Podcast appearances and mentions of ian thornton trump

  • 12PODCASTS
  • 29EPISODES
  • 37mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jan 2, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about ian thornton trump

Latest podcast episodes about ian thornton trump

Crucial Tech
Episode 10.1 - China, oligarchs and tradewars with Lou and Ian

Crucial Tech

Play Episode Listen Later Jan 2, 2025 35:32


We open a new year and a new season with our friend, Ian Thornton-Trump, chief information security officer at the MSSP Inversion6 and in 30 minutes we take on some pretty meaty subjects. First we discuss how China strategically infiltrated technology systems in the US and other countries as a geopolitical message rather than attacks. He discusses the challenges of securing complex, interconnected systems and the need for proactive defense. Next we review the rise of corporate power and influence and how the increasing wealth and influence of individuals like Elon Musk is disrupting the traditional balance of power in democracies. The ethical concerns around wealthy individuals wielding disproportionate political influence could result in something the oligarchs are not expecting. Finally, we review potential trade wars and the possibility of Canada and Mexico joining the BRICS alliance. 2025 is going to be bumpy but very interesting.

ITSPmagazine | Technology. Cybersecurity. Society
Ransomware: To Pay or Not to Pay? with Ian Thornton Trump | Cybersecurity Insights Podcast with Matthew Rosenquist

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 8, 2024 61:08


Guest: Ian Thorton Trump, CISO at Cyjax Limited and the CTO at Octopi Managed ServicesOn LinkedIn |  https://www.linkedin.com/in/ian-thornton-trump-cd-77473a26/Host: Matthew RosenquistOn ITSPmagazine  

ITSPmagazine | Technology. Cybersecurity. Society
Loops and Angles of Cybersecurity Compliance with Ian Thornton Trump | Cybersecurity Insights Podcast with Matthew Rosenquist

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 22, 2024 35:57


Guest: Ian Thornton Trump, CISO at Cyjax Limited and the CTO at Octopi Managed ServicesLinkedIn | https://www.linkedin.com/in/ian-thornton-trump-cd-77473a26/Host: Matthew RosenquistOn ITSPmagazine  

With Ingram
The Money Laundering Machine: Inside the global crime epidemic

With Ingram

Play Episode Listen Later Jul 12, 2024 40:37


The Money Laundering Machine: Inside the global crime epidemicIn this episode of the Cybersecurity & Geopolitical Discussion, our trio of hosts discuss paradoxes surrounding money laundering and the reasons it's so popular, particularly among well-establish organised criminal gangs.

With Ingram
The real space race: Inside geopolitics and security of a $1.8T industry

With Ingram

Play Episode Listen Later Apr 27, 2024 37:33


In this episode of the Cybersecurity & Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE, CEO of Grey Hare Media debate the geopolitical and security dimensions of The real space race: Inside geopolitics and security of a $1.8T industry. Our PODCAST is sponsored by CYJAX.

With Ingram
Broken China?

With Ingram

Play Episode Listen Later Feb 28, 2024 40:14


Broken China? China borders 14 countries and is the 4th largest country in the world and second largest in terms of population. It's very surprising to know so little about the Chinese even though western think tanks and news articles have written volumes. It's shocking that a county which is at the very enter of the global supply chain for nearly every other country in the world is enigmatic, challenging, and difficult to understand. Perhaps it's due to China being an officially atheist state with over 40% of the population identifying as agnostic or atheist? This is remarkably different from nearly any other country in the world as is the lack of ethnic diversity 91.6% identify as ethnically Han. China is different, or is it really? In this video podcast with Comrade Ian Thornton-Trump CD, CISO for Cyjax, Comrade Lisa Forte and Comrade Philip Ingram MBE we wave the Chinese flag passionately as we explore China. Lisa, was our woman on the ground who travelled the length and width of the region including rural Mongolia in -45 Celsius (-49 Fahrenheit) and visited Beijing as well as some rural villages - we can categorically state China has some of the best ice climbing opportunities in the world. The ice climbing opportunities aside this video podcast is supported by a new report from our sponsor Cyjax written by Comrade Nikita Cole whose draft helped structured our discussion - the paper is available here:  This short excerpt from the CIA world fact book paints the picture and rather surprisingly is unbiased in relating to China's resent ascension to the second largest economy in the world (2024).    "MAO Zedong died in 1976. Beginning in 1978, subsequent leaders DENG Xiaoping, JIANG Zemin, and HU Jintao focused on market-oriented economic development and opening the country to foreign trade, while maintaining the rule of the CCP. Since the change, China has been among the world's fastest growing economies, with real gross domestic product averaging over 9% growth annually through 2021, lifting an estimated 800 million people out of poverty, and dramatically improving overall living standards." What the CIA world fact book has left out is the lifting out of poverty has created a massive middle class anxious for western consumer and luxury goods. The 2023 McKinsey China Consumer Report also found the middle class continues to rise. There is still no other country that adds as many households to the middle class each year as China does. Over the next three years, China is expected to add another 71 million upper-middle and high-income households adding to the 693.3 million identified in 2022. It's massive and a massive market opportunity for any firm.  But all may not be as well as it seems - the panel explores some of doom and gloom associated with China and how cracks may be showing in foreign policy, international relations and its relationship with the world's largest economy the USA - join us for a fascinating look at a country described by some as a "Frenemy" to the west but has radically transformed in less than 1/2 a lifetime - 45 years.

Crucial Tech
Episode 7.22 -- Canada in the crosshairs for cyber attack

Crucial Tech

Play Episode Listen Later Sep 13, 2023 28:50


An August report from the Canadian Centre for Cyber Security said over the next two years, Canada is going to face significant threats from state-supported cyberattacks from Russia, China and North Korea. Canada? What the heck did Canada do to earn the ire of those folks. Canadians are arguably the nicest people in the world. So we called up our favorite Canadian “cybersleuth”, Ian Thornton-Trump, Cyjax's CISO. to get the skinny. --- Send in a voice message: https://podcasters.spotify.com/pod/show/crucialtech/message Support this podcast: https://podcasters.spotify.com/pod/show/crucialtech/support

TubbTalk - The Podcast for IT Consultants
TubbTalk: Pax8 Beyond and How They Support MSPs with Cybersecurity

TubbTalk - The Podcast for IT Consultants

Play Episode Listen Later Jun 25, 2023 19:18


In this episode, Richard Tubb talks to Ian Thornton-Trump, a cybersecurity expert and the chief security officer of Cyjax, a threat intelligence and cyber security company. During their short chat, Richard and Ian talked about the current state of the MSP industry, why vendor solutions should give real business value to MSPs and their clients, and the impact of AI on the sector.Plus, Ian gives his thoughts on how MSPs can compete in an overcrowded cybersecurity market and shares his experiences at the Pax8 Beyond event in Denver, and why he'd go back next year.Mentioned in This EpisodePax8ThreatLockerCrowdStrikeConnectWisePassword Manager from N-ableSyncroDatto

ai cybersecurity msp msps pax8 richard tubb ian thornton trump
The Security Podcasts
The Cybersecurity and Geopolitical Discussion — The Africa Factor — Episode 16

The Security Podcasts

Play Episode Listen Later May 17, 2023 30:13


In Episode 16 of the Cybersecurity & Geopolitical Discussion from Security magazine, co-hosts Phillip Ingram, MBE, and Ian Thornton-Trump, CD, discuss the background and recent events in Africa with guest Lisa Forte from Red Goat Cybersecurity. The trio examines findings from a strategic intelligence report from Cyjax that detail China and Russia's colonial and developmental activities on the continent. Watch the video version here.

Crucial Tech
Episode 7.9 -- Getting to the bottom of the TikTok issue

Crucial Tech

Play Episode Listen Later Apr 14, 2023 27:12


TikTok has been in the news for quite a while, but at Cyber Protection Magazine, we are pretty sure we aren't getting the whole story, so we are starting a series of articles and podcasts to get to the bottom of the issue, starting with this episode. We talk to Ian Thornton-Trump -- raconteur, iconoclast, cyberwarrior, and CISO for Cyjax -- and he, as usual, has a lot to say. As you listen you will find that the real problem is not in the app, but in ourselves... and in bad algorithm design. Also, this is an ad-free episode. If you want to support the work we are doing, go to Cyber Protection Magazine and donate to the cause. The button is on the bottom of the page. --- Send in a voice message: https://podcasters.spotify.com/pod/show/crucialtech/message Support this podcast: https://podcasters.spotify.com/pod/show/crucialtech/support

tiktok bottom ciso ian thornton trump
The Security Podcasts
The Cybersecurity and Geopolitical Podcast — Ukraine and the Global Stage: Terrorism, Cyber Espionage & TikTok— Episode 15

The Security Podcasts

Play Episode Listen Later Apr 5, 2023 35:54


In Episode 15 of the Cybersecurity & Geopolitical Podcast from Security magazine, hosts Ian Thornton-Trump and Philip Ingram discuss current developments in the Russian invasion of Ukraine, geopolitical shifts in global intelligence, and app-based data collection. Watch the video version here.

The Security Podcasts
The Cybersecurity and Geopolitical Podcast — Ukraine and the Global Stage: Terrorism, Cyber Espionage & TikTok— Episode 15

The Security Podcasts

Play Episode Listen Later Apr 5, 2023 35:54


In Episode 15 of the Cybersecurity & Geopolitical Podcast from Security magazine, hosts Ian Thornton-Trump and Philip Ingram discuss current developments in the Russian invasion of Ukraine, geopolitical shifts in global intelligence, and app-based data collection. Watch the video version here.

The Imposter Syndrome Network Podcast
Ian Thornton-Trump CD

The Imposter Syndrome Network Podcast

Play Episode Play 38 sec Highlight Listen Later Jan 17, 2023 30:53 Transcription Available


Our guest today is Ian Thornton-Trump, Chief Information Security Officer at Cyjax Limited.In this episode, Ian tells us about his journey to his current role, his experiences working as a threat intelligence analyst for the Canadian military, and the lessons he learned along the way.He discusses with us what he believes to be the most important yet underappreciated cybersecurity skill, as well as the mistakes that can land a CISO in jail and how to prevent them.We'll talk about his thought on certifications in today's modern hiring market, why he thinks that backups are “the Alamo” in cybersecurity and why he started a community that, in his words, is more of an anti-community.-It takes a cyber village to raise a cyber idiot.-Ian's Links:Twitter LinkedIn YouTubeCyjax Limitedhttps://www.octopitech.com/--Thanks for being an imposter - a part of the Imposter Syndrome Network (ISN)! We'd love it if you connected with us at the links below: The ISN LinkedIn group (community): https://www.linkedin.com/groups/14098596/ The ISN on Twitter: https://twitter.com/ImposterNetwork Zoë on Twitter: https://twitter.com/RoseSecOps Chris on Twitter: https://twitter.com/ChrisGrundemann Make it a great day.

The Security Podcasts
The Cybersecurity and Geopolitical Podcast — Global Threats in 2022: Looking Back to Move Forward — Episode 13

The Security Podcasts

Play Episode Listen Later Dec 20, 2022 28:08


China, Russia, Iran and North Korea — have these global protagonists achieved success in their missions to destabilize the G19, or are the situations on their home fronts sabotaging their cyber efforts and geopolitical goals? In this Cybersecurity & Geopolitical podcast episode from Security magazine, co-hosts Philip Ingram, MBE, and Ian Thornton-Trump, CD, look back at the most significant hits and misses of these threat actors in 2022. Watch the video version here.

The Security Podcasts
The Cybersecurity and Geopolitical Podcast — Global Threats in 2022: Looking Back to Move Forward — Episode 13

The Security Podcasts

Play Episode Listen Later Dec 20, 2022 28:08


China, Russia, Iran and North Korea — have these global protagonists achieved success in their missions to destabilize the G19, or are the situations on their home fronts sabotaging their cyber efforts and geopolitical goals? In this Cybersecurity & Geopolitical podcast episode from Security magazine, co-hosts Philip Ingram, MBE, and Ian Thornton-Trump, CD, look back at the most significant hits and misses of these threat actors in 2022. Watch the video version here.

Crucial Tech
Episode 6:19 - End of the Year finale with Ian Thornton-Trump

Crucial Tech

Play Episode Listen Later Dec 13, 2022 28:28


For the second year we are publishing predictions for 2023 in Cyber Protection Magazine by asking people and organizations to submit a brief, one-paragraph statement. Our friend and Cyjax CISO sent an entire presentation. And it was fun and scary all at the same time.,So we went with it. Check out the other predictions on the magazine and let us know what you think. --- Send in a voice message: https://anchor.fm/crucialtech/message Support this podcast: https://anchor.fm/crucialtech/support

Crucial Tech
Ep. 6.3 - Those who ignore history are the most likely to be hacked.

Crucial Tech

Play Episode Listen Later Jun 30, 2022 36:58


One of my favorite security gurus, Ian Thornton-Trump sent me a text recently about the top-five security failures in recent history that we have yet to learn from. So I decided to call him and ask what he meant. It's worth listening to. --- Send in a voice message: https://anchor.fm/crucialtech/message Support this podcast: https://anchor.fm/crucialtech/support

history hacked ian thornton trump
Crucial Tech
Episode 5.9: "Nukes! Cyberwar! Russians!"... Calm down. It isn't that bad.

Crucial Tech

Play Episode Listen Later Apr 6, 2022 31:03


Much of the West has feared Russian aggression since the Cuban Missile Crisis 1962. Then it was their technologically superior military. Most recently it's been their vaunted cyber warfare capabilities. This podcast episode is about the one positive coming out of the Ukraine war: the Russians are not as scary as we thought they were. Oh, they are still scary, but scary like a feral, rabid house cat, rather than a man-eating tiger. The genesis of this interview was a Linkedin post by Ian Thornton-Trump, who is something of a celebrity in the cybersecurity world. Ian is a certified IT professional with 25 years of experience in IT security and information technology. His post in Linked in, essentially said, “Russian cyber warfare? Meh.” That intrigued me so I sent him a private message and asked him to elaborate, and boy did he. So I invited him on the podcast. Turns out he's a fan. Who knew? Be prepared to be encouraged. --- Send in a voice message: https://anchor.fm/crucialtech/message Support this podcast: https://anchor.fm/crucialtech/support

The Security Podcasts
The Cybersecurity and Geopolitical Podcast — Learning From the Past: Russia, Ukraine & the Middle East — Episode 10

The Security Podcasts

Play Episode Listen Later Mar 21, 2022 26:27


Ian Thornton-Trump, Chief Information Security Officer (CISO) at Cyjax, and Philip Ingram, CEO of Grey Hare Media, take a close look at the Russian invasion of Ukraine through the lens of conflict in the Middle East in the tenth episode of The Cybersecurity and Geopolitical Podcast presented by Security magazine. From determining Russia's current trajectory in Ukraine via the nation's playbook in Syria to comparing the root of Russia's border aggression, the security leaders draw parallels between the invasion and previous events in the Middle Eastern region.You can watch the video version here.

The Tripwire Cybersecurity Podcast
The Crossroads of Disinformation and Nation State Attackers

The Tripwire Cybersecurity Podcast

Play Episode Listen Later Feb 14, 2022 29:07


In this episode, Ian Thornton-Trump, CISO at Cyjax, digests nation state's disinformation campaigns and the cybersecurity landscape. He also discusses the role disinformation on social media plays in cybersecurity.

The Security Podcasts
The Cybersecurity and Geopolitical Podcast — Russia: The Global Protagonist — Episode 9

The Security Podcasts

Play Episode Listen Later Feb 2, 2022 23:10


Security magazine presents the latest episode of The Cybersecurity and Geopolitical Podcast — Russia: The Global Protagonist. Ian Thornton-Trump, Chief Information Security Officer (CISO) at Cyjax and Gareth Corfield, Security and Legal Correspondent at The Register, review the current conflict between Russia and Ukraine and discuss the ongoing “cyber war” in the region. This entertaining and illuminating episode spotlights the latest challenges and intriguing flashpoints within the cybersecurity and geopolitical landscape for enterprise security and risk professionals. You can watch the video version here.

TubbTalk - The Podcast for IT Consultants
[90] How to Navigate the Scary World of MSP Cybersecurity

TubbTalk - The Podcast for IT Consultants

Play Episode Listen Later Sep 12, 2021 57:37


In this episode of TubbTalk, Richard talks to Ian Thornton-Trump, expert in cybersecurity and chief security officer of Cyjax, a threat intelligence and cyber security company. They discuss how MSPs can keep their clients, and why many MSPs fail at security before an attack even happens – and what to do about that. Ian explains the concept of trusted advisor as a service and the importance of keeping up to date with technology. They also talk about why you need to communicate the importance of security to clients, and what to do if they won't help themselves. Ian discusses the merits of being agile and resilient, and shares what's in his current security stack for personal use. Mentioned in This Episode https://www.ibm.com/security/security-intelligence/qradar (QRadar) https://www.threatq.com/ (ThreatQ) https://banduracyber.com/ (Bandura) https://www.lastpass.com/ (LastPass) https://www.privatise.com/ (Privatise) https://syncromsp.com/ (Syncro) https://www.kaspersky.com (Kaspersky) https://www.blackfog.com/blackfog-msp/ (BlackFog) https://www.todyl.com/ (Todyl) https://www.servicenow.com/ (ServiceNow) https://www.bmc.com/it-solutions/it-security.html (BMC) https://buckets.grayhatwarfare.com/ (GrayhatWarfare) https://connect.comptia.org/membership/comptia-isao (CompTIA ISAO)

Security Stories
34: From Rockstar to CISO: An Unexpected Journey, with Ian Thornton Trump

Security Stories

Play Episode Listen Later Aug 13, 2021 76:19


It's a warm welcome today to our guest Ian Thornton-Trump, CISO at Cyjax Limited, also known as @phat_hobbit on Twitter.Ian talks about his career journey, from joining the Military Intelligence Branch of the Canadian Forces, to managing IT projects at the Canadian Museum of Human Rights, to being a CISO. He also shares his top lessons learned from 30 years in the cybersecurity industry, from his paper '8 Leadership Principles' (or, as Ian refers to it "8 of my biggest mistakes").In the studio, Geraldo, currently studying Film and Television at college, disucsses how cybersecurity is represented in the media. We discuss Mr Robot, Silicon Valley, The Matrix, and how Hollywood has led some accurate (and very inaccurate) portrayals of the industry.In Threat Corner, Ben takes us through the storied history of the REVil ransomware family, and how the attackers operate under a ransomware-as-a-service model. Follow along at https://blogs.cisco.com/security/threat-protection-the-revil-ransomwareEpisode time stamps:03:20 - 25:23: Cybersecurity in the media25:24 - 40:53: Ian Thornton Trump interview, Part 140:54 - 50:54: Threat Corner: REVil ransomware family50:55 - 65:47: Ian Thornton Trump interview, Part 265:48: Closing thoughts and outro

With Ingram
What are the implications of the NSO Pegasus hack for mobile devices?

With Ingram

Play Episode Listen Later Jul 27, 2021 30:50


What does the NSO Pegasus hack mean for Device Security? Philip Ingram MBE chats with Ashish Patel from  Zimperium Technology, Ian Thornton-Trump, CISO with Cyjax and Andi Robinson, with Data Shield UK. The realities of our poor approach  to device security become apparent. For more information about Zimperium, please visit: https://blog.zimperium.com

ChannelPro Weekly Podcast
ChannelPro Weekly Podcast: Episode #190 - Box Lunch Analysis

ChannelPro Weekly Podcast

Play Episode Listen Later Jun 24, 2021 109:05


Have you thought deeply—and we mean deeply—about what was in the last box lunch you ate? You will after listening to this week's show, in which Matt, Rich, and their returning guest host—MSP and certified ethical hacker Michael Cocanower, of itSynergy—discuss that important topic along with the latest cybersecurity news from ConnectWise and opportunities to take your Azure skills from the 101 to 201 level. Then stay tuned for further security talk with interview guest Ian Thornton-Trump, of both threat intelligence vendor Cyjax and Octopi Managed Services, in Winnipeg. Way more interesting than the pasta salad you got with that boxed ham sandwich. Subscribe to ChannelPro Weekly! iTunes: https://itunes.apple.com/us/podcast/channelpro-weekly-podcast/id1095568582?mt=2 Google Play Podcasts: https://play.google.com/music/m/Igodza5l63vd5w5mdybtpq2cr7e?t=ChannelPro_Weekly_Podcast Spotify: https://open.spotify.com/show/7hWuOWbrIcwtrK6UJLSHvU Amazon Music: https://music.amazon.com/podcasts/a1d93194-a5f3-46d8-b625-abdc0ba032f1/ChannelPro-Weekly-Podcast More here: https://www.channelpronetwork.com/download/podcast/channelpro-weekly-podcast-episode-190-box-lunch-analysis Topics and Related Links Mentioned: ConnectWise Warns MSPs: Get Serious About Security Soon or Else - https://www.channelpronetwork.com/news/connectwise-warns-msps-get-serious-about-security-soon-or-else ConnectWise Reports Progress Made But More Needed in the Fight Against MSP Breaches - https://www.channelpronetwork.com/news/connectwise-reports-progress-made-more-needed-fight-against-msp-breaches ConnectWise Launches Consolidated Management Interface for Third-Party BDR Solutions - https://www.channelpronetwork.com/news/connectwise-launches-consolidated-management-interface-third-party-bdr-solutions Now's the Time to Advance to Azure 201 - https://www.channelpronetwork.com/article/now-s-time-advance-azure-201 Rich's ICYMI plug and quickie preview of the week ahead - https://www.channelpronetwork.com/tags/icymi

The Cyber Ranch Podcast
Solving The Global Cyber Problem w/ Ian Thorton-Trump

The Cyber Ranch Podcast

Play Episode Listen Later Jun 9, 2021 28:49


With us today is Ian Thornton-Trump, Chief Information Security Officer at Cyjax and an ITIL-certified IT professional with 25 years of experience in IT security and information technology. Ian shares his background which started back in the Canadian military. During those times, "IT" was called "automated data processing", and it is quite clear how far this has advanced. He joined the Royal Canadian Mounted Police and spent a year working on criminal intelligence. Soon after he became a consultant and made his way to the UK in 2015. Oftentimes organizations have not planned or prepared for risk, and that includes cyber. In that sense, cyber can be compared to the environmental landscapes and infrastructure, which Ian finds eerily similar. A lot of problems created in cyber mimic a lot of the environment problems we face in today's world. One example is the recent failure of the Texas power grid during a very harsh winter. Investment in cybersecurity is critical. Allan feels there are a lot of environmental laws, but there are also already some pretty strict cyber laws as well. However, they seem more aimed at the anonymous or extrajurisdictional perpetrators and end up useless when their anonymity is involved. And some cyber laws seem to punish the victim as well - after suffering ransomware you are now penalized for not being prepared for it in the first place? How can we get laws in place that are helping the situation and not blaming the victim? Ian suggest that positive incentives are the answer. If we can just get companies to do a bare minimum cyber hygiene, by incentivizing them through tax breaks, Ian thinks we could move the ball up more forward, without making it too onerous, to meet some sort of regulatory standard. How do we possibly extend our stretch? Because at the end of the day, the root cause is the “bad guys”, so how do we get to them? America is already doing a lot, but other countries need to put their money where their mouth is. Ian and Allan discuss President Biden's Executive Order on Cybersecurity. This can enforce behavior in the government, but only suggest behavior in the private sector. To sum up, we're nowhere, and we need to get somewhere because what we've done, at the federal and state level in the United States, is taken a lot of dollars, put them in parking lots, and set fire to them. And then after we finished that exercise, we asked for more dollars. We have to change the entire system from the ground up. And we have to incentivize cyber security. Key Takeaways 1:10 How Ian got into Cyber 2:21 Ian's day job 4:18 Issues with infrastructure and environment 7:38 Meaningful laws 12:47 Getting to the bad guys 16:35 Catching “Fred Smith” or someone like him 17:43 Rewards 21:17 Preparedness and helplessness 23:43 Einstein program 26:24 What keeps Ian going Links: Learn more about Ian Thorton-Trump on LinkedIn and Twitter Follow Allan Alford on LinkedIn and Twitter Learn more about Hacker Valley Studio and The Cyber Ranch Podcast Sponsored by our good friends at Axonius

With Ingram
Cyber Intelligence with Cyjax CISO - Ian Thornton Trump

With Ingram

Play Episode Listen Later Apr 10, 2021 33:06


Philip Ingram MBE today is chatting with Ian Thornton Trump the CISO with Cyjax about Intelligence led cyber business decisions. Two intelligencers chewing the cud... this could go anywhere! You can find out more about Cyjax here: https://www.cyjax.comAnd we chat about threat documents they release - an example can be found here: https://www.cyjax.com/2021/04/06/geopolitical-and-cybersecurity-weekly-brief-6-april-2021/

Human Factor Security
Tin Foil Hats Club with Philip Ingram MBE and Ian Thornton-Trump

Human Factor Security

Play Episode Listen Later Apr 2, 2021 40:08


In this show I interview Phil and Ian about the Ever Given Ship being stuck in the Suez canal, Ice Breaker ships and the northern passage. We also discuss the reallocation of funds for the UK military, the new ranger force and the significance of the changing of the guard in the White House to the new administration. To follow Philip, click the link here for his Twitter.  To follow Ian, click the link here for his Twitter. To get in touch try the contact page of the Human Factor Security website or follow me on Twitter, where I can be found at @Jenny_Radcliffe Note: music for the show was provided by; Spinnin' by Alex (c) copyright 2011 Licensed under a Creative Commons Attribution (3.0) license. http://dig.ccmixter.org/files/AlexBeroza/32423 Ft: spinningmerkaba

Cybersecurity Unplugged
Hubris Before the Havoc at SolarWinds

Cybersecurity Unplugged

Play Episode Listen Later Feb 17, 2021 27:15


Pride comes before a fall. That was certainly the case with SolarWinds, who were warned by Ian Thornton-Trump of their security shortcomings back in 2017. In this episode of Cybersecurity Unplugged, Thornton-Trump, CISO at Cyjax and former security adviser to SolarWinds discusses: The history of SolarWinds and his warning to them; The current threat landscape and our biggest vulnerabilities today; And how best to incentivize proper cybersecurity hygiene.