Podcasts about cyberattacks

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Copy link to clipboard

Attack on a computer system

  • 1,325PODCASTS
  • 2,696EPISODES
  • 31mAVG DURATION
  • 1DAILY NEW EPISODE
  • Oct 23, 2021LATEST
cyberattacks

POPULARITY

20112012201320142015201620172018201920202021


Best podcasts about cyberattacks

Show all podcasts related to cyberattacks

Latest podcast episodes about cyberattacks

Podcast | ice age farmer
CEO: Food Prices to Explode NOW; FBI/NSA warn of Cyberattacks on Food & Water Systems

Podcast | ice age farmer

Play Episode Listen Later Oct 23, 2021


As a billionaire supermarket CEO says food prices will skyrocket +10% in the NEXT 60 DAYS, the NSA/FBI/CISA are warning of Cyberattacks on food production and municipal water/wastewater systems. Our food and water are under relentless attack across all vectors: financial, cyber, supply chain, fertilizer shortages, nat gas prices are conspiring to create a perfect […]

Cloud Talk
Cybersecurity: Sometimes, offense is the best defense

Cloud Talk

Play Episode Listen Later Oct 22, 2021 42:35


Cybersecurity: In this episode of Cloud Talk, we discuss the evolution of cybercrime with 20+ year veterans of IT security. From early-90s IRC battles to today's nation-state backed hacker industry, we discuss how companies can make small changes to combat these forces. Special Guests: Gary Alterson and Vinnie Liu.

IT Visionaries
How to Overcome the Cyber Attack Tsunami, Strategize and Disrupt, with Attivo Network's Carolyn Crandall

IT Visionaries

Play Episode Listen Later Oct 21, 2021 42:43


Threats are not new to business. Whenever there has been a plentiful economic prize, there have also been pirates. In the swashbuckling days, the captain and the crew were charged with protecting the merchandise on board. The difference today is the sheer volume of cyber attacks inbound to companies. Carolyn Crandall, the Chief Security Advocate and CMO at Attivo Networks, describes the attack as an enormous wave.Main TakeawaysA Security Threat Tsunami: Cyber attacks are like giant perpetual waves. Businesses are constantly inundated with these threats. The first steps toward fighting back are recognizing the power of one's adversaries, understanding how the company is being attacked, knowing where the company's vulnerabilities are, and then devising a plan to combat the attacks.Strategy over Monitoring: Businesses tend to want to monitor their systems and that's generally a good thing. Part of the method of attackers, however, is to overwhelm with data. Instead of only monitoring, companies have to decipher attacker techniques and then strategize on how to defend accordingly.Automate, Automate!: People can only do so much by themselves to defend against constant cyber attacks. Automation can be an answer to these attacks. Humans can't protect against the deluge of attacks by themselves and must lean on A.I. and machine learning to help combat these nefarious attacks. When companies begin to deploy an A.I. defense strategy, the designed algorithms can begin to decipher what is normal activity on network servers and what is not.Data Cloak and Disrupt: Misusing credentials is a great way for attackers to gain access to resources. It is possible to have an automated system, such as Attivo, that can bait rogue elements, gain their trust, and then deny their access while hiding vital data.IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

Marketplace All-in-One
How safe is your water from a cyberattack?

Marketplace All-in-One

Play Episode Listen Later Oct 20, 2021 10:31


Ongoing cyber threats to local water and wastewater systems were flagged in an advisory jointly sent out by the FBI, the EPA, and the Cybersecurity and Infrastructure Security Agency (CISA) last week. It warned that systems to ensure that sewage and other biohazards stay out of our drinking water are vulnerable. The advisory pointed to several cyberattacks in the last few years, like one in Oldsmar, Florida where someone tried to hack in and dump extra chemicals in one municipal system. CISA is urging water and wastewater facilities to plan for, and get ready to block, these attacks. Marketplace’s Kimberly Adams speaks with Kim Zetter, a cybersecurity journalist and author.

Marketplace Tech
How safe is your water from a cyberattack?

Marketplace Tech

Play Episode Listen Later Oct 20, 2021 10:31


Ongoing cyber threats to local water and wastewater systems were flagged in an advisory jointly sent out by the FBI, the EPA, and the Cybersecurity and Infrastructure Security Agency (CISA) last week. It warned that systems to ensure that sewage and other biohazards stay out of our drinking water are vulnerable. The advisory pointed to several cyberattacks in the last few years, like one in Oldsmar, Florida where someone tried to hack in and dump extra chemicals in one municipal system. CISA is urging water and wastewater facilities to plan for, and get ready to block, these attacks. Marketplace’s Kimberly Adams speaks with Kim Zetter, a cybersecurity journalist and author.

Forward Observer Dispatch
Army Has No Plans To Address Cyberattacks: Daily SA_15 OCT 21

Forward Observer Dispatch

Play Episode Listen Later Oct 15, 2021 30:36


RAD Radio
10.13.21 RAD 04 Cyber Attacks & Living Off The Grid

RAD Radio

Play Episode Listen Later Oct 13, 2021 25:37


Cyber Attacks & Living Off The GridSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Rob, Anybody & Dawn
Treble Trouble & Cyber Attacks 10-13-21

Rob, Anybody & Dawn

Play Episode Listen Later Oct 13, 2021 25:19


See omnystudio.com/listener for privacy information.

Go For Launch — Rocket Fuel for Entrepreneurs
GFL 152: How to Protect Your Business From Cyber Attacks

Go For Launch — Rocket Fuel for Entrepreneurs

Play Episode Listen Later Oct 12, 2021 30:33


It's not a question of if but when your business will be hit with a cyber or ransomware attack. Fortunately, there are steps you can take to become aware and proactive in order to protect your business. Brian Fritton is the CEO and Founder of the cybersecurity firm Havoc Shield. He's also an alumnus of the 2020 TechStars program and a founding member of Forbes Technology Council. Brian has built products and led engineering, design, and IT teams at companies with credentials such as Fortune's 500 Fastest Growing Companies, the Inc. 5000 List and Entrepreneur's 100 Most Brilliant Companies. He's been the “guy in the hot seat” — responsible for defending a small business from cyberattacks — as a FinTech CTO at Patch of Land and the VP of Engineering for a critical political campaign and enterprise data science software maker. Brian brings the founder's perspective to cybersecurity in an increasingly complicated and risk-filled environment.

Talos Takes
Talos Takes Ep. #71 (NCSAM Edition): 2021 in ransomware

Talos Takes

Play Episode Listen Later Oct 8, 2021 6:58


We are from the first (or last) people to say this, but 2021 is the year of ransomware. It's by far the biggest story on the security landscape right now. And everything from oil pipelines, to grain co-ops, to hospitals and schools have been targeted by ransomware this year. Azim Khodjibaev joins the show for National Cybersecurity Awareness Month to wrap up everything we've seen on the ransomware landscape this year. Azim reflects on his interview with a LockBit operator, the research he's done into “double extortion campaigns,” and discusses the lessons defenders can learn from the past 10 months.

Cloud Talk
Combatting Security Threats With a Multi-Layered Defense

Cloud Talk

Play Episode Listen Later Oct 7, 2021 35:32


The cyber world has grown risker in the past five to 10 years. To combat the threats, organizations need multiple layers of defense. Microsoft Senior Security Architect, Matt Soseman, shares his view of the new world of cybersecurity — from the basics to advanced solutions. Special Guest: Matt Soseman.

Masters of Scale with Reid Hoffman
Rapid Response: SolarWinds: Urgent lessons from a cyberattack, w/ CEO Sudhakar Ramakrishna

Masters of Scale with Reid Hoffman

Play Episode Listen Later Oct 7, 2021 29:11


Last year, SolarWinds became the subject of a massive and sophisticated cyberattack, potentially affecting thousands of organizations. CEO Sudhakar Ramakrishna, who joined the company soon after the breach was discovered, speaks with host Bob Safian about how he and the company responded, and how other companies should approach the ever-looming threat of cyber-risk. "There is no such thing as 'I won't be breached because I'm too secure or too smart,' says Ramakrishna. “You could be breached. And when it happens, be humble. Learn from it, adapt, and act with a sense of urgency." Read a transcript of this interview at: mastersofscale.comSubscribe to the Masters of Scale weekly newsletter at http://eepurl.com/dlirtXSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Masters of Scale: Rapid Response
SolarWinds: Urgent lessons from a cyberattack, w/ CEO Sudhakar Ramakrishna

Masters of Scale: Rapid Response

Play Episode Listen Later Oct 7, 2021 29:11


Last year, SolarWinds became the subject of a massive and sophisticated cyberattack, potentially affecting thousands of organizations. CEO Sudhakar Ramakrishna, who joined the company soon after the breach was discovered, speaks with host Bob Safian about how he and the company responded, and how other companies should approach the ever-looming threat of cyber-risk. "There is no such thing as 'I won't be breached because I'm too secure or too smart,' says Ramakrishna. “You could be breached. And when it happens, be humble. Learn from it, adapt, and act with a sense of urgency." See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Washington Post Live
CISA Director Jen Easterly discusses the government's role in protecting against future cyberattacks

Washington Post Live

Play Episode Listen Later Oct 6, 2021 27:24


Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency (CISA), joins Washington Post columnist David Ignatius to talk about the government's role in protecting from future cyberattacks.

The CyberWire
DDoS is on an upward trend, and it's being used for extortion. A payroll provider recovers from an unspecified cyberattack. Russia charges Group-IB CEO with treason. NSA, CISA, advise on using VPNs.

The CyberWire

Play Episode Listen Later Sep 29, 2021 22:28


Distributed denial-of-service attacks have been making a comeback, and many of them represent criminal extortion attempts. A major British payroll provider is recovering from a cyberattack, but it's not providing much information on the nature of that attack. Russian authorities arrest the founder of Group-IB on treason charges. Johannes Ullrich from SANS on Out of Band Phishing Using SMS messages. Our UK correspondent Carole Theriault wonders how online trolling is still a thing. And NSA and CISA release guidelines on secure use of virtual private networks. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/188

InSecurity
Elisa Costante and Ellen Sundra: Do you know what the NicheStack TCP/IP stack is…?

InSecurity

Play Episode Listen Later Sep 27, 2021 62:49


    On this Very Special Episode, Matt Stephenson welcomes Elisa Costante, VP of Research and Ellen Sundra, Chief Customer Officer at Forescout for a discussion about the vulnerabilities that plague Operational Technology and Critical Infrastructure. With nearly 40 years of combined experience finding, understanding and solving the security issues that can cripple a nation, our guests bring some very esoteric knowledge in a way that the rest of us can understand. Dig it…     About Elisa Costante Elisa Costante (@ElisaCostante) is the Vice President of Research at Forescout Technologies. Previously, she has been a part of Security Matters - a Forescout company, where she worked as Chief Technology Officer and Head of Research. Elisa holds a PhD degree in Mathematics and Computer Science from Eindhoven University of Technology.     About Ellen Sundra Ellen Sundra (LNSundra) is the Chief Customer Officers at Forescout. Previously, Ellen was Sr Vice President of Ssytems Engineering and Enablement when she helped to build a global organization responsible for designing customized security solutions for commectial and public sector customers. Ellen has over 25 years of experience in the cybersecurity industry and was recently named one of the Top 25 Women in Cybersecurity by Cyber Defense Magazine.   About Matt Stephenson Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.   In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...   Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.   Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...     If you tuned in to any of my previous podcasts, there's great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We're still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

RNZ: Checkpoint
Another cyber attack on NZ businesses - analysis

RNZ: Checkpoint

Play Episode Listen Later Sep 8, 2021 4:20


Cyber attackers have taken down multiple New Zealand website and sevices in what appears to be a co-ordinated hit. New Zealand Post, Inland Revenue and MetService all experienced blackouts. Kiwibank and ANZ customers also reported problems with internet banking and being locked out of their accounts. And the government's computer emergency response team CERT NZ confirmed it is monitoring multiple denial of service attacks. AUT Professor of Computer Science Dave Parry talks to Lisa Owen.

Today with Claire Byrne
HSE Cyberattack / Cyber Crime

Today with Claire Byrne

Play Episode Listen Later Sep 6, 2021 11:06


Detective Chief Superintendent Paul Cleary

Because We Said So
BWSS Selects: Episode #10 - No-Show-Camilo!! Cyber Attack! Meth-Eviction-Sandwich-Gang! Booz! and our contest...

Because We Said So

Play Episode Listen Later Sep 5, 2021 109:44


A look back at our TENTH SHOW!! No-Show-Camilo makes it in finally!! Shenanigans!! Champagne!! shots!! beer!!! Oh yea, and our topics... Cyber Attack!! Who? Why? How? Where? And is there anything we can do? And a small town in New Zealand has new sheriffs in town, and they bring sandwiches, yummy... Research Lucas has 8-Minute Weather, and we get to our contest for The Week magazine... PLEASE, SHARE, FOLLOW, and SUBSCRIBE!! It really helps… Available Everywhere! ALL LINKS @ www.BWSSPodcast.com

RNZ: Checkpoint
InternetNZ explains cyber attack that caused internet outages

RNZ: Checkpoint

Play Episode Listen Later Sep 3, 2021 3:22


A cyber attack has created nationwide internet outages - and major working from home headaches - this afternoon. Internet infrastructure provider Vocus - which operates Orcon, Slingshot. Flip, and Stuff Fibre - was hit just after 1pm, with internet out for around an hour. Jean Bell filed this report.

Help Me With HIPAA
Social Engineering Tricks with William Price - Ep 320

Help Me With HIPAA

Play Episode Listen Later Sep 3, 2021 53:35


Learn 'tricks of the trade' from a real social engineering tester. We interview William Price of Cyberx.tech  to learn how they are able to successfully penetrate a company's defenses and get access to their most critical information. How likely would your organization be vulnerable to these same methods? More info at HelpMeWithHIPAA.com/320

Cyber Security Today
Cyber Security Today, Sept. 1, 2021 - Women in Cyber Day, weekend cyber attack warning, worst IT practices and beware of proxyware

Cyber Security Today

Play Episode Listen Later Sep 1, 2021 6:48


Today's podcast reports on Women in Cyber Day, a weekend cyber attack warning, a list of the worst IT practices and why you should beware of proxyware

InSecurity
Mitch Greenfield: Hospitals are Under Continuous Cyberattack… What Can We Do?

InSecurity

Play Episode Listen Later Aug 31, 2021 73:28


    Once upon a time, Gartner predicted that by 2020, more than 25 percent of cyberattacks in healthcare delivery organizations would involve some kind of IoT device. In medical terms, that means wirelessly connected and digitally monitored implantable medical devices like pacemakers, deep brain neurostimulators and insulin pumps. These aren't the esoteric things that mioght make the world go round, but are difficult to explain to the layperson. But the people who are literally kept alive by these devices, it their continued functionality is literally a matter of life and death. You feel me? In 2018 Cybesecurity Ventures released research stating that medical devices have an average of 6.2 vulnerabilities each. Furthers, they found that 60% of medical devices were at end-of-life stage with no patches or upgrades available. The scariest of all cyber malintent in the healthcare space may lie ahead. Researchers in Israel announced last year that they'd created a computer virus capable of adding tumors into CT and MRI scans. They are talking about malware designed to fool doctors into misdiagnosing high-profile patients, according to a story by Kim Zetter in The Washington Post.   So what do we do?   On today's No Name Security Podcast, Matt Stephenson welcomes Mitch Greenfield, Director of Core Security Architecture at Humana. We go all over the healthcare security map in a chat ranging from returning to work to securing telehealth operations to the intricacies of securing a wildly diverse enterprise... we might even squeeze in a little bit of pickle ball. Yeah… you read that right. Great stuff this on this episode!  Check it out…   About Mitch Greenfield     Mitch Greenfield is Director of Core Security Architecture at Humana. He's been there for over 13 years and has served in previous roles which included ethical hacking and penetration testing for Humana as well as their partners and aqcuisitions.   Mitch is a Certified Ethical Hacker and Licensed Penetration Tester, among many other things.   He also co-hosts the Collaboration Chronicles podcast   About Matt Stephenson     Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.   In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...   Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.   Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...   If you tuned in to any of my previous podcasts, there's great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We're still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

None of Our Businesses
NOB 92: Elective Surgeries, Rock Pics, Health System Cyber Attack, PPP Fraud, Delta's Insurance

None of Our Businesses

Play Episode Listen Later Aug 31, 2021 29:11


The None of our Businesses crew to talk about how elective surgeries are being prioritized during a new wave of packed hospitals, a photo of a rock was sold as an NFT for $1.3 million, a cyber attack on Memorial Health System, a tech exec goes to prison for successfully getting millions in PPP loans for fake companies, Delta Air Lines charging a higher insurance rate for the unvaccinated.   Elective Surgeries - https://www.statnews.com/2021/08/13/elective-surgeries-delayed-again-doctors-response/   Rock Pics - https://www.cnbc.com/2021/08/23/people-are-paying-millions-of-dollars-for-digital-pictures-of-rocks.html?__source=androidappshare&utm_source=Iterable&utm_medium=email&utm_campaign=campaign_2772736   Health System Cyber Attack - https://www.wtap.com/2021/08/15/memorial-health-systems-experiences-cyber-attack/   PPP Fraud - https://www.ien.com/home/news/21627300/tech-exec-gets-2-years-for-18m-covid-fraud?lt.lid=6126625ed6ef1c746039fcdd<.usr=6911F3546689H5A&utm_source=IMCD210819007&utm_medium=email&utm_campaign=08252021&utm_term=IMCD210819007&oly_enc_id=6911F3546689H5A   Delta's Insurance - https://www.reuters.com/business/aerospace-defense/delta-add-200-monthly-health-insurance-charge-unvaccinated-staff-2021-08-25/   None of Our Businesses Episode 92, August 2021

ProactiveIT Cyber Security Daily
Episode 423 - T-Mo Updates (It's Not Good).

ProactiveIT Cyber Security Daily

Play Episode Listen Later Aug 30, 2021 14:51


Good Morning and Welcome to the ProactiveIT Cyber Security Daily number 423 It is Monday August 30th 2021. I am your host Scott Gombar and T-Mo Updates (It's Not Good). Windows 11 to only support one Intel 7th gen CPU, no AMD Zen 1 CPUs Boston Public Library discloses cyberattack, system-wide technical outage T-Mobile CEO: Hacker brute-forced his way through our network 48,000 Individuals Affected by Ransomware Attack on CarePointe ENT PHI of 9,800 Patients of Atlanta Allergy & Asthma Exposed in Cyberattack

Liam Photography Podcast
Episode 159: Latest News and Rumors for the Week Ending June 13, 2021

Liam Photography Podcast

Play Episode Listen Later Aug 29, 2021 40:07


In this episode I cover the latest news and rumors from: https://www.canonrumors.com https://nikonrumors.com https://www.fujirumors.com https://www.sonyalpharumors.com Canon After the EOS R3, Canon will introduce new “affordable” RF mount cameras [CR1] This is what caused Canon to pull firmware v1.3.2 for the Canon EOS 5D Mark IV NBC Olympics selects Canon as their field and studio lens provider for the Tokyo Games Save those pennies! A Canon EF 1200mm f/5.6L USM is coming up for auction Nikon Nikon Nikkor Z MC macro mirrorless lenses additional coverage Nikon continues to discontinue Nikkor F-mount lenses Is this the rumored Nikon Z retro mirrorless camera? 12 different lens combination possibilities with the Techart TZM-01 adapter Nikon NX Field remote shooting system: a single photographer can operate 11 cameras from different angles Adobe released tethered Live View for Nikon cameras in Lightroom Classic Fuji 'DPRTV Fujifilm X-T4, Sony a6600, Canon M6MKII, Nikon Z50 Shootout: FUJIFILM Easily Dominates APS-C, Except for… Why I am Staying with APS-C, Myths of Primes over Zooms, 3 Areas where Fujifilm Needs to Improve, X-H2 Wishlist and More – Roundup This 3D Printed Fujifilm X100V Case Gives You X-Pro3 Alike Hidden Screen Fujifilm Resumes Shipping of Orders after Cyber Attack Fujifilm Refuses to Pay Ransom after Cyber Attack, Restores Servers and Reports Attackers to Police Sony 2022 Sony World Photography Awards Now Open For Entries Big Fathers day deals at BHphoto: Save on Sandisk cards, Tamron and Sigma E-mount lenses Sony 50mm f/1.2 G Master Review by Petapixel: “It Was Worth the Wait” More info about the Sony Airpeak S1 WILD RUMOR: Tamron 18-300mm APS-C E lens to be coming soon? Sony Europe launches the up to 400 Euro cashback Also be sure to join the Liam Photography Podcast Facebook Group https://www.facebook.com/groups/liamphotographypodcast/ You can reach the show by call or text @ 470-294-8191 to leave a comment or request a topic or guest for the show. Additionally you can email the show @ liam@liamphotographypodcast.com and find the show notes at http://www.liamphotographypodcast.com. You can find my work @ https://www.liamphotography.net on and follow me on Instagram, Facebook and Twitter @liamphotoatl. If you like abandoned buildings and history, you can find my project @ http://www.forgottenpiecesofgeorgia.com. and http://www.forgottenpiecesofpennsylvania.com. Please also stop by my Youtube channels Liam Photography Forgotten Pieces of Georgia Project Forgotten Pieces of Pennsylvania Project

Microsoft Mechanics Podcast
Automate threat detection and response with Azure Sentinel and Microsoft 365 Defender

Microsoft Mechanics Podcast

Play Episode Listen Later Aug 24, 2021 18:14


Watch how Microsoft's cloud-based SIM, Azure Sentinel, along with our XDR technologies, including Microsoft 365 Defender, provide an automated approach to threat detection and response. Rob Lefferts, Microsoft Security CVP, joins Jeremy Chapman to show you the latest integrative defenses and tools to respond quickly in the context of a real attack. The threat landscape has reached a new level of urgency, whether it's human operated ransomware, or sophisticated command and control attacks, and the techniques being used are getting harder to detect — like supply chain attacks that embed malware in the apps and IoT devices that you trust. Stop these types of attacks with the right measures and preparation. Put the right defense layers in place with the Zero Trust security model. Increase your organization's ability to detect and respond before an attack does any damage. If the damage has already started, contain the blast radius and quickly reverse any damage that has already been done. Our integrated SIM with Azure Sentinel and Microsoft 365 Defender and Azure Defender for XDR apply Microsoft's unique volume and diversity of threat intelligence for early warning and response to give you visibility and depth of insight across your organization. ► QUICK LINKS: 00:00 - Introduction 01:07 - Preparation to stop attacks 03:02 - Demo of hybrid attack 04:56 - Where to start: Azure Sentinel 08:53 - Stop the spread: Microsoft 365 Defender 10:27 - Alerts 13:10 - Compromised user accounts 15:21 - Users on unmanaged devices 16:59 - Wrap up ► Link References: Learn more about our integrated SIM and XDR solution with Azure Sentinel and Microsoft's Defender solutions at https://aka.ms/XDR Watch our series on implementing the Zero Trust security model at https://aka.ms/ZeroTrustMechanics ► Unfamiliar with Microsoft Mechanics? We are Microsoft's official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1 Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website ► Keep getting this insider knowledge, join us on social: Follow us on Twitter: https://twitter.com/MSFTMechanics Follow us on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ #Security #Cybersecurity #InfoSec

Millennialz Anonymous Podcast
Who's Influencing Who?

Millennialz Anonymous Podcast

Play Episode Listen Later Aug 23, 2021 72:08


1. Intro (2m 12 sec) 2. Top Ten Trending topics (9m 01 sec): Kabul Chaos, Trump was booed, Jessie Jackson in hospital, Cyberattack of T-Mobile, Fraud of Unemployment, OnlyFans's betrayal, Teslas robot, Colorado River Dries Up, Phil Valentine, a Nashville-based conservative radio talk show dies, Tropical Storm Henri Brings Power Outages. 3. Are we still doing this reject facts thing? (35 m 31 sex) Leise walks why she doesn't get the covid vax resistance still 4. Why the media is needed (57 m 36 sec) 5. Outro (1hr 11min 17 sec)

Cyber Security Headlines
August 23, 2021

Cyber Security Headlines

Play Episode Listen Later Aug 23, 2021 8:08


Microsoft Exchange under attack with ProxyShell flaws Australians hit by ‘Flubot' malware that arrives by text message Cyberattack hits State Department Thanks to our episode sponsor, Privacy.com Privacy.com lets you buy things online using virtual cards instead of having to use your real ones, protecting your identity and bank information on the internet. For example, when you're shopping online and ready to check out, simply generate a Privacy Card that will enter in random variables. Should the merchant ever get hacked, the fraudsters will never have access to your real information. Privacy Cards are also great for monitoring subscriptions and signing up for free trials where a card number is required. Simply close cards whenever you want to ensure you're never charged without your consent. Sign up for free today at privacy.com/ciso. New users will instantly receive a $5 credit, to be used for any online purchase you make! For the stories behind the headlines, head to CISOseries.com.  

InSecurity
Patrick Miller and Brian Proctor: What's Left to Hack in Critical Infrastructure?

InSecurity

Play Episode Listen Later Aug 20, 2021 65:43


  Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away.  -- Antoine de Saint-Exupéry; French writer, poet, aristocrat, journalist and pioneering aviator   Me with nothing left to lose, plotting my big revenge in the spotlight. Give me violent revenge fantasies as a coping mechanism  -- Chuck Palahniuk; author   We've been looking for the enemy for some time now. We've finally found him. We're surrounded. That simplifies things  -- Chesty Puller, US Marines      Matt Stephenson welcomes Ampere Industrial Security CEO Patrick Miller and Forescout Principal OT Strategist in for a chat about what is left to hack in the world of Critical Infrastructure. Because Critical Infrastructure seems to be a term that evolves every day, we run all over the place talking about what is vulnerable and why… what is safe and how to protect everything in between. And just to make sure you know we are authentic… Proctor was broadcasting from the floor of a manufacturing facility in full OSHA required protective gear (literally a hard hat, goggles and a day-glo vest)     About Patrick Miller     Patrick Miller (@patrickcmiller) shares over 35 years of IT/OT experience through his consulting services as an independent security and regulatory advisor for the Critical Infrastructure and Key Resource sectors. He is currently the CEO of Ampere Industrial Security, an industrial security consultancy based in Portland, OR USA. Patrick is also the founder, president emeritus and currently serves on the board of directors for the Energy Sector Security Consortium, Inc,  nonprofit organization in Portland, OR as well as the US Coordinator for the Industrial Cybersecurity Center, based in Spain.    Patrick is currently an instructor for the SANS ICS456 training on the NERC CIP standards.     About Brian Proctor     Brian Proctor (@brianproctor67) is the Principal OT Strategist at Forescout. He spent the majority of his previous professional life as an ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In joined an ICS security startup which was then acquired by Forescout Technologies. Brian jumped to the vendor side to promote the benefits ICS/SCADA/DCS threat detection, network security monitoring, and visualization capabilities can bring critical infrastructure asset owners. He is passionate about helping the ICS security community in any way possible and trying to make a difference for the greater good of our industry and country.     About Matt Stephenson     Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.   In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...   Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.   Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...     If you tuned in to any of my previous podcasts, there's great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We're still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

U.S. National Privacy Legislation Podcast
New Imperatives for Cyber Governance

U.S. National Privacy Legislation Podcast

Play Episode Listen Later Aug 18, 2021 27:57


*****Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

Dell Technologies Services
Helping Customers Detect, Investigate, and Respond to Security Threats

Dell Technologies Services

Play Episode Listen Later Aug 13, 2021 16:34


Hear Dell Technologies Services Cybersecurity team members, Cody Ash and Chris Wright discuss how we are helping customers manage their global security operations with 24x7 threat monitoring, detection, remediation, and recovery. Learn more at DellTechnologies.com/MDR

American Metamorphosis
BONUS: Systems Down

American Metamorphosis

Play Episode Listen Later Aug 10, 2021 38:18


Cyberattacks are a growing threat to national security, but the country's defenses are weak. How can we strengthen them? In this bonus episode of American Metamorphosis, Congressman Jim Langevin describes his 15-year-long quest to prioritize cybersecurity in the federal government. In a roundtable discussion, CrowdStrike's Dmitri Alperovitch, R Street's Tatyana Bolton, and BCG's Troy Thomas discuss how the public and private sectors can work together more effectively to protect the country's critical infrastructure and businesses.

3 Takeaways
Former Director of National Intelligence James Clapper: The Greatest Threat Facing the World Right Now and Individual Rights to Privacy (#53)

3 Takeaways

Play Episode Listen Later Aug 10, 2021 23:38


Former Director of National Intelligence James Clapper discusses the greatest threats, cyber, surveillance, the information being collected on each one of us and individual rights to privacy. Learn how we can protect ourselves against future health or biological threats. 

InForum Minute
Sanford Health target of attempted cyber attack

InForum Minute

Play Episode Listen Later Aug 6, 2021 3:15


Here is your featured story from The Forum Newspaper and InForum.com for August 6, 2021.  Written By: Patrick Springer Narrated By: Ben Rieke  Read the full article: https://www.inforum.com/news/crime-and-courts/7138130-Opioid-overdoses-more-than-triple-in-Grand-Forks-amid-rise-of-counterfeit-pills

On Good Authority
Ransomware attacks: How secure are we?

On Good Authority

Play Episode Listen Later Aug 5, 2021 19:07


Ransomware attacks are up 300 percent this year compared to 2020. Anyone who uses an electronic device, whether it's a simple cellular phone or computers that runs small or large businesses, is at risk for a ransomware attack. But how does a society defend itself against an unseen enemy and an impending cyberattack? Tulane cybersecurity expert Randy Magiera discusses how hacking occurs, what to do following a ransomware attack and how to avoid becoming a victim.

NTD News Today
Biden: Cyber Attack Could Cause Real War; NSA: Regular Reboots Can Block Phone Hacking

NTD News Today

Play Episode Listen Later Jul 28, 2021 53:02


1. Dems Push to Finish Infrastructure Bill 2. Sen. Ernst Gives FTA Wasteful Spending Award 3. Biden: Cyber Attack Could Cause Real War 4. FBI: Don't Ban Ransomware Payments 5. NSA: Regular Reboots Can Block Phone Hacking

Dell Technologies Power2Protect Podcast
Power2Protect_EP052 - Special Guest – Carlos Recalde, President and CEO of Sheltered Harbor

Dell Technologies Power2Protect Podcast

Play Episode Listen Later Jul 28, 2021 22:16


This week, we are joined by a very special guest, Carlos Recalde, President and CEO of Sheltered Harbor. Sheltered Harbor was created in 2015 by the financial industry and incorporates a set of cyber resilience and data protection best practices and safeguards for protecting U.S financial data. We talk to Carlos about the recent cyber attacks and subsequent increased governmental focus and guidance on ransomware and cyber attacks. We also discuss how organizations inside and outside of financial institutions in the US can benefit from a proven ransomware protection solution, like Dell EMC PowerProtect Cyber Recovery. You won't want to miss this one!

The CyberWire
South African ports invoke force majeure over cyberattack. Documents indicate Iranian interest in control systems attacks. Dark web wanted ads. Cyber diplomacy. Lousy cafeteria food?

The CyberWire

Play Episode Listen Later Jul 27, 2021 27:23


Transnet declares force majeure over cyberattack on South African port management. The IRGC apparently is Googling a bunch of stuff about gas stations and merchant ships. Kaseya's denial of paying ransom has legs. Criminal coders like obscure languages. The AvosLocker gang is looking for pentesters, access brokers, and affiliates. The US and China hold “frank and open” conversations about, among other things, cyber tensions. Ben Yelin explains the tech implications of President Biden's recent executive order. Our guest is Eve Maler from ForgeRock on their 3rd annual Breach Report. And, hey NSA, what did you have for lunch today? For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/143

DevNews
S5:E1 - Pegasus Cyber Espionage Tool, Steam's New Console, Gunshot-Detecting Tech, and NATO Condemns a Cyberattack

DevNews

Play Episode Listen Later Jul 22, 2021 36:18


In this episode, we talk about a gunshot-detecting tech used by law enforcement, the new Steam Deck handheld gaming console, and an unprecedented move by NATO condemning China for a hack exploiting Microsoft's Exchange Server. Show Notes Scout APM (sponsor) Gunshot-Detecting Tech Is Summoning Armed Police to Black Neighborhoods Nintendo Switch Gets New Rival With Valve's Portable Steam Console U.S. and key allies accuse China of Microsoft Exchange cyberattacks ReliaQuest CodeNewbie: What is cryptography and how to get into it, with Marcus Carey Tribe of Hackers: Blue Team Israeli Spyware Maker Is in Spotlight Amid Reports of Wide Abuses Amnesty International The Citizen Lab Israeli Spyware Maker Is in Spotlight Amid Reports of Wide Abuses

The Kevin Jackson Show
Ep. 21-278 - Defund Meets Mask Mandate

The Kevin Jackson Show

Play Episode Listen Later Jul 21, 2021 38:40


In this episode, the recently reinstated Los Angeles County mask mandate is met with a defunded Sheriff Villanueva who will not expend their limited resources on enforcing it. The Olympics used to be about cheering for your country, regardless of the sport.

ALL MARINE RADIO - Podcasts
THE ALL MARINE RADIO HOUR: Grant Newsham talks “China’s One-Two Punch” + US, NATO, EU blame China for cyberattack on Microsoft + Afghanistan

ALL MARINE RADIO - Podcasts

Play Episode Listen Later Jul 20, 2021 69:24


Grant Newsham is a senior research fellow at the Japan Forum for Strategic Studies, a senior research fellow at the Center for Security Policy and a retired United States Marine Officer. He was the first US Marine liaison officer to the Japan Ground Self Defense force and was instrumental in promoting the JSDF's initial moves […]

The Kevin Jackson Show
Ep. 21-277 - AZ Election

The Kevin Jackson Show

Play Episode Listen Later Jul 20, 2021 38:40


In this episode, the audit in Maricopa is yielding some very disturbing results and they aren't finished yet. Michael Wolff blasts CNN host Brian Stelter on journalist integrity.

Global News Podcast
China accused of Cyber-Attack on Microsoft.

Global News Podcast

Play Episode Listen Later Jul 19, 2021 26:19


The US and European countries say a huge cyber attack earlier this year came from China; In Germany - police say dozens of people are still missing following deadly floods last week; and a family of farmers in India whose cooking skills have made them an internet sensation

WSJ What’s News
U.S. Blames China-Linked Hackers for Microsoft Cyberattack

WSJ What’s News

Play Episode Listen Later Jul 19, 2021 15:38


P.M. Edition for July 19. The Biden administration and several U.S. allies blamed hackers tied to China's main intelligence service for a cyberattack on Microsoft's email software earlier this year. Cybersecurity reporter Dustin Volz joins host Charlie Turner to discuss what that says about President Biden's overall approach to China. Learn more about your ad choices. Visit megaphone.fm/adchoices

Newshour
China accused of cyber-attack on Microsoft

Newshour

Play Episode Listen Later Jul 19, 2021 49:13


The UK, US, and EU have accused China of carrying out a major cyber-attack earlier this year. The attack targeted Microsoft Exchange servers, affecting at least 30,000 organisations globally. Also in the programme, as many Covid restrictions are lifted in England, is it time to celebrate or cower? And a ferocious drought in south-west Iran has sparked deadly protests.

The Kevin Jackson Show
Ep. 21-275 - Cuban Freedom

The Kevin Jackson Show

Play Episode Listen Later Jul 19, 2021 38:40


In this episode, as we flood illegals across the southern border, Cubans pleas for freedom go unanswered by the Biden administration. #Don'tFauciMyFlorida as Pfizer seeks emergency use authorization for the COVID vaccine booster shot.

PRI's The World
Russian REvil's cyberattack impacts hundreds of businesses

PRI's The World

Play Episode Listen Later Jul 5, 2021 48:41


This story may sound familiar. A major hack, with more than 1,000 businesses affected. According to cybersecurity experts, the Russia-based hacking group REvil is the source of the attack. Also, in South Africa, political tensions are growing after a court sentenced former president Jacob Zuma to prison for absconding from a corruption inquiry — a ruling that appears to strike at perceived official impunity. Zuma has struck back, comparing the judges to the white apartheid-era rulers he once fought. And, abortion activists and pro-choice gynecologists in ultra-Catholic Malta have created the country's first free family-planning service.

The David Knight Show
Friday 24June21 - Massive Training Exercise for CyberAttack of Power Grid

The David Knight Show

Play Episode Listen Later Jun 25, 2021 115:23


* INTERVIEW: Gerald Celente, TrendsResearch.com, on the new "infrastructure" bill's, taxes, fed inflation announcement, where gold goes* National Guard, CISA, federal, state and local officials rehearse response to nationwide power grid attack* Strange update on McAfee "suicide"* FL bills touted as protecting against corporate vaccine mandates allows forced vaccinations by government "by any means necessary".  DeSantis and Abbott are playing the GOP base on lockdown & vaccines just like Trump played them on "America First" vs globalists* FDA acknowledges vaccine connection to heart issues but only issues a warningTOPICS by TIMECODE1:58 Massive government rehearsal for nationwide power grid destruction. National Guard, Homeland, CISA, FBI, federal state, local8:26 HAARP has been reactivated according to FAA pilot warning10:53 McAfee update — strange new statements from prison13:35 Proof that the school system is out of control and will not be reigned in by federal, state or local control. It's the teachers. Here's how one teacher sees her mission18:08 Letters, comments & questions22:54 Greg Abbott & Ron DeSantis are gaining national popularity for appearing to support liberty against lockdown. It's a sham as this FL bill does EXACTLY THE OPPOSITE of what it claims35:49 Letters & scout update42:40 Dr. Robert Malone, MD and inventor of mRNA is getting the message out about the UNTESTED experimental vaccines and how they're harming people51:52 Clinton campaign official sentenced to only 13 yrs for filming his rape of a child while he was supposedly running an organization to end sexual violence. But look at how Disney and Sesame Street are grooming YOUR children in YOUR LIVING ROOM54:53 Hungarian leader's legal response to LGBT agenda targeting children56:26 Did America create the idea of religious liberty? Or did religious liberty create America?1:06:41 INTERVIEW Gerald Celente, TrendsResearch.com, Infrastructure Compromise or Sell-Out? the new "infrastructure" bill's, taxes, fed inflation announcement, where gold goes1:44:53 Biden Faces a “Saigon” Moment As He's Mocked for His 2A Threats Touting Military SuperiorityFind out more about the show and where you can watch it at TheDavidKnightShow.comIf you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughZelle: @DavidKnightShow@protonmail.comCash App at:  $davidknightshowBTC to:  bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Mail:     David Knight     POB 1323     Elgin, TX 78621

American Conservative University
100% Undisputed Evidence Showing the CCP Stole the 2020 Election by Cyber-Attack. Mike Lindell Presents: Absolutely 9-0

American Conservative University

Play Episode Listen Later Jun 15, 2021 28:57


Mike Lindell Presents “Absolutely 9-0”, A 26 minute video about the hacking of the 2020 Election, and the proof that when presented to the Supreme Court will absolutely be so compelling they will have to vote 9-0 to overturn the election.   https://lindelltv.com/   Watch this Video for free at- Mike Lindell Presents: Absolutely 9-0   Mike Lindell: We've got 100% undisputed evidence showing the CCP has stolen the 2020 American election by cyber-attack, and it will be absolutely nine zero in the Supreme Court. And everybody you're watching this video now you need to share this video with everyone you know in the world.   Mike Lindell's team of forensic analysts show absolute proof China hacked the election machines and turned the election to Biden. Analyzing just 20 of the election machine hacks out of the thousands China performed, they prove enough votes were switched from Trump to Biden to steal the election.       More of Mike Lindell's videos on the Stolen election-   China Puts Biden in the White House- Mike Lindell. A Segment from Documentary ‘ABSOLUTE INTERFERENCE' https://lindelltv.com/china-puts-biden-in-the-white-house/     The Sequel to ‘Absolute Proof' With New Evidence Foreign & Domestic Enemies Used Computers to Hack the 2020 Election. By Mike Lindell. Watch this Documentary free at- https://lindelltv.com/ . Highly Recommended by ACU.   ----------------------------------------------------------------------------------------------------- Banned by Google, YouTube, Facebook, Twitter etc.- Election Fraud Documentary by Mike Lindell- Absolute Proof.   Absolute Proof Exposing Election Fraud and Theft of America by Enemies Foreign and Domestic https://michaeljlindell.com/ Watch this free documentary and Please share with everyone you know to save our country!   Also on- Rumble — Absolute Truth - The Full Documentary can be seen right here. https://rumble.com/vdlez5-mike-lindell-the-full-documentary-absolute-truth-election-fraud-exposed.html This premiered on Mike Lindell's website the morning of 2/5/2021 and before the entire video could be shown the enemies of truth and justice cut the feed so that we the people who want the truth and honest elections could be denied our Constitutional Liberties from a Fraudulent Administration. Share this far and wide and don't stop saying the two words that make Satan himself and all of his minions tremble. Those two words are ELECTION FRAUD. Don't stop saying them, texting them and keeping them at the forefront of your conversations. Contact your elected officials, email them a link to this video and demand that they watch it and educate themselves about ELECTION FRAUD then DEMAND that if they expect your vote in the upcoming elections they will fight ELECTION FRAUD with the same type of passion that George Washington had when he crossed the icy waters of the Delaware River. Mike Lindell has done his part by spending his time and money to make this Documentary. Now it is up to WE THE PEOPLE to do the rest! Do not allow yourself to be discouraged and depressed, there is an information war that calls for you to enlist and do your part in preserving the freedoms that generations of veterans and our founding fathers fought for. BE A DIGITAL WARRIOR WHILE YOU STILL CAN! IF THEY TAKE DOWN YOUR FB, TWITTER, YOUTUBE AND OTHER PLATFORMS DON'T QUIT. OPEN A NEW ACCOUNT AND KEEP FIGHTING. KEEP FIRING THE TRUTH AT THE LIES! IF THEY TAKE YOUR 2ND DOWN OPEN A THIRD AND A 4TH AND A 99TH IF YOU HAVE TO