News and Interviews from BlackHat 2023 - ESW #328

Published: Aug. 18, 2023, 9 p.m.

b'

In the Enterprise Security News, 1. Check Point buys Perimeter 81 to augment its cybersecurity 2. 2023 Layoff Tracker: SecureWorks Cuts 300 Jobs 3. Hackers Rig Casino Card-Shuffling Machines for \\u2018Full Control\\u2019 Cheating 4. \\u2018DoubleDrive\\u2019 attack turns Microsoft OneDrive into ransomware 5. NYC bans TikTok on city-owned devices

\\xa0

As more organizations explore edge computing, understanding the entire ecosystem is paramount for bolstering security and resiliency, especially within a critical industry like healthcare. In this segment, Theresa Lanowitz, Head of Cybersecurity Evangelism at AT&T Business, will provide a deep dive into the state of edge computing\\u2014specifically, how it is revolutionizing healthcare. She will discuss key findings from the \\u201c2023 AT&T Cybersecurity Insights\\u2122 Report: Focus on Healthcare\\u201d and provide insight into how to prepare for securing the healthcare edge ecosystem.

This segment is sponsored by AT&T Cybersecurity.

Visit https://securityweekly.com/attcybersecuritybh\\xa0to learn more about them!

\\xa0

\\xa0

With Active Directory (AD) exploited in 9 out of 10 cyberattacks, delaying AD modernization\\u2014especially after a merger or acquisition\\u2014can compound security risks. Security is the most compelling reason to migrate to a pristine AD forest or perform an AD forest or domain consolidation, but many organizations delay such projects due to the effort and planning they require. Security Weekly talks with Semperis CEO Mickey Bresman about the keys to a smooth and secure AD modernization strategy.

This segment is sponsored by Semperis.

Visit https://securityweekly.com/semperisbh\\xa0to learn more about them!

\\xa0

Security organizations are increasingly adopting data lakes and cloud services as additions or alternatives to traditional SIEMs, but face challenges like scarcity of data engineering expertise and high data ingestion and cloud compute costs. To overcome these, a new security data stack is emerging, guided by models like SecDataOps and supported by solutions like Tenzir, purpose-built for security data use cases. In this segment, we will be talking about what is driving the heavy use of data in security operations, why that is stressing traditional security operations tools and processes, and what some early-adopter organizations are doing to meet these challenges.\\xa0

This segment is sponsored by Tenzir.

Visit https://securityweekly.com/tenzirbh\\xa0to learn more about them!

\\xa0

The rapid growth of APIs used to build microservices in cloud-native architecture has left many enterprises in the dark when it comes to knowing where, how many, and what types of APIs they have. With multiple teams creating their own API endpoints without shared visibility or governance, exposed APIs can become a critical threat vector for hackers to exploit. Edgio\'s new advanced API security capabilities give customers integrated and unparalleled protection at the edge, protecting APIs that are critical to modern businesses. Edgio delivers these services as part of its fully integrated holistic Web Application and API protection solutions giving customers the ability to respond to threats quicker. An edge-enabled holistic security platform can effectively reduce the attack surface, and improve the effectiveness of the defense while reducing the latency of critical web applications via its multi-layered defense approach. Edgio\'s security platform \\u201cshrinks the haystacks\\u201d so that organizations can better focus on delivering key business outcomes.

This segment is sponsored by Edgio.

Visit https://securityweekly.com/edgiobh\\xa0to learn more about them!

\\xa0

Offensive security is a proactive approach that identifies weaknesses using the same exploitation techniques as threat actors. It combines vulnerability management with pen testing and red team operations to \\u201cexpose and close\\u201d vulnerabilities before they are exploited.

This segment is sponsored by Fortra.

Visit https://securityweekly.com/fortrabh\\xa0to learn more about them!

\\xa0

\\xa0

Join us at Black Hat as we delve into the world of Managed Detection and Response (MDR) providers. In this podcast, we\'ll explore the critical factors to consider when selecting an MDR provider, uncover the common shortcomings in their services, and discuss the necessary evolution required to ensure ongoing effectiveness and enhanced value for customers. Get ready to unravel the complexities of MDR and gain insights into the future of this vital cybersecurity solution.

\\xa0

\\xa0

This segment is sponsored by Critical Start.\\xa0

Visit https://securityweekly.com/criticalstartbh\\xa0to learn more about them!

\\xa0

\\xa0

Visit https://www.securityweekly.com/esw\\xa0for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly\\xa0

Like us on Facebook: https://www.facebook.com/secweekly

\\xa0

Visit https://www.securityweekly.com/esw for all the latest episodes!

\\xa0Show Notes: https://securityweekly.com/esw-328

'