Redefining CyberSecurity cover art

Redefining CyberSecurity

By: Sean Martin ITSPmagazine
  • Summary

  • Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, our communities, and our society, in a secure and safe way, we must begin by operationalizing security. Executives are recognizing the importance of their investments in information security and the value it can have on business growth, brand value, partner trust, and customer loyalty. Together with executives, lines of business owners, and practitioners, we are Redefining CyberSecurity.
    © Copyright 2015-2025 ITSPmagazine, Inc., All Rights Reserved
    Show More Show Less
Episodes
  • Unveiling the Cybersecurity Revolution for Small and Medium-Sized Enterprises (SMEs) | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli
    May 3 2024

    Unveiling the Origin Story

    In a recent brand story episode, Sean Martin and Marco Ciappelli engaged in a compelling conversation with Dror Liwer, shedding light on the inception of CORO. Dror's background as a former CIO of the Israeli military police paved the way for the founding of Coro in 2014, with a mission to bridge the gap in cybersecurity solutions for mid-market companies and small businesses.

    Solving Real-World Challenges

    While the cybersecurity industry often overlooks the needs of mid-market companies and small businesses, CORO identified a critical deficiency in the market. By providing a comprehensive platform with a "power of one" approach, CORO offers a simplified yet effective solution to address the unique cybersecurity challenges faced by these organizations.

    Empowering with Affordable Protection

    CORO's modular approach allows businesses to tailor their cybersecurity strategy based on their specific needs, without the burden of unnecessary complexities. With affordable pricing and automated cybersecurity tasks, CORO ensures that even organizations with limited budgets and resources can benefit from robust protection.

    Tailored Solutions for Every Industry

    Recognizing the diverse needs of different sectors, CORO offers specialized suites for industries like education and automotive. By securing both staff and students in educational environments, CORO's tailored solutions demonstrate a commitment to protecting vital institutions against cyber threats.

    Partnering for Success

    With a strong channel-centric approach, CORO collaborates closely with partners to deliver personalized support and education. From onboarding processes to managed detection and response services, CORO empowers organizations to navigate their cybersecurity journey with confidence.

    The Path Ahead: RSA Conference and Beyond

    As CORO continues its mission to revolutionize cybersecurity, Dror Liwer's upcoming engagements at the RSA Conference underscore the company's commitment to sharing knowledge and driving industry advancements. Through deeper dive discussions, use cases, and real-world outcomes, CORO aims to showcase the tangible benefits of their solutions.

    Stay Tuned for Chapter Two

    With an exciting chapter ahead, listeners are encouraged to follow CORO's journey and explore the transformative impact of their cybersecurity solutions. Whether in person at events like the RSA Conference or through online resources, the opportunity to connect with Dror Liwer and the CORO team remains open for all interested parties.

    Learn more about CORO: https://itspm.ag/coronet-30de

    Note: This story contains promotional content. Learn more.

    Guest: Dror Liwer, Co-Founder at Coro [@coro_cyber]

    On LinkedIn | https://www.linkedin.com/in/drorliwer/

    Resources

    Learn more and catch more stories from CORO: https://www.itspmagazine.com/directory/coro

    View all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage

    Are you interested in telling your story?
    https://www.itspmagazine.com/telling-your-story

    Show More Show Less
    22 mins
  • Easily Answer the Questions Fundamental to a Modern Organization’s Security and Resilience | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A Mitiga Story with Ariel Parnes
    May 2 2024

    Today organizations have a large part of their environment outside of their control. They have authentication, email, data, code—some organizations have the majority of their most important assets in cloud and SaaS applications. And yet the security team does not have effective tooling to investigate across this surface.

    So when a complex breach unfolds, an organization can find themselves scrambling. Why?

    The first problem is cloud scale. The amount of telemetry that is produced daily across this surface is extraordinary. The security tooling a team would use is not appropriate for the sheer volume of data that needs to be collected.

    The second problem is cloud complexity. Correlating cloud data into contextual alerts and insights that teams can act on is a massive task that requires deep understanding of each environment—which leads into the third problem:

    Most teams lack cloud expertise—and the DevOps teams they often turn to for cloud knowledge lack security expertise. Nobody is holding all the cards when it comes to detecting, investigating and responding to threats.

    We have spent years building a comprehensive solution that addresses the challenges facing modern SOC teams and the transforming enterprises they're tasked with securing. It distills our knowledge to elevate their cloud security capacity and capabilities. So the now SecOps can have broad visibility across clouds and SaaS—because our solution harvests all the needed telemetry and stores it for years for a minimal cost.

    When an incident happens, they can easily answer the questions that are fundamental to a modern organization’s security and resilience: Did anyone get in? Where did they go? What did they do while inside? What did they take? —because our Cloud Attack Scenario Library filled with the latest intelligence to root out cloud and SaaS threats.

    And they'll possess the speed of Mitiga's automation—to dramatically accelerate detection, investigation and response—minimizing impact.

    With Mitiga, the SOC is well equipped to deal with cloud threats.

    Learn more about Mitiga: https://itspm.ag/mitiga-5zz

    Note: This story contains promotional content. Learn more.

    Guest: Ariel Parnes, COO and Co-Founder at Mitiga

    On LinkedIn | https://www.linkedin.com/in/arielparnes/

    On Twitter | https://twitter.com/arielparnes

    Resources

    Learn more and catch more stories from Mitiga: https://www.itspmagazine.com/directory/mitiga

    View all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage

    Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs

    Newsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/

    Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-up

    Are you interested in telling your story?
    https://www.itspmagazine.com/telling-your-story

    Show More Show Less
    7 mins
  • The Evolution to Highly Reliable, Highly Performant Workload IAM | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | An Aembit Story with Apurva Davé
    May 2 2024

    Aembit is the first Workload Identity and Access Management Platform. It discovers, enforces, and audits workload access. By using native identities and short-lived credentials, we eliminate the need for secrets scanning and credential rotation. We let your teams focus on building your software, without worrying about sharing API keys or misusing vaults. An Aembit access policy enforces authorized access in three steps: First, Aembit cryptographically verifies workload identity, and validates access rights. This works for the most complex environments like an AWS serverless app accessing Snowflake or Salesforce. Second, Aembit implements workload Zero Trust by adding conditional access. For example, Aembit can check CrowdStrike or Wiz posture assessment before authorizing access. Finally, Aembit issues access credentials. Aembit automatically injects short-lived credentials into requests with no burdensome code changes required by the dev team.

    The benefits of using Aembit include significant time savings and reduced complexity. This allows engineering teams to move faster in building software and APIs that help companies automate more and build great products. From a security standpoint, Aembit also mitigates a growing attack surface (workload credential compromise) by allowing companies to go secretless using short-lived dynamic access credentials, as opposed to long lived tokens. There's no more credential reuse across multiple workloads. They can also enable Zero Trust conditional access for workload access. If the workload isn't being actively managed by their cloud security tool, it shouldn't get access. And with Aembit, they now have a highly compliant automated system of record to keep track of every workload requesting access, which is huge for audit and compliance requirements.

    Learn more about Aembit: https://itspm.ag/aembit-1oq

    Note: This story contains promotional content. Learn more.

    Guest: Apurva Davé, CMO at Aembit [@aembit_io]

    On LinkedIn | https://www.linkedin.com/in/apurvadave/

    On Twitter | https://twitter.com/ApurvaBDave

    Resources

    Learn more and catch more stories from Aembit: https://www.itspmagazine.com/directory/aembit

    View all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage

    Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs

    Newsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/

    Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-up

    Are you interested in telling your story?
    https://www.itspmagazine.com/telling-your-story

    Show More Show Less
    7 mins

What listeners say about Redefining CyberSecurity

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.