AttackIQ, BlueHexagon, and Coalfire – ESW #151 – Digitalmunition

News AttackIQ, BlueHexagon, and Coalfire - ESW #151

Published on August 29th, 2019 📆 | 6560 Views ⚑


AttackIQ, BlueHexagon, and Coalfire – ESW #151




We interview Chris Kennedy, the CISO & VP and Customer Success at AttackIQ, Balaji Prasad, the VP of Product Management at BlueHexagon, and Mike Weber, the VP of Product Management at Coalfire.

Full Show Notes:

Visit for all the latest episodes!

To learn more about our sponsors visit: The DigitalMunition Sponsor’s Page


We interview Chris Kennedy, the CISO & VP and Customer Success at AttackIQ.

Segment Topic:
While MITRE ATT&CK framework is relatively new to security, it’s already proving to be incredibly valuable and its influence and importance is rapidly growing. MITRE’s work allows us to see what techniques can be invoked post breach–how did the adversary get in and what malicious activity are they doing once they are in there? The work MITRE has done around APTs assists security professionals in selecting security technologies that are effective in defending against an ever expanding, crowd sourced collection of known threats. In turn, our industry, continuous security validation, has been affected by the MITRE ATT&CK framework. We can now execute tests to validate that an organization’s security controls are 100% effective all the time. 


We interview Balaji Prasad, the VP of Product Management at BlueHexagon.

Segment Topic:
Blue Hexagon harnesses deep learning to detect known and unknown threats in both payloads and headers, in less than a second, at greater than 99.5% efficacy. Our threat detection platform can be flexibly deployed where your critical business traffic needs to be inspected– at the network perimeter and for AWS cloud workloads. At Black Hat, we’re also extending our deep learning-powered threat detection to inspect encrypted traffic. 


We interview Mike Weber, the VP of Product Management at Coalfire.

Segment Topic:
Coalfire Labs’ R&D team and recent projects in IoT, hypervisor vulnerabilities, and covert command and control channels. 

Matt Alderman
Matt Alderman – CEO
Paul Asadoorian
Paul Asadoorian – Founder & CTO
  • We have exciting news about the DigitalMunition webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to If you have missed any of our previously recorded webcasts, you can find our on-demand library at
  • DigitalMunition will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man’s talk as well!

Source link

Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *