gabe Deale: Building a Sales Engineering Team to Save the World On this week’s episode of DirtySecurity, Edward Preston chats with Cylance Worldwide VP of Sales Engineering Gabe Deale. Edward and Gabe talk about a wide variety of subjects, ranging from the SE role in securing healthcare data to building an engineering team to phlebotomy… seriously… phlebotomy. What does that have to do with cybersecurity? Tune in and find out! About Gabe Deal Gabe Deal(@Gdealio) has spent over 18 years ...

Rob Bathurst: Is It Even Possible to Secure Connected Medical Devices?

February 06, 2019 18:00 - 17 minutes - 29.6 MB

Rob Bathurst: Is It Even Possible to Secure Connected Medical Devices? Global spending on Medical IoT has exploded. In 2015, research showed it at $5 Billion. Current projections for 2020 state that Medical IT spending will top $20 Billion. McKinsey predicts the IoT market will be worth $581 Billion for Industrial Control Technology by 2020 Connected medical devices and other IoT embedded systems are big targets for criminal organizations looking to capitalize on any weakness in their ...

Steve Mancini: Tip Toe through a Corporate Security Minefield with a CISO

January 30, 2019 14:48 - 27 minutes - 42.5 MB

Steve Mancini: Tip Toe through a Corporate Security Minefield with a CISO When was the last time you changed any of your passwords? Have you ever accidentally sent or received sensitive corporate information? Ever walk away from your computer without locking the screen? Seems like simple stuff… However, if you are the Deputy CISO of a cybersecurity company, it is your job to make sure that your co-workers are all maintaining the highest levels of operational security. On this week’...

Bill Strub: Durability among MSPs in Cybersecurity

January 24, 2019 19:24 - 19 minutes - 29.8 MB

Bill Strub: Durability among MSPs in Cybersecurity Your Inbox, voice-mailbox and social media feeds (aka unfiltered research pages) …  are filling up everyday with spam and junk from companies trying to tell you that the aliens from Saturn’s 3rd moon are about to attack and your organization clearly do not have the best security posture. To compound the problem… many of the claims in the junk are true… or at least contain a nugget of truth  3rd party Consultants, Resellers, Managed Secu...

Ramita Sawhney: You Build the Things; MSSPs Will Secure Your Data

January 16, 2019 18:00 - 18 minutes - 30.2 MB

Ramita Sawhney: You Build the Things; MSSPs Will Secure Your Data According to SecurityBoulevard.com, more Managed Service Providers will partner up with Managed SecurityService Providers in 2019 than ever before. This can be great news for the enduser. A good MSSP will handle their data security allowing the enduser to focus on their business. But what about the companies who make the security solutions? This can be a tricky situation, as they need to develop their solutions to fit th...

Doris Yang: It Takes a Village to Raise a Security Solution

January 09, 2019 20:00 - 30 minutes - 49.1 MB

Doris Yang: It Takes a Village to Raise a Security Solution “Trust the process”  -- Several people associated with the Philadelphia 76ers Most of you are probably aware that developing, testing and releasing a successful and useful software is not a one person job. There may be a visionary who sparks the initial idea, but there is an, at times, arduous process to develop the idea, write the code, test the solution and get it to market in a timeframe that makes it useful to its target ...

Matt Morin: If you Prevent… why the need to Detect and Respond?

December 22, 2018 00:08 - 21 minutes - 36.2 MB

Matt Morin: If you Prevent… why the need to Detect and Respond? Traditional Endpoint Protection solutions are focused on preventing the initial infection, but miss the rest of the Adaptive Security Architecture tasks. Adaptive Security Architecture is a term coined by Gartner  to describe a security posture that includes Prediction, Prevention, Detection and Responsiveness. Cylance has been in the prediction and prevention business since the beginning. However, some may not be aware that...

Anton Grashion: The Private Parts of Security

December 19, 2018 20:00 - 22 minutes - 36.7 MB

DirtySecurity Podcast: Anton Grashion: The Private Parts of Security Does privacy even exist any more? Who has access to you and your data? The launch of GDPR in Europe, the signing of the Japanese Act on the Protection of Personal Information (APPI), and the Brazilian Lei Geral de Proteção de Dados (LGPD) started a global shift toward comprehensive data privacy regulations. Gartner predicts that by the end of 2018, more than 50 percentof companies affected by GDPR will not be in full...

Rich Thompson: How Do You Stay Ahead of the Unknown?

December 12, 2018 23:00 - 23 minutes - 36 MB

DirtySecurity Podcast: Rich Thompson: How Do You Stay Ahead of the Unknown?  “We don’t know what we don’t know”  -- Donald Rumsfeld What is the cybersecurity industry doing to protect our users from the unknown? How can we keep our networks clean when the bad actors are continuously evolving in order to avoid detection? In this week’s episode of DirtySecurity, Edward Preston talks with Cylance Vice President of Sales Engineering Rich Thompson about how Cylance exceeds the standards s...

Scott Scheferman on SamSam, hotel data breaches and where they interect

December 05, 2018 20:00 - 25 minutes - 41.2 MB

DirtySecurity Podcast: Scott Scheferman on SamSam, hotel data breaches and where they interect Last week was a big week in the world of Cybersecurity. The US Government capped off a nearly 3 year investigation into the SamSam ransomware campaign when it issued indictments for 2 Iranian hackers. Also… global hotel chain Marriott announced a data breach that could affect over 500,000,000 accounts for its worldwide membership. What do these events have in common? Edward Preston talked to ...

Cylance's Israel Perez and Wajih Yassine are The Real CSI Cyber Guys

November 21, 2018 20:00 - 23 minutes - 34.2 MB

DirtySecurity Podcast: Israel Perez & Wajnih Yassine are The Real CSI Cyber Guys It’s Sunday afternoon, about a quarter past 3.  You are in your backyard with friends and family members… Everyone is relaxed with a refreshing beverage… sharing stories… laughing at jokes… life is good. Then it happens…. You get that call from one of your C-Level Execs That buzz kill moment when you realize extremely sensitive corporate data is now in the hands of a stranger capable of causing significa...

Chris Stephen on What Separates Cylance from the Herd

November 14, 2018 20:00 - 32 minutes - 49.1 MB

Chris Stephen on What Separates Cylance from the Herd For over a century, IBM has urged the world to “Think.” In 1997, Apple challenged the world to “Think Different.” In 2012, Cylance picked up that mantle and charged at the Cybersecurity world with a different approach to protecting endpoints. Was this legit? Is Cylance actually doing things differently in a way that is improving cybersecurity and not just renaming existing approaches? Chris Stephen is on the front lines of the ongoing...

Tales from Cylance’s Ultimate Road Warrior, Richard Melick

November 07, 2018 20:00 - 27 minutes - 40.4 MB

Tales from Cylance’s Ultimate Road Warrior Road Shows and Lunch & Learns and Meet & Greets OH MY! For the past 3 years, Richard Melick has traveled all over the world bringing Cylance’s prevention-based endpoint protection to the masses. From the Unbelievable Tour to the UNDRWRLD Tour and beyond, Richard has created 0-Day malware and ransomware in front of thousands of people, then challenged CylancePROTECT to prevent those 0-Days from executing… all live in front of a an audience. The...

Memory-Based Attacks are on the Rise

October 31, 2018 19:00 - 20 minutes - 30.2 MB

Memory-Based Attacks Are on the Rise: Josh Fu Tells Us How to Stop Them You may have heard a lot lately about memory-based attacks, fileless attacks, and living-off-the-land attacks. Attackers are increasingly using this type of attack because it works. It is less detectable by antivirus engines and even by some next-gen AV solutions. Because of this, the bad guys using this technique are more likely to succeed in their mission, which is to steal your stuff. The pressing question is… w...

Twitter Mentions

@eptrader 20 Episodes
@packmatt73 2 Episodes
@jfusecurity 1 Episode
@hitechhui 1 Episode
@gdealio 1 Episode
@doctor_know 1 Episode
@navilogic 1 Episode
@rcmelick 1 Episode
@therichthompson 1 Episode
@sherridavidoff 1 Episode