POPULARITY
Munster Technological University (MTU) hosted the Cybersecurity Smart Maritime Challenge 2025 in collaboration with Cyber Innovate, the Irish Naval Service and the National Maritime College of Ireland (NMCI) on Friday, 26th September. The event took place in the Cybersecurity Prototyping Lab in MTU's Bishopstown Campus in Cork, showcasing how Ireland's ports and harbours can be defended against evolving cyber threats. For centuries, Cork has been a safe harbour from storms, rough seas and pirates. In 2025, the definition of a safe harbour has expanded to include protection from digital attacks. This shift was brought into sharp focus during a live cybersecurity simulation, conducted using MTU's state-of-the-art Cyber Range infrastructure. The simulation, designed by Airbus, mirrored a real-world cyberattack on a maritime port. In the exercise, a hacker group paralysed a port's IT systems and disabled a ship at its entrance, effectively blocking all traffic. Four teams took part, featuring staff from the Irish Naval Service and the NMCI, alongside MTU researchers and students from Cyber Innovate. They were tasked with identifying the points of attack, regaining control of the vessel, and supporting Europol in apprehending the hacker group's leader. Irish ports are vital hubs for shipping and trade, making cybersecurity expertise essential to safeguarding national infrastructure. The challenge provided participants with practical, hands-on experience to develop skills that are directly relevant to addressing the growing cyber threats facing the maritime sector. "This collaboration between the Irish Navy, NMCI, maritime experts and cybersecurity specialists is essential to safeguarding Ireland's national security. This challenge highlights both the scale of the threat and the strength of the talent we are building in Ireland. Preparing for cybersecurity shock events before they happen is the only way to ensure our ports and maritime infrastructure remain resilient in an increasingly uncertain global landscape," said Dr Hazel Murray, Chair of Cybersecurity at Munster Technological University MTU is recognised as a leader in cybersecurity education, training, research and innovation. The university runs multiple programmes and initiatives, including Cyber Innovate, Cyber Skills, Cyber Explore, Cyber Resilience, Cyber Safety and Cyber Futures. Cork's reputation as Ireland's cybersecurity hub is strengthened by MTU's graduates, which has helped attract many national and international companies to the region. MTU also hosts the Cyber Range, a cutting-edge platform unique in Ireland. This allows simulated cyberattacks on virtual organisations in a safe environment. "At MTU, we are dedicated to advancing cybersecurity through cutting-edge education and research," said Dr George O'Mahony of MTU. "This state-of-the-art facility provides invaluable training for students, researchers and industry professionals, allowing them to build critical skills without risking real-world damage or outages." The Cybersecurity Smart Maritime Challenge underlined the critical importance of protecting Ireland's maritime sector from cyberattacks, particularly as the offshore renewable energy industry becomes a cornerstone of Ireland's energy future and a key enabler of EU climate change targets. To learn more about the Cyber Innovate news and events, visit www.cyberinnovate.ie.
Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
1015: "No one cares about AI if the Wi-Fi doesn't work." As CIO of the U.S. Department of State, Dr. Kelly Fletcher leads a global team delivering secure, resilient, and modern technology across 190 countries. In this episode of Technovation with Peter High, Dr. Kelly Fletcher, Chief Information Officer of the U.S. Department of State, shares how she leads technology strategy for 100,000 users across 190 countries. Kelly discusses her dual mandate of operational excellence and cybersecurity, including the department's rapid response to the 2023 Microsoft hack. She also explains how AI is reducing “toil” for diplomats, the rollout of StateChat and DocuChat, and the transformative potential of low-earth orbit satellite communications for global connectivity. With past leadership roles at the Department of Defense and the Navy, Kelly reflects on cultural differences across agencies, her philosophy on experimentation, and the future of cloud and cross-government collaboration.
Japan's ispace and ElevationSpace plan to pursue a private mission that will return a lunar sample to Earth. NASA has awarded Katalyst Space Technologies a $30 million contract to raise a spacecraft's orbit. Redwire has been awarded a contract from Axiom Space to develop and deliver roll-out solar array (ROSA) wings for Axiom Station's Payload Power Thermal Module, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Our guest today is Joseph (Dan) Trujillo, the United States Air Force Research Laboratory's (AFRL's) Space Vehicle Directorate's Space Cyber Resiliency Technical Lead. You can connect with Dan on LinkedIn, and find out more about the AFRL Space Cyber Summit here. Selected Reading ispace and ElevationSpace Sign Agreement to Undertake Japan's First Private Lunar Sample Return Mission NASA Awards Company to Attempt Swift Spacecraft Orbit Boost Redwire Awarded Contract to Provide Roll-Out Solar Arrays for Axiom Space's First Space Station Module Zeno Power and Orano Unlock Americium-241 Supply Through Strategic Agreement to Fuel Space Nuclear Batteries Planet to Open New Satellite Manufacturing Facility in Berlin Isar Aerospace and R-Space Sign Launch Agreement Advance Space Domain Awareness Space Force Renames ‘Front Door' to Reflect Broader Impact on Industry Collaboration Kuiper mission updates: Kuiper constellation grows to more than 100 satellites Space Dynamics Lab Shares Open-Source Software to Detect Potentially Dangerous Meteors Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Modern digital supply chains are increasingly complex and vulnerable. In this episode of Security Matters, host David Puner is joined by Retsef Levi, professor of operations management at the MIT Sloan School of Management, to explore how organizations can “sense the signals” of hidden risks lurking within their software supply chains, from open source dependencies to third-party integrations and AI-driven automation.Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn't enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.Key topics include:How to sense early warning signs of supply chain attacksThe role of AI and automation in both risk and defenseBest practices for mapping and securing your digital ecosystemWhy resilience—not just prevention—must be at the core of your security strategyWhether you're a CISO, IT leader or security practitioner, this episode will help you rethink your approach to digital supply chain risk and prepare your organization for what's next.Subscribe to Security Matters for expert insights on identity security, cyber resilience and the evolving threat landscape.
The following article of the Cybersecurity industry is: “Why Cloud Misconfigurations Could Undermine Cyber Resilience” by Francisco Ramirez de Arellano, Senior Vice President for Latin America, Tenable.
In this episode, Stephen Woods from the WA Department of Justice explores why cyber resilience is essential for protecting sensitive public data and services. He breaks resilience into four stages—anticipate, withstand, recover, and adapt—emphasising that cyberattacks are inevitable, but preparation and testing make the difference. From regional connectivity challenges to incident simulations like the Corporate Compromise Game, Stephen shows how planning, collaboration, and transparency strengthen response. He also highlights diversity as a superpower—with varied perspectives, cultural insights, and neurodiverse talent improving detection, decision-making, and innovation. His core message: resilience isn't just about technology, it's about people, culture, and trust. Stephen Woods, Chief Information Security Officer, Department of Justice WA For more great insights head to www.PublicSectorNetwork.co
AI-driven transformation is underway as over half of tech and media firms plan major organizational restructures to integrate artificial intelligence, despite the high failure rate of early pilot programs. Salesforce expects AI to handle 50% of service calls by 2027, while Business Insider is quietly using AI to draft articles. Fiverr's "AI-first" restructuring has led to a 30% workforce reduction, sparking backlash. The rapid shift reveals both opportunity and risk, especially as poor implementation and loss of customer trust threaten to undermine the promised benefits.Meanwhile, Microsoft is under fire from Consumer Reports for ending support for Windows 10 on October 14th, leaving hundreds of millions of devices potentially vulnerable. Many cannot upgrade to Windows 11 due to hardware limitations, and Microsoft's proposed $30/year fee for extended updates has drawn criticism. Managed service providers (MSPs) now face an uphill battle to communicate this change, mitigate client dissatisfaction, and navigate rushed hardware refreshes.Cyber resilience and AI are converging across the IT stack. N-able, Syncro, and LogicMonitor are rolling out AI-driven features such as anomaly detection, M365/Entra ID backups, and cross-cloud observability. Microsoft Research's open-source MCP Interviewer tool could open new service opportunities for validating AI infrastructure. The trend signals a shift from AI as novelty to AI as operational backbone — but with much of it still experimental, caution is advised.Finally, big questions loom: Is poor leadership being misdiagnosed as a failure of remote work? Can Oracle's $317B backlog — heavily reliant on OpenAI — actually deliver value? And if generative AI increases global GDP by trillions, who truly benefits — vendors or end users? At the grassroots level, students turning to AI for homework raises concerns about eroding critical thinking and long-term workforce preparedness. Four things to know today 00:00 Over Half of Tech Firms Plan Major Restructures to Embrace AI, Despite High Failure Rates05:28 Consumer Reports Urges Microsoft to Extend Windows 10 Support Beyond October 14 Deadline07:03 From Backup Anomaly Detection to MCP Reliability: AI and Cyber Resilience Are Converging in the IT Stack09:48 From Oracle's AI Gamble to Students Skipping Homework: Who Really Captures the Value of Technology? This is the Business of Tech. Supported by: https://timezest.com/mspradio/https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship Webinar: https://bit.ly/msprmail All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
#securityconfidential #darkrhiinosecurity 00:00 Intro02:27 Business to I.T11:50 It's all about the people 16:30 Small businesses should stay vigilant 18:35 What is Organizational Behavior?26:40 How do you find those vulnerabilities?32:38 There's no way AI can unlearn what you taught them40:00 There's no such thing as free43:10 Allow people to experiment safely43:37 How can you use AI to positively affect resilience?46:32 Understanding the “Why” in the process50:45 Attend the 2025 Cyber Security Summit52:30 Connect with Shayla----------------------------------------------------------------------Attend the https://www.cybersecuritysummit.org/To learn more about Shayla visit https://www.linkedin.com/in/shayla-treadwell/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
In this episode, Oliver talks to Sam Andrews, Chief Strategy Officer at Bastion Security, about New Zealand's cybersecurity landscape and the evolving threats facing organisations. They explore how AI is reshaping both attacks and defences, the strengths and weaknesses of New Zealand's regulatory framework, and why building resilience is just as vital as strong security.
#securityconfidential #darkrhiinosecurity 00:00 Intro02:27 Business to I.T11:50 It's all about the people 16:30 Small businesses should stay vigilant 18:35 What is Organizational Behavior?26:40 How do you find those vulnerabilities?32:38 There's no way AI can unlearn what you taught them40:00 There's no such thing as free43:10 Allow people to experiment safely43:37 How can you use AI to positively affect resilience?46:32 Understanding the “Why” in the process50:45 Attend the 2025 Cyber Security Summit52:30 Connect with Shayla----------------------------------------------------------------------Attend the https://www.cybersecuritysummit.org/To learn more about Shayla visit https://www.linkedin.com/in/shayla-treadwell/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity
Cyber resilience goes beyond checkboxes. In this episode, cybersecurity veteran Jerod Brennen (virtual CISO, executive advisor, and indie filmmaker) joins Rob Aragao to explore how storytelling, culture, and business alignment turn security into a true business enabler. Real-world lessons and practical steps help you shift from traditional cybersecurity to resilience.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.
Montenegro's digital journey has been one of deliberate reconstruction and collaboration. In 2022, a major cyberattack exposed critical gaps in the country's digital infrastructure. The experience sent shockwaves through Montenegro's public administration and made it abundantly clear that preparedness on paper does not equal resilience in reality. Instead of responding with short-term fixes, public institutions focused on long-term change. They initiated a wide-ranging transformation, strengthening cyber capabilities, forming new partnerships, and prioritising resilience not as an end goal, but as an everyday practice. In this podcast episode, we take a privileged look at what that transformation felt like from the inside with Dušan Polović, Director General for Infrastructure, Information Security, Digitalisation and e-Services at the Ministry of Public Administration of Montenegro, and Milan Sekuloski, Senior Cybersecurity Expert at the e-Governance Academy. Tune in!
Send us a textIn this refreshingly candid episode of the Joey Pinz Discipline Conversations podcast, Joey dives deep with Nadav Shenker, CEO of Vircom, a leading provider of email security solutions.
What happens when a cybersecurity incident requires legal precision, operational coordination, and business empathy—all at once? That's the core question addressed in this origin story with Bryan Marlatt, Chief Regional Officer for North America at CyXcel.Bryan brings over 30 years of experience in IT and cybersecurity, with a history as a CISO, consultant, and advisor. He now helps lead an organization that sits at the intersection of law, cyber, and geopolitics—an uncommon combination that reflects the complexity of modern risk. CyXcel was founded to address this reality head-on, integrating legal counsel, cybersecurity expertise, and operational insight into a single, business-first consulting model.Rather than treat cybersecurity as a checklist or a technical hurdle, Bryan frames it as a service that should start with the business itself: its goals, values, partnerships, and operating environment. That's why their engagements often begin with conversations with sales, finance, or operations—not just the CIO or CISO. It's about understanding what needs to be protected and why, before prescribing how.CyXcel supports clients before, during, and after incidents—ranging from tailored tabletop exercises to legal coordination during breach response and post-incident recovery planning. Their work spans critical sectors like healthcare, utilities, finance, manufacturing, and agriculture—where technology, law, and regulation often converge under pressure.Importantly, Bryan emphasizes the need for tailored guidance, not generic frameworks. He notes that many companies don't realize how incomplete their protections are until it's too late. In one example, he recounts a hospital system that chose to “pay the fine” rather than invest in cybersecurity—a decision that risks reputational and operational harm far beyond the regulatory penalty.From privacy laws and third-party contract reviews to incident forensics and geopolitical risk analysis, this episode reveals how cybersecurity consulting is evolving to meet a broader—and more human—set of business needs.Learn more about CyXcel: https://itspm.ag/cyxcel-922331Note: This story contains promotional content. Learn more.Guest: Bryan Marlatt, Chief Regional Officer (North America) at CyXcel | On LinkedIn: https://www.linkedin.com/in/marlattb/ResourcesLearn more and catch more stories from CyXcel: https://www.itspmagazine.com/directory/cyxcelLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
How would you add law enforcement as a valuable resource to your cybersecurity program? And why would you want to? Let's find out with our guest Supervisory Special Agent Douglas Domin of the Federal Bureau of Investigation. Your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. “Cyber Resilience in the Age of AI: Threats, Responses & Human Stories” at MIT April 2025 -- https://youtu.be/6Jlg4tZV3TU FBI field office directory -- https://www.fbi.gov/contact-us/field-offices CISA/FBI/NSA Joint Advisories -- https://www.cisa.gov/news-events/cybersecurity-advisories
We speak with Andreas Hartl, Senior Vice President for the Asia-Pacific and Japan (APJ) region at Zscaler. Andreas is responsible for driving the company's growth and strategic initiatives across the region.Prior to joining Zscaler, Andreas held senior leadership positions at several leading technology companies, including Aveva, IBM & Microsoft, where he played a pivotal role in expanding market presence and achieving significant revenue growth. His extensive background in sales, business development, and strategic planning has equipped him with a deep understanding of the APJ market and its unique opportunities.Andreas is known for his ability to build and lead high-performing teams, fostering a culture of innovation and customer-centricity. His strategic vision and execution have been instrumental in driving Zscaler's success in the region, helping organizations securely transform their digital infrastructure.He holds a Bachelor's in Applied Sciences, Electrical Engineering & Information Technology from Technical University of Munich as well as a Master's from University of Applied Sciences Munich. With a strong commitment to excellence and a forward-thinking mindset, Andreas Hartl continues to shape the future of secure digital transformation in the APJ region.#ZL2025 #zerotrustsecurity #mysecuritytv #zscaler
In this episode of the TribalHub Podcast, we talk with Brent Hutfless about a lesser-known but highly disruptive threat: email bombing. Brent explains what it is, how it differs from other email-based attacks like phishing, and why technology leaders should take it seriously. He shares real-world examples, the warning signs to watch for, and how his team responded during an actual incident. We also cover the operational impact of email bombing, effective defense strategies, and why collaboration across the industry is key to staying ahead. Connect with Brent on LinkedIn.
In this episode, Tommy West, Enterprise Fellow Security Architecture at CereCore shares actionable insights for healthcare organizations to strengthen their cybersecurity posture through cultural alignment, risk-based frameworks, and fundamentals like strong authentication and device visibility.This episode is sponsored by CereCore.
Your data platform is broken — and here's the fix! 90% of enterprise storage systems collapse under ransomware and buckle at petabyte scale. In this episode, guide & CTO Jason Lohrey reveals how Mediaflux — built from first principles — rewrote the rules. Think hundreds of PB, real-time rollback, built-in malware defense, and unified management of both structured and unstructured data. This conversation blends cold physics with creative flair — and hits the frontier of data engineering.In this episode, I talk to Jason Lohrey, Founder & CTO of Arcitecta, and the quantum physicist behind Mediaflux — a first-principles data platform that manages structured + unstructured data, scales to hundreds of PBs, and delivers real-time ransomware rollback.We dive into:The story of deleting 80,000 words — and what it sparkedWhy backup can't keep up with scaleData as energy, and the physical limits of storageWhy Mediaflux was built from scratch — database, protocols, and allWhere quantum computing might take us (and what it threatens)Arcitecta was founded in 1998, based in Melbourne, Australia.☑️ Support the Channel by buying a coffee? - https://ko-fi.com/gtwgt☑️ Technology and Topics Mentioned:Mediaflux, XODB, NFS, SMB, SFTP, DICOM, S3, Real-Time File Streaming, Data Orchestration, Structured & Unstructured Data, Cyber Resilience, Ransomware Rollback, Metadata-Driven File Systems, Backup at Petabyte Scale, Data Gravity, Post-Quantum Cryptography, Multi-Protocol Access, Time-Series Data, First Principles Engineering, Innovation in Storage, Glass & DNA Storage, Distributed File SystemsGreat Things with Great Tech Podcast: https://gtwgt.comGTwGT Playlist on YouTube: https://www.youtube.com/@GTwGTPodcastListen on Spotify: https://open.spotify.com/show/5Y1Fgl4DgGpFd5Z4dHulVXListen on Apple Podcasts: https://podcasts.apple.com/us/podcast/great-things-with-great-tech-podcast/id1519439787EPISODE LINKSArcitecta Website: https://www.arcitecta.comArcitecta on LinkedIn: https://www.linkedin.com/company/arcitecta-pty-ltd Jason Lohrey on LinkedIn: https://www.linkedin.com/in/jasonlohrey GTwGT LINKSSupport the Channel: https://ko-fi.com/gtwgtBe on #GTwGT: Contact via Twitter/X @GTwGTPodcast or visit https://www.gtwgt.comSubscribe to YouTube: https://www.youtube.com/@GTwGTPodcast?sub_confirmation=1Great Things with Great Tech Podcast Website: https://gtwgt.comSOCIAL LINKSFollow GTwGT on Social Media:Twitter/X: https://twitter.com/GTwGTPodcastInstagram: https://www.instagram.com/GTwGTPodcastTikTok: https://www.tiktok.com/@GTwGTPodcast
Title: "Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time"A Post–Infosecurity Europe 2025 Conversation with Ken MunroGuestsKen Munro Security writer & speakerhttps://www.linkedin.com/in/ken-munro-17899b1/HostsSean Martin, Co-Founder at ITSPmagazineWebsite: https://www.seanmartin.comMarco Ciappelli, Co-Founder, CMO, and Creative Director at ITSPmagazineWebsite: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________After a whirlwind week at Infosecurity Europe 2025, I had the chance to reconnect with Ken Munro from Pen Test Partners — a longtime friend, hacker, and educator who brings cybersecurity to life in the most tangible ways. From car hacking escape rooms to flight simulators in pubs, we talked about why touching tech matters, how myth-busting makes us safer, and how learning through play might just be the key to securing our increasingly complex world. Tune in, and maybe bring a cocktail.⸻There's something special about catching up with someone who's not just an expert in cybersecurity, but also someone who reminds you why this industry can — and should — be fun. Ken Munro and I go back to the early days of DEFCON's Aviation Village, and this post-Infosecurity Europe 2025 chat brought all that hacker spirit right back to the surface.Ken and his crew from Pen Test Partners set up shop next to the main Infosecurity Europe venue in a traditional London pub — but this wasn't your average afterparty. They transformed it into a hands-on hacking village, complete with a car demo, flight simulator, ICS cocktail CTF, and of course… a bar. The goal? Show that cybersecurity isn't just theory — it's something you can touch. Something that moves. Something that can break — and be fixed — before it breaks us.We talked about the infamous “Otto the Autopilot” from Airplane, the Renault Clio-turned-Mario Kart console, and why knowing how TCAS (collision avoidance) works on an Airbus matters just as much as knowing your Wi-Fi password. We also dug into the real-world cybersecurity concerns of industrial systems, electronic flight bags, and why European regulation might be outpacing the U.S. in some areas — for better or worse.One of the biggest takeaways? It's time to stop fearing the hacker mindset and start embracing it. Curiosity isn't a threat — it's a superpower. And when channeled correctly, it leads to safer skies, smarter cars, and fewer surprises in the water we drink or the power we use.There's a lot to reflect on from our conversation, but above all: education, community, and creativity are still the most powerful tools we have in security — and Ken is out there proving that, one demo and one pint at a time.Thanks again, Ken. See you at the next village — whichever pub, hangar, or DEFCON corner it ends up in.⸻Keywords: cybersecurity, ethical hacking, pen testing, Infosecurity Europe, embedded systems, car hacking, flight simulator, ICS security, industrial control systems, aviation cybersecurity, hacker mindset, DEFCON___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. In this episode, our host, Caleb Tolin, is joined by Errol Weiss, Chief Security Officer at Health-ISAC and former cybersecurity leader at Citi and Bank of America. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.
In this episode of The Digital Executive podcast, host Brian Thomas sits down with Charlie Thomas, a veteran tech leader known for scaling startups to $100M+ in recurring revenue. Now at the helm of Mitiga, Charlie shares his approach to building exceptional teams, anticipating market shifts, and mentoring founders—several of whom have led companies to billion-dollar exits. His emphasis on culture, go-to-market excellence, and strategic timing has been central to repeated success across the cybersecurity landscape.Charlie also dives into Mitiga's mission to redefine cyber resilience for the cloud era. With organizations relying on increasingly complex, multi-cloud environments, Mitiga offers a real-time platform that integrates hundreds of SaaS applications and cloud systems into a unified security view. As attackers grow more sophisticated—often using AI—Mitiga empowers defenders to keep pace with smarter, faster threat detection and response.Subscribe to the Digital Executive Newsletter for curated strategies, expert perspectives, and industry trends. Sign up now here.
Senator Craughwell leads the charge to a secure digital future Ireland's digital progress has been extraordinary. From online banking and healthcare systems to remote learning and connected infrastructure, the nation has embraced digitalisation across every sector. However, this transformation has come at a cost. As our digital footprint expands, so too does our exposure to cyber threats. Cybersecurity is no longer just a technical issue. It is a public concern and a national responsibility. We often picture cyberattacks as distant or unlikely events, something that happens to big tech companies or foreign governments. Attacks in recent years have shown that Ireland is not immune. Irish institutions - such as the HSE in 2021 - have faced serious disruptions, but so too have countless smaller businesses. Many incidents never make headlines but the reality is that companies' systems, data, personal privacy, financial assets, and systems managed by IT and OT (operational technology) are under continuous threat. What makes these attacks so dangerous is not just their sophistication. It's how easily they succeed. In most cases, breaches begin with one thing: human error. It can be as simple as an employee opening a fraudulent email, a manager misunderstanding a digital risk, or a staff member who is unaware that their actions have consequences far beyond their screen. Awareness is the missing link Awareness is the critical missing link in our national defence. Most successful cyberattacks don't rely on elite hacking tools; they rely on people not being prepared. Attackers exploit gaps in understanding - gaps that exist in homes, schools, businesses and public services. Awareness needs to be treated as a core component of Ireland's cybersecurity response. Without it, no software or firewall can offer enough protection. Ireland's small and medium-sized enterprises (SMEs) are particularly vulnerable. They make up most of the country's enterprises and employ the majority of our workforce. Yet, many of these organisations do not have dedicated cybersecurity teams or robust training in place. The same applies to charities, community organisations, and voluntary services - sectors that handle sensitive data and are crucial to local life but often lack the resources or know-how to defend against threats. The risk is real. The consequences are national. Partnered with CJHNetwork, Data Edge have participated in conducting cyber reviews across Ireland. We found that a number of SMEs within critical supply chains have already been targeted by cyberattacks. These organisations support navigation, satellite communication, and other essential infrastructure which are of strategic importance. This highlights the growing vulnerabilities in sectors vital to public safety and national services. Building national cyber resilience Cyber risk is not theoretical. It is here, it is growing, and it is reaching into the heart of our critical infrastructure. So, what must Ireland do? How do we build resilience before the next wave of attacks hits us harder? We need a coordinated national effort - one that combines public awareness, skilled training, and long-term investment. It should also ensure consistent funding and empower policy makers to deliver widespread public engagement. This includes strengthening support for SMEs and community organisations, expanding cybersecurity training and awareness across all levels of society, and building a skilled and diverse workforce through education, outreach, and accelerated recruitment. Ireland must also invest in the infrastructure, tools, and partnerships that will enable long-term resilience and readiness. Our active involvement as part of a national cybersecurity consortium includes participation in discussions at Leinster House and ongoing collaboration with policymakers, and we recognise that collective insights and local experience are key to shaping Ireland's cybersecurity landscape. Currently, a positio...
In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• The GRIP is one year old and to celebrate, we're running an anniversary sale!!• Join the GRIP in July and use promo code HOTJULY2025 to receive a 20% discount!• (TLP:CLEAR) Hostile Nation States Employing Non-State Actors• Surge in MOVEit Transfer Scanning Could Signal Emerging Threat Activity• ‘Suspended animation': US government upheaval has frayed partnerships with critical infrastructure• Short-term extension of expiring cyber information-sharing law could be on the table• Gate 15 is excited to offer a low-cost ransomware resilience exercise for executives! Contact us today for more information on this great opportunity!Main Topics:Iranian Cyber Actors May Target Vulnerable US Networks and Entities of Interest. CISA, the Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Security Agency (NSA) published Iranian Cyber Actors May Target Vulnerable US Networks and Entities of Interest. This joint fact sheet details the need for increased vigilance for potential cyber activity against U.S. critical infrastructure by Iranian state-sponsored or affiliated threat actors. Defense Industrial Base companies, particularly those possessing holdings or relationships with Israeli research and defense firms, are at increased risk. At this time, we have not seen indications of a coordinated campaign of malicious cyber activity in the U.S. that can be attributed to Iran. Beazley Report: U.S. Executives Misjudge Their Cyber Preparedness. U.S.-based executives feel more prepared to counter cyber threats, potentially indicating a false sense of security because many companies lack the ability to be adequately preparedness, according to a new report from specialist insurer Beazley. According to the report, Spotlight on Tech Transformation & Cyber Risk 2025, the perception of cyber resilience rose to 81% from 73% a year ago. Hostile Events:• A violent ambush in Idaho leaves 2 firefighters dead and 1 injured. What to know about the attack• Suspect Identified in Deadly Ambush of Idaho Firefighters• Chilling ‘coincidence' of Idaho shooting sends internet sleuths into overdrive• Gunman started Idaho blaze and then fatally shot 2 firefighters in ambush attack, officials say• Here's a timeline of how the Canfield Mountain ambush shooting unfolded• Multiple firefighters reportedly shot while responding to fire near Coeur d'Alene• Europol: New report - major developments and trends on terrorism in Europe in 2024Quick Hits:• Canadian Centre for Cyber Security - Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543 • Over 1,200 Citrix servers unpatched against critical auth bypass flaw• The State of Ransomware 2025• Scattered Spider hackers shift focus to aviation, transportation firms • Scattered Spider's Calculated Path from CFO to Compromise • M&S fashion rivals ‘benefited from its pause on online orders after cyber-attack' • Ransomware attack contributed to patient's death• Canada orders Chinese CCTV biz Hikvision to quit the country ASAP• FBI PSA - Criminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraud• 50 Customers of French Bank Hit by Insider SIM Swap Scam; An intern at Société Générale is believed to have facilitated the theft of more than EUR1mn (USD1.15mn) from the bank's customers.• State of CPS Security 2025: Building Management System Exposures • H1 2025 Crypto Hacks and Exploits: A New Record Amid Evolving Threats
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how the Gulf Cooperation Council (GCC) is strengthening cyber resilience in today's digital age. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Title: “These Aren't Soft Skills — They're Human Skills”A Post–Infosecurity Europe 2025 Conversation with Rob Black and Anthony D'AltonGuestsRob BlackUK Cyber Citizen of the Year 2024 | International Keynote Speaker | Master of Ceremonies | Cyber Leaders Challenge | Professor | Community Builder | Facilitator | Cyber Security | Cyber Deceptionhttps://www.linkedin.com/in/rob-black-30440819/Anthony D'AltonProduct marketing | brand | reputation for cybersecurity growthhttps://www.linkedin.com/in/anthonydalton/HostsSean Martin, Co-Founder at ITSPmagazineWebsite: https://www.seanmartin.comMarco Ciappelli, Co-Founder, CMO, and Creative Director at ITSPmagazineWebsite: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ Yes, Infosecurity Europe 2025 may be over, but the most important conversations are just getting started — and they're far from over. In this post-event follow-up, Marco Ciappelli reconnects from Florence with Rob Black and brings in Anthony D'Alton for a deep-dive into something we all talk about but rarely define clearly: so-called soft skills — or, as we prefer to call them… human skills.From storytelling to structured exercises, team communication to burnout prevention, this episode explores how communication, collaboration, and trust aren't just “nice to have” in cybersecurity — they're critical, measurable capabilities. Rob and Anthony share their experience designing real-world training environments where people — not just tools — are the difference-makers in effective incident response and security leadership.Whether you're a CISO, a SOC leader, or just tired of seeing tech get all the credit while humans carry the weight, this is a practical, honest conversation about building better teams — and redefining what really matters in cybersecurity today.If you still think “soft skills” are soft… you haven't been paying attention.⸻Keywords: Cybersecurity, Infosecurity Europe 2025, Soft Skills, Human Skills, Cyber Resilience, Cyber Training, Security Leadership, Incident Response, Teamwork, Storytelling in Cyber, Marco Ciappelli, Rob Black, Anthony Dalton, On Location, ITSPmagazine, Communication Skills, Cyber Crisis Simulation, RangeForce, Trust in Teams, Post Event Podcast, Security Culture___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
How can organizations protect their most valuable asset, data, while harnessing its true potential through AI-driven insights? These are the questions I set out to answer on the recent IT Press Tour in Silicon Valley. In my latest conversation at the Santa Clara offices of Cohesity, I sat down with Sanjay Poonen, President and CEO, to discuss how this company has positioned itself at the heart of the AI era with a modern data cloud built for speed, security, and intelligence. From my early days interviewing Cohesity's technical minds to now hearing directly from Sanjay about the company's transformation, it is clear that Cohesity's mission to shield, manage, and unlock data value is gaining momentum like never before. This episode takes you deep into the company's evolution. We explore how Cohesity started by reinventing traditional backup and recovery, then scaled through bold leadership, culminating in its significant acquisition of the NetBackup business from Veritas. Sanjay walks me through how this move instantly propelled Cohesity to market leadership in data security and cyber resilience, serving over 13,000 organizations worldwide across various sectors, including healthcare, finance, government, and retail. We also examine how Cohesity is using AI not only to help clients recover from cyber threats but to mine vast troves of live and backup data for powerful, real-time business insights. Sanjay explains the partnership with NVIDIA and how Cohesity's patented retrieval augmented generation capabilities are setting new benchmarks for generative AI applications within backup environments. For businesses grappling with data sovereignty and the increasing return to on-premises solutions, Sanjay shares how Cohesity's innovations balance local compliance requirements while leveraging cloud agility. What resonated most with me was Sanjay's candid perspective on leadership during rapid growth and mergers, from uniting thousands of employees under a shared culture to maintaining a relentless customer-first mindset. If you have ever wondered how a company can become a real force in both AI and cybersecurity, this conversation is filled with insights, real-world examples, and a clear vision for how Cohesity plans to shape the next generation of data management. Are you ready to rethink how your organization secures and activates its data in an AI-driven future? Tune in and discover what lies ahead on this data-powered journey. Listener Notes Here is a link to the 5-minute video that Sanjay referenced in our conversation. https://www.youtube.com/watch?v=xrKdyaWpIG4
William Lyne of the UK's National Crime Agency joins us live at Infosecurity Europe to talk ransomware, AI threats, and the future of cybercrime disruption.When the UK's top cyber intelligence strategist sits down with you in London, you listen — and you hit record.At Infosecurity Europe 2025, the ITSPmagazine podcast team — Marco Ciappelli and Sean Martin — sat down with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK's National Crime Agency (NCA). This is the guy who not only leads cyber strategy for the NCA, but has also represented the UK at the FBI in the U.S. and now oversees national-level ransomware disruption efforts. It's not just a conversation — it's a rare front-row seat into how one of the world's most serious crime-fighting agencies is tackling ransomware 3.0.The message? Ransomware isn't just a cyber issue. It's a societal one. And it's evolving faster than we're prepared for — unless we change the game.“It went from niche to national threat fast,” Lyne explains. “The tools were always there. It just took a few threat actors to stitch them together.”From banking malware to fully operational cybercrime-as-a-service ecosystems, Lyne walks us through how the underground economy has industrialized. Ransomware isn't just about tech — it's about access, scale, and business models. And most importantly, it's no longer limited to elite coders or closed-door Russian-speaking forums. The barrier to entry is gone, and the dark web is wide open for business.Sean brings up the obvious: “Why does this still feel like we're always reacting?”Lyne responds: “We've shifted. We're going after the ecosystem — the people, the infrastructure, the business model — not just the payload.” That includes disrupting ransomware-as-a-service, targeting marketplaces, and yes, investing in preemptive intelligence.Marco flips the script by comparing today's cyber landscape to something deeply human. “Extortion is nothing new — we've just digitalized it. This is human behavior, scaled by tech.”From there, the conversation takes a future-facing turn. Deepfakes, AI-powered phishing, the commoditization of generative tools — Lyne confirms it's all on their radar. But he's quick to note that cybercriminals aren't bleeding-edge innovators. “They adopt when the ROI is right. But AI-as-a-service? That's coming. And it will reshape how efficient — and damaging — these threats become.”And then the real insight lands:“You can't wait to be a victim to talk to law enforcement. We may already have access to the infrastructure. The earlier we hear from you, the better we can act — and fast.”That kind of operational openness isn't something you heard from law enforcement five years ago. It signals a cultural shift — one where collaboration is not optional, it's essential.William also highlights the NCA's partnerships with private sector firms, academia, and international agencies, including the Kronos operation targeting LockBit infrastructure. These kinds of collaborations prove that when information moves, so does impact.Why does this matter?Because while most cybersecurity media gets stuck in product buzzwords and vendor hype, this is the real stuff — how ransomware groups behave, how law enforcement thinks, and how society can respond. It's not theory. It's strategy, lived on the front lines.
In today's episode of the Cyber Culture Café series, Andy and John speak to Tia Hopkins, Chief Cyber Resilience Officer & Field CTO. As Chief Cyber Resilience Officer & Field CTO, Tia Hopkins is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner engagements, and working closely with the sales, marketing, product, engineering, and customer success teams to drive security outcome-focused initiatives.She has spent the past 20+ years of her career in various IT and IT Security roles and has over a decade of experience in the managed services space. Outside of her role at eSentire, Tia is also an adjunct professor of Cybersecurity at Yeshiva University and is currently pursuing her PhD in Cybersecurity Leadership.--Cybersecurity isn't just about platforms and processes—it's about people. If relationships matter in cybersecurity, this is where they begin. So, we're introducing a new, breakout series from the eSentire Cyber Talks Podcast – the Cyber Culture Café series! In this series, John Moretti and Andy Lalaguna will sit down for a candid conversation with one of the key players behind the eSentire customer experience. This series is all about pulling back the curtain and putting the spotlight on the people who power eSentire's world-class cybersecurity services.Join us for a relaxed and revealing discussion covering day-to-day challenges, personal motivation, industry observations, and the unique value each guest brings to the eSentire mission. Get to know the voices behind the protection—and why our people are at the core of everything we do.--Have a question for us? Reach out: hello@esentire.com---About Cyber TalksFrom ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges.About eSentireeSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @eSentire.
In this episode, Amanda Finch, Chief Executive Officer of the Chartered Institute of Information Security, offers a perspective shaped by decades of experience in a field she has grown with and helped shape. She shares how cybersecurity has transformed from an obscure technical pursuit into a formalized profession with recognized pathways, development programs, and charters. Her focus is clear: we need to support individuals and organizations at every level to ensure cybersecurity is inclusive, sustainable, and effective.Amanda outlines how the Chartered Institute has developed a structured framework to support cybersecurity careers from entry-level to fellowship. Programs such as the Associate Development Program and the Full Membership Development Program help individuals grow into leadership roles, especially those who come from technical backgrounds and must now influence strategy, policy, and people. She emphasizes that supporting this journey isn't just about skills—it's about building confidence and community.A significant part of the conversation centers on representation and diversity. Amanda speaks candidly about being one of the only women in the room early in her career and acknowledges the progress made, but she also highlights the structural issues still holding many back. From the branding of cybersecurity as overly technical, to the inaccessibility of school programs for under-resourced communities, the industry has work to do. She argues for a wider understanding of the skills needed in cybersecurity—communication, analysis, problem-solving—not just coding or technical specialization.Amanda also addresses the growing threat to small and medium-sized businesses. While large organizations may have teams and resources to manage security, smaller businesses face the same threats without the same support. She calls for a renewed emphasis on community-based solutions—knowledge sharing, mentorship, and collaborative platforms—that extend the reach of cyber defense to those with fewer resources.In closing, Amanda urges us not to forget the enduring principles of security—know what you're protecting, understand the consequences if it fails, and use foundational practices to stay grounded even when new technologies like AI and deepfakes arrive. And just as importantly, she reminds us that human principles—trust, empathy, responsibility—are vital tools in facing cybersecurity's biggest challenges.___________Guest: Amanda Finch, CEO of the Chartered Institute of Information Security | https://www.linkedin.com/in/amanda-finch-fciis-b1b1951/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
In the latest Leader2Leader episode, Russ Branzell, President & CEO of CHIME, sits down with John Chirillo, Principal Security Architect at Connection, for a timely conversation on cyber resilience, digital trust, and the future of healthcare security.Together, they explore the evolving cybersecurity landscape, the challenges healthcare organizations are facing, and how leadership, continuous learning, and community engagement are key to staying ahead. From real-world insights to future-forward thinking, this episode is a must-listen for digital health leaders navigating today's complex threat environment.
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Show Notes: https://securityweekly.com/esw-409
"The problem is way bigger than people think… scams are now so good, even cybersecurity professionals fall for them." — Dmitri Vellikok, VP of Embedded Security, F-Secure In this compelling Technology Reseller News podcast, publisher Doug Green speaks with Dmitri Vellikok, Vice President of Embedded Security at F-Secure, about the urgent need for cybersecurity resilience in an AI-driven threat landscape. With nearly four decades of experience in digital protection and a long-standing, behind-the-scenes role powering cybersecurity for major telcos, F-Secure is stepping up efforts to help service providers build networks that are not only secure—but resilient. Dmitri Vellikok The conversation dives deep into how AI is a double-edged sword: enabling advanced threat detection, but also fueling a new generation of sophisticated scams that are increasingly difficult to identify. Vellikok discusses findings from F-Secure's recent global consumer security survey, which revealed that while 70% of users believe they can spot a scam, 43% have actually fallen victim—highlighting the growing disconnect between confidence and reality in the digital age. Vellikok emphasizes the critical role telecom operators can play in defending users. With access to rich behavioral and traffic data, service providers are uniquely positioned to identify and prevent threats in real time—especially as AI enables more targeted and scalable attacks. He outlines how F-Secure is working to empower these providers with predictive cybersecurity tools, including the concept of a “threat score” that can alert users when they're most at risk. Importantly, the podcast also addresses the balance between robust security and seamless user experience. Consumers, Vellikok notes, don't want tutorials or pop-ups—they just want problems to quietly go away. This insight is guiding F-Secure's approach to embedded protection that works silently and effectively behind the scenes. As 5G continues to roll out globally, the conversation ends on an optimistic note: this new architecture not only enhances connectivity but offers new opportunities for layered, real-time security solutions tailored to tomorrow's threats. Learn more about F-Secure: https://www.f-secure.com/us-en
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html
Advancing Exposure ManagementHear from Jorge Orchilles, Senior Director at Verizon, on the shift from traditional vulnerability management to modern exposure management and the critical role proactive security plays in staying ahead of threats.+ + +Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentofinfluence.
In a world where cybercrime is a business and national security secrets are often hidden in plain sight, this episode uncovers the gripping intersection of espionage and cybersecurity. Brian Boetig, a national security and public safety expert with 35 years of experience spanning the FBI, CIA, U.S. diplomacy, law enforcement, and consulting, shares fascinating stories from his career, including an unexpected brush with Russian intelligence, all thanks to a dachshund. In this episode we also discuss:The evolution of spycraft, from traditional field operations to modern cyber warfareHow cybercrime has transformed into a full-fledged business modelInsights into decoding behavioral patterns in cyberattacksThe complexities of cyber insurance and its limitationsHow businesses may be relying on cyber insurance in the wrong waysExamine how leadership engagement in cybersecurity has evolvedHighlight the critical role the C-suite plays in driving security initiativesStay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
DISCLAIMER: The information in this presentation is provided as education only, with the understanding that neither the presenter nor ENNIS Legacy Partners is engaged to render legal, accounting, or other professional services. If you require legal advice or other expert assistance, you should seek the services of a competent professional. Neither the presenter nor ENNIS Legacy Partners shall have any legal liability or responsibility to any person or entity with respect to any loss or damage caused, or alleged to be caused, directly or indirectly, by the information contained in this presentation.============================================“We want you to help you build a business that is sellable and exit successfully on your own terms and conditions.” - Pat Ennis============================================
Defense Information Systems Agency networks are leveraging AI and sensors to boost real-time monitoring and synthetic traffic, as well as improve user experience and incident resolution. At AFCEA TechNet 2025 in Baltimore, DISA J6 Global Services Directorate Vice Director Brig. Gen. Michael Cornell discussed the impact of emerging technology on data tagging, diagnostics and interoperability of DOD systems. Ahead of his June retirement, Cornell also reflected on his proudest moments in of his decades-long career in uniform, particularly working alongside dedicated service members in operational environments.
Small and medium-sized enterprises (SMEs) continue to be at a disadvantage when it comes to cybersecurity—not because the risks are unclear, but because the means to address them remain out of reach for many. In this episode, Professor Steven Furnell of the University of Nottingham highlights the real barriers SMEs face and shares the thinking behind a new approach: creating cybersecurity communities of support.The research behind this project, supported by the University and its partners, explores how different types of SMEs—micro, small, and medium-sized—struggle with limited time, budget, and expertise. Many rely on third-party service providers, but often don't have enough cybersecurity knowledge to evaluate what “good” looks like. It's not just a resource problem—it's a visibility and literacy problem.Furnell emphasizes the potential of automation to lift some of the burden, from automated updates to scheduled malware scans. But he also makes it clear that automated tools can't fully replace the need for human judgment, especially in scenarios like phishing or social engineering attacks. People still need cybersecurity literacy to recognize and resist threats.That's where the idea of communities of support comes in. Rather than each SME navigating cybersecurity alone, the goal is to create local or sector-based communities where businesses and cybersecurity practitioners can engage in open, non-commercial conversations. These communities would offer SMEs a space to ask questions, share challenges, and exchange practical advice—without pressure, cost, or fear of judgment.The initiative isn't about replacing regulation or mandating compliance. It's about raising the baseline first. Communities of support can serve as a step toward greater awareness and capability—something that's especially critical in a world where supply chains are interconnected, and security failures in one small link can ripple outward.The message is clear: cybersecurity isn't just a technical issue—it's a social one. And it starts by creating room for dialogue, connection, and shared responsibility. Want to know what this model could look like in your community? Tune in to find out.__________________________________Guest: Steven Furnell | Professor of Cyber Security at University of Nottinghamhttps://www.linkedin.com/in/stevenfurnell/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
What if fixing cybersecurity wasn't about more tools, but about unlocking human potential? In this episode, Ron Eddings welcomes back David Shipley, CEO and Field CSO of Beauceron Security, for a conversation on the real force behind security resilience: people. Together they expose the failure of "reactive" cybersecurity strategies, drawing parallels with preventative healthcare — and explain why culture, psychological safety, and behavior change are the true secret weapons. Impactful Moments: 00:00 - Introduction 01:36 - The true meaning of "people in cyber" 03:13 - Cybersecurity's flawed healthcare analogy 07:31 - Nutrition for cyber: proactive strategies 10:00 - MSPs: why selling tools isn't enough 16:22 - Measuring culture, not just clicks 19:12 - Why people really click phishing emails 23:59 - Building psychological safety in security 30:30 - Celebrating human wins in security 34:00 - The future: empathy, transparency, trust Links: Connect with our guest, David Shipley: https://www.linkedin.com/in/dbshipley/ Learn more about Beauceron Security here: https:///www.beauceronsecurity.com/partner Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
As healthcare organizations become prime targets for increasingly sophisticated cyberattacks, a focus on prevention alone is insufficient and costly. Cyber threats, from ransomware to disruptive breaches, have the potential to impact care continuity and operational performance. So how can healthcare IT executives prepare for what many say is the inevitable? In this timely webinar, we'll speak with leaders who are embracing resilience strategies that aim to withstand disruptions and minimize downtime. Source: Building Cyber Resilience: Navigating Healthcare’s New Reality on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.
Discover the 6 Steps to Build True Cyber Resilience in 2025 with David White, President and Co-founder of Axio. In this insightful episode of the Risk Management Show, we discussed actionable strategies to enhance cybersecurity fundamentals, prioritize risk investments, and foster a culture of resilience. David draws on decades of experience in cyber risk quantification and operational resilience to share how companies can prepare for and recover from major events like ransomware attacks. Learn why financial modeling is key to aligning cybersecurity with business risk management and how tabletop exercises can strengthen your organization's preparedness. If you want to be our guest or suggest a speaker, send your email to info@globalriskconsult.com with the subject line “Guest Proposal.”
How prepared is your business for a ransomware attack? Not just to prevent it, but to continue operating when it happens. In this episode, I sit down with Trevor Dearing, Director of Critical Infrastructure at Illumio, to discuss the latest findings from their global ransomware report and what they reveal about cyber resilience. Trevor shares insight from a survey of more than 3,000 organisations across multiple sectors. The most concerning figure is that 58 percent of those impacted by ransomware were forced to halt operations. That number has risen sharply from 43 percent just two years ago. Despite this, many businesses in the UK still avoid reporting attacks, often due to fears around reputational damage or potential retaliation. Trevor explains why that reluctance is misguided and how public support, improved infrastructure, and more explicit government guidance could encourage more transparency. We also explore the rise of containment as a more practical and cost-effective approach than prevention alone. Rather than trying to stop every attack at the perimeter, organisations are learning how to isolate and limit damage quickly. Trevor explains how zero trust architecture, microsegmentation, and one-click containment tools are being used to keep systems operational even during an incident. Only 13 percent of organisations believe their cyber resilience exceeds what is required. Trevor helps us understand why this number remains low and where organisations should focus to shift from vulnerability to resilience. From evolving regulations to future applications of AI in security, this conversation covers what leaders need to know if they prepare for the next generation of cyber threats. To access Illumio's full ransomware report, visit illumio.com. Is your cyber resilience strategy built for recovery, or just defense?
In this episode, learn about advanced solutions for detecting and responding to threats, recovering swiftly from cyberattacks, and the innovative Anomaly Detection feature in PowerProtect Data Manager. Tune in to discover how Dell empowers businesses to stay ahead in an evolving threat landscape.
Storage often sits in the background of cybersecurity conversations—but not at Infinidat. In this episode, Eric Herzog, Chief Marketing Officer of Infinidat, joins Sean Martin to challenge the notion that storage is simply infrastructure. With decades of experience at IBM and EMC before joining Infinidat, Herzog explains why storage needs to be both operationally efficient and cyber-aware.Cyber Resilience, Not Just StorageAccording to Herzog, today's enterprise buyers—especially those in the Global Fortune 2000—aren't just asking how to store data. They're asking how to protect it when things go wrong. That's why Infinidat integrates automated cyber protection directly into its storage platforms, working with tools like Splunk, Microsoft Sentinel, and IBM QRadar. The goal: remove the silos between infrastructure and cybersecurity teams and eliminate the need for manual intervention during an attack or compromise.Built-In Defense and Blazing-Fast RecoveryThe integration isn't cosmetic. Infinidat offers immutable snapshots, forensic environments, and logical air gaps as part of its storage operating system—no additional hardware or third-party tools required. When a threat is detected, the system can automatically trigger actions and even guarantee data recovery in under one minute for primary storage and under 20 minutes for backups—regardless of the dataset size. And yes, those guarantees are provided in writing.Real-World Scenarios, Real Business OutcomesHerzog shares examples from finance, healthcare, and manufacturing customers—one of which performs immutable snapshots every 15 minutes and scans data twice a week to proactively detect threats. Another customer reduced from 288 all-flash storage floor tiles to just 61 with Infinidat, freeing up 11 storage admins to address other business needs—not to cut staff, but to solve the IT skills shortage in more strategic ways.Simplified Operations, Smarter SecurityThe message is clear: storage can't be an afterthought in enterprise cybersecurity strategies. Infinidat is proving that security features need to be embedded, not bolted on—and that automation, integration, and performance can all coexist. For organizations juggling compliance requirements, sprawling infrastructure, and lean security teams, this approach delivers both peace of mind and measurable business value.Learn more about Infinidat: https://itspm.ag/infini3o5dNote: This story contains promotional content. Learn more.Guest: Eric Herzog, Chief Marketing Officer, Infinidat | https://www.linkedin.com/in/erherzog/ResourcesLearn more and catch more stories from Infinidat: https://www.itspmagazine.com/directory/infinidatLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, eric herzog, storage, cybersecurity, automation, resilience, ransomware, recovery, enterprise, soc, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Explore actionable strategies for building a robust cyber resilience posture in this insightful episode. From strengthening defenses to improving recovery agility and anticipating future cybersecurity trends, this conversation delivers practical insights to help you stay a step ahead in protecting your digital landscape.
UK court blocks government's attempt to keep Apple encryption case secret. Port of Seattle says last year's breach affected 90,000 people. Verizon Call Filter App flaw exposes millions' call records. Hackers hit Australian pension funds. A global threat hiding in plain sight. Cybercriminals are yelling CAPTCH-ya! Meta retires U.S. fact-checking program. Our guest today is Rob Boyce from Accenture and he's discussing Advanced Persistent Teenagers (APTeens). And Google's AI Goes Under the Sea. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Rob Boyce, Global Lead for Cyber Resilience at Accenture, joins to discuss Advanced Persistent Teenagers (APTeens). Advanced Persistent Teenagers (APTeens) have rapidly become a significant enterprise risk by demonstrating capabilities once limited to organized ransomware groups, the threat from juvenile, homegrown threat-actors has risen steadily. Selected Reading UK Effort to Keep Apple Encryption Fight Secret Blocked in Court (Bloomberg) Port of Seattle says ransomware breach impacts 90,000 people (BleepingComputer) Call Records of Millions Exposed by Verizon App Vulnerability (SecurityWeek) Cybercriminals are trying to loot Australian pension accounts in new campaign (The Record) NEPTUNE RAT Attacking Windows Users to Exfiltrate Passwords from 270+ Apps (Cyber Security News) Threat Actors Using Fake CAPTCHAs and CloudFlare Turnstile to Deliver LegionLoader (Cyber Security News) Meta ends its fact-checking program in the US later today, replaces it with Community Notes (Techspot) Suspected Scattered Spider Hacker Pleads Guilty (SecurityWeek) This Alphabet Spin-off Brings “Fishal Recognition” to Aquaculture (IEEE Spectrum) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices