Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
A war between cybercriminals and businesses is raging. The global pandemic only served to increase the volume of hacked and breached data. As everyone began working from home everyday resources like mobile phones and IoT devices became targets. In fact, data breaches exposed over 36 billion records in the first half of 2020 alone according to RiskBased.Additionally, recent security research suggests most companies have unprotected data and poor cybersecurity practices in place, making them v ...
…
continue reading
1
WatchGuard & The State of Cybersecurity Today
22:14
22:14
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
22:14
Mark Romano, Senior Director of Worldwide Channel Programs and Field Engagement at WatchGuard, joins "The Holtz Story" to discuss the state of cybersecurity today. The podcast opens with a discussion of WatchGuard’s Internet Security Report and some current trends, including increases in ransomware and malware. Tracy and Mark discuss the need for m…
…
continue reading
Victor Monga, a Senior Technical Architect for the Network & Advanced Security Business Group at VMware, joins The Holtz Story to discuss today's market and what is happening with VMware. Victor's experience in Healthcare, Aerospace and with the Department of Defense (DoD) has given him an in-depth understanding of specific industry needs. The podc…
…
continue reading
Bryan Keeper, Director of Channel Sales Americas at OpenGear, joins "The Holtz Story" to discuss Out-of-Band Management. Bryan helps partners become trusted advisors to their customers while driving channel programs and new business development. This podcast opens with Bryan describing Out-of-Band as an alternative access to devices. It allows IT m…
…
continue reading
Jonathan Nguyen-Duy, Vice President, Field CISO Strategic Services at Fortinet, joins The Holtz Story to discuss the latest solutions in cloud cybersecurity. Jonathan brings extensive experience working with global enterprises and nation-states and is responsible for developing innovative security solutions with partners at Fortinet. This podcast o…
…
continue reading
1
Current Channel Trends with Janet Schijns
40:14
40:14
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
40:14
Janet Schijns, CEO & Co-Founder of JS Group, joins The Holtz Story to discuss trends in the channel. Janet offers wisdom gained from building, optimizing and evangelizing channel programs and go-to-market strategies for over two decades. Our podcast opens with Janet and Tracy discussing the level of investment in the channel, both in consolidation …
…
continue reading
1
Introducing Trellix & Discussing Cybersecurity Trends
17:14
17:14
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
17:14
In this episode of the Holtz Story, Britt Norwood, SVP of global channels and commercial at Trellix, discusses the latest trends in cybersecurity threats. The podcast opens with a discussion about the driving force behind the recent influx of ransomware attacks. The ransomware attack in Ukraine is one of the most recent incidents. Norwood indicates…
…
continue reading
1
Trends in Cybersecurity Threats and Solutions
28:07
28:07
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:07
On this episode of the Holtz Story, Tanja Omeragic, Technical Sales Manager and cybersecurity subject matter expert at ConnectWise, joins the Holtz Story to discuss the latest trends in cybersecurity threats and solutions. A staggering 72% of MSPs report security incidents with clients, and cybercriminals are now targeting MSPs to reach their custo…
…
continue reading
1
Building Security Using SASE and Zero Trust
28:01
28:01
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:01
Sunil Choudrie, Product Marketing lead (DLP and Email) at Broadcom Software and part of Symantec’s global information protection practice, joins the Holtz Story to discuss the latest attack vectors. The podcast opens up with a discussion about changes in the industry and what has been learned throughout the pandemic. Sunil shares how the pandemic h…
…
continue reading
1
Protecting What’s Now & What’s Next
27:04
27:04
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
27:04
Frank Lento, Managing Director in Cisco’s Global Security Sales Organization and Global Head of the Global Security Sales Partner at Cisco joins The Holtz Story to discuss the latest solutions in cloud cybersecurity. This podcast opens with a discussion of the change from looking at cybersecurity as a technology stack to seeing it more as a strateg…
…
continue reading
1
Protecting Your People, Data, and Infrastructure with Zero Trust
27:50
27:50
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
27:50
Paul Mezzera, Vice President of Strategy at Saviynt, joins The Holtz Story to discuss protecting your people, data, and infrastructure with Zero Trust. This episode opens with a discussion on the future of Identity Management (IM). Paul points out that there are too many devices and files to have people looking at logs. We now need machine learning…
…
continue reading
William “Chip” Crane, Cybersecurity Executive Advisor Public and Federal Markets at IBM, joins The Holtz Story to discuss IBM’s security activities and solutions. This podcast starts with a discussion around finding the balance between having the right data, questions, and tools. This leads to a discussion about IBM Cloud Pack for Security, and Chi…
…
continue reading
1
Cloud-Based Cybersecurity Trends & Solutions
28:25
28:25
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:25
HoJin Kim, VP of Worldwide Channels, and Kayvon Sadeghi, Executive Director of Product Marketing at SonicWall join The Holtz Story to discuss the latest solutions in cloud cybersecurity. This podcast opens with a discussion of cloud cybersecurity trends. The SonicWall team shares they’re seeing people move from on-prem to the cloud and looking for …
…
continue reading
Nishant Taneja, Senior Director, Product Marketing at Barracuda, joins The Holtz Story to discuss the evolution of threats and risk in email. Nishant and Tracy open the conversation with a discussion that 90% of cyberattacks start with emails and the trend towards leveraging social engineering to gain access to apps and data. Nishant shares how man…
…
continue reading
1
Ransomware with Corey Nachreiner of WatchGuard
42:05
42:05
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
42:05
This week, Corey Nachreiner, Chief Security Officer at WatchGuard, joins The Holtz Story to discuss data’s role in ransomware. Corey is an authority on network security and an internationally quoted commentator. He is a regular contributor to leading publications including CNET, Dark Reading, eWeek, Help Net Security, Information Week, and Infosecu…
…
continue reading
1
Data’s Role in Ransomware with Simon Jelley of Veritas
30:03
30:03
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:03
This week, Simon Jelley, Vice President of Product for Backup Exec, Endpoint Protection, and SaaS Backup at Veritas, joins "The Holtz Story" to discuss data’s role in ransomware. Simon starts us out by discussing how ransomware has evolved to become more enterprise targeted. Protecting data in-flight with encryption, multi-factor authentication, et…
…
continue reading
1
Ransomware & Recovery with Jody Guffey of OpenText
32:10
32:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:10
This week Jody Guffey, Vice President of Channel Sales SMB & Consumer at OpenText joins The Holtz Story to discuss ransomware, supply chain attacks, and the need for backups, disaster recovery, and business continuity planning. In this episode, Jody and Tracy open the podcast discussing how the latest ransomware attacks have increased awareness wit…
…
continue reading
1
The Changing MSP Landscape with Larry Walsh
39:26
39:26
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
39:26
In this edition of The Holtz Story, we’re joined by Larry Walsh, Founder, and CEO of Channelnomics. Larry oversees 2112’s consulting and strategy services, which provide channel and go-to-market assessments, channel program development and operations, executive coaching, and communications support. Today we’re discussing the MSP evolving landscape.…
…
continue reading
1
Discussing the Cybersecurity Executive Order with MJ Shoer and Brett Scott
42:17
42:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
42:17
In this special edition of The Holtz Story, we’re joined by MJ Shoer SVP, Executive Director, CompTIA ISAO, and Brett Scott Director Security Training and Enablement at Tech Data to discuss the Biden Administration’s Cybersecurity Executive Order. This episode covers a lot of ground, from the evolution of the Defense in Depth (DiD) mindset to zero-…
…
continue reading
1
The Anywhere Workforce with Dan Brodeur of VMware
29:06
29:06
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:06
This week Dan Brodeur Senior Director at VMware Security joins "The Holtz Story" to discuss the anywhere workforce. Dan and Tracy cover a lot of ground in this podcast, moving from the hybrid working environments to zero trust, and the impact on the vendors, customers, and partners. Listen in as Dan and Tracy discuss how we're not going back to the…
…
continue reading
1
The Cybersecurity Evolving Landscape with Tim Erlin of Tripwire
32:29
32:29
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:29
This week Tim Erlin, Vice President of Product Management and Strategy at Tripwire, joins "The Holtz Story" to discuss the movement of employees back to the office, OT and IT convergence, the future direction of Tripwire, and even the Biden Administration’s executive order on cybersecurity. Listen in as Tim points out that almost every company is p…
…
continue reading
1
Return to the New Normal with Frank Rauch of Check Point Software
30:43
30:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:43
We welcome back Frank Rauch, Head of Worldwide Channel Sales at Check Point Software, to "The Holtz Story" to discuss what’s happening as we return to normal and recent developments with the Biden cybersecurity initiative. The world is starting to unknot, everyone is going out to restaurants, taking vacations, and we’re starting to go out to partne…
…
continue reading
1
Current Trends & Future Outlook from a Security Perspective for 2021
37:16
37:16
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
37:16
With the news filled with the latest cybersecurity breaches, it's time to step back and look at where we are and where we're going. This week Jon Bove, Vice President of Channel Sales at Fortinet, joins "The Holtz Story" to discuss current trends and what the future looks like from a cybersecurity perspective. In this episode, Jon talks about how p…
…
continue reading
1
Supply Chain Cybersecurity Threats with Patrick Sweeny
32:50
32:50
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:50
The supply chain only works if there is trust between and within the channel. This week Patrick Sweeney, President & CEO at Area 1 Security, joins "The Holtz Story" to discuss how the supply chain is uniquely vulnerable to cyber-attacks and what must happen to ensure its viability. In this episode, you'll hear Patrick and Tracy discuss the supply c…
…
continue reading
1
SOC as a Service & the Evolving MSP
31:47
31:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:47
With the recent Colonial Pipeline breach capturing the nation’s attention, MSPs find themselves under a microscope. Many MSPs are struggling to keep up with the rising threat landscape, new technologies, and people shortage in cybersecurity. This week Lamon Gorman, Director Service Provider Channel at Trend Micro, joins “The Holtz Story” to talk ab…
…
continue reading
1
Talking SMB CyberSecurity with Frank Rauch
22:30
22:30
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
22:30
The Small and Mid-Size Business (SMB) cybersecurity market is over seven billion dollars in size, according to this week’s guest Frank Rauch, Head of Worldwide Channel Sales at CheckPoint Software. This makes it a significant market, and one that has captured the attention of many channel partners. The need for SMB cybersecurity is very high at the…
…
continue reading
1
Women in Tech, Celebrating IWD & Women’s History Month
28:12
28:12
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:12
The women’s movement started over a hundred years ago and continues today. This episode is dedicated to that movement and the women who persevere in today’s workforce. Our guest for this episode is Abigail Maines, Vice President Commercial and Channel Sales at Cybereason. Listen in as Abigail and Tracy discuss what it was like to enter the workforc…
…
continue reading
1
CyberSecurity & Women in Tech with Kathleen Curry
24:20
24:20
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
24:20
The recent Solar Winds and Microsoft Exchange hacks remind us that the cybersecurity threat level is high and accelerated. This week Kathleen Curry, Senior Vice President of Global Enterprise Channels, OEM & Strategic Alliances at McAfee joins “The Holtz Story” to talk about what’s happening in cybersecurity, and she also shares her journey as a wo…
…
continue reading
1
MSP Evolve & The Channel Perfect Storm
20:46
20:46
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
20:46
Welcome to the Holtz Story where tech leaders discuss the biggest trends and challenges in cybersecurity brought to you by TechData one of the world’s largest technology distributors. Channel Perfect Storm Janet Schijns, founder of the JS Group joins host Tracy Holtz, Director, Security Solutions at Tech Data for our first ever episode of The Holtz…
…
continue reading
1
Record Breaking DDoS, Cracked Crypto, and ICS Honeypots
1:08:17
1:08:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:08:17
In our March episode, the LiveSecurity analyst team discusses two months worth of InfoSec news during our Security Story of the Month segment. We cover new weaknesses in a cipher associated with SSL and TLS, more zero day Java exploits, a severe sentence in a cyber security trial, the largest DDoS attack ever seen, and more. We also debut a funny, …
…
continue reading
1
Java 0day, UPnP Pwnage, and Red October
1:02:14
1:02:14
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:02:14
During this month's Security Story of the Month segment the LiveSecurity analyst team discusses the biggest InfoSec stories from January. Topics include wide-spread Java zero days, a nasty new advanced malware campaign called Red October, some industry-wide Universal Plug and Play vulnerabilities, and much more. Also stay tuned for What's Up With W…
…
continue reading
1
WatchGuard's 2013 Security Predictions Unveiled
2:02:56
2:02:56
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:02:56
Last episode, we reviewed our 2012 security prediction results. This time we unveil WatchGuard's 2013 security predictions. They cover topics like life-threatening hardware hacks, mobile device pick-pockets, cyber strike-back, zombie browsers, and much more. Whether or not these predictions come true, the episode explores many real infosec trends t…
…
continue reading
1
2012 Prediction Review: Win or Fail?
1:24:34
1:24:34
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:24:34
We're nearing the end of the year, which means it's prediction time. In the first of two special episodes, the Radio Free Security team looks back at our 2012 security forecasts. Did our predictions for the year ring true, or were they epic fails? Join Corey Nachreiner and the co-hosts from the Security Story of the Month to find out. The discussio…
…
continue reading
1
The Dirty Little Secret of Security Breaches
1:49:05
1:49:05
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:49:05
In October's Security Spotlight, Ben Brobak and Corey Nachreiner unveil the secret culprit for most security breaches. More importantly, they discuss firewall policy best practices that will help you avoid such breaches. Also, learn about WatchGuard's new RapidDeploy capability in an interview with Product Manager, Johnni Aguirre. Finally, we discu…
…
continue reading
1
Cyber Attacks on Physical Infrastructure: Protecting SCADA and ICS Systems
1:15:37
1:15:37
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:15:37
Digital network attacks that can blow up generators, shut down power grids, or damage nuclear facilities seem like the stuff of science fiction. However, we currently live in a world where nation-states launch just such attacks against one another, and may escalate them in the future. In this episode, Nachreiner interviews an industry expert from A…
…
continue reading
1
Nation-state Malware, VMware Worms, and Java Zero Days
1:15:45
1:15:45
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:15:45
August's abbreviated episode includes an exciting Security Story of the Month segment and a trip down memory lane, with the Tip-o-matic 650. In this month's security news recap, Richard Gilmour, Christian Garland, and Corey Nachreiner highlight the most concerning security stories and incidents from August. The segment includes a new advanced persi…
…
continue reading
1
Blackhat & Defcon 2012: The Highlights
1:30:09
1:30:09
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:30:09
In July's Security Spotlight, guest host Ben Brobak interviews Corey Nachreiner about the most interesting briefings he attended at this year's Black hat security conference. They discuss the implications of some of these new threats and share security tips along the way. This episode's "Security Story of the Month" also shares a Blackhat and Defco…
…
continue reading
1
Dissecting Flame: A Nation-State Cyber Espionage Threat
1:37:05
1:37:05
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:37:05
Ben and Corey discuss the Flame worm in this month's Security Spotlight. What does this malware do, how does it spread, and how can you protect yourself from this type of advanced attack. They also discuss the evidence suggesting that Flame is a government sponsered cyber attack, and what that means for the future of network and information securit…
…
continue reading
1
Getting Started with Application Control
1:00:00
1:00:00
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:00:00
In this month's Security Spotlight, Corey and Peter discuss Application Control; What is it? What can you do with it? And how do you get started? Learn how this powerful new security tool can increase your network visibility and control tenfold. Next, learn about the latest industry news during the "Security Story of the Month." Richard, Chris, and…
…
continue reading
1
Securing Your Servers in The Matrix
1:25:00
1:25:00
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:25:00
In this month's Security Spotlight, Corey chats with WatchGuard's Director of Product Management about the history of virtualization and its security ramifications. He also learns about WatchGuard's upcoming virtual security solutions. Next, listen in on the "Security Story of the Month," where Christian, Chris, and Corey talk about cyber legislati…
…
continue reading
1
Securing Mobile Devices in a BYOD World
1:07:13
1:07:13
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:07:13
In this episode, we return to our regular format. During the first segment, Corey interviews guest expert, Dean Colpitts, to discuss practical ways IT administrators can manage and secure Mobile devices. Next up? The return of "The Security Story of the Month". Tim, Richard, and Corey explore three big security stories from the month, and decide wh…
…
continue reading
1
WatchGuard's 2012 Security Predictions
1:11:17
1:11:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:11:17
Last episode we looked back at WatchGuard's 2011 security predictions. Now it's time to look towards the future. Do you know what security threats and trends you should expect this year? If not, join Corey Nachreiner, Ben Brobak, and Tim Helming to find out. We'll cover many topics, from malware on app stores, to power plants with viruses. We'll al…
…
continue reading
1
2011 Security Predictions in Review
1:10:40
1:10:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:10:40
Radio Free Security returns after two years radio silence! In this episode, Corey Nachreiner looks back at WatchGuard's 2011 security predictions with Tim Helming and Ben Brobak, to see how well - or how badly - we did. Topics covered include, Cyberwar, APTs, Facebook links, and more. Did we call the year correctly, and what did we learn from the r…
…
continue reading
1
Getting ROI from Your Security Investments
1:08:10
1:08:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:08:10
In this double dose of Radio Free Security, Senior Network Security Analyst Corey Nachreiner, CISSP, and WatchGuard Trainer Nathan Buff talk about two months worth of security stories. Topics include; the latest zero day exploits, security problems plaguing Facebook, the latest Conficker updates, and the BBC's questionable use of a malicious botnet…
…
continue reading
In the inaugural 2009 episode of Radio Free Security, Senior Network Security Analyst Corey Nachreiner, CISSP, and WatchGuard Trainer Nathan Buff talk about a huge industry data breach, a fast spreading worm with potential to become a botnet, and a broken cryptographic hash function. Nat Hillary, a Product Manager for WatchGuard, shares the top ten…
…
continue reading
1
Security Predictions for 2009
1:04:29
1:04:29
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:04:29
Senior Network Security Analyst Corey Nachreiner, CISSP, and Information Security Analyst Scott Pinzon, CISSP, host their second annual Security Predictions episode. They assess and score the six predictions they made in December 2007 about 2008; issue several predictions of what will NOT happen in 2009; and predict six new trends to anticipate thi…
…
continue reading
Senior Network Security Analyst Corey Nachreiner, CISSP, details the happy results of Internet Service Providers (ISPs) shutting down McColo.com, but he questions the methods used. Danny McPherson, Vice President and CSO of Arbor Networks, discusses some surprising findings in his annual Worldwide Infrastructure Security Report, which details what …
…
continue reading
WatchGuard trainers answer a network administrator's question about how to lock down a high school's network. Greek researcher Elias Athanasopoulos explains how social networking sites such as Facebook could be easily transformed into "Facebots" that sustain Denial of Service attacks against targets on the Web. WatchGuard introduces a new wireless …
…
continue reading
Dave Piscitello, Senior Security Technologist for ICANN and a member of the Anti-Phishing Workgroup (APWG), describes how scam artists utilize second-level domain names to make it harder for authorities to take down scam web sites. Mark Waldstein and Scott Pinzon, CISSP, discuss security trends, including a TCP/IP stack vulnerability rumored to pot…
…
continue reading
In his Security Story of the Month, Corey Nachreiner, CISSP, describes the compromise of Best Western Hotels in Germany, and why it is not "the greatest cyberheist in history," as the Glasgow Sunday Herald claimed. Mark Waldstein joins the show and discovers the Tip-O-Matic, which dispenses tips on EULAs, backups, and security by obscurity. The wor…
…
continue reading
1
Firebox Special: We Have Seen the Future, and It's XTM
23:55
23:55
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
23:55
In this month's episode, VP of Marketing Eric Aarrestad discusses WatchGuard's roadmap in the coming year - the release of XTM, or "Extensible Threat Management" products. Also, Tech Support Team Lead Ben Brobak returns to answer the latest hot-potato questions coming into our Support call center.Oleh WatchGuard LiveSecurity Service
…
continue reading