CYBER24 is a podcast designed to bridge the knowledge gap between cybersecurity experts, business leaders and policy makers. We break down the top cybersecurity stories making headlines and talk with experts who share their knowledge in an easily understandable format designed to arm public and priv…
In this episode of the CYBER24 podcast, presented by VLCM, we discuss application security with Laura Bell Main, the founder and CEO of SafeStack. We discuss incentivizing security in software design and her belief that secure software is more than just the code developers write.PanelistsLaura Bell Main, CEO of Safestack
In this episode of the CYBER24 podcast, we sit down with Patrick Hynds and Duane Laflotte from Pulsar Security to discuss cybersecurity and their podcast "Security This Week." As experienced cybersecurity professionals and educators, they share their insights on teaching cybersecurity to their audience and what businesses can do to protect themselves against cyber threats. Tune in to learn from their expertise and experience.PanelistsPatrick Hynds, CEODuane Laflotte, CTO
In this episode of the CYBER24 podcast, presented by VLCM, we talk about cybersecurity education with Laurie Salvail, the executive director of CYBER.org. She's working to improve cybersecurity literacy and expand K-12 cybersecurity education to help student stay safe online and prepare them for cybersecurity careers. PanelistsLaurie Salvail, Executive Director of CYBER.org
Our guest this episode is Eric Olden who is the Co-founder and CEO of Strata Identity. He is a widely respected thought leader in identity management. He is also the visionary behind Symplified's strategy to secure the cloud. We discuss the identity landscape, identity orchestration and identity fabric.
In this episode of the CYBER24 podcast, presented by VLCM, we look at security tools your organization may have but not utilize - or under utilize. We talk with Andre Keartland of Netsurit about the Microsoft security stack and how using it right can help you get the most from limited security personnel.
In this episode of CYBER24, presented by VLCM, we discuss the growing compliance risks stemming from business communications with Garth Landers of Theta Lake. He discusses key findings from the company's 2022 Modern Communications Compliance and Security Report, why firms from all sectors should be prepared for regulatory scrutiny of their ability to capture, monitor, retain and retrieve all relevant communications, and how businesses can prepare now to future-proof their collaboration tool usage. PanelistsGarth Landers, Software Executive at Theta Lake
In this episode of CYBER24, presented by VLCM, we visit with Sangeeta Krishnan, who is a senior analytics leader with Bayer and the author of “Thriving in a Data World.” We discuss the challenges of establishing a data-driven culture, the most difficult thing she sees about working in the data world and data industry buzzwords - including her favorite one she says no one actually understands. Amazon book linkhttps://www.amazon.com/Thriving-Data-World-Leaders-Managers/dp/1637424167](https://www.amazon.com/Thriving-Data-World-Leaders-Managers/dp/1637424167Follow herhttps://www.linkedin.com/in/sangeeta-krishnan/https://sangeetakrishnan.com/](https://sangeetakrishnan.com/PanelistsSangeeta Krishnan, North American Analytics Lead at Bayer
In this episode of the CYBER24 podcast, presented by VLCM, we talk with Bron Gondwana, the CEO of Fastmail. He's a former programmer who shares his perspective on open standards. We talk about what that means for email, why businesses should adopt open standards and the biggest isues facing data privacy today.
In this episode of the CYBER24 podcast, presented by VLCM, we take a deep dive on one of the hottest phishing trends, HTML malware. Karl Sigler of Trustwave SpiderLabs shares his perspective on HTML smuggling, social engineering and how this type of attack will evolve in the coming years.
In this episode of the CYBER24 podcast, presented by VLCM, we talk with Tyer Moffitt, senior security analyst at OpenText Security Solutions. They've released their 2022 Nastiest Malware Report and we discuss the top threats facing small businesses and average Joes. We also dive into what Tyler is seeing as the most intersting new tactics the hacker groups are using.
In this episode of the CYBER24 podcast, presented by VLCM, we sit down with Jon Murchison, founder and CEO of Blackpoint Cyber. Jon is a fromer NSA computer operations expert and we cover everything from how he recruits the best cyber talent in a high-demand market to how the ongoing war in Ukraine has impacted the types of cyber attacks his team is fighting.
In this week's episode of CYBER24, presented by VLCM, we discuss digital extortion with Michael Orozco of MorganFranklin Cybersecurity. He gives his insight on why are cybercriminals stealing personal and business information for future use and digital extortion and how they target differnet types of people, sectors or organizations. We also cover what should organizations do once they have been attacked or information is compromised and what steps can people or organizations take to mitigate these risks in the future.
In this week's episode of CYBER24, we sit down with Dr. Danny Rittman to discuss Overlooked Security Vulnerabilities. Dr. Rittman is an R&D expert and CTO of GBT Technologies. We discuss everyIn this week's episode of CYBER24, we sit down with Dr. Danny Rittman to discuss Overlooked Security Vulnerabilities. Dr. Rittman is an R&D expert and CTO of GBT Technologies. We discuss everything from a new type of chip he's working on that will greatly increase storage capacity. We also talk about radio cybersecurity and authentication methods, inlcuidng how machine learning plays into cybersecurity. thing from a new type of chip he's working on that will greatly increase storage capacity. We also talk about radio cybersecurity and authentication methods, inlcuidng how machine learning plays into cybersecurity.
Businesses spend significant time building their digital defenses - and with good reason. But there's a type of attack many overlook and it's a combination of a physical and digital attack. Wr discuss phygital attacks with Will Plummer, chief security officer of RaySecur.
Cybersecurity has been a male-dominated field and that's a problem - especially when there's incredible demand for talent right now. In today's episode, we discuss women in cybersecurity, mentoring and more with Lynne Doherty of Sumo Logic. GuestLynne DohertyLinkedinTwitterSumo Logic
In this episode, we discuss Cyber Risks in the Remote-Work World with Tyler Moffitt of OpenText Security. We ask him if remote work is making this risky cyber behavior worse and look at the recent Uber breach to learn what organizations should do to ensure employees are prepared these days.PanelistsTyler Moffitt, Senior Security Analyst
In this episode of CYBER24, presented by VLCM, we discuss Safety for Payment Platforms with Josh Shaul, CEO of Allure Security and author of Practical Oracle Security. We cover how online payment platforms can protect themselves from brand impersonation and spoofing, how AI can prevent account takeover attacks, brand Protection tactics every business should consider, and how retail brands can leverage technology to get ahead of the curve to protect their brand reputation.
Hiring tech talent can be a real challenge for any organization. In this week's episode of CYBER24, presented by VLCM, we discuss the Cultural Needs of Tech Businesses with Helen Horstmann-Allen, the COO of Fastmail. The pod covers changes she's seen in the process of recruiting talent for an international tech business in the post-COVID era to competing with tech giants for talent and advice she has for small to mid sized tech companies looking to land talent in 2023.
In this episode, we sit down with Stephen Semmelroth, the VP of cyber at Avant Communications. Stephen was in the Army for 6+ years, and he served in Afghanistan and the Army's Cyber Corps, where he led a red team and a threat intelligence team defending US assets across an entire continent. He also co-wrote the training doctrine that defines how [cyber units](https://www.linkedin.com/pulse/stratacore-announces-acquisition-rainier-cyber-geniece-mccolgan/) defend the US. Stephen broke his back while on a mission in Afghanistan, which left him paralyzed, and he had to relearn how to walk. After retiring from the Army, he founded Rainier Cyber, a cybersecurity recruiter that matches Cyber Vets with tech jobs across the county, which was acquired by StrataCore in 2020.PanelistsStephan Semmelroth, VP Cyber at StrataCore
The pandemic had a ripple effect on the supply chain but there's also a software supply chain - and a disruption there can be big trouble for your business. In this episode of CYBER24, presented by VLCM, we chat with Anirban Banjeree CEO and Co-founder of Riscosity, a company dedicated to providing businesses with a working Software Supply Chain Security Platform––granting them greater visibility, control, and security.
We all rely on email and have accepted its benefits and drawbacks. But email can be much better than what most of us experience. In this episode, Rik Signes, CTO of Fastmail, helps us understand how we can better protect ourselves on the web––specifically as we use email. Fastmail is an email provider that guarantees total privacy over your information, offering better privacy with email aliases and custom addresses. They offer protection from tracking, data leaks, and spammers by providing alternative addresses that keep your main address private.
In this week's episode, we sit down with Eli Schwartz to discuss the power of search engine optimization. Schwartz is an SEO expert and consultant with more than a decade of experience working for leading B2B and B2C companies. His ability to demystify and navigate the SEO process has generated billions of dollars in revenue for some of the internet's top websites, including such clients as Shutterstock, WordPress, Blue Nile, Quora, and Zendesk. As head of SurveyMonkey's SEO team, Schwartz oversaw the company's global operations, helped launch the first Asia-Pacific office, and grew the company's organic search from just one percent of revenue to a key driver of global revenue. His work has been featured by TechCrunch, Entrepreneur.com, and Y Combinator, and he has given talks at business schools and keynote conferences around the world. His new book is [Product-Led SEO: The Why Behind Building Your Organic Growth Strategy](https://www.amazon.com/gp/product/B091D572ZL/ref=dbs_a_def_rwt_bibl_vppi_i0.)Learn more at [elischwartz.co](https://www.elischwartz.co/)
In this week's episode, we discuss how organizations can foster a “security culture” with Perry Carpenter, who currently serves as chief evangelist and strategy officer for KnowBe4 the world's most popular security awareness and simulated phishing platform. A recognized thought leader on security awareness and the human factors of security, he's provided security consulting and advisory services for the world's best-known brands. His previous book, Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors quickly gained a reputation as the go-to guide for security awareness professionals worldwide, and, in 2021, he was inducted into the Cybersecurity Canon Hall of Fame. He's the creator and host of the popular 8th Layer Insights podcast and co-author of the new book The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer .
What should you do with old devices? We discusses e-waste disposal and hardware security with John Shegerian, best-selling author and co-founder of ERI, the largest recycler of e-waste in the United States. You can find more information about ERI here. Shegerian's book, The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World, is available here.
In this week's episode, we discuss how businesses and users can “think like hackers” with Ted Harrington, author of Hackable: How to do Application Security Right and renowned “ethical hacker.”
In today's discussion, Horacio Zambrano, Chief Marketing Officer at Secret Double Octopus, tells us about the future of “passwordless,” and the future of user security and authentication. Want to learn more? You can check out today's featured guest at DoubleOctopus.com.
Seniors are reluctant to adopt to new tech and when they do they can be easy targets for hackers. In this episode of CYBER24, we sit down with cyber security expert and best-selling author Scott Schober to discuss how seniors can stay safe online.
DNS Security has remained stagnant for 30 years; in this episode, we sits down with John Todd, the general manager of Quad9—a company specializing in DNS security—to talk about the future of the protocol.
In this episode, we are joined by Daniel Schuyler, a cybersecurity expert, to discuss cyber warfare in the Russia-Ukraine conflict.
In this episode, we sit down with Dr. Sameer Patil, professor of computer science at the University of Utah. Widely published (and cited), Dr. Patil is an authority on cybersecurity and privacy. In this episode, he helps businesses and organizations to know how they can counter cybersecurity threats.
For most people, artificial intelligence is what companies use to serve us ads and learn more about us. But AI is supposed to be helpful to humans and make life better. In this episode of CYBER24, we sit down with Trung Tran, the founder and CEO of Amplio.ai. He has an interesting perspective on artificial intelligence and his company is working on a way to put it to good use for the employees first and from that help the company avoid burning people out.
Webcheck Security asked its key engineers and practitioners about cyber trends to watch out for in 2022. We get the inside scoop in this episode of CYBER24.Guest Expert: Greg Johnson, Webcheck Security
You hear the stories of data breaches and snippets of associated costs, but you may not be privy to ALL the costs of that cyber incident. What are the factors involved in data breach incidents and how can you prepare and assign a dollar value BEFORE something bad happens?PanelistsGreg Johnson, CEO, Webcheck Security
In this episode of CYBER24, presented by VLCM, we look at how tech is impacting the spy game, the spillover impacts on regular citizens from international cyber attacks and another round of congressional rumblings on antitrust tech bills. Guest Expert: Dan Schuyler from Nice CXone
There's rarely any good news for anyone hit with ransomware but in this episode of CYBER24, presented by VLCM, we look at how contacting law enforcement quickly can help you recover money paid to cybercriminals and how the authorities acted to put three hackers behind bars.PanelistsDan Schuyler, Nice CXone
There's no such thing as a cybersecurity silver bullet, but a virtual private network might be the closest thing. As incidents of cybercrime and ransomware continue to increase, more and more businesses are utilizing VPNs to solve problems before they happen.
The feds try to slow cybercrime by randomly seizing more funds collected by hackers. That comes as Congress looks to punish businesses that don't report cyber incidents. We take a closer look on this episode of the CYBER24 podcast, presented by VLCM.
Cybercrime is growing exponentially and private businesses, individuals and government can't seem to slow the growing threat. Now one tech giant is putting some serious cash into the fight and looking to upgrade government systems in the process. Will it make a difference? We discuss on this episode of the CYBER24 podcast, presented by VLCM.
Japan calls out bad cyber actors, the DOJ ditches carrots for sticks, ransomware isn't going anywhere and Twitch source code gets stolen. We cover it all on this week's episode of CYBER24, presented by VLCM.
This was a week Facebook won't soon forget and for all the wrong reasons. First, a whistleblower made allegations on 60 Minutes Sunday and before Congress later in the week that the social media giant incentivizes angry posts that cause division. And Monday Facebook, along with Instagram and Whatsapp were down for nearly six hours. But Facebook says the problem wasn't the result of an outside bad actor breaking through its security, but rather a self-inflicted wound. In this episode of CYBER24, presented by VLCM, we look into the issue and the fallout with Mike Hussey, the former CIO for the state of Utah.
In 2021, every business is an online business and that means you deal with risk. How strategically you manage that risk is critically important when there are cyber criminals who would love nothing more than to take you down for the money or just for the fun of it. In this episode of CYBER24, presented by VLCM, we discuss strategic risk management with Dr. Paul Godfrey, business professor, strategic risk management, and co-author of *Strategic Risk Management, New Tools for Competitive Advantage in an Uncertain Age.
Immediate response to being hit by hackers can send your head spinning and force you to overlook some important steps to take before the problem gets worse. In this episode of the CYBER24 podcast, presented by VLCM, we look at five steps you don't want to overlook when hit with ransomware. Plus, we look at the industries most frequently targeted by hackers.Guest ExpertMike Hussey, Utah Division of Technology Services
The recent data breach at T-Mobile exposed the personal data of 54 million people - not all of them customers of the nation's second-largest mobile carrier. Hackers didn't hit the company with ransomware but they are shopping for buyers for as much as $270,000 worth of bitcoin. As much as anything, the breach has raised serious questions about how much data businesses collect and keep, whether they need it or not, and whether or not it's worth the risk. Guest ExpertMike Hussey, Utah Division of Technology Services
Whenever you buy or sell something online you can bet there are cyber criminals who would love to hack that transaction. But just what are the risks related to eCommerce and what should your business do about them? We discuss it on this episode of the CYBER24 podcast, presented by VLCM.Guest ExpertMike Potter, CEO and Founder of Rewind
It's not just the frequency of cyber attacks that are on the rise, the cost of each of those attacks is up sharply and expected to surpass $10 billion worldwide within five years. In this episode of CYBER24, presented by VLCM, we discuss cyber-attack costs in dollars and more with Rewind CEO Mike Potter. Guest ExpertMike Potter, CEO and Founder of Rewind
Over the past several weeks, we've noted the sharp increase in the amount of money hackers are demanding in ransomware cases. Businesses seem to be taking note and they're upping the ante by shelling out big bucks for cyber talent. Guest ExpertMike Hussey, Utah Department of Technology Services
Legislators looking to fight back against cyber criminals consider prohibiting state and local law enforcement from paying ransom to hackers. They say making it known they won't negotiate will, ultimately, make them less of a target. But are they right? We discuss it in this episode of the CYBER24 podcast, presented by VLCM.Guest ExpertMike Hussey, Utah Division of Technology Services
In order to adequately protect your business, you need to know what kind of threats you face. In this episode of the CYBER24 podcast, presented by VLCM, we look at the importance of risk assessment as well as a military cybersecurity exercise being hosted right here in Utah.Guest Expert: Dan Schuyler, NICE
When your business is hit by hackers demanding a ransom to unlock your systems, you quickly realize you are in a desperate position. But, in addition to the immediate problem, you have a decision to make: do you pay the ransom and get back online or do you stand on principle? Lots of factors come into play but a new one has emerged recently, the potential tax advantages of paying up. We look at why mixed incentives are frustrating law enforcement and cybercrime victims in this episode of the CYBER24 podcast, presented by VLCM.Guest ExpertDan Schuyler, NIC
As the COVID-19 pandemic winds down, there are still concerns about people who do not get the vaccine and the potential they have to spread illness. One proposed way to get the vaccinated public back to normal life is by using a vaccine passport. The idea is simple: prove you've been vaccinated and you can travel, shop and recreate without any concerns. But for governments, healthcare providers and businesses, adding new, sensitive data comes with privacy and cybersecurity concerns. In this episode, we discuss the potential benefits and drawbacks of vaccine passports. Guest ExpertRob Shavell, CEO and Co-founder of Abine/DeleteMe
For years, cybercriminals have operated in a sweet spot. They have targeted businesses with the resources to pay the ransom but not the kind that has hurt the public at large. Over the past few months that seems to be changing. The Colonial pipeline attack sent gas prices skyrocketing and had people filling plastic bags with gasoline. The hack of JBS Meat caused food prices to increase. It begs the question: are hackers expanding their scope of the attack and will it finally put cybersecurity front and center for the general public?Guest Expert:Greg Johnson, Webcheck