Podcasts about Code42

American software company

  • 48PODCASTS
  • 131EPISODES
  • 30mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 25, 2025LATEST
Code42

POPULARITY

20172018201920202021202220232024


Best podcasts about Code42

Latest podcast episodes about Code42

Mac Admins Podcast
Episode 396: CrashPlan's Andrew Orrison talks Backup

Mac Admins Podcast

Play Episode Listen Later Jan 25, 2025 59:37


Andrew Orrison from CrashPlan joins the pod to talk about a couple topics: how they've moved to be their own organization from being part of Code42, and how they use the Mac Admins Slack as a way to support the community. Hosts: Tom Bridge - @tbridge@theinternet.social Marcus Ransom - @marcusransom Guests: Andrew Orrison - LinkedIn Links: Mac Admins Slack Vendor Guidelines Parablu acquisition Lady Washington (Ship) Sponsors: Kandji 1Password Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. Get the latest about the Mac Admins Podcast, follow us on Twitter! We're @MacAdmPodcast! The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson  

5 Year Frontier
#25: Cyber Attacks, AI Criminals, Deep Fakes, Data Shields, and the Future of Cybersecurity w/ Arctic Wolf CEO Nick Schneider

5 Year Frontier

Play Episode Listen Later Oct 15, 2024 37:41


The future of cybersecurity. In it we cover cybercriminal organizations, network effects of security, data as our biggest weapon, crypto's gift to bad actors and the threat of cyberwarfare. Nick Schneider is CEO of Arctic Wolf, one of the leading companies safeguarding the enterprise from cybersecurity threats. With a global presence and over 2,000 employees protecting more than 3,000 customers, they are a force in security operations. With an eye on going public, Arctic Wolf has been valued at over $4B calling KKR and Viking Global amongst its deep pocketed investors. Leading the company is Nick Schneider, a veteran in the security industry, Nick has developed expertise in creating best-of-breed technology platforms and sales organizations, which have been the driving force behind Arctic Wolf's explosive growth. Prior to Arctic Wolf, Nick led organizations at Dell and Code42. Of key interest to me is how Nick is deeply involved in being at the frontier of artificial intelligence's influence on cybersecurity — in particulate the dual role of AI, as both an enabler and inhibitor of cybercrime, which epitomizes the modern cybersecurity conundrum. Sign up for new podcasts and our newsletter, and email me on danieldarling@focal.vcSee omnystudio.com/listener for privacy information.

Paul's Security Weekly TV
Funding, Cato, Code42, DoS Robots, and Blackhat Prep - ESW #370

Paul's Security Weekly TV

Play Episode Listen Later Aug 3, 2024 51:43


This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denial of service robots All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-370

Enterprise Security Weekly (Video)
Funding, Cato, Code42, DoS Robots, and Blackhat Prep - ESW #370

Enterprise Security Weekly (Video)

Play Episode Listen Later Aug 3, 2024 51:43


This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denial of service robots All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-370

Digital Marketing Master
"Innovating Data Loss Protection" with Aida Kamber of Code42

Digital Marketing Master

Play Episode Listen Later Jul 10, 2024 11:16


In this episode of the Digital Marketing Master Archive Edition, host Sarah Morse sits down with Aida Kamber, current CMO and previous VP of Growth Marketing at Code42. Aida shares her expertise on protecting data from insiders, highlighting the importance of empathy and innovation in security marketing. She discusses the challenges of outdated technology, the significance of tech consolidation, and the strategies Code42 employs to build trust and community within the security industry. Tune in to learn valuable insights about the evolving landscape of digital security and effective growth marketing tactics.

The Security Podcast of Silicon Valley
Clea Ostendorf, CISO of Code42, Securing the Unseen: on the Frontlines of Data Protection

The Security Podcast of Silicon Valley

Play Episode Listen Later Jun 17, 2024 44:55


Welcome to a new episode of the Security Podcast in Silicon Valley, a YSecurity production, where we delve into the ever-evolving landscape of cybersecurity, with Clea Ostendorf, Field CISO at Code42, as our distinguished guest. Clea's journey from an aspiring diplomat to a front-runner in cybersecurity offers profound insights into her unique approach that is reshaping the realm of data protection. Join us as our host Jon McLachlan, a seasoned expert in the field, engages Clea in a deep dive into how she merges traditional security methods with the pressing challenges of today's digital world. Discover how Clea advocates for a collaborative security community and navigates the complex balance of work-life harmony in a demanding field. Tune in to uncover Clea's strategies for fostering a culture of security that supports growth and innovation while protecting against insider threats. This episode is a must-listen for anyone interested in the intersections of technology, security, and corporate culture.

Better Tech
Embracing Change: Building a Risk-Positive Culture in the Digital Age

Better Tech

Play Episode Listen Later Jun 12, 2024 20:42


In this episode of the BetterTech podcast, host Haseeb Khan interviews Beth Miller, Field CISO at Code42 and co-owner of Resilience Consulting Group. Beth discusses her 20-year career in cybersecurity, highlighting her transition from government roles to her current position. She emphasizes the importance of a proactive security culture and shares how Code42's tools, like Insider and Instructor, help manage risks effectively. Beth also addresses data security challenges in the age of AI and offers advice for those pursuing careers in cybersecurity. She underscores the value of integrating risk management into corporate culture and the critical role of continuous education. This episode provides insights into building a strong security culture and navigating modern cybersecurity challenges. --- Send in a voice message: https://podcasters.spotify.com/pod/show/bettertech/message

Security Unfiltered
Unlocking the Secrets of Effective Insider Threat Management With Joe Payne From Code42

Security Unfiltered

Play Episode Listen Later Mar 25, 2024 57:35 Transcription Available


From the fizz of soda pop to the buzz of cybersecurity – witness Joe's extraordinary journey through the tech landscape. Our latest podcast episode takes you through a narrative of unexpected career leaps and the critical role of intelligence in the digital age. Joe, a former soft drink enthusiast turned cybersecurity guru, shares tales from his early tech escapades to his pivotal role at iDefense, where his collaboration with government agencies like the NSA, painted a picture of a complex and ever-evolving cyber battleground.Unravel the twisted tale of Anthony Lewandowski's controversial departure from Google, highlighting the precarious nature of intellectual property and insider threats. This episode peels back the layers of corporate espionage, discussing how companies like Code 42 are at the vanguard of detecting unsanctioned data movement. We tackle the ethical quandaries posed by the race for innovation, where the lines between ownership and fair competition often blur. The discussion showcases the intricate work of safeguarding expansive AI datasets and the careful balance of advancing technology while maintaining integrity.Navigating the murky waters of data security, we dissect the nuanced approach required for managing insider threats. Balancing an investigative eye with the necessity for swift action, our conversation sheds light on how companies toe the line between education and enforcement. As we discuss the limitations of traditional DLP systems and the emerging prominence of cloud monitoring, you'll gain insight into how organizations are adapting to the challenges of ensuring data remains in the right hands – all while contending with the unforeseen risks AI platforms like ChatGPT might present to data security. Join us for an exploration into the strategies that fortify companies against the tides of insider threats.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today

Cybercrime Magazine Podcast
Security Nudge. Increasing Number Of Data Breaches Caused By Insiders. Sponsored By CybSafe.

Cybercrime Magazine Podcast

Play Episode Listen Later Mar 21, 2024 1:26


The number of data breaches caused by insiders has increased by 28% every month, on average, since 2021, CSO reports, with a Code42 survey of 700 cybersecurity practitioners finding that investigating such events is consuming three hours out of their every working day. Incidents may be accidental – for example, when data is stored in unmanaged cloud storage environments, or when software developers store source code in personal cloud repositories such as GitLab or GitHub – but the survey found that 55% of insider-driven data exposure, loss, leak, and theft events have been intentional. Surging use of generative AI platforms is a particular concern, with 92% of companies depending on genAI tools to compensate for cybersecurity skills shortages. The risk of insider-driven data leaks means companies must implement solutions to monitor and control the movement of company data across cloud and AI environments, with full visibility and controls to manage human risk. This 60-second "Security Nudge" is brought to you by CySafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com

The Top Entrepreneurs in Money, Marketing, Business and Life
He hit $120m in ARR Then Sold $70m Unit for $250m, Today His Secrurity SaaS is Cash Rich... whats next?

The Top Entrepreneurs in Money, Marketing, Business and Life

Play Episode Listen Later Nov 1, 2023 31:07


This security SaaS hit $120,000,000 revenue in 2022. Then they decided to sell a $70m business unit for $250m cash. Today they are cash rich with $50m in ARR. Who will the CEO acquire with all that cash? How fast will it take to get back to $100m in ARR?

Cloud Ace
Jadee Hanson: Balancing CISO, CIO, and Product Leadership

Cloud Ace

Play Episode Listen Later Oct 30, 2023 50:38


Jadee Hanson, CISO and CIO at Code42, shares how even as a kid she knew cybersecurity was her calling and how that led to CISO, CIO, and product leadership responsibilities.About Jadee Hanson: As chief information security officer and chief information officer at Code42, Jadee Hanson leads global risk and compliance, security operations, incident response, and insider threat monitoring and investigations. To her position, she brings more than 17 years of information security and a proven track record of building security programs.Prior to Code42, Jadee held a number of senior leadership roles in the security department of Target Corporation, where she implemented key programs, including spearheaded the effort to embed security resources into the development process as well as the security plans behind the acquisition of software development and online retail companies. She was the security lead for the sale of Target Pharmacies to CVS Health. Before joining Target, Jadee worked at Deloitte, where she served as a security consultant for companies across diverse industries such as healthcare, manufacturing energy, retail and more.Jadee is a co-author of Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore, which shines a light on Insider Risk and details what business and security leaders can do to keep their workforces productive and data protected.In addition to her day job at Code42, Jadee is the founder and CEO of the non-profit organization Building Without Borders, which serves those in poverty-stricken areas throughout the world through housing services. Since April 2015, Building Without Borders has built 39 houses in areas of the Dominican Republic. In her spare time, you can find Jadee working for her non-profit, enjoying time with her husband and three girls, and spending time on the lake.SPONSER NOTE: Support for Cloud Ace podcast comes from SANS Institute. If you like the topics covered in this podcast and would like to learn more about cloud security, SANS Cloud Security curriculum is here to support your journey into building, deploying, and managing secure cloud infrastructure, platforms, and applications. Whether you are on a technical flight plan, or a leadership one, SANS Cloud Security curriculum has resources, training, and certifications to fit your needs. Focus on where the cloud is going, not where it is today. Your organization is going to need someone with hands-on technical experience and cloud security-specific knowledge. You will be prepared not only for your current role, but also for a cutting-edge future in cloud security. Review and Download Cloud Security Resources: sans.org/cloud-security/ Join our growing and diverse community of cloud security professionals on your platform of choice: Discord | Twitter | LinkedIn | YouTube

Defense in Depth
How to Create a Positive Security Culture

Defense in Depth

Play Episode Listen Later Jun 15, 2023 30:59


All links and images for this episode can be found on CISO Series. How do you create a positive security culture? It's rarely the first concept anyone wants to embrace, yet it's important everyone understands their responsibility. So what do you do, and how do you overcome inevitable roadblocks? Check out this post and this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. We welcome our sponsored guest, Jadee Hanson, CISO/CIO for Code42. Thanks to our podcast sponsor, Code42 Code42 is focused on delivering solutions built with the modern-day collaborative culture in mind. Code42 Incydr tracks activity across computers, USB, email, file link sharing, Airdrop, the cloud and more, our SaaS-based solution surfaces and prioritizes file exposure and data exfiltration events. Learn more at Code42.com. In this episode: How do you create a positive security culture? Where do we run into struggles when trying to create a positive security culture? Given its importance, why is it rarely the first concept anyone wants to embrace? What do you do, and how do you overcome inevitable roadblocks?

Cybercrime Magazine Podcast
Cybersecurity Elevator Pitch: Incydr. A Code42 Product.

Cybercrime Magazine Podcast

Play Episode Listen Later May 23, 2023 1:03


A software-as-a-service solution built on an extensible cloud architecture, Incydr empowers security teams to regain control over the data leaving their organization while fostering secure work habits, all without exhausting valuable resources. Its user-friendly interface and automated workflows streamline the entire process, facilitating efficient detection and response to insider risks. Visit https://code42.com for more information.

Paul's Security Weekly TV
Insider Risk and Choosing the Right MSSP: A CISO's Guide - BSW #305

Paul's Security Weekly TV

Play Episode Listen Later May 9, 2023 31:05


A resilient cybersecurity strategy is essential to running your business while protecting against security threats and preventing data breaches. For CISOs, partnering with a managed service security provider (MSSP) means you can be in control of your organization's information and infrastructure security without placing a strain on internal personnel or resources which is critical in today's uncertain economy. With an MSSP on board, CISOs are better equipped to meet strategic and business goals, while improving operations and reducing expenses. This interview will discuss not only why to consider an MSSP but how to choose the right one for the job. This segment is sponsored by Direct Defense. Visit https://securityweekly.com/directdefensersac to learn more about them!   Insider Risk is a problem that continues to grow - and that companies are still struggling to solve. CISOs state that it is the number one most difficult threat to detect, placing it over malware and ransomware. Code42 President and CEO Joe Payne will explain why the Insider Risk problem is so challenging and will offer guidance on how to solve it. This segment is sponsored by Code42. Visit https://securityweekly.com/code42rsac to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw305 

Paul's Security Weekly
BSW #305 - Alla Valente, Joe Payne, Jim Broome, Cody Scott

Paul's Security Weekly

Play Episode Listen Later May 8, 2023 64:52


Each year, Forrester tracks the top systemic risks — external events that impact your firm and customers but are out of your control — facing organizations. The impacts of climate change are both short-term, in the form of severe weather, drought, and heat waves, and long-term, in the form of biodiversity loss, sea-level rise, and rising temperatures. Want to see where climate risk ranked on the list? Read The Top Systemic Risks, 2023 (https://www.forrester.com/report/the-top-systemic-risks-2023/RES179156) or listen to this segment on Business Security Weekly.   A resilient cybersecurity strategy is essential to running your business while protecting against security threats and preventing data breaches. For CISOs, partnering with a managed service security provider (MSSP) means you can be in control of your organization's information and infrastructure security without placing a strain on internal personnel or resources which is critical in today's uncertain economy. With an MSSP on board, CISOs are better equipped to meet strategic and business goals, while improving operations and reducing expenses. This interview will discuss not only why to consider an MSSP but how to choose the right one for the job. This segment is sponsored by Direct Defense. Visit https://securityweekly.com/directdefensersac to learn more about them!   Insider Risk is a problem that continues to grow - and that companies are still struggling to solve. CISOs state that it is the number one most difficult threat to detect, placing it over malware and ransomware. Code42 President and CEO Joe Payne will explain why the Insider Risk problem is so challenging and will offer guidance on how to solve it. This segment is sponsored by Code42. Visit https://securityweekly.com/code42rsac to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/bsw305 

Business Security Weekly (Audio)
BSW #305 - Alla Valente, Joe Payne, Jim Broome, Cody Scott

Business Security Weekly (Audio)

Play Episode Listen Later May 8, 2023 64:52


Each year, Forrester tracks the top systemic risks — external events that impact your firm and customers but are out of your control — facing organizations. The impacts of climate change are both short-term, in the form of severe weather, drought, and heat waves, and long-term, in the form of biodiversity loss, sea-level rise, and rising temperatures. Want to see where climate risk ranked on the list? Read The Top Systemic Risks, 2023 (https://www.forrester.com/report/the-top-systemic-risks-2023/RES179156) or listen to this segment on Business Security Weekly.   A resilient cybersecurity strategy is essential to running your business while protecting against security threats and preventing data breaches. For CISOs, partnering with a managed service security provider (MSSP) means you can be in control of your organization's information and infrastructure security without placing a strain on internal personnel or resources which is critical in today's uncertain economy. With an MSSP on board, CISOs are better equipped to meet strategic and business goals, while improving operations and reducing expenses. This interview will discuss not only why to consider an MSSP but how to choose the right one for the job. This segment is sponsored by Direct Defense. Visit https://securityweekly.com/directdefensersac to learn more about them!   Insider Risk is a problem that continues to grow - and that companies are still struggling to solve. CISOs state that it is the number one most difficult threat to detect, placing it over malware and ransomware. Code42 President and CEO Joe Payne will explain why the Insider Risk problem is so challenging and will offer guidance on how to solve it. This segment is sponsored by Code42. Visit https://securityweekly.com/code42rsac to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/bsw305 

Defense in Depth
How Should Security Vendors Engage With CISOs?

Defense in Depth

Play Episode Listen Later May 4, 2023 37:14


All links and images for this episode can be found on CISO Series. One CISO has had enough of the security vendor marketing emails and cold sales calls. He's blocking them all. But it's not a call to avoid all salespeople. He just doesn't have the time to be a target anymore. So how should vendors engage with such a CISO? And does CISO represent most CISOs today? Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. We welcome our sponsored guest Joy Forsythe, VP, Security, Thrive Global. Thanks to our podcast sponsor, Code42 Code42 is focused on delivering solutions built with the modern-day collaborative culture in mind. Code42 Incydr tracks activity across computers, USB, email, file link sharing, Airdrop, the cloud and more, our SaaS-based solution surfaces and prioritizes file exposure and data exfiltration events. Learn more at Code42.com. In this episode: How should vendors engage with CISOs who are tired of being targeted? How can vendors reach CISOs who have had enough of the security vendor marketing emails and cold sales calls? Does CISO represent most CISOs today? Is the sales "system" essentially broken?

People make it possible
No Fear Mentality | with Kristin Dean (Arctic Wolf)

People make it possible

Play Episode Listen Later Apr 26, 2023 31:33


“Live with being kind and working hard. Everything works out when you do that, take risks, and work without fear.” -Kristin Dean Kristin Dean left her full-time role in HR to pursue her dream of being a stay-at-home mom. After a many valuable years, Kristin desired to return to work, but she internalized the fear of not being able to have both a successful career and a strong present role as a mother.  Eventually, Kristin made the choice to dive back into her career at a few fast-paced tech companies such as Code42, Delegate, and Revel,  eventually landing at Arctic Wolf—where she's been for the past 5 years. She speaks about the supportive environment of her team, and gives tips for how HR professional can be strategic business partners with executive leadership. Learn about tools for  effective leadership, developing the will to win, and making choices without fear in this episode of People make it possible. Connect with KristinConnect with Versique

Cloud Security Reinvented
Jadee Hanson, CISO at Code42 – Using Cloud Security to Flex Your Adaptability Muscle

Cloud Security Reinvented

Play Episode Listen Later Dec 1, 2022 20:16


Cloud Security Reinvented
Jadee Hanson, CISO at Code42 – Using Cloud Security to Flex Your Adaptability Muscle

Cloud Security Reinvented

Play Episode Listen Later Dec 1, 2022 20:37


Risky Business
Snake Oilers: Tines, Code42 and Kroll

Risky Business

Play Episode Listen Later Oct 14, 2022 Very Popular


Snake Oilers isn't our regular weekly podcast, it's a wholly sponsored series we do at Risky.Biz where vendors come on to the show to pitch their products to you, the Risky Business listener. To be clear – everyone you hear in one of these editions, paid to be here. We'll hear from three vendors in this edition of Snake Oilers: Tines, the no code security automation solution that people are going absolutely nuts over Code42, the insider threat detection solution maker Kroll talks about its MDR offering

Risky Business
Snake Oilers: Tines, Code42 and Kroll

Risky Business

Play Episode Listen Later Oct 14, 2022 37:59


Snake Oilers isn't our regular weekly podcast, it's a wholly sponsored series we do at Risky.Biz where vendors come on to the show to pitch their products to you, the Risky Business listener. To be clear – everyone you hear in one of these editions, paid to be here. We'll hear from three vendors in this edition of Snake Oilers: Tines, the no code security automation solution that people are going absolutely nuts over Code42, the insider threat detection solution maker Kroll talks about its MDR offering

Cybercrime Magazine Podcast
Inside Jobs. Automation & Empathy. Austin Wolf, Code42.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 11, 2022 11:08


In this episode of Inside Jobs, host Hillarie McClure is joined by Austin Wolf, Staff Information Security Analyst at Code42, to discuss automation and empathy, including how a security leader can begin implementing automation within their insider risk response, and more. Code42 is defining data security standards for the hybrid workforce. As the needs of workforces have evolved, so has Code42's data security and insider risk management solutions. To learn more about our sponsor, visit https://code42.com/

Cybercrime Magazine Podcast
Inside Jobs. Conducting An Insider Risk Investigation - Lead With Empathy. Austin Wolf, Code42.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 27, 2022 12:51


In this episode of Inside Jobs, host Hillarie McClure is joined by Austin Wolf, Staff Information Security Analyst at Code42, to discuss how to conduct an insider risk investigation when leading with empathy, what makes this approach unique and more successful, and more. Code42 is defining data security standards for the hybrid workforce. As the needs of workforces have evolved, so has Code42's data security and insider risk management solutions. To learn more about our sponsor, visit https://code42.com/

The CyberWire
GRU operators masquerade as Ukrainian telecommunications providers. 2K Games Support compromised to spread malware. Developments in the cyber underworld.

The CyberWire

Play Episode Listen Later Sep 22, 2022 35:03 Very Popular


GRU operators masquerade as Ukrainian telecommunications providers. Another video game maker is compromised to spread malware. Noberus may be a successor to Darkside and BlackMatter ransomware. Robert M. Lee from Dragos explains Crown Jewel analysis. Our guest is Nathan Hunstad from Code42 with thoughts on insider risk events. Threat actors have their insider threats, too. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/183 Selected reading. Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine (Recorded Future) Russian Cyberspies Targeting Ukraine Pose as Telecoms Providers (SecurityWeek) Shadowy Russian Cell Phone Companies Are Cropping Up in Ukraine (WIRED) CISA Alert AA22-264A – Iranian state actors conduct cyber operations against the government of Albania. (CyberWire) Iranian State Actors Conduct Cyber Operations Against the Government of Albania (CISA) 2K Games says hacked help desk targeted players with malware (BleepingComputer) 2K Games helpdesk hacked to spread malware to players (TechRadar) Rockstar parent company hacked again as 2K Support sends users malware (Dexerto) ‘Grand Theft Auto VI' leak is Rockstar's nightmare, YouTubers' dream (Washington Post) Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics (Symantec)  LockBit ransomware builder leaked online by “angry developer” (BleepingComputer) 

Cybercrime Magazine Podcast
Inside Jobs. Developing An Empathetic Mindset For Insider Risk Analysts. Chrysa Freeman, Code42.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 13, 2022 12:36


In this episode of Inside Jobs, host Hillarie McClure is joined by Chrysa Freeman, Senior Security Instructional Content Designer at Code42, to discuss the approach to empathetic investigations, how to develop an empathetic mindset, and why it helps insider risk analysts. Code42 is defining data security standards for the hybrid workforce. As the needs of workforces have evolved, so has Code42's data security and insider risk management solutions. To learn more about our sponsor, visit https://code42.com/

Cyber Security Headlines
Fed agency supply chain tips, Apple lawsuit settlement, Neopets 18 month hack

Cyber Security Headlines

Play Episode Listen Later Sep 2, 2022 7:37 Very Popular


Federal agencies share supply chain security tips Apple settles lawsuit with developer over App Store rejections and scams Hackers were inside Neopets systems for 18 months Thanks to today's episode sponsor, Code42 It's not just about the data leaving your company - what about the data coming in? Along with departing employees, new talent is also actively joining your organization. This poses cybersecurity challenges since they could be knowingly or unknowingly bringing data from their former company into your network. Code42 Incydr is an Insider Risk Management SaaS that provides a comprehensive understanding of your data exposure and shows which activities require security intervention. Learn more at Code42.com/showme. For the stories behind the headlines, head to CISOseries.com

Cyber Security Headlines
Google Translate malware, White House aviation briefing, book distributor ransomed

Cyber Security Headlines

Play Episode Listen Later Aug 31, 2022 7:23 Very Popular


Google Translate app is actually Windows crypto-mining malware White House to give aviation executives classified cyberthreat briefing Book distributor Baker & Taylor hit by ransomware Thanks to our episode sponsor, Code42 Cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data from exposure, leak and theft. In fact, the Code42 Annual Data Exposure Report revealed there's a 1 in 3 chance that your company will lose IP when an employee quits. To learn more about stopping data leaks with Insider Risk Management visit Code42.com/showme. For the stories behind the headlines, head to CISOseries.com.  

Cyber Security Headlines
Log4Shell Hits Israel, Russian cyberattacks on Montenegro, AlphaBay Turns 1

Cyber Security Headlines

Play Episode Listen Later Aug 30, 2022 6:07 Very Popular


Microsoft warns Iranians using Log4Shell Montenegro hit with Russian cyberattacks AlphaBay Turns 1 Thanks to this week's episode sponsor, Code42 Have you been thinking about launching an Insider Risk Management program? You don't need to be Big Brother to effectively address Insider Risk. Code42 believes that the Three Es should define any IRM program: expertise, education, and enforcement. Shift your security culture from “watchdog” to “guide dog” and everyone wins. Learn more at Code42.com/showme.

Cyber Security Headlines
Hackers breach LastPass, new Agenda ransomware, Facebook Cambridge settlement

Cyber Security Headlines

Play Episode Listen Later Aug 29, 2022 7:48 Very Popular


Hackers breach LastPass developer system to steal source code New Agenda ransomware appears in the threat landscape Facebook-Cambridge Analytica data breach lawsuit ends in 11th hour settlement Thanks to this week's episode sponsor, Code42 It's not just about the data leaving your company - what about the data coming in? Along with departing employees, new talent is also actively joining your organization. This poses cybersecurity challenges since they could be knowingly or unknowingly bringing data from their former company into your network. Code42 Incydr is an Insider Risk Management SaaS that provides a comprehensive understanding of your data exposure and shows which activities require security intervention. Learn more at Code42.com/showme. For the stories behind the headlines, head to CISOseries.com.  

Cyber Security Headlines
North Korea at BlackHat, Ransomware attacks jump, Pentagon software requirements

Cyber Security Headlines

Play Episode Listen Later Aug 26, 2022 8:01 Very Popular


North Korean malware present at Black Hat Ransomware attacks jump as new malware strains proliferate Pentagon may require flaw-free software Thanks to today's episode sponsor, Code42 It's not just about the data leaving your company - what about the data coming in? Along with departing employees, new talent is also actively joining your organization. This poses cybersecurity challenges since they could be knowingly or unknowingly bringing data from their former company into your network. Code42 Incydr is an Insider Risk Management SaaS that provides a comprehensive understanding of your data exposure and shows which activities require security intervention. Learn more at Code42.com/showme For the stories behind the headlines, head to CISOseries.com.   

Cyber Security Headlines
Twitter ex-security chief whistleblower, Ukraine and Poland join forces, Binance deepfake scam

Cyber Security Headlines

Play Episode Listen Later Aug 24, 2022 7:46 Very Popular


Ex-security chief accuses Twitter of cybersecurity negligence Ukraine and Poland join forces to counter Russian cyberattacks Hackers use Binance exec deepfake in crypto exchange scam Thanks to today's episode sponsor, Code42 Cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data from exposure, leak and theft. In fact, the Code42 Annual Data Exposure Report revealed there's a 1 in 3 chance that your company will lose IP when an employee quits. To learn more about stopping data leaks with Insider Risk Management visit Code42.com/showme. For the stories behind the headlines, head over to CISOseries.com

Cyber Security Headlines
State-backed attacks not insured, LockBit hit with DDoS, Cozy Bear gets around MFA

Cyber Security Headlines

Play Episode Listen Later Aug 23, 2022 6:07 Very Popular


State-backed attacks excluded from cyber insurance LockBit hit with DDoS Cozy Bear using Microsoft accounts to bypass MFA Thanks to today's episode sponsor, Code42 Have you been thinking about launching an Insider Risk Management program? You don't need to be Big Brother to effectively address Insider Risk. Code42 believes that the Three Es should define any IRM program: expertise, education, and enforcement. Shift your security culture from “watchdog” to “guide dog” and everyone wins. Learn more at Code42.com/showme.

Cyber Security Headlines
Urgent iPhone update, ZIP password fault, Hacking decommissioned satellites

Cyber Security Headlines

Play Episode Listen Later Aug 22, 2022 7:28 Very Popular


iPhone users urged to update to patch 2 zero-days Encrypted ZIP files can have two correct passwords White hat hackers broadcast through decommissioned satellite Thanks to today's episode sponsor, Code42 It's not just about the data leaving your company - what about the data coming in? Along with departing employees, new talent is also actively joining your organization. This poses cybersecurity challenges since they could be knowingly or unknowingly bringing data from their former company into your network. Code42 Incydr is an Insider Risk Management SaaS that provides a comprehensive understanding of your data exposure and shows which activities require security intervention. Learn more at Code42.com/showme For the stories behind the headlines, head to CISOseries.com.  

Cybercrime Magazine Podcast
Inside Jobs. Turning Employees Into A Risk-Reduction Strategy. Abhik Mitra, Code42.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 9, 2022 10:03


In this episode of Inside Jobs, Abhik Mitra, Head of Portfolio Strategy at Code42, joins host Hillarie McClure to discuss how an organization can turn their employees into a risk reduction strategy, as well as insider breaches, how security leaders can help their organization's mindset shift away from people to technology, and more. As the needs of workforces have evolved, so has Code42's data security and insider risk management solutions. To learn more about our sponsor, visit https://code42.com

The CyberWire
Cybercriminals shift tactics from disruption to data leaks. [CyberWire-X]

The CyberWire

Play Episode Listen Later Jul 17, 2022 28:41 Very Popular


On this episode of CyberWire-X, we examine double extortion ransomware. The large-scale cyber events of yesterday – Stuxnet, the Ukraine Power Grid Attack – were primarily focused on disruption. Cybercriminals soon shifted to ransomware with disruption still the key focus – and then took things to the next level with Double Extortion Ransomware. When ransomware first started to take off as the attack method of choice around 2015, the hacker playbook was focused on encrypting data, requesting payment and then handing over the encryption keys. Their methods escalated with Double Extortion, stealing data as well as encrypting it - and threatening to leak data if they don't receive payment. We've seen with ransomware groups like Maze that they will follow through with publishing private information if not paid. In the first part of the show, Rick Howard, the CyberWire's CSO, Chief Analyst, and Senior Fellow, talks with Wayne Moore, Simply Business' CISO and CyberWire Hash Table member, and, in the second half of the show, the CyberWire's podcast host Dave Bittner talks with Nathan Hunstad, episode sponsor Code42's Deputy CISO. They discuss how classic ransomware protection such as offsite backups are no longer enough. They explain that Double Extortion means that you need to understand what data has been stolen and weigh the cost of paying with the cost of your data going public.

Paul's Security Weekly
ESW #277 - Chris Cleveland, Matt Mosely, Gianna Whitver, and Joe Payne

Paul's Security Weekly

Play Episode Listen Later Jul 12, 2022 134:01


This week, in the Enterprise News: Vanta raises a $110M Series B to automate SOC 2, ISO, PCI and other compliance efforts Immuta raises a $100M Series E for secure data access (an everything-old-is-new-again market that's exploding) Perimeter 81 raises $100M Series C and becomes a unicorn - You get a VPN! I get a VPN! Everyone gets a VPN! Over a dozen other vendors raise funding! IBM acquires EASM vendor, Randori Another Azure vulnerability allowing tenancy escapes Microsoft's Purview goes beyond DLP and gets into the pre-crime business Half a dozen cybersecurity vendor layoff announcements! We discuss the controversy around Rob Lee's involvement with developing federal standards for critical infrastructure protection and we say farewell (and good riddance) to Internet Explorer… but not really Then, after the news, we're going to air some segments recorded at the RSA conference last week.   We will cover high level winning strategies in cybersecurity marketing. The do's and don'ts for our specific industry and key factors of success in a go to market strategy. Segment Resources: https://cybersecuritymarketingsociety.com/podcast/ https://insight.cybersecuritymarketingsociety.com/survey2021?_gl=1*1wcqhp6*_ga*MTg4ODExOTY2Ny4xNjU0MTc1NDM3*_ga_GS9X0J5FZC*MTY1NDE3NTQzNi4xLjEuMTY1NDE3NTU3MC4w&_ga=2.81844830.933834121.1654175437-1888119667.1654175437   Two important shifts over the last two years transformed what we once knew as an on-premise ecosystem into a global system accessible from anywhere. One is remote work, which began as a temporary measure to get us through the early days of the pandemic and has since become the norm. The other is cloud adoption, which was mainstream even before the pandemic, but has seen another bump in the last two years. As a result, the internet has become the new corporate network. Where do we go from here? This segment is sponsored by Perimeter 81. Visit https://securityweekly.com/perimeter81 to learn more about them!   Phishing attacks are increasingly focused on new vectors such as social media, business collaboration apps, and text messages. These vectors generally lack any protection for the end user. How can we protect against these attacks that are increasingly leading to costly breaches? This segment is sponsored by Pixm. Visit https://securityweekly.com/pixm to learn more about them!   Employee turnover is the biggest threat to any organization's IP. Nearly 60% of employees move to a new company within similar fields (think: competitors) and are using collaboration technology to take sensitive data at an alarming rate. Code42's Joe Payne will discuss how Insider Risk Management addresses data loss in a volatile job market while still enabling collaboration. This segment is sponsored by Code42. Visit https://securityweekly.com/code42 to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw277

Enterprise Security Weekly (Audio)
ESW #277 - Chris Cleveland, Matt Mosely, Gianna Whitver, and Joe Payne

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jul 12, 2022 134:01


This week, in the Enterprise News: Vanta raises a $110M Series B to automate SOC 2, ISO, PCI and other compliance efforts Immuta raises a $100M Series E for secure data access (an everything-old-is-new-again market that's exploding) Perimeter 81 raises $100M Series C and becomes a unicorn - You get a VPN! I get a VPN! Everyone gets a VPN! Over a dozen other vendors raise funding! IBM acquires EASM vendor, Randori Another Azure vulnerability allowing tenancy escapes Microsoft's Purview goes beyond DLP and gets into the pre-crime business Half a dozen cybersecurity vendor layoff announcements! We discuss the controversy around Rob Lee's involvement with developing federal standards for critical infrastructure protection and we say farewell (and good riddance) to Internet Explorer… but not really Then, after the news, we're going to air some segments recorded at the RSA conference last week.   We will cover high level winning strategies in cybersecurity marketing. The do's and don'ts for our specific industry and key factors of success in a go to market strategy. Segment Resources: https://cybersecuritymarketingsociety.com/podcast/ https://insight.cybersecuritymarketingsociety.com/survey2021?_gl=1*1wcqhp6*_ga*MTg4ODExOTY2Ny4xNjU0MTc1NDM3*_ga_GS9X0J5FZC*MTY1NDE3NTQzNi4xLjEuMTY1NDE3NTU3MC4w&_ga=2.81844830.933834121.1654175437-1888119667.1654175437   Two important shifts over the last two years transformed what we once knew as an on-premise ecosystem into a global system accessible from anywhere. One is remote work, which began as a temporary measure to get us through the early days of the pandemic and has since become the norm. The other is cloud adoption, which was mainstream even before the pandemic, but has seen another bump in the last two years. As a result, the internet has become the new corporate network. Where do we go from here? This segment is sponsored by Perimeter 81. Visit https://securityweekly.com/perimeter81 to learn more about them!   Phishing attacks are increasingly focused on new vectors such as social media, business collaboration apps, and text messages. These vectors generally lack any protection for the end user. How can we protect against these attacks that are increasingly leading to costly breaches? This segment is sponsored by Pixm. Visit https://securityweekly.com/pixm to learn more about them!   Employee turnover is the biggest threat to any organization's IP. Nearly 60% of employees move to a new company within similar fields (think: competitors) and are using collaboration technology to take sensitive data at an alarming rate. Code42's Joe Payne will discuss how Insider Risk Management addresses data loss in a volatile job market while still enabling collaboration. This segment is sponsored by Code42. Visit https://securityweekly.com/code42 to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw277

Cybercrime Magazine Podcast
Inside Jobs. Everyone Has A Say In Mitigating & Reducing Risk. Abhik Mitra, Code42.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 12, 2022 12:34


In this episode of Inside Jobs, Abhik Mitra, Head of Portfolio Strategy at Code42, joins host Hillarie McClure to discuss how everyone has a say in mitigating and reducing risk, including the various stakeholders within insider risk management, the necessary framework, and more. Code42 is defining data security standards for the hybrid workforce. As the needs of workforces have evolved, so has Code42's data security and insider risk management solutions. To learn more about our sponsor, visit https://code42.com

Cybercrime Magazine Podcast
Inside Jobs. How GRC & Security Can Partner to Reduce Insider Risk. Abhik Mitra, Code42.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 28, 2022 8:48


In this episode of Inside Jobs, Abhik Mitra, Head of Portfolio Strategy at Code42, joins host Hillarie McClure to discuss how GRC and security can partner to reduce insider risk, as well as what a government-first approach is, why it's important, and more. Code42 is defining data security standards for the hybrid workforce. As the needs of workforces have evolved, so has Code42's data security and insider risk management solutions. To learn more about our sponsor, visit https://code42.com

Paul's Security Weekly TV
The Evolving Phishing Threat & Protect Valuable Data as Workforce Volatility Rages - ESW #277

Paul's Security Weekly TV

Play Episode Listen Later Jun 18, 2022 33:11


Phishing attacks are increasingly focused on new vectors such as social media, business collaboration apps, and text messages. These vectors generally lack any protection for the end user. How can we protect against these attacks that are increasingly leading to costly breaches? This segment is sponsored by Pixm. Visit https://securityweekly.com/pixm to learn more about them!   Employee turnover is the biggest threat to any organization's IP. Nearly 60% of employees move to a new company within similar fields (think: competitors) and are using collaboration technology to take sensitive data at an alarming rate. Code42's Joe Payne will discuss how Insider Risk Management addresses data loss in a volatile job market while still enabling collaboration. This segment is sponsored by Code42. Visit https://securityweekly.com/code42 to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw277

Hacking Humans
The great resignation and data exposure challenges

Hacking Humans

Play Episode Listen Later Jun 16, 2022 51:53


Abhik Mitra, Head of Portfolio Strategy at Code42, shares the findings on Code 42's 2022 Data Exposure Report (DER). Joe breaks down a story that follows a couple in Westlake, where the woman was called about a supposed warrant out for her arrest, and how she was told that she needs to provide thousands of dollars in order for the police to not come and arrest her. The story describes how her fast-thinking husband was able to figure out the scam and get in touch with real authorities. Dave's story delves into Facebook and a phishing scam that ended in a threat actor stealing 1M credentials in 4 months. Our catch of the day comes from listener William who received an email about a new laptop that he supposedly bought through PayPal. He shares why he knew it was a scheme right away, and hopes to make this information known so others know what to look out for. Links to stories: Westlake doctor and lawyer avoid telephone scam; police warn residents to be alert Phishing tactics: how a threat actor stole 1M credentials in 4 months Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitte

CISO-Security Vendor Relationship Podcast
I Have So Little. Just Let Me Control Access to the Mail Server.

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Jun 14, 2022 40:17


All links and images for this episode can be found on CISO Series How dangerous is it for a cybersecurity professional to pull a G-d complex with the email server just because they didn't like the way one salesperson behaved? This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our sponsored guest is Jadee Hanson (@jadeehanson), CIO/CISO, Code42. Thanks to our podcast sponsor, Code42. As the Insider Risk Management leader, Code42 helps security professionals protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. For security practitioners, it means speed to detection and response. For companies, it means a collaborative workforce that is productive and a business that is secure. Visit http://Code42.com/showme to learn more. In this episode: Is it alright to block a vendor because one salesperson is persistent and annoying? How can one go about creating a cybersecurity report card? Is it just inevitable that your staff is going to eventually violate policies? How to determine a delicate balance between a complete non-tolerance policy versus complete tolerance?

mail server code42 insider risk management ciso series
Cybercrime Magazine Podcast
Inside Jobs. Casting A Light On Unknown Risk. Abhik Mitra, Head of Portfolio Strategy, Code42.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 14, 2022 12:48


In this episode of Inside Jobs, Abhik Mitra, Head of Portfolio Strategy at Code42, joins host Hillarie McClure to discuss how GRC and security, when combined, can cast a light on unknown risk, how security teams can help, and more. Code42 is defining data security standards for the hybrid workforce. As the needs of workforces have evolved, so has Code42's data security and insider risk management solutions. To learn more about our sponsor, visit https://code42.com/

Cybercrime Magazine Podcast
Inside Jobs. Bridging The GRC & Security Gap. Abhik Mitra, Head of Portfolio Strategy, Code42.

Cybercrime Magazine Podcast

Play Episode Listen Later May 24, 2022 12:54


In this episode of Inside Jobs, Abhik Mitra, Head of Portfolio Strategy at Code42, joins host Hillarie McClure to discuss the decades-old gap between the Governance, Risk and Compliance (GRC) committee and security, how we can bridge this gap, where Insider Risk Management can step in and help, and more. Code42 is defining data security standards for the hybrid workforce. As the needs of workforces have evolved, so has Code42's data security and insider risk management solutions. To learn more about our sponsor, visit https://code42.com/

CISO-Security Vendor Relationship Podcast
A Look Back at Foolish Security Policies of Past and Present

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later May 17, 2022 39:57


All links and images for this episode can be found on CISO Series Are bad security policies of yesteryear just because we didn't know any better at the time, or were they some bozos idea of legitimate security yet the rest of us knew it was just security theater? This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our guest is Dr. Diane M Janosek (@dm_janosek), deputy director of compliance, NSA and senior legal advisor for Women in Cybersecurity. Thanks to our podcast sponsor, Code42 As the Insider Risk Management leader, Code42 helps security professionals protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. For security practitioners, it means speed to detection and response. For companies, it means a collaborative workforce that is productive and a business that is secure. Visit http://Code42.com/showme to learn more. In this episode: We highlight obsolete security policies to steer clear of. We examine security in space and how can others who are not directly involved in these industries create some type of positive impact? And we ask how we can improve inclusion by decrypting the lack of diversity in our industry.

CISO-Security Vendor Relationship Podcast
Is It a Promotion or a Red Flag Telling You To Get Out?

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Apr 26, 2022 39:41


All links and images for this episode can be found on CISO Series A young woman is killing it in her first cybersecurity job out of college. Management is so thrilled with her that they want to give her a promotion. Problem is the promotion reveals a lot of other innerworkings that don't speak well of the company's culture. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Davi Ottenheimer (@daviottenheimer), vp trust and digital ethics, Inrupt. Thanks to our podcast sponsor, Code42 As the Insider Risk Management leader, Code42 helps security professionals protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. For security practitioners, it means speed to detection and response. For companies, it means a collaborative workforce that is productive and a business that is secure. Visit http://Code42.com/showme to learn more. In this episode: A student has some serious privacy concerns when they learn that "all data is being monitored and anonymously collected." We examine how we can break from the Internet Oligarchs who appear to be consuming, selling, and using so much of our data. How GDPR can benefit organizations to stay ahead of the competition. A young recruit facing imposter syndrome after receiving a promotion with added responsibilities.

management promotion red flags gdpr mike johnson inrupt david spark code42 davi ottenheimer insider risk management ciso series
The Cyber Ranch Podcast
”Playing Well With Others” - The Tech Stack w/ Tommy Todd

The Cyber Ranch Podcast

Play Episode Listen Later Apr 20, 2022 33:11


Allan is joined by the Vice President of Security at Code42, Tommy Todd, to talk about how the tech stack can “play well with others”. In this episode, Tommy takes a deep dive into exploring how APIs and automation can help solve our needs in cybersecurity – from incident response to the tech stack. The two discuss how to evaluate security products during a Proof Of Concept (POC) for integration capabilities and tips on addressing ROI concerns.   Guest Bio: Tommy Todd has over 20 years of cybersecurity experience, primarily focused on data privacy and data protection strategies. Prior to Code42, he served in security roles at Symantec, Ionic Security, and Optiv as well as many other firms. Throughout his career, he has acted as a leader, mentor, engineer, architect, and consultant to solve difficult data protection challenges.    Links: Stay in touch with Tommy Todd on LinkedIn  Follow Allan Alford on LinkedIn and Twitter Purchase a Cyber Ranch Podcast T-Shirt at the Hacker Valley Store Learn more about Hacker Valley Studio and The Cyber Ranch Podcast Sponsored by our good friends at  Axonius

The CyberWire
Insider Risk Excellence Awards. [CyberWire-X]

The CyberWire

Play Episode Listen Later Mar 24, 2022 22:36


In this CyberWire-X episode, host Dave Bittner chats with the judges of the Insider Risk Excellence Awards. The inaugural awards program, announced during last September's Insider Risk Summit, recognizes the best of the best in Insider Risk Management. They honor the work of individuals and organizations as they address Insider Risk in the most collaborative work environment we've ever seen. Judges Joe Payne, President and CEO, Code42 and Chairman, Insider Risk Summit and Wendy Overton, Director of Cyber Strategy and Insider Risk Leader, Optiv, talk about the growing Insider Risk problem, reveal the winners of each award category and pull back the curtain on how each of these Insider Risk trailblazers are making an impact. 

The CyberWire
An update on the hybrid war in Ukraine. Conti and its users are still up and active. CISA releases twenty-four ICS security advisories. An extradition in the NetWalker case.

The CyberWire

Play Episode Listen Later Mar 11, 2022 26:47


An update on the hybrid war in Ukraine. Allegations of war crimes and Russian disinformation. Chemical, biological, and radiological weapons disinformation. Preparing for cyberattacks. Cyber operations against Russia. GPS interference reported along Finland's border. Conti and its users are still up and active. CISA releases twenty-four ICS security advisories. Malek Ben Salem from Accenture on deception systems. Our guest is Joe Payne from Code42 on data exposure. An extradition in the NetWalker case. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/48 Selected reading. Russia 'did not attack Ukraine' says Lavrov after meeting Kuleba (euronews)  Read the latest cybersecurity analysis (Accenture) Where conflict is reported in Ukraine right now (The Telegraph)  How U.S. Bioweapons in Ukraine Became Russia's New Big Lie (Foreign Policy)  Russian embassy demands Meta stop 'extremist activities' (NASDAQ:FB) (SeekingAlpha) Transparency Org Releases Alleged Leak of Russian Censorship Agency (Vice)  SecurityScorecard Discovers new botnet, ‘Zhadnost,' responsible for… (SecurityScorecard)  Inside the Russian cyber war on Ukraine that never was (Task & Purpose)  Report: Recent 10x Increase in Cyberattacks on Ukraine (KrebsOnSecurity)  Russian defense firm Rostec shuts down website after DDoS attack (BleepingComputer)  The Spectacular Collapse of Putin's Disinformation Machinery (Wired)  Will Russians Choose Truth or Lies? Ukraine's Fate Depends on Them (Bloomberg)  Finnish govt agency warns of unusual aircraft GPS interference (BleepingComputer) Corporate website contact forms used to spread BazarBackdoor malware (BleepingComputer) U.S. Warns of Conti Ransomware Attacks as Gang Deals With Leak Fallout (SecurityWeek)  Ex Canadian government worker extradited to U.S. to face more ransomware charges (CBC)  Former Canadian Government Employee Extradited to the United States to Face Charges for Dozens of Ransomware Attacks Resulting in the Payment of Tens of Millions of Dollars in Ransoms (US Department of Justice)