<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/meanwhile-in-security" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Meanwhile in Security</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/meanwhile-in-security</itunes:new-feed-url>
    <description>Cloud security is a minefield of news that assumes the word "Security" is lurking somewhere in your job description. It doesn't have to be this way. Weekly cloud security news for people with other jobs to do. Cloud Security For Humans.</description>
    <copyright>© The Duckbill Group, 2021</copyright>
    <podcast:guid>ede42d0c-b94b-55ee-a256-f374abb8a3e0</podcast:guid>
    <podcast:locked owner="podcasts@duckbillgroup.com">no</podcast:locked>
    <podcast:trailer pubdate="Tue, 11 May 2021 14:49:00 -0700" url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/d39f3e47/1f4b4c40.mp3" length="521247" type="audio/mpeg">Meanwhile in Security Trailer</podcast:trailer>
    <podcast:trailer pubdate="Thu, 18 Feb 2021 13:40:54 -0800" url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/00081436/50af353d.mp3" length="3266961" type="audio/mpeg">Introducing Meanwhile in Security</podcast:trailer>
    <language>en</language>
    <pubDate>Wed, 23 Jul 2025 07:34:18 -0700</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 14:16:13 -0800</lastBuildDate>
    <link>https://www.meanwhileinsecurity.com</link>
    <image>
      <url>https://img.transistor.fm/SWdlucjllnZCvbHl2BSz2bQDDldnQT1iRhqhU6gL6Hk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzE4NDA2LzE2MTMw/ODA0NDEtYXJ0d29y/ay5qcGc.jpg</url>
      <title>Meanwhile in Security</title>
      <link>https://www.meanwhileinsecurity.com</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Jesse Trucks</itunes:author>
    <itunes:image href="https://img.transistor.fm/SWdlucjllnZCvbHl2BSz2bQDDldnQT1iRhqhU6gL6Hk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzE4NDA2LzE2MTMw/ODA0NDEtYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>Cloud security is a minefield of news that assumes the word "Security" is lurking somewhere in your job description. It doesn't have to be this way. Weekly cloud security news for people with other jobs to do. Cloud Security For Humans.</itunes:summary>
    <itunes:subtitle>Cloud security is a minefield of news that assumes the word "Security" is lurking somewhere in your job description.</itunes:subtitle>
    <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
    <itunes:owner>
      <itunes:name>The Duckbill Group</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Standing in the Rain Isn't Diving in the Sea</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Standing in the Rain Isn't Diving in the Sea</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a185f6a3-0818-4859-b992-d5e7a6fac785</guid>
      <link>https://share.transistor.fm/s/53b0e8de</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Microsoft Azure Cloud Vulnerability Exposed Thousands of Databases</em>: <a href="https://www.darkreading.com/cloud/microsoft-azure-cloud-vulnerability-exposed-thousands-of-databases">https://www.darkreading.com/cloud/microsoft-azure-cloud-vulnerability-exposed-thousands-of-databases</a></li><li><em>Google, Amazon, Microsoft Share New Security Efforts After White House Summit</em>: <a href="https://www.darkreading.com/operations/google-amazon-microsoft-share-new-security-efforts-post-white-house-summit">https://www.darkreading.com/operations/google-amazon-microsoft-share-new-security-efforts-post-white-house-summit</a></li><li><em>New Data-Driven Study Reveals 40% of SaaS Data Access is Unmanaged, Creating Significant Insider and External Threats to Global Organizations</em>: <a href="https://www.darkreading.com/cloud/new-data-driven-study-reveals-40-of-saas-data-access-is-unmanaged-creating-significant-insider-and-external-threats-to-global-organizations">https://www.darkreading.com/cloud/new-data-driven-study-reveals-40-of-saas-data-access-is-unmanaged-creating-significant-insider-and-external-threats-to-global-organizations</a></li><li><em>Researchers Share Common Tactics of ShinyHunters Threat Group</em>: <a href="https://www.darkreading.com/attacks-breaches/researchers-share-common-tactics-of-shinyhunters-threat-group">https://www.darkreading.com/attacks-breaches/researchers-share-common-tactics-of-shinyhunters-threat-group</a></li><li><em>How to automate forensic disk collection in AWS</em>: <a href="https://aws.amazon.com/blogs/security/">https://aws.amazon.com/blogs/security/</a></li><li><em>Confidential computing: an AWS perspective</em>: <a href="https://aws.amazon.com/blogs/security/">https://aws.amazon.com/blogs/security/</a></li><li><em>New in October: AWS Security Awareness Training and AWS Multi-factor Authentication available at no cost</em>: <a href="https://aws.amazon.com/blogs/security/amazon-security-awareness-training-and-aws-multi-factor-authentication-tokens-to-be-made-available-at-no-cost/">https://aws.amazon.com/blogs/security/amazon-security-awareness-training-and-aws-multi-factor-authentication-tokens-to-be-made-available-at-no-cost/</a></li><li><em>Use IAM Access Analyzer to generate IAM policies based on access activity found in your organization trail</em>: <a href="https://aws.amazon.com/blogs/security/">https://aws.amazon.com/blogs/security/</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst Canary. This might take a little bit to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a>, in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, or anything else like that that you can generate in various parts of your environment, wherever you want them to live; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use them. It’s an awesome approach to detecting breaches. I’ve used something similar for years myself before I found them. Check them out. But wait, there’s more because they also have an enterprise option that you should be very much aware of: <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment and manage them centrally. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files that it presents on a fake file store, you get instant alerts. It’s awesome. If you don’t do something like this, instead you’re likely to find out that you’ve gotten breached the very hard way. So, check it out. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I am so glad I found them. I love it.” Again, those URLs are <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. And the first one is free because of course it is. The second one is enterprise-y. You’ll know which one of those you fall into. Take a look. I’m a big fan. More to come from Thinkst Canary weeks ahead.</p><p>Jesse: Disaster befell much of the middle south of the US when Ida slammed into the coast and plowed its way up north through the land. What does a hurricane have to do with security? Business continuity. Business continuity is the discipline of maintaining business operations, even in the face of disasters of any kind, such as a hurricane-driven storm surge running over the levees and flooding whole towns. If you have all your computing systems in the cloud in multiple regions, then such a disaster won’t fully halt your business operations.</p><p>However, you still might have connectivity issues and possibly either temporary or permanent loss of non-cloud systems. Be sure your non-cloud systems have appropriate backups off-site to another geographically disparate location. Better yet, push backups into your cloud infrastructure and consider ways to utilize that data with your cloud systems during a crisis. Hmm, perhaps you’ll like it so much you will push everything else up to the cloud that isn’t a laptop, tablet, or phone.</p><p>Meanwhile in the news, <a href="https://www.darkreading.com/cloud/microsoft-azure-cloud-vulnerability-exposed-thousands-of-databases"><em>Microsoft Azure Cloud Vulnerability Exposed Thousands of Databases</em></a>. Security for cloud providers can potentially have catastrophic and large scale repercussions. Keep an eye out for any problems that come up that might affect your operations and your data. Do keep in mind your platform has a direct impact on your own risk profile.</p><p><a href="https://www.darkreading.com/operations/google-amazon-microsoft-share-new-security-efforts-post-white-house-summit"><em>Google, Amazon, Microsoft Share New Security Efforts After White House Summit</em></a>. The National Institute of Standards and Technology—or NIST—is building a technology supply chain framework with the big tech companies, including Apple, Amazon, Google, IBM, and Microsoft, and this is a big deal. I’m sure the fighting amongst those companies will make this initiative die on the vine, but I hope I’m wrong.</p><p><a href="https://www.darkreading.com/cloud/new-data-driven-study-reveals-40-of-saas-data-access-is-unmanaged-creating-significant-insider-and-external-threats-to-global-organizations"><em>New Data-Driven Study Reveals 40% of SaaS Data Access is Unmanaged, Creating Significant Insider and External Threats to Global Organizations</em></a>. Back to basics: secure your data; lock down those buckets; don’t be stupid. Also, when we’re talking cloud apps and services, there should be no assumption that anyone accessing the application via an obfuscated link or permissions too broad to <br>effectively secure the data therein.</p><p>Announcer: Have you implemented industry best practices for securely accessing SSH servers, databases, or Kubernetes? It takes time and expertise to set up. <a href="https://goteleport.com/">Teleport</a> makes it easy. It is an identity-aware access proxy that brings automatically expiring credentials for everything you need, including role-based access controls, access requests, and the audit log. It helps prevent data exfiltration and helps implement PCI and FedRAMP compliance. And best of all, teleport is...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Microsoft Azure Cloud Vulnerability Exposed Thousands of Databases</em>: <a href="https://www.darkreading.com/cloud/microsoft-azure-cloud-vulnerability-exposed-thousands-of-databases">https://www.darkreading.com/cloud/microsoft-azure-cloud-vulnerability-exposed-thousands-of-databases</a></li><li><em>Google, Amazon, Microsoft Share New Security Efforts After White House Summit</em>: <a href="https://www.darkreading.com/operations/google-amazon-microsoft-share-new-security-efforts-post-white-house-summit">https://www.darkreading.com/operations/google-amazon-microsoft-share-new-security-efforts-post-white-house-summit</a></li><li><em>New Data-Driven Study Reveals 40% of SaaS Data Access is Unmanaged, Creating Significant Insider and External Threats to Global Organizations</em>: <a href="https://www.darkreading.com/cloud/new-data-driven-study-reveals-40-of-saas-data-access-is-unmanaged-creating-significant-insider-and-external-threats-to-global-organizations">https://www.darkreading.com/cloud/new-data-driven-study-reveals-40-of-saas-data-access-is-unmanaged-creating-significant-insider-and-external-threats-to-global-organizations</a></li><li><em>Researchers Share Common Tactics of ShinyHunters Threat Group</em>: <a href="https://www.darkreading.com/attacks-breaches/researchers-share-common-tactics-of-shinyhunters-threat-group">https://www.darkreading.com/attacks-breaches/researchers-share-common-tactics-of-shinyhunters-threat-group</a></li><li><em>How to automate forensic disk collection in AWS</em>: <a href="https://aws.amazon.com/blogs/security/">https://aws.amazon.com/blogs/security/</a></li><li><em>Confidential computing: an AWS perspective</em>: <a href="https://aws.amazon.com/blogs/security/">https://aws.amazon.com/blogs/security/</a></li><li><em>New in October: AWS Security Awareness Training and AWS Multi-factor Authentication available at no cost</em>: <a href="https://aws.amazon.com/blogs/security/amazon-security-awareness-training-and-aws-multi-factor-authentication-tokens-to-be-made-available-at-no-cost/">https://aws.amazon.com/blogs/security/amazon-security-awareness-training-and-aws-multi-factor-authentication-tokens-to-be-made-available-at-no-cost/</a></li><li><em>Use IAM Access Analyzer to generate IAM policies based on access activity found in your organization trail</em>: <a href="https://aws.amazon.com/blogs/security/">https://aws.amazon.com/blogs/security/</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst Canary. This might take a little bit to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a>, in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, or anything else like that that you can generate in various parts of your environment, wherever you want them to live; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use them. It’s an awesome approach to detecting breaches. I’ve used something similar for years myself before I found them. Check them out. But wait, there’s more because they also have an enterprise option that you should be very much aware of: <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment and manage them centrally. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files that it presents on a fake file store, you get instant alerts. It’s awesome. If you don’t do something like this, instead you’re likely to find out that you’ve gotten breached the very hard way. So, check it out. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I am so glad I found them. I love it.” Again, those URLs are <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. And the first one is free because of course it is. The second one is enterprise-y. You’ll know which one of those you fall into. Take a look. I’m a big fan. More to come from Thinkst Canary weeks ahead.</p><p>Jesse: Disaster befell much of the middle south of the US when Ida slammed into the coast and plowed its way up north through the land. What does a hurricane have to do with security? Business continuity. Business continuity is the discipline of maintaining business operations, even in the face of disasters of any kind, such as a hurricane-driven storm surge running over the levees and flooding whole towns. If you have all your computing systems in the cloud in multiple regions, then such a disaster won’t fully halt your business operations.</p><p>However, you still might have connectivity issues and possibly either temporary or permanent loss of non-cloud systems. Be sure your non-cloud systems have appropriate backups off-site to another geographically disparate location. Better yet, push backups into your cloud infrastructure and consider ways to utilize that data with your cloud systems during a crisis. Hmm, perhaps you’ll like it so much you will push everything else up to the cloud that isn’t a laptop, tablet, or phone.</p><p>Meanwhile in the news, <a href="https://www.darkreading.com/cloud/microsoft-azure-cloud-vulnerability-exposed-thousands-of-databases"><em>Microsoft Azure Cloud Vulnerability Exposed Thousands of Databases</em></a>. Security for cloud providers can potentially have catastrophic and large scale repercussions. Keep an eye out for any problems that come up that might affect your operations and your data. Do keep in mind your platform has a direct impact on your own risk profile.</p><p><a href="https://www.darkreading.com/operations/google-amazon-microsoft-share-new-security-efforts-post-white-house-summit"><em>Google, Amazon, Microsoft Share New Security Efforts After White House Summit</em></a>. The National Institute of Standards and Technology—or NIST—is building a technology supply chain framework with the big tech companies, including Apple, Amazon, Google, IBM, and Microsoft, and this is a big deal. I’m sure the fighting amongst those companies will make this initiative die on the vine, but I hope I’m wrong.</p><p><a href="https://www.darkreading.com/cloud/new-data-driven-study-reveals-40-of-saas-data-access-is-unmanaged-creating-significant-insider-and-external-threats-to-global-organizations"><em>New Data-Driven Study Reveals 40% of SaaS Data Access is Unmanaged, Creating Significant Insider and External Threats to Global Organizations</em></a>. Back to basics: secure your data; lock down those buckets; don’t be stupid. Also, when we’re talking cloud apps and services, there should be no assumption that anyone accessing the application via an obfuscated link or permissions too broad to <br>effectively secure the data therein.</p><p>Announcer: Have you implemented industry best practices for securely accessing SSH servers, databases, or Kubernetes? It takes time and expertise to set up. <a href="https://goteleport.com/">Teleport</a> makes it easy. It is an identity-aware access proxy that brings automatically expiring credentials for everything you need, including role-based access controls, access requests, and the audit log. It helps prevent data exfiltration and helps implement PCI and FedRAMP compliance. And best of all, teleport is...</p>]]>
      </content:encoded>
      <pubDate>Thu, 02 Sep 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/53b0e8de/26fabe1e.mp3" length="13358541" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>551</itunes:duration>
      <itunes:summary>Natural events certainly have their effect on security, and this week Jesse tells us how in the aftermath of Hurricane Ida. The two most pressing components that natural events effect? Connectivity and business continuity. Jesse breaks down the importance of the two in regards to your security needs. 

In the news: Microsoft Azure Cloud’s security soft spot exposed, Shinyhunter Treat Group on the prowl, some new AWS security training coming in the fall, and more! Tune in for the rest! </itunes:summary>
      <itunes:subtitle>Natural events certainly have their effect on security, and this week Jesse tells us how in the aftermath of Hurricane Ida. The two most pressing components that natural events effect? Connectivity and business continuity. Jesse breaks down the importance</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/53b0e8de/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Can You Hear Me, Can You See My Screen?</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Can You Hear Me, Can You See My Screen?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">86788bd6-bc66-4896-b2fb-a3377e750f3f</guid>
      <link>https://share.transistor.fm/s/dc54345b</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>How to Make Your Next Third-Party Risk Conversation Less Awkward</em>: <a href="https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward">https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward</a></li><li><em>5 Vexing Cloud Security Issues</em>: <a href="https://www.itprotoday.com/hybrid-cloud/5-vexing-cloud-security-issues">https://www.itprotoday.com/hybrid-cloud/5-vexing-cloud-security-issues</a></li><li><em>Attackers Increasingly Target Linux in the Cloud</em>: <a href="https://www.darkreading.com/threat-intelligence/attackers-increasingly-target-linux-in-the-cloud">https://www.darkreading.com/threat-intelligence/attackers-increasingly-target-linux-in-the-cloud</a></li><li><em>Top 5 Best Practices for Cloud Security</em>: <a href="https://www.infosecurity-magazine.com/magazine-features/top-5-best-practices-for-cloud/">https://www.infosecurity-magazine.com/magazine-features/top-5-best-practices-for-cloud/</a></li><li><em>Zix Releases 2021 Mid-Year Global Threat Report</em>: <a href="https://www.darkreading.com/cloud/zix-releases-2021-mid-year-global-threat-report">https://www.darkreading.com/cloud/zix-releases-2021-mid-year-global-threat-report</a></li><li><em>The big three innovations transforming cloud security</em>: <a href="https://siliconangle.com/2021/08/21/big-three-innovations-transforming-cloud-security/">https://siliconangle.com/2021/08/21/big-three-innovations-transforming-cloud-security/</a></li><li><em>The Benefits of a Cloud Security Posture Assessment</em>: <a href="https://fedtechmagazine.com/article/2021/08/benefits-cloud-security-posture-assessment">https://fedtechmagazine.com/article/2021/08/benefits-cloud-security-posture-assessment</a></li><li><em>How to Maintain Accountability in a Hybrid Environment</em>: <a href="https://www.darkreading.com/cloud/how-to-maintain-accountability-in-a-hybrid-environment">https://www.darkreading.com/cloud/how-to-maintain-accountability-in-a-hybrid-environment</a></li><li><em>6 Cloud Security Must-Haves–with Help from CSPM, CWPP or CNAPP</em>: <a href="https://www.eweek.com/security/6-cloud-security-must-haves-with-help-from-cspm-cwpp-or-cnapp/">https://www.eweek.com/security/6-cloud-security-must-haves-with-help-from-cspm-cwpp-or-cnapp/</a></li><li><em>The hybrid-cloud security road map</em>: <a href="https://www.techradar.com/news/the-hybrid-cloud-security-road-map">https://www.techradar.com/news/the-hybrid-cloud-security-road-map</a></li><li><em>How Biden’s Cloud Security Executive Order Stacks Up to Industry Expectations</em>: <a href="https://securityintelligence.com/articles/biden-executive-order-industry-expectations/">https://securityintelligence.com/articles/biden-executive-order-industry-expectations/</a></li><li><em>Cloud Security: Adopting a Structured Approach</em>: <a href="https://customerthink.com/cloud-security-adopting-a-structured-approach/">https://customerthink.com/cloud-security-adopting-a-structured-approach/</a></li><li><em>The Overlooked Security Risks of the Cloud</em>: <a href="https://threatpost.com/security-risks-cloud/168754/">https://threatpost.com/security-risks-cloud/168754/</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst Canary. This might take a little bit to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a>, in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, or anything else like that that you can generate in various parts of your environment, wherever you want them to live; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use them. It’s an awesome approach to detecting breaches. I’ve used something similar for years myself before I found them. Check them out. But wait, there’s more because they also have an enterprise option that you should be very much aware of: <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment and manage them centrally. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files that it presents on a fake file store, you get instant alerts. It’s awesome. If you don’t do something like this, instead you’re likely to find out that you’ve gotten breached the very hard way. So, check it out. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I am so glad I found them. I love it.” Again, those URLs are <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. And the first one is free because of course it is. The second one is enterprise-y. You’ll know which one of those you fall into. Take a look. I’m a big fan. More to come from Thinkst Canary weeks ahead.</p><p><br></p><p><br>Jesse: It is 2021. Conference calls and remote meetings have the same decade-old problems. Connection drops, asking if anyone can hear us, asking if anyone can see our screen, even though we can clearly see the platform is in sharing mode with our window front and center. Why is this so hard? We live in the golden age of the cloud.</p><p>Shouldn’t we be easily connecting and sharing like we’re in the same room rather than across the planet? Yes we should. Sure, there have been improvements, and now we can do high-quality video, connect dozens or hundreds of people from everywhere on a webinar, and usually most of us can manage a video meeting with some screen sharing. I don’t understand how we can have Amazon Chime, WebEx, Teams, Zoom, Google Meet—or whatever it’s called this month—GoToMeeting, Adobe Connect, FaceTime, and other options, and still not have a decent way for multiple people to see and hear one another and share a document, or an application, or screen without routine problems. All of these are cloud-based solutions.</p><p>Why do they all suck? When I have to use some of these platforms, I dread the coming meeting. The worst I’ve seen is Amazon Chime—yes, that’s you, Amazon—Microsoft Teams—as always—and Adobe Connect. Oof. The rest are largely similar with more or less the same features and quality, except FaceTime, which is still only a personal use platform and not so great for conferences for work. I just want one of these to not suck so much.</p><p>Meanwhile in the news. <a href="https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward"><em>How to Make Your Next Third-Party Risk Conversation Less Awkward</em></a>. You know that moment. Someone asks a question at the networking event. The deafening silence while you stare at the floor trying to find a way to get out of embarrassing yourself. Do your future self a favor and do some work before this happens again. You’ll feel better and you’ll have better visibility while improving your security posture.</p><p><a href="https://www.itprotoday.com/hybrid-cloud/5-vexing-cloud-security-issues"><em>5 Vexing Cloud Security Issues</em></a>. Unlike the tips and best practices list, this one is a ‘don’t be stupid’ type list. Some of these are foundational basic security steps. Watch out for the zombies.</p><p><a href="https://www.darkreading.com/thr..."></a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>How to Make Your Next Third-Party Risk Conversation Less Awkward</em>: <a href="https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward">https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward</a></li><li><em>5 Vexing Cloud Security Issues</em>: <a href="https://www.itprotoday.com/hybrid-cloud/5-vexing-cloud-security-issues">https://www.itprotoday.com/hybrid-cloud/5-vexing-cloud-security-issues</a></li><li><em>Attackers Increasingly Target Linux in the Cloud</em>: <a href="https://www.darkreading.com/threat-intelligence/attackers-increasingly-target-linux-in-the-cloud">https://www.darkreading.com/threat-intelligence/attackers-increasingly-target-linux-in-the-cloud</a></li><li><em>Top 5 Best Practices for Cloud Security</em>: <a href="https://www.infosecurity-magazine.com/magazine-features/top-5-best-practices-for-cloud/">https://www.infosecurity-magazine.com/magazine-features/top-5-best-practices-for-cloud/</a></li><li><em>Zix Releases 2021 Mid-Year Global Threat Report</em>: <a href="https://www.darkreading.com/cloud/zix-releases-2021-mid-year-global-threat-report">https://www.darkreading.com/cloud/zix-releases-2021-mid-year-global-threat-report</a></li><li><em>The big three innovations transforming cloud security</em>: <a href="https://siliconangle.com/2021/08/21/big-three-innovations-transforming-cloud-security/">https://siliconangle.com/2021/08/21/big-three-innovations-transforming-cloud-security/</a></li><li><em>The Benefits of a Cloud Security Posture Assessment</em>: <a href="https://fedtechmagazine.com/article/2021/08/benefits-cloud-security-posture-assessment">https://fedtechmagazine.com/article/2021/08/benefits-cloud-security-posture-assessment</a></li><li><em>How to Maintain Accountability in a Hybrid Environment</em>: <a href="https://www.darkreading.com/cloud/how-to-maintain-accountability-in-a-hybrid-environment">https://www.darkreading.com/cloud/how-to-maintain-accountability-in-a-hybrid-environment</a></li><li><em>6 Cloud Security Must-Haves–with Help from CSPM, CWPP or CNAPP</em>: <a href="https://www.eweek.com/security/6-cloud-security-must-haves-with-help-from-cspm-cwpp-or-cnapp/">https://www.eweek.com/security/6-cloud-security-must-haves-with-help-from-cspm-cwpp-or-cnapp/</a></li><li><em>The hybrid-cloud security road map</em>: <a href="https://www.techradar.com/news/the-hybrid-cloud-security-road-map">https://www.techradar.com/news/the-hybrid-cloud-security-road-map</a></li><li><em>How Biden’s Cloud Security Executive Order Stacks Up to Industry Expectations</em>: <a href="https://securityintelligence.com/articles/biden-executive-order-industry-expectations/">https://securityintelligence.com/articles/biden-executive-order-industry-expectations/</a></li><li><em>Cloud Security: Adopting a Structured Approach</em>: <a href="https://customerthink.com/cloud-security-adopting-a-structured-approach/">https://customerthink.com/cloud-security-adopting-a-structured-approach/</a></li><li><em>The Overlooked Security Risks of the Cloud</em>: <a href="https://threatpost.com/security-risks-cloud/168754/">https://threatpost.com/security-risks-cloud/168754/</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst Canary. This might take a little bit to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a>, in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, or anything else like that that you can generate in various parts of your environment, wherever you want them to live; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use them. It’s an awesome approach to detecting breaches. I’ve used something similar for years myself before I found them. Check them out. But wait, there’s more because they also have an enterprise option that you should be very much aware of: <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment and manage them centrally. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files that it presents on a fake file store, you get instant alerts. It’s awesome. If you don’t do something like this, instead you’re likely to find out that you’ve gotten breached the very hard way. So, check it out. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I am so glad I found them. I love it.” Again, those URLs are <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. And the first one is free because of course it is. The second one is enterprise-y. You’ll know which one of those you fall into. Take a look. I’m a big fan. More to come from Thinkst Canary weeks ahead.</p><p><br></p><p><br>Jesse: It is 2021. Conference calls and remote meetings have the same decade-old problems. Connection drops, asking if anyone can hear us, asking if anyone can see our screen, even though we can clearly see the platform is in sharing mode with our window front and center. Why is this so hard? We live in the golden age of the cloud.</p><p>Shouldn’t we be easily connecting and sharing like we’re in the same room rather than across the planet? Yes we should. Sure, there have been improvements, and now we can do high-quality video, connect dozens or hundreds of people from everywhere on a webinar, and usually most of us can manage a video meeting with some screen sharing. I don’t understand how we can have Amazon Chime, WebEx, Teams, Zoom, Google Meet—or whatever it’s called this month—GoToMeeting, Adobe Connect, FaceTime, and other options, and still not have a decent way for multiple people to see and hear one another and share a document, or an application, or screen without routine problems. All of these are cloud-based solutions.</p><p>Why do they all suck? When I have to use some of these platforms, I dread the coming meeting. The worst I’ve seen is Amazon Chime—yes, that’s you, Amazon—Microsoft Teams—as always—and Adobe Connect. Oof. The rest are largely similar with more or less the same features and quality, except FaceTime, which is still only a personal use platform and not so great for conferences for work. I just want one of these to not suck so much.</p><p>Meanwhile in the news. <a href="https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward"><em>How to Make Your Next Third-Party Risk Conversation Less Awkward</em></a>. You know that moment. Someone asks a question at the networking event. The deafening silence while you stare at the floor trying to find a way to get out of embarrassing yourself. Do your future self a favor and do some work before this happens again. You’ll feel better and you’ll have better visibility while improving your security posture.</p><p><a href="https://www.itprotoday.com/hybrid-cloud/5-vexing-cloud-security-issues"><em>5 Vexing Cloud Security Issues</em></a>. Unlike the tips and best practices list, this one is a ‘don’t be stupid’ type list. Some of these are foundational basic security steps. Watch out for the zombies.</p><p><a href="https://www.darkreading.com/thr..."></a></p>]]>
      </content:encoded>
      <pubDate>Thu, 26 Aug 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/dc54345b/135443f1.mp3" length="14680892" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>606</itunes:duration>
      <itunes:summary>In the age of Zoom, Google Meet, and all the other various offenders—why do our conference calls still suck? Well, this week Jesse has some insight into how even now, in 2021, sometimes our meetings can feel like an overseas Skype call in 2010. Tune in for his take!

In the news: top five security issues to watch out for, attackers laucnhing assualts agains Linux in the cloud, the three biggest inovations tha thave transformed cloud security, and more! </itunes:summary>
      <itunes:subtitle>In the age of Zoom, Google Meet, and all the other various offenders—why do our conference calls still suck? Well, this week Jesse has some insight into how even now, in 2021, sometimes our meetings can feel like an overseas Skype call in 2010. Tune in fo</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dc54345b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Attacks, Tools, and Ails</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Attacks, Tools, and Ails</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ec20dad1-7afc-4062-94e9-09dfc053838e</guid>
      <link>https://share.transistor.fm/s/b306e02b</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>AWS Cancels re:Inforce Security Conference in Houston Due to COVID-19</em>: <a href="https://www.crn.com/news/cloud/aws-cancels-re-inforce-security-conference-in-houston-due-to-covid-19">https://www.crn.com/news/cloud/aws-cancels-re-inforce-security-conference-in-houston-due-to-covid-19</a></li><li><em>Cloud-native security benefits and use cases</em>: <a href="https://searchcloudsecurity.techtarget.com/tip/Cloud-native-security-benefits-and-use-cases">https://searchcloudsecurity.techtarget.com/tip/cloud-native-security-benefits-and-use-cases</a></li><li><em>The state of cloud security: IaC becomes priority one</em>: <a href="https://techbeacon.com/security/state-cloud-security-iac-becomes-priority-one">https://techbeacon.com/security/state-cloud-security-iac-becomes-priority-one</a></li><li><em>Takeaways from Gartner’s 2021 Hype Cycle for Cloud Security report</em>: <a href="https://venturebeat.com/2021/08/12/takeaways-from-gartners-2021-hype-cycle-for-cloud-security-report/">https://venturebeat.com/2021/08/12/takeaways-from-gartners-2021-hype-cycle-for-cloud-security-report/</a></li><li><em>IBM upgrades its Big Iron OS for better cloud, security, and AI support</em>: <a href="https://www.networkworld.com/article/3626486/ibm-upgrades-its-big-iron-os-for-better-cloud-security-and-ai-support.html">https://www.networkworld.com/article/3626486/ibm-upgrades-its-big-iron-os-for-better-cloud-security-and-ai-support.html</a></li><li><em>Securing cloud environments is more important than ever</em>: <a href="https://federalnewsnetwork.com/commentary/2021/08/securing-cloud-environments-is-more-important-than-ever/">https://federalnewsnetwork.com/commentary/2021/08/securing-cloud-environments-is-more-important-than-ever/</a></li><li><em>The Misunderstood Security Risks of Behavior Analytics, AI &amp; ML</em>: <a href="https://www.darkreading.com/risk/the-misunderstood-security-risks-of-behavior-analytics-ai-ml">https://www.darkreading.com/risk/the-misunderstood-security-risks-of-behavior-analytics-ai-ml</a></li><li><em>Accenture Says it ‘Detected Irregular Activity,’ Restored Systems from Backup</em>: <a href="https://www.darkreading.com/attacks-breaches/accenture-detected-irregular-activity-">https://www.darkreading.com/attacks-breaches/accenture-detected-irregular-activity-</a></li><li><em>Google Releases Tool to Help Developers Enforce Security</em>: <a href="https://www.darkreading.com/application-security/google-releases-tool-to-help-developers-enforce-security">https://www.darkreading.com/application-security/google-releases-tool-to-help-developers-enforce-security</a></li><li><em>How to Make Your Next Third-Party Risk Conversation Less Awkward</em>: <a href="https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward">https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward</a></li><li><em>Cost of Cyberattacks Significantly Higher for Smaller Healthcare Organizations</em>: <a href="https://www.darkreading.com/threat-intelligence/healthcare-sees-more-attacks-with-costs-higher-for-smaller-groups">https://www.darkreading.com/threat-intelligence/healthcare-sees-more-attacks-with-costs-higher-for-smaller-groups</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst Canary. This might take a little bit to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a>, in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, or anything else like that that you can generate in various parts of your environment, wherever you want them to live; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use them. It’s an awesome approach to detecting breaches. I’ve used something similar for years myself before I found them. Check them out. But wait, there’s more because they also have an enterprise option that you should be very much aware of: <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment and manage them centrally. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files that it presents on a fake file store, you get instant alerts. It’s awesome. If you don’t do something like this, instead you’re likely to find out that you’ve gotten breached the very hard way. So, check it out. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I am so glad I found them. I love it.” Again, those URLs are <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. And the first one is free because of course it is. The second one is enterprise-y. You’ll know which one of those you fall into. Take a look. I’m a big fan. More to come from Thinkst Canary weeks ahead.</p><p>Jesse: There are many types of attacks that result in security breaches. To understand how many of them work, you need to understand how software languages function and how the hardware operations work in memory and in the CPU. However, you can learn a lot about security without having to learn those things. You can look at some of the attack vectors and gain a high-level understanding of what is happening. For example, man in the middle, or MITM, attacks are when someone inserts malicious code into the communication of two entities. That MITM service will capture communications, make a copy, then send it along like normal.</p><p>A buffer overflow happens when the allocated memory space for some type of input–whether its contents of a file or dialog boxes and the like—is less than the amount of input. In simpler terms, there is a bucket available for input. The attacker pours more water into the bucket than the bucket can handle. The result is that code in memory could be overwritten and become executable. So, you can learn about security flaws without digging under the surface to see what is actually happening. However, I strongly urge anyone doing security-related things to learn more about these attack types, and the others.</p><p>Meanwhile in the News. <a href="https://www.crn.com/news/cloud/aws-cancels-re-inforce-security-conference-in-houston-due-to-covid-19"><em>AWS Cancels re:Inforce Security Conference in Houston Due to COVID-19</em></a>. The closings have begun. Dust off those creator lights, and prep that mic on your desk. In the wake of last year’s lockdowns and sudden remote working, there was a huge spike in phishing and other scams. Don’t be caught in this round.</p><p><a href="https://searchcloudsecurity.techtarget.com/tip/Cloud-native-security-benefits-and-use-cases"><em>Cloud-native security benefits and use cases</em></a>. If you have a multi-cloud or a hybrid SaaS and self-managed systems in cloud providers or in data centers, it’s possible you need different security tools. Don’t go all cloud-native just because you have an initiative to do so. Slow down <br>and ensure your security meets the needs of all your technology and services, not just the new and shiny ones.</p><p><a href="https://techbeacon.com/security/state-cloud-security-iac-becomes-priority-one"><em>The state of cloud security: IaC becomes priority one</em></a>...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>AWS Cancels re:Inforce Security Conference in Houston Due to COVID-19</em>: <a href="https://www.crn.com/news/cloud/aws-cancels-re-inforce-security-conference-in-houston-due-to-covid-19">https://www.crn.com/news/cloud/aws-cancels-re-inforce-security-conference-in-houston-due-to-covid-19</a></li><li><em>Cloud-native security benefits and use cases</em>: <a href="https://searchcloudsecurity.techtarget.com/tip/Cloud-native-security-benefits-and-use-cases">https://searchcloudsecurity.techtarget.com/tip/cloud-native-security-benefits-and-use-cases</a></li><li><em>The state of cloud security: IaC becomes priority one</em>: <a href="https://techbeacon.com/security/state-cloud-security-iac-becomes-priority-one">https://techbeacon.com/security/state-cloud-security-iac-becomes-priority-one</a></li><li><em>Takeaways from Gartner’s 2021 Hype Cycle for Cloud Security report</em>: <a href="https://venturebeat.com/2021/08/12/takeaways-from-gartners-2021-hype-cycle-for-cloud-security-report/">https://venturebeat.com/2021/08/12/takeaways-from-gartners-2021-hype-cycle-for-cloud-security-report/</a></li><li><em>IBM upgrades its Big Iron OS for better cloud, security, and AI support</em>: <a href="https://www.networkworld.com/article/3626486/ibm-upgrades-its-big-iron-os-for-better-cloud-security-and-ai-support.html">https://www.networkworld.com/article/3626486/ibm-upgrades-its-big-iron-os-for-better-cloud-security-and-ai-support.html</a></li><li><em>Securing cloud environments is more important than ever</em>: <a href="https://federalnewsnetwork.com/commentary/2021/08/securing-cloud-environments-is-more-important-than-ever/">https://federalnewsnetwork.com/commentary/2021/08/securing-cloud-environments-is-more-important-than-ever/</a></li><li><em>The Misunderstood Security Risks of Behavior Analytics, AI &amp; ML</em>: <a href="https://www.darkreading.com/risk/the-misunderstood-security-risks-of-behavior-analytics-ai-ml">https://www.darkreading.com/risk/the-misunderstood-security-risks-of-behavior-analytics-ai-ml</a></li><li><em>Accenture Says it ‘Detected Irregular Activity,’ Restored Systems from Backup</em>: <a href="https://www.darkreading.com/attacks-breaches/accenture-detected-irregular-activity-">https://www.darkreading.com/attacks-breaches/accenture-detected-irregular-activity-</a></li><li><em>Google Releases Tool to Help Developers Enforce Security</em>: <a href="https://www.darkreading.com/application-security/google-releases-tool-to-help-developers-enforce-security">https://www.darkreading.com/application-security/google-releases-tool-to-help-developers-enforce-security</a></li><li><em>How to Make Your Next Third-Party Risk Conversation Less Awkward</em>: <a href="https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward">https://www.darkreading.com/vulnerabilities-threats/how-to-make-your-next-third-party-risk-conversation-less-awkward</a></li><li><em>Cost of Cyberattacks Significantly Higher for Smaller Healthcare Organizations</em>: <a href="https://www.darkreading.com/threat-intelligence/healthcare-sees-more-attacks-with-costs-higher-for-smaller-groups">https://www.darkreading.com/threat-intelligence/healthcare-sees-more-attacks-with-costs-higher-for-smaller-groups</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst Canary. This might take a little bit to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a>, in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, or anything else like that that you can generate in various parts of your environment, wherever you want them to live; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use them. It’s an awesome approach to detecting breaches. I’ve used something similar for years myself before I found them. Check them out. But wait, there’s more because they also have an enterprise option that you should be very much aware of: <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment and manage them centrally. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files that it presents on a fake file store, you get instant alerts. It’s awesome. If you don’t do something like this, instead you’re likely to find out that you’ve gotten breached the very hard way. So, check it out. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I am so glad I found them. I love it.” Again, those URLs are <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. And the first one is free because of course it is. The second one is enterprise-y. You’ll know which one of those you fall into. Take a look. I’m a big fan. More to come from Thinkst Canary weeks ahead.</p><p>Jesse: There are many types of attacks that result in security breaches. To understand how many of them work, you need to understand how software languages function and how the hardware operations work in memory and in the CPU. However, you can learn a lot about security without having to learn those things. You can look at some of the attack vectors and gain a high-level understanding of what is happening. For example, man in the middle, or MITM, attacks are when someone inserts malicious code into the communication of two entities. That MITM service will capture communications, make a copy, then send it along like normal.</p><p>A buffer overflow happens when the allocated memory space for some type of input–whether its contents of a file or dialog boxes and the like—is less than the amount of input. In simpler terms, there is a bucket available for input. The attacker pours more water into the bucket than the bucket can handle. The result is that code in memory could be overwritten and become executable. So, you can learn about security flaws without digging under the surface to see what is actually happening. However, I strongly urge anyone doing security-related things to learn more about these attack types, and the others.</p><p>Meanwhile in the News. <a href="https://www.crn.com/news/cloud/aws-cancels-re-inforce-security-conference-in-houston-due-to-covid-19"><em>AWS Cancels re:Inforce Security Conference in Houston Due to COVID-19</em></a>. The closings have begun. Dust off those creator lights, and prep that mic on your desk. In the wake of last year’s lockdowns and sudden remote working, there was a huge spike in phishing and other scams. Don’t be caught in this round.</p><p><a href="https://searchcloudsecurity.techtarget.com/tip/Cloud-native-security-benefits-and-use-cases"><em>Cloud-native security benefits and use cases</em></a>. If you have a multi-cloud or a hybrid SaaS and self-managed systems in cloud providers or in data centers, it’s possible you need different security tools. Don’t go all cloud-native just because you have an initiative to do so. Slow down <br>and ensure your security meets the needs of all your technology and services, not just the new and shiny ones.</p><p><a href="https://techbeacon.com/security/state-cloud-security-iac-becomes-priority-one"><em>The state of cloud security: IaC becomes priority one</em></a>...</p>]]>
      </content:encoded>
      <pubDate>Thu, 19 Aug 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/b306e02b/53c90ee5.mp3" length="14675876" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>606</itunes:duration>
      <itunes:summary>How do you understand attacks? This week Jesse tells us. The function of software languages, and how hardware memory works are places to start. Join Jesse as he takes a look at the attacks that often result in security breaches and offers some advice on how to alleviate them. 

In the news: re:Inforce canceled in Houston, cue Marty Robbin’s for IBM’s Big Iron,  how small healthcare is under threat from cyberattacks, and more!</itunes:summary>
      <itunes:subtitle>How do you understand attacks? This week Jesse tells us. The function of software languages, and how hardware memory works are places to start. Join Jesse as he takes a look at the attacks that often result in security breaches and offers some advice on h</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b306e02b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Castle is Lost</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>The Castle is Lost</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">83afbb4d-989e-4006-972b-4aac05746530</guid>
      <link>https://share.transistor.fm/s/a695ae70</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Cloud Security Basics CIOs and CTOs Should Know</em>: <a href="https://www.informationweek.com/cloud/cloud-security-basics-cios-and-ctos-should-know/a/d-id/1341578?">https://www.informationweek.com/cloud/cloud-security-basics-cios-and-ctos-should-know/a/d-id/1341578?</a></li><li><em>Spring 2021 PCI DSS report now available with nine services added in scope</em>: <a href="https://aws.amazon.com/blogs/security/spring-2021-pci-dss-report-now-available-with-nine-services-added-in-scope/">https://aws.amazon.com/blogs/security/spring-2021-pci-dss-report-now-available-with-nine-services-added-in-scope/</a></li><li><em>Top 5 Benefits of Cloud Infrastructure Security</em>: <a href="https://www.kratikal.com/blog/top-5-benefits-of-cloud-infrastructure-security/">https://www.kratikal.com/blog/top-5-benefits-of-cloud-infrastructure-security/</a></li><li><em>The three most important AWS WAF rate-based rules</em>: <a href="https://aws.amazon.com/blogs/security/three-most-important-aws-waf-rate-based-rules/">https://aws.amazon.com/blogs/security/three-most-important-aws-waf-rate-based-rules/</a></li><li><em>Researchers Call for ‘CVE’ Approach for Cloud Vulnerabilities</em>: <a href="https://www.darkreading.com/cloud/researchers-call-for-cve-approach-for-cloud-vulnerabilities">https://www.darkreading.com/cloud/researchers-call-for-cve-approach-for-cloud-vulnerabilities</a></li><li><em>Managed Private Cloud: It’s all About Simplification</em>: <a href="https://www.computerworld.com/article/3623118/managed-private-cloud-its-all-about-simplification.html">https://www.computerworld.com/article/3623118/managed-private-cloud-its-all-about-simplification.html</a></li><li><em>100 percent of companies experience public cloud security incidents</em>: <a href="https://betanews.com/2021/08/04/100-percent-public-cloud-security-incidents/">https://betanews.com/2021/08/04/100-percent-public-cloud-security-incidents/</a></li><li><em>Why cloud security is the key to unlocking value from hybrid working</em>: <a href="https://www.welivesecurity.com/2021/08/05/why-cloud-security-key-unlocking-value-hybrid-working/">https://www.welivesecurity.com/2021/08/05/why-cloud-security-key-unlocking-value-hybrid-working/</a></li><li><em>Organizations Still Struggle to Hire &amp; Retain Infosec Employees: Report</em>: <a href="https://www.darkreading.com/careers-and-people/organizations-still-struggle-to-hire-retain-infosec-employees-report">https://www.darkreading.com/careers-and-people/organizations-still-struggle-to-hire-retain-infosec-employees-report</a></li><li><em>NSA, CISA release Kubernetes Hardening Guidance</em>: <a href="https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2716980/nsa-cisa-release-kubernetes-hardening-guidance/">https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2716980/nsa-cisa-release-kubernetes-hardening-guidance/</a></li><li><em>HTTP/2 Implementation Errors Exposing Websites to Serious Risks</em>: <a href="https://www.darkreading.com/application-security/http-2-implementation-errors-exposing-websites-to-serious-risks">https://www.darkreading.com/application-security/http-2-implementation-errors-exposing-websites-to-serious-risks</a></li><li><em>Ransomware Gangs and the Name Game Distraction</em>: <a href="https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/">https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/</a></li><li><em>Using versioning in S3 buckets</em>: <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/Versioning.html">https://docs.aws.amazon.com/AmazonS3/latest/userguide/Versioning.html</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst. This is going to take a minute to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a>, in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, that sort of thing in various parts of your environment, wherever you want to; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use those things. It’s an awesome approach. I’ve used something similar for years. Check them out. But wait, there’s more. They also have an enterprise option that you should be very much aware of: <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files on it, you get instant alerts. It’s awesome. If you don’t do something like this, you’re likely to find out that you’ve gotten breached, the hard way. Take a look at this. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I love it.” That’s <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. The first one is free. The second one is enterprise-y. Take a look. I’m a big fan of this. More from them in the coming weeks.</p><p>Jesse: The general theme in security news and trends show us that perimeter defense has a whole new meaning. There is no large perimeter anymore. Nearly every device is on a public or otherwise hostile network, from servers to phones to laptops. Every device needs scanning, protecting, monitoring, and analyzing. None of these devices can be viewed in a vacuum, as separate entities without the context of behavior of systems and services accessed from across a network.</p><p>This is why zero trust and cloud native applications and services go so well in these hard times. If you can’t trust anything without checking on current events, then you have to authenticate and analyze in real-time to determine if something is safe to allow. In the ancient days of yore, everything was default allow and you stopped things you knew were bad. Then along came default deny, where you allowed only those things you white listed. But that was a full-time allowance of bad things to happen when an account was compromised.</p><p>Ditch the white list and just implement real-time contextual security. If you do this, does it really matter if someone gets a hostile device on your network? Nope. If you treat everything, including owned and managed assets, as hostile, some new unmanaged device or service doesn’t change your operations or exposure much if at all.</p><p>Meanwhile in the news. <a href="https://www.informationweek.com/cloud/cloud-security-basics-cios-and-ctos-should-know/a/d-id/1341578"><em>Cloud Security Basics CIOs and CTOs Should Know</em></a>. Some of the critical things non-cybersecurity execs ought to know: moving to the cloud isn’t a security easy button, cybersecurity insurance generally sucks, and moving to the cloud takes a lot more work than people think to get operationally secure.</p><p><br></p><p><br><a href="https://aws.amazon.com/blogs/security/spring-2021-pci-dss-report-now-available-with-nine-services-added-in-scope/"><em>Spring 2021 PCI DSS report now available with nine services added in scope</em></a>. When you do compliance and use cloud infrastructures and SaaS services, you need to prove your services support compliance requirements. This AWS report can help. Also, review the new services added to see if you can improve your service delivery and applicatio...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Cloud Security Basics CIOs and CTOs Should Know</em>: <a href="https://www.informationweek.com/cloud/cloud-security-basics-cios-and-ctos-should-know/a/d-id/1341578?">https://www.informationweek.com/cloud/cloud-security-basics-cios-and-ctos-should-know/a/d-id/1341578?</a></li><li><em>Spring 2021 PCI DSS report now available with nine services added in scope</em>: <a href="https://aws.amazon.com/blogs/security/spring-2021-pci-dss-report-now-available-with-nine-services-added-in-scope/">https://aws.amazon.com/blogs/security/spring-2021-pci-dss-report-now-available-with-nine-services-added-in-scope/</a></li><li><em>Top 5 Benefits of Cloud Infrastructure Security</em>: <a href="https://www.kratikal.com/blog/top-5-benefits-of-cloud-infrastructure-security/">https://www.kratikal.com/blog/top-5-benefits-of-cloud-infrastructure-security/</a></li><li><em>The three most important AWS WAF rate-based rules</em>: <a href="https://aws.amazon.com/blogs/security/three-most-important-aws-waf-rate-based-rules/">https://aws.amazon.com/blogs/security/three-most-important-aws-waf-rate-based-rules/</a></li><li><em>Researchers Call for ‘CVE’ Approach for Cloud Vulnerabilities</em>: <a href="https://www.darkreading.com/cloud/researchers-call-for-cve-approach-for-cloud-vulnerabilities">https://www.darkreading.com/cloud/researchers-call-for-cve-approach-for-cloud-vulnerabilities</a></li><li><em>Managed Private Cloud: It’s all About Simplification</em>: <a href="https://www.computerworld.com/article/3623118/managed-private-cloud-its-all-about-simplification.html">https://www.computerworld.com/article/3623118/managed-private-cloud-its-all-about-simplification.html</a></li><li><em>100 percent of companies experience public cloud security incidents</em>: <a href="https://betanews.com/2021/08/04/100-percent-public-cloud-security-incidents/">https://betanews.com/2021/08/04/100-percent-public-cloud-security-incidents/</a></li><li><em>Why cloud security is the key to unlocking value from hybrid working</em>: <a href="https://www.welivesecurity.com/2021/08/05/why-cloud-security-key-unlocking-value-hybrid-working/">https://www.welivesecurity.com/2021/08/05/why-cloud-security-key-unlocking-value-hybrid-working/</a></li><li><em>Organizations Still Struggle to Hire &amp; Retain Infosec Employees: Report</em>: <a href="https://www.darkreading.com/careers-and-people/organizations-still-struggle-to-hire-retain-infosec-employees-report">https://www.darkreading.com/careers-and-people/organizations-still-struggle-to-hire-retain-infosec-employees-report</a></li><li><em>NSA, CISA release Kubernetes Hardening Guidance</em>: <a href="https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2716980/nsa-cisa-release-kubernetes-hardening-guidance/">https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2716980/nsa-cisa-release-kubernetes-hardening-guidance/</a></li><li><em>HTTP/2 Implementation Errors Exposing Websites to Serious Risks</em>: <a href="https://www.darkreading.com/application-security/http-2-implementation-errors-exposing-websites-to-serious-risks">https://www.darkreading.com/application-security/http-2-implementation-errors-exposing-websites-to-serious-risks</a></li><li><em>Ransomware Gangs and the Name Game Distraction</em>: <a href="https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/">https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/</a></li><li><em>Using versioning in S3 buckets</em>: <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/Versioning.html">https://docs.aws.amazon.com/AmazonS3/latest/userguide/Versioning.html</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst. This is going to take a minute to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a>, in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, that sort of thing in various parts of your environment, wherever you want to; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use those things. It’s an awesome approach. I’ve used something similar for years. Check them out. But wait, there’s more. They also have an enterprise option that you should be very much aware of: <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files on it, you get instant alerts. It’s awesome. If you don’t do something like this, you’re likely to find out that you’ve gotten breached, the hard way. Take a look at this. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I love it.” That’s <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. The first one is free. The second one is enterprise-y. Take a look. I’m a big fan of this. More from them in the coming weeks.</p><p>Jesse: The general theme in security news and trends show us that perimeter defense has a whole new meaning. There is no large perimeter anymore. Nearly every device is on a public or otherwise hostile network, from servers to phones to laptops. Every device needs scanning, protecting, monitoring, and analyzing. None of these devices can be viewed in a vacuum, as separate entities without the context of behavior of systems and services accessed from across a network.</p><p>This is why zero trust and cloud native applications and services go so well in these hard times. If you can’t trust anything without checking on current events, then you have to authenticate and analyze in real-time to determine if something is safe to allow. In the ancient days of yore, everything was default allow and you stopped things you knew were bad. Then along came default deny, where you allowed only those things you white listed. But that was a full-time allowance of bad things to happen when an account was compromised.</p><p>Ditch the white list and just implement real-time contextual security. If you do this, does it really matter if someone gets a hostile device on your network? Nope. If you treat everything, including owned and managed assets, as hostile, some new unmanaged device or service doesn’t change your operations or exposure much if at all.</p><p>Meanwhile in the news. <a href="https://www.informationweek.com/cloud/cloud-security-basics-cios-and-ctos-should-know/a/d-id/1341578"><em>Cloud Security Basics CIOs and CTOs Should Know</em></a>. Some of the critical things non-cybersecurity execs ought to know: moving to the cloud isn’t a security easy button, cybersecurity insurance generally sucks, and moving to the cloud takes a lot more work than people think to get operationally secure.</p><p><br></p><p><br><a href="https://aws.amazon.com/blogs/security/spring-2021-pci-dss-report-now-available-with-nine-services-added-in-scope/"><em>Spring 2021 PCI DSS report now available with nine services added in scope</em></a>. When you do compliance and use cloud infrastructures and SaaS services, you need to prove your services support compliance requirements. This AWS report can help. Also, review the new services added to see if you can improve your service delivery and applicatio...</p>]]>
      </content:encoded>
      <pubDate>Thu, 12 Aug 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/a695ae70/7ec329e2.mp3" length="14085882" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>582</itunes:duration>
      <itunes:summary>Man the perimeter! This week Jesse divulges some of the latest on perimeter defense, to include recent news thats changed how its done! There is no large perimeter anymore. These days everything thats on a network is subject to security risks. Be it a phone, computer, or any other device.  Tune in for how to keep your guard up!

In the news: cloud security basics for CIOs and CTOs, simplify that private cloud, ransomware gangs on the prowl, and more!</itunes:summary>
      <itunes:subtitle>Man the perimeter! This week Jesse divulges some of the latest on perimeter defense, to include recent news thats changed how its done! There is no large perimeter anymore. These days everything thats on a network is subject to security risks. Be it a pho</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a695ae70/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Security Summer Camp</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Security Summer Camp</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">36dfcde3-8dac-49bb-9490-7d7173d98145</guid>
      <link>https://share.transistor.fm/s/fe3e83d2</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>4 Factors that Should Be Part of Your Cybersecurity Strategy</em>: <a href="https://www.csoonline.com/article/3625254/4-factors-that-should-be-part-of-your-cybersecurity-strategy.html">https://www.csoonline.com/article/3625254/4-factors-that-should-be-part-of-your-cybersecurity-strategy.html</a></li><li><em>Software Bill of Materials’—not just good for security, good for business</em>: <a href="https://thehill.com/opinion/cybersecurity/564787-software-bill-of-materials-not-just-good-for-security-good-for-business">https://thehill.com/opinion/cybersecurity/564787-software-bill-of-materials-not-just-good-for-security-good-for-business</a></li><li><em>Third Party Security Failure Caused 1 TB Data Breach at Saudi Aramco; Hackers Play Puzzle Games With Oil Giant</em>: <a href="https://www.cpomagazine.com/cyber-security/third-party-security-failure-caused-1-tb-data-breach-at-saudi-aramco-hackers-play-puzzle-games-with-oil-giant/amp/">https://www.cpomagazine.com/cyber-security/third-party-security-failure-caused-1-tb-data-breach-at-saudi-aramco-hackers-play-puzzle-games-with-oil-giant/amp/</a></li><li><em>Federal Tech Leaders Outline Future of FedRAMP</em>: <a href="https://governmentciomedia.com/federal-tech-leaders-outline-future-fedramp">https://governmentciomedia.com/federal-tech-leaders-outline-future-fedramp</a></li><li><em>‘Holy moly!’: Inside Texas’ fight against a ransomware hack</em>: <a href="https://apnews.com/article/technology-government-and-politics-business-texas-hacking-47e23be2d9d90d67383c1bd6cee5aef7">https://apnews.com/article/technology-government-and-politics-business-texas-hacking-47e23be2d9d90d67383c1bd6cee5aef7</a></li><li><em>Firefox 90 Drops Support for FTP Protocol</em>: <a href="https://www.securityweek.com/firefox-90-drops-support-ftp-protocol">https://www.securityweek.com/firefox-90-drops-support-ftp-protocol</a></li><li><em>Lower-Level Employees Become Top Spear-Phishing Targets</em>: <a href="https://www.darkreading.com/attacks-breaches/lower-level-employees-become-top-spearphishing-targets">https://www.darkreading.com/attacks-breaches/lower-level-employees-become-top-spearphishing-targets</a></li><li><em>U.S. Government unlikely to ban ransomware payments</em>: https://U.S. Government unlikely to ban ransomware payments</li><li><em>The Power of Comedy for Cybersecurity Awareness Training</em>: <a href="https://www.darkreading.com/careers-and-people/the-power-of-comedy-for-cybersecurity-awareness-training">https://www.darkreading.com/careers-and-people/the-power-of-comedy-for-cybersecurity-awareness-training</a></li><li><em>Inside the Famed Black Hat NOC</em>: <a href="https://www.darkreading.com/edge-articles/inside-the-famed-black-hat-noc">https://www.darkreading.com/edge-articles/inside-the-famed-black-hat-noc</a></li><li><em>Cloud Security Alliance Releases Guide to Facilitate Cloud Threat Modeling</em>: <a href="https://cloudsecurityalliance.org/press-releases/2021/07/29/cloud-security-alliance-releases-guide-to-facilitate-cloud-threat-modeling/">https://cloudsecurityalliance.org/press-releases/2021/07/29/cloud-security-alliance-releases-guide-to-facilitate-cloud-threat-modeling/</a></li><li><em>5 Benefits of Disaster Recovery in the Cloud</em>: <a href="https://securityboulevard.com/2021/08/5-benefits-of-disaster-recovery-in-the-cloud/">https://securityboulevard.com/2021/08/5-benefits-of-disaster-recovery-in-the-cloud/</a></li><li><em>Black Hat USA 2021 and DEF CON 29: What to expect from the security events</em>: <a href="https://www.techrepublic.com/article/black-hat-usa-2021-and-def-con-29-what-to-expect-from-the-security-events/">https://www.techrepublic.com/article/black-hat-usa-2021-and-def-con-29-what-to-expect-from-the-security-events/</a></li></ul><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst. This is going to take a minute to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a> in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, that sort of thing in various parts of your environment, wherever you want to; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use those things. It’s an awesome approach. I’ve used something similar for years. Check them out. But wait, there’s more. They also have an enterprise option that you should be very much aware of <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files on it, you get instant alerts. It’s awesome. If you don’t do something like this, you’re likely to find out that you’ve gotten breached, the hard way. Take a look at this. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I love it.” That’s <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. The first one is free. The second one is enterprise-y. Take a look. I’m a big fan of this. More from them in the coming weeks.</p><p>Jesse: As more services are delivered by cloud-native microservices with dynamic scaling, compliance management and monitoring becomes terrifyingly complex and difficult. The way around this is to implement processes and tools that can continuously monitor and manage compliance-related configurations using automated analysis and reporting of your cloud-native services. This collection of processes and tools is called Cloud Security Posture Management, or CSPM. CSPM generally involves a fair amount of automation to ensure secure practices are used and compliance requirements are continuously met. Implementing CSPM alongside DevSecOps and an organizational focus on shifting left in services development rounds out a tripod to support your cloud initiatives.</p><p><br></p><p><br>Meanwhile, in the news. <a href="https://www.csoonline.com/article/3625254/4-factors-that-should-be-part-of-your-cybersecurity-strategy.html"><em>4 Factors that Should Be Part of Your Cybersecurity Strategy</em></a>. Our security perimeters are no longer controlled by our organizations. With so many people working remote, every device on their network has become part of the threat landscape, from connected fridges to game consoles.</p><p><a href="https://thehill.com/opinion/cybersecurity/564787-software-bill-of-materials-not-just-good-for-security-good-for-business">‘Software Bill of Materials’—not just good for security, good for business</a>. SBOMs, as they’re called, are coming. Even if there is never a law forcing SBOMs like food ingredients labels, there could be an ever-increasing requirement for vendors to supply them. It might be a good idea <br>to start building these, even if they’re only supplied when legally or contractually required.</p><p><br></p><p><br><a href="https://www.cpomagazine.com/cyber-security/third-party-security-failure-caused-1-tb-data-breach-at-saudi-aramco-hackers-play-puzzle-games-with-oil-giant/amp/"><em>Third Party Security Failure Caused 1 TB Data Breach at Saudi Aramco; Hackers Play Puzzle Games With Oil Giant</em></a>. This case study is like slowing down to see the aftermath of a crash and trying to piece together what happened. Given the breach came from a vendor, it’s a sideways attack on Aramco. Are you sure your vendo...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>4 Factors that Should Be Part of Your Cybersecurity Strategy</em>: <a href="https://www.csoonline.com/article/3625254/4-factors-that-should-be-part-of-your-cybersecurity-strategy.html">https://www.csoonline.com/article/3625254/4-factors-that-should-be-part-of-your-cybersecurity-strategy.html</a></li><li><em>Software Bill of Materials’—not just good for security, good for business</em>: <a href="https://thehill.com/opinion/cybersecurity/564787-software-bill-of-materials-not-just-good-for-security-good-for-business">https://thehill.com/opinion/cybersecurity/564787-software-bill-of-materials-not-just-good-for-security-good-for-business</a></li><li><em>Third Party Security Failure Caused 1 TB Data Breach at Saudi Aramco; Hackers Play Puzzle Games With Oil Giant</em>: <a href="https://www.cpomagazine.com/cyber-security/third-party-security-failure-caused-1-tb-data-breach-at-saudi-aramco-hackers-play-puzzle-games-with-oil-giant/amp/">https://www.cpomagazine.com/cyber-security/third-party-security-failure-caused-1-tb-data-breach-at-saudi-aramco-hackers-play-puzzle-games-with-oil-giant/amp/</a></li><li><em>Federal Tech Leaders Outline Future of FedRAMP</em>: <a href="https://governmentciomedia.com/federal-tech-leaders-outline-future-fedramp">https://governmentciomedia.com/federal-tech-leaders-outline-future-fedramp</a></li><li><em>‘Holy moly!’: Inside Texas’ fight against a ransomware hack</em>: <a href="https://apnews.com/article/technology-government-and-politics-business-texas-hacking-47e23be2d9d90d67383c1bd6cee5aef7">https://apnews.com/article/technology-government-and-politics-business-texas-hacking-47e23be2d9d90d67383c1bd6cee5aef7</a></li><li><em>Firefox 90 Drops Support for FTP Protocol</em>: <a href="https://www.securityweek.com/firefox-90-drops-support-ftp-protocol">https://www.securityweek.com/firefox-90-drops-support-ftp-protocol</a></li><li><em>Lower-Level Employees Become Top Spear-Phishing Targets</em>: <a href="https://www.darkreading.com/attacks-breaches/lower-level-employees-become-top-spearphishing-targets">https://www.darkreading.com/attacks-breaches/lower-level-employees-become-top-spearphishing-targets</a></li><li><em>U.S. Government unlikely to ban ransomware payments</em>: https://U.S. Government unlikely to ban ransomware payments</li><li><em>The Power of Comedy for Cybersecurity Awareness Training</em>: <a href="https://www.darkreading.com/careers-and-people/the-power-of-comedy-for-cybersecurity-awareness-training">https://www.darkreading.com/careers-and-people/the-power-of-comedy-for-cybersecurity-awareness-training</a></li><li><em>Inside the Famed Black Hat NOC</em>: <a href="https://www.darkreading.com/edge-articles/inside-the-famed-black-hat-noc">https://www.darkreading.com/edge-articles/inside-the-famed-black-hat-noc</a></li><li><em>Cloud Security Alliance Releases Guide to Facilitate Cloud Threat Modeling</em>: <a href="https://cloudsecurityalliance.org/press-releases/2021/07/29/cloud-security-alliance-releases-guide-to-facilitate-cloud-threat-modeling/">https://cloudsecurityalliance.org/press-releases/2021/07/29/cloud-security-alliance-releases-guide-to-facilitate-cloud-threat-modeling/</a></li><li><em>5 Benefits of Disaster Recovery in the Cloud</em>: <a href="https://securityboulevard.com/2021/08/5-benefits-of-disaster-recovery-in-the-cloud/">https://securityboulevard.com/2021/08/5-benefits-of-disaster-recovery-in-the-cloud/</a></li><li><em>Black Hat USA 2021 and DEF CON 29: What to expect from the security events</em>: <a href="https://www.techrepublic.com/article/black-hat-usa-2021-and-def-con-29-what-to-expect-from-the-security-events/">https://www.techrepublic.com/article/black-hat-usa-2021-and-def-con-29-what-to-expect-from-the-security-events/</a></li></ul><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Corey: This episode is sponsored in part by Thinkst. This is going to take a minute to explain, so bear with me. I linked against an early version of their tool, <a href="https://canarytokens.org/">canarytokens.org</a> in the very early days of my newsletter, and what it does is relatively simple and straightforward. It winds up embedding credentials, files, that sort of thing in various parts of your environment, wherever you want to; it gives you fake AWS API credentials, for example. And the only thing that these things do is alert you whenever someone attempts to use those things. It’s an awesome approach. I’ve used something similar for years. Check them out. But wait, there’s more. They also have an enterprise option that you should be very much aware of <a href="https://canary.tools/">canary.tools</a>. You can take a look at this, but what it does is it provides an enterprise approach to drive these things throughout your entire environment. You can get a physical device that hangs out on your network and impersonates whatever you want to. When it gets Nmap scanned, or someone attempts to log into it, or access files on it, you get instant alerts. It’s awesome. If you don’t do something like this, you’re likely to find out that you’ve gotten breached, the hard way. Take a look at this. It’s one of those few things that I look at and say, “Wow, that is an amazing idea. I love it.” That’s <a href="https://canarytokens.org/">canarytokens.org</a> and <a href="https://canary.tools/">canary.tools</a>. The first one is free. The second one is enterprise-y. Take a look. I’m a big fan of this. More from them in the coming weeks.</p><p>Jesse: As more services are delivered by cloud-native microservices with dynamic scaling, compliance management and monitoring becomes terrifyingly complex and difficult. The way around this is to implement processes and tools that can continuously monitor and manage compliance-related configurations using automated analysis and reporting of your cloud-native services. This collection of processes and tools is called Cloud Security Posture Management, or CSPM. CSPM generally involves a fair amount of automation to ensure secure practices are used and compliance requirements are continuously met. Implementing CSPM alongside DevSecOps and an organizational focus on shifting left in services development rounds out a tripod to support your cloud initiatives.</p><p><br></p><p><br>Meanwhile, in the news. <a href="https://www.csoonline.com/article/3625254/4-factors-that-should-be-part-of-your-cybersecurity-strategy.html"><em>4 Factors that Should Be Part of Your Cybersecurity Strategy</em></a>. Our security perimeters are no longer controlled by our organizations. With so many people working remote, every device on their network has become part of the threat landscape, from connected fridges to game consoles.</p><p><a href="https://thehill.com/opinion/cybersecurity/564787-software-bill-of-materials-not-just-good-for-security-good-for-business">‘Software Bill of Materials’—not just good for security, good for business</a>. SBOMs, as they’re called, are coming. Even if there is never a law forcing SBOMs like food ingredients labels, there could be an ever-increasing requirement for vendors to supply them. It might be a good idea <br>to start building these, even if they’re only supplied when legally or contractually required.</p><p><br></p><p><br><a href="https://www.cpomagazine.com/cyber-security/third-party-security-failure-caused-1-tb-data-breach-at-saudi-aramco-hackers-play-puzzle-games-with-oil-giant/amp/"><em>Third Party Security Failure Caused 1 TB Data Breach at Saudi Aramco; Hackers Play Puzzle Games With Oil Giant</em></a>. This case study is like slowing down to see the aftermath of a crash and trying to piece together what happened. Given the breach came from a vendor, it’s a sideways attack on Aramco. Are you sure your vendo...</p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Aug 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/fe3e83d2/5bb48463.mp3" length="14532114" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>601</itunes:duration>
      <itunes:summary> for a chance to form those foundational security memories! Jesse keeps us up to date on your summer security needs as cloud-native micro services become even more complex. The key, Cloud Security Posture Management or CSPM. 

In the news: four factors you certainly should include in your cybersecurity strategy, 1 TB data breach cuases leaks in the world of oil,  the future of FedRAMP, and more!</itunes:summary>
      <itunes:subtitle> for a chance to form those foundational security memories! Jesse keeps us up to date on your summer security needs as cloud-native micro services become even more complex. The key, Cloud Security Posture Management or CSPM. 

In the news: four factors </itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>All Roads Lead to Cloud</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>All Roads Lead to Cloud</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dcb5214c-3ac5-4f80-b564-4f817632eb62</guid>
      <link>https://share.transistor.fm/s/120ccc88</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>What does it Take to Secure Containers?</em>: <a href="https://www.darkreading.com/cloud/what-does-it-take-to-secure-containers-">https://www.darkreading.com/cloud/what-does-it-take-to-secure-containers-</a></li><li><em>Critical ICS vulnerabilities can be exploited through leading cloud-management platforms</em>: <a href="https://threatpost.com/industrial-networks-exposed-cloud-operational-tech/168024/">https://threatpost.com/industrial-networks-exposed-cloud-operational-tech/168024/</a></li><li><em>Kaseya Obtains Universal Decryptor for REvil Ransomware</em>: <a href="https://threatpost.com/kaseya-universal-decryptor-revil-ransomware/168070/">https://threatpost.com/kaseya-universal-decryptor-revil-ransomware/168070/</a></li><li><em>Kubernetes Cloud Clusters Face Cyberattacks via Argo Workflows</em>: <a href="https://threatpost.com/kubernetes-cyberattacks-argo-workflows/167997/">https://threatpost.com/kubernetes-cyberattacks-argo-workflows/167997/</a></li><li><em>Cloud security is like an ‘all-you-can-eat buffet’</em>: <a href="https://statescoop.com/cloud-security-is-like-an-all-you-can-eat-buffet/">https://statescoop.com/cloud-security-is-like-an-all-you-can-eat-buffet/</a></li><li><em>Cloud security in 2021: A business guide to essential tools and best practices</em>: <a href="https://www.zdnet.com/article/cloud-security-in-2021-a-business-guide-to-essential-tools-and-best-practices/">https://www.zdnet.com/article/cloud-security-in-2021-a-business-guide-to-essential-tools-and-best-practices/</a></li><li><em>GitHub boosts supply chain security for Go modules</em>: <a href="https://www.zdnet.com/article/github-boosts-supply-chain-security-for-go-modules/">https://www.zdnet.com/article/github-boosts-supply-chain-security-for-go-modules/</a></li><li><em>Cloud (in)security: Avoiding common cloud misconfigurations</em>: inhttps://www.ironnet.com/blog/cloud-insecurity-avoiding-common-cloud-misconfigurations</li><li><em>Akamai Edge DNS outage knocks out multiple major websites</em>: <a href="https://siliconangle.com/2021/07/22/multiple-major-websites-taken-offline-widespread-internet-outage/">https://siliconangle.com/2021/07/22/multiple-major-websites-taken-offline-widespread-internet-outage/</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Building new things in the cloud is often a fun and exciting process, however moving a legacy application or infrastructure is usually a difficult and stressful process. There are several ways to implement a migration of something to run in the cloud. Which cloud migration strategy you choose largely depends on timeline and available resources. Some ways to accomplish an application migration are: one, rehost, aka lift-and-shift; two, refactor; three, rebuild; and four, replace. Rehosting, or lifting and shifting, simply means replicating your current legacy infrastructure on systems in the cloud, then cutting over from production. You spin up cloud systems in something like AWS EC2, install the OS and supporting middleware, add your application and data on top, then cut to prod.</p><p>Refactoring means rewriting your application to run in at least partially cloud-native services, but you can shortcut some of this by using container or middleware services, such as cloud-native databases offered from your cloud provider. Doing this means you largely use your codebase unchanged, but the underlying infrastructure is more scalable and is at least partially like a cloud-native product.</p><p>Rebuilding means writing a cloud-native app to be truly cloud-native. This is much like writing a new application as cloud-native, but you have an existing codebase—and possibly compatibility issues to contend with—from which to pull.</p><p>Replacing simply means implementing a SaaS tool that meets the same business requirements as the legacy application without migrating any of the old code. For example, moving to use Salesforce instead of a legacy CRM product or custom-built sales process tracking systems.</p><p>You can, of course, do some of these in stages as iterative steps. To do this, you could lift-and-shift your existing systems, then slowly work out replacing individual pieces with cloud-native solutions over time. Then you eventually get to a place where you can do very little work to yank out your final EC2 or container systems. At that point, you have a fully cloud-native application. If you don’t have much, or any, cloud application experience in your organization, follow the path of stepping through these processes as you grow your organization’s cloud skill-base and experience. Your people will migrate with your applications.</p><p>Meanwhile in the news. <a href="https://www.darkreading.com/cloud/what-does-it-take-to-secure-containers-"><em>What does it Take to Secure Containers?</em></a> Using containers isn’t instant security. They’re easier to lock down in terms of services and such, but it isn’t a silver bullet. The vampires are still going to storm the house if you invite them in.</p><p><a href="https://threatpost.com/industrial-networks-exposed-cloud-operational-tech/168024/"><em>Critical ICS vulnerabilities can be exploited through leading cloud-management platforms</em></a>. Industrial control systems, or ICS, are notoriously insecure by default and often difficult to secure at all. Modern paradigms of locking down access to these infrastructures and tunneling all access through management and monitoring platforms is great. However, that platform is now the keys to the whole kingdom, so secure your <br>cloud management apps and dial up the monitoring.</p><p><br></p><p><br>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p><a href="https://threatpost.com/kaseya-universal-decryptor-revil-ransomware/168070/"><em>Kaseya Obtains Universal Decryptor for REvil Ransomware</em></a>. This is amazing that Kaseya got their hands on the bits to unlock REvil things. If you are their customer, go get this right away. This doesn’t get you off the hook, though. There are likely time bombs...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>What does it Take to Secure Containers?</em>: <a href="https://www.darkreading.com/cloud/what-does-it-take-to-secure-containers-">https://www.darkreading.com/cloud/what-does-it-take-to-secure-containers-</a></li><li><em>Critical ICS vulnerabilities can be exploited through leading cloud-management platforms</em>: <a href="https://threatpost.com/industrial-networks-exposed-cloud-operational-tech/168024/">https://threatpost.com/industrial-networks-exposed-cloud-operational-tech/168024/</a></li><li><em>Kaseya Obtains Universal Decryptor for REvil Ransomware</em>: <a href="https://threatpost.com/kaseya-universal-decryptor-revil-ransomware/168070/">https://threatpost.com/kaseya-universal-decryptor-revil-ransomware/168070/</a></li><li><em>Kubernetes Cloud Clusters Face Cyberattacks via Argo Workflows</em>: <a href="https://threatpost.com/kubernetes-cyberattacks-argo-workflows/167997/">https://threatpost.com/kubernetes-cyberattacks-argo-workflows/167997/</a></li><li><em>Cloud security is like an ‘all-you-can-eat buffet’</em>: <a href="https://statescoop.com/cloud-security-is-like-an-all-you-can-eat-buffet/">https://statescoop.com/cloud-security-is-like-an-all-you-can-eat-buffet/</a></li><li><em>Cloud security in 2021: A business guide to essential tools and best practices</em>: <a href="https://www.zdnet.com/article/cloud-security-in-2021-a-business-guide-to-essential-tools-and-best-practices/">https://www.zdnet.com/article/cloud-security-in-2021-a-business-guide-to-essential-tools-and-best-practices/</a></li><li><em>GitHub boosts supply chain security for Go modules</em>: <a href="https://www.zdnet.com/article/github-boosts-supply-chain-security-for-go-modules/">https://www.zdnet.com/article/github-boosts-supply-chain-security-for-go-modules/</a></li><li><em>Cloud (in)security: Avoiding common cloud misconfigurations</em>: inhttps://www.ironnet.com/blog/cloud-insecurity-avoiding-common-cloud-misconfigurations</li><li><em>Akamai Edge DNS outage knocks out multiple major websites</em>: <a href="https://siliconangle.com/2021/07/22/multiple-major-websites-taken-offline-widespread-internet-outage/">https://siliconangle.com/2021/07/22/multiple-major-websites-taken-offline-widespread-internet-outage/</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Building new things in the cloud is often a fun and exciting process, however moving a legacy application or infrastructure is usually a difficult and stressful process. There are several ways to implement a migration of something to run in the cloud. Which cloud migration strategy you choose largely depends on timeline and available resources. Some ways to accomplish an application migration are: one, rehost, aka lift-and-shift; two, refactor; three, rebuild; and four, replace. Rehosting, or lifting and shifting, simply means replicating your current legacy infrastructure on systems in the cloud, then cutting over from production. You spin up cloud systems in something like AWS EC2, install the OS and supporting middleware, add your application and data on top, then cut to prod.</p><p>Refactoring means rewriting your application to run in at least partially cloud-native services, but you can shortcut some of this by using container or middleware services, such as cloud-native databases offered from your cloud provider. Doing this means you largely use your codebase unchanged, but the underlying infrastructure is more scalable and is at least partially like a cloud-native product.</p><p>Rebuilding means writing a cloud-native app to be truly cloud-native. This is much like writing a new application as cloud-native, but you have an existing codebase—and possibly compatibility issues to contend with—from which to pull.</p><p>Replacing simply means implementing a SaaS tool that meets the same business requirements as the legacy application without migrating any of the old code. For example, moving to use Salesforce instead of a legacy CRM product or custom-built sales process tracking systems.</p><p>You can, of course, do some of these in stages as iterative steps. To do this, you could lift-and-shift your existing systems, then slowly work out replacing individual pieces with cloud-native solutions over time. Then you eventually get to a place where you can do very little work to yank out your final EC2 or container systems. At that point, you have a fully cloud-native application. If you don’t have much, or any, cloud application experience in your organization, follow the path of stepping through these processes as you grow your organization’s cloud skill-base and experience. Your people will migrate with your applications.</p><p>Meanwhile in the news. <a href="https://www.darkreading.com/cloud/what-does-it-take-to-secure-containers-"><em>What does it Take to Secure Containers?</em></a> Using containers isn’t instant security. They’re easier to lock down in terms of services and such, but it isn’t a silver bullet. The vampires are still going to storm the house if you invite them in.</p><p><a href="https://threatpost.com/industrial-networks-exposed-cloud-operational-tech/168024/"><em>Critical ICS vulnerabilities can be exploited through leading cloud-management platforms</em></a>. Industrial control systems, or ICS, are notoriously insecure by default and often difficult to secure at all. Modern paradigms of locking down access to these infrastructures and tunneling all access through management and monitoring platforms is great. However, that platform is now the keys to the whole kingdom, so secure your <br>cloud management apps and dial up the monitoring.</p><p><br></p><p><br>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p><a href="https://threatpost.com/kaseya-universal-decryptor-revil-ransomware/168070/"><em>Kaseya Obtains Universal Decryptor for REvil Ransomware</em></a>. This is amazing that Kaseya got their hands on the bits to unlock REvil things. If you are their customer, go get this right away. This doesn’t get you off the hook, though. There are likely time bombs...</p>]]>
      </content:encoded>
      <pubDate>Thu, 29 Jul 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/120ccc88/edf5803a.mp3" length="12899305" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>533</itunes:duration>
      <itunes:summary>Building new things in the cloud can be fun! But it comes with its own difficulties. Tune in this week as Jesse discusses the different migrations strategies for moving legacy infrastructures and the forms those strategies take. 

In the news: What does it take to use containers? Kubernetes Cloud Clusters are under cyberattack! GitHub steps it up for Go modules, and more!</itunes:summary>
      <itunes:subtitle>Building new things in the cloud can be fun! But it comes with its own difficulties. Tune in this week as Jesse discusses the different migrations strategies for moving legacy infrastructures and the forms those strategies take. 

In the news: What does</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Compliance, Ransomware and Privacy, Oh My!</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Compliance, Ransomware and Privacy, Oh My!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c011c155-bf7f-4684-a2c2-fb9d670704ed</guid>
      <link>https://share.transistor.fm/s/c30192b1</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>How to Bridge On-Premises and Cloud Identity</em>: <a href="https://www.darkreading.com/vulnerabilities---threats/how-to-bridge-on-premises-and-cloud-identity-/a/d-id/1341512">https://www.darkreading.com/vulnerabilities—threats/how-to-bridge-on-premises-and-cloud-identity-/a/d-id/1341512</a></li><li><em>How AWS is helping EU customers navigate the new normal for data protection</em>: <a href="https://aws.amazon.com/blogs/security/how-aws-is-helping-eu-customers-navigate-the-new-normal-for-data-protection/">https://aws.amazon.com/blogs/security/how-aws-is-helping-eu-customers-navigate-the-new-normal-for-data-protection/</a></li><li><em>Cloud security should never be a developer issue</em>: <a href="https://www.securitymagazine.com/articles/95641-cloud-security-should-never-be-a-developer-issue">https://www.securitymagazine.com/articles/95641-cloud-security-should-never-be-a-developer-issue</a></li><li><em>Tool Sprawl &amp; False Positives Hold Security Teams Back</em>: <a href="https://www.darkreading.com/application-security/tool-sprawl-and-false-positives-hold-security-teams-back/d/d-id/1341517">https://www.darkreading.com/application-security/tool-sprawl-and-false-positives-hold-security-teams-back/d/d-id/1341517</a></li><li><em>The what and Why of Cloud-Native Security</em>: <a href="https://containerjournal.com/editorial-calendar/cloud-native-security/the-what-and-why-of-cloud-native-security/">https://containerjournal.com/editorial-calendar/cloud-native-security/the-what-and-why-of-cloud-native-security/</a></li><li><em>OSPAR 2021 report now available with 127 services in scope</em>: <a href="https://aws.amazon.com/blogs/security/ospar-2021-report-now-available-with-127-services-in-scope/">https://aws.amazon.com/blogs/security/ospar-2021-report-now-available-with-127-services-in-scope/</a></li><li><em>Researchers Create New Approach to Detect Brand Impersonation</em>: <a href="https://www.darkreading.com/endpoint/researchers-create-new-approach-to-detect-brand-impersonation/d/d-id/1341549">https://www.darkreading.com/endpoint/researchers-create-new-approach-to-detect-brand-impersonation/d/d-id/1341549</a></li><li><em>Privacy Law Update: Colorado Privacy Bill Becomes Law: How does it Stack Up Against California and Virginia?</em>: <a href="https://www.adlawaccess.com/2021/07/articles/privacy-law-update-colorado-privacy-bill-becomes-law-how-does-it-stack-up-against-california-and-virginia/">https://www.adlawaccess.com/2021/07/articles/privacy-law-update-colorado-privacy-bill-becomes-law-how-does-it-stack-up-against-california-and-virginia/</a></li><li><em>CISA Launches New Website to Aid Ransomware Defenders</em>: <a href="https://www.darkreading.com/threat-intelligence/cisa-launches-new-website-to-aid-ransomware-defenders/d/d-id/1341539">https://www.darkreading.com/threat-intelligence/cisa-launches-new-website-to-aid-ransomware-defenders/d/d-id/1341539</a></li><li><em>stopransomware.gov</em>: <a href="https://stopransomware.gov">https://stopransomware.gov</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: There are several larger topics within the realm of cybersecurity that come up constantly. Subscribers of MiS are likely seeing these emerge from topics I cover. Some of the most common themes lately are compliance, privacy, ransomware, and DevSecOps. So, we are all working from common definitions, let’s elaborate a bit on each.</p><p>Compliance is the process of meeting some list or lists of requirements, usually have an outside agency of some sort. Most people think about this in terms of laws like GDPR, SOC, HIPAA, FERPA, and others. These are great examples, but compliance includes meeting certification requirements like SOC 2, various ISO certifications, or PCI.</p><p>Privacy gets broad in terms of implementation, but at its core, it means the protection of information related to a person or organization. Basically, don’t collect or disclose things you don’t absolutely need to, and always ensure you have permission before any collection or disclosure of information.</p><p>Ransomware is the software that will destroy or disclose—or both—your data if you don’t pay someone. DevSecOps is the methodology of writing software with secure practices and systems in mind from the start. It’s that whole shift-left thing.</p><p>Meanwhile in the news. <a href="https://www.darkreading.com/vulnerabilities---threats/how-to-bridge-on-premises-and-cloud-identity-/a/d-id/1341512"><em>How to Bridge On-Premises and Cloud Identity</em></a>. Identity and access management, or IAM, is difficult without introducing wholly different environments. We have to pick an IAM solution, so we choose what works across all our environments and services. Of course, ultimately, this means implementing Single Sign-On, SSO, of some sort as well.</p><p><a href="https://news.sky.com/story/sophisticated-malware-is-being-used-to-spy-on-journalists-politicians-and-human-rights-activists-12358847"><em>Sophisticated Malware is Being Used to Spy on Journalists, Politicians and Human Rights Activists</em></a>. Not all horrible software sneaking into our devices and systems are from hidden criminal or enterprises or nation-state sponsored groups. Some of it sadly comes from for-profit companies. Just like a hammer can be used for horrible things, so can some security software.</p><p><a href="https://www.scmagazine.com/analysis/application-security/a-complex-kind-of-spiderweb-new-research-group-focuses-on-overlooked-api-security"><em>A Complex Kind of Spiderweb: New Research Group Focuses on Overlooked API Security</em></a>. APIs run our whole cloudy world. They’re the glue and crossovers communication mechanisms rolled into one conceptual framework. However, while we may introduce security flaws in our use of the billion APIs we have to use, the APIs themselves might have security vulnerabilities as well. I’m interested in the output from this practical research group to see if this bolsters API use and implementation in general.</p><p><a href="https://aws.amazon.com/blogs/security/how-aws-is-helping-eu-customers-navigate-the-new-normal-for-data-protection/"><em>How AWS is helping EU customers navigate the new normal for data protection</em></a>. Managing regulatory compliance is a circus act on a good day. On a bad day, it’s a complex web of sometimes conflicting and sometimes complementary solutions. Many organizations worldwide need to meet EU regulations, so be sure to know if you must as well.</p><p><a href="https://www.securitymagazine.com/articles/95641-cloud-security-should-never-be-a-developer-issue"><em>Cloud security should never be a developer issue</em></a><em>.</em> I first thought this was the counterargument to the shift-left and DevSecOp movements, but this piece support...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>How to Bridge On-Premises and Cloud Identity</em>: <a href="https://www.darkreading.com/vulnerabilities---threats/how-to-bridge-on-premises-and-cloud-identity-/a/d-id/1341512">https://www.darkreading.com/vulnerabilities—threats/how-to-bridge-on-premises-and-cloud-identity-/a/d-id/1341512</a></li><li><em>How AWS is helping EU customers navigate the new normal for data protection</em>: <a href="https://aws.amazon.com/blogs/security/how-aws-is-helping-eu-customers-navigate-the-new-normal-for-data-protection/">https://aws.amazon.com/blogs/security/how-aws-is-helping-eu-customers-navigate-the-new-normal-for-data-protection/</a></li><li><em>Cloud security should never be a developer issue</em>: <a href="https://www.securitymagazine.com/articles/95641-cloud-security-should-never-be-a-developer-issue">https://www.securitymagazine.com/articles/95641-cloud-security-should-never-be-a-developer-issue</a></li><li><em>Tool Sprawl &amp; False Positives Hold Security Teams Back</em>: <a href="https://www.darkreading.com/application-security/tool-sprawl-and-false-positives-hold-security-teams-back/d/d-id/1341517">https://www.darkreading.com/application-security/tool-sprawl-and-false-positives-hold-security-teams-back/d/d-id/1341517</a></li><li><em>The what and Why of Cloud-Native Security</em>: <a href="https://containerjournal.com/editorial-calendar/cloud-native-security/the-what-and-why-of-cloud-native-security/">https://containerjournal.com/editorial-calendar/cloud-native-security/the-what-and-why-of-cloud-native-security/</a></li><li><em>OSPAR 2021 report now available with 127 services in scope</em>: <a href="https://aws.amazon.com/blogs/security/ospar-2021-report-now-available-with-127-services-in-scope/">https://aws.amazon.com/blogs/security/ospar-2021-report-now-available-with-127-services-in-scope/</a></li><li><em>Researchers Create New Approach to Detect Brand Impersonation</em>: <a href="https://www.darkreading.com/endpoint/researchers-create-new-approach-to-detect-brand-impersonation/d/d-id/1341549">https://www.darkreading.com/endpoint/researchers-create-new-approach-to-detect-brand-impersonation/d/d-id/1341549</a></li><li><em>Privacy Law Update: Colorado Privacy Bill Becomes Law: How does it Stack Up Against California and Virginia?</em>: <a href="https://www.adlawaccess.com/2021/07/articles/privacy-law-update-colorado-privacy-bill-becomes-law-how-does-it-stack-up-against-california-and-virginia/">https://www.adlawaccess.com/2021/07/articles/privacy-law-update-colorado-privacy-bill-becomes-law-how-does-it-stack-up-against-california-and-virginia/</a></li><li><em>CISA Launches New Website to Aid Ransomware Defenders</em>: <a href="https://www.darkreading.com/threat-intelligence/cisa-launches-new-website-to-aid-ransomware-defenders/d/d-id/1341539">https://www.darkreading.com/threat-intelligence/cisa-launches-new-website-to-aid-ransomware-defenders/d/d-id/1341539</a></li><li><em>stopransomware.gov</em>: <a href="https://stopransomware.gov">https://stopransomware.gov</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: There are several larger topics within the realm of cybersecurity that come up constantly. Subscribers of MiS are likely seeing these emerge from topics I cover. Some of the most common themes lately are compliance, privacy, ransomware, and DevSecOps. So, we are all working from common definitions, let’s elaborate a bit on each.</p><p>Compliance is the process of meeting some list or lists of requirements, usually have an outside agency of some sort. Most people think about this in terms of laws like GDPR, SOC, HIPAA, FERPA, and others. These are great examples, but compliance includes meeting certification requirements like SOC 2, various ISO certifications, or PCI.</p><p>Privacy gets broad in terms of implementation, but at its core, it means the protection of information related to a person or organization. Basically, don’t collect or disclose things you don’t absolutely need to, and always ensure you have permission before any collection or disclosure of information.</p><p>Ransomware is the software that will destroy or disclose—or both—your data if you don’t pay someone. DevSecOps is the methodology of writing software with secure practices and systems in mind from the start. It’s that whole shift-left thing.</p><p>Meanwhile in the news. <a href="https://www.darkreading.com/vulnerabilities---threats/how-to-bridge-on-premises-and-cloud-identity-/a/d-id/1341512"><em>How to Bridge On-Premises and Cloud Identity</em></a>. Identity and access management, or IAM, is difficult without introducing wholly different environments. We have to pick an IAM solution, so we choose what works across all our environments and services. Of course, ultimately, this means implementing Single Sign-On, SSO, of some sort as well.</p><p><a href="https://news.sky.com/story/sophisticated-malware-is-being-used-to-spy-on-journalists-politicians-and-human-rights-activists-12358847"><em>Sophisticated Malware is Being Used to Spy on Journalists, Politicians and Human Rights Activists</em></a>. Not all horrible software sneaking into our devices and systems are from hidden criminal or enterprises or nation-state sponsored groups. Some of it sadly comes from for-profit companies. Just like a hammer can be used for horrible things, so can some security software.</p><p><a href="https://www.scmagazine.com/analysis/application-security/a-complex-kind-of-spiderweb-new-research-group-focuses-on-overlooked-api-security"><em>A Complex Kind of Spiderweb: New Research Group Focuses on Overlooked API Security</em></a>. APIs run our whole cloudy world. They’re the glue and crossovers communication mechanisms rolled into one conceptual framework. However, while we may introduce security flaws in our use of the billion APIs we have to use, the APIs themselves might have security vulnerabilities as well. I’m interested in the output from this practical research group to see if this bolsters API use and implementation in general.</p><p><a href="https://aws.amazon.com/blogs/security/how-aws-is-helping-eu-customers-navigate-the-new-normal-for-data-protection/"><em>How AWS is helping EU customers navigate the new normal for data protection</em></a>. Managing regulatory compliance is a circus act on a good day. On a bad day, it’s a complex web of sometimes conflicting and sometimes complementary solutions. Many organizations worldwide need to meet EU regulations, so be sure to know if you must as well.</p><p><a href="https://www.securitymagazine.com/articles/95641-cloud-security-should-never-be-a-developer-issue"><em>Cloud security should never be a developer issue</em></a><em>.</em> I first thought this was the counterargument to the shift-left and DevSecOp movements, but this piece support...</p>]]>
      </content:encoded>
      <pubDate>Thu, 22 Jul 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/c30192b1/f8c00b34.mp3" length="13207730" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>545</itunes:duration>
      <itunes:summary>Compliance, privacy, ransomware, and DevSecOps are common topics in the realm of cybersecurity. You may notice that these themes emerge from the topics covered each week. Join Jesse as he elaborates on each topic using common definitions.

In the News: Malware is being used to spy on journalists, politicians and human rights activists! How does the new Colorado Privacy Bill stack up against California and Virginia? Detecting brand impersonation is becoming easier, yet more complex. Tune in for more in this week’s episode of Meanwhile in Security.</itunes:summary>
      <itunes:subtitle>Compliance, privacy, ransomware, and DevSecOps are common topics in the realm of cybersecurity. You may notice that these themes emerge from the topics covered each week. Join Jesse as he elaborates on each topic using common definitions.

In the News: </itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Who's Fooling Who?</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Who's Fooling Who?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">99eda9ef-1609-431b-b4ac-46780a2162d1</guid>
      <link>https://share.transistor.fm/s/89c58bb7</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Fake Amazon cloud service AWS InfiniDash quickly goes viral</em>: <a href="https://siliconangle.com/2021/07/05/fake-amazon-cloud-service-aws-infinidash-quickly-goes-viral/">https://siliconangle.com/2021/07/05/fake-amazon-cloud-service-aws-infinidash-quickly-goes-viral/</a></li><li><em>7 Unconventional Pieces of Password Wisdom</em>: <a href="https://www.darkreading.com/application-security/7-unconventional-pieces-of-password-wisdom/d/d-id/1341400">https://www.darkreading.com/application-security/7-unconventional-pieces-of-password-wisdom/d/d-id/1341400</a></li><li><em>Pentagon Cancels Disputed JEDI Cloud Contract With Microsoft</em>: <a href="https://www.usnews.com/news/business/articles/2021-07-06/pentagon-cancels-disputed-jedi-cloud-contract-with-microsoft">https://www.usnews.com/news/business/articles/2021-07-06/pentagon-cancels-disputed-jedi-cloud-contract-with-microsoft</a></li><li><em>SolarWinds Discloses Zero-Day Under Active Attack</em>: <a href="https://beta.darkreading.com/threat-intelligence/solarwinds-discloses-zero-day-under-active-attack">https://beta.darkreading.com/threat-intelligence/solarwinds-discloses-zero-day-under-active-attack</a></li><li><em>98% of Infosec Pros Say Multi-Cloud Environments Create Additional Security Challenges, Reveals Survey</em>: <a href="https://securityboulevard.com/2021/07/98-of-infosec-pros-say-multi-cloud-environments-create-additional-security-challenges-reveals-survey/">https://securityboulevard.com/2021/07/98-of-infosec-pros-say-multi-cloud-environments-create-additional-security-challenges-reveals-survey/</a></li><li><em>Autonomous Security is Essential if the Edge is to Scale Properly</em>: <a href="https://www.darkreading.com/endpoint/autonomous-security-is-essential-if-the-edge-is-to-scale-properly/a/d-id/1341391">https://www.darkreading.com/endpoint/autonomous-security-is-essential-if-the-edge-is-to-scale-properly/a/d-id/1341391</a></li><li><em>Digital Habits During Pandemic Have Lasting Impact</em>: <a href="https://securityboulevard.com/2021/07/digital-habits-during-pandemic-have-lasting-impact/">https://securityboulevard.com/2021/07/digital-habits-during-pandemic-have-lasting-impact/</a></li><li><em>Are Security Attestations a Necessity for SaaS Businesses?</em>: <a href="https://www.darkreading.com/risk/are-security-attestations-a-necessity-for-saas-businesses/a/d-id/1341426">https://www.darkreading.com/risk/are-security-attestations-a-necessity-for-saas-businesses/a/d-id/1341426</a></li><li><em>How to Improve Cybersecurity for Your Business?</em>: <a href="https://www.ccsinet.com/blog/how-to-improve-cybersecurity-for-your-business/">https://www.ccsinet.com/blog/how-to-improve-cybersecurity-for-your-business/</a></li><li><em>CISA Analysis Reveals Successful Attack Techniques of FY 2020</em>: <a href="https://beta.darkreading.com/threat-intelligence/cisa-analysis-reveals-successful-attack-techniques-of-fy2020">https://beta.darkreading.com/threat-intelligence/cisa-analysis-reveals-successful-attack-techniques-of-fy2020</a></li><li><em>How Predictive AI will Change Cybersecurity in 2021</em>: <a href="https://insidebigdata.com/2021/07/09/how-predictive-ai-will-change-cybersecurity-in-2021/">https://insidebigdata.com/2021/07/09/how-predictive-ai-will-change-cybersecurity-in-2021/</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p><br>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p><br></p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p><br></p><p>Jesse: Last April, I went to a secret training camp. We studied the entire AWS functional objection orientation language services—or FOOLS—suite of tools and APIs. The first public rollout of AWS FOOLS-supported products is already an amazing success. AWS Infinidash took the internet by storm. This product is such an amazing way to quickly dash into production all your FOOLS-coded projects.</p><p><br></p><p>I’m looking forward to the UDB service, AWS Infinitdiscus, where you toss your data to the cloud, the automated problem-solving tool, AWS Infinihurdle, where you leap over virtual objects, and the non-ephemeral cloud-native microservice, AWS Infinimarathon, where you can run microservices for long-running batch jobs. Sadly, I suspect the all-in-one API product AWS Infinitriathlon won’t see the light of day because the project participants keep dropping out before it’s finished. I hope they finish someday. I feel like it’s a new day dawning with AWS FOOLS. This is a watershed moment as momentous as the day we discovered Agile over waterfall.</p><p><br></p><p>Meanwhile, in the news. <a href="https://siliconangle.com/2021/07/05/fake-amazon-cloud-service-aws-infinidash-quickly-goes-viral/">Fake Amazon cloud service AWS InfiniDash quickly goes viral</a>. [laugh]. This turned into a fantastic and fun internet meme that won’t be going away anytime soon. Also, everything I said above about AWS FOOLS is a joke. This is not real. I’m sure there will be reports about AWS FOOLS soon enough, now.</p><p><br></p><p><a href="https://www.darkreading.com/application-security/7-unconventional-pieces-of-password-wisdom/d/d-id/1341400">7 Unconventional Pieces of Password Wisdom</a>. Passwords suck. We all know they suck. We all hate them. However, we will always need to memorize a few passwords. Set passwords you can remember but are hard to guess and make them as long as the site or application will allow. Passphrases are far superior, of course.</p><p><br></p><p><a href="https://www.usnews.com/news/business/articles/2021-07-06/pentagon-cancels-disputed-jedi-cloud-contract-with-microsoft">Pentagon Cancels Disputed JEDI Cloud Contract With Microsoft</a>. If you wonder what happens when a trillion-dollar company takes you to court, just recall how AWS managed to kill this massive contract with Microsoft. Don’t tangle with AWS, Google, or Microsoft unless you know what you’re doing.</p><p><br></p><p><a href="https://beta.darkreading.com/threat-intelligence/solarwinds-discloses-zero-day-under-active-attack">SolarWinds Discloses Zero-Day Under Active Attack</a>. Okay, let’s be honest. If I gave you every urgent patch announcement, this whole publication would be a boring list of stuff to install. Be sure to watch your vendors for patches and everything else.</p><p><br></p><p><a href="https://securityboulevard.com/2021/07/98-of-infosec-pros-say-multi-cloud-environments-create-additional-security-challenges-reveals-survey/">98% of Infosec Pros Say Multi-Cloud Environments Create Additional Security Challenges, Reveals Survey</a>. Using more than one public or private cloud combined into one infrastructure or service delivery platform is difficult for IT, of course. For security, the tools used in one cloud stack are different than another cloud stack. This makes it hard to do a single comprehensive solution that works seamlessly between them all. Shift farther left on these things.</p><p><br></p><p><a href="https://www.darkreading.com/endpoint/autonomous-security-is-essential-if-the-edge-is-to-scale-properly/a/d-id/1341391">Autonomous...</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Fake Amazon cloud service AWS InfiniDash quickly goes viral</em>: <a href="https://siliconangle.com/2021/07/05/fake-amazon-cloud-service-aws-infinidash-quickly-goes-viral/">https://siliconangle.com/2021/07/05/fake-amazon-cloud-service-aws-infinidash-quickly-goes-viral/</a></li><li><em>7 Unconventional Pieces of Password Wisdom</em>: <a href="https://www.darkreading.com/application-security/7-unconventional-pieces-of-password-wisdom/d/d-id/1341400">https://www.darkreading.com/application-security/7-unconventional-pieces-of-password-wisdom/d/d-id/1341400</a></li><li><em>Pentagon Cancels Disputed JEDI Cloud Contract With Microsoft</em>: <a href="https://www.usnews.com/news/business/articles/2021-07-06/pentagon-cancels-disputed-jedi-cloud-contract-with-microsoft">https://www.usnews.com/news/business/articles/2021-07-06/pentagon-cancels-disputed-jedi-cloud-contract-with-microsoft</a></li><li><em>SolarWinds Discloses Zero-Day Under Active Attack</em>: <a href="https://beta.darkreading.com/threat-intelligence/solarwinds-discloses-zero-day-under-active-attack">https://beta.darkreading.com/threat-intelligence/solarwinds-discloses-zero-day-under-active-attack</a></li><li><em>98% of Infosec Pros Say Multi-Cloud Environments Create Additional Security Challenges, Reveals Survey</em>: <a href="https://securityboulevard.com/2021/07/98-of-infosec-pros-say-multi-cloud-environments-create-additional-security-challenges-reveals-survey/">https://securityboulevard.com/2021/07/98-of-infosec-pros-say-multi-cloud-environments-create-additional-security-challenges-reveals-survey/</a></li><li><em>Autonomous Security is Essential if the Edge is to Scale Properly</em>: <a href="https://www.darkreading.com/endpoint/autonomous-security-is-essential-if-the-edge-is-to-scale-properly/a/d-id/1341391">https://www.darkreading.com/endpoint/autonomous-security-is-essential-if-the-edge-is-to-scale-properly/a/d-id/1341391</a></li><li><em>Digital Habits During Pandemic Have Lasting Impact</em>: <a href="https://securityboulevard.com/2021/07/digital-habits-during-pandemic-have-lasting-impact/">https://securityboulevard.com/2021/07/digital-habits-during-pandemic-have-lasting-impact/</a></li><li><em>Are Security Attestations a Necessity for SaaS Businesses?</em>: <a href="https://www.darkreading.com/risk/are-security-attestations-a-necessity-for-saas-businesses/a/d-id/1341426">https://www.darkreading.com/risk/are-security-attestations-a-necessity-for-saas-businesses/a/d-id/1341426</a></li><li><em>How to Improve Cybersecurity for Your Business?</em>: <a href="https://www.ccsinet.com/blog/how-to-improve-cybersecurity-for-your-business/">https://www.ccsinet.com/blog/how-to-improve-cybersecurity-for-your-business/</a></li><li><em>CISA Analysis Reveals Successful Attack Techniques of FY 2020</em>: <a href="https://beta.darkreading.com/threat-intelligence/cisa-analysis-reveals-successful-attack-techniques-of-fy2020">https://beta.darkreading.com/threat-intelligence/cisa-analysis-reveals-successful-attack-techniques-of-fy2020</a></li><li><em>How Predictive AI will Change Cybersecurity in 2021</em>: <a href="https://insidebigdata.com/2021/07/09/how-predictive-ai-will-change-cybersecurity-in-2021/">https://insidebigdata.com/2021/07/09/how-predictive-ai-will-change-cybersecurity-in-2021/</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p><br>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p><br></p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p><br></p><p>Jesse: Last April, I went to a secret training camp. We studied the entire AWS functional objection orientation language services—or FOOLS—suite of tools and APIs. The first public rollout of AWS FOOLS-supported products is already an amazing success. AWS Infinidash took the internet by storm. This product is such an amazing way to quickly dash into production all your FOOLS-coded projects.</p><p><br></p><p>I’m looking forward to the UDB service, AWS Infinitdiscus, where you toss your data to the cloud, the automated problem-solving tool, AWS Infinihurdle, where you leap over virtual objects, and the non-ephemeral cloud-native microservice, AWS Infinimarathon, where you can run microservices for long-running batch jobs. Sadly, I suspect the all-in-one API product AWS Infinitriathlon won’t see the light of day because the project participants keep dropping out before it’s finished. I hope they finish someday. I feel like it’s a new day dawning with AWS FOOLS. This is a watershed moment as momentous as the day we discovered Agile over waterfall.</p><p><br></p><p>Meanwhile, in the news. <a href="https://siliconangle.com/2021/07/05/fake-amazon-cloud-service-aws-infinidash-quickly-goes-viral/">Fake Amazon cloud service AWS InfiniDash quickly goes viral</a>. [laugh]. This turned into a fantastic and fun internet meme that won’t be going away anytime soon. Also, everything I said above about AWS FOOLS is a joke. This is not real. I’m sure there will be reports about AWS FOOLS soon enough, now.</p><p><br></p><p><a href="https://www.darkreading.com/application-security/7-unconventional-pieces-of-password-wisdom/d/d-id/1341400">7 Unconventional Pieces of Password Wisdom</a>. Passwords suck. We all know they suck. We all hate them. However, we will always need to memorize a few passwords. Set passwords you can remember but are hard to guess and make them as long as the site or application will allow. Passphrases are far superior, of course.</p><p><br></p><p><a href="https://www.usnews.com/news/business/articles/2021-07-06/pentagon-cancels-disputed-jedi-cloud-contract-with-microsoft">Pentagon Cancels Disputed JEDI Cloud Contract With Microsoft</a>. If you wonder what happens when a trillion-dollar company takes you to court, just recall how AWS managed to kill this massive contract with Microsoft. Don’t tangle with AWS, Google, or Microsoft unless you know what you’re doing.</p><p><br></p><p><a href="https://beta.darkreading.com/threat-intelligence/solarwinds-discloses-zero-day-under-active-attack">SolarWinds Discloses Zero-Day Under Active Attack</a>. Okay, let’s be honest. If I gave you every urgent patch announcement, this whole publication would be a boring list of stuff to install. Be sure to watch your vendors for patches and everything else.</p><p><br></p><p><a href="https://securityboulevard.com/2021/07/98-of-infosec-pros-say-multi-cloud-environments-create-additional-security-challenges-reveals-survey/">98% of Infosec Pros Say Multi-Cloud Environments Create Additional Security Challenges, Reveals Survey</a>. Using more than one public or private cloud combined into one infrastructure or service delivery platform is difficult for IT, of course. For security, the tools used in one cloud stack are different than another cloud stack. This makes it hard to do a single comprehensive solution that works seamlessly between them all. Shift farther left on these things.</p><p><br></p><p><a href="https://www.darkreading.com/endpoint/autonomous-security-is-essential-if-the-edge-is-to-scale-properly/a/d-id/1341391">Autonomous...</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 15 Jul 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/89c58bb7/20e2ae27.mp3" length="13166411" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>544</itunes:duration>
      <itunes:summary>Join Jesse as he talks about learning FOOLS, which is an entire AWS functional objection orientation language suite of tools and APIs services. The first public rollout of AWS FOOLS set the stage for AWS Infinidash, which exploded onto the internet last week. Will the AWS infinimarathon see the light of day? 

In the News: The Pentagon cancels JEDI contract with Microsoft, fake Amazon cloud service AWS InfiniDash quickly goes viral - tune in for more in this week’s episode of Meanwhile in Security.</itunes:summary>
      <itunes:subtitle>Join Jesse as he talks about learning FOOLS, which is an entire AWS functional objection orientation language suite of tools and APIs services. The first public rollout of AWS FOOLS set the stage for AWS Infinidash, which exploded onto the internet last w</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Use a Vault Before Ransomware Does It For You</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Use a Vault Before Ransomware Does It For You</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e213288b-bd89-4f96-9a52-574fcf047647</guid>
      <link>https://share.transistor.fm/s/d22e15e5</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Cyber insurance isn’t helping with cybersecurity, and it might be making the ransomware crisis worse, say researchers</em>: <a href="https://www.zdnet.com/article/ransomware-has-become-an-existential-threat-that-means-cyber-insurance-is-about-to-change/">https://www.zdnet.com/article/ransomware-has-become-an-existential-threat-that-means-cyber-insurance-is-about-to-change/</a></li><li><em>House lawmakers introduce bill to increase American awareness of cyber threats</em>: <a href="https://thehill.com/policy/cybersecurity/560077-house-lawmakers-introduce-bill-to-increase-american-awareness-of-cyber">https://thehill.com/policy/cybersecurity/560077-house-lawmakers-introduce-bill-to-increase-american-awareness-of-cyber</a></li><li><em>5 Mistakes that Impact a Security Team’s Success</em>: <a href="https://www.darkreading.com/edge/theedge/5-mistakes-that-impact-a-security-teams-success/b/d-id/1341470">https://www.darkreading.com/edge/theedge/5-mistakes-that-impact-a-security-teams-success/b/d-id/1341470</a></li><li><em>Google Working on Patching GCP Vulnerability that Allows VM Takeover</em>: <a href="https://www.itsecuritynews.info/google-working-on-patching-gcp-vulnerability-that-allows-vm-takeover/">https://www.itsecuritynews.info/google-working-on-patching-gcp-vulnerability-that-allows-vm-takeover/</a></li><li><em>NSA &amp; CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs</em>: <a href="https://www.darkreading.com/attacks-breaches/nsa-and-cisa-issue-warning-about-russian-gru-brute-force-cyberattacks-against-us-global-orgs/d/d-id/1341458">https://www.darkreading.com/attacks-breaches/nsa-and-cisa-issue-warning-about-russian-gru-brute-force-cyberattacks-against-us-global-orgs/d/d-id/1341458</a></li><li><em>$70 Million Demanded as REvil Ransomware Attackers Claim 1 Million Systems Hit</em>: <a href="https://www.forbes.com/sites/daveywinder/2021/07/05/70-million-demanded-as-revil-ransomware-attackers-claim-1-million-systems-hit/?sh=7517b8f957c0">https://www.forbes.com/sites/daveywinder/2021/07/05/70-million-demanded-as-revil-ransomware-attackers-claim-1-million-systems-hit/?sh=7517b8f957c0</a></li><li><em>How to monitor and track failed logins for your AWS Managed Microsoft AD</em>: <a href="https://aws.amazon.com/blogs/security/how-to-monitor-and-track-failed-logins-for-your-aws-managed-microsoft-ad/">https://aws.amazon.com/blogs/security/how-to-monitor-and-track-failed-logins-for-your-aws-managed-microsoft-ad/</a></li><li><em>Six ways businesses can reduce their cyber security risk as incidents rise</em>: <a href="https://www.newshub.co.nz/home/money/2021/06/six-ways-businesses-can-reduce-their-cyber-security-risk-as-incidents-rise.html">https://www.newshub.co.nz/home/money/2021/06/six-ways-businesses-can-reduce-their-cyber-security-risk-as-incidents-rise.html</a></li><li><em>How to get a lucrative job in cybersecurity</em>: <a href="https://www.bbc.com/news/business-57663096">https://www.bbc.com/news/business-57663096</a></li><li><em>Why MTTR is Bad for SecOps</em>: <a href="https://threatpost.com/mttr-bad-secops/167440/">https://threatpost.com/mttr-bad-secops/167440/</a></li><li><em>What is the dark web? How to access it and what you’ll find</em>: <a href="https://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html">https://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: What? Your backups are really just diversified pools of production data across multiple cloud provider regions, or stores with no space wasted on offline or non production data? That’s awesome. You are a beautiful target for ransomware. Best practices from a production infrastructure view don’t always match up to best practices for security.</p><p>However, there are ways to provide data protection and redundancy as ransomware impact mitigation while still providing dynamic operational systems. Once again, this solution is to shift left and design security into every single interaction and layer of your systems and infrastructure.</p><p>Meanwhile, in the news. <a href="https://www.zdnet.com/article/ransomware-has-become-an-existential-threat-that-means-cyber-insurance-is-about-to-change/">Cyber insurance isn’t helping with cybersecurity, and it might be making the ransomware crisis worse, say researchers</a>. I know of organizations that have purposefully reduced spending on their cybersecurity programs in favor of hefty cyber breach insurance. It seems at first like a great balance sheet move, but in the long run it doesn’t pay. Just build adequate security programs, please.</p><p><a href="https://thehill.com/policy/cybersecurity/560077-house-lawmakers-introduce-bill-to-increase-american-awareness-of-cyber">House lawmakers introduce bill to increase American awareness of cyber threats</a>. Wow, so now the whole nation will be subjected to useless clickthrough CBT experiences that don’t change their behavior? Excellent. I’m sure the APTs of the world are shaking in their VR headsets already.</p><p><a href="https://www.darkreading.com/edge/theedge/5-mistakes-that-impact-a-security-teams-success/b/d-id/1341470">5 Mistakes that Impact a Security Team’s Success</a>. Call them fiefdoms, silos, or something else, whatever name you use, operating in any way but cooperatively is horrible and unprofessional. If you are frustrated by other people doing this to you, think about the ways you can bridge the divide and draw them into a shared success model where everyone wins by working together.</p><p><a href="https://www.itsecuritynews.info/google-working-on-patching-gcp-vulnerability-that-allows-vm-takeover/">Google Working on Patching GCP Vulnerability that Allows VM Takeover</a>, AWS users rejoice. Finally a cloud security problem you can ignore. GCP users, it’s your turn to panic and question your choices. Now, you know what it feels like to be everyone else using cloud services. Being in the cloud doesn’t reduce your risks inherently; it merely shifts the focus of some of your risks.</p><p><br></p><p><br><a href="https://www.darkreading.com/attacks-breaches/nsa-and-cisa-issue-warning-about-russian-gru-brute-force-cyberattacks-against-us-global-orgs/d/d-id/1341458">NSA &amp; CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs</a>. Cyber attacks are becoming more frequent and more automated. Even the human-driven APT attacks are using scalable cloud technologies to do their dirty work. Monitor your cloud and service or system usage for anomalous behavior, as well as known attack profiles.</p><p><a href="https://www.forbes.com/sites/daveywinder/2021/07/05/70-million-demanded-as-revil-ransomware-attackers-claim-1-millio..."></a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Cyber insurance isn’t helping with cybersecurity, and it might be making the ransomware crisis worse, say researchers</em>: <a href="https://www.zdnet.com/article/ransomware-has-become-an-existential-threat-that-means-cyber-insurance-is-about-to-change/">https://www.zdnet.com/article/ransomware-has-become-an-existential-threat-that-means-cyber-insurance-is-about-to-change/</a></li><li><em>House lawmakers introduce bill to increase American awareness of cyber threats</em>: <a href="https://thehill.com/policy/cybersecurity/560077-house-lawmakers-introduce-bill-to-increase-american-awareness-of-cyber">https://thehill.com/policy/cybersecurity/560077-house-lawmakers-introduce-bill-to-increase-american-awareness-of-cyber</a></li><li><em>5 Mistakes that Impact a Security Team’s Success</em>: <a href="https://www.darkreading.com/edge/theedge/5-mistakes-that-impact-a-security-teams-success/b/d-id/1341470">https://www.darkreading.com/edge/theedge/5-mistakes-that-impact-a-security-teams-success/b/d-id/1341470</a></li><li><em>Google Working on Patching GCP Vulnerability that Allows VM Takeover</em>: <a href="https://www.itsecuritynews.info/google-working-on-patching-gcp-vulnerability-that-allows-vm-takeover/">https://www.itsecuritynews.info/google-working-on-patching-gcp-vulnerability-that-allows-vm-takeover/</a></li><li><em>NSA &amp; CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs</em>: <a href="https://www.darkreading.com/attacks-breaches/nsa-and-cisa-issue-warning-about-russian-gru-brute-force-cyberattacks-against-us-global-orgs/d/d-id/1341458">https://www.darkreading.com/attacks-breaches/nsa-and-cisa-issue-warning-about-russian-gru-brute-force-cyberattacks-against-us-global-orgs/d/d-id/1341458</a></li><li><em>$70 Million Demanded as REvil Ransomware Attackers Claim 1 Million Systems Hit</em>: <a href="https://www.forbes.com/sites/daveywinder/2021/07/05/70-million-demanded-as-revil-ransomware-attackers-claim-1-million-systems-hit/?sh=7517b8f957c0">https://www.forbes.com/sites/daveywinder/2021/07/05/70-million-demanded-as-revil-ransomware-attackers-claim-1-million-systems-hit/?sh=7517b8f957c0</a></li><li><em>How to monitor and track failed logins for your AWS Managed Microsoft AD</em>: <a href="https://aws.amazon.com/blogs/security/how-to-monitor-and-track-failed-logins-for-your-aws-managed-microsoft-ad/">https://aws.amazon.com/blogs/security/how-to-monitor-and-track-failed-logins-for-your-aws-managed-microsoft-ad/</a></li><li><em>Six ways businesses can reduce their cyber security risk as incidents rise</em>: <a href="https://www.newshub.co.nz/home/money/2021/06/six-ways-businesses-can-reduce-their-cyber-security-risk-as-incidents-rise.html">https://www.newshub.co.nz/home/money/2021/06/six-ways-businesses-can-reduce-their-cyber-security-risk-as-incidents-rise.html</a></li><li><em>How to get a lucrative job in cybersecurity</em>: <a href="https://www.bbc.com/news/business-57663096">https://www.bbc.com/news/business-57663096</a></li><li><em>Why MTTR is Bad for SecOps</em>: <a href="https://threatpost.com/mttr-bad-secops/167440/">https://threatpost.com/mttr-bad-secops/167440/</a></li><li><em>What is the dark web? How to access it and what you’ll find</em>: <a href="https://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html">https://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: What? Your backups are really just diversified pools of production data across multiple cloud provider regions, or stores with no space wasted on offline or non production data? That’s awesome. You are a beautiful target for ransomware. Best practices from a production infrastructure view don’t always match up to best practices for security.</p><p>However, there are ways to provide data protection and redundancy as ransomware impact mitigation while still providing dynamic operational systems. Once again, this solution is to shift left and design security into every single interaction and layer of your systems and infrastructure.</p><p>Meanwhile, in the news. <a href="https://www.zdnet.com/article/ransomware-has-become-an-existential-threat-that-means-cyber-insurance-is-about-to-change/">Cyber insurance isn’t helping with cybersecurity, and it might be making the ransomware crisis worse, say researchers</a>. I know of organizations that have purposefully reduced spending on their cybersecurity programs in favor of hefty cyber breach insurance. It seems at first like a great balance sheet move, but in the long run it doesn’t pay. Just build adequate security programs, please.</p><p><a href="https://thehill.com/policy/cybersecurity/560077-house-lawmakers-introduce-bill-to-increase-american-awareness-of-cyber">House lawmakers introduce bill to increase American awareness of cyber threats</a>. Wow, so now the whole nation will be subjected to useless clickthrough CBT experiences that don’t change their behavior? Excellent. I’m sure the APTs of the world are shaking in their VR headsets already.</p><p><a href="https://www.darkreading.com/edge/theedge/5-mistakes-that-impact-a-security-teams-success/b/d-id/1341470">5 Mistakes that Impact a Security Team’s Success</a>. Call them fiefdoms, silos, or something else, whatever name you use, operating in any way but cooperatively is horrible and unprofessional. If you are frustrated by other people doing this to you, think about the ways you can bridge the divide and draw them into a shared success model where everyone wins by working together.</p><p><a href="https://www.itsecuritynews.info/google-working-on-patching-gcp-vulnerability-that-allows-vm-takeover/">Google Working on Patching GCP Vulnerability that Allows VM Takeover</a>, AWS users rejoice. Finally a cloud security problem you can ignore. GCP users, it’s your turn to panic and question your choices. Now, you know what it feels like to be everyone else using cloud services. Being in the cloud doesn’t reduce your risks inherently; it merely shifts the focus of some of your risks.</p><p><br></p><p><br><a href="https://www.darkreading.com/attacks-breaches/nsa-and-cisa-issue-warning-about-russian-gru-brute-force-cyberattacks-against-us-global-orgs/d/d-id/1341458">NSA &amp; CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs</a>. Cyber attacks are becoming more frequent and more automated. Even the human-driven APT attacks are using scalable cloud technologies to do their dirty work. Monitor your cloud and service or system usage for anomalous behavior, as well as known attack profiles.</p><p><a href="https://www.forbes.com/sites/daveywinder/2021/07/05/70-million-demanded-as-revil-ransomware-attackers-claim-1-millio..."></a></p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Jul 2021 02:53:20 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/d22e15e5/c2c26f81.mp3" length="13046809" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>539</itunes:duration>
      <itunes:summary>Don’t get held ransom by ransomware! Remember to balance your production and your security. This week there are ways to keep it all secure across the systems. Ransomware isn’t a joke folks! Tune in to see useful ways to keep yourself secure.

In the news: is cybersecurity insurances worth it? More useless laws for cybersecurity, NSA rings the warning bells on Russia, and more from security and the cloud!</itunes:summary>
      <itunes:subtitle>Don’t get held ransom by ransomware! Remember to balance your production and your security. This week there are ways to keep it all secure across the systems. Ransomware isn’t a joke folks! Tune in to see useful ways to keep yourself secure.

In the new</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Thesauruses are fun: Adaptable Durable Flexible</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Thesauruses are fun: Adaptable Durable Flexible</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a71aa1d2-d424-4dad-8c67-1845a622aa79</guid>
      <link>https://share.transistor.fm/s/de715ab1</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Cybersecurity industry reacts as antivirus pioneer John McAfee found dead</em>: <a href="https://www.csoonline.com/article/3623188/cybersecurity-industry-reacts-as-antivirus-pioneer-john-mcafee-found-dead.html">https://www.csoonline.com/article/3623188/cybersecurity-industry-reacts-as-antivirus-pioneer-john-mcafee-found-dead.html</a></li><li><em>Storms &amp; Silver Linings: Avoiding the Dangers of Cloud Migration</em>: <a href="https://beta.darkreading.com/cloud/storms-silver-linings-avoiding-the-dangers-of-cloud-migration">https://beta.darkreading.com/cloud/storms-silver-linings-avoiding-the-dangers-of-cloud-migration</a></li><li><em>7 ways technical debt increases security risk</em>: <a href="https://www.csoonline.com/article/3621754/7-ways-technical-debt-increases-security-risk.html">https://www.csoonline.com/article/3621754/7-ways-technical-debt-increases-security-risk.html</a></li><li><em>New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies</em>: <a href="https://www.darkreading.com/vulnerabilities---threats/new-dns-name-server-hijack-attack-exposes-businesses-government-agencies/d/d-id/1341377">https://www.darkreading.com/vulnerabilities—threats/new-dns-name-server-hijack-attack-exposes-businesses-government-agencies/d/d-id/1341377</a></li><li><em>CISO Jason Lee on Zoom’s response to its pandemic security challenges</em>: <a href="https://www.csoonline.com/article/3622671/ciso-jason-lee-on-zooms-response-to-its-pandemic-security-challenges.html">https://www.csoonline.com/article/3622671/ciso-jason-lee-on-zooms-response-to-its-pandemic-security-challenges.html</a></li><li><em>Software-Container Supply Chain Sees Spike in Attacks</em>: <a href="https://beta.darkreading.com/cloud/software-container-supply-chain-sees-spike-in-attacks">https://beta.darkreading.com/cloud/software-container-supply-chain-sees-spike-in-attacks</a></li><li><em>Four states propose laws to ban ransomware payments</em>: <a href="https://www.csoonline.com/article/3622888/four-states-propose-laws-to-ban-ransomware-payments.html">https://www.csoonline.com/article/3622888/four-states-propose-laws-to-ban-ransomware-payments.html</a></li><li><em>Senators propose bill to help tackle cybersecurity workforce shortage</em>: <a href="https://thehill.com/policy/cybersecurity/560318-senators-propose-bill-to-help-tackle-cybersecurity-workforce-shortage">https://thehill.com/policy/cybersecurity/560318-senators-propose-bill-to-help-tackle-cybersecurity-workforce-shortage</a></li><li><em>Expecting the Unexpected: Tips for Effectively Mitigating Ransomware Attacks in 2021</em>: <a href="https://beta.darkreading.com/vulnerabilities-threats/expecting-the-unexpected-tips-for-effectively-mitigating-ransomware-attacks-in-2021">https://beta.darkreading.com/vulnerabilities-threats/expecting-the-unexpected-tips-for-effectively-mitigating-ransomware-attacks-in-2021</a></li><li><em>What Lies Ahead for K-12 Cybersecurity?</em>: <a href="https://securityboulevard.com/2021/06/what-lies-ahead-for-k-12-cybersecurity/">https://securityboulevard.com/2021/06/what-lies-ahead-for-k-12-cybersecurity/</a></li><li><em>How to Protect Healthcare Data from Ransomware Attacks</em>: <a href="https://www.ccsinet.com/blog/data-from-ransomware-attacks/">https://www.ccsinet.com/blog/data-from-ransomware-attacks/</a></li><li><em>System Resilience: What Exactly Is It?</em>: <a href="https://insights.sei.cmu.edu/blog/system-resilience-what-exactly-is-it/">https://insights.sei.cmu.edu/blog/system-resilience-what-exactly-is-it/</a></li><li><em>Resilience Engineering: An Introduction</em>: <a href="https://www.bmc.com/blogs/resilience-engineering/">https://www.bmc.com/blogs/resilience-engineering/</a></li><li><em>Charting a path to software resiliency</em>: <a href="https://medium.com/walmartglobaltech/charting-a-path-to-software-resiliency-38148d956f4a">https://medium.com/walmartglobaltech/charting-a-path-to-software-resiliency-38148d956f4a</a></li><li><em>7 Best Practices to Build and Maintain Resilient Applications and Infrastructure</em>: <a href="https://thenewstack.io/7-best-practices-to-build-and-maintain-resilient-applications-and-infrastructure/">https://thenewstack.io/7-best-practices-to-build-and-maintain-resilient-applications-and-infrastructure/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p><br></p><p><br>Jesse: I’ve heard the term ‘fail gracefully’ hundreds of times. What the heck does that really mean? Most people don’t think too hard on how their system should gracefully bow out rather than the old school method of complete failures and horrible restarts. Resilient software engineering is the discipline of making software and systems fail in ways that minimize and isolate failures while continuing to deliver service and availability. Basically, it means if you have a failure from hardware or dependencies, like a database, your service continues to work correctly and the broken parts just get shut down and replaced.</p><p>Cloud-native software using microservices or even dynamically deployed containers or systems is the perfect way to implement resiliency in your operations. Look toward the next development cycle of your software and systems to begin implementing this immediately if you don’t already have this in place. None of this really makes sense until you see an example, so think of it this way: you have a web-based service for customers to see their account profile and order history. It’s built to scale with containers using AWS Elastic Kubernetes service—or EKS—and it is designed so when a system throws errors of any kind, that container is closed down. Then the Aws Elastic Load Balancer—or ELP—service points all subsequent requests to a different container instance in EKS.</p><p>In that scenario, if a container is breached in a security event, or if something simply fails due to a software bug or data corruption, the service recovers by tossing a new system while yanking out the old system. This is security by designing self-healing IT systems. You get both security and stability for the same effort. This is DevSecOps in practice and shows how a shift-left mindset for your organization is the best possible approach for your business or mission.</p><p>Jesse: Meanwhile, in the news. <a href="https://www.csoonline.com/article/3623188/cybersecurity-industry-reacts-as-antivirus-pioneer-john-mcafee-found-dead.html">Cybersecurity industry reacts as antivirus pioneer John McAfee found dead</a>. Sure John McAfee was clearly in his own blend of strange and eccentric, but he launched an entire industry vertical 34 years ago. The computer age has been around long enough now that the founders of the early megacorps are all fading away. Don’t forget our history, and if you ever asked yourself, “What would John McAfee do?” Please go do the opposite unless you plan on launching a successful business.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><em>Cybersecurity industry reacts as antivirus pioneer John McAfee found dead</em>: <a href="https://www.csoonline.com/article/3623188/cybersecurity-industry-reacts-as-antivirus-pioneer-john-mcafee-found-dead.html">https://www.csoonline.com/article/3623188/cybersecurity-industry-reacts-as-antivirus-pioneer-john-mcafee-found-dead.html</a></li><li><em>Storms &amp; Silver Linings: Avoiding the Dangers of Cloud Migration</em>: <a href="https://beta.darkreading.com/cloud/storms-silver-linings-avoiding-the-dangers-of-cloud-migration">https://beta.darkreading.com/cloud/storms-silver-linings-avoiding-the-dangers-of-cloud-migration</a></li><li><em>7 ways technical debt increases security risk</em>: <a href="https://www.csoonline.com/article/3621754/7-ways-technical-debt-increases-security-risk.html">https://www.csoonline.com/article/3621754/7-ways-technical-debt-increases-security-risk.html</a></li><li><em>New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies</em>: <a href="https://www.darkreading.com/vulnerabilities---threats/new-dns-name-server-hijack-attack-exposes-businesses-government-agencies/d/d-id/1341377">https://www.darkreading.com/vulnerabilities—threats/new-dns-name-server-hijack-attack-exposes-businesses-government-agencies/d/d-id/1341377</a></li><li><em>CISO Jason Lee on Zoom’s response to its pandemic security challenges</em>: <a href="https://www.csoonline.com/article/3622671/ciso-jason-lee-on-zooms-response-to-its-pandemic-security-challenges.html">https://www.csoonline.com/article/3622671/ciso-jason-lee-on-zooms-response-to-its-pandemic-security-challenges.html</a></li><li><em>Software-Container Supply Chain Sees Spike in Attacks</em>: <a href="https://beta.darkreading.com/cloud/software-container-supply-chain-sees-spike-in-attacks">https://beta.darkreading.com/cloud/software-container-supply-chain-sees-spike-in-attacks</a></li><li><em>Four states propose laws to ban ransomware payments</em>: <a href="https://www.csoonline.com/article/3622888/four-states-propose-laws-to-ban-ransomware-payments.html">https://www.csoonline.com/article/3622888/four-states-propose-laws-to-ban-ransomware-payments.html</a></li><li><em>Senators propose bill to help tackle cybersecurity workforce shortage</em>: <a href="https://thehill.com/policy/cybersecurity/560318-senators-propose-bill-to-help-tackle-cybersecurity-workforce-shortage">https://thehill.com/policy/cybersecurity/560318-senators-propose-bill-to-help-tackle-cybersecurity-workforce-shortage</a></li><li><em>Expecting the Unexpected: Tips for Effectively Mitigating Ransomware Attacks in 2021</em>: <a href="https://beta.darkreading.com/vulnerabilities-threats/expecting-the-unexpected-tips-for-effectively-mitigating-ransomware-attacks-in-2021">https://beta.darkreading.com/vulnerabilities-threats/expecting-the-unexpected-tips-for-effectively-mitigating-ransomware-attacks-in-2021</a></li><li><em>What Lies Ahead for K-12 Cybersecurity?</em>: <a href="https://securityboulevard.com/2021/06/what-lies-ahead-for-k-12-cybersecurity/">https://securityboulevard.com/2021/06/what-lies-ahead-for-k-12-cybersecurity/</a></li><li><em>How to Protect Healthcare Data from Ransomware Attacks</em>: <a href="https://www.ccsinet.com/blog/data-from-ransomware-attacks/">https://www.ccsinet.com/blog/data-from-ransomware-attacks/</a></li><li><em>System Resilience: What Exactly Is It?</em>: <a href="https://insights.sei.cmu.edu/blog/system-resilience-what-exactly-is-it/">https://insights.sei.cmu.edu/blog/system-resilience-what-exactly-is-it/</a></li><li><em>Resilience Engineering: An Introduction</em>: <a href="https://www.bmc.com/blogs/resilience-engineering/">https://www.bmc.com/blogs/resilience-engineering/</a></li><li><em>Charting a path to software resiliency</em>: <a href="https://medium.com/walmartglobaltech/charting-a-path-to-software-resiliency-38148d956f4a">https://medium.com/walmartglobaltech/charting-a-path-to-software-resiliency-38148d956f4a</a></li><li><em>7 Best Practices to Build and Maintain Resilient Applications and Infrastructure</em>: <a href="https://thenewstack.io/7-best-practices-to-build-and-maintain-resilient-applications-and-infrastructure/">https://thenewstack.io/7-best-practices-to-build-and-maintain-resilient-applications-and-infrastructure/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p><br></p><p><br>Jesse: I’ve heard the term ‘fail gracefully’ hundreds of times. What the heck does that really mean? Most people don’t think too hard on how their system should gracefully bow out rather than the old school method of complete failures and horrible restarts. Resilient software engineering is the discipline of making software and systems fail in ways that minimize and isolate failures while continuing to deliver service and availability. Basically, it means if you have a failure from hardware or dependencies, like a database, your service continues to work correctly and the broken parts just get shut down and replaced.</p><p>Cloud-native software using microservices or even dynamically deployed containers or systems is the perfect way to implement resiliency in your operations. Look toward the next development cycle of your software and systems to begin implementing this immediately if you don’t already have this in place. None of this really makes sense until you see an example, so think of it this way: you have a web-based service for customers to see their account profile and order history. It’s built to scale with containers using AWS Elastic Kubernetes service—or EKS—and it is designed so when a system throws errors of any kind, that container is closed down. Then the Aws Elastic Load Balancer—or ELP—service points all subsequent requests to a different container instance in EKS.</p><p>In that scenario, if a container is breached in a security event, or if something simply fails due to a software bug or data corruption, the service recovers by tossing a new system while yanking out the old system. This is security by designing self-healing IT systems. You get both security and stability for the same effort. This is DevSecOps in practice and shows how a shift-left mindset for your organization is the best possible approach for your business or mission.</p><p>Jesse: Meanwhile, in the news. <a href="https://www.csoonline.com/article/3623188/cybersecurity-industry-reacts-as-antivirus-pioneer-john-mcafee-found-dead.html">Cybersecurity industry reacts as antivirus pioneer John McAfee found dead</a>. Sure John McAfee was clearly in his own blend of strange and eccentric, but he launched an entire industry vertical 34 years ago. The computer age has been around long enough now that the founders of the early megacorps are all fading away. Don’t forget our history, and if you ever asked yourself, “What would John McAfee do?” Please go do the opposite unless you plan on launching a successful business.</p>]]>
      </content:encoded>
      <pubDate>Thu, 01 Jul 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/de715ab1/97aadcbc.mp3" length="14666825" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>606</itunes:duration>
      <itunes:summary>In an age of fail themed YouTube compilations and memes, do we even fail gracefully anymore? If we do, or ever did, what does it mean to do so? Join Jesse this week as he ponders pontifically on the possibilities of how to do just that. Jesse asks why do we let the old systems crash and burn, instead of a gentle bow as they leave the stage? Turn in to a success compilation on the how's and why's to do so.

Following on with the latest in security news: how is the world of cyber security reacting to John McAfee’s death, avoid the dangers of cloud migration, Zoom’s onslaught of security challenges in lieu of the pandemic, and much more.</itunes:summary>
      <itunes:subtitle>In an age of fail themed YouTube compilations and memes, do we even fail gracefully anymore? If we do, or ever did, what does it mean to do so? Join Jesse this week as he ponders pontifically on the possibilities of how to do just that. Jesse asks why do </itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Real Risk vs Movie Risk</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Real Risk vs Movie Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8716beef-0b14-46ca-97b7-20f6dbf9e76e</guid>
      <link>https://share.transistor.fm/s/296343b5</link>
      <description>
        <![CDATA[<p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p><br></p><p><br></p><p>Jesse: Don’t be stupid. Focus on your real risks, not hacker movie risks. It is easy to get caught up in a type of advance for persistent threats and the latest in obscure attack methodologies to the point where you spend all of your energy and time hunting for these in your systems. This stuff is right out of the latest bad hacking movie. It’s a colossal waste of time for most of us. Spend your time on learning and monitoring things based on your real risk, not your overblown sense of self-importance that the latest international crime ring of nation-state-backed hackers wants to breach your defenses. News flash: APTs probably don’t care about you. If you make it fairly easy to get your data and use your resources, of course you’ll get popped. That’s like leaving your wallet on a bench in the park; of course someone will take it. Raise the barrier to entry for obtaining your resources and you reduce opportunistic crime, just like locking your car at night protects from casual pilfering through your things.</p><p>Meanwhile, in the news. <a href="https://www.securityweek.com/amazon-sidewalk-mesh-network-raises-security-privacy-concerns">Amazon Sidewalk Mesh Network Raises Security, Privacy Concerns</a>. Tangential to cloud security, these types of networks worry me for privacy and physical security concerns more than cybersecurity for the device and users. As this article says, privacy and security are separate issues. Conflating the two can compromise one or the other or both. Don’t confuse privacy and security as being one and the same.</p><p><br></p><p><br></p><p><a href="https://beta.darkreading.com/cloud/this-week-in-database-leaks-cognyte-cvs-wegmans">This Week in Database Leaks: Cognyte, CVS, Wegmans</a>. I routinely hammer on securing your cloud storage and other ways to minimize self-exposure of sensitive data for a reason. You should be scared of the implications of these exposures in terms of business risk, reputation loss, and regulatory violations and fines. In other words, don’t be stupid.</p><p><br></p><p><br></p><p><a href="https://securityintelligence.com/posts/data-security-wealth-protection/">Data is Wealth: Data Security is Wealth Protection</a>. Ignore the schilling of services as usual and take in the message: protecting your data is your prime directive. Ask yourself every morning, “How will I protect my data today?” Doing anything else is doing it wrong.</p><p><br></p><p><br></p><p><a href="https://www.darkreading.com/cloud/google-workspace-adds-client-side-encryption/d/d-id/1341292">Google Workspace Adds Client-Side Encryption</a>. This means you can store encrypted data in your Google accounts without Google having access to the contents of your data. This is a big deal. Take advantage of this if you use Google for document creation and storage.</p><p><br></p><p><br></p><p>Corey: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Jesse: <a href="https://securityintelligence.com/articles/travel-cybersecurity-tips-best-practices-2021/">Cybersecurity Tips for Business Travelers: Best Practices for 2021</a>. I plan to avoid a return to routine business travel, but if you want to, or don’t have a choice not to get back on the road, do it safely. If you don’t want the US Customs and Border Patrol agents searching your devices, wipe your phone before reaching customs. You can set your device to wipe on too many failed passcode entries then backup your phone right before boarding or departing the plane and wipe it on the way to the customs by tapping one number over and over as you walk off the plane.</p><p><br></p><p><br></p><p><a href="https://www.verizon.com/business/resources/reports/dbir/">2021 Verizon Data Breach Incident Report</a> insights. The annual Verizon data breach incident report—known as DBIR—has incredible and useful insights for all tech workers, not just security practitioners. Once again, humans are the weak link. I know spending more time educating your people than hunting for ABTs is boring sauce, but you’ll be better off.</p><p><br></p><p><br></p><p><a href="https://beta.darkreading.com/attacks-breaches/one-in-five-manufacturing-firms-targeted-by-cyberattacks">One in Five Manufacturing Firms Targeted by Cyberattacks</a>. If you create real-world goods, you are a prize target. Don’t be fooled into thinking you’re safer because it’s harder to steal things in meatspace than in cyberspace.</p><p><br></p><p><br></p><p><a href="https://securityintelligence.com/articles/confidential-computing-future-cloud-computing-security/">Confidential Computing: The Future of Cloud Computing Security</a>. Using hardware-level security is still possible in the cloud. Most of us don’t need to encrypt everything on a system or everything running in memory, but some of us do need to be that paranoid. However, don’t do this unless you really truly have a business case for it, and to implement checkout services like AWS CloudHSM for encryption of in-use memory and data.</p><p><br></p><p><br></p><p><a href="https://www.darkreading.com/mobile/many-mobile-apps-intentionally-using-insecure-connections-for-sending-data/d/d-id/1341276">Many Mobile Apps Intentionally Using Insecure Connections for Sending Data</a>. Don’t use insecure transport in your apps. Encrypt your data in transit. Eventually, consumers will have ways to disable all apps that don’t use basic security measures like proper authentication without stored credentials or using unencrypted channels. Don’t be stupid. Are you sensing a theme of the week?</p><p><br></p><p><br></p><p><a href="https://securityintelligence.com/posts/cyber-resilience-strategy-tactics/">The Art and Strategy of Becoming More Cyber Resilient</a>. Resiliency in IT architectures and applications is becoming the only way to survive the modern distributed world, especially in cybersecurity. You need to change your whole paradigm to be risk and recovery-based, not just the old-school defender attitude of building lots of walls.</p><p><br></p><p><br></p><p><a href="https://www.darkreading.com/analytics/cyber-is-the-new-cold-war-and-ai-is-the-arms-race/a/d-id/1341184">Cyber is the New Cold War &amp; AI is the Arms Race</a>. The whole AI marketing trope gets old. Ugh. But the message is accurate. There is too m...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p><br></p><p><br></p><p>Jesse: Don’t be stupid. Focus on your real risks, not hacker movie risks. It is easy to get caught up in a type of advance for persistent threats and the latest in obscure attack methodologies to the point where you spend all of your energy and time hunting for these in your systems. This stuff is right out of the latest bad hacking movie. It’s a colossal waste of time for most of us. Spend your time on learning and monitoring things based on your real risk, not your overblown sense of self-importance that the latest international crime ring of nation-state-backed hackers wants to breach your defenses. News flash: APTs probably don’t care about you. If you make it fairly easy to get your data and use your resources, of course you’ll get popped. That’s like leaving your wallet on a bench in the park; of course someone will take it. Raise the barrier to entry for obtaining your resources and you reduce opportunistic crime, just like locking your car at night protects from casual pilfering through your things.</p><p>Meanwhile, in the news. <a href="https://www.securityweek.com/amazon-sidewalk-mesh-network-raises-security-privacy-concerns">Amazon Sidewalk Mesh Network Raises Security, Privacy Concerns</a>. Tangential to cloud security, these types of networks worry me for privacy and physical security concerns more than cybersecurity for the device and users. As this article says, privacy and security are separate issues. Conflating the two can compromise one or the other or both. Don’t confuse privacy and security as being one and the same.</p><p><br></p><p><br></p><p><a href="https://beta.darkreading.com/cloud/this-week-in-database-leaks-cognyte-cvs-wegmans">This Week in Database Leaks: Cognyte, CVS, Wegmans</a>. I routinely hammer on securing your cloud storage and other ways to minimize self-exposure of sensitive data for a reason. You should be scared of the implications of these exposures in terms of business risk, reputation loss, and regulatory violations and fines. In other words, don’t be stupid.</p><p><br></p><p><br></p><p><a href="https://securityintelligence.com/posts/data-security-wealth-protection/">Data is Wealth: Data Security is Wealth Protection</a>. Ignore the schilling of services as usual and take in the message: protecting your data is your prime directive. Ask yourself every morning, “How will I protect my data today?” Doing anything else is doing it wrong.</p><p><br></p><p><br></p><p><a href="https://www.darkreading.com/cloud/google-workspace-adds-client-side-encryption/d/d-id/1341292">Google Workspace Adds Client-Side Encryption</a>. This means you can store encrypted data in your Google accounts without Google having access to the contents of your data. This is a big deal. Take advantage of this if you use Google for document creation and storage.</p><p><br></p><p><br></p><p>Corey: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Jesse: <a href="https://securityintelligence.com/articles/travel-cybersecurity-tips-best-practices-2021/">Cybersecurity Tips for Business Travelers: Best Practices for 2021</a>. I plan to avoid a return to routine business travel, but if you want to, or don’t have a choice not to get back on the road, do it safely. If you don’t want the US Customs and Border Patrol agents searching your devices, wipe your phone before reaching customs. You can set your device to wipe on too many failed passcode entries then backup your phone right before boarding or departing the plane and wipe it on the way to the customs by tapping one number over and over as you walk off the plane.</p><p><br></p><p><br></p><p><a href="https://www.verizon.com/business/resources/reports/dbir/">2021 Verizon Data Breach Incident Report</a> insights. The annual Verizon data breach incident report—known as DBIR—has incredible and useful insights for all tech workers, not just security practitioners. Once again, humans are the weak link. I know spending more time educating your people than hunting for ABTs is boring sauce, but you’ll be better off.</p><p><br></p><p><br></p><p><a href="https://beta.darkreading.com/attacks-breaches/one-in-five-manufacturing-firms-targeted-by-cyberattacks">One in Five Manufacturing Firms Targeted by Cyberattacks</a>. If you create real-world goods, you are a prize target. Don’t be fooled into thinking you’re safer because it’s harder to steal things in meatspace than in cyberspace.</p><p><br></p><p><br></p><p><a href="https://securityintelligence.com/articles/confidential-computing-future-cloud-computing-security/">Confidential Computing: The Future of Cloud Computing Security</a>. Using hardware-level security is still possible in the cloud. Most of us don’t need to encrypt everything on a system or everything running in memory, but some of us do need to be that paranoid. However, don’t do this unless you really truly have a business case for it, and to implement checkout services like AWS CloudHSM for encryption of in-use memory and data.</p><p><br></p><p><br></p><p><a href="https://www.darkreading.com/mobile/many-mobile-apps-intentionally-using-insecure-connections-for-sending-data/d/d-id/1341276">Many Mobile Apps Intentionally Using Insecure Connections for Sending Data</a>. Don’t use insecure transport in your apps. Encrypt your data in transit. Eventually, consumers will have ways to disable all apps that don’t use basic security measures like proper authentication without stored credentials or using unencrypted channels. Don’t be stupid. Are you sensing a theme of the week?</p><p><br></p><p><br></p><p><a href="https://securityintelligence.com/posts/cyber-resilience-strategy-tactics/">The Art and Strategy of Becoming More Cyber Resilient</a>. Resiliency in IT architectures and applications is becoming the only way to survive the modern distributed world, especially in cybersecurity. You need to change your whole paradigm to be risk and recovery-based, not just the old-school defender attitude of building lots of walls.</p><p><br></p><p><br></p><p><a href="https://www.darkreading.com/analytics/cyber-is-the-new-cold-war-and-ai-is-the-arms-race/a/d-id/1341184">Cyber is the New Cold War &amp; AI is the Arms Race</a>. The whole AI marketing trope gets old. Ugh. But the message is accurate. There is too m...</p>]]>
      </content:encoded>
      <pubDate>Thu, 24 Jun 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/296343b5/0822e5f1.mp3" length="12378085" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>511</itunes:duration>
      <itunes:summary>The magic weaver himself, Jesse Trucks, is back at it again and this time he is going after Hollywierd and all its misinformation. Unlike in the movies (password: pencil, you’re in the clear) real hacking risks are something to be taken with a heap of salt. Its safe to say that real APTs aren’t out to get you, but if you leave your data out in the wild then you’re asking for it. Take those extra steps towards securing your information!

Following on with some news: via Amazon Sidewalk Mesh Network remember, don’t confuse privacy with security. Cognyte, CVS, and Wegman’s sprout some leaks! Find some useful tips for traveling and cybersecurity in our brave new world as it begins to open up. This and more here at Meanwhile in Security! Stay tuned for more ways to keep spunky high school hackers from changing your grades!</itunes:summary>
      <itunes:subtitle>The magic weaver himself, Jesse Trucks, is back at it again and this time he is going after Hollywierd and all its misinformation. Unlike in the movies (password: pencil, you’re in the clear) real hacking risks are something to be taken with a heap of sal</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>You Down with ATP? Yeah, You Know Me</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>You Down with ATP? Yeah, You Know Me</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2f1edcff-aa59-4a4a-961b-24b7275eaa0d</guid>
      <link>https://share.transistor.fm/s/5c1b4dbc</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>ABT1 Report: <a href="https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf">https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf</a></li><li><em>Securing Your Cloud Transformation Journey</em>: <a href="https://onwireco.com/2021/06/08/securing-your-cloud-transformation-journey/">https://onwireco.com/2021/06/08/securing-your-cloud-transformation-journey/</a></li><li><em>TeamTNT Strikes Again: A Wake-Up Call to Start Securing Cloud Entitlements</em>: <a href="https://securityboulevard.com/2021/06/teamtnt-strikes-again-a-wake-up-call-to-start-securing-cloud-entitlements/">https://securityboulevard.com/2021/06/teamtnt-strikes-again-a-wake-up-call-to-start-securing-cloud-entitlements/</a></li><li><em>Secure Access Trade-offs for DevSecOps Teams</em>: <a href="https://beta.darkreading.com/vulnerabilities-threats/secure-access-trade-offs-for-devsecops-teams?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple">https://beta.darkreading.com/vulnerabilities-threats/secure-access-trade-offs-for-devsecops-teams?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</a></li><li><em>Cyber Gangs: Who are they in 2021 and what do they Want?</em>: <a href="https://securityintelligence.com/articles/cyber-crime-gangs-who-are-they-today/">https://securityintelligence.com/articles/cyber-crime-gangs-who-are-they-today/</a></li><li><em>Required MFA is not Sufficient for Strong Security: A Report</em>: <a href="https://www.darkreading.com/cloud/required-mfa-is-not-sufficient-for-strong-security-report/d/d-id/1341263">https://www.darkreading.com/cloud/required-mfa-is-not-sufficient-for-strong-security-report/d/d-id/1341263</a></li><li><em>With Cloud, CDO and CISO Concerns are Equally Important</em>: <a href="https://www.itsecuritynews.info/with-cloud-cdo-and-ciso-concerns-are-equally-important/">https://www.itsecuritynews.info/with-cloud-cdo-and-ciso-concerns-are-equally-important/</a></li><li><em>Colonial Pipeline CEO: Ransomware Attack Started via Pilfered ‘Legacy’ VPN Account</em>: <a href="https://beta.darkreading.com/attacks-breaches/colonial-pipeline-ceo-ransomware-attack-started-via-pilfered-legacy-vpn-account">https://beta.darkreading.com/attacks-breaches/colonial-pipeline-ceo-ransomware-attack-started-via-pilfered-legacy-vpn-account</a></li><li><em>Cloud Security: Why Being Intentional in Encryption Matters</em>: <a href="https://securityintelligence.com/articles/cloud-security-intentional-encryption/">https://securityintelligence.com/articles/cloud-security-intentional-encryption/</a></li><li><em>CSPM explained: Filling the gaps in cloud security</em>: <a href="https://www.csoonline.com/article/3620049/cspm-explained-filling-the-gaps-in-cloud-security.html">https://www.csoonline.com/article/3620049/cspm-explained-filling-the-gaps-in-cloud-security.html</a></li><li><em>Five worthy reads: Confidential computing–the way forward in cloud security</em>: <a href="https://securityboulevard.com/2021/06/five-worthy-reads-confidential-computing-the-way-forward-in-cloud-security/">https://securityboulevard.com/2021/06/five-worthy-reads-confidential-computing-the-way-forward-in-cloud-security/</a></li><li><em>Data Protection in the K-12 Cloud</em>: <a href="https://securityboulevard.com/2021/06/data-protection-in-the-k-12-cloud/">https://securityboulevard.com/2021/06/data-protection-in-the-k-12-cloud/</a></li><li><em>Cybersecurity Executive Order 2021: What it Means for Cloud and SaaS Security</em>: <a href="https://thehackernews.com/2021/06/cybersecurity-executive-order-2021-what.html">https://thehackernews.com/2021/06/cybersecurity-executive-order-2021-what.html</a></li><li><em>Hackers Can Exploit Samsung Pre-Installed Apps to Spy On Users</em>: <a href="https://thehackernews.com/2021/06/hackers-can-exploit-samsung-pre.html">https://thehackernews.com/2021/06/hackers-can-exploit-samsung-pre.html</a></li><li><em>Top 10 security items to improve in your AWS account</em>: <a href="https://aws.amazon.com/blogs/security/top-10-security-items-to-improve-in-your-aws-account/">https://aws.amazon.com/blogs/security/top-10-security-items-to-improve-in-your-aws-account/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: Are you building cloud applications with a distributed team? Check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy for cloud resources. Teleport provides secure access for anything running somewhere behind NAT SSH servers, Kubernetes clusters, internal web apps, and databases. Teleport gives engineers superpowers. Get access to everything via single sign-on with multi-factor authentication, list and see all SSH servers, Kubernetes clusters, or databases available to you, and get instant access to them using tools you already have. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. And best of all, Teleport doesn’t get in the way. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p>Jesse: Us security people and the general news media like talking about APT this and APT that however, like most things with cybersecurity, the term isn’t even explained. The term is Advanced Persistent Threat—or APT—and it came from Kevin Mandia, founder of Mandiant, a security company, in the famous <a href="https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf">ABT1 Report</a> as it’s called, released in early 2013, is a fascinating read. Well, maybe some of us love reading these things.</p><p>There’s a lot of hype around APTs and what it all means. An APT is essentially a well-funded hacking group, usually with nation-state backing. This means some government is funding and/or training and otherwise supporting the efforts of what amounts to a criminal enterprise attacking assets. Most of us shouldn’t care much about APTs though, as long as we secure our cloud accounts and use properly configured multi-factor authentication, or MFA.</p><p>Meanwhile, in the news. <a href="https://onwireco.com/2021/06/08/securing-your-cloud-transformation-journey/">Securing Your Cloud Transformation Journey</a>. Plan, build, run, repeat. Plan, build, run, repeat. It’s so simple, however, the details are complex and varied at every one of these stages to reduce the possibility of something catastrophic happening.</p><p><a href="https://securityboulevard.com/2021/06/teamtnt-strikes-again-a-wake-up-call-to-start-securing-cloud-entitlements/">TeamTNT Strikes Again: A Wake-Up Call to Start Securing Cloud Entitlements</a>. If you don’t secure your IAM credentials for cloud services, the keys to your kingdom will be shared about by nefarious actors. I’ve recently pointed out that this ABT group, the TeamTNT, was harvesting easy-to-obtain credentials. I love a chance to hammer on basic protocols a...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>ABT1 Report: <a href="https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf">https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf</a></li><li><em>Securing Your Cloud Transformation Journey</em>: <a href="https://onwireco.com/2021/06/08/securing-your-cloud-transformation-journey/">https://onwireco.com/2021/06/08/securing-your-cloud-transformation-journey/</a></li><li><em>TeamTNT Strikes Again: A Wake-Up Call to Start Securing Cloud Entitlements</em>: <a href="https://securityboulevard.com/2021/06/teamtnt-strikes-again-a-wake-up-call-to-start-securing-cloud-entitlements/">https://securityboulevard.com/2021/06/teamtnt-strikes-again-a-wake-up-call-to-start-securing-cloud-entitlements/</a></li><li><em>Secure Access Trade-offs for DevSecOps Teams</em>: <a href="https://beta.darkreading.com/vulnerabilities-threats/secure-access-trade-offs-for-devsecops-teams?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple">https://beta.darkreading.com/vulnerabilities-threats/secure-access-trade-offs-for-devsecops-teams?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</a></li><li><em>Cyber Gangs: Who are they in 2021 and what do they Want?</em>: <a href="https://securityintelligence.com/articles/cyber-crime-gangs-who-are-they-today/">https://securityintelligence.com/articles/cyber-crime-gangs-who-are-they-today/</a></li><li><em>Required MFA is not Sufficient for Strong Security: A Report</em>: <a href="https://www.darkreading.com/cloud/required-mfa-is-not-sufficient-for-strong-security-report/d/d-id/1341263">https://www.darkreading.com/cloud/required-mfa-is-not-sufficient-for-strong-security-report/d/d-id/1341263</a></li><li><em>With Cloud, CDO and CISO Concerns are Equally Important</em>: <a href="https://www.itsecuritynews.info/with-cloud-cdo-and-ciso-concerns-are-equally-important/">https://www.itsecuritynews.info/with-cloud-cdo-and-ciso-concerns-are-equally-important/</a></li><li><em>Colonial Pipeline CEO: Ransomware Attack Started via Pilfered ‘Legacy’ VPN Account</em>: <a href="https://beta.darkreading.com/attacks-breaches/colonial-pipeline-ceo-ransomware-attack-started-via-pilfered-legacy-vpn-account">https://beta.darkreading.com/attacks-breaches/colonial-pipeline-ceo-ransomware-attack-started-via-pilfered-legacy-vpn-account</a></li><li><em>Cloud Security: Why Being Intentional in Encryption Matters</em>: <a href="https://securityintelligence.com/articles/cloud-security-intentional-encryption/">https://securityintelligence.com/articles/cloud-security-intentional-encryption/</a></li><li><em>CSPM explained: Filling the gaps in cloud security</em>: <a href="https://www.csoonline.com/article/3620049/cspm-explained-filling-the-gaps-in-cloud-security.html">https://www.csoonline.com/article/3620049/cspm-explained-filling-the-gaps-in-cloud-security.html</a></li><li><em>Five worthy reads: Confidential computing–the way forward in cloud security</em>: <a href="https://securityboulevard.com/2021/06/five-worthy-reads-confidential-computing-the-way-forward-in-cloud-security/">https://securityboulevard.com/2021/06/five-worthy-reads-confidential-computing-the-way-forward-in-cloud-security/</a></li><li><em>Data Protection in the K-12 Cloud</em>: <a href="https://securityboulevard.com/2021/06/data-protection-in-the-k-12-cloud/">https://securityboulevard.com/2021/06/data-protection-in-the-k-12-cloud/</a></li><li><em>Cybersecurity Executive Order 2021: What it Means for Cloud and SaaS Security</em>: <a href="https://thehackernews.com/2021/06/cybersecurity-executive-order-2021-what.html">https://thehackernews.com/2021/06/cybersecurity-executive-order-2021-what.html</a></li><li><em>Hackers Can Exploit Samsung Pre-Installed Apps to Spy On Users</em>: <a href="https://thehackernews.com/2021/06/hackers-can-exploit-samsung-pre.html">https://thehackernews.com/2021/06/hackers-can-exploit-samsung-pre.html</a></li><li><em>Top 10 security items to improve in your AWS account</em>: <a href="https://aws.amazon.com/blogs/security/top-10-security-items-to-improve-in-your-aws-account/">https://aws.amazon.com/blogs/security/top-10-security-items-to-improve-in-your-aws-account/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: Are you building cloud applications with a distributed team? Check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy for cloud resources. Teleport provides secure access for anything running somewhere behind NAT SSH servers, Kubernetes clusters, internal web apps, and databases. Teleport gives engineers superpowers. Get access to everything via single sign-on with multi-factor authentication, list and see all SSH servers, Kubernetes clusters, or databases available to you, and get instant access to them using tools you already have. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. And best of all, Teleport doesn’t get in the way. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p>Jesse: Us security people and the general news media like talking about APT this and APT that however, like most things with cybersecurity, the term isn’t even explained. The term is Advanced Persistent Threat—or APT—and it came from Kevin Mandia, founder of Mandiant, a security company, in the famous <a href="https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf">ABT1 Report</a> as it’s called, released in early 2013, is a fascinating read. Well, maybe some of us love reading these things.</p><p>There’s a lot of hype around APTs and what it all means. An APT is essentially a well-funded hacking group, usually with nation-state backing. This means some government is funding and/or training and otherwise supporting the efforts of what amounts to a criminal enterprise attacking assets. Most of us shouldn’t care much about APTs though, as long as we secure our cloud accounts and use properly configured multi-factor authentication, or MFA.</p><p>Meanwhile, in the news. <a href="https://onwireco.com/2021/06/08/securing-your-cloud-transformation-journey/">Securing Your Cloud Transformation Journey</a>. Plan, build, run, repeat. Plan, build, run, repeat. It’s so simple, however, the details are complex and varied at every one of these stages to reduce the possibility of something catastrophic happening.</p><p><a href="https://securityboulevard.com/2021/06/teamtnt-strikes-again-a-wake-up-call-to-start-securing-cloud-entitlements/">TeamTNT Strikes Again: A Wake-Up Call to Start Securing Cloud Entitlements</a>. If you don’t secure your IAM credentials for cloud services, the keys to your kingdom will be shared about by nefarious actors. I’ve recently pointed out that this ABT group, the TeamTNT, was harvesting easy-to-obtain credentials. I love a chance to hammer on basic protocols a...</p>]]>
      </content:encoded>
      <pubDate>Thu, 17 Jun 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/5c1b4dbc/5fabf025.mp3" length="14248848" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>589</itunes:duration>
      <itunes:summary>Join Jesse as he talks about Advanced Persistent Threats, otherwise known as APTs. He touches upon the easiest way to stop worrying about APTs, why you need to secure your IAM credentials, how proper security is the balance between the needs of service delivery and data availability, how you can’t track what you don’t know you have, the rise of cloud security posture management and why you might want to experiment with it, how confidential computing is essentially encryption of data via hardware, whether you can guess Jesse’s favorite part to Biden’s executive order on cybersecurity, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he talks about Advanced Persistent Threats, otherwise known as APTs. He touches upon the easiest way to stop worrying about APTs, why you need to secure your IAM credentials, how proper security is the balance between the needs of service de</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Pirates and Castles</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Pirates and Castles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42166a64-2561-4d15-adba-4bdfe0aa630e</guid>
      <link>https://share.transistor.fm/s/20f9cbd8</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br><strong>Links:</strong></p><ul><li>Blog entry: <a href="https://swagitda.com/blog/posts/on-yolosec-and-fomosec/">https://swagitda.com/blog/posts/on-yolosec-and-fomosec/</a></li><li><em>Why the Worst Cloud Security Predictions Might not Come True</em>: <a href="https://securityintelligence.com/articles/worst-cloud-security-predictions-not-true/">https://securityintelligence.com/articles/worst-cloud-security-predictions-not-true/</a></li><li><em>First Known Malware Surfaces Targeting Windows Containers</em>: <a href="https://www.darkreading.com/vulnerabilities---threats/first-known-malware-surfaces-targeting-windows-containers/d/d-id/1341230">https://www.darkreading.com/vulnerabilities—threats/first-known-malware-surfaces-targeting-windows-containers/d/d-id/1341230</a></li><li><em>Justice Dept. Claws Back $2.3M Paid by Colonial Pipeline to Ransomware Gang</em>: <a href="https://krebsonsecurity.com/2021/06/justice-dept-claws-back-2-3m-paid-by-colonial-pipeline-to-ransomware-gang/">https://krebsonsecurity.com/2021/06/justice-dept-claws-back-2-3m-paid-by-colonial-pipeline-to-ransomware-gang/</a></li><li><em>TeamTNT attacks IAM credentials of AWS and Google Cloud</em>: <a href="https://www.scmagazine.com/home/security-news/cloud-security/teamtnt-attacks-iam-credentials-of-aws-and-google-cloud/">https://www.scmagazine.com/home/security-news/cloud-security/teamtnt-attacks-iam-credentials-of-aws-and-google-cloud/</a></li><li><em>School Cybersecurity: How Awareness Training Removes Attackers’ Options</em>: <a href="https://securityintelligence.com/articles/how-awareness-training-improves-school-cybersecurity/">https://securityintelligence.com/articles/how-awareness-training-improves-school-cybersecurity/</a></li><li><em>Only 17% of organizations encrypt at least half of their sensitive cloud data</em>: <a href="https://www.scmagazine.com/home/security-news/only-17-of-organizations-encrypt-at-least-half-of-their-sensitive-cloud-data/">https://www.scmagazine.com/home/security-news/only-17-of-organizations-encrypt-at-least-half-of-their-sensitive-cloud-data/</a></li><li><em>Return to Basics: Email Security in the Post-COVID Workplace</em>: <a href="https://beta.darkreading.com/vulnerabilities-threats/return-to-basics-email-security-in-the-post-covid-workplace">https://beta.darkreading.com/vulnerabilities-threats/return-to-basics-email-security-in-the-post-covid-workplace</a></li><li><em>Zero Trust or Bust: What it is and Why it Matters to Data Security</em>: <a href="https://securityintelligence.com/posts/zero-trust-why-it-matters-data-security/">https://securityintelligence.com/posts/zero-trust-why-it-matters-data-security/</a></li><li><em>What the FedEx Logo Taught Me About Cybersecurity</em>: <a href="https://www.darkreading.com/vulnerabilities---threats/what-the-fedex-logo-taught-me-about-cybersecurity/a/d-id/1341118">https://www.darkreading.com/vulnerabilities—threats/what-the-fedex-logo-taught-me-about-cybersecurity/a/d-id/1341118</a></li><li><em>How the Rise of the Remote SOC Changed the Industry</em>: <a href="https://securityintelligence.com/articles/work-from-home-remote-soc/">https://securityintelligence.com/articles/work-from-home-remote-soc/</a></li><li><em>Organizations Shift Further Left in App Development</em>: <a href="https://www.darkreading.com/application-security/organizations-shift-further-left-in-app-development/d/d-id/1341219">https://www.darkreading.com/application-security/organizations-shift-further-left-in-app-development/d/d-id/1341219</a></li><li>Kate Turchin Wang YouTube: <a href="https://www.youtube.com/c/KeynoteSinger">https://www.youtube.com/c/KeynoteSinger</a></li><li><em>The Misaligned Incentives for Cloud Security</em>: <a href="https://securityboulevard.com/2021/05/the-misaligned-incentives-for-cloud-security/">https://securityboulevard.com/2021/05/the-misaligned-incentives-for-cloud-security/</a></li><li>Kelly Shortridge Twitter: <a href="https://twitter.com/swagitda_">https://twitter.com/swagitda_</a></li></ul><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Every week, I read dozens of articles, hundreds of social media posts on several platforms, and thousands of private messages about cybersecurity. There is one single most pervasive theme from all of them: security messaging is binary; there are generally only two mindsets about security. Both of these are wrong.</p><p><br></p><p><br>First, there’s the sensationalists who dream of being Case, the antihero in Gibson’s novel, <em>Neuromancer</em>, which is, by the way, the greatest dystopian cyberpunk novel ever written. I will fight you on that. These jokers want the world to think they are the first and final defense against the alien invasion of sophisticated and powerful hackers. Really, most of these folks are trying to chase a non-existent adrenaline rush doing defensive security. Don’t get me wrong, I love being a defender. It’s just not strapping a saddle onto a missile and riding into the sunset.</p><p>Second, there’s the cyber-doomers who spread fear, uncertainty, and doubt—we call it FUD—about how cyberspace has already collapsed and we’re all on life support while the hackers outside [unintelligible 00:02:06] run amok in pure cyber-anarchy. These purveyors of apocalyptic doomscapes assure us all that culture of no is the only answer to keeping sanity and safety within our control. They live on and trade in fear, but all this does is cost more money and hinder the mission in business. Kelly Shortridge calls this YOLOsec and FOMOsec and does a much better job at this than I can. Go read her <a href="https://swagitda.com/blog/posts/on-yolosec-and-fomosec/">blog entry</a>.</p><p>Meanwhile, in the news. <a href="https://securityintelligence.com/articles/worst-cloud-security-predictions-not-true/">Why the Worst Cloud Security Predictions Might not Come True</a>. We security people are usually gloom and doomers. It’s our stock and trade.</p><p>However, the migration to cloud is moving the exposed attack surfaces. This may not mean an increase in risk for many organizations. This could simply be a shift in risk categories.</p><p><a href="https://www.darkreading.com/vulnerabilities---threats/first-known-malware-surfaces-targeting-windows-containers/d/d-id/134123..."></a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br><strong>Links:</strong></p><ul><li>Blog entry: <a href="https://swagitda.com/blog/posts/on-yolosec-and-fomosec/">https://swagitda.com/blog/posts/on-yolosec-and-fomosec/</a></li><li><em>Why the Worst Cloud Security Predictions Might not Come True</em>: <a href="https://securityintelligence.com/articles/worst-cloud-security-predictions-not-true/">https://securityintelligence.com/articles/worst-cloud-security-predictions-not-true/</a></li><li><em>First Known Malware Surfaces Targeting Windows Containers</em>: <a href="https://www.darkreading.com/vulnerabilities---threats/first-known-malware-surfaces-targeting-windows-containers/d/d-id/1341230">https://www.darkreading.com/vulnerabilities—threats/first-known-malware-surfaces-targeting-windows-containers/d/d-id/1341230</a></li><li><em>Justice Dept. Claws Back $2.3M Paid by Colonial Pipeline to Ransomware Gang</em>: <a href="https://krebsonsecurity.com/2021/06/justice-dept-claws-back-2-3m-paid-by-colonial-pipeline-to-ransomware-gang/">https://krebsonsecurity.com/2021/06/justice-dept-claws-back-2-3m-paid-by-colonial-pipeline-to-ransomware-gang/</a></li><li><em>TeamTNT attacks IAM credentials of AWS and Google Cloud</em>: <a href="https://www.scmagazine.com/home/security-news/cloud-security/teamtnt-attacks-iam-credentials-of-aws-and-google-cloud/">https://www.scmagazine.com/home/security-news/cloud-security/teamtnt-attacks-iam-credentials-of-aws-and-google-cloud/</a></li><li><em>School Cybersecurity: How Awareness Training Removes Attackers’ Options</em>: <a href="https://securityintelligence.com/articles/how-awareness-training-improves-school-cybersecurity/">https://securityintelligence.com/articles/how-awareness-training-improves-school-cybersecurity/</a></li><li><em>Only 17% of organizations encrypt at least half of their sensitive cloud data</em>: <a href="https://www.scmagazine.com/home/security-news/only-17-of-organizations-encrypt-at-least-half-of-their-sensitive-cloud-data/">https://www.scmagazine.com/home/security-news/only-17-of-organizations-encrypt-at-least-half-of-their-sensitive-cloud-data/</a></li><li><em>Return to Basics: Email Security in the Post-COVID Workplace</em>: <a href="https://beta.darkreading.com/vulnerabilities-threats/return-to-basics-email-security-in-the-post-covid-workplace">https://beta.darkreading.com/vulnerabilities-threats/return-to-basics-email-security-in-the-post-covid-workplace</a></li><li><em>Zero Trust or Bust: What it is and Why it Matters to Data Security</em>: <a href="https://securityintelligence.com/posts/zero-trust-why-it-matters-data-security/">https://securityintelligence.com/posts/zero-trust-why-it-matters-data-security/</a></li><li><em>What the FedEx Logo Taught Me About Cybersecurity</em>: <a href="https://www.darkreading.com/vulnerabilities---threats/what-the-fedex-logo-taught-me-about-cybersecurity/a/d-id/1341118">https://www.darkreading.com/vulnerabilities—threats/what-the-fedex-logo-taught-me-about-cybersecurity/a/d-id/1341118</a></li><li><em>How the Rise of the Remote SOC Changed the Industry</em>: <a href="https://securityintelligence.com/articles/work-from-home-remote-soc/">https://securityintelligence.com/articles/work-from-home-remote-soc/</a></li><li><em>Organizations Shift Further Left in App Development</em>: <a href="https://www.darkreading.com/application-security/organizations-shift-further-left-in-app-development/d/d-id/1341219">https://www.darkreading.com/application-security/organizations-shift-further-left-in-app-development/d/d-id/1341219</a></li><li>Kate Turchin Wang YouTube: <a href="https://www.youtube.com/c/KeynoteSinger">https://www.youtube.com/c/KeynoteSinger</a></li><li><em>The Misaligned Incentives for Cloud Security</em>: <a href="https://securityboulevard.com/2021/05/the-misaligned-incentives-for-cloud-security/">https://securityboulevard.com/2021/05/the-misaligned-incentives-for-cloud-security/</a></li><li>Kelly Shortridge Twitter: <a href="https://twitter.com/swagitda_">https://twitter.com/swagitda_</a></li></ul><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Every week, I read dozens of articles, hundreds of social media posts on several platforms, and thousands of private messages about cybersecurity. There is one single most pervasive theme from all of them: security messaging is binary; there are generally only two mindsets about security. Both of these are wrong.</p><p><br></p><p><br>First, there’s the sensationalists who dream of being Case, the antihero in Gibson’s novel, <em>Neuromancer</em>, which is, by the way, the greatest dystopian cyberpunk novel ever written. I will fight you on that. These jokers want the world to think they are the first and final defense against the alien invasion of sophisticated and powerful hackers. Really, most of these folks are trying to chase a non-existent adrenaline rush doing defensive security. Don’t get me wrong, I love being a defender. It’s just not strapping a saddle onto a missile and riding into the sunset.</p><p>Second, there’s the cyber-doomers who spread fear, uncertainty, and doubt—we call it FUD—about how cyberspace has already collapsed and we’re all on life support while the hackers outside [unintelligible 00:02:06] run amok in pure cyber-anarchy. These purveyors of apocalyptic doomscapes assure us all that culture of no is the only answer to keeping sanity and safety within our control. They live on and trade in fear, but all this does is cost more money and hinder the mission in business. Kelly Shortridge calls this YOLOsec and FOMOsec and does a much better job at this than I can. Go read her <a href="https://swagitda.com/blog/posts/on-yolosec-and-fomosec/">blog entry</a>.</p><p>Meanwhile, in the news. <a href="https://securityintelligence.com/articles/worst-cloud-security-predictions-not-true/">Why the Worst Cloud Security Predictions Might not Come True</a>. We security people are usually gloom and doomers. It’s our stock and trade.</p><p>However, the migration to cloud is moving the exposed attack surfaces. This may not mean an increase in risk for many organizations. This could simply be a shift in risk categories.</p><p><a href="https://www.darkreading.com/vulnerabilities---threats/first-known-malware-surfaces-targeting-windows-containers/d/d-id/134123..."></a></p>]]>
      </content:encoded>
      <pubDate>Thu, 10 Jun 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/20f9cbd8/c8fa51ed.mp3" length="13248568" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>548</itunes:duration>
      <itunes:summary>Join Jesse as he talks about the two types of security mindsets and why both are wrong, why you should embrace the principle of least privilege, why you’re going to get owned sooner or later if you don’t secure your credentials, why we should teach kids about cybersecurity so they don’t make dumb decisions when they’re adults, how only 17 percent of organizations are encrypting at least half of their data in the cloud, why zero trust is a horrible name for the concept of dynamic contextual authorization, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he talks about the two types of security mindsets and why both are wrong, why you should embrace the principle of least privilege, why you’re going to get owned sooner or later if you don’t secure your credentials, why we should teach kids a</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Caution with Automation</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Caution with Automation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e14f554a-8f80-47d8-8f13-368c933c0f8e</guid>
      <link>https://share.transistor.fm/s/08e67e0a</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><br></p><p><br></p><p><strong>Links:</strong></p><ul><li><em>Autonomous drone attacked soldiers in Libya all on its own</em>: <a href="https://www.cnet.com/news/autonomous-drone-attacked-soldiers-in-libya-all-on-its-own/">https://www.cnet.com/news/autonomous-drone-attacked-soldiers-in-libya-all-on-its-own/</a></li><li><em>3 SASE—or ‘sas-ee’-Misconceptions to Consider</em>: <a href="https://www.darkreading.com/cloud/3-sase-misconceptions-to-consider-/a/d-id/1341088">https://www.darkreading.com/cloud/3-sase-misconceptions-to-consider-/a/d-id/1341088</a></li><li><em>Chinese APT Groups Continue to Pound Away on Pulse Secure VPNs</em>: <a href="https://www.darkreading.com/attacks-breaches/chinese-apt-groups-continue-to-pound-away-on-pulse-secure-vpns/d/d-id/1341174">https://www.darkreading.com/attacks-breaches/chinese-apt-groups-continue-to-pound-away-on-pulse-secure-vpns/d/d-id/1341174</a></li><li><em>Cybersecurity M&amp;A Roundup: 36 Deals Announced in May 2021</em>: <a href="https://www.securityweek.com/cybersecurity-ma-roundup-36-deals-announced-may-2021">https://www.securityweek.com/cybersecurity-ma-roundup-36-deals-announced-may-2021</a></li><li><em>The VC View: Identity = Zero Trust for Everything</em>: <a href="https://www.securityweek.com/vc-view-identity-zero-trust-everything">https://www.securityweek.com/vc-view-identity-zero-trust-everything</a></li><li><em>Three Things Holding Back Cloud Security</em>: <a href="https://securityboulevard.com/2021/05/three-things-holding-back-cloud-security/">https://securityboulevard.com/2021/05/three-things-holding-back-cloud-security/</a></li><li><em>What does the Future Hold for Cloud Security</em>: <a href="https://hackernoon.com/what-does-the-future-hold-for-cloud-security-i82e35md">https://hackernoon.com/what-does-the-future-hold-for-cloud-security-i82e35md</a></li><li><em>Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time</em>: <a href="https://www.mariakorolov.com/2021/report-cloud-security-breaches-surpass-on-prem-ones-for-the-first-time/">https://www.mariakorolov.com/2021/report-cloud-security-breaches-surpass-on-prem-ones-for-the-first-time/</a></li><li><em>What is DevSecOps, and how Can it Improve Your Security</em>: <a href="https://biztechmagazine.com/article/2021/05/what-devsecops-and-how-can-it-improve-your-security-perfcon">https://biztechmagazine.com/article/2021/05/what-devsecops-and-how-can-it-improve-your-security-perfcon</a></li><li><em>State of Security Research Zeroes in on Data Strategies</em>: <a href="https://www.splunk.com/en_us/blog/leadership/state-of-security-research-zeroes-in-on-data-strategies.html">https://www.splunk.com/en_us/blog/leadership/state-of-security-research-zeroes-in-on-data-strategies.html</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p><br>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Automation of processes is crucial for speed and reliable repeatability. However, automating tasks and procedures should be done with a certain amount of caution. Start by automating discrete tasks, then group or chain those tasks after thorough testing for safety. As you build experience and confidence in these groups of tasks, you can automate larger collections of operations. This is where security orchestration, automation, and response—or SOAR platforms—are critical to maintain automated operations in a cost-effective manner with minimal overhead.</p><p>In large-scale dynamic cloud deployments, whether using full-system stacks, containers, or cloud-native microservices, automating security operations is a requirement for functional response. This necessitates a high level of trust in your automation. Likely you’ll migrate into more machine learning and fuzzy-logic-based decision criteria that could have unintended consequences if you don’t put the right guardrails in place. Unfettered machine-based decision-making is how Skynet [laugh] is born. Please do be careful on your testing and implementation and production.</p><p><br></p><p><br>Meanwhile, in the news. <a href="https://www.cnet.com/news/autonomous-drone-attacked-soldiers-in-libya-all-on-its-own/">Autonomous drone attacked soldiers in Libya all on its own</a>. This is Skynet straight out of a Terminator movie. Remember this story when you are implementing automation in your environment. Unchecked and unmonitored automation can cause serious problems where there were none.</p><p><a href="https://www.darkreading.com/cloud/3-sase-misconceptions-to-consider-/a/d-id/1341088">3 SASE—or ‘sas-ee’—Misconceptions to Consider</a>. If you thought this was about self-addressed stamped envelopes, you are at least as old as I am. It’s pronounced ‘sas-ee’, which is all wrong phonetically. SASE, like my dog named Sassy, is a very valuable member of the family, but it won’t cure all your woes.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p><br></p><p><br>Jesse: <a href="https://www.darkreading.com/attacks-breaches/chinese-apt-groups-continue-to-pound-away-on-pulse-secure-vpns/d/d-id/1341174">Chinese APT Groups Continue to Pound Away on Pulse Secure VPNs</a>. I hope you’ve patched your Pulse Secure VPN because if you haven’t, a nation-state will own you soon. Go patch it and turn up monitoring if you haven’t already.</p><p><a href="https://www.securityweek.com/cybersecurity-ma-roundup-36-deals-announced-may-2021">Cybersecurity M&amp;A Roundup: 36 Deals Announced in May 2021</a>. None of us should wonder why the cybersecurity vendor market is so confusing after seeing the list of mergers that happen routinely. Just like with other tech markets, the big companies are slowly eat...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><br></p><p><br></p><p><strong>Links:</strong></p><ul><li><em>Autonomous drone attacked soldiers in Libya all on its own</em>: <a href="https://www.cnet.com/news/autonomous-drone-attacked-soldiers-in-libya-all-on-its-own/">https://www.cnet.com/news/autonomous-drone-attacked-soldiers-in-libya-all-on-its-own/</a></li><li><em>3 SASE—or ‘sas-ee’-Misconceptions to Consider</em>: <a href="https://www.darkreading.com/cloud/3-sase-misconceptions-to-consider-/a/d-id/1341088">https://www.darkreading.com/cloud/3-sase-misconceptions-to-consider-/a/d-id/1341088</a></li><li><em>Chinese APT Groups Continue to Pound Away on Pulse Secure VPNs</em>: <a href="https://www.darkreading.com/attacks-breaches/chinese-apt-groups-continue-to-pound-away-on-pulse-secure-vpns/d/d-id/1341174">https://www.darkreading.com/attacks-breaches/chinese-apt-groups-continue-to-pound-away-on-pulse-secure-vpns/d/d-id/1341174</a></li><li><em>Cybersecurity M&amp;A Roundup: 36 Deals Announced in May 2021</em>: <a href="https://www.securityweek.com/cybersecurity-ma-roundup-36-deals-announced-may-2021">https://www.securityweek.com/cybersecurity-ma-roundup-36-deals-announced-may-2021</a></li><li><em>The VC View: Identity = Zero Trust for Everything</em>: <a href="https://www.securityweek.com/vc-view-identity-zero-trust-everything">https://www.securityweek.com/vc-view-identity-zero-trust-everything</a></li><li><em>Three Things Holding Back Cloud Security</em>: <a href="https://securityboulevard.com/2021/05/three-things-holding-back-cloud-security/">https://securityboulevard.com/2021/05/three-things-holding-back-cloud-security/</a></li><li><em>What does the Future Hold for Cloud Security</em>: <a href="https://hackernoon.com/what-does-the-future-hold-for-cloud-security-i82e35md">https://hackernoon.com/what-does-the-future-hold-for-cloud-security-i82e35md</a></li><li><em>Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time</em>: <a href="https://www.mariakorolov.com/2021/report-cloud-security-breaches-surpass-on-prem-ones-for-the-first-time/">https://www.mariakorolov.com/2021/report-cloud-security-breaches-surpass-on-prem-ones-for-the-first-time/</a></li><li><em>What is DevSecOps, and how Can it Improve Your Security</em>: <a href="https://biztechmagazine.com/article/2021/05/what-devsecops-and-how-can-it-improve-your-security-perfcon">https://biztechmagazine.com/article/2021/05/what-devsecops-and-how-can-it-improve-your-security-perfcon</a></li><li><em>State of Security Research Zeroes in on Data Strategies</em>: <a href="https://www.splunk.com/en_us/blog/leadership/state-of-security-research-zeroes-in-on-data-strategies.html">https://www.splunk.com/en_us/blog/leadership/state-of-security-research-zeroes-in-on-data-strategies.html</a></li></ul><p><br></p><p><strong>Transcript</strong></p><p><br>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Automation of processes is crucial for speed and reliable repeatability. However, automating tasks and procedures should be done with a certain amount of caution. Start by automating discrete tasks, then group or chain those tasks after thorough testing for safety. As you build experience and confidence in these groups of tasks, you can automate larger collections of operations. This is where security orchestration, automation, and response—or SOAR platforms—are critical to maintain automated operations in a cost-effective manner with minimal overhead.</p><p>In large-scale dynamic cloud deployments, whether using full-system stacks, containers, or cloud-native microservices, automating security operations is a requirement for functional response. This necessitates a high level of trust in your automation. Likely you’ll migrate into more machine learning and fuzzy-logic-based decision criteria that could have unintended consequences if you don’t put the right guardrails in place. Unfettered machine-based decision-making is how Skynet [laugh] is born. Please do be careful on your testing and implementation and production.</p><p><br></p><p><br>Meanwhile, in the news. <a href="https://www.cnet.com/news/autonomous-drone-attacked-soldiers-in-libya-all-on-its-own/">Autonomous drone attacked soldiers in Libya all on its own</a>. This is Skynet straight out of a Terminator movie. Remember this story when you are implementing automation in your environment. Unchecked and unmonitored automation can cause serious problems where there were none.</p><p><a href="https://www.darkreading.com/cloud/3-sase-misconceptions-to-consider-/a/d-id/1341088">3 SASE—or ‘sas-ee’—Misconceptions to Consider</a>. If you thought this was about self-addressed stamped envelopes, you are at least as old as I am. It’s pronounced ‘sas-ee’, which is all wrong phonetically. SASE, like my dog named Sassy, is a very valuable member of the family, but it won’t cure all your woes.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p><br></p><p><br>Jesse: <a href="https://www.darkreading.com/attacks-breaches/chinese-apt-groups-continue-to-pound-away-on-pulse-secure-vpns/d/d-id/1341174">Chinese APT Groups Continue to Pound Away on Pulse Secure VPNs</a>. I hope you’ve patched your Pulse Secure VPN because if you haven’t, a nation-state will own you soon. Go patch it and turn up monitoring if you haven’t already.</p><p><a href="https://www.securityweek.com/cybersecurity-ma-roundup-36-deals-announced-may-2021">Cybersecurity M&amp;A Roundup: 36 Deals Announced in May 2021</a>. None of us should wonder why the cybersecurity vendor market is so confusing after seeing the list of mergers that happen routinely. Just like with other tech markets, the big companies are slowly eat...</p>]]>
      </content:encoded>
      <pubDate>Thu, 03 Jun 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/08e67e0a/42ae1d21.mp3" length="12847909" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>531</itunes:duration>
      <itunes:summary>Join Jesse as he talks about the critical role automation plays in security, why you need to be cautious when automating tasks, why you need to patch your Pulse Secure VPN, the M&amp;amp;A extravaganza going on in the cybersecurity space, why you should just let out a big sign and deploy into a zero-trust architecture today, how it’s important to know wrong behavior but even more useful to know what’s right, how cloud security breaches have officially surpassed on-prem breaches for the first time, why you should enable multi-factor authentication for cloud account access, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he talks about the critical role automation plays in security, why you need to be cautious when automating tasks, why you need to patch your Pulse Secure VPN, the M&amp;amp;A extravaganza going on in the cybersecurity space, why you should just </itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Stop Using Passwords, No Really, Stop</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Stop Using Passwords, No Really, Stop</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">208c86c3-30ee-436d-a046-5478ac81407c</guid>
      <link>https://share.transistor.fm/s/05102ba5</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Links:</strong></p><ul><li>Password strength XKCD: <a href="https://xkcd.com/936/">https://xkcd.com/936/</a></li><li><em>Building fine-grained authorization using Amazon Cognito, API Gateway, and IAM</em>: <a href="https://aws.amazon.com/blogs/security/building-fine-grained-authorization-using-amazon-cognito-api-gateway-and-iam/">https://aws.amazon.com/blogs/security/building-fine-grained-authorization-using-amazon-cognito-api-gateway-and-iam/</a></li><li><em>Misconfiguration of third party cloud services exposed data of over 100 million users</em>: <a href="https://blog.checkpoint.com/2021/05/20/misconfiguration-of-third-party-cloud-services-exposed-data-of-over-100-million-users/">https://blog.checkpoint.com/2021/05/20/misconfiguration-of-third-party-cloud-services-exposed-data-of-over-100-million-users/</a></li><li><em>Cost Savings, Better Security Drive Adoption of Emerging Technologies</em>: <a href="https://www.darkreading.com/risk/cost-savings-better-security-drive-adoption-of-emerging-technologies/d/d-id/1341081">https://www.darkreading.com/risk/cost-savings-better-security-drive-adoption-of-emerging-technologies/d/d-id/1341081</a></li><li><em>Cobalt Strike Becomes a Preferred Hacking Tool by Cybercrime and APT Groups</em>: <a href="https://www.darkreading.com/attacks-breaches/cobalt-strike-becomes-a-preferred-hacking-tool-by-cybercrime-apt-groups/d/d-id/1341073">https://www.darkreading.com/attacks-breaches/cobalt-strike-becomes-a-preferred-hacking-tool-by-cybercrime-apt-groups/d/d-id/1341073</a></li><li><em>Attackers Took 5 Minutes to Start Scanning for Exchange Server Flaws</em>: <a href="https://beta.darkreading.com/threat-intelligence/attackers-took-5-minutes-to-start-scanning-for-exchange-server-flaws">https://beta.darkreading.com/threat-intelligence/attackers-took-5-minutes-to-start-scanning-for-exchange-server-flaws</a></li><li><em>Credential Stuffing Reaches 193 Billion Login Attempts Annually</em>: <a href="https://www.darkreading.com/cloud/credential-stuffing-reaches-193-billion-login-attempts-annually/d/d-id/1341064">https://www.darkreading.com/cloud/credential-stuffing-reaches-193-billion-login-attempts-annually/d/d-id/1341064</a></li><li><em>How Ransomware Encourages Opportunists to Become Criminals</em>: <a href="https://www.darkreading.com/attacks-breaches/how-ransomware-encourages-opportunists-to-become-criminals/a/d-id/1340953">https://www.darkreading.com/attacks-breaches/how-ransomware-encourages-opportunists-to-become-criminals/a/d-id/1340953</a></li><li><em>American insurance giant CNA reportedly pays $40m to ransomware crooks</em>: <a href="https://www.theregister.com/2021/05/22/in_brief_security/">https://www.theregister.com/2021/05/22/in_brief_security/</a></li><li><em>79% of observed Microsoft Exchange Server exposures occurred in the cloud</em>: <a href="https://www.scmagazine.com/home/security-news/cybercrime/udpos-malware-spotted-exfiltrating-credit-card-data-via-dns-server/">https://www.scmagazine.com/home/security-news/cybercrime/udpos-malware-spotted-exfiltrating-credit-card-data-via-dns-server/</a></li><li><em>Google Cloud CISO: Usability must be baked into design of security tools</em>: <a href="https://www.scmagazine.com/home/2021-rsa-conference/google-cloud-ciso-usability-must-be-baked-into-design-of-security-tools/">https://www.scmagazine.com/home/2021-rsa-conference/google-cloud-ciso-usability-must-be-baked-into-design-of-security-tools/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Stop using passwords. No really, stop using passwords; use a password vault. Although, when you have to memorize a password to access something that you can’t use the vault to look up, such as to get into your phone or computer to access your vault, use a passphrase. A passphrase is a group of words or a full sentence. See the famous <a href="https://xkcd.com/936/">password strength XKCD</a> comic for how to understand, passphrase is better.</p><p>Pro-tip: do not use easy-to-guess phrases. Don’t use your dog’s name, kid’s name, and your favorite sports team. A good one is ‘dolphinstrollthroughmountains.’ [unintelligible 00:01:38] the period in the end. A bad one is ‘SpotKarengiants.’ I want everyone to know that neither of these have ever been nor ever will be a passphrase used by me, you shouldn’t use them either. At least a few of you will, but you’ve been warned.</p><p>Also, my dogs aren’t named Spot. I don’t have a family member named Karen—that I know of—and I don’t really know anything about the Giants except that I think they’re a football team. A password vault is software that stores your passwords in an easily accessible manner. There are several cloud-based services with client software and/or browser plugins, and all of these have family, team, and business or enterprise service levels that allow easily sharing password entries or creating shared vaults for storing accounts. Password vaults are generally between only $4 and $10 per user, per month, even at the family and at the business level, which is a trivial cost even for small businesses. Even my tiny nonprofits use a cloud password vault service, it’s worth every single penny. This will change your life and transform your business, especially in a remote world.</p><p>Meanwhile, in the news. <a href="https://aws.amazon.com/blogs/security/building-fine-grained-authorization-using-amazon-cognito-api-gateway-and-iam/">Building fine-grained authorization using Amazon Cognito, API Gateway, and IAM</a>. I talk all the time about the value zero trust architecture—ZTA—and the importance of shifting left to make your applications and services more secure. Building cloud-native software with ZTA integrated at the API call layer is the best way to secure your operations.</p><p><a href="https://blog.checkpoint.com/2021/05/20/misconfiguration-of-third-party-cloud-services-exposed-data-of-over-100-million-users/">Misconfiguration of third party cloud services exposed data of over 100 million users</a>. On cue, there is yet more research showing that cloud apps and services are exposing access credentials or keys to user or service data. If these app developers shift left and integrate better authentication and authorization mechanisms, they could use this for ...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Links:</strong></p><ul><li>Password strength XKCD: <a href="https://xkcd.com/936/">https://xkcd.com/936/</a></li><li><em>Building fine-grained authorization using Amazon Cognito, API Gateway, and IAM</em>: <a href="https://aws.amazon.com/blogs/security/building-fine-grained-authorization-using-amazon-cognito-api-gateway-and-iam/">https://aws.amazon.com/blogs/security/building-fine-grained-authorization-using-amazon-cognito-api-gateway-and-iam/</a></li><li><em>Misconfiguration of third party cloud services exposed data of over 100 million users</em>: <a href="https://blog.checkpoint.com/2021/05/20/misconfiguration-of-third-party-cloud-services-exposed-data-of-over-100-million-users/">https://blog.checkpoint.com/2021/05/20/misconfiguration-of-third-party-cloud-services-exposed-data-of-over-100-million-users/</a></li><li><em>Cost Savings, Better Security Drive Adoption of Emerging Technologies</em>: <a href="https://www.darkreading.com/risk/cost-savings-better-security-drive-adoption-of-emerging-technologies/d/d-id/1341081">https://www.darkreading.com/risk/cost-savings-better-security-drive-adoption-of-emerging-technologies/d/d-id/1341081</a></li><li><em>Cobalt Strike Becomes a Preferred Hacking Tool by Cybercrime and APT Groups</em>: <a href="https://www.darkreading.com/attacks-breaches/cobalt-strike-becomes-a-preferred-hacking-tool-by-cybercrime-apt-groups/d/d-id/1341073">https://www.darkreading.com/attacks-breaches/cobalt-strike-becomes-a-preferred-hacking-tool-by-cybercrime-apt-groups/d/d-id/1341073</a></li><li><em>Attackers Took 5 Minutes to Start Scanning for Exchange Server Flaws</em>: <a href="https://beta.darkreading.com/threat-intelligence/attackers-took-5-minutes-to-start-scanning-for-exchange-server-flaws">https://beta.darkreading.com/threat-intelligence/attackers-took-5-minutes-to-start-scanning-for-exchange-server-flaws</a></li><li><em>Credential Stuffing Reaches 193 Billion Login Attempts Annually</em>: <a href="https://www.darkreading.com/cloud/credential-stuffing-reaches-193-billion-login-attempts-annually/d/d-id/1341064">https://www.darkreading.com/cloud/credential-stuffing-reaches-193-billion-login-attempts-annually/d/d-id/1341064</a></li><li><em>How Ransomware Encourages Opportunists to Become Criminals</em>: <a href="https://www.darkreading.com/attacks-breaches/how-ransomware-encourages-opportunists-to-become-criminals/a/d-id/1340953">https://www.darkreading.com/attacks-breaches/how-ransomware-encourages-opportunists-to-become-criminals/a/d-id/1340953</a></li><li><em>American insurance giant CNA reportedly pays $40m to ransomware crooks</em>: <a href="https://www.theregister.com/2021/05/22/in_brief_security/">https://www.theregister.com/2021/05/22/in_brief_security/</a></li><li><em>79% of observed Microsoft Exchange Server exposures occurred in the cloud</em>: <a href="https://www.scmagazine.com/home/security-news/cybercrime/udpos-malware-spotted-exfiltrating-credit-card-data-via-dns-server/">https://www.scmagazine.com/home/security-news/cybercrime/udpos-malware-spotted-exfiltrating-credit-card-data-via-dns-server/</a></li><li><em>Google Cloud CISO: Usability must be baked into design of security tools</em>: <a href="https://www.scmagazine.com/home/2021-rsa-conference/google-cloud-ciso-usability-must-be-baked-into-design-of-security-tools/">https://www.scmagazine.com/home/2021-rsa-conference/google-cloud-ciso-usability-must-be-baked-into-design-of-security-tools/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Stop using passwords. No really, stop using passwords; use a password vault. Although, when you have to memorize a password to access something that you can’t use the vault to look up, such as to get into your phone or computer to access your vault, use a passphrase. A passphrase is a group of words or a full sentence. See the famous <a href="https://xkcd.com/936/">password strength XKCD</a> comic for how to understand, passphrase is better.</p><p>Pro-tip: do not use easy-to-guess phrases. Don’t use your dog’s name, kid’s name, and your favorite sports team. A good one is ‘dolphinstrollthroughmountains.’ [unintelligible 00:01:38] the period in the end. A bad one is ‘SpotKarengiants.’ I want everyone to know that neither of these have ever been nor ever will be a passphrase used by me, you shouldn’t use them either. At least a few of you will, but you’ve been warned.</p><p>Also, my dogs aren’t named Spot. I don’t have a family member named Karen—that I know of—and I don’t really know anything about the Giants except that I think they’re a football team. A password vault is software that stores your passwords in an easily accessible manner. There are several cloud-based services with client software and/or browser plugins, and all of these have family, team, and business or enterprise service levels that allow easily sharing password entries or creating shared vaults for storing accounts. Password vaults are generally between only $4 and $10 per user, per month, even at the family and at the business level, which is a trivial cost even for small businesses. Even my tiny nonprofits use a cloud password vault service, it’s worth every single penny. This will change your life and transform your business, especially in a remote world.</p><p>Meanwhile, in the news. <a href="https://aws.amazon.com/blogs/security/building-fine-grained-authorization-using-amazon-cognito-api-gateway-and-iam/">Building fine-grained authorization using Amazon Cognito, API Gateway, and IAM</a>. I talk all the time about the value zero trust architecture—ZTA—and the importance of shifting left to make your applications and services more secure. Building cloud-native software with ZTA integrated at the API call layer is the best way to secure your operations.</p><p><a href="https://blog.checkpoint.com/2021/05/20/misconfiguration-of-third-party-cloud-services-exposed-data-of-over-100-million-users/">Misconfiguration of third party cloud services exposed data of over 100 million users</a>. On cue, there is yet more research showing that cloud apps and services are exposing access credentials or keys to user or service data. If these app developers shift left and integrate better authentication and authorization mechanisms, they could use this for ...</p>]]>
      </content:encoded>
      <pubDate>Thu, 27 May 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/05102ba5/21c1eeba.mp3" length="14385089" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>597</itunes:duration>
      <itunes:summary>Join Jesse as he explains why you should stop using passwords and use a password vault instead, why you should use passphrases when you have to memorize one and what those passphrases should look like, how password vaults are life-changing in remote environments, yet another reason why security teams should shift left, how cybersecurity is an arms race and why teams should implement algorithmic analysis of environments to find suspicious behavior, how there are 193 billion credential stuffing attempts each year, why you should encrypt all data in transit, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he explains why you should stop using passwords and use a password vault instead, why you should use passphrases when you have to memorize one and what those passphrases should look like, how password vaults are life-changing in remote envir</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>A Jump To The Left Not A Step To The Right</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>A Jump To The Left Not A Step To The Right</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">df13d399-e4b1-412b-8386-393ffb086022</guid>
      <link>https://share.transistor.fm/s/82a995c1</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li><em>Report finds old misconfiguration woes continue to hammer corporate clouds</em>: <a href="https://www.scmagazine.com/home/security-news/cloud-security/report-finds-old-misconfiguration-woes-continue-to-hammer-corporate-clouds/">https://www.scmagazine.com/home/security-news/cloud-security/report-finds-old-misconfiguration-woes-continue-to-hammer-corporate-clouds/</a></li><li><em>Pentagon Weighs Ending JEDI Cloud Project Amid Amazon Court Fight</em>: <a href="https://www.wsj.com/articles/pentagon-weighs-ending-jedi-cloud-project-amid-amazon-court-fight-11620639001">https://www.wsj.com/articles/pentagon-weighs-ending-jedi-cloud-project-amid-amazon-court-fight-11620639001</a></li><li><em>Netflix Exec Explains Where Infosec Pros are Going Wrong</em>: <a href="https://www.infosecurity-magazine.com/news/netflix-exec-infosec-pros-going/">https://www.infosecurity-magazine.com/news/netflix-exec-infosec-pros-going/</a></li><li>Firms Struggle to Secure Multicloud Misconfigurations: <a href="https://www.darkreading.com/cloud/firms-struggle-to-secure-multicloud-misconfigurations/d/d-id/1341008">https://www.darkreading.com/cloud/firms-struggle-to-secure-multicloud-misconfigurations/d/d-id/1341008</a></li><li>Researchers Create Covert Channel Over Apple AirTag Network: <a href="https://nmap.online/news/2021/researchers-create-covert-channel-over-apple-airtag-network">https://nmap.online/news/2021/researchers-create-covert-channel-over-apple-airtag-network</a></li><li>Ransomware is Getting Ugly: <a href="https://www.schneier.com/blog/archives/2021/05/ransomware-is-getting-ugly.html">https://www.schneier.com/blog/archives/2021/05/ransomware-is-getting-ugly.html</a></li><li>Try this One Weird Trick Russian Hackers Hate: <a href="https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/">https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/</a></li><li>Attorneys share worst practices for data breach response: <a href="https://searchsecurity.techtarget.com/news/252501054/Attorneys-share-worst-practices-for-data-breach-response">https://searchsecurity.techtarget.com/news/252501054/Attorneys-share-worst-practices-for-data-breach-response</a></li><li>Ransomware Guidance and Resources: <a href="https://www.cisa.gov/ransomware">https://www.cisa.gov/ransomware</a></li><li>How to Get Employees to Care About Security: <a href="https://www.darkreading.com/theedge/how-to-get-employees-to-care-about-security-/b/d-id/1341058">https://www.darkreading.com/theedge/how-to-get-employees-to-care-about-security-/b/d-id/1341058</a></li><li>Corey Quinn’s Twitter: <a href="https://twitter.com/QuinnyPig">https://twitter.com/QuinnyPig</a></li></ul><p><br></p><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: All the rage is DevOps, for good reasons: it works. You can’t do good cloud work without a flexible and functional DevOps operation. Similarly, you can’t do good security in the cloud without DevSecOps. However, [laugh] security people love their cryptic and geeky terms, so you hear, “You should shift left.” This is derived from the left shift bitwise operators that do binary math that moves values to the left. I told you it’s geeky.</p><p>This moving left translates to moving security integration into a project farther left in the development process when you start on the left and move to production on the right. Ultimately, this means you bring security into the very beginning of your conceptual designs, and write your first lines of code with security processes and methods in mind from the very start. Use more security tools, authentication and authorization hooks, and more granular encryption methods in your underlying services structures through your more complex processing. More work on literally coding security in at the start could save you several orders of magnitude of direct and indirect costs in the future. Don’t get owned, don’t get ransomed.</p><p>Meanwhile, in the news, <a href="https://www.scmagazine.com/home/security-news/cloud-security/report-finds-old-misconfiguration-woes-continue-to-hammer-corporate-clouds/"><em>Report finds old misconfiguration woes continue to hammer corporate clouds</em></a>. If you haven’t heard me and countless others rant about going back to basics of cloud security, you haven’t been listening. This article should scare you into finally checking your basic permissions on things like storage and services so you don’t get pwned by being stupid.</p><p><a href="https://www.wsj.com/articles/pentagon-weighs-ending-jedi-cloud-project-amid-amazon-court-fight-11620639001"><em>Pentagon Weighs Ending JEDI Cloud Project Amid Amazon Court Fight</em></a>. When a nearly $2 trillion company drags anyone into court, things will change. The largest move to cloud services by the US Department of Defense might not happen because Amazon got pissed and sent lawyers. Watch how this unfolds to learn both how Amazon the company operates and how the market moves toward or away from cloud in general and either Azure or AWS specifically as a result of this legal challenge.</p><p><a href="https://www.infosecurity-magazine.com/news/netflix-exec-infosec-pros-going/"><em>Netflix Exec Explains Where Infosec Pros are Going Wrong</em></a>. Most of us who work in cybersecurity will read this piece and have one of two strong reactions. People like me and everyone who isn’t a security professional will nod and smile and agree that times are changing and security needs to get with the times. Everyone else in security will scowl, and pout, and <br>get mad.</p><p><a href="https://www.darkreading.com/cloud/firms-struggle-to-secure-multicloud-misconfigurations/d/d-id/1341008"><em>Firms Struggle to Secure Multicloud Misconfigurations</em></a>. We all struggle to secure all the things, but this report shows that most of us struggle to secure any of the things. Back to basics; I keep hammering on this because things like shutting down or securing ports and services and locking up cloud storage objects get you the biggest improvement in security posture out of almost anything else you do.</p>&lt;...]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li><em>Report finds old misconfiguration woes continue to hammer corporate clouds</em>: <a href="https://www.scmagazine.com/home/security-news/cloud-security/report-finds-old-misconfiguration-woes-continue-to-hammer-corporate-clouds/">https://www.scmagazine.com/home/security-news/cloud-security/report-finds-old-misconfiguration-woes-continue-to-hammer-corporate-clouds/</a></li><li><em>Pentagon Weighs Ending JEDI Cloud Project Amid Amazon Court Fight</em>: <a href="https://www.wsj.com/articles/pentagon-weighs-ending-jedi-cloud-project-amid-amazon-court-fight-11620639001">https://www.wsj.com/articles/pentagon-weighs-ending-jedi-cloud-project-amid-amazon-court-fight-11620639001</a></li><li><em>Netflix Exec Explains Where Infosec Pros are Going Wrong</em>: <a href="https://www.infosecurity-magazine.com/news/netflix-exec-infosec-pros-going/">https://www.infosecurity-magazine.com/news/netflix-exec-infosec-pros-going/</a></li><li>Firms Struggle to Secure Multicloud Misconfigurations: <a href="https://www.darkreading.com/cloud/firms-struggle-to-secure-multicloud-misconfigurations/d/d-id/1341008">https://www.darkreading.com/cloud/firms-struggle-to-secure-multicloud-misconfigurations/d/d-id/1341008</a></li><li>Researchers Create Covert Channel Over Apple AirTag Network: <a href="https://nmap.online/news/2021/researchers-create-covert-channel-over-apple-airtag-network">https://nmap.online/news/2021/researchers-create-covert-channel-over-apple-airtag-network</a></li><li>Ransomware is Getting Ugly: <a href="https://www.schneier.com/blog/archives/2021/05/ransomware-is-getting-ugly.html">https://www.schneier.com/blog/archives/2021/05/ransomware-is-getting-ugly.html</a></li><li>Try this One Weird Trick Russian Hackers Hate: <a href="https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/">https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/</a></li><li>Attorneys share worst practices for data breach response: <a href="https://searchsecurity.techtarget.com/news/252501054/Attorneys-share-worst-practices-for-data-breach-response">https://searchsecurity.techtarget.com/news/252501054/Attorneys-share-worst-practices-for-data-breach-response</a></li><li>Ransomware Guidance and Resources: <a href="https://www.cisa.gov/ransomware">https://www.cisa.gov/ransomware</a></li><li>How to Get Employees to Care About Security: <a href="https://www.darkreading.com/theedge/how-to-get-employees-to-care-about-security-/b/d-id/1341058">https://www.darkreading.com/theedge/how-to-get-employees-to-care-about-security-/b/d-id/1341058</a></li><li>Corey Quinn’s Twitter: <a href="https://twitter.com/QuinnyPig">https://twitter.com/QuinnyPig</a></li></ul><p><br></p><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: All the rage is DevOps, for good reasons: it works. You can’t do good cloud work without a flexible and functional DevOps operation. Similarly, you can’t do good security in the cloud without DevSecOps. However, [laugh] security people love their cryptic and geeky terms, so you hear, “You should shift left.” This is derived from the left shift bitwise operators that do binary math that moves values to the left. I told you it’s geeky.</p><p>This moving left translates to moving security integration into a project farther left in the development process when you start on the left and move to production on the right. Ultimately, this means you bring security into the very beginning of your conceptual designs, and write your first lines of code with security processes and methods in mind from the very start. Use more security tools, authentication and authorization hooks, and more granular encryption methods in your underlying services structures through your more complex processing. More work on literally coding security in at the start could save you several orders of magnitude of direct and indirect costs in the future. Don’t get owned, don’t get ransomed.</p><p>Meanwhile, in the news, <a href="https://www.scmagazine.com/home/security-news/cloud-security/report-finds-old-misconfiguration-woes-continue-to-hammer-corporate-clouds/"><em>Report finds old misconfiguration woes continue to hammer corporate clouds</em></a>. If you haven’t heard me and countless others rant about going back to basics of cloud security, you haven’t been listening. This article should scare you into finally checking your basic permissions on things like storage and services so you don’t get pwned by being stupid.</p><p><a href="https://www.wsj.com/articles/pentagon-weighs-ending-jedi-cloud-project-amid-amazon-court-fight-11620639001"><em>Pentagon Weighs Ending JEDI Cloud Project Amid Amazon Court Fight</em></a>. When a nearly $2 trillion company drags anyone into court, things will change. The largest move to cloud services by the US Department of Defense might not happen because Amazon got pissed and sent lawyers. Watch how this unfolds to learn both how Amazon the company operates and how the market moves toward or away from cloud in general and either Azure or AWS specifically as a result of this legal challenge.</p><p><a href="https://www.infosecurity-magazine.com/news/netflix-exec-infosec-pros-going/"><em>Netflix Exec Explains Where Infosec Pros are Going Wrong</em></a>. Most of us who work in cybersecurity will read this piece and have one of two strong reactions. People like me and everyone who isn’t a security professional will nod and smile and agree that times are changing and security needs to get with the times. Everyone else in security will scowl, and pout, and <br>get mad.</p><p><a href="https://www.darkreading.com/cloud/firms-struggle-to-secure-multicloud-misconfigurations/d/d-id/1341008"><em>Firms Struggle to Secure Multicloud Misconfigurations</em></a>. We all struggle to secure all the things, but this report shows that most of us struggle to secure any of the things. Back to basics; I keep hammering on this because things like shutting down or securing ports and services and locking up cloud storage objects get you the biggest improvement in security posture out of almost anything else you do.</p>&lt;...]]>
      </content:encoded>
      <pubDate>Thu, 20 May 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/82a995c1/979e50b8.mp3" length="12308161" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>509</itunes:duration>
      <itunes:summary>Join Jesse as he explores the ins and outs of shifting left and what it means for software development, why you should begin writing code with security top of mind, why you need to check your basic permissions on things like storage and services, how things are changing and security needs to get with the times, how we all struggle to secure all the things and also to secure any of the things, how virtual keyboards can protect you against ransomware attacks, why you should make security training funny, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he explores the ins and outs of shifting left and what it means for software development, why you should begin writing code with security top of mind, why you need to check your basic permissions on things like storage and services, how thin</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Grid Has Fallen and It Can't Get Up</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>The Grid Has Fallen and It Can't Get Up</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fdbf4a97-dd11-44ad-adf0-1216e4733fea</guid>
      <link>https://share.transistor.fm/s/50b7a3e3</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>Here’s the hacking group responsible for the Colonial Pipeline shutdown: <a href="https://www.cnbc.com/2021/05/10/hacking-group-darkside-reportedly-responsible-for-colonial-pipeline-shutdown.html">https://www.cnbc.com/2021/05/10/hacking-group-darkside-reportedly-responsible-for-colonial-pipeline-shutdown.html</a></li><li>Biden says ‘no evidence’ Russia involved in US pipeline hack but Putin should act: <a href="https://www.theguardian.com/us-news/2021/may/10/colonial-pipeline-shutdown-us-darkside-message">https://www.theguardian.com/us-news/2021/may/10/colonial-pipeline-shutdown-us-darkside-message</a></li><li>Colonial Pipeline CEO warns of possible fuel shortages following cyberattack: <a href="https://www.foxbusiness.com/technology/colonial-pipeline-ceo-warns-of-fuel-shortages-following-cyberattack">https://www.foxbusiness.com/technology/colonial-pipeline-ceo-warns-of-fuel-shortages-following-cyberattack</a></li><li>Colonial Pipeline hackers apologize, promise to ransom less controversial targets in future: <a href="https://www.theverge.com/2021/5/10/22428996/colonial-pipeline-ransomware-attack-apology-investigation">https://www.theverge.com/2021/5/10/22428996/colonial-pipeline-ransomware-attack-apology-investigation</a></li><li>Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys: <a href="https://thehackernews.com/2021/05/over-40-apps-with-more-than-100-million.html">https://thehackernews.com/2021/05/over-40-apps-with-more-than-100-million.html</a></li><li>Red Hat bakes cloud security into the heart of Red Hat OpenShift: <a href="https://siliconangle.com/2021/04/27/red-hat-bakes-cloud-security-heart-openshift/">https://siliconangle.com/2021/04/27/red-hat-bakes-cloud-security-heart-openshift/</a></li><li>Amazon debuts CloudFront Functions for running lightweight code at the edge: <a href="https://siliconangle.com/2021/05/03/amazon-debuts-cloudfront-functions-running-lightweight-code-edge">https://siliconangle.com/2021/05/03/amazon-debuts-cloudfront-functions-running-lightweight-code-edge</a></li><li>Critical Patch Out for Critical Pulse Secure VPN 0-Day Under Attack: <a href="https://thehackernews.com/2021/05/critical-patch-out-for-month-old-pulse.html">https://thehackernews.com/2021/05/critical-patch-out-for-month-old-pulse.html</a></li><li>New Amazon FinSpace Simplifies Data Management and Analytics for Financial Services: <a href="https://aws.amazon.com/blogs/aws/amazon-finspace-simplifies-data-management-and-analytics-for-financial-services/">https://aws.amazon.com/blogs/aws/amazon-finspace-simplifies-data-management-and-analytics-for-financial-services/</a></li><li>Spectre Strikes Back: New Hacking Vulnerability Affecting Billions of Computers Worldwide: <a href="https://scitechdaily.com/spectre-strikes-back-new-hacking-vulnerability-affecting-billions-of-computers-worldwide">https://scitechdaily.com/spectre-strikes-back-new-hacking-vulnerability-affecting-billions-of-computers-worldwide</a></li><li>America Hacks Itself. Waiting for the Cyber-Apocalypse: <a href="https://tomdispatch.com/waiting-for-the-cyber-apocalypse/">https://tomdispatch.com/waiting-for-the-cyber-apocalypse/</a></li><li>Wanted: The (Elusive) Cybersecurity ‘all-Star’: <a href="https://www.darkreading.com/operations/wanted-the-(elusive)-cybersecurity-all-star/d/d-id/1340929">https://www.darkreading.com/operations/wanted-the-(elusive)-cybersecurity-all-star/d/d-id/1340929</a></li><li>How to Solve the Cybersecurity Skills Gap: <a href="https://securityboulevard.com/2021/05/how-to-solve-the-cybersecurity-skills-gap/">https://securityboulevard.com/2021/05/how-to-solve-the-cybersecurity-skills-gap/</a></li><li>Most Organizations Feel More Vulnerable to Breaches Amid Pandemic: <a href="https://www.darkreading.com/risk/most-organizations-feel-more-vulnerable-to-breaches-amid-pandemic/d/d-id/1340954">https://www.darkreading.com/risk/most-organizations-feel-more-vulnerable-to-breaches-amid-pandemic/d/d-id/1340954</a></li><li>How the COVID-19 Pandemic is Impacting Cyber Security Worldwide: <a href="https://innovationatwork.ieee.org/how-the-covid-19-pandemic-is-impacting-cyber-security-worldwide/">https://innovationatwork.ieee.org/how-the-covid-19-pandemic-is-impacting-cyber-security-worldwide/</a></li><li>Impact of COVID-19 on Cybersecurity: <a href="https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html">https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html</a></li><li>Biden on cyber security after 100 days: A good start, but now comes the hard part: <a href="https://securityboulevard.com/2021/05/biden-on-cyber-security-after-100-days-a-good-start-but-now-comes-the-hard-part/">https://securityboulevard.com/2021/05/biden-on-cyber-security-after-100-days-a-good-start-but-now-comes-the-hard-part/</a></li><li>Why Software Supply Chain Attacks are Inevitable and what you Must do to Protect Your Applications: <a href="https://securityboulevard.com/2021/05/why-software-supply-chain-attacks-are-inevitable-and-what-you-must-do-to-protect-your-applications/">https://securityboulevard.com/2021/05/why-software-supply-chain-attacks-are-inevitable-and-what-you-must-do-to-protect-your-applications/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Infrastructure security, including both critical physical systems that make our modern human lives possible, and supply chain on critical software systems is the theme of the week—maybe month, or a year—and we need to sit up and pay attention. Our electrical grids, telco systems, fuel pipelines, water supplies, and more, are delicate flowers ready to be stomped by anything with brute force, or eaten away by a swarm of tiny insects. These systems lurk online in the background where most of us don’t see them. However, all these are managed by computerized systems and they aren’t as air-gapped as we would hope they are. Internet of Things—or IoT—operational technology—or OT—and industrial control systems—or ICS—aren’t new security problems to solve. These have been highly vulnerable forever, but now we’re seeing how IoT, OT, ISS security lags far behind mainstream cybersecurity. This is a rapidly changing trend, but we should be worried over the ne...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>Here’s the hacking group responsible for the Colonial Pipeline shutdown: <a href="https://www.cnbc.com/2021/05/10/hacking-group-darkside-reportedly-responsible-for-colonial-pipeline-shutdown.html">https://www.cnbc.com/2021/05/10/hacking-group-darkside-reportedly-responsible-for-colonial-pipeline-shutdown.html</a></li><li>Biden says ‘no evidence’ Russia involved in US pipeline hack but Putin should act: <a href="https://www.theguardian.com/us-news/2021/may/10/colonial-pipeline-shutdown-us-darkside-message">https://www.theguardian.com/us-news/2021/may/10/colonial-pipeline-shutdown-us-darkside-message</a></li><li>Colonial Pipeline CEO warns of possible fuel shortages following cyberattack: <a href="https://www.foxbusiness.com/technology/colonial-pipeline-ceo-warns-of-fuel-shortages-following-cyberattack">https://www.foxbusiness.com/technology/colonial-pipeline-ceo-warns-of-fuel-shortages-following-cyberattack</a></li><li>Colonial Pipeline hackers apologize, promise to ransom less controversial targets in future: <a href="https://www.theverge.com/2021/5/10/22428996/colonial-pipeline-ransomware-attack-apology-investigation">https://www.theverge.com/2021/5/10/22428996/colonial-pipeline-ransomware-attack-apology-investigation</a></li><li>Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys: <a href="https://thehackernews.com/2021/05/over-40-apps-with-more-than-100-million.html">https://thehackernews.com/2021/05/over-40-apps-with-more-than-100-million.html</a></li><li>Red Hat bakes cloud security into the heart of Red Hat OpenShift: <a href="https://siliconangle.com/2021/04/27/red-hat-bakes-cloud-security-heart-openshift/">https://siliconangle.com/2021/04/27/red-hat-bakes-cloud-security-heart-openshift/</a></li><li>Amazon debuts CloudFront Functions for running lightweight code at the edge: <a href="https://siliconangle.com/2021/05/03/amazon-debuts-cloudfront-functions-running-lightweight-code-edge">https://siliconangle.com/2021/05/03/amazon-debuts-cloudfront-functions-running-lightweight-code-edge</a></li><li>Critical Patch Out for Critical Pulse Secure VPN 0-Day Under Attack: <a href="https://thehackernews.com/2021/05/critical-patch-out-for-month-old-pulse.html">https://thehackernews.com/2021/05/critical-patch-out-for-month-old-pulse.html</a></li><li>New Amazon FinSpace Simplifies Data Management and Analytics for Financial Services: <a href="https://aws.amazon.com/blogs/aws/amazon-finspace-simplifies-data-management-and-analytics-for-financial-services/">https://aws.amazon.com/blogs/aws/amazon-finspace-simplifies-data-management-and-analytics-for-financial-services/</a></li><li>Spectre Strikes Back: New Hacking Vulnerability Affecting Billions of Computers Worldwide: <a href="https://scitechdaily.com/spectre-strikes-back-new-hacking-vulnerability-affecting-billions-of-computers-worldwide">https://scitechdaily.com/spectre-strikes-back-new-hacking-vulnerability-affecting-billions-of-computers-worldwide</a></li><li>America Hacks Itself. Waiting for the Cyber-Apocalypse: <a href="https://tomdispatch.com/waiting-for-the-cyber-apocalypse/">https://tomdispatch.com/waiting-for-the-cyber-apocalypse/</a></li><li>Wanted: The (Elusive) Cybersecurity ‘all-Star’: <a href="https://www.darkreading.com/operations/wanted-the-(elusive)-cybersecurity-all-star/d/d-id/1340929">https://www.darkreading.com/operations/wanted-the-(elusive)-cybersecurity-all-star/d/d-id/1340929</a></li><li>How to Solve the Cybersecurity Skills Gap: <a href="https://securityboulevard.com/2021/05/how-to-solve-the-cybersecurity-skills-gap/">https://securityboulevard.com/2021/05/how-to-solve-the-cybersecurity-skills-gap/</a></li><li>Most Organizations Feel More Vulnerable to Breaches Amid Pandemic: <a href="https://www.darkreading.com/risk/most-organizations-feel-more-vulnerable-to-breaches-amid-pandemic/d/d-id/1340954">https://www.darkreading.com/risk/most-organizations-feel-more-vulnerable-to-breaches-amid-pandemic/d/d-id/1340954</a></li><li>How the COVID-19 Pandemic is Impacting Cyber Security Worldwide: <a href="https://innovationatwork.ieee.org/how-the-covid-19-pandemic-is-impacting-cyber-security-worldwide/">https://innovationatwork.ieee.org/how-the-covid-19-pandemic-is-impacting-cyber-security-worldwide/</a></li><li>Impact of COVID-19 on Cybersecurity: <a href="https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html">https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html</a></li><li>Biden on cyber security after 100 days: A good start, but now comes the hard part: <a href="https://securityboulevard.com/2021/05/biden-on-cyber-security-after-100-days-a-good-start-but-now-comes-the-hard-part/">https://securityboulevard.com/2021/05/biden-on-cyber-security-after-100-days-a-good-start-but-now-comes-the-hard-part/</a></li><li>Why Software Supply Chain Attacks are Inevitable and what you Must do to Protect Your Applications: <a href="https://securityboulevard.com/2021/05/why-software-supply-chain-attacks-are-inevitable-and-what-you-must-do-to-protect-your-applications/">https://securityboulevard.com/2021/05/why-software-supply-chain-attacks-are-inevitable-and-what-you-must-do-to-protect-your-applications/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Infrastructure security, including both critical physical systems that make our modern human lives possible, and supply chain on critical software systems is the theme of the week—maybe month, or a year—and we need to sit up and pay attention. Our electrical grids, telco systems, fuel pipelines, water supplies, and more, are delicate flowers ready to be stomped by anything with brute force, or eaten away by a swarm of tiny insects. These systems lurk online in the background where most of us don’t see them. However, all these are managed by computerized systems and they aren’t as air-gapped as we would hope they are. Internet of Things—or IoT—operational technology—or OT—and industrial control systems—or ICS—aren’t new security problems to solve. These have been highly vulnerable forever, but now we’re seeing how IoT, OT, ISS security lags far behind mainstream cybersecurity. This is a rapidly changing trend, but we should be worried over the ne...</p>]]>
      </content:encoded>
      <pubDate>Thu, 13 May 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/50b7a3e3/5aabafcf.mp3" length="14317958" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>594</itunes:duration>
      <itunes:summary>Join Jesse as he examines the importance of infrastructure security and touches upon why it’ll take months or years before it catches up to mainstream cybersecurity, why you should never put keys or passwords into your apps in ways that expose your sensitive data, why your team should be practicing DevSecOps if you aren’t already, why you should always assume your systems are flawed and breakable, the future of nation-state hacking and cracking, how there’s a talent shortage in the security space, why it’s important to understand the way government thinks about cybersecurity and tech, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he examines the importance of infrastructure security and touches upon why it’ll take months or years before it catches up to mainstream cybersecurity, why you should never put keys or passwords into your apps in ways that expose your sensit</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Meanwhile in Security Trailer</title>
      <itunes:title>Meanwhile in Security Trailer</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">3a167e6b-2a5f-4a09-b518-32fff4536882</guid>
      <link>https://share.transistor.fm/s/d39f3e47</link>
      <description>
        <![CDATA[Cloud security is a minefield of news that assumes the word "Security" is lurking somewhere in your job description. It doesn't have to be this way. Weekly cloud security news for people with other jobs to do. Cloud Security For Humans.]]>
      </description>
      <content:encoded>
        <![CDATA[Cloud security is a minefield of news that assumes the word "Security" is lurking somewhere in your job description. It doesn't have to be this way. Weekly cloud security news for people with other jobs to do. Cloud Security For Humans.]]>
      </content:encoded>
      <pubDate>Tue, 11 May 2021 14:49:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/d39f3e47/1f4b4c40.mp3" length="521247" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>30</itunes:duration>
      <itunes:summary>Cloud security is a minefield of news that assumes the word "Security" is lurking somewhere in your job description. It doesn't have to be this way. Weekly cloud security news for people with other jobs to do. Cloud Security For Humans.</itunes:summary>
      <itunes:subtitle>Cloud security is a minefield of news that assumes the word "Security" is lurking somewhere in your job description. It doesn't have to be this way. Weekly cloud security news for people with other jobs to do. Cloud Security For Humans.</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>All Changes Are Permanent Until Replaced</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>All Changes Are Permanent Until Replaced</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2b936449-ac8c-4313-8451-2e7915307941</guid>
      <link>https://share.transistor.fm/s/4533e415</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p><br></p><p>My recent experience prepping a commercial space for a state fire marshal office inspection and approval has me thinking about compliance and security and ever-present ‘temporary’ fix for things. How many times have we said, “Oh, I’ll just do this quick fix to get us by,” and that quick fix becomes the de facto supported production implementation? Repeat after me: all changes are permanent until replaced. All changes are permanent until replaced.</p><p>Anything we alter at all, whether it in computing or in real life, is a permanent alteration until it is replaced by a new alteration, or by a natural corrective or evolutionary process, like decay. We cut our hair and it grows back. We weed our gardens and the weeds return. If you don’t want temporary changes happening in your environment, then implement hard controls that will correct any aberrations that come up. Cloud-native architectures give us the tools to force this by making it seamless to close down and erased from existence anything that veers from your ideal. Take advantage of this now.</p><p>Meanwhile, in the news. Password reset code brute force vulnerability in AWS Cognito. If you use this AWS service, you should read this one. Although it is now patched, it’s good to understand how AWS Cognito works more closely, which is true for any other security service you rely upon that is hosted by your cloud provider or other vendor.</p><p>Task force seeks to disrupt a ransomware payment. This is tangentially related to cloud security because both Amazon and Microsoft has joined up on this one, but I’m personally fascinated by strange frenemy combinations who work together on these things. I’m watching for either interesting things to happen with their recommendations that could have an impact on disclosure of ransomware incidents, or for it all to fizzle out to do nothing.</p><p>Is your cloud raining sensitive data? Kubernetes generally needs securing like any other service. Time to stop ignoring your newest infrastructure and lock Kubernetes down. However, if you want real security for your Kubernetes clusters, you should look at a robust solution like Fairwinds Insights. I’m a big fan of outsourcing tool development to experts.</p><p>Enterprise lift and shift to the public cloud requires a newer type of API and cloud security program to prevent data breaches. Ignoring some glaring editing mistakes, which is rather difficult for me to do, I’d like this easy-to-read case study of a traditional on-prem infrastructure going through a lift-and-shift cloud migration. This piece specifically addresses some of the serious security implications of doing this, and how your attack surface changes dramatically in the process.</p><p>NOAA shifts some key environmental data processing to the cloud. This one is important to me personally. Years ago, when I was a security engineer for the United States Department of Energy Oak Ridge National Laboratory High-Performance Computing Group—boy, that’s a mouthful—I helped ensure security for one of the National Oceanic and Atmospheric Administration—or NOAA—supercomputers doing climate research. NOAA moving any of its compute systems supporting global research is a very big deal, and this is a great example of why AWS GovCloud is helping the US federal government modernize and move to the cloud. Also, mixing an acronym-heavy industry with government work turns into a pile of TLS so fast. Also, as another aside, this was back when I met The Duckbill Group CEO, Mike Julian, in Knoxville, Tennessee.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>ClearDATA expands flagship solution to facilitate health care’s adoption of containers and serverless tech. Speaking of outsourcing to experts, there are lots of compliance reporting options out there, and like my favorite, Qmulos. Full disclosure, remember I do work for Splunk. But there are less options for actively managing compliance in your cloud environment. Does anyone have experience with ClearDATA’s Comply offering? Email me, I want to know more.</p><p>Expanding security, visibility, and automation across AWS environments. I’m most interested in the AWS Graviton to ARM-based security in the asset discovery for AWS environments announcements in this piece. First, I love me some chip geekery, especially when security-related, and second, the thing most of us suck at is tracking your assets. Any help managing an asset list for our security tools is gravy.</p><p>As Microsoft nears a $2 trillion market cap, Amazon is most likely to reach that level next. I’m always looking at economics and how that drives both behavior and technology. Also, looking at how markets move and companies grow and die tells us more about trends in technology decisions and spend than many other indicators. Stop and think about the implications of this: four of the world’s five largest companies by market capitalization are us tech giants. Three of these are the parent companies of the three cloud giants: Microsoft, Amazon, and Alphabet or Google. It’s a cloudy forecast for sure.</p><p>Seven modern-day cybersecurity realities. None of these are earth-shattering news, but at least some of these will make you cringe when you consider your own environment. Feeling uncomfortable thinking about any of these is a good thing if you act on that feeling. Go forth and fix things.</p><p>The challenge of securing non-people ident...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p><br></p><p>My recent experience prepping a commercial space for a state fire marshal office inspection and approval has me thinking about compliance and security and ever-present ‘temporary’ fix for things. How many times have we said, “Oh, I’ll just do this quick fix to get us by,” and that quick fix becomes the de facto supported production implementation? Repeat after me: all changes are permanent until replaced. All changes are permanent until replaced.</p><p>Anything we alter at all, whether it in computing or in real life, is a permanent alteration until it is replaced by a new alteration, or by a natural corrective or evolutionary process, like decay. We cut our hair and it grows back. We weed our gardens and the weeds return. If you don’t want temporary changes happening in your environment, then implement hard controls that will correct any aberrations that come up. Cloud-native architectures give us the tools to force this by making it seamless to close down and erased from existence anything that veers from your ideal. Take advantage of this now.</p><p>Meanwhile, in the news. Password reset code brute force vulnerability in AWS Cognito. If you use this AWS service, you should read this one. Although it is now patched, it’s good to understand how AWS Cognito works more closely, which is true for any other security service you rely upon that is hosted by your cloud provider or other vendor.</p><p>Task force seeks to disrupt a ransomware payment. This is tangentially related to cloud security because both Amazon and Microsoft has joined up on this one, but I’m personally fascinated by strange frenemy combinations who work together on these things. I’m watching for either interesting things to happen with their recommendations that could have an impact on disclosure of ransomware incidents, or for it all to fizzle out to do nothing.</p><p>Is your cloud raining sensitive data? Kubernetes generally needs securing like any other service. Time to stop ignoring your newest infrastructure and lock Kubernetes down. However, if you want real security for your Kubernetes clusters, you should look at a robust solution like Fairwinds Insights. I’m a big fan of outsourcing tool development to experts.</p><p>Enterprise lift and shift to the public cloud requires a newer type of API and cloud security program to prevent data breaches. Ignoring some glaring editing mistakes, which is rather difficult for me to do, I’d like this easy-to-read case study of a traditional on-prem infrastructure going through a lift-and-shift cloud migration. This piece specifically addresses some of the serious security implications of doing this, and how your attack surface changes dramatically in the process.</p><p>NOAA shifts some key environmental data processing to the cloud. This one is important to me personally. Years ago, when I was a security engineer for the United States Department of Energy Oak Ridge National Laboratory High-Performance Computing Group—boy, that’s a mouthful—I helped ensure security for one of the National Oceanic and Atmospheric Administration—or NOAA—supercomputers doing climate research. NOAA moving any of its compute systems supporting global research is a very big deal, and this is a great example of why AWS GovCloud is helping the US federal government modernize and move to the cloud. Also, mixing an acronym-heavy industry with government work turns into a pile of TLS so fast. Also, as another aside, this was back when I met The Duckbill Group CEO, Mike Julian, in Knoxville, Tennessee.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>ClearDATA expands flagship solution to facilitate health care’s adoption of containers and serverless tech. Speaking of outsourcing to experts, there are lots of compliance reporting options out there, and like my favorite, Qmulos. Full disclosure, remember I do work for Splunk. But there are less options for actively managing compliance in your cloud environment. Does anyone have experience with ClearDATA’s Comply offering? Email me, I want to know more.</p><p>Expanding security, visibility, and automation across AWS environments. I’m most interested in the AWS Graviton to ARM-based security in the asset discovery for AWS environments announcements in this piece. First, I love me some chip geekery, especially when security-related, and second, the thing most of us suck at is tracking your assets. Any help managing an asset list for our security tools is gravy.</p><p>As Microsoft nears a $2 trillion market cap, Amazon is most likely to reach that level next. I’m always looking at economics and how that drives both behavior and technology. Also, looking at how markets move and companies grow and die tells us more about trends in technology decisions and spend than many other indicators. Stop and think about the implications of this: four of the world’s five largest companies by market capitalization are us tech giants. Three of these are the parent companies of the three cloud giants: Microsoft, Amazon, and Alphabet or Google. It’s a cloudy forecast for sure.</p><p>Seven modern-day cybersecurity realities. None of these are earth-shattering news, but at least some of these will make you cringe when you consider your own environment. Feeling uncomfortable thinking about any of these is a good thing if you act on that feeling. Go forth and fix things.</p><p>The challenge of securing non-people ident...</p>]]>
      </content:encoded>
      <pubDate>Thu, 06 May 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/4533e415/73a4d06a.mp3" length="13394997" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>554</itunes:duration>
      <itunes:summary>Join Jesse as he talks about how quick fixes often become de facto supported production implementations, how all changes are permanent until replaced, why you should implement hard controls if you don’t want temporary changes happening in your environment, how Jesse met Duckbill Group CEO Mike Julian, how three of the biggest companies my market capitalization are U.S. tech giants that happen to also be cloud giants, the challenge of securing non-person identities, why you should turn off instances, containers, and cloud services you’re not using, and more. </itunes:summary>
      <itunes:subtitle>Join Jesse as he talks about how quick fixes often become de facto supported production implementations, how all changes are permanent until replaced, why you should implement hard controls if you don’t want temporary changes happening in your environment</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hooked on Compliance</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Hooked on Compliance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4a112655-4baf-4d6b-948f-d8d6a89a240d</guid>
      <link>https://share.transistor.fm/s/538819ba</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>Information Security Compliance: Which regulations relate to me: <a href="https://www.tcdi.com/information-security-compliance-which-regulations/">https://www.tcdi.com/information-security-compliance-which-regulations/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: Low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Compliance requirements are everywhere. I’ve been on both sides of the table for dozens of audits, and I’ve even worked on commercial building fire code compliance for data centers and even a school. Whatever your industry, there are compliance requirements lurking somewhere in your buildings, your data center, and your clouds. You should know what legal compliance mandates you must meet as well as industry standards or certifications you should meet. You don’t have to learn all the intricate details of any of these compliance laws or frameworks, however, you should at least know what the requirements you have and what frameworks you should use.</p><p>You need to understand more than what your organization does at a high level. You also should know what general activities your organization performs, such as selling things, providing services to a public, or quasi-public entity, or government agencies, or schools, or managing investments or banking. Then go find out your compliance needs. An article called <a href="https://www.tcdi.com/information-security-compliance-which-regulations/">Information Security Compliance: Which regulations relate to me</a>? By TCDI—which appears to be a consulting firm that I neither endorse nor know anything about at all—is a short primer on some common compliance programs that really should prove useful to you.</p><p>Meanwhile, in the news, SANS cloud security curriculum gaining altitude. Become a SANS cloud ace. SANS and GIAC have the best security training and certifications, and now they’ve expanded their cloud courses, including some more foundational options non-security people should find valuable. The training is detailed, challenging, and rewarding, and will teach you far more than most other programs including hands-on exercises that are key to learning tech.</p><p><br></p><p><br>Introduction to the NIST cybersecurity framework. I like the cybersecurity guidelines and frameworks NIST creates because they are useful and understandable tools for non-security and security people I like. I like this introductory primer to better understand structured security frameworks and to start learning how auditors think. Essentials to consider when choosing a cloud security posture management solution; whether your primary job is security or not, I always advocate for a centralized, simplified automation and standardization of security controls wherever possible. For multi-cloud environments, you can outsource to a cloud security posture management—or CSPM—provider, and this quick read has tips I like on some basics to consider for how to choose your solution.</p><p>SOC 2 attestation tips for SaaS companies. Everyone should understand the basics of service organization control type two, more commonly known as SOC 2, as it is fundamental to doing business in the cloud. SOC 2 is especially important for SaaS providers because it shows there are certain safeguards for data confidentiality, integrity, and availability, among other things.</p><p>Enterprises need to change passwords following ClickStudios’ Passwordstate attack. Tangentially related to cloud, password managers are great tools as long as they are secure, but if you use this one you need to know two things. First, you have to change all your passwords, and second, you need to search for indicators of compromise—or IOCs—for possible nasty things in your environment.</p><p>Five objectives for establishing an API-first security strategy. With cloud-native services APIs become an easy target, so you need to know how to design their use securely. I would use these tips in designing a SaaS offering, so you should too. Hackers are exploiting a Pulse Secure Zero-Day to breach orgs around the world. You need to trust your zero trust solution, and if you use Pulse Secure, you need to know what to do about this right now. If you don’t use Pulse Secure, you should still understand what happened so you can be prepared for when this happens to you.</p><p><br></p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Jesse: Man charged with planning to blow up Amazon Web Services data center in Virginia. You should always have your critical services and all of your data in multiple availability zones, and as much as possible spread across multiple regions. Someday, one of these nutters will succeed in disrupting AWS just enough to give you a bad day. Also, it’s easy to forget that most people don’t know how ‘the cloud’ and ‘the internet’ actually work. Heck, we barely know how these things work and we’re supposed to know this stuff.</p><p>SalusCare, a health services provider, sues AWS over security response. Sure, anyone can sue anyone for anything, but you need to be careful with your data and even more careful with your customers’ data. Does your service agreement and licensing protect and indemnify you from things like this? Even a nuisance lawsuit is costly, so be informed.</p><p>Risk, the misunderstood discipline. Security and finance people talk about risk constantly and some of us evaluate risk in our daily lives. Yep, I do every day at work and home. You need to understand some fundamentals of risk to know ...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>Information Security Compliance: Which regulations relate to me: <a href="https://www.tcdi.com/information-security-compliance-which-regulations/">https://www.tcdi.com/information-security-compliance-which-regulations/</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the cloud: Low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Jesse: Compliance requirements are everywhere. I’ve been on both sides of the table for dozens of audits, and I’ve even worked on commercial building fire code compliance for data centers and even a school. Whatever your industry, there are compliance requirements lurking somewhere in your buildings, your data center, and your clouds. You should know what legal compliance mandates you must meet as well as industry standards or certifications you should meet. You don’t have to learn all the intricate details of any of these compliance laws or frameworks, however, you should at least know what the requirements you have and what frameworks you should use.</p><p>You need to understand more than what your organization does at a high level. You also should know what general activities your organization performs, such as selling things, providing services to a public, or quasi-public entity, or government agencies, or schools, or managing investments or banking. Then go find out your compliance needs. An article called <a href="https://www.tcdi.com/information-security-compliance-which-regulations/">Information Security Compliance: Which regulations relate to me</a>? By TCDI—which appears to be a consulting firm that I neither endorse nor know anything about at all—is a short primer on some common compliance programs that really should prove useful to you.</p><p>Meanwhile, in the news, SANS cloud security curriculum gaining altitude. Become a SANS cloud ace. SANS and GIAC have the best security training and certifications, and now they’ve expanded their cloud courses, including some more foundational options non-security people should find valuable. The training is detailed, challenging, and rewarding, and will teach you far more than most other programs including hands-on exercises that are key to learning tech.</p><p><br></p><p><br>Introduction to the NIST cybersecurity framework. I like the cybersecurity guidelines and frameworks NIST creates because they are useful and understandable tools for non-security and security people I like. I like this introductory primer to better understand structured security frameworks and to start learning how auditors think. Essentials to consider when choosing a cloud security posture management solution; whether your primary job is security or not, I always advocate for a centralized, simplified automation and standardization of security controls wherever possible. For multi-cloud environments, you can outsource to a cloud security posture management—or CSPM—provider, and this quick read has tips I like on some basics to consider for how to choose your solution.</p><p>SOC 2 attestation tips for SaaS companies. Everyone should understand the basics of service organization control type two, more commonly known as SOC 2, as it is fundamental to doing business in the cloud. SOC 2 is especially important for SaaS providers because it shows there are certain safeguards for data confidentiality, integrity, and availability, among other things.</p><p>Enterprises need to change passwords following ClickStudios’ Passwordstate attack. Tangentially related to cloud, password managers are great tools as long as they are secure, but if you use this one you need to know two things. First, you have to change all your passwords, and second, you need to search for indicators of compromise—or IOCs—for possible nasty things in your environment.</p><p>Five objectives for establishing an API-first security strategy. With cloud-native services APIs become an easy target, so you need to know how to design their use securely. I would use these tips in designing a SaaS offering, so you should too. Hackers are exploiting a Pulse Secure Zero-Day to breach orgs around the world. You need to trust your zero trust solution, and if you use Pulse Secure, you need to know what to do about this right now. If you don’t use Pulse Secure, you should still understand what happened so you can be prepared for when this happens to you.</p><p><br></p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Jesse: Man charged with planning to blow up Amazon Web Services data center in Virginia. You should always have your critical services and all of your data in multiple availability zones, and as much as possible spread across multiple regions. Someday, one of these nutters will succeed in disrupting AWS just enough to give you a bad day. Also, it’s easy to forget that most people don’t know how ‘the cloud’ and ‘the internet’ actually work. Heck, we barely know how these things work and we’re supposed to know this stuff.</p><p>SalusCare, a health services provider, sues AWS over security response. Sure, anyone can sue anyone for anything, but you need to be careful with your data and even more careful with your customers’ data. Does your service agreement and licensing protect and indemnify you from things like this? Even a nuisance lawsuit is costly, so be informed.</p><p>Risk, the misunderstood discipline. Security and finance people talk about risk constantly and some of us evaluate risk in our daily lives. Yep, I do every day at work and home. You need to understand some fundamentals of risk to know ...</p>]]>
      </content:encoded>
      <pubDate>Thu, 29 Apr 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/538819ba/89f595df.mp3" length="22072258" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>550</itunes:duration>
      <itunes:summary>Join Jesse as he explores the wonderful world of compliance requirements and talks about why you don’t necessarily need to know the intricate details of every law and framework, some of the best security training and certifications you can get, the NIST cybersecurity framework, why password managers are great as long as you do two things, five objectives for establishing an API-first security strategy, why you need to have your critical services and all of your data in multiple availability zones and spread across multiple regions if possible, why you should always assign permissions to AWS IAM user groups, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he explores the wonderful world of compliance requirements and talks about why you don’t necessarily need to know the intricate details of every law and framework, some of the best security training and certifications you can get, the NIST c</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>ZTA: What's Your Plan?</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>ZTA: What's Your Plan?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">66290e1b-080c-4641-9cbd-fea2174723e1</guid>
      <link>https://share.transistor.fm/s/be7d4e52</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>All Layers Are Not Created Equal”: <a href="https://blog.paloaltonetworks.com/2019/05/network-layers-not-created-equal/">https://blog.paloaltonetworks.com/2019/05/network-layers-not-created-equal/</a></li><li>Help Net Security article: <a href="https://www.helpnetsecurity.com/2021/04/06/john-kindervag-zero-trust/">https://www.helpnetsecurity.com/2021/04/06/john-kindervag-zero-trust/</a></li></ul><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Last week, I talked about Zero Trust as an office building where you have different ways of getting access to different parts of the building. Now, we’re going to talk about Zero Trust architecture or ZTA. That always makes me think of a ZA plan. What’s your plan? When the zombie apocalypse comes, you need to have Zero Trust. You do not trust anyone until you’ve confirmed that they are in fact, not a zombie.</p><p>But how do you do this? Well, first you have to define what a zombie is and you have to define what a human is. And you also have to define what kind of resources that they get to access. Zombies don’t get to access anything, especially not brains. But humans, they get to access all kinds of things: defensive positions, food, resources, medicine, shelter, and you have to confirm their identity every single time that they want to access something.</p><p><br></p><p>How do you do this? Well, the first thing you have to do is to find this, kind of, statically. Jesse comes up, shows he’s not zombie, gets something out of the kitchen. Next time, Jesse comes back, wants some medicine. You check; yep, Jesse’s still not a zombie; he gets to have some medicine.</p><p>However, in a Zero Trust world, what if one time somebody comes along, looks like Jesse, but he’s actually a zombie? He doesn’t get access because the risk has changed. This is exactly what Zero Trust is all about. It’s doing authentication and then authorization based on the current context, what’s happening right now. You let somebody in until it become a zombie.</p><p>You let an account into your resources to use your applications until it looks like it’s probably an attacker and not the actual real person behind that account. See how they are just like? When you’re implementing Zero Trust architectures, it’s not quite so as simple as seeing if somebody’s flesh is rotting off their bones. So, what is in a Zero Trust architecture? Well, there’s some basic components.</p><p>For instance, you have policy engine, which is basically what determines what the rules are and how they are applied in context, and you have Identity and Access Management—or IAM—and that is how you authenticate and how you determine whether an account actually is being driven by the person or thing that it should be. There’s of course monitoring systems to gather and report on your environment, and then you have a SIEM—or Security Information and Event Manager—and an optional security orchestration automation and response or SOAR tool. And the reason for this is so that you can change the architecture and the environment based on the current status of things. So, the policy engine can alter the environment in a feedback loop. And so the policy engine itself, as you can tell, is the brains behind everything, it sits in the middle and it drives the Zero Trust architecture to implement Zero Trust model in your environment.</p><p>So, how does this work? Well, if you talk to John Kindervag, the original creator of the Zero Trust model, he recently has an article where he was interviewed and he talked about some of the methodologies of doing this. So first, you define your protective surfaces—what are you protecting—then you map the transaction flows, what things are talking to other things, what systems are working together? How do your applications work? And then you architect the environment, so you have to put controls where the data or the services are, right?</p><p>So, right at every single application, which is great in a cloud environment, especially if you’re doing things like using Lambda functions, microservices, serverless functions, as well. And then you create a Zero Trust policy, and you do that by using the Kipling Method, which is the journalistic method of who, what, when, where, why, and how. There’s even <a href="https://blog.paloaltonetworks.com/2019/05/network-layers-not-created-equal/">an article</a> that he wrote—John Kindervag that is—a couple of years ago, and he talks about how that applies.</p><p>It’s a great reading, but the main thing you have to get out of that is you have to answer all of these questions about what’s happening in your environment. And then lastly, you monitor and maintain your environment. You gather telemetry, you do machine learning and analytics, and you look at risk analysis, and you have automated responses going through your SOAR platform. Those are the five key things. In short, this is what you should take away from that article on <a href="https://www.helpnetsecurity.com/2021/04/06/john-kindervag-zero-trust/">Help Net Security</a>.</p><p>One, define your protective service. Two, map your transaction flows. Three, architect your environment. Four, create your policies, your Zero Trust policies using the Kipling method. And five, monitor and maintain your environment just like anything else. Make sure it’s working, tune it, tweak it, evaluate it constantly.</p><p>This is a never-ending cycle where you should always be analyzing, tuning, changing because your environment that you’re protecting changes. And also the risks that you have will migrate and change over time. And technologies change; you’re going to be moving things, swapping things out, implementing new things. You have to keep this in mind and go through this cycle over and over again, always defining what the new thing is, figuring out how that interacts with other things and how accounts access data and resources within it. And also following your business; how are things changing in your organization? What other types of things are needed for you to do and to protect the environment as close as possible to those new services and thos...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>All Layers Are Not Created Equal”: <a href="https://blog.paloaltonetworks.com/2019/05/network-layers-not-created-equal/">https://blog.paloaltonetworks.com/2019/05/network-layers-not-created-equal/</a></li><li>Help Net Security article: <a href="https://www.helpnetsecurity.com/2021/04/06/john-kindervag-zero-trust/">https://www.helpnetsecurity.com/2021/04/06/john-kindervag-zero-trust/</a></li></ul><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Last week, I talked about Zero Trust as an office building where you have different ways of getting access to different parts of the building. Now, we’re going to talk about Zero Trust architecture or ZTA. That always makes me think of a ZA plan. What’s your plan? When the zombie apocalypse comes, you need to have Zero Trust. You do not trust anyone until you’ve confirmed that they are in fact, not a zombie.</p><p>But how do you do this? Well, first you have to define what a zombie is and you have to define what a human is. And you also have to define what kind of resources that they get to access. Zombies don’t get to access anything, especially not brains. But humans, they get to access all kinds of things: defensive positions, food, resources, medicine, shelter, and you have to confirm their identity every single time that they want to access something.</p><p><br></p><p>How do you do this? Well, the first thing you have to do is to find this, kind of, statically. Jesse comes up, shows he’s not zombie, gets something out of the kitchen. Next time, Jesse comes back, wants some medicine. You check; yep, Jesse’s still not a zombie; he gets to have some medicine.</p><p>However, in a Zero Trust world, what if one time somebody comes along, looks like Jesse, but he’s actually a zombie? He doesn’t get access because the risk has changed. This is exactly what Zero Trust is all about. It’s doing authentication and then authorization based on the current context, what’s happening right now. You let somebody in until it become a zombie.</p><p>You let an account into your resources to use your applications until it looks like it’s probably an attacker and not the actual real person behind that account. See how they are just like? When you’re implementing Zero Trust architectures, it’s not quite so as simple as seeing if somebody’s flesh is rotting off their bones. So, what is in a Zero Trust architecture? Well, there’s some basic components.</p><p>For instance, you have policy engine, which is basically what determines what the rules are and how they are applied in context, and you have Identity and Access Management—or IAM—and that is how you authenticate and how you determine whether an account actually is being driven by the person or thing that it should be. There’s of course monitoring systems to gather and report on your environment, and then you have a SIEM—or Security Information and Event Manager—and an optional security orchestration automation and response or SOAR tool. And the reason for this is so that you can change the architecture and the environment based on the current status of things. So, the policy engine can alter the environment in a feedback loop. And so the policy engine itself, as you can tell, is the brains behind everything, it sits in the middle and it drives the Zero Trust architecture to implement Zero Trust model in your environment.</p><p>So, how does this work? Well, if you talk to John Kindervag, the original creator of the Zero Trust model, he recently has an article where he was interviewed and he talked about some of the methodologies of doing this. So first, you define your protective surfaces—what are you protecting—then you map the transaction flows, what things are talking to other things, what systems are working together? How do your applications work? And then you architect the environment, so you have to put controls where the data or the services are, right?</p><p>So, right at every single application, which is great in a cloud environment, especially if you’re doing things like using Lambda functions, microservices, serverless functions, as well. And then you create a Zero Trust policy, and you do that by using the Kipling Method, which is the journalistic method of who, what, when, where, why, and how. There’s even <a href="https://blog.paloaltonetworks.com/2019/05/network-layers-not-created-equal/">an article</a> that he wrote—John Kindervag that is—a couple of years ago, and he talks about how that applies.</p><p>It’s a great reading, but the main thing you have to get out of that is you have to answer all of these questions about what’s happening in your environment. And then lastly, you monitor and maintain your environment. You gather telemetry, you do machine learning and analytics, and you look at risk analysis, and you have automated responses going through your SOAR platform. Those are the five key things. In short, this is what you should take away from that article on <a href="https://www.helpnetsecurity.com/2021/04/06/john-kindervag-zero-trust/">Help Net Security</a>.</p><p>One, define your protective service. Two, map your transaction flows. Three, architect your environment. Four, create your policies, your Zero Trust policies using the Kipling method. And five, monitor and maintain your environment just like anything else. Make sure it’s working, tune it, tweak it, evaluate it constantly.</p><p>This is a never-ending cycle where you should always be analyzing, tuning, changing because your environment that you’re protecting changes. And also the risks that you have will migrate and change over time. And technologies change; you’re going to be moving things, swapping things out, implementing new things. You have to keep this in mind and go through this cycle over and over again, always defining what the new thing is, figuring out how that interacts with other things and how accounts access data and resources within it. And also following your business; how are things changing in your organization? What other types of things are needed for you to do and to protect the environment as close as possible to those new services and thos...</p>]]>
      </content:encoded>
      <pubDate>Thu, 22 Apr 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/be7d4e52/7bb47f85.mp3" length="17646587" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>732</itunes:duration>
      <itunes:summary>Join Jesse as he talks about Zero Trust Architecture through the lens of a zombie apocalypse. In this episode, Jesse discusses the basic components of Zero Trust Architecture, how you can go about implementing ZTA, the five key things you need to do to turn ZTA into a reality in your environment, what Zero Trust looks like in the real world, the importance of securing your cloud storage, why you should be auditing your storage on a regular basis, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he talks about Zero Trust Architecture through the lens of a zombie apocalypse. In this episode, Jesse discusses the basic components of Zero Trust Architecture, how you can go about implementing ZTA, the five key things you need to do to tu</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust: Do You Trust Me?</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Zero Trust: Do You Trust Me?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c1bc86b8-ce4e-49a1-ac39-8a93073d0d6c</guid>
      <link>https://share.transistor.fm/s/abab67ac</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>An introduction to the mathematics of trust in security protocols: <a href="https://ieeexplore.ieee.org/document/246634">https://ieeexplore.ieee.org/document/246634</a></li><li>No More Chewy Centers: The Zero Trust Model Of Information Security: <a href="https://www.forrester.com/report/No+More+Chewy+Centers+The+Zero+Trust+Model+Of+Information+Security/-/E-RES56682">https://www.forrester.com/report/No+More+Chewy+Centers+The+Zero+Trust+Model+Of+Information+Security/-/E-RES56682</a></li><li>800-207, “Zero Trust Architecture”: <a href="https://csrc.nist.gov/publications/detail/sp/800-207/final">https://csrc.nist.gov/publications/detail/sp/800-207/final</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Zero Trust is everywhere and nowhere. Over a decade old, Zero Trust feels like a new thing for many of us, but this feeling is likely because most of us experience or manage operational security methodologies following various forms of old-school trust and access models. In these models, a user or service authenticates to a network or service and gets all the things granted to them by their role or account permissions. This is often referred to as a trust but verify paradigm. Many organizations still use Virtual Private Network, or VPN, access mechanisms to connect from the outside to internal or trusted networks.</p><p><br></p><p>Accessing these internal or trusted networks provides access to a variety of systems with low to moderate security generally available to anyone granted access to the associated network. Each user accessing these networks is authenticated in some manner and then is trusted with the ability to connect to available resources. This is like many corporate office buildings: badge in or show ID to the security desk in the lobby, and you are granted access to wander the halls at will, with access to nearly any floor and office. In many modern office buildings, especially those with multiple tenants, there might be sections of the building that require additional verification using a badge reader or being cleared by guards at another security desk. This is like network segmentation trust models where each user must be granted specific access to certain networks.</p><p>Much like accessing different companies in the multi-tenant building works by being cleared by the front desk or using badge readers to unlock the doors and being granted access to all of the offices they’re in, access to resources and services on these network segments is controlled at the entrance by firewalls and/or authentication gateways. While most services today require authentication to get beyond the front door, similar to the network segmentation model but on an application or service level. Usually, there are static definitions of access granted to each user although most applications and services rely on role-based access controls or RBAC, these roles are statically defined with access to a list of resources, services, or capabilities for all users given that role. Searching network segmentation best practices finds dozens of results over the last couple of years with great advice on segmenting networks and limiting access to resources on those networks. Much of it is similar to one another and generally good advice to follow. I like to think of access to networks, resources, and services as being on a need-to-use and access to data on a need-to-know basis. Zero Trust upends the entire access model.</p><p><br></p><p>In June of 1993, IEEE published GJ Simmons’ article, “<a href="https://ieeexplore.ieee.org/document/246634">An introduction to the mathematics of trust in security protocols</a>,” which, as the title implies, defines a mathematical approach to calculating trust in the context of computer systems. This concept opens possibilities for automating complex access authorization schemes. In 2009, while working as an analyst for Forrester Research, John Kindervag published a white paper titled “<a href="https://www.forrester.com/report/No+More+Chewy+Centers+The+Zero+Trust+Model+Of+Information+Security/-/E-RES56682">No More Chewy Centers: The Zero Trust Model Of Information Security</a>,” outlining the Zero Trust model as a new paradigm for controlling access to resources and services.</p><p><br></p><p>Implementing a Zero Trust model creates the ability to dynamically grant access to resources and services based on real-time context, not statically defined need-to-use and need-to-know bases. Going back to the office building analogy, this is like the security station guards verifying things that are currently true before allowing you to access the building or any of the building spaces. For example, they could confirm you are currently employed by a tenant of the building and give you an access card that is good for one-time entry into your organization space. However, if you leave your offices and need to return, you have to go back to the security station to get another one-time entry pass to your suites. Even if you never leave the building, you still must go down to the security station to get your one-time access pass.</p><p>If you need to visit another space in the building, the security station guards would verify you have an appointment that grants you access to a different space, and they would give you a one-time access pass to enter those spaces. Once again, when you need to return to your own offices, you must go back for another pass to get in. This is exactly how Zero Trust works.</p><p><br></p><p>In an ideal Zero Trust world, every time you must access a network, resource, or service, you must also authenticate in some way to both verify your identity and to obtain authorization to access the network resource or service. This goes beyond having a token to use for multiple transactions, like when we store a website cookie or token to skip logging in when we return to a site. Instead, the site would require authentication for access authorization every time we return. In a realistic Zero Trust Architecture, or ZTA implementation, a cookie or token stored for a single session to skip login for every single page or image access is useful, but in a strict ZTA implementation, there would be an authenticat...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p><strong>Links:</strong></p><ul><li>An introduction to the mathematics of trust in security protocols: <a href="https://ieeexplore.ieee.org/document/246634">https://ieeexplore.ieee.org/document/246634</a></li><li>No More Chewy Centers: The Zero Trust Model Of Information Security: <a href="https://www.forrester.com/report/No+More+Chewy+Centers+The+Zero+Trust+Model+Of+Information+Security/-/E-RES56682">https://www.forrester.com/report/No+More+Chewy+Centers+The+Zero+Trust+Model+Of+Information+Security/-/E-RES56682</a></li><li>800-207, “Zero Trust Architecture”: <a href="https://csrc.nist.gov/publications/detail/sp/800-207/final">https://csrc.nist.gov/publications/detail/sp/800-207/final</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Zero Trust is everywhere and nowhere. Over a decade old, Zero Trust feels like a new thing for many of us, but this feeling is likely because most of us experience or manage operational security methodologies following various forms of old-school trust and access models. In these models, a user or service authenticates to a network or service and gets all the things granted to them by their role or account permissions. This is often referred to as a trust but verify paradigm. Many organizations still use Virtual Private Network, or VPN, access mechanisms to connect from the outside to internal or trusted networks.</p><p><br></p><p>Accessing these internal or trusted networks provides access to a variety of systems with low to moderate security generally available to anyone granted access to the associated network. Each user accessing these networks is authenticated in some manner and then is trusted with the ability to connect to available resources. This is like many corporate office buildings: badge in or show ID to the security desk in the lobby, and you are granted access to wander the halls at will, with access to nearly any floor and office. In many modern office buildings, especially those with multiple tenants, there might be sections of the building that require additional verification using a badge reader or being cleared by guards at another security desk. This is like network segmentation trust models where each user must be granted specific access to certain networks.</p><p>Much like accessing different companies in the multi-tenant building works by being cleared by the front desk or using badge readers to unlock the doors and being granted access to all of the offices they’re in, access to resources and services on these network segments is controlled at the entrance by firewalls and/or authentication gateways. While most services today require authentication to get beyond the front door, similar to the network segmentation model but on an application or service level. Usually, there are static definitions of access granted to each user although most applications and services rely on role-based access controls or RBAC, these roles are statically defined with access to a list of resources, services, or capabilities for all users given that role. Searching network segmentation best practices finds dozens of results over the last couple of years with great advice on segmenting networks and limiting access to resources on those networks. Much of it is similar to one another and generally good advice to follow. I like to think of access to networks, resources, and services as being on a need-to-use and access to data on a need-to-know basis. Zero Trust upends the entire access model.</p><p><br></p><p>In June of 1993, IEEE published GJ Simmons’ article, “<a href="https://ieeexplore.ieee.org/document/246634">An introduction to the mathematics of trust in security protocols</a>,” which, as the title implies, defines a mathematical approach to calculating trust in the context of computer systems. This concept opens possibilities for automating complex access authorization schemes. In 2009, while working as an analyst for Forrester Research, John Kindervag published a white paper titled “<a href="https://www.forrester.com/report/No+More+Chewy+Centers+The+Zero+Trust+Model+Of+Information+Security/-/E-RES56682">No More Chewy Centers: The Zero Trust Model Of Information Security</a>,” outlining the Zero Trust model as a new paradigm for controlling access to resources and services.</p><p><br></p><p>Implementing a Zero Trust model creates the ability to dynamically grant access to resources and services based on real-time context, not statically defined need-to-use and need-to-know bases. Going back to the office building analogy, this is like the security station guards verifying things that are currently true before allowing you to access the building or any of the building spaces. For example, they could confirm you are currently employed by a tenant of the building and give you an access card that is good for one-time entry into your organization space. However, if you leave your offices and need to return, you have to go back to the security station to get another one-time entry pass to your suites. Even if you never leave the building, you still must go down to the security station to get your one-time access pass.</p><p>If you need to visit another space in the building, the security station guards would verify you have an appointment that grants you access to a different space, and they would give you a one-time access pass to enter those spaces. Once again, when you need to return to your own offices, you must go back for another pass to get in. This is exactly how Zero Trust works.</p><p><br></p><p>In an ideal Zero Trust world, every time you must access a network, resource, or service, you must also authenticate in some way to both verify your identity and to obtain authorization to access the network resource or service. This goes beyond having a token to use for multiple transactions, like when we store a website cookie or token to skip logging in when we return to a site. Instead, the site would require authentication for access authorization every time we return. In a realistic Zero Trust Architecture, or ZTA implementation, a cookie or token stored for a single session to skip login for every single page or image access is useful, but in a strict ZTA implementation, there would be an authenticat...</p>]]>
      </content:encoded>
      <pubDate>Thu, 15 Apr 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/abab67ac/ac2f86a3.mp3" length="15418129" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>639</itunes:duration>
      <itunes:summary>Join Jesse as he takes a look at the Zero Trust model of security and discusses how it works using a multi-tenant office building as a metaphor, how Zero Trust opens possibilities for automating complex access authorization schemes, why Jesse recommends using the NIST ZTA as a foundation for your approach to Zero Trust implementation, how to implement Zero Trust (spoiler: tune in next week!), how the ability to quickly change access rules for accounts connecting to resources or services is at the very core of Zero Trust, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he takes a look at the Zero Trust model of security and discusses how it works using a multi-tenant office building as a metaphor, how Zero Trust opens possibilities for automating complex access authorization schemes, why Jesse recommends u</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>AWS, Verizon, and MEC: Demystified</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>AWS, Verizon, and MEC: Demystified</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">db1cb573-bf7c-4e62-99c5-f402a187aeea</guid>
      <link>https://share.transistor.fm/s/e09af478</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Jesse: This week, Verizon announced a deepening of its partnership with AWS with the launch of a private mobile edge computing, or MEC, service, which was previously only available from Verizon using Microsoft Azure cloud services. This new service complements the public MEC offering using AWS that Verizon introduced in August of 2020, and brings MEC solutions within reach of many organizations who could not consider implementing MEC in the past. What is mobile edge computing and what do these services provide? Mobile edge computing, sometimes called multi-access edge computing, is an infrastructure approach that provides cloud compute services at the edge of the network closest to the end-users of those services. To service implementations for mobile end-users, the hardware hosting the cloud services are co-located with the 4G or 5G networks rather than relying on transport to and from regular cloud services in addition to traversing the mobile networks.</p><p><br></p><p>This provides low-latency access for critical and real-time applications by users on those mobile networks. With the advent of 5G, latency on mobile networks has dropped down to or below levels commonly measured in landline-based networks. A common example cited is the use of MEC with self-driving cars for ultra-low latency access to traffic, weather, and other real-time conditions. However, a more practical example is using MEC to provide real-time analysis of crowd densities and line cues in public spaces such as theatres or public transit stations. The difference between public and private MEC is that, as the names imply, public implementations are accessible on the public internet, whereas private implementations are only accessible via internal private networks.</p><p><br></p><p>The latency for private MEC implementations tend to be much lower than public MEC implementations as well because the hardware running the compute services is physically located with the end-user systems, such as in a manufacturing plant or train station, but public MEC systems are usually located with a mobile network provider away from the end-users. The Verizon private MEC uses the AWS Outpost service, which is a hardware-based extension of AWS Cloud services physically located at the customer site rather than in AWS or Verizon data centers. These systems include Verizon 5G services for use on private local networks to provide low latency, easy to manage, and secure wireless access. Because of the co-location inside the customer network, the AWS Cloud services provided by this offering are only available to the customer hosting the hardware. The Verizon public MEC uses the AWS Wavelength service, which is a collection of AWS zones co-located with Verizon’s 5G network in select locations. These are generally available [over 00:03:53] AWS Cloud services, usable by nearly any AWS customer. Meanwhile, what about security and MEC?</p><p><br></p><p>Because the Verizon MEC services use existing AWS products, there are no new security mechanisms, tools, or requirements added to either of the public or private MEC services. The customer is required to manage all the usual security for systems and applications they deploy with either of the MEC solutions using the shared responsibility model with two slight differences with AWS Outpost. Let’s look a bit more closely at these two products and their security models.</p><p><br></p><p>AWS Outpost is essentially an AWS Cloud in a box or rack of servers physically installed in the customer’s location. This is remotely managed by AWS and provides a subset of the same AWS services, using the same APIs and other tools, as standard AWS offers in their normal regions. This is different than a wholly private and self-managed cloud implementation because AWS still manages the cloud infrastructure within the Outpost’s equipment.</p><p><br></p><p>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p>Jesse: With Outpost, there are two changes to the shared security model. Obviously, there’s an added layer of security managed by the customer to protect the physical hardware, and the customer must also provide adequate network access and security for the network. However, in terms of the systems, services, and applications running in the environment, operations and security are the same as running those same services in any other cloud environment. The hardware within the server or rack is built on the AWS Nitro platform. Nitro is a hardware implementation of the AWS hypervisor technology, coupled with chip-based hardware security subsystems.</p><p>This allows for a secure implementation of AWS Cloud services while also protecting customer environments and data. AWS Wavelength is the implementation of many of the familiar AWS Cloud services but co-located by AWS within mobile provider 5G networks, and uses the same shared responsibility model as normal AWS solutions. Essentially, Wavelength is used much like any other AWS environment. To use Wavelength, you must request access to the desired Wavelength zone or zones. Once access is granted, create or modify an existing AWS virtual private cloud, or VPC, with coverage extended to include the Wavelength’s zone or zones.</p><p><br></p><p>Then you deploy MEC-based services in the Wavelength zones as you normally would in other AWS regions and zones. Given this as an implementation of VPC, there are no additional security concerns outside the normal issues with managing a complex VPC environment. As always, yo...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="https://www.extrahop.com/trial">extrahop.com/trial</a>.</p><p>Jesse: This week, Verizon announced a deepening of its partnership with AWS with the launch of a private mobile edge computing, or MEC, service, which was previously only available from Verizon using Microsoft Azure cloud services. This new service complements the public MEC offering using AWS that Verizon introduced in August of 2020, and brings MEC solutions within reach of many organizations who could not consider implementing MEC in the past. What is mobile edge computing and what do these services provide? Mobile edge computing, sometimes called multi-access edge computing, is an infrastructure approach that provides cloud compute services at the edge of the network closest to the end-users of those services. To service implementations for mobile end-users, the hardware hosting the cloud services are co-located with the 4G or 5G networks rather than relying on transport to and from regular cloud services in addition to traversing the mobile networks.</p><p><br></p><p>This provides low-latency access for critical and real-time applications by users on those mobile networks. With the advent of 5G, latency on mobile networks has dropped down to or below levels commonly measured in landline-based networks. A common example cited is the use of MEC with self-driving cars for ultra-low latency access to traffic, weather, and other real-time conditions. However, a more practical example is using MEC to provide real-time analysis of crowd densities and line cues in public spaces such as theatres or public transit stations. The difference between public and private MEC is that, as the names imply, public implementations are accessible on the public internet, whereas private implementations are only accessible via internal private networks.</p><p><br></p><p>The latency for private MEC implementations tend to be much lower than public MEC implementations as well because the hardware running the compute services is physically located with the end-user systems, such as in a manufacturing plant or train station, but public MEC systems are usually located with a mobile network provider away from the end-users. The Verizon private MEC uses the AWS Outpost service, which is a hardware-based extension of AWS Cloud services physically located at the customer site rather than in AWS or Verizon data centers. These systems include Verizon 5G services for use on private local networks to provide low latency, easy to manage, and secure wireless access. Because of the co-location inside the customer network, the AWS Cloud services provided by this offering are only available to the customer hosting the hardware. The Verizon public MEC uses the AWS Wavelength service, which is a collection of AWS zones co-located with Verizon’s 5G network in select locations. These are generally available [over 00:03:53] AWS Cloud services, usable by nearly any AWS customer. Meanwhile, what about security and MEC?</p><p><br></p><p>Because the Verizon MEC services use existing AWS products, there are no new security mechanisms, tools, or requirements added to either of the public or private MEC services. The customer is required to manage all the usual security for systems and applications they deploy with either of the MEC solutions using the shared responsibility model with two slight differences with AWS Outpost. Let’s look a bit more closely at these two products and their security models.</p><p><br></p><p>AWS Outpost is essentially an AWS Cloud in a box or rack of servers physically installed in the customer’s location. This is remotely managed by AWS and provides a subset of the same AWS services, using the same APIs and other tools, as standard AWS offers in their normal regions. This is different than a wholly private and self-managed cloud implementation because AWS still manages the cloud infrastructure within the Outpost’s equipment.</p><p><br></p><p>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p>Jesse: With Outpost, there are two changes to the shared security model. Obviously, there’s an added layer of security managed by the customer to protect the physical hardware, and the customer must also provide adequate network access and security for the network. However, in terms of the systems, services, and applications running in the environment, operations and security are the same as running those same services in any other cloud environment. The hardware within the server or rack is built on the AWS Nitro platform. Nitro is a hardware implementation of the AWS hypervisor technology, coupled with chip-based hardware security subsystems.</p><p>This allows for a secure implementation of AWS Cloud services while also protecting customer environments and data. AWS Wavelength is the implementation of many of the familiar AWS Cloud services but co-located by AWS within mobile provider 5G networks, and uses the same shared responsibility model as normal AWS solutions. Essentially, Wavelength is used much like any other AWS environment. To use Wavelength, you must request access to the desired Wavelength zone or zones. Once access is granted, create or modify an existing AWS virtual private cloud, or VPC, with coverage extended to include the Wavelength’s zone or zones.</p><p><br></p><p>Then you deploy MEC-based services in the Wavelength zones as you normally would in other AWS regions and zones. Given this as an implementation of VPC, there are no additional security concerns outside the normal issues with managing a complex VPC environment. As always, yo...</p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Apr 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/e09af478/5c99f51f.mp3" length="14765861" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>612</itunes:duration>
      <itunes:summary>Join Jesse as talks about Verizon’s deepening partnership with AWS and the launch of a private mobile edge computing (MEC) service. In this episode, he explores what the new MEC service does, the differences between public and private MECs, how AWS Outpost is essentially AWS managed cloud offering in a box or rack of servers in your own data center, the two changes Outpost introduces to the shared security model, AWS Nitro and how it allows for a secure implementation of AWS cloud services while also protecting customer environments and data, the impact MEC might or might not have on your environment, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as talks about Verizon’s deepening partnership with AWS and the launch of a private mobile edge computing (MEC) service. In this episode, he explores what the new MEC service does, the differences between public and private MECs, how AWS Outpos</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Know News Is Good News</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Know News Is Good News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e7f97784-850f-4df5-ac78-7948f980059c</guid>
      <link>https://share.transistor.fm/s/5be8b722</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Links:</strong></p><ul><li>"What is an Attack Surface? (And How to Reduce it)": <a href="http://And%20How%20to%20Reduce%20ithttps://www.okta.com/identity-101/what-is-an-attack-surface/">And How to Reduce ithttps://www.okta.com/identity-101/what-is-an-attack-surface/</a></li><li> "Developing Cyber Resilient Systems: A Systems Security Engineering Approach": <a href="https://csrc.nist.gov/publications/detail/sp/800-160/vol-2/final">https://csrc.nist.gov/publications/detail/sp/800-160/vol-2/final</a></li></ul><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="http://extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="http://extrahop.com/trial">extrahop.com/trial</a>.<br></p><p>Jesse: There’s a constant daily show of security-related news from all directions. It’s a storm that never abates. Sifting through it all feels daunting to most people, including many security professionals. We need a strategy to sort it all out and focus on the things that matter, as quickly as we can. [laugh]. The easy and terrifying answer is just to subscribe to all the newsletters for everything your organization uses or your group manages; go read the articles they point to, and [laugh] give up because it’s total information overload.<br></p><p>For some security people, this approach does make sense and it works; except the whole giving up part, of course. However, if this isn’t useful for most of us. As with anything driven by business needs, understanding how to find and evaluate useful security news starts with knowing your business. Whatever your role, you should understand how your work supports and furthers the organizational mission.<br></p><p>Understanding your mission leads to understanding your risks, therefore you will know your role in risk mitigation. This leads to understanding how and why your technological solutions both support your mission and mitigate your risks to that mission. Now, let’s look at how this foundational understanding of your business drives your consumption and evaluation of security news.</p><p>News strategy. It should be obvious that the role you and your technology have relative to the mission and risks determine the choosing of both the types and the sources of security news you should read. It is tempting to focus only on cloud-specific sources and topics, but running in the cloud does not obviate the need for the security of your systems, applications, and data. It is also true that ignoring cloud-specific security news is a bad idea. To determine which to focus on first or most, look at the likely exposure your infrastructure has in terms of your risks.<br></p><p>For example, if your application delivers the services of your business to external customers as opposed to an internal employees’ service, then most people will interact primarily with your application services presented by your systems. Your largest attack surface would be your service application, the data presented and used by your application, the operating system or microservice platform supporting your application, and the network infrastructure to tie it all together. We define attack surface as the collective group of services, systems, or data exposed to access by a potential adversary. In other words, if something can be touched on the network, it is part of the attack surface for initial intrusion. And if something on the system can be touched by local access, it is part of the attack surface for an attacker who has gained access beyond the network resources.<br></p><p>This means most of us have a primary or larger attack surface in the application and systems exposed in services delivery, and our cloud infrastructure underneath and supporting our systems and services is likely a secondary or smaller attack surface. For more reading on attack services, check out Okta’s article called “<a href="https://www.okta.com/identity-101/what-is-an-attack-surface/">What is an Attack Surface? (And How to Reduce it)</a>” and read some attention to the topic in the US National Institute of Standards and Technology or NIST Special Publication 800-160, Volume Two called “<a href="https://csrc.nist.gov/publications/detail/sp/800-160/vol-2/final">Developing Cyber Resilient Systems: A Systems Security Engineering Approach</a>.” Wow, that’s a mouthful.<br></p><p>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="http://goteleport.com">goteleport.com</a>. That’s <a href="http://goteleport.com">goteleport.com</a>.<br></p><p>It is generally the case for most people and organizations that non-cloud-specific news will provide the most return on our investment of time upfront, though this changes once processing and acting upon general security news become streamlined. Now, let’s talk about how to determine the usefulness of the news we encounter.<br></p><p>Evaluating news. Most of us would head straight to industry sources to see what the biggest news of the day is, but I suggest a different approach to triage your news needs. First, look at mainstream news sources such as the <em>New York Times</em> <em>Washington Post</em>, and the <em>Guardian</em> or even NPR, CNN, and BBC. Is there cybersecurity-related news showing up in many or all of these sources? If there is big news, it will be all over it with original source articles, and even articles summarizing those other news sources.<br></p><p>This will likely give you a general idea of the service or technology affected, which helps you determine whether further research is required to understand the impact it may have on your organization. These sources may not clarify what specific technical services or systems are involved, however. Once you found these big news items, search in the tech industry-focused sources to get more relevant detail that isn’t over-simplified for larger public audience. If there isn’t a big...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Links:</strong></p><ul><li>"What is an Attack Surface? (And How to Reduce it)": <a href="http://And%20How%20to%20Reduce%20ithttps://www.okta.com/identity-101/what-is-an-attack-surface/">And How to Reduce ithttps://www.okta.com/identity-101/what-is-an-attack-surface/</a></li><li> "Developing Cyber Resilient Systems: A Systems Security Engineering Approach": <a href="https://csrc.nist.gov/publications/detail/sp/800-160/vol-2/final">https://csrc.nist.gov/publications/detail/sp/800-160/vol-2/final</a></li></ul><p><strong>Transcript</strong></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: This episode is sponsored by <a href="https://www.extrahop.com/">ExtraHop</a>. ExtraHop provides threat detection and response for the Enterprise (not the starship). On-prem security doesn’t translate well to cloud or multi-cloud environments, and that’s not even counting IoT. ExtraHop automatically discovers everything inside the perimeter, including your cloud workloads and IoT devices, detects these threats up to 35 percent faster, and helps you act immediately. Ask for a free trial of detection and response for AWS today at <a href="http://extrahop.com/trial">extrahop.com/trial</a>. That’s <a href="http://extrahop.com/trial">extrahop.com/trial</a>.<br></p><p>Jesse: There’s a constant daily show of security-related news from all directions. It’s a storm that never abates. Sifting through it all feels daunting to most people, including many security professionals. We need a strategy to sort it all out and focus on the things that matter, as quickly as we can. [laugh]. The easy and terrifying answer is just to subscribe to all the newsletters for everything your organization uses or your group manages; go read the articles they point to, and [laugh] give up because it’s total information overload.<br></p><p>For some security people, this approach does make sense and it works; except the whole giving up part, of course. However, if this isn’t useful for most of us. As with anything driven by business needs, understanding how to find and evaluate useful security news starts with knowing your business. Whatever your role, you should understand how your work supports and furthers the organizational mission.<br></p><p>Understanding your mission leads to understanding your risks, therefore you will know your role in risk mitigation. This leads to understanding how and why your technological solutions both support your mission and mitigate your risks to that mission. Now, let’s look at how this foundational understanding of your business drives your consumption and evaluation of security news.</p><p>News strategy. It should be obvious that the role you and your technology have relative to the mission and risks determine the choosing of both the types and the sources of security news you should read. It is tempting to focus only on cloud-specific sources and topics, but running in the cloud does not obviate the need for the security of your systems, applications, and data. It is also true that ignoring cloud-specific security news is a bad idea. To determine which to focus on first or most, look at the likely exposure your infrastructure has in terms of your risks.<br></p><p>For example, if your application delivers the services of your business to external customers as opposed to an internal employees’ service, then most people will interact primarily with your application services presented by your systems. Your largest attack surface would be your service application, the data presented and used by your application, the operating system or microservice platform supporting your application, and the network infrastructure to tie it all together. We define attack surface as the collective group of services, systems, or data exposed to access by a potential adversary. In other words, if something can be touched on the network, it is part of the attack surface for initial intrusion. And if something on the system can be touched by local access, it is part of the attack surface for an attacker who has gained access beyond the network resources.<br></p><p>This means most of us have a primary or larger attack surface in the application and systems exposed in services delivery, and our cloud infrastructure underneath and supporting our systems and services is likely a secondary or smaller attack surface. For more reading on attack services, check out Okta’s article called “<a href="https://www.okta.com/identity-101/what-is-an-attack-surface/">What is an Attack Surface? (And How to Reduce it)</a>” and read some attention to the topic in the US National Institute of Standards and Technology or NIST Special Publication 800-160, Volume Two called “<a href="https://csrc.nist.gov/publications/detail/sp/800-160/vol-2/final">Developing Cyber Resilient Systems: A Systems Security Engineering Approach</a>.” Wow, that’s a mouthful.<br></p><p>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="http://goteleport.com">goteleport.com</a>. That’s <a href="http://goteleport.com">goteleport.com</a>.<br></p><p>It is generally the case for most people and organizations that non-cloud-specific news will provide the most return on our investment of time upfront, though this changes once processing and acting upon general security news become streamlined. Now, let’s talk about how to determine the usefulness of the news we encounter.<br></p><p>Evaluating news. Most of us would head straight to industry sources to see what the biggest news of the day is, but I suggest a different approach to triage your news needs. First, look at mainstream news sources such as the <em>New York Times</em> <em>Washington Post</em>, and the <em>Guardian</em> or even NPR, CNN, and BBC. Is there cybersecurity-related news showing up in many or all of these sources? If there is big news, it will be all over it with original source articles, and even articles summarizing those other news sources.<br></p><p>This will likely give you a general idea of the service or technology affected, which helps you determine whether further research is required to understand the impact it may have on your organization. These sources may not clarify what specific technical services or systems are involved, however. Once you found these big news items, search in the tech industry-focused sources to get more relevant detail that isn’t over-simplified for larger public audience. If there isn’t a big...</p>]]>
      </content:encoded>
      <pubDate>Thu, 01 Apr 2021 00:30:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/5be8b722/efc98620.mp3" length="15210127" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>631</itunes:duration>
      <itunes:summary>Join Jesse as he talks about the endless amount of news out there for security professionals and how to find the signal in the noise, how understanding your organizational mission helps you understand your risks, how to develop a news strategy, what your attack surface is and how to think about it, Jesse's recommendation on how to triage your news needs, why you should scan major publications to see what sources are saying across the board before determining what critical elements warrant deeper investigation, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he talks about the endless amount of news out there for security professionals and how to find the signal in the noise, how understanding your organizational mission helps you understand your risks, how to develop a news strategy, what your </itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Trilogy of Threes and a New Mantra</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Trilogy of Threes and a New Mantra</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9f163664-e88c-4e4a-b5ca-bd1f619cbcd6</guid>
      <link>https://share.transistor.fm/s/92c67c2b</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><strong>Links:</strong></p><ul><li><a href="http://aws.amazon.com/compliance">aws.amazon.com/compliance</a></li><li><a href="http://aws.training/">aws.training</a></li><li><a href="http://docs.microsoft.com/asure/security">docs.microsoft.com/asure/security</a></li><li><br></li></ul><p><strong>Transcript</strong></p><p><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p><br></p><p>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="http://goteleport.com/">goteleport.com</a>. That’s <a href="http://goteleport.com/">goteleport.com</a>.</p><p><br></p><p>Jesse: Trilogy of Threes and a New Mantra. Trilogy of Threes. Good security practices and good security programs are built on three separate but intertwined principles, each of which has three parts. Simon Sinek’s Golden Circle framework lays the foundation for why you have a security program, which is a balance of risks to critical assets and services, and business objectives. The next part of how you apply the Golden Circle to your security program is about how you accomplish meeting these objectives and mitigating your risk through the People, Process, and Technology framework.</p><p><br></p><p>The PPT method helps you define the roles are needed to implement your security program, the overview of processes or actions within your security program, and the types of technology that supports your security program. The final part of how you apply the Golden Circle encompasses what specific things you do to implement your security program using the Holy Trinity of Security: confidentiality, integrity, and availability, or the CIA triad. In your security program, you should define who should be allowed access to any data or service, how you monitor and protect any data or services, and how you keep data or services available for users. Although understanding how to build a security program from nothing is incredibly important, most of us are already operating within an existing security program. Many of us will have influence only on the specific implementation of tools for the Holy Trinity, CIA. All this theory is crucial to understand, but you still have a job to do. So, let’s get practical.</p><p><br></p><p>Where to start today. Searching online for ‘Top X for AWS Security’ returns an expected long list of pages and there are shed-loads of fantastic tips in the results. However, reading through many of them, including AWS’s own blog entry on the topic, shows that proper cloud security involves large projects and possibly fully re-architecting your entire environment. As is often the case in these things, all the best security advice in the cloud has to do right security from the very beginning. Yet this is like discovering a new love of playing the piano late in life like I did, [laugh] but someone telling you the right way to learn to play the piano is to take lessons as a child. This isn’t so useful advice, now is it? Of course, it’s too late to become a child piano prodigy, but it’s not too late to take up the piano and do well.</p><p><br></p><p>Fundamentals. In traditional non-cloud environments, physical security for everything leading up to touching a machine is usually the purview of a different part of the organization, or an entirely different organization than the security team or group responsible for system network and application security. Generally, most information or cybersecurity starts with accessing the software-based systems on a physical device’s console or through a network connection. This, of course, includes accessing the network through some software path, usually a TCP or UDP-based protocol. In cloud environments, the cloud providers, such as Amazon Web Services—or AWS—Microsoft Azure, or Google Cloud Platform—GCP—maintains and is wholly responsible for all the physical environment and the virtual platform or platforms made available to their customers, including all security and availability required for protecting the buildings and hardware, up through the hypervisors presenting services allowing customers to run systems.</p><p><br></p><p>All security above the hypervisor is the customer’s responsibility, from the operating system or OS through applications and services running on these systems. For example, if you run Windows systems for Active Directory Services, and Linux systems for organizations’ online presence, then you own all things in the Windows and Linux OSes, services running on those systems, and the data on those systems. This is called the shared responsibility model. AWS provides details on their compliance site <a href="http://aws.amazon.com/compliance">aws.amazon.com/compliance</a> as well as in a short video on their training and certification site <a href="http://aws.training/">aws.training</a>.</p><p><br></p><p>Microsoft describes their model on their documentation site <a href="http://docs.microsoft.com/asure/security">docs.microsoft.com/asure/security</a>. Google has lots of information in various places on their Google Cloud Platform GCP site, including a guided tour of their physical security for their data centers, but finding a simple explanation like the other two major services have available eluded me. Google does have a detailed explanation of their shared responsibility matrix, as they call it, which is an 87-page PDF. Luckily, given the overwhelming popularity over the other cloud providers, I tend to focus mostly on AWS. I didn’t read the whole GCP document.</p><p><br></p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the Cloud: low effort, high visibility, and detection. To learn more, visit <a href="http://lacework.com/">lacework.com</a>. That’s <a href="http://lacework.com/">lacework.com</a>.</p><p><br></p><p>Jesse: basic AWS training. Amazon provides ample training and online tutorials on all things AWS. This includes AWS basics through advanced AWS architecture and various specialty areas like machine learning and security, among others. I...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><strong>Links:</strong></p><ul><li><a href="http://aws.amazon.com/compliance">aws.amazon.com/compliance</a></li><li><a href="http://aws.training/">aws.training</a></li><li><a href="http://docs.microsoft.com/asure/security">docs.microsoft.com/asure/security</a></li><li><br></li></ul><p><strong>Transcript</strong></p><p><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p><br></p><p>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="http://goteleport.com/">goteleport.com</a>. That’s <a href="http://goteleport.com/">goteleport.com</a>.</p><p><br></p><p>Jesse: Trilogy of Threes and a New Mantra. Trilogy of Threes. Good security practices and good security programs are built on three separate but intertwined principles, each of which has three parts. Simon Sinek’s Golden Circle framework lays the foundation for why you have a security program, which is a balance of risks to critical assets and services, and business objectives. The next part of how you apply the Golden Circle to your security program is about how you accomplish meeting these objectives and mitigating your risk through the People, Process, and Technology framework.</p><p><br></p><p>The PPT method helps you define the roles are needed to implement your security program, the overview of processes or actions within your security program, and the types of technology that supports your security program. The final part of how you apply the Golden Circle encompasses what specific things you do to implement your security program using the Holy Trinity of Security: confidentiality, integrity, and availability, or the CIA triad. In your security program, you should define who should be allowed access to any data or service, how you monitor and protect any data or services, and how you keep data or services available for users. Although understanding how to build a security program from nothing is incredibly important, most of us are already operating within an existing security program. Many of us will have influence only on the specific implementation of tools for the Holy Trinity, CIA. All this theory is crucial to understand, but you still have a job to do. So, let’s get practical.</p><p><br></p><p>Where to start today. Searching online for ‘Top X for AWS Security’ returns an expected long list of pages and there are shed-loads of fantastic tips in the results. However, reading through many of them, including AWS’s own blog entry on the topic, shows that proper cloud security involves large projects and possibly fully re-architecting your entire environment. As is often the case in these things, all the best security advice in the cloud has to do right security from the very beginning. Yet this is like discovering a new love of playing the piano late in life like I did, [laugh] but someone telling you the right way to learn to play the piano is to take lessons as a child. This isn’t so useful advice, now is it? Of course, it’s too late to become a child piano prodigy, but it’s not too late to take up the piano and do well.</p><p><br></p><p>Fundamentals. In traditional non-cloud environments, physical security for everything leading up to touching a machine is usually the purview of a different part of the organization, or an entirely different organization than the security team or group responsible for system network and application security. Generally, most information or cybersecurity starts with accessing the software-based systems on a physical device’s console or through a network connection. This, of course, includes accessing the network through some software path, usually a TCP or UDP-based protocol. In cloud environments, the cloud providers, such as Amazon Web Services—or AWS—Microsoft Azure, or Google Cloud Platform—GCP—maintains and is wholly responsible for all the physical environment and the virtual platform or platforms made available to their customers, including all security and availability required for protecting the buildings and hardware, up through the hypervisors presenting services allowing customers to run systems.</p><p><br></p><p>All security above the hypervisor is the customer’s responsibility, from the operating system or OS through applications and services running on these systems. For example, if you run Windows systems for Active Directory Services, and Linux systems for organizations’ online presence, then you own all things in the Windows and Linux OSes, services running on those systems, and the data on those systems. This is called the shared responsibility model. AWS provides details on their compliance site <a href="http://aws.amazon.com/compliance">aws.amazon.com/compliance</a> as well as in a short video on their training and certification site <a href="http://aws.training/">aws.training</a>.</p><p><br></p><p>Microsoft describes their model on their documentation site <a href="http://docs.microsoft.com/asure/security">docs.microsoft.com/asure/security</a>. Google has lots of information in various places on their Google Cloud Platform GCP site, including a guided tour of their physical security for their data centers, but finding a simple explanation like the other two major services have available eluded me. Google does have a detailed explanation of their shared responsibility matrix, as they call it, which is an 87-page PDF. Luckily, given the overwhelming popularity over the other cloud providers, I tend to focus mostly on AWS. I didn’t read the whole GCP document.</p><p><br></p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the Cloud: low effort, high visibility, and detection. To learn more, visit <a href="http://lacework.com/">lacework.com</a>. That’s <a href="http://lacework.com/">lacework.com</a>.</p><p><br></p><p>Jesse: basic AWS training. Amazon provides ample training and online tutorials on all things AWS. This includes AWS basics through advanced AWS architecture and various specialty areas like machine learning and security, among others. I...</p>]]>
      </content:encoded>
      <pubDate>Thu, 25 Mar 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/92c67c2b/27a684cb.mp3" length="17186298" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>714</itunes:duration>
      <itunes:summary>Join Jesse as he talks about why it's useful to know how to build a security program from the ground up yet how people never really have the luxury to do so, the difference between security in cloud and on-prem environments, why Jesse encourages newcomers to AWS or the cloud in general to spend ten hours perusing aws.training, the importance of understanding cloud security fundamentals, how securing S3 buckets is the cloud version of securing FTP, why you should always be thinking about the fundamentals of great security, and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he talks about why it's useful to know how to build a security program from the ground up yet how people never really have the luxury to do so, the difference between security in cloud and on-prem environments, why Jesse encourages newcomers</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Holy Trinity &amp; the CIA Triad</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>The Holy Trinity &amp; the CIA Triad</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">15094358-d647-4246-9a26-f1dda012970c</guid>
      <link>https://share.transistor.fm/s/3fd20848</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Links:</strong></p><ul><li>EI-ISAC Cybersecurity Spotlight – CIA Triad: <a href="https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/">https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/</a></li><li>What is the CIA Triad?: <a href="https://www.f5.com/labs/articles/education/what-is-the-cia-triad">https://www.f5.com/labs/articles/education/what-is-the-cia-triad</a></li><li>The CIA triad: Definition, components and examples: <a href="https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html">https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p>Jesse: This is the t of a trilogy of threes that covers this core foundations of good security practices and good security programs. In the first issue of <em>Meanwhile in Security</em>, I explained how security is a mindset, not a tool, and the importance of understanding the why or the purpose for building a security program. This drives everything you do in your organization for securing your critical assets. The why is the core reason for having a security program.</p><p>Next, I laid the foundation for the how or the principles that guide the work of your security program by exploring the people, process, and technology paradigm upon which all successful security programs are based. Using PPT, you will build a longer-lasting, more dynamic, and highly successful security program.</p><p>Following Simon Sinek’s Golden Circle model, the outer ring is the what or services offered by an organization group or individual. In implementing and maintaining a security program, the how focuses on the confidentiality, integrity, and availability of all data and services offered within the scope of your security program. This is often called the holy trinity of security, or the CIA Triad. All actions performed and tools implemented in support of the security program stem from one of these fundamental precepts of security. Let’s dig into the parts of the Triad.</p><p><br></p><p>Confidentiality. The first part of the Triad is confidentiality, which is about controlling data in services’ access. In their article titled “<a href="https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/">EI-ISAC Cybersecurity Spotlight–CIA Triad</a>,” the Center for Internet Security, or CIS, defines confidentiality as quote, “Data should not be accessed or read without authorization. It ensures that only authorized parties have access.” End quote. </p><p>I expand on this definition to include services not just data. Every organization and person has data to protect. The traditional approach to confidentiality assumes that any service that touches the data falls within the scope of confidentiality, as a means to protect against disclosure of the data that services accesses. This can lead to a focus on robust and complete data access controls without similar attention paid to services that don’t directly touch data with those controls in place. However, I consider access to and use of services within the scope of confidentiality because protecting use of resources is often as important or in some cases more important than the data access. </p><p>This is often the case with cloud-native applications using microservices. Many modern services can take action without accessing specific data sources, especially when the data source is defined as part of the microservices invocation. For example, consider an attacker who has pilfered a file or files from your services or systems or from some other source and wants to perform analysis or some type of processing of the file or files. If you run services useful to the attacker in this scenario, the attacker may not touch your data, but they may attempt to use your services without authorization. To apply confidentiality to your security program, determine and document what data in services are sensitive and require access protection. To do this you may need to track down data and service owners. This process is closely related to the why of your security program which ultimately exists to protect your data or services.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the Cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Integrity. The second part of the Holy Trinity is integrity, which refers to keeping data intact and services functioning as expected. Anyone accessing data or a service should only have the ability to alter or remove any data or alter or repurpose a service when they are authorized for such actions. In Debbie Walkowski’s post for the F5 Labs site on July 9, 2019, “<a href="https://www.f5.com/labs/articles/education/what-is-the-cia-triad">What is the CIA Triad?</a>” she defines that integrity is about ensuring data quote, “Is correct, authentic and reliable.” End quote. </p><p>Any authorized changes or removal of data or to services violates integrity, and are generally classified as alteration or modification attacks. Changes to some of your data can immediately call into question other data protected by the same security program and security monitoring or control tools. A type of integrity attack on software is a supply chain attack. This is an attack on any part of the process of creating, testing, and distributing software. This attack could be an...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><strong>Links:</strong></p><ul><li>EI-ISAC Cybersecurity Spotlight – CIA Triad: <a href="https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/">https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/</a></li><li>What is the CIA Triad?: <a href="https://www.f5.com/labs/articles/education/what-is-the-cia-triad">https://www.f5.com/labs/articles/education/what-is-the-cia-triad</a></li><li>The CIA triad: Definition, components and examples: <a href="https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html">https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: If you have several PostgreSQL databases running behind NAT, check out <a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p>Jesse: This is the t of a trilogy of threes that covers this core foundations of good security practices and good security programs. In the first issue of <em>Meanwhile in Security</em>, I explained how security is a mindset, not a tool, and the importance of understanding the why or the purpose for building a security program. This drives everything you do in your organization for securing your critical assets. The why is the core reason for having a security program.</p><p>Next, I laid the foundation for the how or the principles that guide the work of your security program by exploring the people, process, and technology paradigm upon which all successful security programs are based. Using PPT, you will build a longer-lasting, more dynamic, and highly successful security program.</p><p>Following Simon Sinek’s Golden Circle model, the outer ring is the what or services offered by an organization group or individual. In implementing and maintaining a security program, the how focuses on the confidentiality, integrity, and availability of all data and services offered within the scope of your security program. This is often called the holy trinity of security, or the CIA Triad. All actions performed and tools implemented in support of the security program stem from one of these fundamental precepts of security. Let’s dig into the parts of the Triad.</p><p><br></p><p>Confidentiality. The first part of the Triad is confidentiality, which is about controlling data in services’ access. In their article titled “<a href="https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/">EI-ISAC Cybersecurity Spotlight–CIA Triad</a>,” the Center for Internet Security, or CIS, defines confidentiality as quote, “Data should not be accessed or read without authorization. It ensures that only authorized parties have access.” End quote. </p><p>I expand on this definition to include services not just data. Every organization and person has data to protect. The traditional approach to confidentiality assumes that any service that touches the data falls within the scope of confidentiality, as a means to protect against disclosure of the data that services accesses. This can lead to a focus on robust and complete data access controls without similar attention paid to services that don’t directly touch data with those controls in place. However, I consider access to and use of services within the scope of confidentiality because protecting use of resources is often as important or in some cases more important than the data access. </p><p>This is often the case with cloud-native applications using microservices. Many modern services can take action without accessing specific data sources, especially when the data source is defined as part of the microservices invocation. For example, consider an attacker who has pilfered a file or files from your services or systems or from some other source and wants to perform analysis or some type of processing of the file or files. If you run services useful to the attacker in this scenario, the attacker may not touch your data, but they may attempt to use your services without authorization. To apply confidentiality to your security program, determine and document what data in services are sensitive and require access protection. To do this you may need to track down data and service owners. This process is closely related to the why of your security program which ultimately exists to protect your data or services.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the Cloud: low effort, high visibility, and detection. To learn more, visit <a href="https://www.lacework.com/">lacework.com</a>. That’s <a href="https://www.lacework.com/">lacework.com</a>.</p><p>Integrity. The second part of the Holy Trinity is integrity, which refers to keeping data intact and services functioning as expected. Anyone accessing data or a service should only have the ability to alter or remove any data or alter or repurpose a service when they are authorized for such actions. In Debbie Walkowski’s post for the F5 Labs site on July 9, 2019, “<a href="https://www.f5.com/labs/articles/education/what-is-the-cia-triad">What is the CIA Triad?</a>” she defines that integrity is about ensuring data quote, “Is correct, authentic and reliable.” End quote. </p><p>Any authorized changes or removal of data or to services violates integrity, and are generally classified as alteration or modification attacks. Changes to some of your data can immediately call into question other data protected by the same security program and security monitoring or control tools. A type of integrity attack on software is a supply chain attack. This is an attack on any part of the process of creating, testing, and distributing software. This attack could be an...</p>]]>
      </content:encoded>
      <pubDate>Thu, 18 Mar 2021 03:00:00 -0700</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/3fd20848/177dd6bf.mp3" length="15969854" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>663</itunes:duration>
      <itunes:summary>Join Jesse as he explores the Holy Trinity of security: confidentiality, integrity, and availability of all data and services. Find out why Jesse thinks access to and use of services fits under the scope of confidentiality, software supply chain attacks and what you can do to prevent them, DDoS attacks and what you can do to prevent them, how the Golden Triangle of security relates to the Holy Trinity of security, how to ensure your security program is both comprehensive and comprehensible to IT staff and users—not just security professionals and auditors—and more.</itunes:summary>
      <itunes:subtitle>Join Jesse as he explores the Holy Trinity of security: confidentiality, integrity, and availability of all data and services. Find out why Jesse thinks access to and use of services fits under the scope of confidentiality, software supply chain attacks a</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Golden Triangle</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>The Golden Triangle</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2ccbb996-c7ce-41c8-ac48-7cfee6fdef3a</guid>
      <link>https://share.transistor.fm/s/ae25e394</link>
      <description>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><strong>Links:</strong></p><ul><li>“What actually is “The human aspect of cyber security”?”: <a href="https://www.cybsafe.com/community/blog/what-is-human-aspect-of-cyber-security/">https://www.cybsafe.com/community/blog/what-is-human-aspect-of-cyber-security/</a></li><li>“What is Process View of Work?”: <a href="https://asq.org/quality-resources/process-view-of-work">https://asq.org/quality-resources/process-view-of-work</a></li><li>Smartsheet Complete Guide to the PPT Framework: <a href="https://www.smartsheet.com/content/people-process-technology">https://www.smartsheet.com/content/people-process-technology</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: Are you building cloud applications with a distributed team? Check out<a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy for cloud resources. Teleport provides secure access for anything running somewhere behind NAT SSH servers, Kubernetes clusters, internal web apps, and databases. Teleport gives engineers superpowers. Get access to everything via single sign-on with multi-factor authentication, list and see all SSH servers, Kubernetes clusters, or databases available to you, and get instant access to them using tools you already have. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. And best of all, Teleport doesn’t get in the way. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p>Jesse: Last week, I had laid the foundation for a core philosophy driving how I evaluate everything, especially in security. I try to always know the why: why something exists, why someone does a thing, or why an organization has a policy or a program. Now, let’s talk about defining the framework of your defensive security program. The sexy and exciting world of offensive security—red teams, penetration testing, hacking, or cracking—gets most of the attention when non-security people think about our work. The popularization of the hacker type in media and entertainment fuels many of these misconceptions, but the reality is that defensive security is far more important than offensive security. </p><p>If you see defensive security depicted in the media at all, the person doing it is generally portrayed as inept. In fact, the opposite is true. Those of us in defensive security solve incredibly complex problems, often with insufficient resources and tools. For the record, I know your work defending systems is far more challenging, rewarding, and complicated than non-security people realize. I know defending systems can be confusing if that’s not your full-time job. </p><p>I also know that there is solid science underlying our work. Understanding that science will increase your success when implementing your security program. This week, we’re discussing People, Process, and Technology, often called the “Golden Triangle.” This foundational framework applies to all successful security programs, even if the security program was not originally designed or written using this framework. The Golden Triangle is your how, or the principles of your security program. </p><p>Unfortunately, too many people see defensive security as boring, and the people who implement it as buttoned-up indentured servants to corporate or government overlords. There’s far more science than art in our work versus the enticing cool factor of breaking into systems to steal away the crown jewels.</p><p>Golden Triangle: People, Process, and Technology, or PPT. Many of you may have heard of the People, Process, and Technology paradigm, but most of you won’t know what people mean by it. The reason PPT matters and is successful is because it’s a business process model. In other words, it’s a proven framework for building a successful and functional organization. The use of PPT in security was first popularized by Bruce Schneier in 1999. </p><p>He references having used the model in a blog post in 2013, but I failed to find the original article. Since his first mention of it, the idea has taken root and is now part of the general toolkit and lexicon of security practitioners everywhere. PPT is wholly applicable to IT of course, although it’s less popular in IT circles. Let’s break it down.</p><p>People. The first of the triad—people—refers obviously to humans. This is the human impact on security. This certainly includes your security professionals and management, yet this also can include general employees or contractors of your organization depending on the scope of your security program. Security personnel are critical to the success of a security program from the CSO all the way down to individual contributors: the security analysts. </p><p>Without the right people designing, implementing, and supporting your security initiative, your program is doomed to fail. You need to know that the people performing tasks and using tools are skilled in the right area so that you can be successful. You must populate your security teams with people well-versed in the business and technologies being protected and monitored, or if you cannot do that, you must provide basic resources and training to provide them with adequate knowledge to do the job. For example, you may be tempted to only hire generalist who know a little bit about everything without any depth of knowledge. But to build the most successful program, your people need domain knowledge. </p><p>If you are protecting Windows systems and networks, you need to hire Windows experts and network engineers, or you need to bring your existing staff up to speed on these topics. To go a bit deeper into the people concepts, checkout CybSafe’s article, “<a href="https://www.cybsafe.com/community/blog/what-is-human-aspect-of-cyber-security/">What actually is “The human aspect of cyber security”?</a>” Note this is not an endorsement for or against CybSafe, the company, its people, or its services. I don’t know enough about them to comment either way. However, it was a very good article.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at<a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the Cloud: low effort, high visibility and detection. To learn more, visit<a href="https://www.lacework.com/">lacework.com</a>. That’s<a></a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of <em>Meanwhile in Security, </em>the podcast about better cloud security you’re about to listen to.</p><p><br></p><p><strong>Links:</strong></p><ul><li>“What actually is “The human aspect of cyber security”?”: <a href="https://www.cybsafe.com/community/blog/what-is-human-aspect-of-cyber-security/">https://www.cybsafe.com/community/blog/what-is-human-aspect-of-cyber-security/</a></li><li>“What is Process View of Work?”: <a href="https://asq.org/quality-resources/process-view-of-work">https://asq.org/quality-resources/process-view-of-work</a></li><li>Smartsheet Complete Guide to the PPT Framework: <a href="https://www.smartsheet.com/content/people-process-technology">https://www.smartsheet.com/content/people-process-technology</a></li></ul><p><br></p><p><strong>Transcript<br></strong><br></p><p>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: Are you building cloud applications with a distributed team? Check out<a href="https://goteleport.com/">Teleport</a>, an open-source identity-aware access proxy for cloud resources. Teleport provides secure access for anything running somewhere behind NAT SSH servers, Kubernetes clusters, internal web apps, and databases. Teleport gives engineers superpowers. Get access to everything via single sign-on with multi-factor authentication, list and see all SSH servers, Kubernetes clusters, or databases available to you, and get instant access to them using tools you already have. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. And best of all, Teleport doesn’t get in the way. Download Teleport at <a href="https://goteleport.com/">goteleport.com</a>. That’s <a href="https://goteleport.com/">goteleport.com</a>.</p><p>Jesse: Last week, I had laid the foundation for a core philosophy driving how I evaluate everything, especially in security. I try to always know the why: why something exists, why someone does a thing, or why an organization has a policy or a program. Now, let’s talk about defining the framework of your defensive security program. The sexy and exciting world of offensive security—red teams, penetration testing, hacking, or cracking—gets most of the attention when non-security people think about our work. The popularization of the hacker type in media and entertainment fuels many of these misconceptions, but the reality is that defensive security is far more important than offensive security. </p><p>If you see defensive security depicted in the media at all, the person doing it is generally portrayed as inept. In fact, the opposite is true. Those of us in defensive security solve incredibly complex problems, often with insufficient resources and tools. For the record, I know your work defending systems is far more challenging, rewarding, and complicated than non-security people realize. I know defending systems can be confusing if that’s not your full-time job. </p><p>I also know that there is solid science underlying our work. Understanding that science will increase your success when implementing your security program. This week, we’re discussing People, Process, and Technology, often called the “Golden Triangle.” This foundational framework applies to all successful security programs, even if the security program was not originally designed or written using this framework. The Golden Triangle is your how, or the principles of your security program. </p><p>Unfortunately, too many people see defensive security as boring, and the people who implement it as buttoned-up indentured servants to corporate or government overlords. There’s far more science than art in our work versus the enticing cool factor of breaking into systems to steal away the crown jewels.</p><p>Golden Triangle: People, Process, and Technology, or PPT. Many of you may have heard of the People, Process, and Technology paradigm, but most of you won’t know what people mean by it. The reason PPT matters and is successful is because it’s a business process model. In other words, it’s a proven framework for building a successful and functional organization. The use of PPT in security was first popularized by Bruce Schneier in 1999. </p><p>He references having used the model in a blog post in 2013, but I failed to find the original article. Since his first mention of it, the idea has taken root and is now part of the general toolkit and lexicon of security practitioners everywhere. PPT is wholly applicable to IT of course, although it’s less popular in IT circles. Let’s break it down.</p><p>People. The first of the triad—people—refers obviously to humans. This is the human impact on security. This certainly includes your security professionals and management, yet this also can include general employees or contractors of your organization depending on the scope of your security program. Security personnel are critical to the success of a security program from the CSO all the way down to individual contributors: the security analysts. </p><p>Without the right people designing, implementing, and supporting your security initiative, your program is doomed to fail. You need to know that the people performing tasks and using tools are skilled in the right area so that you can be successful. You must populate your security teams with people well-versed in the business and technologies being protected and monitored, or if you cannot do that, you must provide basic resources and training to provide them with adequate knowledge to do the job. For example, you may be tempted to only hire generalist who know a little bit about everything without any depth of knowledge. But to build the most successful program, your people need domain knowledge. </p><p>If you are protecting Windows systems and networks, you need to hire Windows experts and network engineers, or you need to bring your existing staff up to speed on these topics. To go a bit deeper into the people concepts, checkout CybSafe’s article, “<a href="https://www.cybsafe.com/community/blog/what-is-human-aspect-of-cyber-security/">What actually is “The human aspect of cyber security”?</a>” Note this is not an endorsement for or against CybSafe, the company, its people, or its services. I don’t know enough about them to comment either way. However, it was a very good article.</p><p>Announcer: If your mean time to WTF for a security alert is more than a minute, it’s time to look at<a href="https://www.lacework.com/">Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the Cloud: low effort, high visibility and detection. To learn more, visit<a href="https://www.lacework.com/">lacework.com</a>. That’s<a></a></p>]]>
      </content:encoded>
      <pubDate>Thu, 11 Mar 2021 03:00:00 -0800</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/ae25e394/0407fda6.mp3" length="17785799" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>738</itunes:duration>
      <itunes:summary>In this episode, Jesse opines on the fact that defensive security is much more important than the offensive security that’s portrayed in media, why defending systems is more challenging and rewarding than most people realize, the Golden Triangle and the role people, processes, and technology play in defensive security, what to look for in the people you hire for your security team (spoiler: domain knowledge), how SolarWinds could have protected itself against a recent data breach, why even the smallest of environments still needs tools to monitor incidents, and more.</itunes:summary>
      <itunes:subtitle>In this episode, Jesse opines on the fact that defensive security is much more important than the offensive security that’s portrayed in media, why defending systems is more challenging and rewarding than most people realize, the Golden Triangle and the r</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Welcome and Why Does Security Matter?</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Welcome and Why Does Security Matter?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dd73ff40-685b-4cf0-8aa5-e919c3e8ec4a</guid>
      <link>https://share.transistor.fm/s/31d77046</link>
      <description>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><a href="https://simonsinek.com/product/start-with-why/">https://simonsinek.com/product/start-with-why/</a></li><li><a href="https://www.ted.com/talks/simon_sinek_how_great_leaders_inspire_action?language=en">https://www.ted.com/talks/simon_sinek_how_great_leaders_inspire_action?language=en</a></li></ul><p><br></p><p><br><strong>Transcript<br></strong><br>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: Are you building cloud applications with a distributed team? Check out <a href="https://goteleport.com/"> Teleport</a>, an open-source identity-aware access proxy for cloud resources. Teleport provides secure access for anything running somewhere behind NAT SSH servers, Kubernetes clusters, internal web apps, and databases. Teleport gives engineers superpowers. Get access to everything via single sign-on with multi-factor authentication, list and see all SSH servers, Kubernetes clusters, or databases available to you, and get instant access to them using tools you already have. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. And best of all, Teleport doesn’t get in the way. Download Teleport at <a href="https://goteleport.com/"> goteleport.com</a>. That’s <a href="https://goteleport.com/"> goteleport.com</a>.</p><p>Jesse: Welcome to <em>Meanwhile in Security</em>. I think we all need a personal assistant to sift through the flood of security news and innovations coming at us. But even if each of us had a PA—and who am I kidding, almost none of us do—our assistants would need their own assistants just to handle the flood of information. I think most of us agree that information overload poses a significant challenge to many of us. And with that challenge comes risk. </p><p>When I talk to people about security, most of them say they need a guide and translator to sort out the deluge of information they receive. More importantly, I've learned that missing key information related to security can jeopardize your organization's mission success, and security breaches are costly, both financially and in lost reputation. When my friends Corey and Mike at The Duckbill Group asked me to create <em>Meanwhile in Security</em>, I remembered my own struggle to stay on top of security news in addition to staying current with the IT operations I managed. I designed this newsletter and podcast with a goal of serving as your personal translator and guide. Each week, you can count on me to explain a security-related topic, whether it's a core security concept, a breakdown of the latest big security breach in the news, or a guide for implementing an operational security methodology. </p><p>Of course, you might wonder why me? Why Jesse Trucks? What do I bring to this discussion? For more than 20 years, I've been in the trenches, managing operations and security for networks, systems, and applications, and working with public and private organizations of all sizes and types. I've done system forensics, managed defensive security and audits, and more. </p><p>As both an individual contributor and in management, I've written documentation and reporting for users, system admins, and management, designed and implemented training, risk mitigation, and security programs, and helped companies, schools, hospitals, and government agencies in the US and elsewhere improve security operations and compliance, respond to breaches and develop and implement risk analysis and mitigation strategies. I've lived through the industry transformation from bare metal, to virtualization, to containerization, and to cloud. This breadth and depth of experience gives me a unique understanding of systems on micro and macro scales. I know how to manage business needs and people. And I've learned that security is as much about conception of risk and risk mitigation as it is about the technology used to manage risk. </p><p>Connecting business IT and security together is what I love doing. For me, translating security for all these audiences is one of my core personal missions. I've learned that having open dialogue and inviting questions is a powerful tool for creating meaningful change. So, here are my questions for you: what security concepts or topics confuse you? Be honest. </p><p>What keeps you up at night about security? How can I help you better understand the importance of security? How can I help you translate security topics for your peers and managers? Where in your cloud journey do you need to better understand security issues and potential risks? Please send me your questions, concerns, and feedback. I can't wait to hear from you.</p><p>Find your why, or how to convince people that security matters. As I mentioned earlier, one thing I've learned during my career is that security is as much about people's conception of risks and risk mitigation as it is about the technology used to manage risk. In this first episode of <em>Meanwhile in Security</em>, I want to establish the foundation for an effective security approach. Driven by management and budgetary concerns, it's easy to get caught up in choosing the tools to manage security without understanding the why of what you are managing. This often leads to financial waste, frustration, and organization-wide resistance to security-related changes. In addition, it usually leads to poor security practices due to misalignment with the risk mitigation needs of the business. </p><p>The first important lesson in managing security is to realize that security is a mindset, not a tool. We often hear security is a process, but this skips straight to implementation. I suggest that implementing and managing security is a process which encompasses people's actions with technical tools. Not every tool is a perfect fit for the job we need to complete. You wouldn't bring a hammer to a laundry pile any more than you would bring a washing machine to a building site. </p><p>We can't know the tools we need if we don't have a roadmap for the protection we're seeking. Thus, it's important to understand that security and compliance aren't your primary goals. Protecting something is the goal. Designing and implementing security programs is a painstaking and time-intensive task, and organizations often go through many iterations before finding a program that works. That's because they lose sight of the fact that your security plan is not your actual goal. </p><p>Protecting data or services, the infrastructure for those data or services, and the data integrity and services availability are the goals. We're all protecting something valuable, but if we lose sight of why we're protecting the things we're protecting, we lose the narrative on how to protect it. In other words, a security program is nothing without a why or a reason.</p><p>Corey: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/"> Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the Cloud: low effort, high visibility and detection. To learn more, visit <a href="https://www.lacework.c..."></a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Links:</strong></p><ul><li><a href="https://simonsinek.com/product/start-with-why/">https://simonsinek.com/product/start-with-why/</a></li><li><a href="https://www.ted.com/talks/simon_sinek_how_great_leaders_inspire_action?language=en">https://www.ted.com/talks/simon_sinek_how_great_leaders_inspire_action?language=en</a></li></ul><p><br></p><p><br><strong>Transcript<br></strong><br>Jesse: Welcome to <em>Meanwhile in Security</em> where I, your host Jesse Trucks, guides you to better security in the cloud.</p><p>Announcer: Are you building cloud applications with a distributed team? Check out <a href="https://goteleport.com/"> Teleport</a>, an open-source identity-aware access proxy for cloud resources. Teleport provides secure access for anything running somewhere behind NAT SSH servers, Kubernetes clusters, internal web apps, and databases. Teleport gives engineers superpowers. Get access to everything via single sign-on with multi-factor authentication, list and see all SSH servers, Kubernetes clusters, or databases available to you, and get instant access to them using tools you already have. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. And best of all, Teleport doesn’t get in the way. Download Teleport at <a href="https://goteleport.com/"> goteleport.com</a>. That’s <a href="https://goteleport.com/"> goteleport.com</a>.</p><p>Jesse: Welcome to <em>Meanwhile in Security</em>. I think we all need a personal assistant to sift through the flood of security news and innovations coming at us. But even if each of us had a PA—and who am I kidding, almost none of us do—our assistants would need their own assistants just to handle the flood of information. I think most of us agree that information overload poses a significant challenge to many of us. And with that challenge comes risk. </p><p>When I talk to people about security, most of them say they need a guide and translator to sort out the deluge of information they receive. More importantly, I've learned that missing key information related to security can jeopardize your organization's mission success, and security breaches are costly, both financially and in lost reputation. When my friends Corey and Mike at The Duckbill Group asked me to create <em>Meanwhile in Security</em>, I remembered my own struggle to stay on top of security news in addition to staying current with the IT operations I managed. I designed this newsletter and podcast with a goal of serving as your personal translator and guide. Each week, you can count on me to explain a security-related topic, whether it's a core security concept, a breakdown of the latest big security breach in the news, or a guide for implementing an operational security methodology. </p><p>Of course, you might wonder why me? Why Jesse Trucks? What do I bring to this discussion? For more than 20 years, I've been in the trenches, managing operations and security for networks, systems, and applications, and working with public and private organizations of all sizes and types. I've done system forensics, managed defensive security and audits, and more. </p><p>As both an individual contributor and in management, I've written documentation and reporting for users, system admins, and management, designed and implemented training, risk mitigation, and security programs, and helped companies, schools, hospitals, and government agencies in the US and elsewhere improve security operations and compliance, respond to breaches and develop and implement risk analysis and mitigation strategies. I've lived through the industry transformation from bare metal, to virtualization, to containerization, and to cloud. This breadth and depth of experience gives me a unique understanding of systems on micro and macro scales. I know how to manage business needs and people. And I've learned that security is as much about conception of risk and risk mitigation as it is about the technology used to manage risk. </p><p>Connecting business IT and security together is what I love doing. For me, translating security for all these audiences is one of my core personal missions. I've learned that having open dialogue and inviting questions is a powerful tool for creating meaningful change. So, here are my questions for you: what security concepts or topics confuse you? Be honest. </p><p>What keeps you up at night about security? How can I help you better understand the importance of security? How can I help you translate security topics for your peers and managers? Where in your cloud journey do you need to better understand security issues and potential risks? Please send me your questions, concerns, and feedback. I can't wait to hear from you.</p><p>Find your why, or how to convince people that security matters. As I mentioned earlier, one thing I've learned during my career is that security is as much about people's conception of risks and risk mitigation as it is about the technology used to manage risk. In this first episode of <em>Meanwhile in Security</em>, I want to establish the foundation for an effective security approach. Driven by management and budgetary concerns, it's easy to get caught up in choosing the tools to manage security without understanding the why of what you are managing. This often leads to financial waste, frustration, and organization-wide resistance to security-related changes. In addition, it usually leads to poor security practices due to misalignment with the risk mitigation needs of the business. </p><p>The first important lesson in managing security is to realize that security is a mindset, not a tool. We often hear security is a process, but this skips straight to implementation. I suggest that implementing and managing security is a process which encompasses people's actions with technical tools. Not every tool is a perfect fit for the job we need to complete. You wouldn't bring a hammer to a laundry pile any more than you would bring a washing machine to a building site. </p><p>We can't know the tools we need if we don't have a roadmap for the protection we're seeking. Thus, it's important to understand that security and compliance aren't your primary goals. Protecting something is the goal. Designing and implementing security programs is a painstaking and time-intensive task, and organizations often go through many iterations before finding a program that works. That's because they lose sight of the fact that your security plan is not your actual goal. </p><p>Protecting data or services, the infrastructure for those data or services, and the data integrity and services availability are the goals. We're all protecting something valuable, but if we lose sight of why we're protecting the things we're protecting, we lose the narrative on how to protect it. In other words, a security program is nothing without a why or a reason.</p><p>Corey: If your mean time to WTF for a security alert is more than a minute, it’s time to look at <a href="https://www.lacework.com/"> Lacework</a>. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you’re building a secure business on AWS with compliance requirements, you don’t really have time to choose between antivirus or firewall companies to help you secure your stack. That’s why Lacework is built from the ground up for the Cloud: low effort, high visibility and detection. To learn more, visit <a href="https://www.lacework.c..."></a></p>]]>
      </content:encoded>
      <pubDate>Thu, 04 Mar 2021 00:30:00 -0800</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/31d77046/c7990a69.mp3" length="20537308" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>844</itunes:duration>
      <itunes:summary>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of Meanwhile in Security, the podcast about better cloud security you’re about to listen to.

In this episode, Jesse establishes the foundation for an effective security approach while touching upon the importance of security as a mindset instead of a tool, how security is often driven by management or budgetary concerns, which results in waste and frustration, the importance of understanding the why behind security, why organizations often lose sight of the fact that their security plans aren’t the actual goal—protecting data and infrastructure is, Simon Sinek and the neuroscience behind why it’s important to know why you are doing something, how purchasing the right tool is wasted resources without a success plan for implementing said tool, and more.</itunes:summary>
      <itunes:subtitle>Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, ha</itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Introducing Meanwhile in Security</title>
      <itunes:title>Introducing Meanwhile in Security</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">2388c10f-f247-4a3a-bdec-739530c19eab</guid>
      <link>https://share.transistor.fm/s/00081436</link>
      <description>
        <![CDATA[Ever noticed how security tends to be one of those things that isn't particularly welcoming to folks who don't already have the word "security" somewhere in their job title? Introducing our fix to that: Meanwhile in Security. Featuring Jesse Trucks. ]]>
      </description>
      <content:encoded>
        <![CDATA[Ever noticed how security tends to be one of those things that isn't particularly welcoming to folks who don't already have the word "security" somewhere in their job title? Introducing our fix to that: Meanwhile in Security. Featuring Jesse Trucks. ]]>
      </content:encoded>
      <pubDate>Thu, 18 Feb 2021 13:40:54 -0800</pubDate>
      <author>Jesse Trucks</author>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media.transistor.fm/00081436/50af353d.mp3" length="3266961" type="audio/mpeg"/>
      <itunes:author>Jesse Trucks</itunes:author>
      <itunes:duration>134</itunes:duration>
      <itunes:summary>Ever noticed how security tends to be one of those things that isn't particularly welcoming to folks who don't already have the word "security" somewhere in their job title? Introducing our fix to that: Meanwhile in Security. Featuring Jesse Trucks. </itunes:summary>
      <itunes:subtitle>Ever noticed how security tends to be one of those things that isn't particularly welcoming to folks who don't already have the word "security" somewhere in their job title? Introducing our fix to that: Meanwhile in Security. Featuring Jesse Trucks. </itunes:subtitle>
      <itunes:keywords>security, aws, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
