Podcasts about cyberthreat

  • 366PODCASTS
  • 706EPISODES
  • 31mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 13, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cyberthreat

Show all podcasts related to cyberthreat

Latest podcast episodes about cyberthreat

Early Edition with Kate Hawkesby
Michael Jagusch: National Cyber Security Centre Director of Mission Enablement on the number of cyber threats in NZ

Early Edition with Kate Hawkesby

Play Episode Listen Later May 13, 2025 3:43 Transcription Available


Cyber threats are estimated to have cost New Zealanders $1.6 billion last year. New data from the National Cyber Security Centre has revealed half the country has been the target of online scam in the last six months. Up to 830,000 experienced some financial loss. Director of Mission Enablement Michael Jagusch says good cyber security practises can reduce harm. He says it includes using two-factor authentication and having long, unique passwords on main accounts. LISTEN ABOVE See omnystudio.com/listener for privacy information.

Security Conversations
JAGS keynote: The intricacies of wartime cyber threat intelligence

Security Conversations

Play Episode Listen Later May 9, 2025 31:07


Three Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it. Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

Cybersecurity Where You Are
Episode 134: How GenAI Lowers Bar for Cyber Threat Actors

Cybersecurity Where You Are

Play Episode Listen Later May 7, 2025 39:48


In episode 134 of Cybersecurity Where You Are, Sean Atkinson is joined by Randy Rose, VP of Security Operations & Intelligence at the Center for Internet Security® (CIS®); and Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at CIS. Together, they discuss how generative artificial intelligence (GenAI) lowers the barrier of entry for cyber threat actors (CTAs). Here are some highlights from our episode:01:37. CTAs' use of GenAI to improve their existing campaigns03:38. The need for CTI teams to look beyond language in analyzing GenAI-enabled threats07:22. The evolving impact of GenAI on phishing campaigns, malware development, deepfakes, and malicious Artificial Intelligence as a Service (AIaaS) offerings12:28. How GenAI increases the the speed at which CTAs can scale their efforts17:29. Technical barriers and other limitations that shape CTAs' use of GenAI22:46. A historical perspective of AI-enabled cybersecurity and how GenAI can support cybersecurity awareness training26:50. The cybersecurity benefits of AI and machine learning (ML) capabilities for clustering data29:05. What the future might hold for GenAI from an offensive and defensive perspectiveResourcesThe Evolving Role of Generative Artificial Intelligence in the Cyber Threat LandscapeEpisode 89: How Threat Actors Are Using GenAI as an EnablerEpisode 95: AI Augmentation and Its Impact on Cyber Defense12 CIS Experts' Cybersecurity Predictions for 2025CIS Critical Security Controls®Multi-State Information Sharing and Analysis Center®If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

The John Batchelor Show
Good evening: The show begins in Kashmir along the Line of Control... 1947 PARTITION

The John Batchelor Show

Play Episode Listen Later May 6, 2025 8:16


GOOD EVENING: The show begins in kashmir along the line of control...Good evening: The show begins in Kashmir along the Line of Control... 1947 PARTITION CBS EYE ON THE WORLD WITH JOHN BATCHELOR FIRST HOUR 9:00-9:15 1/2: #KASHMIR: FOREBODING AT THE LINE OF CONTROL. BILL ROGGIO, FDD. HUSAIN HAQQANI, HUDSON INSTITUTE. 9:15-9:30 2/2: #KASHMIR: FOREBODING AT THE LINE OF CONTROL. BILL ROGGIO, FDD. HUSAIN HAQQANI, HUDSON INSTITUTE. 9:30-9:45 #UKRAINE: WHAT IS NEEDED. JOHN HARDIE, BILL ROGGIO, FDD 9:45-10:00 #UKRAINE: PUTIN FOOT-DRAGGING. JOHN HARDIE, BILL ROGGIO, FDD SECOND HOUR 10:00-10:15 #ISRAEL: MARCH OF THE LIVING 2025. MALCOLM HOENLEIN @CONF_OF_PRES @MHOENLEIN1 @THADMCCOTTER @THEAMGREATNESS 10:15-10:30 #ANTISEMITISM: HARVARD 300 PAGE REPORT INADEQUATE. MALCOLM HOENLEIN @CONF_OF_PRES @MHOENLEIN1 @THADMCCOTTER @THEAMGREATNESS 10:30-10:45 1/2: #HARVARD: WHAT IS TO BE DONE? PETER BERKOWITZ, HOOVER INSTITUTION 10:45-11:00 2/2: #HARVARD: WHAT IS TO BE DONE? PETER BERKOWITZ, HOOVER INSTITUTION THIRD HOUR 11:00-11:15 #PRC: DID THE US AND EU BANKS SEE THE BUBBLE? ANNE STEVENSON-YANG, @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL 11:15-11:30 #USS IOWA: REMEMBERING THE GUN TURRET TRAGEDY. JAMES HOLMES, @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL 11:30-11:45 #PRC: WASHING CHINA EXPORTS TO THE US. CHARLES ORTEL, @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL 11:45-12:00 #CIA: INEXPLICABLE HOLLYWOOD MELODRAMA RECRUITING. GRANT NEWSHAM, "WHEN CHINA ATTACKS." FOURTH HOUR 12:00-12:15 #NEWWORLDREPORT: BOMB PLOT RIO. JOSEPH HUMIRE @JMHUMIRE @SECUREFREESOC. ERNESTO ARAUJO, FORMER FOREIGN MINISTER REPUBLIC OF BRAZIL. #NEWWORLDREPORTHUMIRE 12:15-12:30 #NEWWORLDREPORT: EBBING PINK TIDE. JOSEPH HUMIRE @JMHUMIRE @SECUREFREESOC. ERNESTO ARAUJO, FORMER FOREIGN MINISTER REPUBLIC OF BRAZIL. #NEWWORLDREPORTHUMIRE 12:30-12:45 1/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD. 12:45-1:00 AM 2/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD.

The John Batchelor Show
1/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD.

The John Batchelor Show

Play Episode Listen Later May 6, 2025 11:38


1/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD. OCTOBER 1931

The John Batchelor Show
2/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD.

The John Batchelor Show

Play Episode Listen Later May 6, 2025 8:02


2/2: #CYBER THREAT & WHAT IS TO BE DONE? ANNIE FIXLER, FDD. 1930

CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud)
VikingCloud's 2025 Cyber Threat Landscape Report

CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud)

Play Episode Listen Later May 6, 2025 2:44


In this episode of VikingCloud's CyberIntel, Brian Odian discusses the findings of the 2025 Cyber Threat Landscape Report.

This Week in Machine Learning & Artificial Intelligence (AI) Podcast
CTIBench: Evaluating LLMs in Cyber Threat Intelligence with Nidhi Rastogi - #729

This Week in Machine Learning & Artificial Intelligence (AI) Podcast

Play Episode Listen Later Apr 30, 2025 56:18


Today, we're joined by Nidhi Rastogi, assistant professor at Rochester Institute of Technology to discuss Cyber Threat Intelligence (CTI), focusing on her recent project CTIBench—a benchmark for evaluating LLMs on real-world CTI tasks. Nidhi explains the evolution of AI in cybersecurity, from rule-based systems to LLMs that accelerate analysis by providing critical context for threat detection and defense. We dig into the advantages and challenges of using LLMs in CTI, how techniques like Retrieval-Augmented Generation (RAG) are essential for keeping LLMs up-to-date with emerging threats, and how CTIBench measures LLMs' ability to perform a set of real-world tasks of the cybersecurity analyst. We unpack the process of building the benchmark, the tasks it covers, and key findings from benchmarking various LLMs. Finally, Nidhi shares the importance of benchmarks in exposing model limitations and blind spots, the challenges of large-scale benchmarking, and the future directions of her AI4Sec Research Lab, including developing reliable mitigation techniques, monitoring "concept drift" in threat detection models, improving explainability in cybersecurity, and more. The complete show notes for this episode can be found at https://twimlai.com/go/729.

Cybercrime Magazine Podcast
Cybercrime News For Apr. 18, 2025. Maine Temporarily Halts E-ZPass Over Cyber Threat.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 18, 2025 2:36


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Cyber Security Headlines
Cyberthreat sharing law renewal, APTs love ClickFix, GoDaddy mutes Zoom

Cyber Security Headlines

Play Episode Listen Later Apr 18, 2025 8:54


Bipartisan push for renewal of cyberthreat information sharing law ClickFix becoming a favorite amongst state-sponsored hackers GoDaddy puts Zoom on mute for about 90 minutes Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, And helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com  

CEO on the Go
How Cyber Threat Intelligence Can Protect Your Organization with Mary D'Angelo

CEO on the Go

Play Episode Listen Later Apr 17, 2025 25:21


Cybersecurity threats are evolving rapidly, and organizations of all sizes are vulnerable. While leaders are already navigating countless uncertainties, cyber threats represent a unique challenge that can bring business operations to a halt, causing significant financial damage and operational chaos.Find the full show notes at: https://workmatters.com/How-Cyber-Threat-Intelligence-Can-Protect-Your-Organization-with-Mary-DAngelo

Storm⚡️Watch by GreyNoise Intelligence
Cyber Threat Horizon: InfosecSherpa Interview, Ukraine Drone Malware, & VulnCon Recap

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 15, 2025 65:37


Forecast = Scattered exploits, Mirai storms brewing, and rogue drones dropping malware over Russia. Keep your firewalls up—a vulnerability front is rolling in fast! ‍ On this episode of Storm⚡️Watch, we're bringing you a packed episode that covers the latest in cyber threat intelligence, industry news, and a few stories you won't want to miss. We kick things off with our usual round of introductions and a quick look at the cyber weather, setting the stage for what's happening across the threat landscape. In our first segment, Tod shares his wrap-up from VulnCon 2025, highlighting the key takeaways and emerging trends from this year's conference. From new vulnerability research to the latest in exploit techniques, Tod breaks down what security professionals need to know and what's likely to shape the industry in the coming months. Next up, we sit down with Tracy Z. Maleeff, better known as InfosecSherpa, for an interview that traces her journey from librarian to cybersecurity professional. Tracy shares insights on career pivots, the importance of information literacy in security, and her ongoing work to make the field more accessible. Her story is a must-listen for anyone considering a move into cyber or looking for inspiration from someone who's successfully navigated the transition. We then turn our attention to a headline-grabbing story out of Ukraine, where reports indicate that drones sent into Russian territory are not just for surveillance or kinetic impact—they're also carrying malware designed to infect military systems if captured. This blend of physical and cyber warfare is a stark reminder of how modern conflicts are increasingly fought on multiple fronts, with digital payloads now as critical as traditional munitions. If we need to fill a little extra time, we'll explore some of the more bizarre aspects of hybrid warfare, including reports of weaponized consumer goods—think exploding sex toys and cosmetics—being used as part of psychological and disruption campaigns targeting the West. It's a strange new world where almost anything can be turned into a tool of conflict. We also spotlight recent research from Censys on the Salt Typhoon attacks, which underscore the need for advanced defenses as attackers continue to exploit edge devices and cloud infrastructure. Their findings highlight the importance of proactive monitoring and rapid response to emerging threats. On the GreyNoise front, we've observed a threefold surge in exploitation attempts targeting TVT DVRs, likely linked to Mirai botnet activity. This uptick is a clear signal that attackers are constantly scanning for vulnerable devices to conscript into their botnets, and it's a reminder for defenders to stay vigilant and patch exposed systems. As always, we wrap up with a round of goodbyes and a reminder to subscribe for more insights, interviews, and real-time threat intelligence. Thanks for tuning in to Storm⚡️Watch—where we keep you ahead of the cyber storms. Storm Watch Homepage >> Learn more about GreyNoise >>  

Threat Talks - Your Gateway to Cybersecurity Insights
Inside Volt Typhoon: China's Silent Cyber Threat

Threat Talks - Your Gateway to Cybersecurity Insights

Play Episode Listen Later Apr 15, 2025 34:01


What happens when a cyber threat actor doesn't want to make headlines? Volt Typhoon, a state-sponsored group tied to the People's Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware, using native tools, and taking things slow.  In this episode of Threat Talks, Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano to break down how these attackers operate and what their endgame might be. 

World XP Podcast
Episode 213 - Mary D'Angelo (Cyber Threat Intelligence Solutions Lead)

World XP Podcast

Play Episode Listen Later Apr 14, 2025 53:19


If you're enjoying the content, please like, subscribe, and comment! Please consider supporting the show! https://creators.spotify.com/pod/show/worldxppodcast/supportJoin our Women in CTI Slack channel here: https://filigran-community.slack.com/archives/C07T52JK3Q9Mary D'Angelo is a Cyber Threat Intelligence Solutions Lead at Filigran, where she helps organizations operationalize threat intelligence and bridge the gap between CTI teams and executive decision-makers. She's also a recognized thought leader and mentor in the InfoSec community, dedicated to democratizing intelligence and guiding the next generation of cybersecurity professionals.Mary is an active contributor to global cybersecurity initiatives, including the Dagstuhl Seminar and the Tortora Bradya Institute, and frequently speaks at industry events to advance collaboration and innovation in the field.______________________Follow us!@worldxppodcast Instagram - https://bit.ly/3eoBwyr@worldxppodcast Twitter - https://bit.ly/2Oa7BzmSpotify - http://spoti.fi/3sZAUTGYouTube - http://bit.ly/3rxDvUL#cybersecurity #cybercrime #cyberthreats #scam #darkweb #internet #safety #password #protection #explore #explorepage #podcastshow #longformpodcast #longformpodcast #podcasts #podcaster #newpodcast #podcastshow #podcasting #newshow #worldxppodcast

Pipeliners Podcast
Episode 383: What Every Pipeliner Should Know about Cybersecurity (Re-run of Episode 237)

Pipeliners Podcast

Play Episode Listen Later Apr 8, 2025 34:43


This week's Pipeliners Podcast episode is a rebroadcast of Episode 237 featuring host Russel Treat walking through how each individual pipeliner should think about pipeline cyber security as it relates to supporting their operation. The episode centers on three key areas of threats, understanding, and mitigation. Russel goes into deep detail about cybersecurity threats, the importance of understanding what the nature of the environment is, and how to have healthy cyber hygiene. In this episode, you will learn the language of cybersecurity professionals, as well as how to reduce your chances of being cyber attacked by controlling your personal risk and personal mitigations by identifying phishing, using VPNs, and having proper password management.

Cybercrime Magazine Podcast
ByBit Hacked. The North Korean Cyber Threat. Geoff White, Author & Investigative Journalist.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 8, 2025 15:37


Geoff White is an author, speaker, and investigative journalist. In this episode, he joins host Melissa O'Leary to discuss the ByBit hack and the broader North Korean cyber threat, including how the country's hackers developed their skills, the IT-worker issue that corporate America is facing, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com

The International Risk Podcast
Episode 219: The Evolving Cyber Threat Landscape: State-Sponsored Attacks and Global Security with John Bruce

The International Risk Podcast

Play Episode Listen Later Mar 30, 2025 39:45


This week on The International Risk Podcast, Dominic Bowen sits down with John Bruce, an expert in cybersecurity law and policy, to explore the evolution of state-sponsored cyber activity, and what these developments mean for businesses and governments worldwide.Cyber operations have changed significantly over the last few decades. Once highly targeted and discreet, state-sponsored cyber activities are now more opportunistic, widespread, and increasingly damaging. In this episode, John breaks down how governments attribute cyberattacks, the blurring lines between cybercrime and intelligence operations, and what this shift means for cyber defense strategies in both the public and private sectors.John Bruce is the former General Counsel for Field Effect Software Inc., a cybersecurity firm based in Ottawa. Before this role, he spent 22 years with the Department of Justice Canada, providing legal counsel and strategic policy advice on cybersecurity programs and operations. He currently teaches cybersecurity and cyber operations law and policy as an adjunct professor at Carleton University's Norman Paterson School of International Relations and a visiting professor at the University of Ottawa. He is also an Associate Fellow in the Cyber Security Program at the International Institute for Strategic Studies and a Senior Fellow at the Centre for International Governance Innovation, focusing on international cybersecurity law and governance. John holds an LL.B. and an LL.M. in law and technology.The International Risk Podcast is a must-listen for senior executives, board members, and risk advisors. This weekly podcast dives deep into international relations, emerging risks, and strategic opportunities. Hosted by Dominic Bowen, Head of Strategic Advisory at one of Europe's top risk consulting firms, the podcast brings together global experts to share insights and actionable strategies.Dominic's 20+ years of experience managing complex operations in high-risk environments, combined with his role as a public speaker and university lecturer, make him uniquely positioned to guide these conversations. From conflict zones to corporate boardrooms, he explores the risks shaping our world and how organisations can navigate them.The International Risk Podcast – Reducing risk by increasing knowledge. Follow us on LinkedIn for all our great updates.Tell us what you liked!

YusufOnSecurity.com
215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks

YusufOnSecurity.com

Play Episode Listen Later Mar 15, 2025 37:04


Enjoying the content? Let us know your feedback!In this episode, we'll look into a cybersecurity assessment method that mimics real-world attacks to test an organization's security defenses and response capabilities: Threat emulation. It is one of the strategies to keep you ahead of the game.  Threat emulation aims to identify and mitigate security gaps before attackers exploit them, providing a more comprehensive evaluation than traditional assessments.Before we dive into the main topic, lets glance what is happening on the security front:March Microsoft Patch Tuesday has landed!- https://msrc.microsoft.com: March 2025 Security Updates- https://detect-respond.blogspot.com: Pyramid Of Pain- https://www.atomicredteam.io: Atomic Read Team- https://www.ecb.europa.eu/paym/cyber-resilience/tiber-eu/html/index.en.htmlBe sure to subscribe! You can also stream from https://yusufonsecurity.comIn there, you will find a list of all previous episodes in there too.

The Cybertraps Podcast
The Cyber Threat Environment with Chris Sadlowski #inch360'24

The Cybertraps Podcast

Play Episode Listen Later Mar 10, 2025 48:02


In this episode, Chris Sadlowski speaks live at the Inch360 event in Spokane, Washington. Chris, with over 20 years of experience in the FBI, discusses the evolving landscape of cyber threats, common and emerging methods of cyberattack, and the significant risks posed by state-sponsored actors, criminal networks, and the personal impacts of cybercrime on individuals. He also touches on the importance of preparedness and effective communication in the cybersecurity realm, emphasizing the collective role in safeguarding against these threats. We're thrilled to be sponsored by IXL. IXL's comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:Simplify and streamline technologySave teachers' timeReliably meet Tier 1 standardsImprove student performance on state assessments

The Shared Security Show
Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

The Shared Security Show

Play Episode Listen Later Mar 10, 2025 20:21


In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox's privacy policy and what it means for user data. ** […] The post Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes appeared first on Shared Security Podcast.

Cyber Security with Bob G
Homographic Attacks - The Deceptive Cyber Threat Hiding in Plain Sight

Cyber Security with Bob G

Play Episode Listen Later Feb 18, 2025 4:36


Video - https://youtu.be/rEuowmFitpkThink You Can Spot a Fake Website? Think Again.What if I told you that apple.com might not actually be Apple's website? Cybercriminals have found a way to create perfectly disguised fake domains that look identical to real ones—down to the last letter. But there's a hidden trick in play, one that even tech-savvy users can fall for. This little-known cyberattack is fooling people every day, stealing passwords, financial details, and personal data without them ever realizing it. Are you sure you'd notice the difference? Read on to find out.I used ChatGPT-4o, VLC, ZOOM's Clips, ScreenPal, and Pictory.ai to put this information together.If you're interested in trying Pictory.ai please use the following link. https://pictory.ai?ref=t015oHere are some examples of Cyrillic characters that look almost identical to Latin letters but are actually different: https://i.imgur.com/UeL8Nt7.png

The Next Byte
209. Tom Zaubermann & The Cyber Threat(s) To Your Car

The Next Byte

Play Episode Listen Later Feb 4, 2025 55:56


(00:00) - Introduction to Automotive Cybersecurity(06:18) - Tom Zaubermann's Journey in Cybersecurity(12:22) - The Intersection of Cybersecurity and Automotive(16:06) - Challenges in Automotive Cybersecurity Development(21:23) - The Role of Over-the-Air Updates(25:20) - Consumer Awareness and Best Practices in Cybersecurity(29:54) - Navigating Cybersecurity Vulnerabilities in Automotive(32:35) - The Role of Regulations in Automotive Cybersecurity(34:22) - Understanding Automotive Vulnerabilities(36:34) - Complexities of Car Hacking(40:07) - Consumer Awareness of Cybersecurity Risks(42:51) - Choosing Safe Vehicles in a Digital Age(48:56) - Engaging with SAE International for Cybersecurity EducationThis episode is part of a series brought to you by SAE International to explore the leading edge of mobility with the support of experts from industry & academia. Other episodes in this series include Episode 202, where we talked about the cyber threats to vehicles.You can learn more about the automotive cybersecurity courses Tom will be teaching in May HERE. Enjoyed listening to Tom? Want to hear more from him? Check out his links below:Tom's LinkedIn Become a founding reader of our newsletter: http://read.thenextbyte.com/ As always, you can find these and other interesting & impactful engineering articles on Wevolver.com.

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Threat Research, Hands-On Labs, and a Challenge You Can't Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 3, 2025 23:33


Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Redefining CyberSecurity
Cyber Threat Research, Hands-On Labs, and a Challenge You Can't Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Feb 3, 2025 23:33


Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Chatter that Matters
Harrison Haynes - Breaking the Silence

Chatter that Matters

Play Episode Listen Later Jan 16, 2025 34:51 Transcription Available


"It's so easy to become vulnerable online.  Your face and name aren't involved; you can hide behind a user name, an avatar." I begin this powerful and profoundly moving episode of Chatter That Matters by sharing a personal story of narrowly escaping a predator during my youth, setting the stage for a meaningful conversation about online safety. I then invite my guest, Harrison Haynes, a brave young advocate who recounts his harrowing experience of being manipulated by an online predator as a teenager. He reveals the emotional toll, the subtle manipulative tactics used, and how this experience impacted his family and personal growth. Harrison's story is a testament to resilience. He shares his journey to forgiveness, the importance of disconnecting from technology, and his mission to help others navigate the dangers of the digital world. He emphasizes the need for open conversations about mental health, self-worth and community in the face of the challenges posed by social media and online predators. Later in the episode, Margot Denomme, a former Crown Attorney with twenty-five years of front-line experience and the author of The Family Smartphone Guide, joins the show. Margot offers practical advice for parents on navigating the digital landscape safely, emphasizing the importance of boundaries, digital literacy, and the concept of a “family smartphone contract.”   Key Takeaways: 1. The Reality of Online Predators: Harrison sheds light on the manipulative tactics predators use to lure vulnerable youth and the devastating consequences. 2. The Power of Community: Despite his painful journey, Harrison found healing through forgiveness and introspection, advocating for a life less tethered to technology. 3. Creating Safe Digital Spaces: Margot Denomme provides parents with actionable tips to protect their children from online dangers, including delaying smartphone access and fostering self-esteem. 4. A Call to Awareness: Harrison and Margot stress the need for open dialogue between parents and children about digital safety, mental health, and the risks of an unfiltered online world. To connect with Harrison Haynes,  info@wiredhuman.org   To purchase Margot Denomme's book,  https://www.amazon.ca/Family-Smartphone-Guide-Navigate-Smartphones/dp/0992034043      

Tech Disruptors
Zscaler Sees Cyberthreat Environment Growing

Tech Disruptors

Play Episode Listen Later Jan 9, 2025 36:39


The cyberthreat environment keeps worsening because more business is being conducted online and nation states are looking to steal secrets and intellectual property, and get into other countries' infrastructure, according to Zscaler Chairman and CEO Jay Chaudhry. He sits down with Mandeep Singh, senior technology analyst at Bloomberg Intelligence, to talk about the relevance of gen AI to cybersecurity and how the deployment of zero trust is likely to grow with more AI workloads. Chaudhry also discusses the risk of data leakage with enterprise data and his expectations around consolidation for the security space in 2025. The US Treasury cyberattack took place in late December, a week after we recorded this episode.

WSJ Tech News Briefing
How China's Cyber Threat Looms Over America

WSJ Tech News Briefing

Play Episode Listen Later Jan 8, 2025 13:40


Chinese hackers have vastly increased their efforts in recent years, burrowing into systems at ports, pipelines, water facilities and elsewhere. WSJ reporter Dustin Volz joins host James Rundle to talk about what this means for national security, and how companies such as major telecom providers were hacked in the first place. Sign up for the WSJ's free Technology newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices

Big Take DC
The ‘Everything, Everywhere, All at Once' Cyber Threat

Big Take DC

Play Episode Listen Later Jan 8, 2025 13:34 Transcription Available


US intelligence officials say that a hacking campaign known as “Volt Typhoon” has the potential to disrupt critical infrastructure systems in Guam — a significant hub for the US military that holds particular importance in US-China relations. On today’s Big Take DC podcast, Bloomberg national security reporter Katrina Manson shares what she’s learned about the threat and how it could limit America’s ability to push back if China were to invade Taiwan. Read more: The US’s Worst Fears of Chinese Hacking Are on Display in GuamSee omnystudio.com/listener for privacy information.

CISSP Cyber Training Podcast - CISSP Training Program
CCT 203: Practice CISSP Questions - Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Dec 19, 2024 28:20 Transcription Available


Send us a textCan AI-driven technologies reshape the way we secure our digital world? Join me, Sean Gerber, as we navigate the fascinating landscape of cybersecurity challenges anticipated by 2025. Our latest podcast episode promises to shed light on the emerging threats posed by AI, particularly within the finance and e-commerce sectors. We explore the necessity of incorporating AI into security frameworks and examine the shifting dynamics of cybersecurity insurance powered by AI-driven risk assessments. The conversation takes a thought-provoking turn with the exploration of quantum-resilient encryption's impact on global privacy laws and an increased focus on DevOps security, zero trust models, and the ever-looming threat of nation-state cyber warfare. What strategies are essential when dealing with stubborn vendors and critical vulnerabilities? We'll tackle this and more in a segment dedicated to vulnerability management and its ethical considerations. Learn the significance of documenting exceptions, deploying compensating controls, and the vital role of private collaboration and escalation in managing vendor reluctance. We also provide insights into handling false positives from vulnerability scans and the art of communicating risks to stakeholders under budget constraints. This discussion places a spotlight on strategic communication and ethical decision-making as cornerstones of effective cybersecurity risk management.Uncover the secrets to mastering vulnerability management with a strategic flair. We'll guide you through scenarios where high-severity issues persist despite a reduction in overall vulnerabilities, emphasizing coordinated efforts within multi-cloud settings. You'll gain insights into best practices for risk mitigation when immediate patching isn't feasible and the ethical and legal intricacies of vulnerability disclosure. In addition, there's a focus on presenting a risk management approach that balances cost with potential impact to senior leaders. As a bonus, we offer resources for those gearing up for the CISSP exam and seeking cybersecurity consulting, equipping you with the knowledge to fortify your defense against cyber threats.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

CISSP Cyber Training Podcast - CISSP Training Program
CCT 202: Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Dec 16, 2024 41:54 Transcription Available


Send us a textUnlock the secrets to safeguarding your organization against cyber threats as we explore critical components of cybersecurity. Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we dissect domain 6.4 of the CISSP exam. Discover the latest insights into cyber threats that target U.S. critical infrastructure, with a particular focus on an Iranian-linked group's custom cyber weapon. Learn how understanding your organization's technology, both hardware and software, can be pivotal in mitigating potential threats, especially in industries like oil and gas.Navigate the labyrinth of vulnerability scan reporting and analysis as we dive into the challenging yet rewarding art of communicating security assessment findings. Whether done internally or through third-party services, the objective is to translate technical data into actionable insights for technical teams. We tackle the complexities of overwhelming scan results and highlight the value of automated reporting, ensuring an efficient and effective approach to vulnerability management. Learn how to prioritize risks, provide clear remediation recommendations, and utilize trend analysis to track progress and tackle recurring vulnerabilities.Finally, explore the strategies needed for executing effective internal and external security scans. Discover the importance of thorough preparation and strategic planning, managing insider threats, and safeguarding public-facing assets. We delve into the complexities of third-party scans, emphasizing the need to understand and manage network connections to prevent unauthorized access. Throughout this episode, we stress the critical role of alignment and collaboration in cybersecurity efforts, providing you with the tools and guidance needed to enhance your security posture in today's complex landscape.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

Cybercrime Magazine Podcast
What Is Malvertising? Cyber Threat Spreading Malware Fast. Confidence Staveley, CyberSafe Foundation

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 11, 2024 5:22


Malvertising is short for malicious advertising, and attacks and compromises systems by spreading advertisements injected with malicious code. Confidence Staveley, Africa's most celebrated female cybersecurity leader, is the founder of the Cybersafe Foundation, a Non-Governmental Organization on a mission to facilitate pockets of changes that ensure a safer internet for everyone with digital access in Africa. In this episode, Confidence joins host Amanda Glassner to discuss. To learn more about Confidence, visit her website at https://confidencestaveley.com, and for more on the CyberSafe Foundation, visit https://cybersafefoundation.org.

Coffee w/#The Freight Coach
1068. #TFCP - Understanding Cybersecurity!

Coffee w/#The Freight Coach

Play Episode Listen Later Nov 8, 2024 42:33 Transcription Available


We're back for another interaction with the industry experts recorded from the NMFTA Cybersecurity Conference!  In this episode, we've got two amazing guests, Steve Hankel and Ben Gardiner!  Steve and Ben shared critical cybersecurity threats affecting businesses of all sizes, proactive prevention measures against cyber attacks, and the NMFTA's stand on ensuring the effective implementation of practices protecting transportation professionals!   About Steve Hankel Steve Hankel is the Vice President of Information Technology at JTS (Johanson Transportation Service). He joined JTS in 2010 and during his tenure, he developed a SaaS TMS (Transportation Management System), moved the company's infrastructure to the Cloud, built up their software engineering program, and rolled out their Disaster Recovery and Cyber Security initiatives. Prior to joining JTS, Steve made a name for himself as Director of IT Operations at Webvan, managing the support of cutting-edge technology during the .com boom. He then worked as Tools Team Lead at Wamu, developing a state-of-the-art BC (Business Continuity) and DR (Disaster Recovery) web application. Later he became Co-Founder and Principle at Continuity Source, a company developing BC/DR SaaS Solutions.   About Ben Gardiner Ben is a Senior Cybersecurity Research Engineer contractor at the National Motor Freight Traffic Association, Inc. (NMFTA)™ specializing in hardware and low-level software security. With more than ten years of professional experience in embedded systems design and a lifetime of hacking experience, Ben has a deep knowledge of the low-level functions of operating systems and the hardware with which they interface. He has held security assurance and reversing roles at a global corporation, as well as worked in embedded software and systems engineering roles at several organizations. Ben has conducted workshops and presentations at numerous cybersecurity events globally, including the CyberTruck Challenge, GENIVI security sessions, Hack in Paris, and HackFest. In 2022, he was honored with invitations to speak at escar USA and serve as a main stage speaker at DEF CON. In addition to speaking on the main stage at DEF CON, Ben is a volunteer at the DEF CON Hardware Hacking Village (DC HHV) and Car Hacking Village (CHV). He is GIAC GPEN certified and a GIAC advisory board member, serves as the chair of the SAE TEVEES18A1 Cybersecurity Assurance Testing TF (drafting J3322), a contributor to several American Trucking Associations (ATA) Technology & Maintenance Council (TMC) task forces, ISO WG11 committees, and a voting member of the SAE Vehicle Electronic Systems Security Committee. Ben holds a M.Sc. Eng. in Applied Math & Stats from Queen's University.  

Timeless with Julie Hartman
China's Cyber Threat: Trump Hacked/Election Disinformation/War in Ukraine/Israel

Timeless with Julie Hartman

Play Episode Listen Later Oct 29, 2024 54:56


Julie talks with Brandon Weichert, author of Biohacked - China's Race to Control Life, foreign policy expert who manages The Weichert Report - World News Done Right.  His entire life's work has been predicated on challenging conventional wisdom and assumptions on a variety of matters, notably in national security. His books: https://rb.gy/39gtz Join Julie live Monday, Tuesday, and Wednesday at 1p PT, call in number: 844-861-5537Check out other Julie Hartman videos: https://www.youtube.com/@juliehartman Follow Julie Hartman on social media: Website: https://juliehartmanshow.com/Instagram: https://www.instagram.com/julierhartman/X: https://twitter.com/JulieRHartmanSee omnystudio.com/listener for privacy information.

Today in Health IT
2 Minute Drill: Iranian Cyber Threat, Military Reserves, and Rising Ransomware Cost with Drex DeFord

Today in Health IT

Play Episode Listen Later Oct 23, 2024 2:50 Transcription Available


Drex dives into the latest cybersecurity threats and risks targeting healthcare and critical infrastructure. We cover a new joint advisory from the US and Australian governments on Iranian cyber-attacks, how MFA push bombing is becoming a favored attack method, and the rising financial toll of ransomware on United Health Group. Plus, we discuss the US military's potential new program to enlist senior tech executives into the reserves. Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

Exploit Brokers - Hacking News
HN41 - Chinese Hackers Hijack US Telecom Networks

Exploit Brokers - Hacking News

Play Episode Listen Later Oct 10, 2024 15:46


In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizon. Drawing inspiration from Friedrich Nietzsche's quote: "He who fights with monsters should look to it that he himself does not become a monster... when you gaze long into the abyss, the abyss also gazes into you." We explore how attempts to control and monitor can sometimes backfire, creating vulnerabilities that malicious actors can exploit. If you find this content valuable, please like, subscribe, and hit the bell notification icon to stay updated. For our listeners on Spotify or Apple Podcasts, please leave a review and follow us—it greatly helps in reaching more people. Join the conversation and let's navigate the complexities of cybersecurity together! Relevant Hashtags: #Cybersecurity #ChineseHackers #VoltTyphoon #TelecomSecurity #InternetBackdoor #CALEA #DataBreach #CyberThreats #DigitalPrivacy #Encryption #LawfulSurveillance #TechNews #ExplorerBrokers #AT&T #Verizon #Lumen #TechCrunch #WallStreetJournal #Nietzsche #CyberWarfare #StayInformed

@BEERISAC: CPS/ICS Security Podcast Playlist
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 4, 2024 32:31


Podcast: The OT and IoT Security Podcast (LS 23 · TOP 10% what is this?)Episode: The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat IntelligencePub date: 2024-09-26Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and availability of these systems.In this episode of the Security Sandbox, we'll cover the strategic use of cyber threat intelligence (CTI) to safeguard critical infrastructure and industrial environments.You'll learn about:Integrating OT/IoT threat intelligence with traditional IT threat intelligence for a complete picture of the attack surfaceUsing asset context when acting on threat intelligence in OT systemsReal-world examples of successful proactive threat responseVisit Our WebsiteFollow Us on LinkedInThe podcast and artwork embedded on this page are from Nozomi Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

EVN Report Podcast
Examining the Context: Toward a Strategy of Subversion, Mitigating the Russian Cyber Threat

EVN Report Podcast

Play Episode Listen Later Oct 2, 2024 24:33


Armenia faces distinct security threats from Azerbaijan, Turkey and Russia, with Russia posing the most complex and severe challenge through cyber operations. In this episode of “Examining the Context” podcast, Nerses Kopalyan explains the concept of subversion as a tenable risk-mitigation strategy against these threats.

Federal Newscast
CISA faces challenges sharing cyber threat information

Federal Newscast

Play Episode Listen Later Oct 2, 2024 5:49


The IG says CISA made some good improvements to the Automated Indicator Sharing program in recent years. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Federal Newscast
CISA faces challenges sharing cyber threat information

Federal Newscast

Play Episode Listen Later Oct 2, 2024 5:49


The IG says CISA made some good improvements to the Automated Indicator Sharing program in recent years. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

@BEERISAC: CPS/ICS Security Podcast Playlist
Assaf Hazan CTO @Kaspersky IL about knowing your enemy & Cyber Threat Intelligence @the Dark web

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Sep 29, 2024 51:43


Podcast: ICS Cyber Talks PodcastEpisode: Assaf Hazan CTO @Kaspersky IL about knowing your enemy & Cyber Threat Intelligence @the Dark webPub date: 2024-09-19מודיעין איומי סייבר הוא משכבות הקריטיות בהגנת סייבר. הכרת האויב שלך, הבנת מטרותיו וביצוע מראש של מהלכים מתאימים ימנעו מתקפה משמעותית ונזק משמעותי לארגון. התוקף תמיד יחפש פריצה פשוטה במקום לבזבז זמן על התקפות ארוכות עם פוטנציאל גילוי גבוה. נחשון פינקו מארח את אסף חזן, סמנכ"ל טכנולוגיות של קספרסקי ישראל וצייד איומי סייבר ידוע, בשיחה על חשיבות מודיעין איומי סייבר, המידע שהוא מספק לחברות מדי יום והרשת העצומה שקספרסקי בנתה ברשת האפלה במשך שנים עם מספר עצום של חיישנים .Cyber threat intelligence is one of the most critical layers in cyber defense. Knowing your enemy, understanding his targets, and making the appropriate next moves will prevent disaster. The attacker will always look for a straightforward breach rather than wasting time on long attacks with a high potential for discovery. Nachshon Pincu hosts Assaf Hazan, the CTO of Kaspersky Israel and a renowned Cyber Threat Hunter, in a conversation on the importance of Cyber Threat Intelligence. Assaf shares the information he provides to companies daily, and the extensive network Kaspersky has built in the dark net over the years, boasting a significant number of sensors.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cybercrime Magazine Podcast
Cybercrime News For Sep. 17, 2024. Lawmakers Target 'Gray Market' Cyber Threat. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 17, 2024 3:01


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Security Unfiltered
Navigating the Cyber Threat Landscape with Chris Hale

Security Unfiltered

Play Episode Listen Later Sep 3, 2024 44:32 Transcription Available


Send us a textEver wondered what it takes to stay one step ahead of cybercriminals? This episode, featuring cybersecurity expert Chris Hale, promises to unravel the complexities of safeguarding digital fortresses while sharing invaluable lessons from the frontlines. Chris's journey from a help desk technician to the founder of his own cybersecurity firm is nothing short of inspiring. His early interest in computers, paired with a dual major in Exercise Sport Science and Computer Information Systems, laid the foundation for a career that would see him tackling email viruses at Sports Authority and defending against sophisticated malware and ransomware attacks.The conversation shifts to the high-stakes world of incident response teams, where Chris recounts a harrowing ransomware incident caused by the absence of two-factor authentication on a global admin account. The relentless effort required to handle such crises, including long hours and meticulous post-mortem analyses, underscores the critical role of managed service providers (MSPs) and managed security service providers (MSSPs) in maintaining robust security practices and compliance. Chris's firsthand experiences highlight the importance of hands-on training and continuous learning, offering listeners a realistic glimpse into the demands and rewards of a career in cybersecurity.We also navigate the evolving threat landscape, discussing the necessity of quarterly audits, penetration testing, and consistent security practices across global enterprises. Chris shares insights into the importance of continuous cybersecurity training for all organizational levels, using tools like Breach Secure Now to keep security awareness sharp. The episode wraps up with a discussion on the recent CrowdStrike update debacle and the challenges of choosing reliable Endpoint Detection and Response (EDR) solutions. Through Chris's expert lens, listeners gain a comprehensive understanding of the current issues and best practices in cybersecurity, making this episode a must-listen for anyone invested in protecting their digital assets.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today

Bare Knuckles and Brass Tacks
LIVE from SquadCon: Future Proof Your Career with Cyber Threat Intel Techniques

Bare Knuckles and Brass Tacks

Play Episode Listen Later Aug 26, 2024 32:56


Welcome to Season 3! This week we're bringing you the live recording of our talk at SquadCon during Hack Summer Camp a few weeks back. Our talk was called, “Future Proof Your Career with Cyber Threat Intelligence Techniques.” Many thanks again to the Black Girls Hack Foundation and the SquadCon crew for having us, and to Rebekah Skeete for the killer intro!And, we're fast approaching episode 100 of this podcast! We're doing an AMA with a very special guest host. So, what do you wanna ask us? Email your questions to bareknucklespod@gmail.com, with "AMA" in the subject line. If we air your question, you can expect some special swag your way!

The City Club of Cleveland Podcast
Who's Next? Inside Cybercrime--the World's Most Profitable Business

The City Club of Cleveland Podcast

Play Episode Listen Later Jul 26, 2024 60:00


As more of our daily lives move to the digital realm, protecting our sensitive information from unauthorized access, theft, and hacking has never been more important. Still, every month, major corporations, school districts, health systems, and even municipalities and public utilities have become targets of these increasingly sophisticated cyber threats. This puts not only our personal information at risk, but also raises questions about national security. What trends are experts seeing in cybercrime? And what are the actionable insights and tips to safeguard our digital realm?rnrnJoin the City Club as we explore the current cyber threat landscape and learn about the threat actor's tactics, techniques, and procedures with leading experts in the industry.

The CyberWire
The current state of Cyber Threat Intelligence.

The CyberWire

Play Episode Listen Later Jul 22, 2024 17:31


Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant's Chief Analyst. References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Josephine Wolff, October 2023. How Hackers Swindled Vegas [Explainer]. Slate. Rick Howard, 2023. Cybersecurity First Principles Book Appendix [Book Support Page]. N2K Cyberwire. Staff, September 2023. mWISE Conference 2023 [Conference Website]. Mandiant. Staff, n.d. VirusTotal Submissions Page [Landing Zone]. VirusTotal. Learn more about your ad choices. Visit megaphone.fm/adchoices

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Cybersecurity and Risk Management: Western Digital CIO Sesh Tirumala's Strategy on People, Process, and Technology for Cyber Threat Readiness

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Jul 22, 2024 36:23 Transcription Available


891: Proper cybersecurity practices within a company involve a shared responsibility across the entire enterprise, not just the IT organization, requiring a unified approach that encompasses people, processes, and technology. In this episode of Technovation, Peter High interviews Sesh Tirumala, Chief Information Officer of Western Digital, to discuss the company's focus on cybersecurity, employee experience, and engineering excellence. Sesh details his experience handling a major cyber incident at Western Digital and the framework he applied to identify vulnerabilities and establish guardrails to mitigate future cyber incidents. He also talks about his approach to improving operational and engineering excellence at the company and explains the importance of culture in IT. Furthermore, he reflects on his journey across various scaled and fast-growing technology companies and shares the future trends in technology that excite him, such as generative AI and digital twins in manufacturing.

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Cybersecurity and Risk Management: Western Digital CIO Sesh Tirumala's Strategy on People, Process, and Technology for Cyber Threat Readiness

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Jul 22, 2024 36:23 Transcription Available


891: Proper cybersecurity practices within a company involve a shared responsibility across the entire enterprise, not just the IT organization, requiring a unified approach that encompasses people, processes, and technology. In this episode of Technovation, Peter High interviews Sesh Tirumala, Chief Information Officer of Western Digital, to discuss the company's focus on cybersecurity, employee experience, and engineering excellence. Sesh details his experience handling a major cyber incident at Western Digital and the framework he applied to identify vulnerabilities and establish guardrails to mitigate future cyber incidents. He also talks about his approach to improving operational and engineering excellence at the company and explains the importance of culture in IT. Furthermore, he reflects on his journey across various scaled and fast-growing technology companies and shares the future trends in technology that excite him, such as generative AI and digital twins in manufacturing.

The Propaganda Report
Michael Richards Humiliation Ritual, AI Priests & Mayors & Assessing The Cyber Threat

The Propaganda Report

Play Episode Listen Later Jun 20, 2024 144:48


Michael Richards Humiliation Ritual, AI Priests & Mayors & Assessing The Cyber Threat Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Encore: Selena Larson: The Green Goldfish and cyber threat intelligence. [Analyst] [Career Notes]

The CyberWire

Play Episode Listen Later Apr 7, 2024 7:40


Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us.