Podcasts about cyberthreat

  • 359PODCASTS
  • 687EPISODES
  • 32mAVG DURATION
  • 1WEEKLY EPISODE
  • Apr 8, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cyberthreat

Show all podcasts related to cyberthreat

Latest podcast episodes about cyberthreat

Pipeliners Podcast
Episode 383: What Every Pipeliner Should Know about Cybersecurity (Re-run of Episode 237)

Pipeliners Podcast

Play Episode Listen Later Apr 8, 2025 34:43


This week's Pipeliners Podcast episode is a rebroadcast of Episode 237 featuring host Russel Treat walking through how each individual pipeliner should think about pipeline cyber security as it relates to supporting their operation. The episode centers on three key areas of threats, understanding, and mitigation. Russel goes into deep detail about cybersecurity threats, the importance of understanding what the nature of the environment is, and how to have healthy cyber hygiene. In this episode, you will learn the language of cybersecurity professionals, as well as how to reduce your chances of being cyber attacked by controlling your personal risk and personal mitigations by identifying phishing, using VPNs, and having proper password management.

Cybercrime Magazine Podcast
ByBit Hacked. The North Korean Cyber Threat. Geoff White, Author & Investigative Journalist.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 8, 2025 15:37


Geoff White is an author, speaker, and investigative journalist. In this episode, he joins host Melissa O'Leary to discuss the ByBit hack and the broader North Korean cyber threat, including how the country's hackers developed their skills, the IT-worker issue that corporate America is facing, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com

The International Risk Podcast
Episode 219: The Evolving Cyber Threat Landscape: State-Sponsored Attacks and Global Security with John Bruce

The International Risk Podcast

Play Episode Listen Later Mar 30, 2025 39:45


This week on The International Risk Podcast, Dominic Bowen sits down with John Bruce, an expert in cybersecurity law and policy, to explore the evolution of state-sponsored cyber activity, and what these developments mean for businesses and governments worldwide.Cyber operations have changed significantly over the last few decades. Once highly targeted and discreet, state-sponsored cyber activities are now more opportunistic, widespread, and increasingly damaging. In this episode, John breaks down how governments attribute cyberattacks, the blurring lines between cybercrime and intelligence operations, and what this shift means for cyber defense strategies in both the public and private sectors.John Bruce is the former General Counsel for Field Effect Software Inc., a cybersecurity firm based in Ottawa. Before this role, he spent 22 years with the Department of Justice Canada, providing legal counsel and strategic policy advice on cybersecurity programs and operations. He currently teaches cybersecurity and cyber operations law and policy as an adjunct professor at Carleton University's Norman Paterson School of International Relations and a visiting professor at the University of Ottawa. He is also an Associate Fellow in the Cyber Security Program at the International Institute for Strategic Studies and a Senior Fellow at the Centre for International Governance Innovation, focusing on international cybersecurity law and governance. John holds an LL.B. and an LL.M. in law and technology.The International Risk Podcast is a must-listen for senior executives, board members, and risk advisors. This weekly podcast dives deep into international relations, emerging risks, and strategic opportunities. Hosted by Dominic Bowen, Head of Strategic Advisory at one of Europe's top risk consulting firms, the podcast brings together global experts to share insights and actionable strategies.Dominic's 20+ years of experience managing complex operations in high-risk environments, combined with his role as a public speaker and university lecturer, make him uniquely positioned to guide these conversations. From conflict zones to corporate boardrooms, he explores the risks shaping our world and how organisations can navigate them.The International Risk Podcast – Reducing risk by increasing knowledge. Follow us on LinkedIn for all our great updates.Tell us what you liked!

YusufOnSecurity.com
215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks

YusufOnSecurity.com

Play Episode Listen Later Mar 15, 2025 37:04


Enjoying the content? Let us know your feedback!In this episode, we'll look into a cybersecurity assessment method that mimics real-world attacks to test an organization's security defenses and response capabilities: Threat emulation. It is one of the strategies to keep you ahead of the game.  Threat emulation aims to identify and mitigate security gaps before attackers exploit them, providing a more comprehensive evaluation than traditional assessments.Before we dive into the main topic, lets glance what is happening on the security front:March Microsoft Patch Tuesday has landed!- https://msrc.microsoft.com: March 2025 Security Updates- https://detect-respond.blogspot.com: Pyramid Of Pain- https://www.atomicredteam.io: Atomic Read Team- https://www.ecb.europa.eu/paym/cyber-resilience/tiber-eu/html/index.en.htmlBe sure to subscribe! You can also stream from https://yusufonsecurity.comIn there, you will find a list of all previous episodes in there too.

The Cybertraps Podcast
The Cyber Threat Environment with Chris Sadlowski #inch360'24

The Cybertraps Podcast

Play Episode Listen Later Mar 10, 2025 48:02


In this episode, Chris Sadlowski speaks live at the Inch360 event in Spokane, Washington. Chris, with over 20 years of experience in the FBI, discusses the evolving landscape of cyber threats, common and emerging methods of cyberattack, and the significant risks posed by state-sponsored actors, criminal networks, and the personal impacts of cybercrime on individuals. He also touches on the importance of preparedness and effective communication in the cybersecurity realm, emphasizing the collective role in safeguarding against these threats. We're thrilled to be sponsored by IXL. IXL's comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:Simplify and streamline technologySave teachers' timeReliably meet Tier 1 standardsImprove student performance on state assessments

The Shared Security Show
Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

The Shared Security Show

Play Episode Listen Later Mar 10, 2025 20:21


In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox's privacy policy and what it means for user data. ** […] The post Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes appeared first on Shared Security Podcast.

Cyber Security with Bob G
Homographic Attacks - The Deceptive Cyber Threat Hiding in Plain Sight

Cyber Security with Bob G

Play Episode Listen Later Feb 18, 2025 4:36


Video - https://youtu.be/rEuowmFitpkThink You Can Spot a Fake Website? Think Again.What if I told you that apple.com might not actually be Apple's website? Cybercriminals have found a way to create perfectly disguised fake domains that look identical to real ones—down to the last letter. But there's a hidden trick in play, one that even tech-savvy users can fall for. This little-known cyberattack is fooling people every day, stealing passwords, financial details, and personal data without them ever realizing it. Are you sure you'd notice the difference? Read on to find out.I used ChatGPT-4o, VLC, ZOOM's Clips, ScreenPal, and Pictory.ai to put this information together.If you're interested in trying Pictory.ai please use the following link. https://pictory.ai?ref=t015oHere are some examples of Cyrillic characters that look almost identical to Latin letters but are actually different: https://i.imgur.com/UeL8Nt7.png

The Next Byte
209. Tom Zaubermann & The Cyber Threat(s) To Your Car

The Next Byte

Play Episode Listen Later Feb 4, 2025 55:56


(00:00) - Introduction to Automotive Cybersecurity(06:18) - Tom Zaubermann's Journey in Cybersecurity(12:22) - The Intersection of Cybersecurity and Automotive(16:06) - Challenges in Automotive Cybersecurity Development(21:23) - The Role of Over-the-Air Updates(25:20) - Consumer Awareness and Best Practices in Cybersecurity(29:54) - Navigating Cybersecurity Vulnerabilities in Automotive(32:35) - The Role of Regulations in Automotive Cybersecurity(34:22) - Understanding Automotive Vulnerabilities(36:34) - Complexities of Car Hacking(40:07) - Consumer Awareness of Cybersecurity Risks(42:51) - Choosing Safe Vehicles in a Digital Age(48:56) - Engaging with SAE International for Cybersecurity EducationThis episode is part of a series brought to you by SAE International to explore the leading edge of mobility with the support of experts from industry & academia. Other episodes in this series include Episode 202, where we talked about the cyber threats to vehicles.You can learn more about the automotive cybersecurity courses Tom will be teaching in May HERE. Enjoyed listening to Tom? Want to hear more from him? Check out his links below:Tom's LinkedIn Become a founding reader of our newsletter: http://read.thenextbyte.com/ As always, you can find these and other interesting & impactful engineering articles on Wevolver.com.

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Threat Research, Hands-On Labs, and a Challenge You Can't Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 3, 2025 23:33


Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Redefining CyberSecurity
Cyber Threat Research, Hands-On Labs, and a Challenge You Can't Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Feb 3, 2025 23:33


Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Securely Connected Everything
Hacking the Future Navigating the Cyber Threat Landscape with Glenn Maiden [Part 2]

Securely Connected Everything

Play Episode Listen Later Jan 18, 2025 19:37 Transcription Available


Discover how AI is transforming the battlefield of cybersecurity with Glenn Maiden, Director of Threat Intelligence at Fortiguard Labs, ANZ, as our guide. Whether you're eager to understand how these technologies are enhancing both attack and defense mechanisms or curious about the ways AI is lightening the load for overwhelmed security analysts, this episode promises valuable insights. We delve into the profound impact of AI on cybersecurity strategies, tackling the dual-edged sword of sophisticated threats and innovative defense tools. From the lingering echoes of the SolarWinds attack to the pressing need for secure supply chains and critical infrastructure, Glenn sheds light on the complexities and solutions shaping the current landscape.Cybersecurity isn't just a necessity; it's a formidable competitive advantage in today's corporate world. Reflecting on the journey from a perceived roadblock to a strategic asset, we emphasize the importance of fostering a robust cyber culture. Leadership and companies must continuously adapt to protect their assets. With the looming advent of quantum computing, we face new challenges to our encryption methods. As we explore this future threat, the call for proactive measures is loud and clear. Tune in to understand why re-engineering security frameworks is not just recommended but essential to safeguard sensitive information in the quantum era.

Chatter that Matters
Harrison Haynes - Breaking the Silence

Chatter that Matters

Play Episode Listen Later Jan 16, 2025 34:51 Transcription Available


"It's so easy to become vulnerable online.  Your face and name aren't involved; you can hide behind a user name, an avatar." I begin this powerful and profoundly moving episode of Chatter That Matters by sharing a personal story of narrowly escaping a predator during my youth, setting the stage for a meaningful conversation about online safety. I then invite my guest, Harrison Haynes, a brave young advocate who recounts his harrowing experience of being manipulated by an online predator as a teenager. He reveals the emotional toll, the subtle manipulative tactics used, and how this experience impacted his family and personal growth. Harrison's story is a testament to resilience. He shares his journey to forgiveness, the importance of disconnecting from technology, and his mission to help others navigate the dangers of the digital world. He emphasizes the need for open conversations about mental health, self-worth and community in the face of the challenges posed by social media and online predators. Later in the episode, Margot Denomme, a former Crown Attorney with twenty-five years of front-line experience and the author of The Family Smartphone Guide, joins the show. Margot offers practical advice for parents on navigating the digital landscape safely, emphasizing the importance of boundaries, digital literacy, and the concept of a “family smartphone contract.”   Key Takeaways: 1. The Reality of Online Predators: Harrison sheds light on the manipulative tactics predators use to lure vulnerable youth and the devastating consequences. 2. The Power of Community: Despite his painful journey, Harrison found healing through forgiveness and introspection, advocating for a life less tethered to technology. 3. Creating Safe Digital Spaces: Margot Denomme provides parents with actionable tips to protect their children from online dangers, including delaying smartphone access and fostering self-esteem. 4. A Call to Awareness: Harrison and Margot stress the need for open dialogue between parents and children about digital safety, mental health, and the risks of an unfiltered online world. To connect with Harrison Haynes,  info@wiredhuman.org   To purchase Margot Denomme's book,  https://www.amazon.ca/Family-Smartphone-Guide-Navigate-Smartphones/dp/0992034043      

Securely Connected Everything
Hacking the Future Navigating the Cyber Threat Landscape with Glenn Maiden [Part 1]

Securely Connected Everything

Play Episode Listen Later Jan 12, 2025 30:11 Transcription Available


Discover the fascinating world of cybersecurity with our special guest, Glenn Maiden, Director of Threat Intelligence at FortiGuard Labs, ANZ. From his beginnings in the mid-90s with the Department of Defence to his pivotal roles at the Australian Signals Directorate and the Australian Tax Office, Glenn offers a wealth of knowledge and insights as he discusses the evolution from traditional information security to modern cyber intelligence. He also sheds light on how his team at FortiGuard Labs collaborates on a global scale to protect customers from emerging threats.Today's digital landscape is riddled with complex cyber threats, and we unravel this intricate web with an engaging discussion on hyper-connectivity and its vulnerabilities. The conversation exposes the sophisticated tactics of cybercriminals, from nation-state actors to organised crime, and explores how anonymity and jurisdictional complexities provide them with strategic advantages. Yet, amidst this challenging terrain, there is optimism as advancements in cybersecurity measures are bolstering resilience, particularly in regions like Australia, where substantial investments are being made to combat emerging threats.As we navigate the volatile global environment, the conversation shifts towards protecting critical infrastructure and the proactive measures being championed by government initiatives like Australia's SOCI Act. We consider the alarming prospect of cyber-attacks as a precursor to conflict and discuss strategies to mitigate such risks, including the integration of AI and the importance of multi-factor authentication and smart access controls. The episode rounds out with an exploration of the convergence of cyber threats and misinformation, highlighting the role of cyber gangs and nation-state activities in election interference and the increasing threat of cyber-enabled misinformation, especially among the younger, more connected generations. Tune in for a compelling discussion that offers valuable insights into the future of digital safety.

Tech Disruptors
Zscaler Sees Cyberthreat Environment Growing

Tech Disruptors

Play Episode Listen Later Jan 9, 2025 36:39


The cyberthreat environment keeps worsening because more business is being conducted online and nation states are looking to steal secrets and intellectual property, and get into other countries' infrastructure, according to Zscaler Chairman and CEO Jay Chaudhry. He sits down with Mandeep Singh, senior technology analyst at Bloomberg Intelligence, to talk about the relevance of gen AI to cybersecurity and how the deployment of zero trust is likely to grow with more AI workloads. Chaudhry also discusses the risk of data leakage with enterprise data and his expectations around consolidation for the security space in 2025. The US Treasury cyberattack took place in late December, a week after we recorded this episode.

WSJ Tech News Briefing
How China's Cyber Threat Looms Over America

WSJ Tech News Briefing

Play Episode Listen Later Jan 8, 2025 13:40


Chinese hackers have vastly increased their efforts in recent years, burrowing into systems at ports, pipelines, water facilities and elsewhere. WSJ reporter Dustin Volz joins host James Rundle to talk about what this means for national security, and how companies such as major telecom providers were hacked in the first place. Sign up for the WSJ's free Technology newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices

Big Take DC
The ‘Everything, Everywhere, All at Once' Cyber Threat

Big Take DC

Play Episode Listen Later Jan 8, 2025 13:34 Transcription Available


US intelligence officials say that a hacking campaign known as “Volt Typhoon” has the potential to disrupt critical infrastructure systems in Guam — a significant hub for the US military that holds particular importance in US-China relations. On today’s Big Take DC podcast, Bloomberg national security reporter Katrina Manson shares what she’s learned about the threat and how it could limit America’s ability to push back if China were to invade Taiwan. Read more: The US’s Worst Fears of Chinese Hacking Are on Display in GuamSee omnystudio.com/listener for privacy information.

The Big Take
The ‘Everything, Everywhere, All at Once' Cyber Threat

The Big Take

Play Episode Listen Later Jan 8, 2025 13:34 Transcription Available


US intelligence officials say that a hacking campaign known as “Volt Typhoon” has the potential to disrupt critical infrastructure systems in Guam — a significant hub for the US military that holds particular importance in US-China relations. On today’s Big Take DC podcast, Bloomberg national security reporter Katrina Manson shares what she’s learned about the threat and how it could limit America’s ability to push back if China were to invade Taiwan. Read more: The US’s Worst Fears of Chinese Hacking Are on Display in GuamSee omnystudio.com/listener for privacy information.

CISSP Cyber Training Podcast - CISSP Training Program
CCT 203: Practice CISSP Questions - Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Dec 19, 2024 28:20 Transcription Available


Send us a textCan AI-driven technologies reshape the way we secure our digital world? Join me, Sean Gerber, as we navigate the fascinating landscape of cybersecurity challenges anticipated by 2025. Our latest podcast episode promises to shed light on the emerging threats posed by AI, particularly within the finance and e-commerce sectors. We explore the necessity of incorporating AI into security frameworks and examine the shifting dynamics of cybersecurity insurance powered by AI-driven risk assessments. The conversation takes a thought-provoking turn with the exploration of quantum-resilient encryption's impact on global privacy laws and an increased focus on DevOps security, zero trust models, and the ever-looming threat of nation-state cyber warfare. What strategies are essential when dealing with stubborn vendors and critical vulnerabilities? We'll tackle this and more in a segment dedicated to vulnerability management and its ethical considerations. Learn the significance of documenting exceptions, deploying compensating controls, and the vital role of private collaboration and escalation in managing vendor reluctance. We also provide insights into handling false positives from vulnerability scans and the art of communicating risks to stakeholders under budget constraints. This discussion places a spotlight on strategic communication and ethical decision-making as cornerstones of effective cybersecurity risk management.Uncover the secrets to mastering vulnerability management with a strategic flair. We'll guide you through scenarios where high-severity issues persist despite a reduction in overall vulnerabilities, emphasizing coordinated efforts within multi-cloud settings. You'll gain insights into best practices for risk mitigation when immediate patching isn't feasible and the ethical and legal intricacies of vulnerability disclosure. In addition, there's a focus on presenting a risk management approach that balances cost with potential impact to senior leaders. As a bonus, we offer resources for those gearing up for the CISSP exam and seeking cybersecurity consulting, equipping you with the knowledge to fortify your defense against cyber threats.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

CISSP Cyber Training Podcast - CISSP Training Program
CCT 202: Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Dec 16, 2024 41:54 Transcription Available


Send us a textUnlock the secrets to safeguarding your organization against cyber threats as we explore critical components of cybersecurity. Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we dissect domain 6.4 of the CISSP exam. Discover the latest insights into cyber threats that target U.S. critical infrastructure, with a particular focus on an Iranian-linked group's custom cyber weapon. Learn how understanding your organization's technology, both hardware and software, can be pivotal in mitigating potential threats, especially in industries like oil and gas.Navigate the labyrinth of vulnerability scan reporting and analysis as we dive into the challenging yet rewarding art of communicating security assessment findings. Whether done internally or through third-party services, the objective is to translate technical data into actionable insights for technical teams. We tackle the complexities of overwhelming scan results and highlight the value of automated reporting, ensuring an efficient and effective approach to vulnerability management. Learn how to prioritize risks, provide clear remediation recommendations, and utilize trend analysis to track progress and tackle recurring vulnerabilities.Finally, explore the strategies needed for executing effective internal and external security scans. Discover the importance of thorough preparation and strategic planning, managing insider threats, and safeguarding public-facing assets. We delve into the complexities of third-party scans, emphasizing the need to understand and manage network connections to prevent unauthorized access. Throughout this episode, we stress the critical role of alignment and collaboration in cybersecurity efforts, providing you with the tools and guidance needed to enhance your security posture in today's complex landscape.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

Cybercrime Magazine Podcast
What Is Malvertising? Cyber Threat Spreading Malware Fast. Confidence Staveley, CyberSafe Foundation

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 11, 2024 5:22


Malvertising is short for malicious advertising, and attacks and compromises systems by spreading advertisements injected with malicious code. Confidence Staveley, Africa's most celebrated female cybersecurity leader, is the founder of the Cybersafe Foundation, a Non-Governmental Organization on a mission to facilitate pockets of changes that ensure a safer internet for everyone with digital access in Africa. In this episode, Confidence joins host Amanda Glassner to discuss. To learn more about Confidence, visit her website at https://confidencestaveley.com, and for more on the CyberSafe Foundation, visit https://cybersafefoundation.org.

Coffee w/#The Freight Coach
1068. #TFCP - Understanding Cybersecurity!

Coffee w/#The Freight Coach

Play Episode Listen Later Nov 8, 2024 42:33 Transcription Available


We're back for another interaction with the industry experts recorded from the NMFTA Cybersecurity Conference!  In this episode, we've got two amazing guests, Steve Hankel and Ben Gardiner!  Steve and Ben shared critical cybersecurity threats affecting businesses of all sizes, proactive prevention measures against cyber attacks, and the NMFTA's stand on ensuring the effective implementation of practices protecting transportation professionals!   About Steve Hankel Steve Hankel is the Vice President of Information Technology at JTS (Johanson Transportation Service). He joined JTS in 2010 and during his tenure, he developed a SaaS TMS (Transportation Management System), moved the company's infrastructure to the Cloud, built up their software engineering program, and rolled out their Disaster Recovery and Cyber Security initiatives. Prior to joining JTS, Steve made a name for himself as Director of IT Operations at Webvan, managing the support of cutting-edge technology during the .com boom. He then worked as Tools Team Lead at Wamu, developing a state-of-the-art BC (Business Continuity) and DR (Disaster Recovery) web application. Later he became Co-Founder and Principle at Continuity Source, a company developing BC/DR SaaS Solutions.   About Ben Gardiner Ben is a Senior Cybersecurity Research Engineer contractor at the National Motor Freight Traffic Association, Inc. (NMFTA)™ specializing in hardware and low-level software security. With more than ten years of professional experience in embedded systems design and a lifetime of hacking experience, Ben has a deep knowledge of the low-level functions of operating systems and the hardware with which they interface. He has held security assurance and reversing roles at a global corporation, as well as worked in embedded software and systems engineering roles at several organizations. Ben has conducted workshops and presentations at numerous cybersecurity events globally, including the CyberTruck Challenge, GENIVI security sessions, Hack in Paris, and HackFest. In 2022, he was honored with invitations to speak at escar USA and serve as a main stage speaker at DEF CON. In addition to speaking on the main stage at DEF CON, Ben is a volunteer at the DEF CON Hardware Hacking Village (DC HHV) and Car Hacking Village (CHV). He is GIAC GPEN certified and a GIAC advisory board member, serves as the chair of the SAE TEVEES18A1 Cybersecurity Assurance Testing TF (drafting J3322), a contributor to several American Trucking Associations (ATA) Technology & Maintenance Council (TMC) task forces, ISO WG11 committees, and a voting member of the SAE Vehicle Electronic Systems Security Committee. Ben holds a M.Sc. Eng. in Applied Math & Stats from Queen's University.  

Timeless with Julie Hartman
China's Cyber Threat: Trump Hacked/Election Disinformation/War in Ukraine/Israel

Timeless with Julie Hartman

Play Episode Listen Later Oct 29, 2024 54:56


Julie talks with Brandon Weichert, author of Biohacked - China's Race to Control Life, foreign policy expert who manages The Weichert Report - World News Done Right.  His entire life's work has been predicated on challenging conventional wisdom and assumptions on a variety of matters, notably in national security. His books: https://rb.gy/39gtz Join Julie live Monday, Tuesday, and Wednesday at 1p PT, call in number: 844-861-5537Check out other Julie Hartman videos: https://www.youtube.com/@juliehartman Follow Julie Hartman on social media: Website: https://juliehartmanshow.com/Instagram: https://www.instagram.com/julierhartman/X: https://twitter.com/JulieRHartmanSee omnystudio.com/listener for privacy information.

Today in Health IT
2 Minute Drill: Iranian Cyber Threat, Military Reserves, and Rising Ransomware Cost with Drex DeFord

Today in Health IT

Play Episode Listen Later Oct 23, 2024 2:50 Transcription Available


Drex dives into the latest cybersecurity threats and risks targeting healthcare and critical infrastructure. We cover a new joint advisory from the US and Australian governments on Iranian cyber-attacks, how MFA push bombing is becoming a favored attack method, and the rising financial toll of ransomware on United Health Group. Plus, we discuss the US military's potential new program to enlist senior tech executives into the reserves. Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

Exploit Brokers - Hacking News
HN41 - Chinese Hackers Hijack US Telecom Networks

Exploit Brokers - Hacking News

Play Episode Listen Later Oct 10, 2024 15:46


In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizon. Drawing inspiration from Friedrich Nietzsche's quote: "He who fights with monsters should look to it that he himself does not become a monster... when you gaze long into the abyss, the abyss also gazes into you." We explore how attempts to control and monitor can sometimes backfire, creating vulnerabilities that malicious actors can exploit. If you find this content valuable, please like, subscribe, and hit the bell notification icon to stay updated. For our listeners on Spotify or Apple Podcasts, please leave a review and follow us—it greatly helps in reaching more people. Join the conversation and let's navigate the complexities of cybersecurity together! Relevant Hashtags: #Cybersecurity #ChineseHackers #VoltTyphoon #TelecomSecurity #InternetBackdoor #CALEA #DataBreach #CyberThreats #DigitalPrivacy #Encryption #LawfulSurveillance #TechNews #ExplorerBrokers #AT&T #Verizon #Lumen #TechCrunch #WallStreetJournal #Nietzsche #CyberWarfare #StayInformed

@BEERISAC: CPS/ICS Security Podcast Playlist
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 4, 2024 32:31


Podcast: The OT and IoT Security Podcast (LS 23 · TOP 10% what is this?)Episode: The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat IntelligencePub date: 2024-09-26Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and availability of these systems.In this episode of the Security Sandbox, we'll cover the strategic use of cyber threat intelligence (CTI) to safeguard critical infrastructure and industrial environments.You'll learn about:Integrating OT/IoT threat intelligence with traditional IT threat intelligence for a complete picture of the attack surfaceUsing asset context when acting on threat intelligence in OT systemsReal-world examples of successful proactive threat responseVisit Our WebsiteFollow Us on LinkedInThe podcast and artwork embedded on this page are from Nozomi Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

EVN Report Podcast
Examining the Context: Toward a Strategy of Subversion, Mitigating the Russian Cyber Threat

EVN Report Podcast

Play Episode Listen Later Oct 2, 2024 24:33


Armenia faces distinct security threats from Azerbaijan, Turkey and Russia, with Russia posing the most complex and severe challenge through cyber operations. In this episode of “Examining the Context” podcast, Nerses Kopalyan explains the concept of subversion as a tenable risk-mitigation strategy against these threats.

Federal Newscast
CISA faces challenges sharing cyber threat information

Federal Newscast

Play Episode Listen Later Oct 2, 2024 5:49


The IG says CISA made some good improvements to the Automated Indicator Sharing program in recent years. Learn more about your ad choices. Visit podcastchoices.com/adchoices

@BEERISAC: CPS/ICS Security Podcast Playlist
Assaf Hazan CTO @Kaspersky IL about knowing your enemy & Cyber Threat Intelligence @the Dark web

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Sep 29, 2024 51:43


Podcast: ICS Cyber Talks PodcastEpisode: Assaf Hazan CTO @Kaspersky IL about knowing your enemy & Cyber Threat Intelligence @the Dark webPub date: 2024-09-19מודיעין איומי סייבר הוא משכבות הקריטיות בהגנת סייבר. הכרת האויב שלך, הבנת מטרותיו וביצוע מראש של מהלכים מתאימים ימנעו מתקפה משמעותית ונזק משמעותי לארגון. התוקף תמיד יחפש פריצה פשוטה במקום לבזבז זמן על התקפות ארוכות עם פוטנציאל גילוי גבוה. נחשון פינקו מארח את אסף חזן, סמנכ"ל טכנולוגיות של קספרסקי ישראל וצייד איומי סייבר ידוע, בשיחה על חשיבות מודיעין איומי סייבר, המידע שהוא מספק לחברות מדי יום והרשת העצומה שקספרסקי בנתה ברשת האפלה במשך שנים עם מספר עצום של חיישנים .Cyber threat intelligence is one of the most critical layers in cyber defense. Knowing your enemy, understanding his targets, and making the appropriate next moves will prevent disaster. The attacker will always look for a straightforward breach rather than wasting time on long attacks with a high potential for discovery. Nachshon Pincu hosts Assaf Hazan, the CTO of Kaspersky Israel and a renowned Cyber Threat Hunter, in a conversation on the importance of Cyber Threat Intelligence. Assaf shares the information he provides to companies daily, and the extensive network Kaspersky has built in the dark net over the years, boasting a significant number of sensors.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The OT and IoT Security Podcast
The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence

The OT and IoT Security Podcast

Play Episode Listen Later Sep 26, 2024 32:31


Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and availability of these systems.In this episode of the Security Sandbox, we'll cover the strategic use of cyber threat intelligence (CTI) to safeguard critical infrastructure and industrial environments.You'll learn about:Integrating OT/IoT threat intelligence with traditional IT threat intelligence for a complete picture of the attack surfaceUsing asset context when acting on threat intelligence in OT systemsReal-world examples of successful proactive threat responseVisit Our WebsiteFollow Us on LinkedIn

Cybercrime Magazine Podcast
Cybercrime News For Sep. 17, 2024. Lawmakers Target 'Gray Market' Cyber Threat. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 17, 2024 3:01


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Security Unfiltered
Navigating the Cyber Threat Landscape with Chris Hale

Security Unfiltered

Play Episode Listen Later Sep 3, 2024 44:32 Transcription Available


Send us a textEver wondered what it takes to stay one step ahead of cybercriminals? This episode, featuring cybersecurity expert Chris Hale, promises to unravel the complexities of safeguarding digital fortresses while sharing invaluable lessons from the frontlines. Chris's journey from a help desk technician to the founder of his own cybersecurity firm is nothing short of inspiring. His early interest in computers, paired with a dual major in Exercise Sport Science and Computer Information Systems, laid the foundation for a career that would see him tackling email viruses at Sports Authority and defending against sophisticated malware and ransomware attacks.The conversation shifts to the high-stakes world of incident response teams, where Chris recounts a harrowing ransomware incident caused by the absence of two-factor authentication on a global admin account. The relentless effort required to handle such crises, including long hours and meticulous post-mortem analyses, underscores the critical role of managed service providers (MSPs) and managed security service providers (MSSPs) in maintaining robust security practices and compliance. Chris's firsthand experiences highlight the importance of hands-on training and continuous learning, offering listeners a realistic glimpse into the demands and rewards of a career in cybersecurity.We also navigate the evolving threat landscape, discussing the necessity of quarterly audits, penetration testing, and consistent security practices across global enterprises. Chris shares insights into the importance of continuous cybersecurity training for all organizational levels, using tools like Breach Secure Now to keep security awareness sharp. The episode wraps up with a discussion on the recent CrowdStrike update debacle and the challenges of choosing reliable Endpoint Detection and Response (EDR) solutions. Through Chris's expert lens, listeners gain a comprehensive understanding of the current issues and best practices in cybersecurity, making this episode a must-listen for anyone invested in protecting their digital assets.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today

Security Squawk
RansomHub Unleashed: Dissecting the RAAS Cyber Threat on Halliburton and Beyond

Security Squawk

Play Episode Listen Later Sep 3, 2024 34:20


This week on Security Squawk, dive deep into the world of Ransomware-as-a-Service with a focus on the recent RansomHub attack that targeted Halliburton, causing significant disruption to their operations. We'll explore the intricacies of the attack, its implications for the oil and gas industry, and how RansomHub has become a major player in the ransomware landscape. Host Bryan Hornung leads the conversation on how businesses can navigate the escalating threats posed by RaaS groups and fortify their defenses against these sophisticated cyber attacks. Don't miss this critical episode packed with expert analysis and actionable insights.

Bare Knuckles and Brass Tacks
LIVE from SquadCon: Future Proof Your Career with Cyber Threat Intel Techniques

Bare Knuckles and Brass Tacks

Play Episode Listen Later Aug 26, 2024 32:56


Welcome to Season 3! This week we're bringing you the live recording of our talk at SquadCon during Hack Summer Camp a few weeks back. Our talk was called, “Future Proof Your Career with Cyber Threat Intelligence Techniques.” Many thanks again to the Black Girls Hack Foundation and the SquadCon crew for having us, and to Rebekah Skeete for the killer intro!And, we're fast approaching episode 100 of this podcast! We're doing an AMA with a very special guest host. So, what do you wanna ask us? Email your questions to bareknucklespod@gmail.com, with "AMA" in the subject line. If we air your question, you can expect some special swag your way!

The City Club of Cleveland Podcast
Who's Next? Inside Cybercrime--the World's Most Profitable Business

The City Club of Cleveland Podcast

Play Episode Listen Later Jul 26, 2024 60:00


As more of our daily lives move to the digital realm, protecting our sensitive information from unauthorized access, theft, and hacking has never been more important. Still, every month, major corporations, school districts, health systems, and even municipalities and public utilities have become targets of these increasingly sophisticated cyber threats. This puts not only our personal information at risk, but also raises questions about national security. What trends are experts seeing in cybercrime? And what are the actionable insights and tips to safeguard our digital realm?rnrnJoin the City Club as we explore the current cyber threat landscape and learn about the threat actor's tactics, techniques, and procedures with leading experts in the industry.

The Daily Scoop Podcast
APT45 designation highlights rising cyber threat; USAID reports over 1,300 missing devices

The Daily Scoop Podcast

Play Episode Listen Later Jul 25, 2024 5:10


A North Korean hacking group, newly designated as APT45 by the FBI and Mandiant, has broadened its ransomware operations to target healthcare providers, financial institutions, and energy companies. Previously known as Andariel or UNC614, the group has been active since at least 2009 and supports the interests of the North Korean government. Mandiant, a subsidiary of Google Cloud, emphasizes the group's rising sophistication and expanding target range, which now includes advanced technologies and critical infrastructure. The FBI is expected to release an advisory following Mandiant's report, detailing the group's tactics and historical focus on intelligence gathering from defense and research sectors. Additionally, the U.S. Agency for International Development (USAID) reports over 1,300 electronic devices, including iPhones, iPads, and computers, missing over the past three years. With two-thirds of its workforce based overseas, device security remains a critical challenge for the agency, reflecting a broader issue of mobile device management across federal agencies. Despite the losses, USAID remains committed to responsible stewardship of taxpayer dollars and rigorous digital asset security, particularly in challenging global environments. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on on Apple Podcasts, Soundcloud, Spotify and YouTube.

The CyberWire
The current state of Cyber Threat Intelligence.

The CyberWire

Play Episode Listen Later Jul 22, 2024 17:31


Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant's Chief Analyst. References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Josephine Wolff, October 2023. How Hackers Swindled Vegas [Explainer]. Slate. Rick Howard, 2023. Cybersecurity First Principles Book Appendix [Book Support Page]. N2K Cyberwire. Staff, September 2023. mWISE Conference 2023 [Conference Website]. Mandiant. Staff, n.d. VirusTotal Submissions Page [Landing Zone]. VirusTotal. Learn more about your ad choices. Visit megaphone.fm/adchoices

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Cybersecurity and Risk Management: Western Digital CIO Sesh Tirumala's Strategy on People, Process, and Technology for Cyber Threat Readiness

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Jul 22, 2024 36:23 Transcription Available


891: Proper cybersecurity practices within a company involve a shared responsibility across the entire enterprise, not just the IT organization, requiring a unified approach that encompasses people, processes, and technology. In this episode of Technovation, Peter High interviews Sesh Tirumala, Chief Information Officer of Western Digital, to discuss the company's focus on cybersecurity, employee experience, and engineering excellence. Sesh details his experience handling a major cyber incident at Western Digital and the framework he applied to identify vulnerabilities and establish guardrails to mitigate future cyber incidents. He also talks about his approach to improving operational and engineering excellence at the company and explains the importance of culture in IT. Furthermore, he reflects on his journey across various scaled and fast-growing technology companies and shares the future trends in technology that excite him, such as generative AI and digital twins in manufacturing.

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Cybersecurity and Risk Management: Western Digital CIO Sesh Tirumala's Strategy on People, Process, and Technology for Cyber Threat Readiness

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Jul 22, 2024 36:23 Transcription Available


891: Proper cybersecurity practices within a company involve a shared responsibility across the entire enterprise, not just the IT organization, requiring a unified approach that encompasses people, processes, and technology. In this episode of Technovation, Peter High interviews Sesh Tirumala, Chief Information Officer of Western Digital, to discuss the company's focus on cybersecurity, employee experience, and engineering excellence. Sesh details his experience handling a major cyber incident at Western Digital and the framework he applied to identify vulnerabilities and establish guardrails to mitigate future cyber incidents. He also talks about his approach to improving operational and engineering excellence at the company and explains the importance of culture in IT. Furthermore, he reflects on his journey across various scaled and fast-growing technology companies and shares the future trends in technology that excite him, such as generative AI and digital twins in manufacturing.

Secure Talk - Cybersecurity
Cyber Threat Intelligence: Getting to know the adversary

Secure Talk - Cybersecurity

Play Episode Listen Later Jul 9, 2024 36:48


"They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'Angelo Join us for this Secure Talk podcast to unmask the activity of cyber criminals on the dark web. Mary D'Angelo, an expert in Cyber Threat Intelligence, helps us “follow the money” and understand the aggressive tactics being used by threat actors to steal and monetize your data. Discover how these criminal organizations are monetizing your personal data before it even surfaces in the dark corners of the internet and how the long tail of data breaches can follow your organization for years.

The Propaganda Report
Michael Richards Humiliation Ritual, AI Priests & Mayors & Assessing The Cyber Threat

The Propaganda Report

Play Episode Listen Later Jun 20, 2024 144:48


Michael Richards Humiliation Ritual, AI Priests & Mayors & Assessing The Cyber Threat Learn more about your ad choices. Visit megaphone.fm/adchoices

The Sound of Ideas
Questions remain over week of Cleveland City Hall closures amid cyber threat | Reporters Roundtable

The Sound of Ideas

Play Episode Listen Later Jun 14, 2024 51:41


City officials have made assurances that tech experts are on the case, but lack details about the cause or consequences of the threat. 

Washington Post Live
Former NSA director Gen. Paul M. Nakasone on the global cyberthreat landscape

Washington Post Live

Play Episode Listen Later Jun 6, 2024 79:05


Former acting national cyber director Kemba Walden discusses the recent Change Healthcare cyberattack and why the healthcare providers should "view themselves" as a tech company. Then, the State Department's top cyber diplomat Nathaniel C. Fick talks about the tech race between the U.S. and China and threats posed by foreign actors. Finally, former National Security Agency director Gen. Paul M. Nakasone (U.S. Army, Ret.) assesses the cyberthreat landscape, the impact of emerging technologies and safeguarding America's critical infrastructure ahead of the 2024 elections. Conversation recorded on Thursday, June 6, 2024. Conversation recorded on Thursday, June 6, 2024.

EpochTV
Report Links CCP to Anti-Israel Protests

EpochTV

Play Episode Listen Later May 17, 2024 21:39


More anti-Israel demonstrations take place at a California university. But is the Chinese Communist Party (CCP) lurking in the shadows? A new report sheds light on the CCP's role in the unrest. Leveling the playing field with Beijing, the Biden administration is imposing tariffs on certain kinds of solar panels imported from China. A House hearing explores the growing cyber threat posed by communist China, from state-backed hacking to stealing advanced U.S. technology. President Joe Biden will dispatch a special delegation to Taiwan as its new president takes office. The group consists of former U.S. officials and will visit Taipei “to represent the American people.” ⭕️ Watch in-depth videos based on Truth & Tradition at Epoch TV

The CyberWire
Encore: Selena Larson: The Green Goldfish and cyber threat intelligence. [Analyst] [Career Notes]

The CyberWire

Play Episode Listen Later Apr 7, 2024 7:40


Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. 

Hacking Humans
Encore: cyber threat intelligence (CTI) (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Mar 19, 2024 6:02


Information used by leadership to make decisions regarding the cybersecurity posture of their organization. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Ricochet Audio Network Superfeed
Daily Signal Podcast: Rubio Warns of China Cyber Threat, 24 Attacks From Biden's Dog, Judge Rules Noncitizens Can't Vote | Feb. 22

The Ricochet Audio Network Superfeed

Play Episode Listen Later Feb 23, 2024


TOP NEWS | On today's Daily Signal Top News, we break down:   Sen. Marco Rubio warns of cyber security attacks after massive AT&T outage. Judge rules that non-U.S. citizens cannot vote in local elections in New York City. The House Freedom Caucus sends a letter to House Speaker Mike Johnson with an appropriations pitch. […]

Daily Signal News
Rubio Warns of China Cyber Threat, 24 Attacks From Biden's Dog, Judge Rules Noncitizens Can't Vote | Feb. 22

Daily Signal News

Play Episode Listen Later Feb 22, 2024 8:22


TOP NEWS | On today's Daily Signal Top News, we break down: Sen. Marco Rubio warns of cyber security attacks after massive AT&T outage. Judge rules that non-U.S. citizens cannot vote in local elections in New York City.The House Freedom Caucus sends a letter to House Speaker Mike Johnson with an appropriations pitch.Reports reveal that Biden's dog Commander attacked Secret Service members at least 24 times. Listen to other podcasts from The Daily Signal: https://www.dailysignal.com/podcasts/Get daily conservative news you can trust from our Morning Bell newsletter: DailySignal.com/morningbellsubscription Listen to more Heritage podcasts: https://www.heritage.org/podcastsSign up for The Agenda newsletter — the lowdown on top issues conservatives need to know about each week: https://www.heritage.org/agenda Hosted on Acast. See acast.com/privacy for more information.

The Wright Report
2/20/2024: FBI's Alerts of China's Cyber Threat

The Wright Report

Play Episode Listen Later Feb 20, 2024 33:50


Donate (no account necessary) | Subscribe (account required) In today's global expedition on The Wright Report with Bryan Dean Wright, former CIA Operations Officer, we navigate the globe to uncover critical developments. In Germany, the FBI Director warns of Chinese cyber campaigns, raising eyebrows with the Biden White House's adoption of a Chinese cyber tool. In Mexico, Chinese factories are unsettling American automakers with their rapid expansions. Over the Red Sea, Iran's Houthis are causing turmoil by targeting US drones and ships. In Western Africa, we delve into how environmental and health crises could skyrocket chocolate prices. The UK's innovative use of AI in wildlife conservation at a nature reserve is also explored. Finally, we return to Florida, where Governor Ron DeSantis is taking a firm stance against retail crime.

The President's Daily Brief
PDB Afternoon Bulletin | January 31st, 2024: Iran-Backed Militants Prepare For Blowback & FBI Warns Of China's Grave Cyber Threat To US

The President's Daily Brief

Play Episode Listen Later Jan 31, 2024 9:48


In this episode of The PDB Afternoon Bulletin:     The most powerful Iran-backed militia in Iraq has announced they are suspending their military operations ahead of the Biden administration's expected response to the deadly drone attack on U.S. troops in Jordan.  We'll discuss FBI Director Christopher Wray's latest warning to Congress over the ongoing threat posed by China's aggressive cyber activities targeting U.S. critical infrastructure. Please remember to subscribe if you enjoyed this episode of The PDB Afternoon Bulletin.     Email: PDB@TheFirstTV.com Learn more about your ad choices. Visit megaphone.fm/adchoices