Podcasts about enveil

  • 20PODCASTS
  • 132EPISODES
  • 24mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Feb 28, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about enveil

Latest podcast episodes about enveil

Top in Tech
Breaking Barriers: How data sharing can transform the fight against economic crime

Top in Tech

Play Episode Listen Later Feb 28, 2025 31:01


On this bonus episode of Top in Tech, Conan D'Arcy is joined by Ellison Anne Williams, CEO of Enveil, and Harry Palmer, Associate Director at Global Counsel, to discuss the report 'Breaking barriers: how data sharing can transform the fight against economic crime'. They explore the challenges and recommendations for improving data sharing practices to combat economic crime, emphasizing the role of privacy enhancing technologies (PETs) in facilitating secure data collaboration between public and private sectors. Ellison-Anne and Harry also explore the current landscape of economic crime in the UK and the potential for innovative solutions to enhance data sharing efforts.Read the report here Hosted on Acast. See acast.com/privacy for more information.

EM360 Podcast
PETs and Privacy: Walking the Fine Line of AI Ethics

EM360 Podcast

Play Episode Listen Later Dec 11, 2024 21:56


As artificial intelligence continues to shape industries and society, the need for robust AI governance has never been more critical. At the forefront of this governance are privacy-enhancing technologies (PETs), which play a key role in ensuring that AI systems operate in a way that respects and protects individuals' data. The European Union's AI Act, one of the most ambitious regulatory frameworks for AI, sets clear standards for transparency, accountability, and risk management. Understanding the implications of this legislation is crucial for businesses looking to innovate responsibly while avoiding potential legal and ethical pitfalls. Countries around the world are taking varied approaches to AI governance, with some prioritising privacy and ethical considerations while others focus on fostering technological innovation. This diversity presents challenges and opportunities for organisations striving to implement AI responsibly. In this episode, Paulina Rios Maya, Head of Industry Relations, speaks to Dr Ellison Anne Williams CEO and founder of Enveil, about the need for model-centric security and the potential of PETs to mitigate risks associated with sensitive data in AI applications.Key Takeaways: Privacy-enhancing technologies are crucial for data protection.The EU AI Act sets a precedent for global AI regulation.Organisations must start with the problems they aim to solve.Data sensitivity must be considered in AI model training.Privacy-enhancing technologies can facilitate cross-border data sharing.AI is a neutral tool that requires responsible governance.The implementation of privacy technologies is still evolving.Global standards for AI governance are necessary for ethical use.Chapters: 00:00 - Introduction to AI Governance and Privacy01:07 - Understanding AI Governance03:51 - Privacy Enhancing Technologies Explained08:28 - The Role of the EU AI Act12:42 - Implementing Privacy Enhancing Technologies17:20 - Harmonizing AI Governance with Privacy Technologies

The IT Pro Podcast
Classic episode: Putting privacy-enhancing technologies to use

The IT Pro Podcast

Play Episode Listen Later Oct 25, 2024 28:56


This episode was first broadcast 4 August 2023.As the economy has become increasingly dependent on data, companies have sought to make more profit from mining user actions such as through loyalty schemes or social media interactions.But individual rights also have to be respected, and businesses have to follow strict data protection procedures.Privacy-enhancing technologies (PETs) are one method for companies to securely search through data to derive value – for example, a bank could search through customer data to expose fraudulent activity without putting the personal information of all the customers involved at risk.This episode, Rory and Jane are joined by Ellison Anne Williams, CEO and founder of privacy-enhancing technology company Enveil, to discuss the dos and don'ts of data use, and how organizations can make use of PETs for enhanced data mining.For more information, read the show notes here.

Careers in Data Privacy
Ellison Anne Williams: CEO, Founder at Enveil

Careers in Data Privacy

Play Episode Listen Later Oct 14, 2024 30:24


Today I am chatting with Ellison Anne, To talk about her career thus far, and her plans. Ellison Anne has a Ph.D. in math, The NSA, Johns Hopkins, and Enveil are part of her path.

founders nsa johns hopkins ceo founder enveil ellison anne williams
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Ep. 158 Safe Use of AI with Privacy Enhancing Technology

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Jul 2, 2024 28:34


Every technology has a maturation cycle; today we see Artificial Intelligence transitioning from being a parlor trick to being considered for serious applications. The federal government wants secure and reliable solutions to solve problems in the military and healthcare. Our guest today is Dr. Ellison Anne Williams, she has a PhD in mathematics and is the founder of Enveil. She provides an overview of AI security by suggesting it is only as good as the data over which you train and use it. AI is exposed to large data sets and models are encoded with the data with which they were trained. This process can leave the model vulnerable and open to attack, she describes one attack called a “model inversion.” This is a machine learning technique that examines a model's output and infers personal information about its data subject. Dr. Ellison suggests a group of technologies called “Privacy Enhancing Technology.” During the interview, she gives an overview of how it can securely and privately train a model to produce richer insights. PET allows leaders to secure the use of a wider range of data sources. You can use homomorphic encryption to safely train your model over sensitive data. This interview is an overview of a technology that can allow federal agencies that must deal with sensitive information to be able to leverage the speed and insights that AI can provide.  Want to leverage you next podcast appearance?  Take the quiz. https://content.leadquizzes.com/lp/fk1JL_FgeQ Connect to John Gilroy on LinkedIn   https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com

Masters of Privacy
Ellison Anne Williams: Homomorphic Encryption and its interplay with other PETs

Masters of Privacy

Play Episode Listen Later Apr 2, 2024 24:13


What is Homomorphic Encryption? Can it be leveraged in the context of cross-vertical challenges? Dr. Ellison Anne Williams is the Founder and CEO of Enveil, the pioneering data security startup protecting Data in Use. She has more than a decade of experience spearheading avant-garde efforts in the areas of large scale analytics, information security and privacy, computer network exploitation, and network modeling at the National Security Agency and the Johns Hopkins University Applied Physics Laboratory. In addition to her leadership experience, she is accomplished in the fields of distributed computing and algorithms, cryptographic applications, graph theory, combinatorics, machine learning, and data mining and holds a Ph.D. in Mathematics (Algebraic Combinatorics), a M.S. in Mathematics (Set Theoretic Topology), and a M.S. in Computer Science (Machine Learning).   References: Dr. Ellison Anne Williams (full profile), Enveil Enveil Drives Data Value Across Silos with Enhanced Encrypted Search Offering ICO Guidance on Privacy Enhancing Technologies Matthias Eigenmann: Confidential Computing, contractual relationships, and legal bases for Data Clean Rooms (Masters of Privacy) Damien Desfontaines: Differential Privacy in Data Clean Rooms (Masters of Privacy)  

The IT Pro Podcast
Putting privacy-enhancing technologies to use

The IT Pro Podcast

Play Episode Listen Later Aug 4, 2023 27:07


As the economy has become increasingly dependent on data, companies have sought to make more profit from mining user actions such as through loyalty schemes or social media interactions. But individual rights also have to be respected, and businesses have to follow strict data protection procedures.Privacy-enhancing technologies (PETs) are one method for companies to securely search through data to derive value – for example, a bank could search through customer data to expose fraudulent activity without putting the personal information of all the customers involved at risk.This episode, Rory and Jane are joined by Ellison Anne Williams, CEO and founder of privacy-enhancing technology company Enveil, to discuss the dos and don'ts of data use, and how organizations can make use of PETs for enhanced data mining.For more information, read the show notes here.

IBS Intelligence Podcasts
Ep507: How privacy-enhancing technologies can leverage data to unlock value and fight financial crime

IBS Intelligence Podcasts

Play Episode Listen Later Sep 7, 2022 13:12


Ellison Anne Williams, CEO & Founder, Enveil Privacy-enhancing technologies for secure data search protect data while it's being used or processed. The development of privacy-enhancing technologies is a hot topic for financial services. The UN estimates that up to $2 trillion of cross-border money laundering occurs each year. Greater information sharing and collaborative analytics among financial organisations could transform the detection of this activity in a secure manner without compromising jurisdictional requirements. Robin Amlôt of IBS Intelligence speaks to Ellison Anne Williams, CEO and Founder of Enveil about the potential for secure data usage.

What's Next In
What's Next In: With great data comes great responsibility

What's Next In

Play Episode Listen Later Jun 14, 2022 24:54


Data is more valuable than ever – which means, more than ever, it needs to be protected. From the rise of open banking, which enables people to share their financial data to access more choice and better experiences, to the growing desire of companies across industries to harness data to make smarter decisions and create new revenue streams, data security is key. In the latest episode of “What's Next In,” Mastercard's podcast that informally explores technology, innovation and ideas, host Vicki Hyman discusses the evolution of privacy-enhancing technologies with Bob Schukai, Mastercard's executive vice president for Technology Development, Global Open Banking, and Ellison Anne Williams, the founder and CEO of Enveil, the cybersecurity startup that uses homomorphic encryption to secure data while it's being used to allow companies to innovate while protecting and respecting individual privacy. “Privacy-enhancing technologies enable a decentralized form of data usage, collaboration and monetization to be possible,” Williams says. “These technologies leave the data at the point of origination and enable usage of that data in a secure and private way without having to move or replicate it.” Mastercard's privacy by design principles ensure that privacy safeguards are built into the design and creation of everything the company does, Schukai says. “We believe that your personal information is just that, it's personal and we try to take great care to ensure it stays that way.” To hear more from Schukai and Anne, click play and enjoy!

EM360 Podcast
Using PETs for Social Good

EM360 Podcast

Play Episode Listen Later Sep 1, 2021 14:11


Privacy enhancing technologies, or PETs, can be used for a multitude of reasons; whether it's being used to decrease the crime rates of countries, for social good or even for the use of your business, PETs have proved time and time again to be effective. PETs are broad, and when using one within your business, the focus really should be on providing a safe network for your customers, clients and consumers. One way in which PETs can be used for this is by blocking third party website traffic analysis, thus preventing your customers from being monitored. This is not only something that needs to be paid attention to by people within the tech industry, but really for any B2B or B2C business. Customer data is often readily available, and when permission has not been given by the customer, legal implications await.  In this EM360 podcast, we speak to Ellison Anne Williams, Founder and CEO at Enveil. Ellison Anne covers the many different ways in which PETs can be used for social good, how to implement them, the necessity of PETs in areas such as the health industry and the future of data protecting tech.

The IQT Podcast
The Intersection: Transitioning from government to startups

The IQT Podcast

Play Episode Listen Later Jun 22, 2021 22:34


This week's episode of The Intersection features a conversation between Steve Bowsher and Dr. Ellison Anne Williams, CEO and Founder of Enveil. Tune in to hear their discussion on the challenges and opportunities in transitioning from a career with the federal government to starting a company from scratch.

The Encrypted Economy
Ellison Anne Williams, CEO of Enveil, Privacy Enhancing Technologies Make Entirely New Things Possible - E14

The Encrypted Economy

Play Episode Listen Later Feb 9, 2021 39:30 Transcription Available


This week on The Encrypted Economy my guest is Ellison Anne Williams, the founder and CEO of Enveil, a Privacy Enhancing Technologies (PET) start-up. She founded the company in 2016 after spending 12 years at the NSAstudying the technologies that allow Enveil to encrypt data while in use. Ellison Anne has created cutting edge use cases for homomorphic encryption and other PETs which listeners of The Encrypted Economy will be very familiar with. As a result of this innovation, Enveil has been recognized by organizations like the World Economic Forum and Cybersecurity Ventures.  Don't miss this episode of The Encrypted Economy as we continue our journey into PETs and keep an eye on Enveil as they continue to turn imagination into reality. Topics Covered Ellison Anne's Background Privacy Enhancing Technologies (PETs) as a Family The Journey of Homomorphic Encryption Where Homomorphic Encryption Works and Where it Doesn't Enveil's Unique Product Design PETs in DeFi & National Cybersecurity Securing Data in Use for Financial Services Enveil's Umbrella Use Cases – Data Monetization The Components of the PET Family (HE, SMPC, & TEE) Homomorphic Encryption in Real Time Where will PETs be in Five Years? Resource List Ellison Anne's LinkedIn Business Insider: 50  Cybersecurity Leaders Cybersecurity Ventures Hot 150 Cybersecurity Companies Enveil's Website  Ellison Anne's Forbes Post on Homomorphic Encryption The Power of Privacy Enhancing Technologies (PETs) My Article on Homomorphic Encryption Enveil'sZeroReveal Products Trusted Execution Environments Our Episode with Brett Hemenway Falk on SMPC Our Episode with Kurt Rohloff on Homomorphic Encryption World Economic Forum – Technology Pioneers 2020 Ellison Anne's 2017 RSAC Pitch Enveil on Twitter - @Enveil_Inc  

Extreme Uncertainty
Ellison Anne Williams - The Holy Grail

Extreme Uncertainty

Play Episode Listen Later Jan 28, 2021 31:31


What do you know about cryptography? For decades, researchers and data scientists in the federal government and commercial enterprises have invested millions to crack the code on homomorphic encryption—that is, how to keep data secure while it's in use. Our guest on the podcast today spent the first part of her career at the National Security Agency as one of those scientists, and she's the one who cracked the code. In 2016, Dr. Ellison Anne Williams left the NSA to found Enveil, the first commercial company to provide security for data in use. Also known as the “Holy Grail” of cryptography, Enveil's homomorphic encryption platform is a technical breakthrough and represents a fundamental leap forward from traditional privacy and security technologies. Though Ellison Anne spent her early career "collecting degrees" in math and machine learning before joining the Johns Hopkins Applied Physics Lab and eventually the NSA, she recounts how for much of her time in government she felt like a fish on a bicycle--an entrepreneur working in a massive government bureaucracy. Ellison Anne recounts her entrepreneurial beginnings running a cake business in high school, and talks about a career in government that was undergirded by a desire to work on entrepreneurial endeavors. Since founding Enveil, Ellison Anne discovered that what she learned about working the gears in a government bureaucracy helped her prepare for navigating enterprise sales cycles. She shares her advice for founders and gives us a look at what the market for privacy and data security will look like in 5-10 years time. You can check out their groundbreaking work at enveil.com and you can follow them @enveil_inc.

holy grail nsa national security agency enveil ellison anne williams
Privacy Please
Ep. 43 - Ellison Anne Williams, CEO, Founder at Enveil

Privacy Please

Play Episode Listen Later Nov 11, 2020 40:15


This week on Privacy Please Podcast Gabriel Gumbs and I have the pleasure of speaking with Ellison Anne Williams the very intelligent, hardworking #CEO, #Founder at Enveil - A data security company protecting data in use.We talk about her start before getting into #datasecurity, the many degrees she worked hard for, how she started Enveil, the powerful message behind the proudest moment in her personal life, #dataprivacy, #datainmotion, #encryption, and much more!Stick around for the private segment at the end where Gabe and I cut loose with Ellison Anne and dig into her darkest unknowns for some laughs and inspiration!-Cam

ceo founders ceo founder enveil ellison anne williams
Captivated Audience: A Financial Crime Podcast
AML Innovators: KYC, Privacy and Homomorphic Encryption: Dr Ellison Anne Williams, CEO and Founder, Enveil (Washington D.C. USA, recorded on 12 May 2020)

Captivated Audience: A Financial Crime Podcast

Play Episode Listen Later May 17, 2020 16:33


Dr Ellison Anne Williams, CEO and Founder, Enveil (Washington D.C. USA,on the securing of data in use, the data security triad, the "holy grail" of cryptography - homomorphic encryption, how it works, its use for securely sharing data for the detection and prevention of financial crime, the potential for cross-jurisdictional information sharing while still protecting personal information, sweeping the 2019 AML Techsprint co-hosted by the UK and USA regulators and dispelling the dreaded "black box" concern of regulators around how AML/CFT RegTech works.

The CyberWire
Fingerprint authentication is not completely secure.

The CyberWire

Play Episode Listen Later May 2, 2020 17:59


Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem. Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and providing insights into their report which shows that fingerprints are good enough to protect the average person's privacy if they lose their phone. However, a person that is likely to be targeted by a well-funded and motivated actor should not use fingerprint authentication. The research can be found here: Fingerprint cloning: Myth or reality? The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Contact tracing as COVID-19 aid.

The CyberWire

Play Episode Listen Later Apr 25, 2020 31:46


Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual. Mayank Varia from Boston University describes how his team suggests an approach based on using short-range communication mechanisms, like Bluetooth, that are available in all modern cell phones. The research can be found here: Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

Barefoot Innovation Podcast
Homomorphic Encryption: Enveil CEO Ellison Anne Williams

Barefoot Innovation Podcast

Play Episode Listen Later Apr 21, 2020 54:23


Our guest today is Ellison Anne Williams, the CEO of Enveil. And she is an expert in the privacy technology known as homomorphic encryption.

ceo privacy data privacy encryption aml enveil ellison anne williams
The CyberWire
Profiling an audacious Nigerian cybercriminal.

The CyberWire

Play Episode Listen Later Apr 11, 2020 20:14


By day, he is Dton, an upstanding Nigerian citizen. He believes in professionalism, hard work and excellence. He’s a leader, a content creator, an entrepreneur and an innovator; an accomplished business administrator; a renaissance man who is adored by his colleagues. But by night, he is Bill Henry, Cybercriminal Entrepreneur. We sat down with a researcher at CheckPoint for the inside scoop into this fascinating, brazen individual.  The research can be found here: The Inside Scoop on a Six-Figure Nigerian Fraud Campaign The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
A rough year ahead for ransomware attacks - and how to stop them.

The CyberWire

Play Episode Listen Later Apr 4, 2020 12:04


2020 is shaping up to be a rough year. Ransomware attacks will continue to grow as cybercriminals get more sophisticated in their methods and expand their reach. Allan Liska, Senior Analyst at Recorded Future, shares their findings and predictions in a new report.  The research can be found here: 5 Ransomware Trends to Watch in 2020 The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Hidden dangers inside Windows and LINUX computers.

The CyberWire

Play Episode Listen Later Mar 28, 2020 20:28


Eclypsium has issued a study that suggests the prevalence of “unsigned firmware in WiFi adapters, USB hubs, trackpads, and cameras used in computers from Lenovo, Dell, HP and other major manufacturers.” Here to discuss their findings is Rick Altherr, a Principle Engineer at Eclypsium. The research can be found here: Perilous Peripherals: The Hidden Dangers Inside Windows and LINUX Computers.  The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
The security implications of cloud infrastructure in IoT.

The CyberWire

Play Episode Listen Later Mar 21, 2020 27:16


Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist. The key findings in these reports shed light on security missteps that are actually in practice by organizations across the globe. Joining us in this special Research Saturday are Palo Alto Network's Matthew Chiodi and Ryan Olson. They discuss their findings in two different threat reports.  The research can be found here: Cloud Threat Report IoT Threat Report The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
TLS is here to stay.

The CyberWire

Play Episode Listen Later Mar 14, 2020 16:01


As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over HTTPS connections, unencrypted traffic may draw even more attention, since it’s easier for analysts and security tools to identify malicious communication patterns in those plain HTTP sessions. Malware authors know this, and they’ve made it a priority to adopt TLS and thereby obfuscate the contents of malicious communication. Joining us on this week's Research Saturday is Chester Wisniewski from SophosLabs discussing their research on the subject.  The research can be found here: Nearly a quarter of malware now communicates using TLS The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Overworked developers write vulnerable software.

The CyberWire

Play Episode Listen Later Mar 7, 2020 14:21


Why do some developers and development teams write more secure code than others? Software is written by people, either alone or in teams. Ultimately secure code development depends on the actions and decisions taken by the people who develop the code. Understanding the human factors that influence the introduction of software vulnerabilities, and acting on that knowledge, is a definitive way to shift security to the left.  On this Research Saturday, our conversation with Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software. The research can be found here: Which Developers and Teams Are More Likely to Write Vulnerable Software? The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Application tracking in Wacom tablets.

The CyberWire

Play Episode Listen Later Feb 29, 2020 18:28


Today's Research Saturday features our conversation with Robert Heaton, a software engineer with Stripe who penned a blog post about his disappointing discovery involving his Wacom tablet tracking his applications. The post struck a nerve and has since been widely distributed. The research can be found here:  Wacom drawing tablets track the name of every application that you open The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
New vulnerabilities in PC sound cards.

The CyberWire

Play Episode Listen Later Feb 22, 2020 19:51


SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards.  On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at SafeBreach.  The research can be found here:  Realtek HD Audio Driver Package - DLL Preloading and Potential Abuses The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
If you can't detect it, you can't steal it.

The CyberWire

Play Episode Listen Later Feb 15, 2020 23:25


BGN Technologies, the technology transfer company of Ben-Gurion University (BGU) of the Negev, Israel, is introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly-sensitive cloud computing and data center network transmission. Joining us in this special Research Saturday is BGN's Dan Sadot who helped pioneer this technology.  The Research can be found here: Ben-Gurion University Researchers Introduce the First All-Optical, Stealth Data Encryption Technology The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
The Chameleon attacks Online Social Networks

The CyberWire

Play Episode Listen Later Feb 8, 2020 16:25


The Chameleon attack technique is a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Joining us to discuss their findings in a new report entitled "The Chameleon Attack: Manipulating Content Display in Online Social Media" is Ben-Gurion University's Rami Puzis.  The research can be found here: The Chameleon Attack: Manipulating Content Display in Online Social Media Demonstration video of a Chameleon Attack The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Tracking one of China's hidden hacking groups - Research Saturday

The CyberWire

Play Episode Listen Later Feb 1, 2020 17:49


Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group. We are joined by Fox-IT's Maarten van Dantzig who shares his insights into their new report entitled "Operation Wocao: Shining a light on one of China’s hidden hacking groups". The Research can be found here: Operation Wocao: Shining a light on one of China’s hidden hacking groups The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

@BEERISAC: CPS/ICS Security Podcast Playlist
Know Thine Enemy - Identifying North American Cyber Threats - Research Saturday

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 26, 2020 26:34


Podcast: The CyberWireEpisode: Know Thine Enemy - Identifying North American Cyber Threats - Research SaturdayPub date: 2020-01-25The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into obtaining effects-focused capabilities, the risk of a disruptive or destructive attack on the electric sector significantly increases. Selena Larson from Dragos joins us to discuss their new report North American Electric Cyber Threat Perspective. The report can be found here: North American Electric Cyber Threat Perspective The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.The podcast and artwork embedded on this page are from The CyberWire, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The CyberWire
Know Thine Enemy - Identifying North American Cyber Threats - Research Saturday

The CyberWire

Play Episode Listen Later Jan 25, 2020 26:34


The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into obtaining effects-focused capabilities, the risk of a disruptive or destructive attack on the electric sector significantly increases. Selena Larson from Dragos joins us to discuss their new report North American Electric Cyber Threat Perspective. The report can be found here: North American Electric Cyber Threat Perspective The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Clever breaches demonstrate IoT security gaps - Research Saturday

The CyberWire

Play Episode Listen Later Jan 18, 2020 20:50


Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no surprise that these too are subject to attack.  Steve Povolny is head of advanced research at McAfee; we discuss a pair of research projects they recently published involving popular IoT devices.  The research can be found here: McAfee Advanced Threat Research demo McLear NFC Ring McAfee Advanced Threat Research Demo Chamberlain MyQ The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Profiling the Linken Sphere anti-detection browser - Research Saturday

The CyberWire

Play Episode Listen Later Jan 11, 2020 11:14


Multiple e-commerce and financial organizations around the world are targeted by cybercriminals attempting to bypass or disable their security mechanisms, in some cases by using tools that imitate the activities of legitimate users. Linken Sphere, an anti-detection browser, is one of the most popular tools of this kind at the moment. Staffan Truvé is the CTO and Co-Founder of Recorded Future, he joins us to discuss their new report on the browser.  The research can be found here: Profiling the Linken Sphere Anti-Detection Browser The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
A Jira vulnerability that’s leaking data in the public cloud - Research Saturday

The CyberWire

Play Episode Listen Later Jan 2, 2020 13:40


Unit 42 (the Palo Alto Networks threat intelligence team) released new research on a Jira vulnerability that’s leaking data of technology, industrial and media organizations in the public cloud. The vulnerability (a Server Side Request Forgery -- SSRF) is the same type that led to the Capital One data breach in July 2019. Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks, and she joins us to share their findings. The research can be found here: https://unit42.paloaltonetworks.com/server-side-request-forgery-exposes-data-of-technology-industrial-and-media-organizations/ The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Inside Magecart and Genesis. — Research Saturday

The CyberWire

Play Episode Listen Later Dec 21, 2019 17:45


Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona attorney general's office, where he investigated complex fraud. Prior to that, he spent 20 years with federal law enforcement agencies and intelligence organizations, including the CIA and FBI, where he specialized in information operations and cybercrime. The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
WAV files carry malicious data payloads. — Research Saturday

The CyberWire

Play Episode Listen Later Dec 14, 2019 16:57


Researchers at BlackBerry Cylance have been tracking ordinary WAV audio files being used to carry hidden malicious data used by threat actors.  Eric Milam is VP of threat research and intelligence at BlackBerry Cylance, and he joins us to share their findings. The research can be found here: https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.  

The CyberWire
Targeting routers to hit gaming servers. — Research Saturday

The CyberWire

Play Episode Listen Later Dec 7, 2019 16:08


Researchers at Palo Alto Networks' Unit 42 recently published research outlining attacks on home and small-business routers, taking advantage of known vulnerabilities to make the routers parts of botnets, ultimately used to attack gaming servers. Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. She joins us to share their findings. The research can be found here: https://unit42.paloaltonetworks.com/home-small-office-wireless-routers-exploited-to-attack-gaming-servers/ The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.  

The CyberWire
Mustang Panda leverages Windows shortcut files. — Research Saturday

The CyberWire

Play Episode Listen Later Nov 23, 2019 12:10


Researchers at Anomali have been tracking China-based threat group, Mustang Panda, believing them to be responsible for attacks making clever use of Windows shortcut files.  Parthiban is a researcher at Anomali, and he joins us to share their findings. The research is here: https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.  

The CyberWire
Sodinokibi aka REvil connections to GandCrab — Research Saturday

The CyberWire

Play Episode Listen Later Nov 16, 2019 17:21


Researchers at McAfee's Advanced Threat Research Team have been analyzing Sodinokibi ransomware as a service, also known as REvil. John Fokker is head of cyber investigations for McAfee Advanced Threat Research, and he joins us to share their findings. The research is here: https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/ The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

research connections researchers revil juniper networks gandcrab enveil mcafee advanced threat research
The CyberWire
Monitoring the growing sophistication of PKPLUG — Research Saturday

The CyberWire

Play Episode Listen Later Nov 9, 2019 20:44


Researchers from Palo Alto Networks' Unit 42 have been tracking a Chinese cyber espionage group they've named PKPLUG. The group mainly targets victims in the Southeast Asia region. Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings. The original research is here: https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/ The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Usable security is a delicate balance. — Research Saturday

The CyberWire

Play Episode Listen Later Nov 2, 2019 18:09


Until recently, usability was often an afterthought when developing security tools. These days there's growing realization that usability is a fundamental part of security. Lorrie Cranor is director of the CyLab Usable Privacy and Security lab (CUPS) at Carnegie Mellon University. She shares the work she's been doing with her colleagues and students to improve security through usability. The research can be found here: https://www.cylab.cmu.edu/news/2019/07/29-usability-history.html The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Masad Steals via Social Media. — Research Saturday

The CyberWire

Play Episode Listen Later Oct 26, 2019 17:43


Researchers at Juniper Networks have been tracking a trojan they call Masad Stealer, which uses the Telegram instant messaging platform for part it its command and control infrastructure. (Telegram wasn't hacked; it's the innocent conduit.) Mounir Hahad is head of Juniper Threat Labs at Juniper Networks and he joins us to share their findings The original research is here: https://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559 The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Hoping for SOHO security — Research Saturday

The CyberWire

Play Episode Listen Later Oct 19, 2019 15:23


Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras.  Shaun Mirani is a security analyst at ISE, and he joins us to share their findings.  The original research is here: https://www.ise.io/whitepaper/sohopelessly-broken-2/ The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Decrypting ransomware for good. — Research Saturday

The CyberWire

Play Episode Listen Later Oct 12, 2019 19:59


Michael Gillespie is a programmer at Emsisoft, as well as a host of the popular ID Ransomware web site that helps victims identify what strain of ransomware they may have been infected with, and what decryptors may be available. He's written many decryptors himself, most recently for the Syrk strain of ransomware.  Links to the research and Michael's work: https://blog.emsisoft.com/en/33885/emsisoft-releases-a-free-decryptor-for-the-syrk-ransomware/ https://id-ransomware.malwarehunterteam.com/ https://www.youtube.com/user/Demonslay335 The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
The fuzzy boundaries of APT41. — Research Saturday

The CyberWire

Play Episode Listen Later Oct 5, 2019 22:59


Researchers at FireEye recently released a report detailing the activities of APT41, a Chinese cyber threat group notable for the range of tools they use, their origins in the world of video gaming, and their willingness to shift from seemingly state-sponsored activity to hacking for personal gain.  Nalani Fraser and Fred Plan contributed to the report, and they join us to share their findings. The original research is here: https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Focusing on Autumn Aperture. — Research Saturday

The CyberWire

Play Episode Listen Later Sep 28, 2019 18:31


Researchers at Prevalion have been tracking a malware campaign making use of antiquated file formats and social engineering to target specific groups.  Danny Adamitis and Elizabeth Wharton are coauthors of the report, and they join us to share their findings. The research can be found here: https://blog.prevailion.com/2019/09/autumn-aperture-report.html The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Leaky guest networks and covert channels. — Research Saturday

The CyberWire

Play Episode Listen Later Sep 21, 2019 15:30


Many users of inexpensive internet routers use guest network functionality to help secure their home networks. Researchers at Ben Gurion University have discovered methods for defeating these security measures. Dr. Yossi Oren joins us to share their findings. The original research is here: https://www.usenix.org/system/files/woot19-paper_ovadia.pdf The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
Bluetooth blues: KNOB attack explained. — Research Saturday

The CyberWire

Play Episode Listen Later Sep 14, 2019 17:01


A team of researchers have published a report titled, "KNOB Attack. Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security." The report outlines vulnerabilities in the Bluetooth standard, along with mitigations to prevent them.  Daniele Antonioli is from Singapore University of Technology and Design, and is one of the researchers studying KNOB. He joins us to share their findings. The research can be found here: https://knobattack.com The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

The CyberWire
VOIP phone system harbors decade-old vulnerability. — Research Saturday

The CyberWire

Play Episode Listen Later Sep 7, 2019 26:08


Researchers at McAfee's Advanced Threat Research Team recently published the results of their investigation into a popular VOIP system, where they discovered a well-know, decade-old vulnerability in open source software used on the platform.  Steve Povolny serves as the Head of Advanced Threat Research at McAfee, and he joins us to share their findings. The original research can be found here: https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/avaya-deskphone-decade-old-vulnerability-found-in-phones-firmware/ The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.

head decade researchers mcafee voip juniper networks harbors phone systems vulnerability research enveil advanced threat research
The CyberWire
Emotet's updated business model — Research Saturday

The CyberWire

Play Episode Listen Later Aug 31, 2019 23:07


The Emotet malware came on the scene in 2014 as a banking trojan and has since evolved in sophistication and shifted its business model. Researchers at Bromium have taken a detailed look at Emotet, and malware analyst Alex Holland joins us to share their findings. The research can be found here: https://www.google.com/url?q=https://www.bromium.com/resource/emotet-a-technical-analysis-of-the-destructive-polymorphic-malware The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.