The protection of computer systems from theft or damage
POPULARITY
Categories
Tom Ilube gives scholarships gifted students from all over Africa. They then have the opportunity to focus on science and mathematics. It's only right that he then learns the word in Chinese for ”gifted” with Chineasy's expert teacher ShaoLan.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Geoserver Scans https://isc.sans.edu/diary/Ongoing%20scans%20for%20Geoserver/29926 Barracuda Recommends Replacing Compromised Devices https://www.barracuda.com/company/legal/esg-vulnerability Google improves Chrome Password Manager https://www.msn.com/en-us/news/other/chrome-adds-windows-biometric-logins-to-its-password-powers/ar-AA1ciCCf Minecraft Mods Include Malicious Code https://www.bleepingcomputer.com/news/security/new-fractureiser-malware-used-curseforge-minecraft-mods-to-infect-windows-linux/ Trend Micro Service Pack https://files.trendmicro.com/documentation/readme/Apex%20One/2020/apex_one_2019_win_cp_b12033_EN_Critical_Patch_Readme.html
Ron Gula is the President at Gula Tech Adventures which focuses on investing in cyber technology, supporting cyber policy and recruiting more people to the cyber workforce. Before starting GTA, Ron was the CEO & Co-Founder at Tenable.
I sit down with Jeetu Patel at Cisco Live. We discuss the scale of global security and its far-reaching implications for every individual and organization. Jeetu provides a comprehensive look at the challenges of cybersecurity and how the digital landscape is changing. We explore the idea of making security a seamless, frictionless experience for users through the latest release of Cisco Secure Access, aimed at simplifying and enhancing cybersecurity measures for all. Our conversation also navigates the complexities of current security setups, where companies often struggle with managing numerous products and policy engines. Jeetu shares insights on the importance of reducing cognitive load for users and the efforts Cisco is making to accomplish this. This podcast is a deep dive into the significance of achieving a balance between zero trust and zero friction, to provide least privileged access without overcomplicating the security process. Jeetu also touches on the importance of integrating AI in cybersecurity to handle sophisticated attacks at scale. He gives us a sneak peek into Cisco's upcoming security policy management gen AI assistant, set to revolutionize the way security rules are managed and hygiene is maintained in the cybersecurity space. Listen in to stay updated on Cisco's upcoming releases and to gain valuable insights into the future of cybersecurity. Whether you're a tech enthusiast, an IT administrator, or a general user, this conversation will provide crucial takeaways for you. Tune in to discover how Cisco is shaping the future of global security and what it means for you.
A powerful online presence monitoring tool, Kanary is designed to protect your personal information from being exposed on the internet. It diligently searches through various websites to identify any instances of your data, such as your home address, phone number, email address, or leaked passwords. With just a single click, Kanary swiftly removes these risks. Learn more at https://kanary.com
Cybersecurity is a big challenge for all businesses these days. Regardless of the size of the business or industry it's in, hackers are continuously trying to exploit weaknesses to gain access to networks and data. NIST and CISA have some new resources and guides that can help small and medium size businesses face the growing cyber threat. More info at HelpMeWithHIPAA.com/410
Guest: Saman Fatima, Graduate Research Assistant at Georgia State UniversityOn Twitter | https://twitter.com/saman_3014On LinkedIn | https://www.linkedin.com/in/saman-fatima-30/Host: Phillip WylieOn ITSPmagazine
Guest: Sam Curry, VP, CISO at Zscaler [@zscaler]On Twitter | https://twitter.com/samjcurryOn LinkedIn | https://www.linkedin.com/in/currysam/Host: Chloé MessdaghiOn ITSPmagazine
Guests:Dr. Stacy Thayer, Senior Manager, Marketing Research and Engagement at Netography [@netography] and Adjunct Professor of CyberPsychology at Norfolk State University [@Norfolkstate]On LinkedIn | https://www.linkedin.com/in/stacythayer/Dr. Darius Hines-Cross, Security Assigned Expert at Splunk [@splunk]On LinkedIn | https://www.linkedin.com/in/dariushinescross/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesIn this episode of Redefining Cybersecurity on ITSPmagazine Podcast Network, host Sean Martin is joined by Dr. Stacy Thayer and Dr. Darius Hines-Cross to explore how virtual and augmented reality can be used in cybersecurity to improve business operations. Throughout the conversation, the group discusses the possibilities and ethical implications of using these technologies. They speculate on how virtual and augmented reality can be used to improve cybersecurity operations, such as training and simulations.The experts explore the wide range of implications and opportunities that virtual and augmented reality offer in various industries, including the healthcare industry to help draw some analogies to other business operations. In another example, virtual reality can allow individuals to experience alternate worlds and places that may not be physically accessible. However, the group also discusses the potential dangers of crafted reality, where the reality is still controlled by someone else. They also discuss how virtual classrooms could be used to improve student participation in courses.During the episode, the group also touches on the challenges of implementing such technology and the importance of doing research and risk analysis before investing. Small and medium-sized businesses are also discussed, with emphasis on the potential risks associated with implementing technology without proper security concerns. The podcast ends by stressing the opportunities and challenges of using virtual and augmented reality in various industries, including cybersecurity, and how technology can be used ethically to improve society.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
He never planned to climb the ladder of corporate technology leadership. But an obsession with hard problems led him down the path to becoming the CTO for South Africa's Capitec Bank. In this episode, learn more about Andrew Baker's career arc, including going from "my very first project was to remove Zscaler because I didn't see the value in it," to leading three successful zero trust transformations and becoming a Zscaler advisor.
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance https://barricadecyber.com.Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Assessments! https://panoptcy.com/Gerald's practical skills course with no prerequisites - GRC Analyst Master Class - https://simplycyber.teachable.com
Rich Lily When they bring on a new customer, they will assess their security network and the security applications being used to make sure that they integrate properly. Then they will design a new security solution around the useful components already being utilized. Rich Lilly, Director, Security discusses the security options and some of the latest trends including: Zero Trust Microsoft Security Solutions Staff shortages – they can fill the gap. AI – leverage it in the company for efficiency. Listen in as Rich discuss Zero Trust deployment, how to deal with Shadow IT, and how organizations can protect themselves from ransomware attacks. A Relentless Pursuit of Our Clients' Best Interests Their approach sets them apart from other providers. Their team of experts will work with you to identify the cybersecurity and IT solutions that serve your needs and budget. Their advanced expertise and insatiable desire to deliver measurable results leads to fast execution and immediate time-to-value so you can focus on running your winning business. Bringing Technology and Cybersecurity to the Forefront of Business Problem Solving Today's business challenges can't be solved by point products, but rather through integrated, holistic solutions. That's why they've gone the extra mile to ensure they provide the highest standards of service backed by the industry's leading technology. For more information, go to: www.netrixglobal.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
DMARC in .co TLD https://isc.sans.edu/diary/Management%20of%20DMARC%20control%20for%20email%20impersonation%20of%20domains%20in%20the%20.co%20TLD%20-%20part%202/29922 Three Vulnerabilities in VMWare Aria Operations for Networks https://www.vmware.com/security/advisories/VMSA-2023-0012.html SpinOK Spyware SDK found in Android Apps https://vms.drweb.com/search/?q=Android.Spy.SpinOk&lng=en https://www.cloudsek.com/threatintelligence/supply-chain-attack-infiltrates-android-apps-with-malicious-sdk Cisco Anyconnect Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-csc-privesc-wx4U4Kw RSA Webcast https://www.rsaconference.com/library/webcast/149-sans-followup-2023
In this episode of Cybercrime Radio, host Steve Morgan is joined by Gordon Lawson, CEO at Conceal, and Ed Parker, CEO at Moruga, Inc, a Scottsdale, Ariz.-based managed IT services firm. Together, they discuss managed IT services, the importance of teamwork when it comes to cybersecurity, and more. To learn more about our sponsor, visit https://conceal.io
CISO Bytes is a Cybercrime Magazine podcast series sponsored by Mastercard, providers of enterprise cybersecurity solutions that are more than just ones and zeros. Joining host Alissa Abdullah, aka Dr Jay, former White House Technology executive and Deputy Chief Security Officer at Mastercard, on this episode is Devon Bryan, Global CISO at Carnival Corporation. To learn more about our sponsor, visit https://mastercard.com
Continuously discovering, analyzing, and monitoring all OT, IT and IOT assets within the operational environment, GM Sectec aggregates security events and digital risks from across the entire network. It then correlates the risks and alerts, prioritizing them based on their impact on operational and business continuity. In doing so, alert fatigue is significantly reduced, with thousands of security events shrunk down into a manageable number of insights, allowing security teams to concentrate on what matters most. Visit https://gmsectec.com for more information.
Shownotes can be found at https://www.profitwithlaw.com/382.You're just a small company, so surely cybercriminals won't target you, right? Or maybe you're thinking, "We're a really big company; no one would dare target us." The truth is both of these statements are wrong. Cyber risk threatens everyone — as long as you make yourself an easy target. That's why everyone, whether you're a nine-figure law firm or a small corner shop, should learn how to get into cybersecurity.In this episode, Kip Boyle discusses why and how to get into cybersecurity. We review basic security procedures that drastically reduce your cyber risk and explain one of the most common attacks.If you're a business with any kind of digital presence, this episode is for you.00:00 Introduction7:19 Who Is Kip Boyle?11:32 How to View Cybersecurity Risks23:23 Understanding Phishing30:16 How to Get Into Cybersecurity40:36 What Kind of Client Needs Cybersecurity?50:09 Kip's Parting Advice: Be More DifficultResources mentioned:Check out the new Profit with Law YouTube channel!Want to implement what you've learnt in this episode? Download the Action Guide, a workbook designed to help you process and implement the knowledge gained from this interview.Learn more about the Profit with Law Elite Coaching Program here. Connect with Kip Boyle: LinkedIn | TwitterCyber Risk ManagementCyber Risk Management PodcastGet a free copy of Fire Doesn't Innovate through the Cyber Risk Management and Profit with Law CollaborationLastpassJoin our Facebook Community: https://www.facebook.com/groups/lawfirmgrowthsummit/To request a show topic, recommend a guest or ask a question for the show, please send an email to info@dreambuilderfinancial.com.Connect with Moshe on:Facebook - https://www.facebook.com/moshe.amselLinkedIn - https://www.linkedin.com/in/mosheamsel/
Guest: John Chambers, Founder and CEO at JC2 Ventures [@JC2Ventures]On Linkedin | https://www.linkedin.com/in/johnchambersjc/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesOn this episode of Redefining Cybersecurity, John Chambers - former CEO of Cisco and current CEO of JC2 Ventures - speaks with host Sean Martin about the intersection of cybersecurity and risk with AI, the state of enterprise budgets for cybersecurity, innovation in the tech industry, and the need for education and innovation hubs. Chambers warns that companies need a well-thought-out plan when it comes to AI strategies and cybersecurity strategies, emphasizing that those without plans may experience difficulties raising funds and suffer from stock declines. He notes the complexities arising from cybersecurity attacks, specifically those leveraging AI, and highlights the importance of getting ahead of the issue. Chambers also talks about the need for companies to evolve and emphasizes the importance of innovation.Later in the conversation, Chambers and Martin shift to the need for education and innovation hubs, discussing how these hubs are shifting from being limited to only the coasts. They discuss how the industry playbook is similar to previous movements in cloud and internet technology, but the speed of change and disruption has evolved. Chambers highlights the changes occurring in West Virginia and notes the emergence of a new crop of cybersecurity professionals entering the field.The episode concludes with Chambers emphasizing the need for a change in education to achieve long-term success in the industry, with a focus on sharing knowledge and innovation throughout the country. Overall, the episode provides listeners with insights on the future of cybersecurity and innovation, the importance of having a well-planned strategy for both fields, and the need for education and innovation hubs to achieve success.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Scattered across the internet are jigsaw puzzle pieces containing your personal information. If reassembled by an attacker, these puzzle pieces could easily compromise your identity. Our returning guest today is Len Noe, CyberArk's resident transhuman (a.k.a. cyborg), whose official titles these days are Technical Evangelist, White Hat Hacker and Biohacker. Noe joins host David Puner to shed light on the concept of synthetic identity, which involves gathering publicly available, unprotected data and then using AI chatbots and platforms like ChatGPT along with predictive analytics to correlate the data and generate deep digital portraits of individuals. Then, thinking like an attacker, Noe dives into how this new digital clairvoyance has the potential to up threat actors' games and what organizations and individuals should be doing to combat it. Noe also shares his POV on the implications for cybersecurity and his concerns about sharing personal and proprietary information with AI chatbots and platforms.
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance https://barricadecyber.com.Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Assessments! https://panoptcy.com/Discover the most critical threats and tips on how to overcome remediation fatigue with XM Cyber's 2023 State of Exposure Management report https://bit.ly/3KS0uWsGerald's practical skills course with no prerequisites - GRC Analyst Master Class - https://simplycyber.teachable.com
Episode 203 of the Unsecurity Podcast is live!This week, Oscar and Brad sit down to discuss 'malvertising' and 'malverposting'.Links:“Malverposting” — With Over 500K Estimated Infections... https://labs.guard.io/malverposting-with-over-500k-estimated-infections-facebook-ads-fuel-this-evolving-stealer-54b03d24b349 Give this episode a listen or watch and send any questions, comments, or feedback to unsecurity@protonmail.com.
We sat down with the Managing Director, Cyber Security Services at KPMG, to discuss life on the front lines of securing the most critical national infrastructure, how AI will change security as we know it, and how her mother inspired her to become a leader in this field.
Picture of the Week. Another week of silence from HP. Mandatory "SMB Signing" coming to Windows 11. OWASP. Did Apple help the NSA attack the Kremlin? Kaspersky's analysis of this iPhone attack and compromise. The Trifecta Jackpot! Who wrote that? Tor gets anti-DoS protection. Cybersecurity at Educational institutions. Civilian Surveillance Cameras in Ukraine. Cyber Mercenaries. Closing the Loop. Windows Platform Binary Table. Show Notes: https://www.grc.com/sn/SN-926-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: meraki.cisco.com/twit joindeleteme.com/twittv canary.tools/twit - use code: TWIT
David McCaw is the RVP of Prisma Cloud, Americas at Palo Alto Networks, overseeing their most strategic cloud relationships. Before joining Palo Alto, David was the Co-Founder and VP of Sales at Dasera.
Guest: Igor Volovich, Vice President, Compliance Strategy at Qmulos [@Qmulos]On LinkedIn | https://linkedin.com/in/igorvoOn Twitter | https://twitter.com/CyberIgorOn YouTube | https://www.youtube.com/channel/UC_CQlzYjMnkyt7ilhm-8EPA_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
A new PowerShell remote access tool targets a US defense contractor. Current Russian cyber operations against Ukraine are honing in on espionage. CISA and its partners have released a Joint Guide to Securing Remote Access Software. A bug has been reported in Visual Studio's UI. Awais Rashid from University of Bristol discussing Privacy in health apps. Our guest is Jim Lippie of SaaS Alerts with insights on software as a service Application Security. And are there disconnects between cybersecurity and the legal profession? For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/109 Selected reading. PowerDrop: A New Insidious PowerShell Script for Command and Control Attacks Targets U.S. Aerospace Defense Industry (Adlumin) UAC-0099: cyberespionage against state organizations and media representatives of Ukraine (CERT-UA#6710) (CERT-UA) Guide to Securing Remote Access Software (Joint Guide) Imposter Syndrome: UI Bug in Visual Studio Lets Attackers Impersonate Publishers (Varonis) Press Release | ILTA and Conversant Group Release First Cybersecurity Benchmarking Survey of the Legal Industry (International Legal Technology Association)
Anne is an Engineer for Adafruit Industries in Manhattan which is a small company that engineers electronics for hobbyists and open source software. In this episode, Anne takes us through her amazing journey from working in the State Department and traveling the world to utilizing her electrical engineering skills at Adafruit Industries.00:00 Introduction 4:38 What is Anne Doing Today16:10 Engineering Courses at Caltech 20:30 Most Interesting Projects at Caltech27:23 Dream Job after Graduating32:50 Working for the State Department36:40 Meeting the President 47:20 Managing Technical Security Logistics Globally58:30 Deciding to Retire1:01:35 Engineering at Adafruit 1:09:40 Plans for the FutureConnect with Anne: Twitter: https://twitter.com/anne_engineerMentioned in today's episode:Adafruit: https://www.adafruit.comWant more from Ardan Labs? You can learn Go, Kubernetes, Docker & more through our video training, live events, or through our blog!Online Courses : https://ardanlabs.com/education/ Live Events : https://www.ardanlabs.com/live-training-events/ Blog : https://www.ardanlabs.com/blog Github : https://github.com/ardanlabs
Keeper Security's next-gen privileged access management, or PAM, solution delivers enterprise-grade password, secrets and privileged connection management in one unified platform. Not only is it fast and easy to deploy, but Keeper's patented PAM solution enables organizations to achieve complete visibility, security, control and reporting across every privileged user on every device within the organization. Learn more at https://keepersecurity.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Github Copilot vs Google: Which Code is More Secure https://isc.sans.edu/forums/diary/Github%20Copilot%20vs.%20Google%3A%20Which%20code%20is%20more%20secure/29918/ Android Update https://source.android.com/docs/security/bulletin/2023-06-01 Chrome Updates https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html FBI Warns of Manipulated Photos and Videos For Sextortion https://www.ic3.gov/Media/Y2023/PSA230605
Cleve Adams is Founder of the Trestles Group, Inc. His specialty is building and selling tech companies and has had 8 M&A Exits. Cleve has been fortunate enough to be named one of the Top 50 Non-Technical Founders In Tech Industry History, and to be Co-Founder and CEO of the #2 Company in Forbes's Most Promising Companies in America. He is also featured in the new Bestselling books "Cyberminds" and "Right Leaders, Right Time." Cleve is a 5-time award-winning VC/PE-backed Transactional CEO managing companies from pre-revenue to over $2 billion and has been hired by VC/PE firms to build and sell their portfolio companies. Cleve's average return to investors is 21x. He helped start, build and manage the largest company in the SaaS/Cloud cybersecurity software market from pre-revenue to a $1.0B IPO, the largest in San Diego county history and the first Cybersecurity Unicorn. Cleve has over 20+ years of senior management, operations, sales and marketing experience in Security software, AI, Mobile, Wireless, SaaS/Cloud, Mobile security, digital and social media and Fintech. He has built a successful sales and marketing channel of 1100 resellers and distributors in 82 countries. Cleve has expertise in raising capital and has raised over $300M from tier-one VC's for multiple companies. Cleve led the team that started security titan Websense and grew them from pre-revenue to a $1 Billion IPO in less than 3 years. The company was subsequently sold to Raytheon for $2 billion. Cleve has been honored to serve as a software industry expert and speaker at numerous conferences, universities and corporations including the Harvard Alumni Assoc, Amazon, Investor Conferences, Cyber Security and Smart City Conferences. He has been quoted in top business publications including The Wall Street Journal, Forbes, and many more. -- Critical Mass Business Talk Show is Orange County, CA's longest-running business talk show, focused on offering value and insight to middle-market business leaders in the OC and beyond. Hosted by Ric Franzi, business partner at Renaissance Executive Forums Orange County. Learn more about Ric at www.ricfranzi.com. Catch up on past Critical Mass Business Talk Show interviews... YouTube: https://lnkd.in/gHKT2gmF LinkedIn: https://lnkd.in/g2PzRhjQ Podbean: https://lnkd.in/eWpNVRi Apple Podcasts: https://lnkd.in/gRd_863w Spotify: https://lnkd.in/gruexU6m #orangecountyca #mastermind #ceopeergroups #peergroups #peerlearning
Picture of the Week. Another week of silence from HP. Mandatory "SMB Signing" coming to Windows 11. OWASP. Did Apple help the NSA attack the Kremlin? Kaspersky's analysis of this iPhone attack and compromise. The Trifecta Jackpot! Who wrote that? Tor gets anti-DoS protection. Cybersecurity at Educational institutions. Civilian Surveillance Cameras in Ukraine. Cyber Mercenaries. Closing the Loop. Windows Platform Binary Table. Show Notes: https://www.grc.com/sn/SN-926-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: meraki.cisco.com/twit joindeleteme.com/twittv canary.tools/twit - use code: TWIT
Picture of the Week. Another week of silence from HP. Mandatory "SMB Signing" coming to Windows 11. OWASP. Did Apple help the NSA attack the Kremlin? Kaspersky's analysis of this iPhone attack and compromise. The Trifecta Jackpot! Who wrote that? Tor gets anti-DoS protection. Cybersecurity at Educational institutions. Civilian Surveillance Cameras in Ukraine. Cyber Mercenaries. Closing the Loop. Windows Platform Binary Table. Show Notes: https://www.grc.com/sn/SN-926-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: meraki.cisco.com/twit joindeleteme.com/twittv canary.tools/twit - use code: TWIT
Picture of the Week. Another week of silence from HP. Mandatory "SMB Signing" coming to Windows 11. OWASP. Did Apple help the NSA attack the Kremlin? Kaspersky's analysis of this iPhone attack and compromise. The Trifecta Jackpot! Who wrote that? Tor gets anti-DoS protection. Cybersecurity at Educational institutions. Civilian Surveillance Cameras in Ukraine. Cyber Mercenaries. Closing the Loop. Windows Platform Binary Table. Show Notes: https://www.grc.com/sn/SN-926-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: meraki.cisco.com/twit joindeleteme.com/twittv canary.tools/twit - use code: TWIT
Picture of the Week. Another week of silence from HP. Mandatory "SMB Signing" coming to Windows 11. OWASP. Did Apple help the NSA attack the Kremlin? Kaspersky's analysis of this iPhone attack and compromise. The Trifecta Jackpot! Who wrote that? Tor gets anti-DoS protection. Cybersecurity at Educational institutions. Civilian Surveillance Cameras in Ukraine. Cyber Mercenaries. Closing the Loop. Windows Platform Binary Table. Show Notes: https://www.grc.com/sn/SN-926-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: meraki.cisco.com/twit joindeleteme.com/twittv canary.tools/twit - use code: TWIT
Picture of the Week. Another week of silence from HP. Mandatory "SMB Signing" coming to Windows 11. OWASP. Did Apple help the NSA attack the Kremlin? Kaspersky's analysis of this iPhone attack and compromise. The Trifecta Jackpot! Who wrote that? Tor gets anti-DoS protection. Cybersecurity at Educational institutions. Civilian Surveillance Cameras in Ukraine. Cyber Mercenaries. Closing the Loop. Windows Platform Binary Table. Show Notes: https://www.grc.com/sn/SN-926-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: meraki.cisco.com/twit joindeleteme.com/twittv canary.tools/twit - use code: TWIT
Listen to this interview of Mathias Payer, a security researcher and associate professor at the EPFL School of Computer and Communication Science, leading the HexHive group. We talk about research as a social activity — No researcher can go it alone! Mathias Payer: "Reading and writing are integral parts to the research process. I would even say that there's a split one-third, one-third, one-third: for one-third, you're doing research; for the next third, you're reading about research; and for the final third, you're writing about your research. So you should split this up equally, and I say the same to my students. They should be reading several papers each week, for example." Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network
Cybersecurity & Privacy with Ganesh Krishnan and Punit Bhatia in The FIT4Privacy Podcast E088 S4 We all care about the security of our data, especially in a world where cyber-attacks are becoming more and more sophisticated making us a little more vulnerable. That's what we'll be discussing with our guest today, to get more insight on the subject. Watch this podcast about cybersecurity and privacy with Ganesh Krishnan and Punit Bhatia. KEY CONVERSATION POINTS Difference between cybersecurity and security Data Protection and Cybersecurity Scalability of the security organization Challenges of the cybersecurity landscape ABOUT THE GUEST Meet Ganesh Krishnan, a cybersecurity superhero with over 25 years of experience protecting the digital world from cyber threats. As a two-time founder with a track record of success at some of the world's top tech companies, he's earned a reputation as a thought leader at the forefront of cybersecurity. Now at the helm of Anzenna, his latest security startup, he's out to revolutionize the industry by making cybersecurity accessible to every employee, not just the security team. Ganesh first realized his passion for digital security in college, working in the Purdue University cybersecurity lab. After earning his master's in Computer Science in 1997, he immediately got to work in the industry. Over the next two decades he worked his way to top-level security and engineering roles at companies like Yahoo!, LinkedIn, and Atlassian, as well landing a spot on the Forbes Technology Council. In 2017 Ganesh launched his first company, an AI-powered cybersecurity startup called Avid Secure, which was acquired after only 18 months. But despite his success, he wasn't content to rest on his laurels. He realized that in order to meet the challenges that lie ahead in the field of cybersecurity, the industry needed a paradigm shift. So he launched a new company, Anzenna, with a simple yet powerful goal: to reimagine cybersecurity by empowering every employee with simple and effective security tools. They may be just getting started, but if Ganesh's past performance is any indicator, the world of digital security is about to change forever. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites: www.fit4privacy.com , www.punitbhatia.com Podcast: https://www.fit4privacy.com/podcast Blog: https://www.fit4privacy.com/blog YouTube: http://youtube.com/fit4privacy --- Send in a voice message: https://podcasters.spotify.com/pod/show/fit4privacy/message
Picture of the Week. Another week of silence from HP. Mandatory "SMB Signing" coming to Windows 11. OWASP. Did Apple help the NSA attack the Kremlin? Kaspersky's analysis of this iPhone attack and compromise. The Trifecta Jackpot! Who wrote that? Tor gets anti-DoS protection. Cybersecurity at Educational institutions. Civilian Surveillance Cameras in Ukraine. Cyber Mercenaries. Closing the Loop. Windows Platform Binary Table. Show Notes: https://www.grc.com/sn/SN-926-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: meraki.cisco.com/twit joindeleteme.com/twittv canary.tools/twit - use code: TWIT
As part of our ongoing coverage on cybercrime and cybersecurity, we recently spoke to several top experts about how they see it. On this episode, James McQuiggan, Security Awareness Advocate at KnowBe4, is joined by Susan Koski, CISO at PNC; Laura Deaner, CISO at Northwestern Mutual; Debbie Guild, former CISO and current head of enterprise technology and security at PNC; and Craig Froelich, CISO at Bank of America. To learn more about our sponsor, KnowBe4, visit https://knowbe4.com
This month's installment in our Economics Club series, we learned about York College of Pennsylvania's cybersecurity program and how it's preparing students to address the concerns and prevention of cyberattacks. Our speaker today was Dr. James Norrie, tenured professor at York College of Pennsylvania with terminal degrees in business and law and graduate degrees in education, psychology, engineering, and cybersecurity. He is the Founder and CEO of CyberconIQ based in York, PA. He conducts, presents, and publishes industry-related research and consults globally to prominent companies in financial services, technology, healthcare, and retail concerning cybersecurity, information privacy and security, and economic crime detection and prevention methods. The Economics Club Breakfast series offers an informative monthly breakfast and provides attendees the opportunity to network with key business and community leaders. A variety of speakers discuss economic and business updates important to York County.
Take your home automation experience to the next level with the Roku Indoor Smart Plug. With its seamless integration into existing smart home ecosystems, this advanced device offers cutting-edge technology that enables users to effortlessly control and automate any appliance in their home. Learn more at https://roku.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Brute Forcing Simple Archive Passwords https://isc.sans.edu/diary/Brute%20Forcing%20Simple%20Archive%20Passwords/29914 KeePass 2.54 Released https://keepass.info/news/n230603_2.54.html Splunk Advisories https://advisory.splunk.com/advisories Malicious Google Chrome Extensions https://palant.info/2023/05/31/more-malicious-extensions-in-chrome-web-store/ Symantec Updates https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22217