E-ChannelNews Podcasts

Check out our Podcasts, available on Apple Podcasts, Spotify, iHeart Radio or your favourite podcast provider

EChannelNews Podcast

IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.

  • Checkmarx and Prompt Security: An App Developer's Dream Team
    by EChannelNews on June 12, 2024 at 4:00 pm

    Send us a Text Message.Speakers: Ori Bendet VP of Product Management at Checkmarx and Itamar Golan, CEO at Prompt Security.As a new crop of AI-related threats emerges from the rapid adoption of generative AI I tools within application development, companies face challenges and risks associated with the adoption of AI, including data leakage and the need to manage AI in a way that does not compromise security.Ori and Itamar discussed the complexities of AI security and code leakage, emphasizing the need for robust protection measures. They also touched upon the potential risks associated with AI-generated code and the importance of implementing policies to mitigate these risks.Listen to this podcast to learn more about how the partnership between the two companies is addressing two areas of risk arising from the use of GenAI tools that are already in widespread use by development teams. Also watch our past interview with Checkmarx: https://www.e-channelnews.com/enabling-application-security-posture-management-with-checkmarx-brinqa/

  • XM Cyber: What's the scoop on cyber threat hunters?
    by EChannelNews on June 6, 2024 at 1:00 pm

    Send us a Text Message.XM Cyber announced findings from its third annual State of Exposure Management Report, produced in collaboration with the Cyentia Institute, which found that identity and credential misconfigurations represent a staggering 80% of security exposures across organizations, with a third of these exposures putting critical assets at direct risk of breach - a gaping attack vector actively being exploited by adversaries.During this podcast, Zur Ulianizky, VP of Security and Research at XM Cyber, presented his company's attack path management solutions and the importance of prioritizing remediation efforts to improve security posture. He discussed different types of security exposures, the challenge of balancing security measures with user access to systems, and the need to categorize servers based on their criticality. He also emphasized the importance of mapping critical assets and threats to prioritize security efforts and addressed the vulnerabilities in the cloud environment.Be sure to check out our January 2024 interview with XM Cyber: https://www.e-channelnews.com/xm-cyber-introduces-first-exposure-management-solution-working-across-environments/

  • It’s a Keeper – Extreme Privileged Access Management
    by EChannelNews on May 22, 2024 at 7:00 am

    Send us a Text Message.Keeper Security, a leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, introduced two major privileged access capabilities now available in the Keeper platform: Time-Limited Access and Self-Destructing Records. Designed for encrypted record access and sharing, these features provide new methods to quickly and securely elevate access and revoke access rights after they have been granted – vastly reducing the gradual accumulation of unnecessary privileges and reducing the potential attack surface for organizations.Marcia Dempster, VP of Channel Sales, Americas, and Craig Lurey, co-founder and CTO of Keeper Security, provided an overview of Keeper Security’s offerings, and the concept of zero trust and its application in their product, emphasizing the importance of providing access and control over infrastructure while maintaining security. They also discussed the importance of cybersecurity and the concept of self-destructing records, which allows for secure sharing of sensitive information.

  • Magic Happens when Universities Collaborate with Industry – Case Study: University Of Ottawa and RabbitRun
    by EChannelNews on May 17, 2024 at 5:00 pm

    Send us a Text Message.Speakers: Julian Lee – TechnoPlanet, Pat Saavedra – RabbitRun, Jaipreet Bindra – University of Ottawa, Shiva Nejati – University of Ottawa, Mehrdad Sabetzadeh – University of Ottawa, , Negin Ayough – University of OttawaPat Saavedra started by giving some high-level context for RabbitRun Technologies and how the collaboration with the University of Ottawa to address cybersecurity challenges came about. He also talked about the collaboration and the significance of combining the experience of both sectors to research and address cybersecurity issues. The panel discussion focused on the specific work being done by RabbitRun Technologies and the University of Ottawa in this area, emphasizing the innovative approach and potential impact of their partnership. The team stressed the need of academic-industry collaboration in product development. They were also proud of the impact of their partnership and emphasized the importance of universities in encouraging innovation, research and collaboration with industry.They also discussed the importance of academia in training the next generation of engineers, as well as the unique problem-solving environment it provides that AI cannot replicate. The team talked on the technical features of SD-WAN technology, such as how it routes data and how difficult it is to distinguish between genuine and malicious data. They also shared the outcome of that collaboration that is called “Attack Shield”, a meta-driven add-on to the existing SD-WAN designed specifically for MSP partners working in small locations with mission-critical applications. More information about the research paper referenced during the interview may be found at https://www.rabbit.run/sd-wan-cyber-security-research-university-of-ottawa/.

  • Perception Point: Providing 360 Degrees of Protection Around Remote Employees
    by EChannelNews on May 16, 2024 at 8:00 pm

    Send us a Text Message.In today’s interconnected professional world, LinkedIn has become the go-to platform for networking, job hunting, and business proposals, and many of us would happily open a LinkedIn message from a trusted “1st connection” contact containing a sales proposal or a job offer. However, it’s come to light that a new two-step phishing campaign is leveraging sophisticated social engineering techniques to breach LinkedIn accounts and steal users’ Microsoft 365 credentials.In this podcast, David Leone, Director of Sales Engineering at Perception Point, a leading provider of advanced email and workspace security solutions, explained that the lines between professional and personal workspaces are getting blurrier, making even personal profiles on social media platforms popular attack vectors and access points into organizations. David and Julian Lee emphasized the importance of multifactor authentication and best security practices, as well as the use of AI in cyber attacks and the potential for autopilot-driven attacks.The discussion then shifted to the role of AI and XDR in enhancing security measures, particularly in the context of MSPs. They explored how AI can mitigate false positives and false negatives by adding context to data, thus reducing manual work and empowering security teams to focus on more critical tasks. The conversation also delved into the challenges faced by MSPs in managing complex security responsibilities and the need for smarter XDR systems to alleviate the workload.