POPULARITY
(Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.) Three Buddy Problem - Episode 89: We discuss Iran hacktivist group 'Handala' wiper attacks against US medical device maker Stryker, Microsoft Intune MDM tool abuse, and whether Iran's cyber retaliation is as scary as the headlines suggest. Plus, ESET's discovery that Russia's APT28 original implant developers are back after years of silence, Dutch intelligence warnings on Russian campaigns targeting Signal and WhatsApp accounts, Apple finally patching Coruna exploit kit vulnerabilities for older iPhones, and Google sharing Coruna samples that raise new questions about the exploit kit's proliferation chain. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
In this week's episode of This Week in AML, Elliot Berman and John Byrne break down a wide-ranging set of developments shaping the financial crime landscape. They begin with the U.S. Treasury's three newly released national risk assessments—money laundering, terrorist financing, and proliferation financing—highlighting key findings on fraud trends, shell companies, NPO vulnerabilities, and geopolitical threats. Elliot and John also discuss emerging insights from the IRS on the value of CTRs, the White House's new cybersecurity strategy, upcoming AMLA public hearings in the EU, and AUSTRAC's expanded compulsory examination powers. Additional topics include recent enforcement actions targeting illicit Iranian oil networks, covert Russian vessel-protection teams, and FATF's updated consolidated assessment ratings. A must‑listen for compliance professionals looking to stay current in a rapidly shifting environment.
Max and Q cover the latest happenings in the world of Bitcoin, privacy and much more. AOBPrimeNew letter from KeonneQ vibing hardNEWSGrapheneOS announces Motorola partnershipTrump's "American Cyber Strategy" Puts Crypto on National Security MapSon of U.S. government contractor, accused of stealing millions in seized crypto, arrested in FranceTreasury tells congress mixers have valid privacy usesStrike now available in New YorkSolo Satoshi - Bitaxe TouchBitwise to donate $233,000 to open source Bitcoin devsUPDATES/RELEASESTailrelayA Docker container that exposes local services to your Tailscale network. Combines Tailscale VPN, Caddy reverse proxy, socat TCP relays, and a Web UI for browser-based management.https://github.com/sudocarlos/tailrelayStealth AnnouncedA privacy audit tool for Bitcoin wallets. Stealth analyzes the transaction history of a wallet descriptor and surfaces privacy findings from real on-chain heuristics.https://github.com/LORDBABUINO/stealth/tree/mainCake Wallet v6.0.0 / v6.0.1 — 27 Feb / 6 Mar 2026Major release: complete UI redesign plus self-custodial Bitcoin Lightning integration via Breez SDK and Spark protocol. Privacy-first defaults — Lightning invoices don't embed Spark addresses, transaction data not published to public explorers by default. Custom @cake.cash Lightning addresses. Enhanced Monero syncing.https://github.com/cake-tech/cake_wallet/releasesZeus v0.12.4 / v0.12.5 — 2 March 2026Bug fix releases addressing Android SQLite database issues for new wallets (sync past block 123,000), iOS safe area fixes, and crash prevention when returning from LSPS1 view.https://github.com/ZeusLN/zeus/releasesBlueWallet v7.2.6 — 23 February 2026Added BBQR support for Coldcard, simpler settings UI, and dates on transaction list.https://github.com/BlueWallet/BlueWallet/releasesFrostsnap v0.2.1 — 23 February 2026QR camera scanning now works on all platforms (Linux, macOS desktop). Fixed Electrum connectivity on IPv6 networks using "Happy Eyeballs" algorithm. Device erasure black screen fix and macOS app signing improvements.https://github.com/frostsnap/frostsnap/releasesPhoenix v2.7.5 — 25 Feb (Android) / 26 Feb (iOS) 2026Maintenance release for both platforms. Release notes were sparse — Q may want to check changelog manually.https://github.com/ACINQ/phoenix/releasesLNBits v1.5.0 — 4 March 2026Stable release (up from v1.4.2). Full changelog not detailed in release notes — worth checking manually if covering.https://github.com/lnbits/lnbits/releasesPeach Bitcoin v0.69.0 — 23 Feb / 3 Mar 2026New accounts now generate PGP keypairs from seed phrases, payment details encrypted and backed up to servers. Added M-Pesa payment method. Transaction IDs now copyable. Fixed Android wallet emptying bug.https://github.com/Peach2Peach/peach-app/releasesBitkey App Release 2026.2.0 — 23 February 2026Block/Square's hardware wallet app update. Detailed release notes not available from feed.https://github.com/proto-at-block/bitkey/releasesMempool v3.3.0-beta — 21 February 2026Beta release of v3.3.0. Details sparse.https://github.com/mempool/mempool/releasesStart9 StartOS v0.4.0-alpha.20 — 6 March 2026Alpha release with error info propagation, AI agent docs, preferred external ports beyond 443, SSH config fixes, WiFi deprecation handling.https://github.com/Start9Labs/start-os/releasesBlitz Wallet 4.0Payment poolshttps://x.com/BlitzWalletApp/status/2028867592065105932?s=20EDUCATIONLightning is dead, long live Lightning - Roy from BreezHater to builder - Seth from CakeHELP GET SAMOURAI A PARDONSIGN THE PETITION ----> https://www.change.org/p/stand-up-for-freedom-pardon-the-innocent-coders-jailed-for-building-privacy-tools DONATE TO THE FAMILIES ----> https://www.givesendgo.com/billandkeonneSUPPORT ON SOCIAL MEDIA ---> https://billandkeonne.org/VALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.(00:00) INTRO(00:57) THANK YOU FOUNDATION(01:38) THANK YOU CAKE WALLET(02:43) Vibe Cornin'(17:42) PRIME TIME(19:58) Notes From The Inside: The Skinwalker(23:43) Motorola Graphene(26:44) The Cyber Strategy(29:30) John "Lick" Daghita Arrested for Crypto Crimes(31:39) US Treasury Acknowledges Cryptocurrency 'Mixers'(33:50) Strike Obtains a Bit License (34:43) Bitaxe Touch Released(36:40) Bitwise to Donate $233,000 to BTC Open Source(37:32) BOOSTS(43:41) Tail Relay (45:02) Stealth Announced(47:39) The Big Cake 6.0.1 Release(48:41) The Rest of the Software Updates(52:14) Blixt Payment Pools(54:48) THANK YOU MYNYMBOX
This episode covers the latest in cybersecurity, AI vulnerabilities, government system security, and the importance of human validation in AI-driven security tools. Ryan, Shannon, and Chris discuss recent breaches, AI safety, and strategic government initiatives. Article: OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html FBI investigating ‘suspicious' cyber activity on system holding sensitive surveillance information https://federalnewsnetwork.com/cybersecurity/2026/03/fbi-investigating-suspicious-cyber-activity-on-system-holding-sensitive-surveillance-information/ President Trump's CYBER STRATEGY for America https://www.whitehouse.gov/wp-content/uploads/2026/03/president-trumps-cyber-strategy-for-america.pdf Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN
Tom Uren and Amberleigh Jack talk about the newly released Trump Cyber Strategy for America. The ideas in it are fine and occasionally even game-changing, but many of its goals have been undercut by the administration's actions to date. They also discuss the Coruna exploit kit, which is now known to have leaked from a US defence contractor. Exploits are so valuable that it is unrealistic to expect they can be kept secret. This episode is also available on Youtube. Show notes
On this week's show, Patrick Gray, Adam Boileau and James WIlson discuss the week's cybersecurity news. They cover: The Coruna exploits were L3 Harris, but it seems Triangulation… was not! Iran's cyber HQ hit by Israeli (kinetic) strikes Trump's cyber “strategy” is … well, all we've got is jokes cause there's no serious content NSA and CyberCom finally get a leader after Lt Gen Joshua Rudd gets Senate nod DOGE (remember them?!) employee walked a social security database out on a USB stick This episode is sponsored by open source cloud security scanner Prowler. Creator and CEO Toni de la Fuente talks to Pat about some of the enterprise features Prowler is growing, while remaining true to its open source roots. This episode is also available on Youtube. Show notes Inside Coruna: Reverse Engineering a Nation-State iOS Exploit Kit From JavaScript GitHub - matteyeux/coruna: deobfuscated JS and blobs US military contractor likely built iPhone hacking tools used by Russian spies in Ukraine APT36: A Nightmare of Vibeware State-linked actors targeted US networks in lead-up to Iran war Iranian cyber warfare HQ allegedly hit by Israel Last 2 names of 6 US soldiers who died in Kuwait attack identified by the Pentagon Signal, WhatsApp users face Russian phishing push, Dutch warn Samuel Bendett on X: "Russian military told it couldn't use Telegram messaging app" FBI investigating ‘suspicious' cyber activities on critical surveillance network Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime President Trump's CYBER STRATEGY for America Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens UK plans to shift fraud fight onto telecoms, tech companies Trump to hit Anthropic with executive order to remove "woke" AI Claude Anthropic launches code review tool to check flood of AI-generated code CrowdStrike reports record quarter amid investor concerns about AI impact Critical defect in Java security engine poses serious downstream security risks Gen. Joshua Rudd confirmed as NSA, Cyber Command head Plankey's nomination as CISA director now in jeopardy DOGE employee stole Social Security data and put it on a thumb drive, report says Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel Cel mai mare exportator român de carne, deținătorul brandului Cocorico, a intrat în restructurări, alături de Casa de Insolvență Transilvania
On today's Technology Report program, Dr. Jim Lewis of the Center for European Policy Analysis and Mark Montgomery of the Defense of Democracies and a Cyberspace Solarium Commission senior adviser join Defense & Aerospace Report Editor Vago Muradian to analyze the Trump administration's new National Cyber Strategy; whether strategy weighted toward offensive operations will succeed; how the administration will execute an interagency approach to cybersecurity when cyber capabilities across government and law enforcement have been gutted; the implications of issuing a strategy that doesn't name Russia and China that are America's leading cyber threats; whether commercial cyber firms can fill the gap in diminished government cyber capacity; takeaways from the Pentagon's feud with Anthropic; and an update on CMMC.
In this episode, I am pulling back the curtain on America's cybersecurity strategies. Too often, these strategies are just warm words that never translate into real action. I'm here to reveal why our current cyber policies are more talk than walk, and what needs to change before the next big breach hits. Whether you're a small business owner, government professional, or cybersecurity enthusiast, you'll want to hear the behind-the-scenes truth about why our lofty plans often fall flat in execution—and exactly what it takes to finally bring these policies to life.Join me as I dive into President Trump's recent cybersecurity strategy and expose the gaps between lofty goals and real-world results. You'll discover why repeated national frameworks like Zero Trust and post-quantum cryptography are just bureaucratic RSVPs if they lack enforcement. I'll break down the complex web of federal agencies—like CISA, NSA, and the National Cyber Director—and explain why fragmentation and legal limitations prevent any one agency from truly commanding the nation's cyber defense. Spoiler: there's no centralized authority, no unified command, and no teeth to enforce policies at scale.I'll also break down the six key pillars of America's cyber strategy—shaping adversary behavior, streamlining regulation, modernizing federal networks, securing critical infrastructure, protecting innovation, and building talent—and reveal why, despite their good intentions, most are recycled talking points lacking real follow-through. You'll learn why current federal initiatives are already years behind schedule, and what it really takes to turn strategy into execution—not just more memos, but actual authority, funding, and accountability.This episode underscores a harsh truth: without clear leadership, enforceable standards, and consequences for inaction, America's cyber defenses remain a patchwork of good ideas but poor results. If you're tired of empty policy paper promises and want to understand what must happen for real progress, this is essential listening. Navigate the truth behind the headlines with me and learn how we can finally move from planning to protection—before the next cyber crisis hits.Why listen? Because cybersecurity isn't just a tech issue—it's a national security challenge that depends on authority, accountability, and action. Whether you're a business owner or a policy wonk, get the inside scoop on why much of what's been promised is just talk, and what it really takes to secure the digital frontier.
In this week's Security Sprint, Dave and Andy covered the following topics:Opening:• Insider Threat: AI-equipped Employees - Gate 15 - 04 Mar 2026 • Communication and Collaboration Key Themes in GridEx VIII Lessons Learned Report • Health-ISAC Annual Report 2025 Shows Surge in Threat Intel and Tabletop Drills, Putting Resilience in Focus • The Gate 15 Special Edition: Iran, ISACs, & insomnia: What's happening, and not happening, in information sharing — Gate 15 | 06 Mar 2026• White House Unveils President Trump's Cyber Strategy for America — The White House | 06 Mar 2026o Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens — The White House o Ranking Member Thompson Statement on Trump's 3-Page Cyber Strategy — Democrats on the House Homeland Security Committee, 06 Mar 2026 • Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens — The White House | 06 Mar 2026Main Topics:Operation Epic Fury & Related: • White House blocks intelligence report warning of rising US homeland terror threat linked to Iran war • Iran may be activating sleeper cells in the United States, officials warn • Cyber threat bulletin: Iranian cyber threat response to US–Israel strikes February 2026, Canadian Centre for Cyber Security, 03 Mar 2026• Alert: NCSC advises UK organisations to take action following conflict in the Middle East, NCSC, 02 Mar 2026• U.S. threat intelligence units identify hacktivists as prime cyber vector in Iran conflict • Iran-linked hacktivists could target US state and local targets, experts warn • Trump Says ‘I Guess' Americans Should Worry About Iran Attacks Cyber Reports• NCC Group Annual Threat Monitor Review of 2025 NCC Group, 05 Mar 2026• Patch, track, repeat: The 2025 CVE retrospective — Cisco Talos, 05 Mar 2026• Look What You Made Us Patch: 2025 Zero-Days in Review Google Cloud Blog, 05 Mar 2026• Coalition report finds sharp rise in ransomware demands as most businesses refuse to pay — Reinsurance News | 07 Mar 2026• INC Ransom Affiliate Model Enabling Targeting of Critical Networks Australian Cyber Security Centre, 05 Mar 2026Quick Hits:• Top 10 artificial intelligence security actions: A primer Canadian Centre for Cyber Security, 05 Mar 2026• Artificial Intelligence and Machine Learning Supply Chain Risks and Mitigations Australian Signals Directorate, 04 Mar 2026• How AI Assistants Are Moving the Security Goalposts — Krebs on Security | 07 Mar 2026• Preparation hardening destructive attacks — Google Cloud Threat Intelligence | 08 Mar 2026• Tornadoes kill 6 people in Michigan and Oklahoma as powerful storms hit nation's midsection
Trump's Cyber Strategy Weaponizes Ai Against Key Takeaways • Ai trained to protect Satanist Norms, Culture, Noahide Laws, Evil • Ai will be weaponized to detect, deceive, subdue adversaries • Ai will be used with private corporations that with new regulation, by passes laws / Constitution • Ai will be used to thwart free speech deemed as propaganda, satanic culture subversion, influence operations – bold preachers, bold truth tellers, Constitutionals, Anti MOTB people, medical freedom activists, etc.. • Cyber strategy goes against adversaries – will that be Christians or so called domestic terrorists
In this week's episode of the Coin Stories News Block powered exclusively by Ledn, we cover these major headlines related to Bitcoin, macroeconomics, and global finance: Iran War oil crisis? Gas and jet fuel prices soar Kraken wins historic Fed master account Trump demands Congress to pass CLARITY Act, blames banks $46M in U.S. Government Bitcoin stolen and recovered thanks to pseudonymous investigator NEW: A foreign central bank is buying Bitcoin ------------------------------------ The News Block is powered exclusively by Ledn – the global leader in Bitcoin-backed loans, issuing over $9 billion in loans since 2018, and they were the first to offer proof of reserves. With Ledn, you get custody loans, no credit checks, no monthly payments, and more. My followers get .25% off their first loan. Learn more at www.ledn.io/natalie ---- Order my new intro to Bitcoin book "Bitcoin is For Everyone": https://amzn.to/3WzFzfU ---- Read every story in the News Block with visuals and charts! Join our mailing list and subscribe to our free Bitcoin newsletter: https://thenewsblock.substack.com —- References mentioned in the episode: Reuters: Kuwait Cuts Oil Production as Precaution Amid Iran Tensions Bloomberg: Why the Iran War Is Prompting Force Majeure Declarations Commercial and Supply Chain Implications of the Gulf Conflict Trump Proposes Increased Defense Budget to $1.5 Trillion CRFB: $1.5 Trillion Military Budget Would Add $5.8 Trillion to Debt President Trump's Truth Social Post on GENIUS Act, CLARITY Act Bitcoin Magazine: Kazakhstan's Central Bank to Invest in Bitcoin Reuters: Kazakhstan Central Bank to Invest Up to $350M in Crypto Assets White House: President Trump's Cyber Strategy for America White House: Unveils President Trump's Cyber Strategy for America Jason Lowery's Tweet on BTC as Emerging Security Priority in the U.S. FBI Director Kash Patel's Announcement of John Daghita Arrest ZachXBT Responds to Arrest Stemming from His Investigation ZachXBT: Investigation Thread on $46M Government Bitcoin Theft Bitcoin Magazine: U.S. Crypto Contractor Arrested for Theft of Seized Assets CoinDesk: Son of U.S. Government Contractor Accused of Stealing Millions Pierre Rochard: Commentary on SBR Audit and Contractor Accountability Pierre Rochard's Commentary on BTC Stolen from Strategic Bitcoin Reserve WSJ: Kraken Becomes First Crypto Firm to Be Granted Fed Master Account CoinDesk: Kraken's Surprise Fed Win May Usher in More Crypto Firms Kraken Blog: Federal Reserve Master Account Announcement Bank Policy Institute: Statement on Kraken Master Account The Block: Bank Groups Concerned About Kraken Master Account ---- Upcoming Events: Bitcoin 2026 will be here before you know it. Get 10% off Early Bird passes using the code HODL: https://tickets.b.tc/event/bitcoin-2026?promoCodeTask=apply&promoCodeInput= ---- This podcast is for educational purposes and should not be construed as official investment advice. ---- VALUE FOR VALUE — SUPPORT NATALIE'S SHOWS Strike ID https://strike.me/coinstoriesnat/ Cash App $CoinStories #money #Bitcoin #investing
Trump Cyber Strategy Signals Crypto Boom | XRP & Flare Price Action? Crypto and geopolitics are colliding in ways that could reshape the global financial system. The White House has released a new Cyber Strategy for America, signaling that emerging technologies like blockchain and digital assets are becoming strategically important for the United States. At the same time, a next-generation trade finance platform built on the XRP Ledger has officially launched, enabling near-instant settlement for transactions that historically took several days. Meanwhile Flare Networks is expanding the programmability of the XRP ecosystem, potentially unlocking new use cases for decentralized finance, real-world assets, and institutional blockchain adoption. Adding to the momentum, Florida has passed the first state-level stablecoin regulatory framework, highlighting how digital dollars are rapidly becoming part of official financial policy. Tonight we break down: • Trump's Cyber Strategy and blockchain leadership • Flare Networks as a compute layer for XRPL • Florida's stablecoin legislation • Crypto infrastructure and geopolitical power shifts The financial system may be evolving faster than many realize. SUPPORT ON THE CHAIN GRAB A BADASS YETIS COFFEE – Fuel your crypto grind! ☕ Visit: badasserycoffee.com MINT YOUR BADASS YETIS NFT – Own a piece of the legend! Visit: otc.one/mint OTC MERCH IS HERE! – Represent the community in style! Visit: onthechain.shop BUY US A COFFEE – Help keep the content flowing! Visit: otc.one/buy-us-a-coffee JOIN THE CHANNEL – Get exclusive perks & behind-the-scenes content! Visit: otc.one/join ON THE CHAIN – CONNECT WITH US! Listen to the OTC Podcast – Never miss an update! Visit: otc.one/podcast Visit Our Website – The home of crypto insights! Visit: onthechain.io Follow OTC on X – Stay updated in real time! Visit: otc.one/x ⚠️ DISCLAIMER This content is for informational and entertainment purposes only. Nothing discussed on this channel constitutes financial, investment, or legal advice. Always conduct your own research before making financial decisions.
US federal agencies told to crack down on scams and cybercrime, the White House releases its new Cyber Strategy, suspected Chinese hackers breach the FBI's wiretap network, and Romania's largest meat exporter is insolvent after a ransomware attack. Show notes Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime
Parce que… c'est l'épisode 0x720! Shameless plug 31 mars au 2 avril 2026 - Forum INCYBER - Europe 2026 14 au 17 avril 2026 - Botconf 2026 20 au 22 avril 2026 - ITSec Code rabais de 15%: Seqcure15 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2026 - SSTIC 2026 19 septembre 2026 - Bsides Montréal 1 au 3 décembre 2026 - Forum INCYBER - Canada 2026 24 et 25 février 2027 - SéQCure 2027 Notes IA La chicane OpenAI says Pentagon set ‘scary precedent' binning Anthropic How OpenAI caved to the Pentagon on AI surveillance OpenAI Just Got Anthropic's Pentagon Deal Anthropic CEO Dario Amodei calls OpenAI's messaging around military deal ‘straight up lies,' report says Altman said no to military AI – then signed Pentagon deal Anthropic sues US over national security blacklist Près de 900 employés de Google et OpenAI réclament des limites sur l'IA militaire La sécurité qu'ils disent Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy Claude Code Security vs. OpenAI Codex Security – AI Arms Race Plus vite que la vérification How Claude Code escapes its own denylist and sandbox Claude Code deletes developers' production setup, including its database and snapshots — 2.5 years of records were nuked in an instant Your LLM Doesn't Write Correct Code. It Writes Plausible Code. Verification debt: the hidden cost of AI-generated code Usage pas si sécuritaire AI doctor's assistant swayed to change scrips - researchers New York Could Prohibit Chatbot Advice on Medical, Legal, and Engineering Questions L'agent (Smith) de tous les chaos Chrome Gemini Vulnerability Lets Attackers Access Victims' Camera and Microphone Remotely Critical OpenClaw Vulnerability Exposes AI Agent Risks OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk The Panopticon Is Here: How the US Government Built an AI Superweapon for Social Control How Deepfakes and Injection Attacks Are Breaking Identity Verification CyberStrikeAI : cet outil dopé à l'IA automatise les cyberattaques AI-generated art can't be copyrighted after Supreme Court declines to review the rule LLMs can unmask pseudonymous users at scale with surprising accuracy Chardet : quand une IA réécrit un logiciel open source en cinq jours et change sa licence elder-plinius/OBLITERATUS: OBLITERATE THE CHAINS THAT BIND YOU La guerre, la guerre, c'est pas une raison pour se faire mal! Attacks on GPS Spike Amid US and Israeli War on Iran Iran's cyberwar has begun Israeli spies ‘hacked every traffic camera in Tehran to plot killing of Iran's Ayatollah Ali Khamenei' ‘Hundreds' of Iranian hacking attempts hit IP cameras Businesses told to harden defenses amid Iran conflict risk Kevin Beaumont: “If you're wondering what I'm s…” - Cyberplace Cyber Command disrupted Iranian comms, sensors, top general says Top general spotlights cyber role in Iran conflict Iran War Provides a Large-Scale Test for AI-Assisted Warfare Hiding A Bomb In Plain Sight Souveraineté ou tout ce que je peux faire sur mon terrain Can Europe break free of Visa and Mastercard? MEPs stall digital euro Office EU touts new European online productivity suite Bureautique : l'Europe lance son alternative à Microsoft 365, mais utilise quand même Excel Privacy ou tout ce qui devrait rester à la maison Tire Pressure Systems in Toyota, Mercedes, and Other Major Car Brands Enable Silent Vehicle Tracking Motorola's new partnership with GrapheneOS Meta's AI Smart Glasses and Data Privacy Concerns: Workers Say “We See Everything” Anonymous credentials: an illustrated primer A new app alerts you if someone nearby is wearing smart glasses TikTok says it won't encrypt DMs claiming it puts users at risk System76 on Age Verification Laws X Users Find Their Real Names Are Being Googled in Israel After Using X Verification Software “Au10tix” The banality of surveillance Deveillance Red ou tout ce qui est brisé Le fisc sud-coréen publie carrément ses mots de passe crypto dans un communiqué de presse Des outils de piratage d'iPhone conçus par les États-Unis finissent chez les cybercriminels FBI targeted with ‘suspicious' activity on its networks 900+ Certificates Used by Fortune 500, Governments Exposed by Key Leaks FBI probing intrusion into system managing sensitive surveillance information Blue ou tout ce qui améliore notre posture How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers Reading White House President Trump's Cyber Strategy for America Merkley, Klobuchar Launch New Effort to Ban Federal Elected Officials Profiting from Prediction Markets Insolites Microsoft gets tired of “Microslop,” bans the word on its Discord, then locks the server after backlash Collaborateurs Nicolas-Loïc Fortin Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc
XRP Rails Activated | Trump Cyber Strategy & Banks Not Ready The financial system may be entering a new phase. The White House has released a new Cyber Strategy for America, and it explicitly identifies cryptocurrency and blockchain as technologies the United States must secure and lead globally. At the same time, the XRP ecosystem continues expanding across institutional finance. Recent developments include: • Ripple Prime clients gaining access to Coinbase Derivatives markets • SEC staff guidance making it easier for broker-dealers to treat certain stablecoins like cash • Ripple continuing to build infrastructure across global financial rails • Increasing institutional engagement with blockchain settlement networks Meanwhile the geopolitical backdrop continues shifting. Iran tensions are escalating, defense production is ramping, and global political alignments are evolving — all while financial infrastructure is quietly being rebuilt. The question now is: What role will crypto play in the next global financial system? Tonight Jeff and Chip break down the intersection of: • XRP and institutional infrastructure • Crypto policy and national cyber strategy • Stablecoin adoption by financial institutions • Global geopolitical developments impacting finance • The evolving architecture of the banking system If you want to understand how crypto, geopolitics, and the financial system are converging, this is the stream to watch. SUPPORT ON THE CHAIN GRAB A BADASS YETIS COFFEE – Fuel your crypto grind! ☕ Visit: badasserycoffee.com MINT YOUR BADASS YETIS NFT – Own a piece of the legend! Visit: otc.one/mint OTC MERCH IS HERE! – Represent the community in style! Visit: onthechain.shop BUY US A COFFEE – Help keep the content flowing! Visit: otc.one/buy-us-a-coffee JOIN THE CHANNEL – Get exclusive perks & behind-the-scenes content! Visit: otc.one/join ON THE CHAIN – CONNECT WITH US! Listen to the OTC Podcast – Never miss an update! Visit: otc.one/podcast Visit Our Website – The home of crypto insights! Visit: onthechain.io Follow OTC on X – Stay updated in real time! Visit: otc.one/x ⚠️ DISCLAIMER This content is for informational and entertainment purposes only. Nothing discussed on this channel constitutes financial, investment, or legal advice. Always conduct your own research before making financial decisions.
Security teams are under more pressure than ever, reacting at human speed while systems, identities, and AI agents operate at machine speed. In this episode of Security Matters, host David Puner sits down with cybersecurity leader and former FBI executive MK Palmore to explore why defenders struggle to keep pace and what it takes to regain control.From AI agents that overshare sensitive data to cloud misconfigurations that never seem to disappear to the persistent success of ransomware, MK explains how complexity, vendor sprawl, and overloaded teams create gaps that attackers continue to exploit. The conversation highlights how identity across human, machine, and emerging agent types has become the center of modern security and why fundamentals, prioritization, and platform thinking matter more than ever.Listeners will hear insight on: • Identity at machine speed and the rise of autonomous access • Why attackers still win more than 51 percent of the time • How ransomware continues to succeed despite industry progress • Why SMBs face “mission impossible” expectations • The true cost of vendor sprawl and operational overload • What effective security leadership looks like in the current threat environmentIf you work in identity, security operations, strategy, or leadership, this discussion cuts through hype and focuses on the realities defenders face and how to push back against the constant pressure of the tyranny of the now.
This week on Cyber Uncut, David Hollingworth and Bethany Alvaro discuss the murky world of employee data theft, look at a pair of ransomware attacks – one local, one a touch further afield – and take a look at the new cyber security strategy announced by the NSW government. The podcast opens with research that suggests the new year, and January in particular, is a prime time for employees to make off with important business data, either by accident or accidentally on purpose. In cyber security news, World Leaks has taken responsibility for hacking athletics giant Nike, while the Anubis operation has shared passports and legal documents it stole from a New Zealand law firm. Hollingworth also breaks down a cyber security tabletop exercise he recently took part in, and why they are an essential part of any organisation's cyber resilience strategy. Finally, the eSafety Commissioner is asking people to dob in kids getting around the social media ban, while the pair share some insights from the experts for World Data Privacy Day. Enjoy, The Cyber Uncut team
On this episode 191 of the Disruption Now podcast:What happens when an algorithm knows more about your health than your doctor ever will? When AI can process threats faster than any human operator? When China, Russia, Iran, and North Korea are probing our systems 24/7?Dr. Richard Harknett has spent 30+ years answering these questions at the highest levels. As the first Scholar-in-Residence at US Cyber Command and NSA, a key architect of the US Cybersecurity Strategy 2023, and Fulbright Professor in Cyber Studies at Oxford, he's one of the few people who's seen how cyber threats actually unfold—and what we're doing (or not doing) about them.In this conversation, Richard breaks down:
This week on Cyber Uncut, David Hollingworth and Bethany Alvaro discuss the murky world of employee data theft, look at a pair of ransomware attacks – one local, one a touch further afield – and take a look at the new cyber security strategy announced by the NSW government. The podcast opens with research that suggests the new year, and January in particular, is a prime time for employees to make off with important business data, either by accident or accidentally on purpose. In cyber security news, World Leaks has taken responsibility for hacking athletics giant Nike, while the Anubis operation has shared passports and legal documents it stole from a New Zealand law firm. Hollingworth also breaks down a cyber security tabletop exercise he recently took part in, and why they are an essential part of any organisation's cyber resilience strategy. Finally, the eSafety Commissioner is asking people to dob in kids getting around the social media ban, while the pair share some insights from the experts for World Data Privacy Day. Enjoy, The Cyber Uncut team
In dieser Episode von career to go geht's um die Frage, wie Cyber Security dort entsteht, wo Business-Entscheidungen, Technologie und Transformation zusammenkommen: in Cyber Strategy & Transformation bei Deloitte.
Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box VisitorLive from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina's unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/ Chapters:00:00 Introduction to Cybersecurity and B-Sides Jacksonville01:16 Gina Yacone's Unique Journey to Cybersecurity06:22 Navigating Burnout in Cybersecurity08:06 The Importance of Raising Your Hand10:04 Adapting Leadership Styles in Different Roles 14:03 Being a Role Model for Women in Cybersecurity16:34 How to Establish a Good Mentee and Mentor Relationship18:50 Feedback and Constructive Criticism22:55 The Value of Hallway Conversations26:19 The Lifestyle Polygraph: Fun and Insights38:54 Conclusion and Future Connections
A critical issue is emerging as organizations embed AI agents into workflows: securing agentic AI requires a very different approach to security. In this episode, Accenture CISO Kris Burkhardt breaks down what's at stake with Daniel Kendzior who leads Security AI Reinvention for Accenture Cybersecurity and Wei Liu who leads Cyber Strategy, Risk, and Innovation for Accenture Information Security. Discover why traditional security frameworks fall short for agentic systems, how to create security boundaries without stifling progress, and why starting small and scaling fast is a strong strategy. The big takeaway? Security practitioners can't let the excitement around agentic AI distract them from security basics.
Predator spyware spotted across several countries Russia blocks FaceTime Draft US cyber strategy set for January release Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. Get started at Vanta.com/CISO
Executives say they're confident in their cybersecurity, but their teams aren't so sure.In this episode of Darnley's Cyber Café, we explore the growing cybersecurity perception gap between leadership and practitioners, why it matters, how to fix it, and what it reveals about the state of cyber resilience in 2025. Tune in to uncover how confidence can turn into complacency, and how awareness can become your greatest defence.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
Craig Ford is the Director and Cofounder of Cyber Unicorns. He is the author of three different book series with a total of seven books, as well as a freelance cybersecurity journalist with works in magazines such as Women in Security, Cyber Australia, and Cyber Today, among others. In this episode, Ford joins host David Braue to discuss his role as a fractional CISO, as well as his work at Cyber Unicorns, published books, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com
A looming deadline always gets attention, and for DoD suppliers, the clock is ticking. On October 1, 2025, the Department of Defense will begin including Cybersecurity Maturity Model (CMMC) certification requirements in new contracts. This week on Feds At The Edge, four leading experts cut through the complexity and share practical guidance to help you start, or finish, your CMMC journey. Sean Frazier, Federal Chief Security Officer for Okta, explains why “Know Thy Data” is the key to applying the right level of security where it matters most. Alan Dinerman, PhD, Senior Manager, Cyber Strategy, Policy, and Privacy at Mitre, puts CMMC in context with other cybersecurity standards, noting its focus on Controlled Unclassified Information. And Jeff Adorno, Field Chief Compliance Officer at ZScaler, warns of risks in the AI era, where sensitive data can unintentionally “leak” into Large Language Models. The panel as a whole highlights how aligning with existing frameworks and using current technologies can demonstrate progress to auditors and ease compliance. Listen now on your favorite podcast platform because whether you're deep into compliance or just getting started, this conversation will help you navigate the evolving landscape of CMMC and beyond.
August 13, 2025 - Join us for a discussion on the rising scale and sophistication of North Korea's cyber operations with Mitch Haszard, senior threat intelligence analyst at Recorded Future, and Scott Kardas, geopolitical threat intelligence analyst at Recorded Future. How does North Korea's cyber activities fit into the Kim regime's larger goals? How can the U.S., South Korea, and the broader international community respond to this threat? This program will follow the evolution and growing magnitude of the regime's cyber operations and its attacks. The conversation will be moderated by policy program officer Chelsie Alexandre. https://www.recordedfuture.com/research/north-koreas-cyber-strategy https://www.recordedfuture.com/research/north-koreans-continue-to-use-foreign-technology https://www.recordedfuture.com/research/inside-the-scam-north-koreas-it-worker-threat The Korea Society thanks our corporate sponsors and individual members and the Korea Foundation for their generous support, which has made this program possible. For more information, please visit the link below: https://www.koreasociety.org/policy-and-corporate-programs/2015-north-koreas-evolving-cyber-strategy
Send us a textCan cold plunges and clear values make you a better cybersecurity leader? In this introspective and energetic episode from IT Nation Secure 2025, Joey Pinz speaks with Joel Cahill—Wall Street veteran, father, and founder of Infima—to explore personal growth, MSP success, and how simplicity and service win in cybersecurity.
Podcast: IoT Security Podcast (LS 24 · TOP 10% what is this?)Episode: Securing the Foundation: Cyber Strategy in the Age of Smart InfrastructurePub date: 2025-05-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCybersecurity is redefined as a discipline for the curious and adaptable, with a focus on continuous learning, imagination, and embracing change. On location at the RSA Conference, host Phillip Wylie and Anand Singh discusses the evolving challenges of IoT and OT security, the rapid integration of AI, and how organizations must address overlooked endpoints and fragmented infrastructures. There is an emphasis on practical advice for CISOs and cybersecurity practitioners, underscoring the importance of foundational security practices, data visibility, identity management, and mental well-being in high-stress leadership roles.The role of curiosity and adaptability in cybersecurity careersOverlooked risks and challenges in IoT and OT device securityThe transformative impact of AI and the importance of securing AI adoptionPractical strategies for asset, identity, and data managementMaintaining work-life balance and resilience for CISOs and security leaders Let's connect about IoT Security!Follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcastThe podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Cybersecurity is redefined as a discipline for the curious and adaptable, with a focus on continuous learning, imagination, and embracing change. On location at the RSA Conference, host Phillip Wylie and Anand Singh discusses the evolving challenges of IoT and OT security, the rapid integration of AI, and how organizations must address overlooked endpoints and fragmented infrastructures. There is an emphasis on practical advice for CISOs and cybersecurity practitioners, underscoring the importance of foundational security practices, data visibility, identity management, and mental well-being in high-stress leadership roles.The role of curiosity and adaptability in cybersecurity careersOverlooked risks and challenges in IoT and OT device securityThe transformative impact of AI and the importance of securing AI adoptionPractical strategies for asset, identity, and data managementMaintaining work-life balance and resilience for CISOs and security leaders Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
Identifying and removing barriers to cyber resilienceReducing complexity - consolidating and eliminating legacy systemsBuilding a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford:https://www.linkedin.com/in/jonathanbcraven/Heather Lowrie, Independent Advisor, Earthgard Ltdhttps://www.linkedin.com/in/heather-lowrie/Sasha Henry, Cyber Strategy & Resilience Advisor, Confidentialhttps://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/James Tucker, Head of CISO, International, Zscalerhttps://www.linkedin.com/in/jamesjtucker/
In this episode, they discuss:Building consumer trust in generative AI is essential for its success in health care.Deloitte plays a significant role in the health care sector, serving various stakeholders.A majority of consumers believe generative AI can reduce wait times and costs.Skepticism towards generative AI has increased among consumers over the past year.Distrust in AI tools is linked to concerns about bias and privacy.Health care data is a high-value target for cyber adversaries.Generative AI can enhance the patient-physician relationship if used correctly.Transparency and ethics are crucial in the deployment of generative AI.Healthcare organizations must educate both patients and clinicians about AI.Deloitte assists organizations in navigating the complexities of AI implementation. Learn more about Deloittes research here : Building and maintaining health care consumers' trust in generative AIhttps://www2.deloitte.com/us/en/insights/industry/health-care/consumer-trust-in-health-care-generative-ai.html A little about Jen:Jen Sullivan, Principal, Deloitte & Touche LLP, is a seasoned and innovative cyber strategy leader with 28 years of experience in technology and cybersecurity, with 24 years of deep focus in life sciences and health care. Her technical infrastructure background has expanded throughout her tenure to a range of security areas including cyber strategy, threat detection and response, data protection and privacy, regulatory compliance, and technical resiliency. Jen serves some of the industry's largest and most complex clients and leads Deloitte's Cyber Strategy and Transformation practice. Beyond client service, she has held pivotal leadership roles in talent and business transformation and has a deep passion around health equity. Jen serves on Deloitte's Cyber executive leadership team, is a leader in Women in Cyber and is the Advisory Life Sciences & Health Care Generative AI leader.
In this episode, Cam Whittfield is joined by Carolyn Pugsley, an advisor to boards and a leader in corporate governance advice. Together we continue our discussion with David Thodey. Today, we shift focus to some of the more challenging themes. We talk about the Cyber Strategy and payment of extortion demands. We also ask for David's guidance for directors when dealing with the cyber challenge and ask him whether we are winning the cyber battle. We start this podcast by asking for his observations on the responsibility that educational institutions play in helping with cyber education uplift. Again, David's thoughts are both considered, insightful and practical. Thanks again for listening. This is Cross Examining David Thodey, part 2. Here we go…
A look at the top priorities for CFOs and finance leaders in the coming year — among them, security and privacy of data, financial and strategic planning and analysis, leadership, and enhanced data analytics — reveals a tale of transformation for CFOs whose responsibilities continue to widen.Protiviti recently conducted its latest Global Finance Trends Survey and has detailed the results in our report, TRANSFORM: Assessing CFO and finance leader perspectives and priorities for the coming year.In this podcast, we talk with Protiviti managing directors Chris Wright and Nick Puetz about some of the key findings and trends revealed in the results.Chris is the global leader of Protiviti's Business Performance Improvement solution.Nick leads Protiviti's Cyber Strategy and transformation practice.For more information on Protiviti's latest global finance survey, visit www.protiviti.com/us-en/survey/global-finance-trends-survey.
Guest: Jason Healey, Senior Research Scholar, Cyber Conflict Studies, SIPA at Columbia University [@Columbia]On LinkedIn | https://www.linkedin.com/in/jasonhealey/At BlackHat: https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesOpening Remarks:Sean Martin and Marco Ciappelli set the stage with their signature banter, creating an inviting atmosphere for a deep dive into cybersecurity. Marco introduces a philosophical question about measuring success and improvement in the field, leading seamlessly into their conversation with Jason Healey.Meet the Expert:Sean introduces Jason Healey, a senior research scholar at Columbia University and a former military cybersecurity leader with extensive experience, including roles at the Pentagon and the White House. Jason shares his excitement for Black Hat 2024 and the anniversary celebrations of ITSPmagazine, expressing anticipation for the discussions ahead.The Role of Defense in Cybersecurity:Jason previews his journey from military service to academia, posing the critical question, “Is defense winning?” He provides a historical perspective, noting that cybersecurity challenges have been present for decades. Despite significant investments and efforts, attackers often seem to maintain an edge. This preview sets the stage for a deeper exploration of how to measure success in defense, which he plans to address in detail at the conference.Shifting the Balance:Jason highlights the need for a comprehensive framework to evaluate the effectiveness of defense mechanisms. He introduces the concept of metrics like “mean time to detect,” suggesting that these can help gauge progress over time. Jason plans to discuss the importance of understanding system-wide dynamics at Black Hat, emphasizing that cybersecurity is about continual improvement rather than quick fixes.Economic Costs and Broader Impacts:Sean shifts the discussion to the economic aspects of cybersecurity, a topic Jason is set to explore further at the event. Jason notes that while financial implications are substantial, other indicators, such as the frequency of states declaring emergencies due to cyber incidents, provide a broader view of the impact. He underscores the need to address disparities in cybersecurity protection, pointing out that not everyone has access to the same level of defense capabilities.Community and Collaboration:Marco and Jason discuss the importance of community involvement in improving cybersecurity. Jason stresses the value of shared metrics and continuous data analysis, calling for collective efforts to build a robust defense against evolving threats. This theme of collaboration will be a key focus in his upcoming session.Looking Forward:As they wrap up, Sean and Marco express their anticipation for Jason's session at Black Hat 2024. They encourage the audience to join in, engage with the topics discussed, and contribute to the ongoing conversation on cybersecurity.Conclusion:Sean concludes by thanking Jason for his insights and highlighting the importance of the upcoming Black Hat sessions. He invites listeners to follow ITSPmagazine's coverage for more expert discussions and insights into the field of cybersecurity.For more insightful sessions and expert talks on cybersecurity, make sure to follow ITSPmagazine's Black Hat coverage. Stay safe and stay informed!Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode's SponsorsLevelBlue: https://itspm.ag/levelblue266f6cCoro: https://itspm.ag/coronet-30deSquareX: https://itspm.ag/sqrx-l91____________________________Follow our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasOn YouTube:
Guest: Jason Healey, Senior Research Scholar, Cyber Conflict Studies, SIPA at Columbia University [@Columbia]On LinkedIn | https://www.linkedin.com/in/jasonhealey/At BlackHat: https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesOpening Remarks:Sean Martin and Marco Ciappelli set the stage with their signature banter, creating an inviting atmosphere for a deep dive into cybersecurity. Marco introduces a philosophical question about measuring success and improvement in the field, leading seamlessly into their conversation with Jason Healey.Meet the Expert:Sean introduces Jason Healey, a senior research scholar at Columbia University and a former military cybersecurity leader with extensive experience, including roles at the Pentagon and the White House. Jason shares his excitement for Black Hat 2024 and the anniversary celebrations of ITSPmagazine, expressing anticipation for the discussions ahead.The Role of Defense in Cybersecurity:Jason previews his journey from military service to academia, posing the critical question, “Is defense winning?” He provides a historical perspective, noting that cybersecurity challenges have been present for decades. Despite significant investments and efforts, attackers often seem to maintain an edge. This preview sets the stage for a deeper exploration of how to measure success in defense, which he plans to address in detail at the conference.Shifting the Balance:Jason highlights the need for a comprehensive framework to evaluate the effectiveness of defense mechanisms. He introduces the concept of metrics like “mean time to detect,” suggesting that these can help gauge progress over time. Jason plans to discuss the importance of understanding system-wide dynamics at Black Hat, emphasizing that cybersecurity is about continual improvement rather than quick fixes.Economic Costs and Broader Impacts:Sean shifts the discussion to the economic aspects of cybersecurity, a topic Jason is set to explore further at the event. Jason notes that while financial implications are substantial, other indicators, such as the frequency of states declaring emergencies due to cyber incidents, provide a broader view of the impact. He underscores the need to address disparities in cybersecurity protection, pointing out that not everyone has access to the same level of defense capabilities.Community and Collaboration:Marco and Jason discuss the importance of community involvement in improving cybersecurity. Jason stresses the value of shared metrics and continuous data analysis, calling for collective efforts to build a robust defense against evolving threats. This theme of collaboration will be a key focus in his upcoming session.Looking Forward:As they wrap up, Sean and Marco express their anticipation for Jason's session at Black Hat 2024. They encourage the audience to join in, engage with the topics discussed, and contribute to the ongoing conversation on cybersecurity.Conclusion:Sean concludes by thanking Jason for his insights and highlighting the importance of the upcoming Black Hat sessions. He invites listeners to follow ITSPmagazine's coverage for more expert discussions and insights into the field of cybersecurity.For more insightful sessions and expert talks on cybersecurity, make sure to follow ITSPmagazine's Black Hat coverage. Stay safe and stay informed!Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode's SponsorsLevelBlue: https://itspm.ag/levelblue266f6cCoro: https://itspm.ag/coronet-30deSquareX: https://itspm.ag/sqrx-l91____________________________Follow our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasOn YouTube:
After the Supreme Court limited the power of federal agencies to craft regulations, it's likely up to Congress to keep US cybersecurity policy intact. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Recently, British journalist Juliette Foster interviewed Steve for a feature in The European, and today we're listening to that conversation. Steve and Juliette explore a range of topics, including how to get buy-in to your security strategy at all levels of the organization, how much security should cost, navigating the regulatory landscape, and which industries and enterprises Steve believes could be templates for security. Key Takeaways: 1. Good cyber strategy aligns with business strategy, is quantifiable, and involves all employees. 2. Durbin suggests involving security in project planning to avoid retrofitting security measures. 3. Durbin suggests that security teams need to spend more time explaining security implications to business leaders in a way they can understand. 4. Durbin suggests that leaders must create a personal investment in security by providing feedback and justifying costs in a way that resonates with each individual's role and responsibilities. 5. Durbin highlights the evolving regulatory landscape, with a shift from standardization to protectionism and complexity for organizations. 6. Durbin highlights the evolving threat landscape, including malware, ransomware, and phishing attacks. Tune in to hear more about: 1. Aligning cybersecurity strategy with business goals and outcomes (1:36) 2. Cybersecurity strategies, testing, and budgeting (10:42) 3. Regulation complexity and its impact on businesses (18:00) 4. Cybersecurity investment, risk management, and emerging threats (22:44) 5. Evolving cyber threats and the importance of resilience (26:58) Standout Quotes: 1. “What is important for organizations is not to become over fixated on the threats — that's necessary, obviously, to have a good defense — but also to figure out this whole notion of resilience. How quickly could we get our systems back up and running? How quickly could we get our organization functioning again? How are we going to recover our data? Where are we storing it? Those sorts of things.” - Steve Durbin 2. “... the crux of good cyber strategy is having an alignment with a business strategy happening in alignment with what it is that the organization is looking to do on a daily basis, which in the majority of cases is: increase revenue, increase shareholder value, deliver back to employees, customers, and to further the ideals of the organization.” - Steve Durbin 3. “So the role of the security leader in any budget cycle is to try to align whatever spend she or he wishes to have with the future direction of travel of that organization. And if you can start to do that, then the whole conversation becomes very much easier. But I'm not a huge fan of setting fairly random percentages, because I think it sends entirely the wrong message. You run the risk of overspend or underspend. And what you actually want to be doing is spending appropriately to deliver the right level of protection for your critical assets, for your company, for your employees, for your shareholders, so that you can continue to provide a thriving environment.” - Steve Durbin Mentioned in this episode: ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.
In this episode, we finish our cross examination of Andy Penn, previously CEO of Telstra and more recently the Chair of the Government's Expert Advisory Board . The conversation just gets better... Andy makes some insightful comments about the similarities between our physical world and our digital world, and how this should guide our measure of success. We also take a closer look at the Cyber Strategy, the value in placing responsibility on those best placed to take responsibility, what does "good" look like, the value in managing data holdings, threat sharing / locking, the benefit of transparency and reporting (rather than banning extortion). Andy also makes some incredibly relevant (and sobering) observations on the impact that compute power and quantum computing will have on our security settings (“…a Y2K event when don't know the date…”). Finally, I ask Andy “what makes a great lawyer”? Luckily, we come out of that question relatively unscathed. This is Episode 6 of our podcast series. Cross examining Andy Penn. Here we go… +++ Cyber Risk Survey 2024 now live! Following the success of our inaugural Cyber Risk Survey in 2023, we are once again surveying in-house lawyers to better understand their cyber-related experiences and concerns. This year, our survey is going global! If you are an in-house lawyer in Australia, Asia, the UK, Europe, the Middle East or the US, we would love your insights! Complete our survey here: hsfuk.eu.qualtrics.com/jfe/form/SV_8fdxhAEb0VCmAUS
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The White House's National Cybersecurity Strategy tasks government agencies, industry and other organizations with guarding against cyber crime across the online environment. For the FBI, the strategy amplified and clarified the Bureau's role across law enforcement efforts. FBI Cyber Deputy Assistant Director Cynthia Kaiser discussed at the RSA Conference in San Francisco how the strategy's agile approach to cybersecurity and how it strengthens defenses. She also discusses how the good guys stay ahead of the bad guys and how partnerships help law enforcement find malicious cyber actors.
Military operations in the physical domains all depend on the cyber domain. To ensure the success of traditional naval capabilities, the Navy and Marine Corps must project power in and through cyberspace while defending their systems and assets from adversary cyber capabilities. The side that most effectively sequences and synchronizes cyber effects will have a decisive advantage. Department of the Navy (DON) Deputy Principal Cyber Advisor Joshua Reiter and CNA's Ariel Michelman-Ribeiro join the show to discuss the DON Cyber Strategy. Guest Biographies Ariel Michelman-Ribeiro is a Principal Research Scientist in the Cyber, IT Systems, and Networks Program and has been with CNA for 13 years. In addition to directing projects, she is also CNA's Cyber Research Coordinator. Joshua Reiter is the Deputy Principal Cyber Advisor (PCA) for the Department of the Navy, In this role, he is responsible for supporting the PCA in advising the Secretary of the Navy, Chief of Naval Operations, and Commandant of the Marine Corps, and implementing the Department of Defense Cyber Strategy within the Department of the Navy. Further Reading Department of the Navy Cyber Strategy
US cybersecurity strategy update on the way US Treasury issues first spyware sanctions UK denies responsibility for ALPHV takedown Thanks to today's episode sponsor, Conveyor Conveyor is the only GPT-powered customer trust portal that automates the entire customer security review process — from sharing your security posture and documents in a single portal to automating security questionnaire responses with 90% accuracy so you can fly through any customer security review in minutes. It might sound like every other compliance software claim out there, but there's a reason our customers have dubbed Conveyor their ‘favorite security tool of the year'. Test our market-leading AI in a free proof of concept at www.conveyor.com
We tend to take the institutions that serve our industry for granted. It almost seems that the hundreds of industry trade and standards bodies have always been there. So that's why this episode is so interesting. Today's guest is working on setting up the world's first cyber loss classificatory body that from 1.1.2024 will serve the UK insurance and reinsurance industry and the wider UK society that it is supporting. We don't do this very often so my chat with James Burns, Head of Cyber Strategy at UK-headquartered cyber and specialist MGA CFC is a unique chance to be in on the ground floor as an industry leader seeks to solve an emerging problem in the risk landscape. The cyber world and its insurers need be able to classify the severity of the systemic loss events that it is facing if they going to be able to continue to grow and fufill the needs of customers and society as a whole. But just how do you go about creating a pan-industry pan-societal body with a mission to work in the best interests of all? James's answers to this question are fascinating. His expertise and gravitas, mixed with optimism and idealism are a highly effective and infectious combination. So if you are feeling jaded and thinking that what insurance does is sometimes a little uninspiring I can highly recommend a listen. This is an Episode to remind you that our industry is absolutely essential for solving some of the biggest problems of our age. LINKS: The Cyber Monitoring Centre doesn't have a website yet But James is happy to be contacted by anyone looking to get involved. Here is a link to a very well-circulated article he posted to LinkedIn. You can connect to him via his profile: https://www.linkedin.com/pulse/solving-systemic-risk-cyber-markets-number-one-priority-james-burns%3FtrackingId=poupsOrSSTOlgB8stV6E4g%253D%253D/?trackingId=poupsOrSSTOlgB8stV6E4g%3D%3Dhttps://www.linkedin.com/pulse/solving-systemic-risk-cyber-markets-number-one-priority-james-burns%3FtrackingId=FADb4wFXTYaPoFKgLIEjHw%253D%253D/?trackingId=FADb4wFXTYaPoFKgLIEjHw%3D%3D We thank our naming sponsor AdvantageGo: https://www.advantagego.com/ We also thank our audio advertiser, Aventum Group Please contact them on: voi@aventumgroup.com
The White House and the Biden administration have issued several cybersecurity modernization initiatives in recent years, from supply chain security to implementing zero trust architecture across the federal government. Federal CISO Chris DeRusha recently delivered the opening keynote address at CyberTalks detailing the latest developments in the White House's push to improve the government's and the nation's cybersecurity — noting that the administration is working on version 2.0 of its National Cybersecurity Strategy implementation plan.
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our sponsored guest, Himaja Motheram, Censys. In this episode: How can one create a security program around unknown problems? Don't we know a lot of the things we lack visibility into that can cause security issues? But what about the things you don't even know about in the first place? Will that thing we don't even know to look at, ever cause a security issue? Thanks to our podcast sponsor, Censys Censys is the leading Internet Intelligence Platform for Threat Hunting and Exposure Management. We provide the most comprehensive, accurate, and up-to-date map of the internet, which scans 45x more services than the nearest competitor across the world's largest certificate database (>10B). Learn more at www.censys.com.
Guests: Matthew Rosenquist, CISO at Eclipz.ioOn LinkedIn | https://www.linkedin.com/in/matthewrosenquist/On Twitter | https://twitter.com/Matt_RosenquistOn Medium | https://matthew-rosenquist.medium.com/Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
The Defense Department recently released an unclassified summary of its 2023 cybersecurity strategy. The previously classified document was submitted to Congress in May. The document outlines updates to the department's plan to “operationalize the priorities” in cyberspace. GovCIO Media & Research Managing Editor Ross Gianfortune and Staff Writer/Researcher Anastasia Obis discuss what is inside the plan and what it means for the future of DOD's cyber posture.
This week we talk about how I extract manual-quality wisdom from any text/transcript, what I learn from biographies, 25 lessons in 17 years of infosec, and tons of new tools and projects.
An access broker's phishing facilitates ransomware. 3AM is fallback malware. Cross-site-scripting vulnerabilities are reported in Apache services. US agencies warn organizations to be alert for deepfakes. The US Department of Defense publishes its 2023 Cyber Strategy. Ann Johnson from the Afternoon Cyber Tea podcast speaks with with Jenny Radcliffe about the rise in social engineering. Deepen Desai from Zscaler shares a technical analysis of Bandit Stealer. And a quick reminder: yesterday was Patch Tuesday. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/175 Selected reading. Malware distributor Storm-0324 facilitates ransomware access (Microsoft Security) 3AM: New Ransomware Family Used As Fallback in Failed LockBit Attack (Symantec) Azure HDInsight Riddled With XSS Vulnerabilities via Apache Services (Orca Security) Contextualizing Deepfake Threats to Organizations (US Department of Defense) Bipartisan push to ban deceptive AI-generated ads in US elections (Reuters) DOD Releases 2023 Cyber Strategy Summary (U.S. Department of Defense) New Pentagon cyber strategy: Building new capabilities, expanding allied info-sharing (Breaking Defense) New DOD cyber strategy notes limits of digital deterrence (DefenseScoop) New Pentagon cyber strategy: Building new capabilities, expanding allied info-sharing (Breaking Defense) CISA Releases Three Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA) September 2023 Security Updates (Microsoft Security Response Center) Microsoft Releases September 2023 Updates (Cybersecurity and Infrastructure Security Agency CISA) Zero Day Summer: Microsoft Warns of Fresh New Software Exploits (SecurityWeek) Microsoft Patch Tuesday: Two zero-days addressed in September update (Computing) Adobe Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA) Microsoft, Adobe fix zero-days exploited by attackers (CVE-2023-26369, CVE-2023-36761, CVE-2023-36802) (Help Net Security) Adobe fixed actively exploited zero-day in Acrobat and Reader (Security Affairs) Adobe warns of critical Acrobat and Reader zero-day exploited in attacks (BleepingComputer) Apple Releases Security Updates for iOS and macOS (Cybersecurity and Infrastructure Security Agency CISA) SAP Security Patch Day for September 2023 (Onapsis) Google Rushes to Patch Critical Chrome Vulnerability Exploited in the Wild - Update Now (The Hacker News) Critical Google Chrome Zero-Day Bug Exploited in the Wild (Dark Reading) Zero-day affecting Chrome, Firefox and Thunderbird patched (Computer) Learn more about your ad choices. Visit megaphone.fm/adchoices