Podcasts about cyberint

  • 24PODCASTS
  • 33EPISODES
  • 53mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 20, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cyberint

Latest podcast episodes about cyberint

PODCAFÉ DA TI
Trailer - Geraldo Bravo

PODCAFÉ DA TI

Play Episode Listen Later Oct 20, 2024 1:30


Segurança digital além do óbvio!

It's 5:05! Daily cybersecurity and open source briefing
Episode #210: LinkedIn Account Takeover Campaign; Amazon's palm-scanning tech - an entire universe of possibilities?; CRA: Save Open Source!;Cyber Resiliency Act: Impacts on Open Source; CRA: Why You Should Care

It's 5:05! Daily cybersecurity and open source briefing

Play Episode Listen Later Aug 18, 2023 14:26


Cyber and Technology with Mike
16 August 2023 Cyber and Tech News

Cyber and Technology with Mike

Play Episode Listen Later Aug 16, 2023 10:24


In today's podcast we cover four crucial cyber and technology topics, including: 1.        Citrix flaw continues to be abused, many still vulnerable 2.        Companies continue to be breached via MOVEit flaw 3.        UK police accidently exposes data of crime victims 4.        LinkedIn account takeovers spike in new campaign  I'd love feedback, feel free to send your comments and feedback to  | cyberandtechwithmike@gmail.com

The Conference Room with Simon Lader
Ep. 104 - Leadership, Problem Solving and Innovation - the Scaling Secrets of the CEO with Yochai Corem

The Conference Room with Simon Lader

Play Episode Listen Later May 15, 2023 41:32


In this week's episode we welcome Yochai Corem, CEO of hyperscaling cybersecurity intelligence vendor Cyberint who shares his story, his strategy for leadership, company growth and the role of a CEO in a rapidly scaling company. KEY TAKEAWAYS FROM THIS EPISODE: How to manage without authority The importance of trusting your team Managing people whose job you've never done How to step in without undermining your team This Week's Guest - Yochai Corem Yochai Corem is the CEO of cybersecurity vendor Cyberint. Formerly the VP EMEA of Cyberbit, he has spent his career growing and scaling innovative technology companies in areas such as web intelligence, cellular localization, cyber range technology and even founded the biggest Israeli tourism site Tiuli, which he took to a successful exit. He is a BSc. graduate of Tel Aviv University and gained his MBA at Reichman University. LinkedIn: https://www.linkedin.com/in/yochaicorem/ Website: https://cyberint.com/ YOUR HOST Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and podcast growth consultancy Viva Podcasts. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people make money from podcasting. Get to know more about Simon at: Website: https://simonlader.com/ Make Money from Podcasting: https://www.vivapodcasts.com/podcastpowerups Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader The Conference Room is available on Spotify: https://open.spotify.com/show/3dd0obQSM8cYRV0HCxiuF0 Apple Podcasts: https://podcasts.apple.com/us/podcast/the-conference-room-with-simon-lader/id1517671682 Amazon Music: https://www.amazon.com/Conference-Room-Simon-Lader/dp/B0BM351RT7/ref=sr_1_1?crid=3KV0SJVZWFNNX&keywords=the+conference+room+with+simon+lader+podcast&qid=1683558717&sprefix=%2Caps%2C133&sr=8-1 iHeartRadio https://www.iheart.com/podcast/269-the-conference-room-with-s-102401058/ And everywhere else you listen to podcasts!

20 Minute Leaders
Ep1002: Yochai Corem | CEO, Cyberint

20 Minute Leaders

Play Episode Listen Later Jan 25, 2023 22:52


Yochai Corem is A multi-disciplinary executive with an impressive ability to innovate and lead Businesses, Products and Projects. Over 20 years of experience leading Sales, BizDev, Product Management and Innovation in international markets.

ChannelPro Weekly Podcast
ChannelPro Weekly Podcast: Episode #234 - The Dark Upside Down

ChannelPro Weekly Podcast

Play Episode Listen Later Jul 29, 2022 108:11


There are stranger things than this week's ChannelPro Weekly episode, but little else as fun or informative. Joined by security expert and returning guest host Angela Hogaboom, the Cloud Chick herself, Matt and Rich discuss the new Surface for Business hardware at D&H, the new intrusion prevention and container security options from Trend Micro, and the new industry trend data from ConnectWise's Service Leadership unit. Then they get a terrifying and utterly fascinating insider's tour of the topsy-turvy world that is the dark web from Jacob Silutin, head of sales engineering for the Americas at Cyberint. You'll be glad you live in the Right Side Up! Subscribe to ChannelPro Weekly! iTunes: https://itunes.apple.com/us/podcast/channelpro-weekly-podcast/id1095568582?mt=2 Google Podcasts: https://podcasts.google.com/feed/aHR0cHM6Ly9jaGFubmVscHJvd2Vla2x5LmxpYnN5bi5jb20vcnNz?sa=X&ved=2ahUKEwjq-N3UvNHyAhVWPs0KHYdTDmkQ9sEGegQIARAF Spotify: https://open.spotify.com/show/7hWuOWbrIcwtrK6UJLSHvU Amazon Music: https://music.amazon.com/podcasts/a1d93194-a5f3-46d8-b625-abdc0ba032f1/ChannelPro-Weekly-Podcast More here: https://www.channelpronetwork.com/download/podcast/channelpro-weekly-podcast-episode-234-dark-upside-down Topics and Related Links Mentioned: D&H Adds Surface for Business Devices to Modern Solutions Unit - https://www.channelpronetwork.com/news/dh-adds-surface-business-devices-modern-solutions-unit Trend Micro Centralizes Intrusion Prevention and Container Security for Amazon Web Services - https://www.channelpronetwork.com/news/trend-micro-centralizes-intrusion-prevention-and-container-security-amazon-web-services Businesses Have Miles to Go for Windows 11 Prep - https://www.channelpronetwork.com/article/businesses-have-miles-go-windows-11-prep 5 Insights from Service Leadership's 2022 Industry Profitability Report - https://www.channelpronetwork.com/slideshow/5-insights-service-leadership-s-2022-industry-profitability-report Cyberint webinar on the dark web with Jacob Silutin - https://www.youtube.com/watch?v=nb4iidnz2Sk Rich's quickie preview of the week ahead

Paul's Security Weekly
ESW #278 - Tim Morris, Chris Cleveland, and Mehul Revankar

Paul's Security Weekly

Play Episode Listen Later Jul 14, 2022 113:22


Introducing the concept of Tanium Data as a Service. When you've got a product like Tanium, that collects so much useful data - why would you want to keep it within Tanium? The 'Data-as-a-Service' model aims to increase the value of the Tanium product by safely sharing its data with other teams, tools, and groups within a customer's organization. This segment is sponsored by Tanium. Visit https://securityweekly.com/tanium to learn more about them!   Then, in the enterprise security news, CyberInt raises $28M for attack surface detection, RapidFort raises $8.5M for… pre-attack surface detection? Managing and monitoring your quantum devices? Making sure you don't lose access to your crypto wallets, IBM acquires Randori, Contrast Security makes some of their tools free, Rumble adds more interesting new features, Microsoft Defender for everyone, and more! PIXM stops phishing attacks at point of click with computer vision in the browser, protecting users from phishing beyond the mailbox in any application. With the launch of PIXM Mobile, PIXM is now delivering this capability on iPhones as well as desktop devices. Segment Resources: https://pixmsecurity.com/mobile/ This segment is sponsored by Pixm. Visit https://securityweekly.com/pixm to learn more about them!   The rise in disclosed vulnerabilities, the speed they are weaponized, and the cyber talent shortage have left teams struggling to wade through a mountain of vulnerabilities. In this discussion, Mehul will discuss the need for a new way to cut through the noise to focus teams on prioritizing and fixing those critical vulnerabilities that will most reduce risk in each organization's environment. He'll also cover how Qualys is redefining risk and vulnerability management in the latest version of VMDR and share stories of how customers have leveraged this solution to dramatically reduce risk. Segment Resources: www.qualys.com/trurisk www.qualys.com/vmdr This segment is sponsored by Qualys. Visit https://securityweekly.com/qualys to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw278

Enterprise Security Weekly (Audio)
ESW #278 - Tim Morris, Chris Cleveland, and Mehul Revankar

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jul 14, 2022 113:22


Introducing the concept of Tanium Data as a Service. When you've got a product like Tanium, that collects so much useful data - why would you want to keep it within Tanium? The 'Data-as-a-Service' model aims to increase the value of the Tanium product by safely sharing its data with other teams, tools, and groups within a customer's organization. This segment is sponsored by Tanium. Visit https://securityweekly.com/tanium to learn more about them!   Then, in the enterprise security news, CyberInt raises $28M for attack surface detection, RapidFort raises $8.5M for… pre-attack surface detection? Managing and monitoring your quantum devices? Making sure you don't lose access to your crypto wallets, IBM acquires Randori, Contrast Security makes some of their tools free, Rumble adds more interesting new features, Microsoft Defender for everyone, and more! PIXM stops phishing attacks at point of click with computer vision in the browser, protecting users from phishing beyond the mailbox in any application. With the launch of PIXM Mobile, PIXM is now delivering this capability on iPhones as well as desktop devices. Segment Resources: https://pixmsecurity.com/mobile/ This segment is sponsored by Pixm. Visit https://securityweekly.com/pixm to learn more about them!   The rise in disclosed vulnerabilities, the speed they are weaponized, and the cyber talent shortage have left teams struggling to wade through a mountain of vulnerabilities. In this discussion, Mehul will discuss the need for a new way to cut through the noise to focus teams on prioritizing and fixing those critical vulnerabilities that will most reduce risk in each organization's environment. He'll also cover how Qualys is redefining risk and vulnerability management in the latest version of VMDR and share stories of how customers have leveraged this solution to dramatically reduce risk. Segment Resources: www.qualys.com/trurisk www.qualys.com/vmdr This segment is sponsored by Qualys. Visit https://securityweekly.com/qualys to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw278

Paul's Security Weekly TV
IBM Acquires Randori, Quantum Devices, Microsoft Defender, & RapidFort - ESW #278

Paul's Security Weekly TV

Play Episode Listen Later Jun 25, 2022 40:29


Then, in the enterprise security news, CyberInt raises $28M for attack surface detection, RapidFort raises $8.5M for… pre-attack surface detection? Managing and monitoring your quantum devices? Making sure you don't lose access to your crypto wallets, IBM acquires Randori, Contrast Security makes some of their tools free, Rumble adds more interesting new features, Microsoft Defender for everyone, and more!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw278

Enterprise Security Weekly (Video)
IBM Acquires Randori, Quantum Devices, Microsoft Defender, & RapidFort - ESW #278

Enterprise Security Weekly (Video)

Play Episode Listen Later Jun 24, 2022 40:29


Then, in the enterprise security news, CyberInt raises $28M for attack surface detection, RapidFort raises $8.5M for… pre-attack surface detection? Managing and monitoring your quantum devices? Making sure you don't lose access to your crypto wallets, IBM acquires Randori, Contrast Security makes some of their tools free, Rumble adds more interesting new features, Microsoft Defender for everyone, and more!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw278

Shot of Cyber
Yochai Corem

Shot of Cyber

Play Episode Listen Later Jun 24, 2022 55:28


In the 9th episode of Shot of Cyber, Gilad and Simon meet Yochai Corem. As CEO of Cyberint with great experience in product management, Yochai shares his many insights on running a fast growing business, what he considers important KPIs with clients and employees. We discuss the value of transparency and vision in leading successful teams as well as the impact of military culture on business in Israel.

Cyberhelden
Cyberhelden 44 - Hugo Vijver

Cyberhelden

Play Episode Listen Later Jan 27, 2022 63:18


De Cyberheld van de week is Hugo Vijver. Als 25 jarige legde hij namens de AIVD aan Balkenende uit hoeveel dreiging ons Koninkrijk van Chavez mocht verwachten. Hoeveel waarde heeft HUMINT naast CYBERINT, hoe is de WIV een gedrocht van een wet geworden en zetten we onze cybermiddelen voldoende in?

20 Minute Leaders
Ep711: Reuben Braham | VP Marketing, Cyberint

20 Minute Leaders

Play Episode Listen Later Jan 15, 2022 23:58


Reuben is an experienced marketing executive with an extensive background in building brands and developing sales pipeline via structured demand generation that includes an ABM strategy. He's been with many key organizations like SailPoint, CheckPoint, Comverse, Microsoft and Formula and more recently as VP Marketing for Cyberint. Reuben specialized in B2B enterprise marketing of technology products with focus on cybersecurity during the last 10 years. He built, managed and scaled marketing teams globally and brings a rich knowledge of sales, business development, building partner channels and technology alliances.

Cybersecurity Heroes
Don't Underestimate the Human Element in Your Threat Intelligence Program

Cybersecurity Heroes

Play Episode Listen Later Nov 30, 2021 52:10


A great intelligence program cannot run on technology alone. Fully uncovering all existing threats and coming up with the best way to deal with them requires human experts, too. Yochai Corem, CEO of Cyberint, believes that the human element is equally important to machine learning and any other threat detections tools. In this episode of Cybersecurity Heroes, he explains the steps they take to gather intelligence and protect a company as well as the value of having a threat intelligence partner.  Show Links Check out Cyberint Connect with Yochai Corem on LinkedIn Follow IRONSCALES on LinkedIn or Twitter Connect with Brendon Rod on LinkedIn  ----------------------------- We're stronger together. Keep connected with Cyber Security Heroes at Apple Podcasts, Spotify, Stitcher and Google Podcast. Catch all the links to the episode below or search for #CyberSecurityHeroes in your favorite podcast player. Sounder: Apple: Spotify:  CyberSecurityHeroes is brought to you by IRONSCALES. An email security platform powered by AI, enhanced by thousands of customer security teams and built around detecting and removing threats in the inbox. We offer a service that is fast to deploy, easy to operate and is unparalleled in the ability to stop all types of email threats, including advanced attacks like BEC, ATO and more. Learn more at ironscales.com

Cracking Cyber Security Podcast from TEISS
teissTalk: Identifying and responding to credential theft

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later Sep 29, 2021 54:47


This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk  On this episode, we focus on the following news story; Stolen Credentials Led to Data Theft at United Nations https://threatpost.com/data-theft-united-nations/169357/  The panel discussion is titled “Identifying and responding to credential theft” https://www.teiss.co.uk/teisstalk/identifying-and-responding-to-credential-theft/  This episode is hosted by Jenny Radcliffe  https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/   Our Guests are: Bridget Kenyon, EMEA CISO & Information Security Programmes Lead, Thales DIS https://www.linkedin.com/in/bridgetkenyon/  Danny Dresner, Professor of Cyber Security, University of Manchester https://www.linkedin.com/in/danny-dresner-fciis-6382381  Neil Sinclair, National Cyber Lead, Police Digital Security Centre https://www.linkedin.com/in/neil-sinclair-a8036628  Yochai Corem, CEO, Cyberint https://www.linkedin.com/in/yochaicorem 

RT
Boom Bust: Cybercrime rising on Telegram? & SEC seeks crypto regulation

RT

Play Episode Listen Later Sep 18, 2021 24:56


New reports from the Financial Times and Cyberint have shown that cybercrime is on the rise on the encrypted messaging platform Telegram. Boom Bust's Ben Swann brings us up to speed on the investigation and what it means for the service. Then we turn to the ongoing labor shortage in the United States as the restaurant industry continues to bear the brunt of it. RT's Sayeh Tavangar brings us an on-the-ground report from the struggling sector. And SEC head Gary Ginsler has called for greater control of the cryptocurrency industry this week on Capitol Hill. Boom Bust's Christy Ai and Jeffrey Tucker of the Brownstone Institute weigh in on the fintech's legal grey area.

The Tech That Connects Us
When everything is fine, I don't feel comfortable – I like to move things forward… Episode 42 - Reuben Braham, Vice President Marketing, Cyberint

The Tech That Connects Us

Play Episode Listen Later Jul 28, 2021 38:46


Wonderful speaking with global Cyber marketing expert Reuben Braham (ex-Check Point, SailPoint and now leading marketing for Cyberint) on what makes him tick, how his wife is his biggest influence, why Israel is such a cyber powerhouse, how “in the Cyber Space there is no Fort Knox… there is always a way in” – plus perspectives on post-Covid marketing trends, and on creating meaningful marketing content which cuts through the noise.

Les Causeries Data
#4 - La cybersécurité dans tous ses États et les enjeux de souveraineté.

Les Causeries Data

Play Episode Listen Later Jun 7, 2021 62:05


La cybersécurité dans tous ses États. Et les enjeux de souveraineté. Le règne des données qui constitue le terreau d'une guerre économique et virtuelle est-il en mesure de réguler et de protéger les libertés individuelles de nos concitoyens et les innovations de nos entreprises nationales ? Face aux ingérences étrangères, comment appréhender les cyber risques qui menacent notre souveraineté numérique hexagonale ? Quels sont les outils juridiques mis à notre disposition pour lutter contre la prédation de certains États ?  À l'heure où la France traverse une crise sanitaire sans précédent, n'existerait-il pas également une pandémie des cyber risques qui entendent déstabiliser un peu plus nos sociétés connectées du XXIe siècle ? Pour ce rendez-vous des cultures numériques, nous avons le plaisir de recevoir de nombreux experts en cybersécurité, au côté de Maître France Charruyer :  Nicolas ARPAGIAN : Vice-Président en charge de la Stratégie, des Affaires publiques et de la RSE d'Orange Cyberdefense. Il enseigne à l'Ecole Nationale Supérieure de la Police et à l'Ecole de Guerre Economique. Nicolas est administrateur de la plateforme cybermalveillance.gouv.fr et auteur d'une douzaine d'ouvrages dont « La Cybersécurité » aux Presses Universitaires de France (PUF), Stéphane AYACHE : Responsable cyber sécurité chez Cyberint, avec 23 ans au sein du groupe Steria en charge de l'open innovation groupe. Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.

Hustle: Inside The Industry
Episode 43: Cybersecurity in the Philippines with Cyberint

Hustle: Inside The Industry

Play Episode Listen Later Nov 23, 2020 30:52


In this episode, 28-year old Mara Miano, a regional specialist for an international security firm, gives a detailed picture of the Philippines' digital landscape.

Safety Talk Podcast
Safety Talk #46 – CoViD-19 & cybersecurity risks with Itay Yanovski

Safety Talk Podcast

Play Episode Listen Later May 26, 2020 68:59


Accomplished cybersecurity expert Itay Yanovksi joins the show to discuss all aspects of IT security in the wake of the COVID 19 pandemic. Itay’s company Cyberint, fulfills a wide variety of security threat detection and response services across many industries including banking, telecom, ecommerce, critical infrastructure and government. He discusses the rapidly changing landscape of […]

CISO-Security Vendor Relationship Podcast
Rest Assured, We're Confident Our Security Sucks

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Nov 26, 2019 37:19


All links and images for this episode can be found on CISO Series (https://cisoseries.com/rest-assured-were-confident-our-security-sucks/) We may not have the protection you want, but what we lack in adequate security we make up in confidence. Sleep better at night after you listen to this week's episode of CISO/Security Vendor Relationship Podcast. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our guest this week is Billy Spears (@billyjspears), CISO, loanDepot. Thanks to this week's podcast sponsor, CyberInt. The high ROI is what makes spear phishing campaigns so attractive to threat actors. Read our breakdown of TA505’s latest series of attacks. CyberInt has been tracking various activities surrounding this and other similar attacks where legit means were used to hack international companies in the retail & financial industries. On this week’s episode Why is everybody talking about this now? Tip of the hat to Eduardo Ortiz for forwarding this discussion Stuart Mitchell of Stott and May initiated on LinkedIn asking if there should be a "golden bullet" clause in a CISO's contract. He was referring to the CISO of Capital One who had to step down and take on a consulting role after the breach. What are arguments for and against? Ask a CISO Nir Rothenberg, CISO, Rapyd asks, "If you were given control of company IT, what would be the first things you would do?" What's Worse?! Should a CISO be closing sales or securing the company? Hey, you're a CISO, what's your take on this? According to Nominet's Cyber Confidence Report, 71 percent of CISOs say their organization uses the company's security posture as a selling point, even though only 17% of CISOs are confident about their security posture. There are probably many factors that contribute to this disparity. Is it a gap that will ever close, or is this just the nature of security people vs. sales? Bluetooth is a convenient and easy method of sharing data between devices, which, of course, qualifies it as a prime target for exploitation. A trio of researchers has discovered a vulnerability that has the potential of attacking billions of Bluetooth-enabled devices, including phones, laptops, IoT and IIoT technologies. In short, this Key Negotiation of Bluetooth vulnerability, which has been given the acronym KNOB, exploits the pairing encryption protocol within the Bluetooth Classic wireless technology standard, which supports encryption keys with entropy between 1 and 16 bytes/octets. It inserts between the pairing devices forcing both to agree to encryption with 1 byte or 8 bits of entropy, after which it simply brute-forces the encryption keys. More on CISO Series. Check out lots more cloud security tips sponsored by OpenVPN, provider of next-gen secure and scalable communication software. OpenVPN Access Server keeps your company’s data safe with end-to-end encryption, secure remote access, and extension for your centralized UTM. What do you think of this pitch? How targeted should your pitch have to be?  

CISO-Security Vendor Relationship Podcast
Cybercrimes Solved in an Hour or Your Next One's Free

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Oct 8, 2019 31:14


All links and images for this episode can be found on CISO Series (https://cisoseries.com/cybercrimes-solved-in-an-hour-or-your-next-ones-free/) In the real world, cybercrimes just don't get solved as fast as they do on CSI. So we're offering a guarantee. If we don't catch the cyber-perpetrator in an hour (including commercial breaks) we'll make sure you're attacked again. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our sponsored guest this week is Jason Hill (@chillisec), lead researcher at CyberInt Research Lab. Thanks to this week's podcast sponsor, Cyberint. The high ROI is what makes spear phishing campaigns so attractive to threat actors. Read our breakdown of TA505’s latest series of attacks. CyberInt has been tracking various activities surrounding this and other similar attacks where legit means were used to hack international companies in the retail & financial industries. On this week's episode What annoys a security professional Question on Quora asks, "What does everybody get wrong about working in the field of forensics?" There were a handful of answers from looking to TV and film dramas to that it's only a post mortem analysis. What are the biggest misconception of digital forensics? Why is everybody talking about this now? Tip of the hat to Stu Hirst of Just Eat who posted this Dilbert cartoon that got a flurry of response. Read for yourself, but in essence, it's a boss that thought technology would solve all his problems. Not realizing that people and process are also part of the equation. All too familiar. The "I've been hearing a lot about __________" phenomenon. What causes this behavior and how do you manage it? "What's Worse?!" How much flexibility to you require in your security team and the business? Please, Enough. No, More. How far can AI go? Where does the human element need to exist? What are the claims of the far reaching capabilities of AI? We discuss what we'd like to hear regarding the realistic capabilities and limitations of AI. Every year, the Fall season sees billions of dollars being spent on home-based IoT devices. The back-to-school sales are the starting point, Cyber Monday is the clubhouse turn and the year-end holiday season is the finish line. As usual, these devices – printers, DVRs, IP cameras, smart home assistants, are relatively inexpensive and provide plug and play convenience, to satisfy an impatient customer base. For the rest of the cloud tip, head to CISO Series. Check out lots more cloud security tips sponsored by OpenVPN, provider of next-gen secure and scalable communication software. OpenVPN Access Server keeps your company’s data safe with end-to-end encryption, secure remote access, and extension for your centralized UTM. We don't have much time. What's your decision? What are the best models for crowdsourcing security? There are entire businesses, such as bug bounty firms, that are dedicated to creating crowdsourced security environments. Our guest this week is passionate about investigative work. We asked him and Mike what elements they've found that inspire and simplify the community to participate in a crowdsourced security effort.

Brains Byte Back
Exploring the dark web with an ethical hacker and a former Israeli Police Cyber-crime operative

Brains Byte Back

Play Episode Listen Later Jul 29, 2019 43:40


On this episode we take a look at the dark web, an area of the internet that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable. This anonymity has given criminals the opportunity to run illegal businesses selling everything from drugs to credit card details, and even child pornography. However, this anonymity has also enabled journalists and activists to communicate, while protecting them from tyrannical governments and regimes. To understand more about this space, we spoke with Alex Heid, the Chief Research Officer at SecurityScorecard and the president and CEO of HackMiami, along with Alex Peleg, the head of Cyber Operations at CyberInt who also worked for the Israeli Police Cyber-crime unit Lahav 433.

CISO-Security Vendor Relationship Podcast
Passwords So Good You Can't Help But Reuse Them

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Jul 16, 2019 37:20


All links and images for this episode can be found on CISO Series (https://cisoseries.com/passwords-so-good-you-cant-help-but-reuse-them/) We've just fallen in love with our passwords we just want to use them again and again and again. Unfortunately, some companies more interested in security aren't letting us do that. We discuss on the latest episode of CISO/Security Vendor Relationship Podcast. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our guest this week is William Gregorian (@WillGregorian), CISO, Addepar. Thanks to this week's podcast sponsor Cyberint The high ROI is what makes spear phishing campaigns so attractive to threat actors. Read our breakdown of TA505's latest series of attacks. CyberInt has been tracking various activities surrounding this and other similar attacks where legit means were used to hack international companies in the retail & financial industries. How CISOs are digesting the latest security news Chris Castaldo of 2U and a former guest on the show posted this great story of TripAdvisor invalidating user credentials if a member's email and password were found in publicly leaked data breach databases. Is this a great or bad move by TripAdvisor? Ask a CISO On LinkedIn, Chad Loder, CEO, Habitu8 posted an issue about the easy deployment and ubiquity of cloud applications. He argues it's no longer Shadow IT. It's just IT. And securing these cloud tools you don't manage nor know about requires a lot of education. Is Shadow IT inevitable. Should we lose the name? And is education the primary means of securing these services? It's time to play, "What's Worse?!" One of the toughest rounds of "What's Worse?!" we've ever had. Close your eyes. Breathe in. It's time for a little security philosophy. Mike posed a "What's Worse?!" scenario to the LinkedIn community and got a flurry of response. The question was "Would you rather have amazing, quality cybersecurity incident response in 24 hours or spotty, unreliable response in one hour?" I wanted to know what was Mike's initial response and did anyone say anything in the comments to make him change his mind? For quite a while, IT security experts have been touting the value of two factor authentication (2FA) as a better way to keep data safe than simply using passwords alone. We have even spoken about it here. In its most popular form, 2FA sends a confirmation code to your phone, which you must then enter into the appropriate log-in confirmation window within a short amount of time. This is like having a second key to the safe, like many bank vaults used to have. (more on the site) It’s time to measure the risk Chelsea Musante of Akamai asks, "What would you say to someone who thinks their risk for credential abuse / account takeover has decreased because they've implemented MFA (multi-factor authentication)?"

Technado from ITProTV
The Technado, Episode 92: CyberInt’s Daniela Perlmutter

Technado from ITProTV

Play Episode Listen Later Mar 25, 2019 78:10


Don was joined by Cherokee and Technado newbie Adam Gordon this week. The three spoke with CyberInt’s Daniela Perlmutter about their global managed detection and response services. They also covered the news, including plain-text passwords, Linux development, and the MySpace meltdown.

Technado from ITProTV (Audio)
The Technado, Episode 92: CyberInt’s Daniela Perlmutter

Technado from ITProTV (Audio)

Play Episode Listen Later Mar 25, 2019 78:03


Don was joined by Cherokee and Technado newbie Adam Gordon this week. The three spoke with CyberInt’s Daniela Perlmutter about their global managed detection and response services. They also covered the news, including plain-text passwords, Linux development, and the MySpace meltdown.

Technado from ITProTV
The Technado, Episode 92: CyberInt’s Daniela Perlmutter

Technado from ITProTV

Play Episode Listen Later Mar 25, 2019 78:10


Don was joined by Cherokee and Technado newbie Adam Gordon this week. The three spoke with CyberInt’s Daniela Perlmutter about their global managed detection and response services. They also covered the news, including plain-text passwords, Linux development, and the MySpace meltdown.

Technado from ITProTV
The Technado, Episode 92: CyberInt’s Daniela Perlmutter

Technado from ITProTV

Play Episode Listen Later Mar 25, 2019 78:10


Don was joined by Cherokee and Technado newbie Adam Gordon this week. The three spoke with CyberInt’s Daniela Perlmutter about their global managed detection and response services. They also covered the news, including plain-text passwords, Linux development, and the MySpace meltdown.

Technado from ITProTV (Audio)
The Technado, Episode 92: CyberInt’s Daniela Perlmutter

Technado from ITProTV (Audio)

Play Episode Listen Later Mar 25, 2019 78:03


Don was joined by Cherokee and Technado newbie Adam Gordon this week. The three spoke with CyberInt’s Daniela Perlmutter about their global managed detection and response services. They also covered the news, including plain-text passwords, Linux development, and the MySpace meltdown.

Technado from ITProTV (Audio)
The Technado, Episode 92: CyberInt’s Daniela Perlmutter

Technado from ITProTV (Audio)

Play Episode Listen Later Mar 25, 2019 78:03


Don was joined by Cherokee and Technado newbie Adam Gordon this week. The three spoke with CyberInt’s Daniela Perlmutter about their global managed detection and response services. They also covered the news, including plain-text passwords, Linux development, and the MySpace meltdown.

George Buhnici | #IGDLCC
DE VORBĂ CU SRI (Serviciul Român de Informații) – #IGDLCC E010

George Buhnici | #IGDLCC

Play Episode Listen Later Mar 24, 2019 59:22


Astăzi vei afla de la invitatul meu cum e în viața reală cu atacurile cibernetice. Stăm de vorbă cu Anton Rog, general de brigadă, seful diviziei Cyberint de la SRI.

Enterprise Security Weekly (Video)
RSAC 2019 Recap - Enterprise Security Weekly #129

Enterprise Security Weekly (Video)

Play Episode Listen Later Mar 16, 2019 60:44


Paul Asadoorian and Matt Alderman recap RSA Conference 2019, including their briefings with: - 42Crunch - Baffle - CyberInt - Eclypsium - Ericom Software - Lacework - Radware - RiskRecon and More! Full Show Notes: https://wiki.securityweekly.com/ES_Episode129 Visit http://securityweekly.com/esw for all the latest episodes!

rsa conference rsac baffle lacework radware paul asadoorian eclypsium ericom software cyberint enterprise security weekly matt alderman 42crunch rsa19
Paul's Security Weekly TV
RSAC 2019 Recap - Enterprise Security Weekly #129

Paul's Security Weekly TV

Play Episode Listen Later Mar 16, 2019 60:44


Paul Asadoorian and Matt Alderman recap RSA Conference 2019, including their briefings with: - 42Crunch - Baffle - CyberInt - Eclypsium - Ericom Software - Lacework - Radware - RiskRecon and More! Full Show Notes: https://wiki.securityweekly.com/ES_Episode129 Visit http://securityweekly.com/esw for all the latest episodes!

rsa conference rsac baffle lacework radware paul asadoorian eclypsium ericom software cyberint enterprise security weekly matt alderman 42crunch rsa19