Secure Networks: Endace Packet Forensics Files

Secure Networks: Endace Packet Forensics Files

Podcast by Michael Morris

"Secure Networks: Endace Packet Forensics Files" features interviews with leading cybersecurity and networking experts from companies such as Cisco, Darktrace, Palo Alto Networks, and others. It focuses on the issues that Security, Network Operations and DevOps teams face in securing and managing their networks and applications and provides insights into best practices and future developments.

90 vrk ilmainen kokeilu

Kokeilun jälkeen 19,99 € / kuukausi.Peru milloin tahansa.

Aloita maksutta

Kaikki jaksot

59 jaksot
episode Episode 61: Jean-Pierre Bergeaux - Federal CTO, GuidePoint Security artwork
Episode 61: Jean-Pierre Bergeaux - Federal CTO, GuidePoint Security

In this episode of the @Endace Packet Forensics Files, I talk to Jean-Paul Bergeaux, Federal CTO at GuidePoint Security.  We unravel the complex world of federal cybersecurity and discuss the critical importance of certifications, the game-changing M-21-31 directives, and how packet capture data is revolutionizing threat detection.  We also uncover the potential risks and opportunities presented by generative AI in the cybersecurity landscape. From SolarWinds lessons to the emerging generative AI challenge, Jean-Paul provides unprecedented insights into how government agencies fight to stay ahead of sophisticated cyber threats.  This episode offers a must-watch deep dive into the frontlines of digital defense. ABOUT ENDACE  ***************** Endace (https://www.endace.com) is a world leader in high-performance packet capture solutions for cybersecurity, network and application performance.  EndaceProbes are deployed on some of the world's largest, fastest and most critical networks. EndaceProbe models are available for on-premise, private cloud and public cloud deployments - delivering complete hybrid cloud visibility from a 'single-pane-of-glass'. Endace’s open EndaceProbe Analytics appliances (https://www.endace.com/endaceprobe) can be deployed in on-prem locations and can also host third-party security and performance monitoring solutions while simultaneously recording a 100% accurate history of network activity.

11. kesäk. 2025 - 22 min
episode Episode 60: James Spiteri - Director of Product Management for Security Analytics at Elastic artwork
Episode 60: James Spiteri - Director of Product Management for Security Analytics at Elastic

How Generative AI and Machine Learning are Revolutionizing Cybersecurity In this episode of the Endace Packet Forensic Files, Michael Morris explores how advanced technologies like AI and machine learning are transforming security operations with James Spiteri. With extensive experience in cybersecurity and security operations, including leading SOC teams and developing innovative solutions for AI and machine learning, James offers unparalleled insights. He delves into the growing sophistication of nation-state threats, the critical role of SIEM tools, and how AI-driven insights are enabling faster, smarter threat detection by prioritizing critical alerts, automating mundane tasks, analyzing complex data patterns, and operationalizing unstructured threat intelligence in real-time. Don’t miss this insightful episode, where James shares expert tips on leveraging cutting-edge technology to strengthen your cybersecurity defenses and stay ahead of evolving threats. ABOUT ENDACE ***************** Endace (https://www.endace.com [https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbi1xMnRxbXNkdU43WGY0ZGpoLUJNSTRLR1VQUXxBQ3Jtc0ttcDZSeVBYLWttSzc0cHctUnNZeUhTMzhvV3NfTThkM2cxOUZhRkdEdUNGLW9qeVZZdDFMLVljeFIyZDRkZHRkR3pTT01fak9QSElqTGs5Y2licXFfeGp3aXRkTkx4RzZKRklkR0dnLTRZdURKU054TQ&q=https%3A%2F%2Fwww.endace.com%2F&v=m3GFbGDch3c]) is a world leader in high-performance packet capture solutions for cybersecurity, network and application performance. For more than two decades, Endace [https://www.endace.com/] has revolutionized enterprise-class, always-on packet capture [https://www.endace.com/learn/what-is-network-packet-capture]. The scalable EndaceProbe [https://www.endace.com/endaceprobe] Analytics Platform (https://www.endace.com/endaceprobe [https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbENLVGJkaW5ZSFRWUXl0ZkphUVZDakszekc0Z3xBQ3Jtc0tsSmJvYTB2aVYwQ01LRmRpWnJ4Um1Oek00RjczM1dVaWdDenZIaHdWaUdGWFNmWDhSSHVmZWVvaWJBZUd5bklUS29ZVGcyZXFqTjdzcVhNNTk2cUFBMlphdE5BNzh4TnlaSXR5SkszVHRYOE5HQWdKTQ&q=https%3A%2F%2Fwww.endace.com%2Fendaceprobe&v=m3GFbGDch3c]) delivers deep, unified visibility across on-premise, private, and public cloud networks. Get to forensic evidence quickly, with rapid search [https://www.endace.com/InvestigationManager] and powerful tool integration [https://www.endace.com/fusion-partners]. Protect your network and accelerate investigation and response with Endace.

26. helmik. 2025 - 31 min
episode Episode 59: Matt Bromiley - SANS Author and Instructor | Veteran Threat Hunting Expert artwork
Episode 59: Matt Bromiley - SANS Author and Instructor | Veteran Threat Hunting Expert

Unlock the Power of Network Packet Data in Cybersecurity In this episode of the Endace Packet Forensics Files, Michael Morris dives into the critical role of network packet data in cybersecurity with Matt Bromiley, a seasoned threat-hunting expert. Matt shares why robust detection systems and proactive threat hunting are essential, and how network data serves as the “glue” that ties together evidence in cybersecurity investigations. The challenges of managing large data volumes, the growing role of AI in threat detection, and the tools needed to stay ahead of emerging threats are explored. Matt provides practical steps to seamlessly integrate packet capture into a threat-hunting toolkit, enabling teams to uncover and respond to even the most elusive threats. Matt emphasizes the importance of implementing a comprehensive packet capture strategy and using advanced tools, including AI, to manage data and enhance detection. He also stresses the need for continuous team training to effectively interpret data and respond to real-time threats, strengthening your defense against complex threats. Don’t miss this insightful episode, where Matt shares expert tips on optimizing threat hunting and leveraging packet capture to strengthen your cybersecurity defenses.

07. marrask. 2024 - 38 min
episode Episode 57: Ryan Chapman - SANS Author and Instructor | Veteran DFIR Expert artwork
Episode 57: Ryan Chapman - SANS Author and Instructor | Veteran DFIR Expert

Ransomware has shifted from simple, isolated attacks to coordinated, human-operated campaigns that target entire organizations.   In this episode of the Endace Packet Forensics Files [https://www2.endace.com/secure-networks-ep54], Michael Morris talks with Ryan Chapman, SANS Instructor and expert in Digital Forensic and Incident Response (DFIR) about these evolving threats.   Ryan explains how attackers are becoming more methodical and sophisticated, focusing on disabling EDR/XDR solutions to evade detection and leaving organizations vulnerable to advanced attacks.   One of the key challenges Ryan highlights is visibility. Without robust logging, packet capture, and monitoring tools, it’s nearly impossible to understand how an attack happened fully. Even encrypted traffic can reveal critical patterns if analyzed properly.    Ryan shares examples of organizations that suffered reinfections because they rushed to restore systems without identifying the original entry point. Packet capture data plays a vital role in pinpointing when and how attackers infiltrated, ensuring a safe recovery and minimizing disruption.   As ransomware tactics evolve, adopting a Zero-Trust approach is essential. Ryan discusses how limiting permissions and avoiding overly trusting software configurations can help prevent breaches. He cites the Kaseya attack, where some organizations avoided compromise by not blindly whitelisting trusted directories. As attackers increasingly use legitimate tools, verifying all network activity and following least privilege principles are critical defenses.    Don’t miss this insightful episode, where Ryan provides actionable advice for preparing your organization against today’s ransomware threats.

26. elok. 2024 - 28 min
episode Episode 55: Taran Singh - VP, Product Management at Keysight Technologies artwork
Episode 55: Taran Singh - VP, Product Management at Keysight Technologies

In this episode, I chat with Taran Singh, VP of Product Management at Keysight Technologies, about network observability.   Taran explains its importance within the zero-trust architecture and discusses the challenges organizations face in achieving clear network visibility.   He highlights the role of historical data analysis in cybersecurity and outlines Keysight's approach to network visibility.   Don’t miss this insightful discussion on network observability and its significance in modern cybersecurity.  Follow Taran here on LinkedIn  - https://www.linkedin.com/in/taransingh/ [https://www.linkedin.com/in/taransingh/]

16. toukok. 2024 - 17 min
Loistava design ja vihdoin on helppo löytää podcasteja, joista oikeasti tykkää
Loistava design ja vihdoin on helppo löytää podcasteja, joista oikeasti tykkää
Kiva sovellus podcastien kuunteluun, ja sisältö on monipuolista ja kiinnostavaa
Todella kiva äppi, helppo käyttää ja paljon podcasteja, joita en tiennyt ennestään.

90 vrk ilmainen kokeilu

Kokeilun jälkeen 19,99 € / kuukausi.Peru milloin tahansa.

Podimon podcastit

Mainoksista vapaa

Maksuttomat podcastit

Äänikirjat

100 tuntia / kk

Aloita maksutta

Vain Podimossa

Suosittuja äänikirjoja