Data Lakes – Security’s Savior, or Waste of Money? Also, the News! – ESW #334
On this week's news segment, we go down a bit of a rabbit hole on data lakes and have a GREAT conversation about where security data wrangling might or might not go in the future. We also discuss Nord Security's funding and $3B valuation, try to figure out what Synqly is doing, and discuss IronNet's demise.
We also find out which email solution is more secure (at least, according to insurance claim data), Google or Microsoft!
We wrap up, learning that forms of CAPTCHAs are apparently broken now, $3800 gets you a gaming PC in the shape of a sneaker, and someone has created the DevOps equivalent of dieselgate!
Announcements
Dive deeper into the world of cybersecurity with Security Weekly on Instagram! Follow us @SecWeekly to find exclusive clips, hilarious memes, behind-the-scenes sneak peeks, and more! Stay connected, stay informed, and join our growing community!
Hosts
- 1. FUNDING: Nord Security Raises $100M Financing Round
- 2. FUNDING: Lumu Raises $30 Million Series B to Optimize Security Operations for Enterprises and MSPs – Lumu Technologies
- 3. FUNDING: Gem Security raises $23M for its cloud security platform
- 4. FUNDING: Vali Cyber™ Secures $15M in Seed Funding to Revolutionize Linux Cybersecurity
- 5. FUNDING: Nexusflow raises $10.6M to build a conversational interface for security tools
- 6. FUNDING: EchoMark Raises $10M in Seed Funding
It will be interesting to see how resilient these watermarks are, or if they end up being trivial to remove, like image watermarks in this paper I just spotted: https://browse.arxiv.org/pdf/2306.01953.pdf
- 7. SHUTDOWNS: IronNet Ceases Operations, Terminates All Remaining Staffers
- 8. NEW COMPANIES: Synqly Emerges from Stealth to Revolutionize Security Product Integrations – Synqly
A bit confused on this one - how is this unique from what Tines, Workato, and others in the iPaaS and SOAR space are doing?
- 9. PRODUCT SECURITY: When It Comes to Email Security, the Cloud You Pick Matters
- 10. NEW TOOLS: JA4+ Network Fingerprinting
- 11. ESSAYS: Securing AI: What You Should Know
Securing AI: Similar or Different?
- 12. ESSAYS: “Influence” and Your Career
- 13. COMPLIANCE: The SOC2 Starting Seven
- 14. COMPLIANCE: SOC2 Guide
- 15. MARKET ANALYSIS: Software Supply Chain Vendor Landscape
- 16. MARKET ANALYSIS: Security is about data: how different approaches are fighting for security data and what the cybersecurity data stack of the future is shaping up to look like
- 17. CYBER WAR: 8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them
- 18. HACKS: Dead grandma locket request tricks Bing Chat’s AI into solving security puzzle
- 19. SCIENCE: MemComputing Claims Breakthrough In Large-Scale Prime Factorization, Potentially Revolutionising Cryptography
Huge if true.
- 20. SQUIRREL: Cooler Master’s Sneaker Gaming PC Sells For $3,799
- 21. SQUIRREL: volkswagen