Podcasts about infrastructure security agency cisa

  • 185PODCASTS
  • 345EPISODES
  • 35mAVG DURATION
  • 1WEEKLY EPISODE
  • Oct 23, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about infrastructure security agency cisa

Latest podcast episodes about infrastructure security agency cisa

Business of Tech
U.S. Cybersecurity Cuts, AI Breach Surge, and Small Business Optimism Plummets Amid Automation

Business of Tech

Play Episode Listen Later Oct 23, 2025 14:20


U.S. federal cybersecurity policy has regressed by approximately 13%, according to a report from the Cyberspace Solarium Commission 2.0. This decline is attributed to budget cuts and workforce reductions at key agencies, including the Cybersecurity and Infrastructure Security Agency (CISA) and the State Department's Cyber Diplomacy Staff. The report indicates that nearly a quarter of previously implemented recommendations have lost their status, which raises concerns about the nation's ability to effectively address rising cyber threats. Mark Montgomery, a former Navy Rear Admiral, emphasized that these cuts hinder the agency's effectiveness, calling for the restoration of funding and personnel to strengthen national cyber defenses.In addition to the decline in federal cybersecurity readiness, AI-generated code is now responsible for one in five security breaches, as reported by Aikido. The study found that AI coding tools account for 24% of production code, with 43% of U.S. organizations reporting serious incidents linked to AI-related flaws. Interestingly, the report also noted that increasing the number of security tools does not necessarily enhance safety; organizations using six to nine tools experienced a 90% incident rate, compared to 64% for those with one or two tools. Despite these challenges, 96% of industry professionals remain optimistic that AI will eventually produce secure and reliable code.The episode also highlights the impact of generative AI on IT service management, revealing that organizations utilizing this technology have reduced incident resolution times by nearly 18%. A report from SolarWinds indicated that the average resolution time decreased from 27.42 hours to 22.55 hours after implementing generative AI. Furthermore, a survey by Accenture found that 19% of office workers admitted to entering sensitive business information into free, unsecured AI tools, underscoring significant gaps in cybersecurity awareness and training.For Managed Service Providers (MSPs) and IT service leaders, these developments signal a pressing need for improved governance and training regarding AI usage. The findings suggest that organizations should focus on reducing tool sprawl and enhancing employee education on cybersecurity responsibilities. As small business optimism declines amid rising inflation and supply chain issues, MSPs should position themselves as stability partners, helping clients navigate these challenges rather than pushing the latest technology trends. The evolving landscape of cybersecurity threats, particularly those involving AI and automation, necessitates a proactive approach to risk management and incident response. Three things to know today 00:00 U.S. Cyber Defenses Slide as AI Code Risks Rise and Governance Gaps Widen05:41 Inflation, Uncertainty, and Automation Push Small Firms Toward Caution and Cost Control09:23 From Prompt Injections to Hidden Malware, Cyber Attacks Are Shifting Toward Stealth and Precision This is the Business of Tech.     Supported by:  https://saasalerts.com/platform-overview-for-msps/?utm_source=mspradio 

The Aid Market Podcast
Ep. 65 PSC Defense Conference Preview with Steve Harris

The Aid Market Podcast

Play Episode Listen Later Oct 23, 2025 27:10


In this episode, host Mike Shanley sits down with Steve Harris, Vice President for Defense and Intelligence at the Professional Services Council (PSC). Drawing on his decades of experience in government, including at the Defense Security Cooperation Agency, Steve shares insights on how PSC bridges industry and government to strengthen the defense industrial base. They discuss: How associations like PSC help government and industry collaborate effectively Why acquisition reform, industrial base capacity, and AI-energy alignment are top priorities for 2025 What attendees can expect at PSC's 7th Annual Defense Conference on October 30th, including featured speakers and panel highlights Practical advice for how government and industry leaders can make the most of conferences and build meaningful connections Whether you're a government professional, a large defense prime, or a small business entering the federal market, this episode offers practical perspective on how PSC drives engagement, advocacy, and insight across the defense sector. RESOURCES: PSC Defense Conference - Registration Link: https://defense.pscouncil.org/ PSC Defense Conference - Link to Sponsors: https://defense.pscouncil.org/sponsors Learn more about PSC: https://www.pscouncil.org/psc PSC Vision Conference - December 1 -3, 2025: https://vision.pscouncil.org/ Connect with Steve Harris on LinkedIn: / steve-harris-vp   Connect with Mike Shanley on LinkedIn:  / gov-market-growth   BIO: Steve Harris, Vice President of Defense and Intelligence, PSC Steve Harris became Vice President for Defense and Intelligence at the Professional Services Council (PSC) on June 9, 2025. He brings more than 28 years of federal service, including positions at the Department of Homeland Security (DHS) and the Department of Defense (DoD), along with extensive expertise in interagency collaboration, public-private partnerships, international policy, and acquisition. Before joining PSC, Harris was a member of the Senior Executive Service (SES) and served as the Deputy Executive Assistant Director for Infrastructure Security at the Cybersecurity and Infrastructure Security Agency (CISA). In this capacity, he led CISA's efforts to secure the nation's critical infrastructure in partnership with government and private-sector stakeholders. He also held several other senior roles at CISA and its predecessor organization, including Acting Executive Assistant Director for Infrastructure Security, Acting Deputy Director for CISA, Acting Assistant Secretary for the National Protection and Programs Directorate's (NPPD) Office of Infrastructure Protection, and Deputy Director of NPPD's Office of Cyber and Infrastructure Analysis. Earlier in his career, Harris held various positions within the Department of Defense. He served as Deputy for Policy at the Defense Security Cooperation Agency (DSCA) in the Office of the Secretary of Defense, where he developed and implemented international policy for Foreign Military Sales and security cooperation programs. He also held contracting and acquisition roles at the Naval Air Systems Command and the Navy International Programs Office. Harris has received numerous awards for his public service, including the Presidential Rank Award – Meritorious Executive, the DHS Secretary's Silver Medal for Meritorious Service, and the Office of the Secretary of Defense Medal for Exceptional Civilian Service. He holds a Master of Science in Management/Contract Management from the Florida Institute of Technology and a Bachelor of Arts from St. Mary's College of Maryland. LEARN MORE: Thank you for tuning into this episode of the GovDiscovery AI Podcast with Mike Shanley. You can learn more about working with the U.S. Government by visiting our homepage: Konektid International and GovDiscovery AI. To connect with our team directly, message the host Mike Shanley on LinkedIn.  https://www.govdiscoveryai.com/ https://www.konektid.com/

Business of Tech
F5 Security Breach Prompts CISA Action, NIST AI Risks, SMBs Must Adapt, Apple Boosts Bug Bounty

Business of Tech

Play Episode Listen Later Oct 16, 2025 14:24


The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive for federal agencies to update their F5 products following a significant breach where hackers accessed source code and undisclosed vulnerabilities. This incident, discovered in August, poses a serious risk to federal networks, as the threat actor could exploit these vulnerabilities to gain unauthorized access and exfiltrate sensitive data. Agencies are required to apply the latest updates by October 22nd and report their F5 deployments by October 29th, highlighting the urgency of addressing these security concerns.In a related development, the National Institute of Standards and Technology (NIST) is encouraging federal agencies to take calculated risks with artificial intelligence (AI) under new federal guidance. Martin Stanley, an AI and cybersecurity researcher, emphasized the importance of risk management in AI deployment, particularly in comparison to more established sectors like financial services. As agencies adapt to this guidance, they must identify high-impact AI applications that require thorough risk management to ensure both innovation and safety.A report from Cork Protection underscores the need for small and medium-sized businesses (SMBs) to adopt a security-first approach in light of evolving cyber threats. Many SMBs remain complacent, mistakenly believing they are not targets for cybercriminals. The report warns that this mindset, combined with the rising financial risks associated with breaches, necessitates a shift towards a security-centric operational model. The cybersecurity services market is projected to grow significantly, presenting opportunities for IT service providers that prioritize security.Apple has announced a substantial increase in its bug bounty program, now offering up to $5 million for critical vulnerabilities. This move reflects the growing importance of addressing security challenges within its ecosystem, which includes over 2.35 billion active devices. The company has previously awarded millions to security researchers, emphasizing its commitment to user privacy and security. As the landscape of cybersecurity evolves, managed service providers (MSPs) are urged to tighten vendor monitoring, incorporate AI risk assessments, and focus on continuous assurance to meet the increasing demands for security. Three things to know today00:00 Cybersecurity Crossroads: F5 Breach, AI Risk, and Apple's $5M Bug Bounty Signal Security Accountability06:44 Nearly a Third of MSPs Admit to Preventable Microsoft 365 Data Loss, Syncro Survey Finds09:22 AI Reality Check: Workers' Overconfidence, Cheaper Models, and Microsoft's Scientific Breakthrough Signal Maturity in the Market This is the Business of Tech.     Supported by:  https://mailprotector.com/mspradio/ 

Business of Tech
AI Revolutionizes IT Management, California Regulates Chatbots, and Windows 10 Hits End of Life

Business of Tech

Play Episode Listen Later Oct 14, 2025 14:41


AI is revolutionizing IT service management, significantly enhancing productivity and operational efficiency. A recent report indicates that AI has reduced ticket resolution times by an impressive 76%, allowing IT teams to focus on more complex issues. However, the rapid adoption of generative AI, particularly in high-stakes areas like mergers and acquisitions, raises serious concerns about data security, with a significant percentage of businesses expressing worries over data quality and ethical considerations. The prevalence of unapproved AI tools among employees further complicates governance, as many are using these tools without oversight, highlighting the need for managed AI governance.California has taken a pioneering step in regulating AI by passing a landmark bill that mandates safety protocols for chatbot operators. This legislation aims to protect vulnerable users, particularly children, by requiring age verification and safety measures related to suicidal thoughts. The law, which will take effect in January 2026, reflects a growing trend toward AI regulation, emphasizing the importance of safety in technology. Meanwhile, the Federal Communications Commission is considering changes that could allow internet service providers to hide fees again, which could impact transparency for consumers.The Cybersecurity and Infrastructure Security Agency (CISA) is facing challenges as layoffs affect key divisions responsible for national security and infrastructure. These layoffs come at a time when the private sector is increasingly responsible for cybersecurity, especially amid rising AI-driven threats. The reduction in federal coordination raises concerns about the ability to effectively manage these threats, placing more pressure on managed service providers (MSPs) to ensure security and compliance for their clients.Microsoft has announced the end of support for Windows 10, prompting a critical need for MSPs to reassess endpoint security and upgrade strategies. With a significant portion of users still on Windows 10, the lack of ongoing updates poses a risk for vulnerabilities. This transition presents an opportunity for MSPs to not only push for upgrades but also to enhance security policies and prepare clients for future technological advancements, including AI integration. The evolving landscape of technology and regulation underscores the necessity for MSPs to adapt and provide comprehensive governance and security solutions. Four things to know today00:00 AI Is Working — and Breaking Rules: Efficiency Soars, But Governance Falls Behind 04:10 AI Regulation Splinters: California Targets Chatbots, FCC Eyes Fee Rollbacks, and CISA Cuts Staff07:52 The AI Assistant Race Escalates — Copilot, Slackbot, and Salesforce All Target Your Inbox and Workflow11:12 Windows 10 Support Ends — Microsoft's Upgrade Glitch, Paid Extensions, and Opportunity for MSPsThis is the Business of Tech.   Supported by:  https://saasalerts.com/mspradio/ 

Packet Pushers - Full Podcast Feed
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Sep 29, 2025 22:30


There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »

Packet Pushers - Network Break
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls

Packet Pushers - Network Break

Play Episode Listen Later Sep 29, 2025 22:30


There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »

Packet Pushers - Fat Pipe
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls

Packet Pushers - Fat Pipe

Play Episode Listen Later Sep 29, 2025 22:30


There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »

Business of Tech
Cyber Budgets Shrink, GPT-5 Faces Backlash, FedRAMP Speeds Up, Vendors Squeeze MSPs

Business of Tech

Play Episode Listen Later Aug 13, 2025 17:47


The Cybersecurity and Infrastructure Security Agency (CISA) is facing significant criticism from state and local officials who feel abandoned due to diminishing federal support for critical cybersecurity programs. Many officials are concerned about their increasing reliance on self-driven initiatives, especially after cuts to the Multi-State Information Sharing and Analysis Center, which has been a crucial source of cybersecurity intelligence for over two decades. A recent survey revealed that a substantial portion of state and local governments lack adequate funding for cybersecurity, with 22% allocating no funds and 42% operating with annual budgets of less than $100,000. This situation raises alarms about the potential for increased vulnerability to cyberattacks, particularly from nation-state actors.In response to the evolving landscape of artificial intelligence, the National Institute of Standards and Technology (NIST) is developing new security guidance aimed at addressing the associated risks. This initiative will clarify how AI interacts with cybersecurity, focusing on securing AI systems, the adversarial use of AI, and leveraging AI to enhance cybersecurity measures. Additionally, a bipartisan bill known as the Validation and Evaluation for Trustworthy Artificial Intelligence Act has been reintroduced in the Senate, aiming to establish guidelines for the responsible development and testing of AI systems. House appropriators are also proposing a significant funding increase for NIST, reflecting a commitment to bolster cybersecurity and innovation.The Federal Risk Management and Authorization Program (FedRAMP) has made strides in streamlining the approval process for government cloud services, achieving a significant reduction in wait times from over a year to approximately five weeks. This shift is part of a broader trend toward more efficient cloud authorization processes, with FedRAMP already approving more than twice as many services in fiscal year 2025 compared to the previous year. This development presents an opportunity for businesses to leverage FedRAMP-authorized stacks for government-related buyers and to build migration strategies accordingly.OpenAI has recently updated its ChatGPT platform, introducing new models and third-party tool connectors while facing scrutiny over the performance and security of its latest model, GPT-5. Despite the introduction of various user-focused options, security assessments have revealed significant vulnerabilities in GPT-5, prompting concerns about its safety and reliability. As companies like ConnectWise implement new credit card surcharges and adjust their workforce in response to market demands, the overarching theme emphasizes the need for operational discipline and strategic planning in navigating the evolving technology landscape. Four things to know today 00:00 Shrinking Cyber Budgets, Emerging AI Rules, and Streamlined FedRAMP Signal Shifts for IT Providers06:43 From Security to SaaS Management, Vendors Roll Out Agentic Features for IT Service Providers10:25 OpenAI Expands GPT-5 Options, Adds Connectors, but Faces Early Security Backlash13:41 ConnectWise Adds Credit Card Surcharges, Trims Staff in Strategic Realignment  Supported by:  https://syncromsp.com/   Tell us about a newsletter!https://bit.ly/biztechnewsletter  All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

The Cybersecurity Defenders Podcast
#237 - Intel Chat: Black Hat roundup - Gemini AI, NeuralTrust & SPLX, VisionSpace Tech, BCM5820X - & CISA/FEMA cyber grant funding

The Cybersecurity Defenders Podcast

Play Episode Listen Later Aug 6, 2025 39:35


In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.More than 90 state and local government organizations have been targeted in a recent wave of cyberattacks exploiting a vulnerability in Microsoft SharePoint, according to the Center for Internet Security (CIS).Traditional cyber attack methodologies - exploiting endpoints, moving laterally, escalating privileges - are increasingly outdated as enterprise IT shifts toward SaaS and browser-based access.The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-2533 - a high-severity Cross-Site Request Forgery (CSRF) vulnerability in PaperCut NG/MF print management software - to its Known Exploited Vulnerabilities (KEV) catalog.Researchers at Nozomi Networks have disclosed over a dozen security flaws in Tridium's Niagara Framework, a vendor-agnostic building management platform used in sectors ranging from industrial automation to energy and smart infrastructure.Between April 2024 and April 2025, ransomware attacks on the oil and gas industry increased by an unprecedented 935%, according to new research from cybersecurity firm Zscaler.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.

Cyber Security Today
Cybersecurity Today: Supply Chain Attacks, St. Paul's Cyber Emergency, and Ingram Micro's Data Breach

Cyber Security Today

Play Episode Listen Later Aug 1, 2025 12:41 Transcription Available


In this episode, the host Jim Love discusses the increasing sophistication of supply chain attacks, starting with an account of a blockchain developer who lost $500,000 due to a malicious extension in a popular AI-powered coding tool. The episode also covers a significant cyber emergency in St. Paul, Minnesota, which required National Guard support, and the City's struggle to comprehend the full scope of the hack. Additionally, the US Cybersecurity and Infrastructure Security Agency (CISA) has released a new eviction strategies tool to help cybersecurity teams remove persistent threats. The episode concludes with an update on the Ingram Micro breach, where the Safe Pay ransomware gang has threatened to leak 35 terabytes of stolen data. Listeners are encouraged to focus on preventative measures even when ransomware attacks do not involve encryption. 00:00 Introduction and Headlines 00:25 The $500,000 Crypto Heist 01:26 Supply Chain Attack on Open VSX 04:50 Lessons from the Attack 06:16 Oyster Backdoor Threat 07:54 Cyber Attack on St. Paul 09:09 CISA's New Eviction Strategies Tool 10:43 Ingram Micro Data Breach Update 12:18 Conclusion and Contact Information

The Lawfare Podcast
Lawfare Daily: Sezaneh Seymour and Brandon Wales on Private-Sector Cyber Operations

The Lawfare Podcast

Play Episode Listen Later Jul 29, 2025 48:14


Alan Rozenshtein, Senior Editor and Research Director at Lawfare, sits down with Sezaneh Seymour, Vice President and head of regulatory risk and policy at Coalition and a former Senior Adviser on the National Security Council staff, and Brandon Wales, Vice President for cybersecurity strategy at SentinelOne and the former Executive Director of the Cybersecurity and Infrastructure Security Agency (CISA), to discuss their new Lawfare Research Report, “Partners or Provocateurs? Private-Sector Involvement in Offensive Cyber Operations.”They talk about why, in the face of escalating cyber threats from state and criminal actors, U.S. officials are reevaluating the policy that currently reserves offensive cyber operations as a government-only function. Rather than endorsing a change, Seymour and Wales propose a structured framework to guide the policy debate. This framework is built on three key factors: first, defining the core policy objectives for involving the private sector; second, determining the appropriate scope of authorized activities, including what actions are permissible and who can be targeted; and third, addressing the complex legal and liability considerations, especially when operations cause harm to innocent third parties. They conclude by weighing the potential for private actors to augment U.S. capabilities against the significant risks of escalation and diplomatic fallout.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.

Word Notes
Shields Up (noun)

Word Notes

Play Episode Listen Later Jul 29, 2025 7:46


Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/shields-up⁠ Audio reference link: “⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠” YouTube, YouTube, 11 Apr. 2015,   Learn more about your ad choices. Visit megaphone.fm/adchoices

Cleveland's CEOs You Should Know
Roger Lipscomb, Executive Director Ohio 811

Cleveland's CEOs You Should Know

Play Episode Listen Later Jul 21, 2025 11:25 Transcription Available


Roger Lipscomb has led OHIO811, Ohio's “Call Before You Dig” Notification Center, as President and Executive Director since 2006. With over 30 years of experience in the utility infrastructure and excavation sectors, Roger's steadfast commitment to public safety through education and collaboration has made Ohio a national leader in damage prevention. His expertise led to the formation of the Ohio Underground Damage Prevention Coalition (OUDPC), a multistakeholder organization dedicated to advancing excavation safety statutes within the Ohio Revised Code (ORC). Additionally, Roger has forged strong partnerships with state and federal agencies, including the Cybersecurity and Infrastructure Security Agency (CISA), Ohio Homeland Security, and the Ohio Public Private Partnership (OP3), strengthening the resilience of Ohio's critical energy, communications, water, and wastewater infrastructure.

The Collective Voice of Health IT, A WEDI Podcast
Episode 207- Cybersecurity Updates from CISA and HHS

The Collective Voice of Health IT, A WEDI Podcast

Play Episode Listen Later Jun 22, 2025 46:38


WEDI's Privacy & Security Workgroup Co-Chair Lesley Berkeyheiser (DirectTrust) speakers with Charles Sweat Jr. MD, Healthcare and Public Health Sector Liaison, Cybersecurity and Infrastructure Security Agency (CISA) & Charlee Hess, Director Cybersecurity Division, Critical Infrastructure Protection, US Department Health and Human Services on their organizations' missions, purposes and the resources they have that can help guide best practices for the healthcare industry as it pertains to cybersecurity. 

The Other Side Of The Firewall
More CISA Budget Cuts?

The Other Side Of The Firewall

Play Episode Listen Later Jun 3, 2025 9:36


In this episode, Ryan Williams Sr. and Shannon Tynes discuss the recent budget cuts proposed for the Cybersecurity and Infrastructure Security Agency (CISA) and the implications of these cuts on cybersecurity efforts in the U.S. They highlight CISA's critical role in managing cyber incidents and the importance of maintaining adequate funding for cybersecurity initiatives. The conversation also touches on the challenges CISA faces, including talent retention and the need for continued education in cybersecurity. Article: DHS budget request would cut CISA staff by 1,000 positions https://federalnewsnetwork.com/cybersecurity/2025/05/dhs-budget-request-would-cut-cisa-staff-by-1000-positions/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExSk92elhwQm1sVDhUbXJJcQEe9Qs9B2fABpO-SLCON7ZvpkTGX_G3LDZya8eGBtLc_Z8LMScNY35ADkRNIEM_aem_hj20amxI4DCdhfI-MNEEHg Please LISTEN

Cyber Security Today
Phishing Scams, DNS Hijacking, and Cybersecurity Leadership Shakeup

Cyber Security Today

Play Episode Listen Later May 28, 2025 11:30 Transcription Available


  In this episode of Cybersecurity Today, host Jim Love explores the intricacies behind phishing emails that cleverly spoof Microsoft addresses, making many fall for scams despite appearing legitimate. Love emphasizes the need for a stringent 'zero trust' approach to counter these advanced tactics. Additionally, the episode delves into the activities of the hacking group Hazy Hawk, which exploits misconfigured DNS records to hijack trusted domains and propagate malware. Organizations are warned about the importance of regular DNS audits to prevent such attacks. The episode also covers the alarming wave of departures at the Cybersecurity and Infrastructure Security Agency (CISA), raising concerns over the agency's effectiveness amid increasing cyber threats. In another segment, Love discusses a sophisticated fraud operation out of Hanoi, where perpetrators manipulated X's Creator Revenue Sharing Program to siphon funds through fraudulent engagement metrics. The need for built-in fraud prevention mechanisms in digital reward systems is stressed. The episode concludes with a call for listener feedback and support. 00:00 Introduction and Overview 00:27 Phishing Scams: Authentic-Looking Emails 02:58 DNS Misconfigurations and Hazy Hawk 05:36 CISA Leadership Exodus 08:16 X's Creator Revenue Sharing Fraud 10:56 Conclusion and Contact Information

Business of Tech
Rise in Remote Work Drives New Ventures; Insurers Address AI Risks as CISA Alters Info Sharing

Business of Tech

Play Episode Listen Later May 13, 2025 13:33


Remote work is driving a significant startup boom, reshaping the IT services market. A recent study indicates that companies with higher levels of remote work during the COVID-19 pandemic have seen a notable increase in employee startups, with an estimated 11.6% of new business formations attributed to this trend. Despite major corporations reinstating return-to-office mandates, remote work adoption in the U.S. has risen from 19.9% in late 2022 to 23.6% in early 2025, highlighting a growing demand for tools and services that support distributed teams. This shift presents both opportunities and challenges for employers, as they risk losing key talent to new ventures while also facing higher employee attrition rates.The insurance industry is beginning to address the risks associated with artificial intelligence (AI) by offering new products to cover potential losses from AI-related errors. Lloyds of London has introduced a policy that protects businesses from legal claims arising from malfunctioning AI systems, reflecting a growing recognition of AI as an operational risk. This development raises important questions about accountability and liability when AI systems fail, as seen in recent incidents involving customer service chatbots. As insurers start to underwrite AI risks, companies must adapt their service level agreements and governance structures to meet new requirements.The Cybersecurity and Infrastructure Security Agency (CISA) has announced a significant change in how it shares information, focusing on urgent alerts related to emerging threats while reducing routine updates. This shift, coupled with budget cuts that could reduce CISA's funding by 17%, raises concerns about the agency's capacity to respond to increasing cyber threats. IT services firms and cybersecurity vendors must adapt to this new landscape, as the responsibility for threat detection and response shifts more towards the private sector. Organizations that previously relied on CISA for support may find themselves facing increased operational risks due to reduced visibility and slower response times.In a related development, Microsoft has extended support for its Office applications on Windows 10 until October 2028, allowing users more time to transition to Windows 11. This decision reflects a broader trend in the technology sector, where companies are adapting their support strategies to meet user needs. By decoupling the upgrade cycles for Windows and Office, Microsoft acknowledges the resistance to forced upgrades and the importance of maintaining enterprise customer relationships. This extension provides IT service providers with additional time for operational planning while emphasizing the ongoing need for modernization in the long term. Four things to know today 00:00 Remote Work Fuels Startup Surge, Alters IT Talent Strategies Amid Growing Demand for Flexibility05:07 From Chatbot Lawsuits to Pontifical Warnings: AI Errors Now Seen as Business and Social Risk07:57 CISA Alert Shift and Budget Cuts Signal Rising Cybersecurity Burden for Private Sector10:08 Office Gets a Lifeline on Windows 10: Microsoft Decouples OS and App Upgrades Through 2028 Supported by: https://syncromsp.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Software Engineering Institute (SEI) Podcast Series
The Best and Brightest: 6 Years of Supporting the President's Cup Cybersecurity Competition

Software Engineering Institute (SEI) Podcast Series

Play Episode Listen Later May 12, 2025 21:40


A strong cyber defense is vital to  public- and private-sector activities in the United States. In 2019, in response to an executive order to strengthen America's cybersecurity workforce, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) partnered with the SEI to develop and run the President's Cup Cybersecurity Competition, a national cyber competition that identifies and rewards the best cybersecurity talent in the federal workforce. In six years, more than 8,000 people have taken part in the President's Cup. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Jarrett Booz, technical lead for the President's Cup, and John DiRicco, a training specialist in the SEI's CERT Division, sit down with Matthew Butkovic, the CERT technical director of cyber risk and resilience, to reflect on six years of hosting the cup, including challenges, lessons learned, the path forward, and publicly available resources.  

Project 2025: The Ominous Specter
Project 2025: Uncovering the Radical Restructuring of the U.S. Federal Government

Project 2025: The Ominous Specter

Play Episode Listen Later May 11, 2025 5:44


As I delve into the intricacies of Project 2025, a sense of profound change and potential upheaval in the U.S. federal government becomes increasingly clear. This initiative, spearheaded by conservative organizations, aims to reshape the very fabric of American governance, and its implications are far-reaching and complex.At the heart of Project 2025 is a vision to centralize executive power, placing the entire federal government's executive branch under direct presidential control. This is rooted in the unitary executive theory, an expansive interpretation of presidential power that has been gaining traction since the Reagan administration. As Kevin Roberts, a key proponent, puts it, "all federal employees should answer to the president," reflecting a desire to consolidate authority in the White House[5].One of the most striking aspects of Project 2025 is its proposal to dismantle or significantly alter several key federal agencies. The Department of Homeland Security (DHS), for instance, would be eliminated, and the Transportation Security Administration (TSA) would be privatized. These agencies, created in response to the 9/11 terrorist attacks, have been crucial in coordinating national security efforts and preventing terrorist attacks. The idea of reverting to a pre-9/11 era in terms of national security is not only seen as irresponsible but also perilous, as it would undermine the significant progress made in protecting the homeland[1].Another agency on the chopping block is the Department of Education. Under Project 2025, this department would be eliminated, with oversight of education and federal funding for education being handed over to the states. This move would also gut regulations that prohibit sex-based discrimination, discrimination based on gender identity, and sexual orientation in schools. The potential consequences for educational equity and civil rights are dire, as states may adopt varying and potentially discriminatory policies[1].The Federal Emergency Management Agency (FEMA) is also targeted for significant changes. Project 2025 proposes eliminating FEMA and transferring its responsibilities to either the Department of Interior or the Department of Transportation, possibly in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA). This shift would place the burden of disaster preparedness and response on state and local governments, a move that could exacerbate the challenges faced during natural disasters and other emergencies[1].The Environmental Protection Agency (EPA) is another agency facing drastic cuts. The plan includes eliminating many of the EPA's regional labs, offices of enforcement and compliance, scientific integrity, and risk information. This would essentially give corporations and big businesses a free hand to pollute the air, water, and food, posing a significant threat to public health[1].The expansion of presidential powers is a recurring theme in Project 2025. The initiative seeks to eliminate the independence of agencies such as the Department of Justice (DOJ), the Federal Bureau of Investigation (FBI), the Federal Communications Commission (FCC), and the Federal Trade Commission (FTC). This centralization of power is based on a controversial interpretation of the unitary executive theory, which has been supported by conservative justices and organizations like the Federalist Society and the Heritage Foundation[5].In the realm of foreign policy, Project 2025 advocates for a purge of leadership roles within the Department of State. All employees in these roles would be dismissed before January 20, 2025, to be replaced by ideologically vetted leaders appointed to acting roles that do not require Senate confirmation. Kiron Skinner, who authored the State Department chapter of Project 2025, has expressed her belief that most State Department employees are too left-wing and need to be replaced with those more loyal to a conservative president. When questioned about instances where State Department employees obstructed Trump policy, Skinner admitted she could not name any specific examples[5].The potential implications of these changes are vast and multifaceted. Experts warn that such a concentration of power in the executive branch could lead to a significant erosion of checks and balances, a cornerstone of American democracy. The dismantling of critical agencies and the decentralization of their functions to states or private entities could result in a patchwork of policies that lack consistency and effectiveness.As we move forward, the first 100 days of President Trump's second term have already seen many of these plans being rolled out. The coming months will be crucial in determining the full extent of these changes and how they will be implemented. The re-election of President Trump has set the stage for a dramatic reshaping of the federal government, and it remains to be seen how these reforms will impact the daily lives of Americans and the broader health of the nation's governance[4].In conclusion, Project 2025 represents a seismic shift in how the U.S. federal government operates, with far-reaching consequences for national security, education, disaster response, environmental protection, and the balance of power within the executive branch. As these proposals continue to unfold, it is imperative to monitor their implementation closely and consider the long-term implications for American governance and society as a whole. The future of these reforms will be shaped by the ongoing interplay between political will, public opinion, and the resilience of the institutions being targeted for change.

Project 2025: The Ominous Specter
Reshaping the Fabric of American Governance: Uncovering the Transformative Potential of Project 2025

Project 2025: The Ominous Specter

Play Episode Listen Later May 10, 2025 5:12


As I delve into the intricacies of Project 2025, a sense of profound transformation and potential upheaval in the U.S. federal government becomes increasingly clear. This initiative, spearheaded by conservative organizations and aligned with the vision of a strong, centralized executive power, aims to reshape the very fabric of American governance.At its core, Project 2025 is rooted in the unitary executive theory, an expansive interpretation of presidential power that seeks to consolidate control over the entire executive branch under the direct authority of the White House. This vision is championed by figures like Kevin Roberts, who advocates for all federal employees to answer directly to the president, a stance that reflects a significant shift from the traditional checks and balances of the U.S. system[5].One of the most striking aspects of Project 2025 is its proposal to dismantle or significantly alter several key federal agencies. The Department of Homeland Security (DHS), for instance, would be eliminated, and the Transportation Security Administration (TSA) would be privatized. These agencies, created in response to the 9/11 terrorist attacks, have been crucial in coordinating national security efforts and preventing terrorist attacks. The idea of reverting to a pre-9/11 era in terms of national security is not only seen as irresponsible but also fraught with risk, as it would undermine the robust security measures put in place over the past two decades[2].The Department of Education is another target, with plans to eliminate it and transfer oversight of education and federal funding to the states. This move would not only decentralize education policy but also gut regulations that prohibit sex-based discrimination, discrimination based on gender identity, and sexual orientation in schools. This change could have far-reaching implications for the rights and protections of students across the country[2].The Federal Emergency Management Agency (FEMA) would also face significant changes, with proposals to eliminate it and shift its responsibilities to either the Department of Interior or the Department of Transportation, potentially combined with the Cybersecurity and Infrastructure Security Agency (CISA). The costs of disaster preparedness and response would be shifted to states and local governments, a move that could strain local resources and compromise the nation's ability to respond to natural disasters effectively[2].The Environmental Protection Agency (EPA) is another agency on the chopping block, with plans to eliminate many of its regional labs, offices of enforcement and compliance, and scientific integrity and risk information divisions. This would essentially give corporations and big businesses a free hand to pollute the air, water, and food, posing a significant threat to public health[2].The project's proponents argue that these changes are necessary to streamline government operations and reduce bureaucratic inefficiencies. However, critics see these moves as a dangerous erosion of essential public services and regulatory protections. Kiron Skinner, who wrote the State Department chapter of Project 2025, exemplifies this ideological stance, suggesting that many State Department employees are too left-wing and need to be replaced with ideologically vetted leaders loyal to a conservative president. When questioned about specific instances where State Department employees obstructed Trump policy, Skinner admitted she could not name any, highlighting the ideological rather than practical basis of these proposed changes[5].The expansion of presidential powers is a central theme of Project 2025. The plan seeks to eliminate the independence of agencies like the Department of Justice, the FBI, the Federal Communications Commission, and the Federal Trade Commission, placing them under direct presidential control. This is part of a broader effort to centralize power in the White House, a move that has been supported by conservative justices and organizations like the Federalist Society and the Heritage Foundation[5].As we move forward, the implications of Project 2025 are likely to be felt across various sectors of American society. The elimination of key agencies and the centralization of power could lead to a significant shift in how the federal government operates, potentially undermining the system of checks and balances that has been a cornerstone of U.S. democracy.In the coming months, as President Trump marks his first year in his second term, the rollout of these policies will be closely watched. The first 100 days have already seen several executive actions aligned with Project 2025's proposals, and the next milestones will be crucial in determining the full extent of these changes[3].As I reflect on Project 2025, it becomes clear that this initiative represents a profound reimagining of the U.S. federal government. Whether these changes will enhance efficiency and effectiveness or compromise essential public services and democratic principles remains to be seen. One thing is certain, however: the path ahead will be marked by significant challenges and transformations that will shape the future of American governance in ways both profound and far-reaching.

The Cybersecurity Defenders Podcast
#212 - Intel Chat: RSA 2025

The Cybersecurity Defenders Podcast

Play Episode Listen Later May 5, 2025 46:46


In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.During a talk at RSA, DHS Secretary Kristi Noem provided an update on the future direction of the Cybersecurity and Infrastructure Security Agency (CISA) under the new Trump administration.During the panel discussion titled “AI and Cyber Defense: Protecting Critical Infrastructure” which brought together federal research leaders to talk about how AI and automation are being leveraged to address mounting cyber risks across the U.S. critical infrastructure landscape. A new report titled The Rise of State-Sponsored Hacktivism provides a detailed analysis of how hacktivist operations have become an increasingly prominent feature of geopolitical cyber conflict.

Business of Tech
Kaseya Launches AI Tools for MSPs; Cybersecurity Updates and New Legislation Impacting Online Safety

Business of Tech

Play Episode Listen Later Apr 30, 2025 13:46


Kaseya has launched a series of AI-driven tools and policy changes at its Connect 2025 event, aimed at enhancing operational efficiencies for IT service providers. The Kaseya 365 Ops platform utilizes AI to help customers improve their operational efficiency, with early users reportedly saving an average of 160 hours per month, equivalent to the productivity of one additional technician. Additionally, Kaseya is introducing free-to-use Datto backup hardware for up to three devices per customer, significantly reducing upfront costs for partners. The relaunch of the Datto Alto 5, a 2TB encrypted backup device offered at the price of a 1TB unit, provides better value and security for small to medium-sized businesses.SentinelOne, Huntress, and Microsoft have also made significant updates in cybersecurity and operational tools. SentinelOne unveiled its next-generation Purple AI Athena release, which automates critical processes such as threat triaging and investigation, while Huntress enhanced its managed identity threat detection and response solution to combat the rising threat of identity-based attacks. Microsoft announced that paid subscriptions will be required for its Windows Server 2025 hotpatching service, which allows administrators to install security updates without rebooting their servers, transitioning to a subscription model after June 30th.Homeland Security Secretary Kristi Noem announced plans to refocus the Cybersecurity and Infrastructure Security Agency (CISA) on protecting critical infrastructure from sophisticated threats, particularly those posed by China. She criticized previous leadership for mission drift and emphasized the need for improved information sharing across government agencies. Additionally, the Take It Down Act has passed the House, mandating social media companies to remove flagged non-consensual sexual images within 48 hours, raising concerns about potential misuse and the impact on smaller platforms.OpenAI has rolled back an update to its GPT-4.0 model due to concerns over overly flattering responses that compromised user trust. The company aims to refine its approach based on long-term user feedback, emphasizing the importance of accuracy and directness in AI interactions, especially for professionals in decision-making roles. This rollback serves as a reminder for IT leaders to ensure that AI-generated communications are truthful and not merely affirming, as the tone of AI can significantly shape trust in client relationships. Four things to know today 00:00 Kaseya Connect 2025: AI Ops Push, Free Backup Hardware, and Fred Voccola's Ongoing Presence Signal Business-as-Usual with a New Toolkit04:14 SentinelOne's AI Analyst, Huntress's Identity Defense, and Microsoft's Paid Patching 07:24 Noem Refocuses CISA on Infrastructure Threats as Congress Advances AI Image Takedown Law10:29 OpenAI Walks Back GPT-4o Update After Sycophantic Shift, Raising Critical Questions for AI Use in IT Services Supported by:  https://getnerdio.com/nerdio-manager-for-msp/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Business of Tech
Zendesk Shifts to Outcome-Based Pricing; CISA Faces Resignations Amid Budget Cuts and Cyber Threats

Business of Tech

Play Episode Listen Later Apr 23, 2025 15:31


Zendesk has made a significant shift in its pricing model by moving away from traditional seat licenses to an outcome-based pricing structure. This change, articulated by CEO Tom Eggemeier, means that customers will only pay when an AI agent successfully resolves a business problem. This approach aligns with a broader industry trend towards consumption-based pricing, where costs are directly linked to the value delivered rather than the number of licenses or usage. As organizations increasingly adopt AI technologies, this model could reshape the software landscape, pushing providers to rethink their value propositions and focus on delivering tangible business outcomes.The Cybersecurity and Infrastructure Security Agency (CISA) is facing challenges as two high-ranking officials resign amid budget cuts that threaten to reduce its workforce by nearly 40%. The agency's Secure by Design initiative, aimed at enhancing software security, may be impacted by these changes, raising concerns about the future of national cybersecurity efforts. Additionally, CISA has halted the use of certain threat-hunting tools, which could further hinder its ability to address cyber threats effectively. The situation highlights the critical need for managed service providers (MSPs) to adapt their business models to incorporate security measures that align with evolving regulatory and customer demands.Kaseya and other companies are introducing AI-driven tools designed to enhance IT management and cybersecurity for managed service providers. Kaseya's Spring 2025 release includes features that automate workflows and improve user experience, while Cork Protection has launched a tool to help MSPs quickly assess cyber insurance policies. These innovations reflect a growing trend in the industry to leverage AI for operational efficiency and improved service delivery. As MSPs adopt these technologies, they can better position themselves to meet client needs and navigate the complexities of cybersecurity.OpenAI has partnered with The Washington Post to enable ChatGPT to summarize and link to the newspaper's reporting, marking a significant development in the relationship between AI and journalism. This collaboration aims to enhance the quality of information provided to users while raising questions about copyright and the reliability of AI-generated content. Despite OpenAI's advancements in research capabilities, concerns remain about the accuracy of AI in complex tasks. The partnership underscores the ongoing tension between the demand for high-quality information and the challenges of integrating AI into content creation and dissemination. Four things to know today 00:00 Zendesk Drops Per-User Pricing—Now It's Pay When AI Gets the Job Done03:56 Cyber Shakeup: CISA Faces Staff Exodus and Tool Loss While Pentagon Tightens Software Security Standards06:52 From Cyber Orchestration to Frontline AI: New Releases Highlight MSP-Centric Innovation Across the Ecosystem10:35 As OpenAI Partners with Major Newsrooms, Benchmark Reveals Deep Research Still Struggles with Accuracy  Supported by: https://timezest.com/mspradio/ https://www.huntress.com/mspradio/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Business of Tech
CVE Program Saved, CISA Nomination Blocked, OpenAI's AI Models Released, SolarWinds Goes Private

Business of Tech

Play Episode Listen Later Apr 17, 2025 14:58


The U.S. government has renewed funding for the Common Vulnerabilities and Exposures (CVE) Program, a critical database for tracking cybersecurity flaws, just hours before its funding was set to expire. Established 25 years ago, the CVE program assigns unique identifiers to security vulnerabilities, facilitating consistent communication across the cybersecurity landscape. The renewal of funding comes amid concerns that without it, new vulnerabilities could go untracked, posing risks to national security and critical infrastructure. In response to the funding uncertainty, two initiatives emerged: the CVE Foundation, a nonprofit aimed at ensuring the program's independence, and the Global CVE Allocation System, a decentralized platform introduced by the European Union.In addition to the CVE funding situation, Oregon Senator Ron Wyden has blocked the nomination of Sean Planky to lead the Cybersecurity and Infrastructure Security Agency (CISA) due to the agency's refusal to release a crucial unclassified report from 2022. This report details security issues within U.S. telecommunications companies, which Wyden claims represent a multi-year cover-up of negligent cybersecurity practices. The senator argues that the public deserves access to this information, especially in light of recent cyber threats, including the SALT typhoon hack that compromised sensitive communications.The cybersecurity landscape is further complicated by significant layoffs at CISA, which could affect nearly 40% of its workforce, potentially weakening U.S. national security amid rising cyber threats. Recent cuts have already impacted critical personnel, including threat hunters, which could hinder the agency's ability to share vital threat intelligence with the private sector. Meanwhile, the Defense Digital Service at the Pentagon is facing a mass resignation of nearly all its staff, following pressure from the Department of Government Efficiency, which could effectively shut down the program designed to accelerate technology adoption during national security crises.On the technology front, OpenAI has released new AI reasoning models, O3 and O4 Mini, but notably did not provide a safety report for the new GPT-4.1 model, raising concerns about transparency and accountability in AI development. The lack of a safety report is particularly alarming as AI systems become more integrated into client-facing tools. Additionally, SolarWinds Corporation has been acquired by Ternerva Capital, prompting managed service providers (MSPs) to reassess their dependencies on SolarWinds products and consider the implications for product roadmaps and support guarantees. Four things to know today 00:00 From Panic to Pivot: U.S. Saves CVE Program at the Eleventh Hour04:17 A Cybersecurity Meltdown: One Senator Blocks, Another Leader Quits, and a Whole Pentagon Team Walks Out08:54 OpenAI Just Leveled Up AI Reasoning—But Left Out the Fine Print11:45 SolarWinds Is Private Again: What That Means for MSPs Watching the Roadmap  Supported by:  https://www.huntress.com/mspradio/ https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship   Join Dave April 22nd to learn about Marketing in the AI Era.  Signup here:  https://hubs.la/Q03dwWqg0 All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

The Gate 15 Podcast Channel
Weekly Security Sprint EP 107. Hacktivism, Nation-states, and political violence

The Gate 15 Podcast Channel

Play Episode Listen Later Apr 16, 2025 29:04


In this week's Security Sprint Andy and Hunter talk about the following topics:Warm Open:• How Healthcare Facilities Can Be Truly Disaster-Resilient. Healthcare Facilities Today spoke with Jon Crosson, director of health sector resilience at Health-ISAC, on what makes a solid resiliency program for healthcare facilities, the importance of real-time information sharing and how healthcare facility managers can use partnerships to improve response and recovery efforts. • Healthcare cybersecurity needs a total overhaul, by Errol Weiss, Chief Security Officer, Health-ISAC• Addressing Risks from Chris Krebs and Government Censorshipo Fact Sheet: President Donald J. Trump Addresses Risks from Chris Krebs and Government Censorshipo Trump Revenge Tour Targets Cyber Leaders, Electionso Gate 15: Cybersecurity & Infrastructure Security: Time to Make This Happen, December 15, 2017 Following the House of Representatives, the US Senate needs to approve the re-designation of DHS's National Protection and Programs Directorate (NPPD) to become the Cybersecurity and Infrastructure Security Agency (CISA); The President should nominate, and the Senate should confirm, Christopher Krebs as Under Secretary for NPPD and then as the first Director of National Cybersecurity and Infrastructure Security.Main Topics: Hacktivism & Nation-State Influence• CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide• IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities• Top 10 Advanced Persistent Threat (APT) Groups That Dominated 2024• The rising tide: A 2024 retrospective of hacktivismPolitical Violence, Executive Protection• ‘Save the white race': Teen who gunned down his parents was plotting a ‘political revolution' that included ‘getting rid of' President Trump, police say• Pennsylvania Man Charged with Making Threats to Assault and Murder President Donald J. Trump, Other U.S. Officials, and Immigration and Customs Enforcement Agents & ‘Going to assassinate him myself': Man ‘buying 1 gun a month since the election' threatened to kill Trump in multiple YouTube comments under name ‘Mr Satan,' FBI says• Suspect in custody after overnight arson at Pennsylvania Gov. Josh Shapiro's residenceo Was Cody Balmer 'Upset' With Gov Josh Shapiro Over Property Seizure? o Harrisburg man to be charged with attempted murder of Gov. Josh Shapiro for setting fire to official residenceo Suspect in arson at Pennsylvania Gov. Josh Shapiro's residence planned to beat him, documents sayo Suspected arsonist Cody Balmer accused of firebombing Gov. Shapiro's home shared disturbing photos onlineo Cody Balmer's Social Media Reveals Anti-Joe Biden Posts• Protect Democracy: How does Gen Z really feel about democracy? 11% believe that it political violence is sometimes necessary to achieve progress.• Arrest made at UnitedHealthcare headquarters after reports of an intruder Quick Hits:• Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit• 8 April 2025 NCSC, FBI, DCSA bulletin – Online Targeting of Current & Former U.S. Government Employees. • FAA Drone Detection Testing. The FAA will conduct drone-detection testing in Cape May, New Jersey, between April 14-25. • Top homeland security lawmaker calls for cautious cuts to CISA• CISA cuts: ‘Open season' for US? • Senator puts hold on Trump's nominee for CISA director, citing telco security ‘cover up' • OCC Notifies Congress of Incident Involving Email Systemo Treasury bureau notifies Congress that email hack was a ‘major' cybersecurity incidento Hackers lurked in Treasury OCC's systems since June 2023 breach• US Cyber Command: Posture Statement of Lieutenant General William J. Hartman

Forbes Daily Briefing
‘Someone Should Be In Jail': Trump Cybersecurity Officials Stunned By Signal Leak

Forbes Daily Briefing

Play Episode Listen Later Mar 26, 2025 4:39


Cybersecurity and Infrastructure Security Agency (CISA) staff tell Forbes they're stunned by the leak, amid calls for heads to roll. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Business of Tech
Google Acquires Wiz for $32B, CISA Reinstates Laid-Off Workers, Cloudflare Launches Threat Platform

Business of Tech

Play Episode Listen Later Mar 19, 2025 11:25


Google has officially confirmed its acquisition of cloud security firm Wiz for a staggering $32 billion, marking the largest deal in the company's history. This strategic move aims to bolster Google Cloud's security and multi-cloud capabilities, especially as the demand for cloud security intensifies. Wiz, founded in 2020, has quickly gained traction, serving nearly half of the Fortune 100 companies and projecting a significant increase in annual recurring revenue. However, the acquisition comes with risks, including potential regulatory scrutiny and a substantial reverse termination fee, reflecting the challenges Google may face in integrating Wiz into its existing cloud infrastructure.In a related development, the Cybersecurity and Infrastructure Security Agency (CISA) is working to contact over 130 former employees after a federal court ruled their layoffs were unlawful. This decision is part of a broader legal challenge against workforce cuts made during the Trump administration. The reinstated employees will receive full pay and benefits while on administrative leave, but the agency has already lost a significant portion of its workforce, raising concerns about its ability to combat cyber threats effectively. The situation highlights the ongoing challenges faced by CISA in maintaining a capable workforce amid increasing cyberattacks.Cloudflare has launched a new threat events platform called Cloudforce One, designed to enhance real-time intelligence on cyberattacks. This platform leverages Cloudflare's extensive global network, which has blocked billions of cyber threats daily. Additionally, Logic Monitor has partnered with Amazon Web Services to facilitate the migration of VMware workloads to AWS, aiming to optimize cloud performance for global enterprises. Meanwhile, RingCentral has introduced several AI features to improve business communications, including a virtual assistant for managing inbound calls and tools for real-time knowledge retrieval.Lastly, a London court held a secret hearing regarding Apple's appeal against a UK government order to create a backdoor in its encrypted cloud storage systems. This case raises significant concerns about government surveillance, encryption, and data privacy, with potential global implications for cloud security and regulatory compliance. Civil rights organizations have criticized the secrecy of the proceedings, emphasizing the importance of strong encryption in protecting individuals from harassment and oppression. The outcome of this case could have far-reaching effects on the balance between security and privacy in the digital age. Four things to know today 00:00 Google's Biggest Deal Ever: $32B on Wiz to Secure the Cloud. Will It Work?03:25 CISA Scrambles to Contact Wrongfully Laid-Off Employees Amid Cybersecurity Workforce Strain05:27 Cloudflare, AWS, and RingCentral Drop Major Updates07:39 UK Court Holds Secret Hearing on Apple's Encryption Backdoor Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorshiphttps://www.huntress.com/mspradio/ Event: : https://www.nerdiocon.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Reimagining Cyber
The CISA Shake-Up: What It Means for Cybersecurity - Ep 141

Reimagining Cyber

Play Episode Listen Later Mar 19, 2025 10:57


Significant changes are underway at the Cybersecurity and Infrastructure Security Agency (CISA), and the cybersecurity community is paying close attention. In this episode, we break down the recent funding cuts, layoffs, and restructuring efforts that could reshape the agency's mission—and potentially impact national cybersecurity.Join Rob Aragao as he analyzes:

The Cybersecurity Defenders Podcast
#202 - Intel Chat: CISA, BianLian (not), Crafty Camel, Github malvertising & SCADA

The Cybersecurity Defenders Podcast

Play Episode Listen Later Mar 14, 2025 38:28


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of the LimaCharlie community.The Cybersecurity and Infrastructure Security Agency (CISA) is facing significant operational challenges as budget constraints force it to scale back key cybersecurity programs.Scammers are taking a new approach to extortion by mailing physical ransom letters to victims, claiming to be the operators of the BianLian ransomware group.A newly identified advanced persistent threat (APT) group, dubbed "Crafty Camel," has been targeting aviation operational technology (OT) systems using a sophisticated technique involving polyglot files. A new malvertising campaign is leveraging deceptive online ads to distribute information-stealing malware hosted on GitHub, highlighting an ongoing evolution in cybercriminal tactics.Security researchers have disclosed details of multiple vulnerabilities in Supervisory Control and Data Acquisition (SCADA) systems that could be exploited to facilitate attacks on industrial environments.

Business of Tech
CISA Layoffs, AI Chatbots in Government, and Utah's Age Verification Law: Tech Policy Updates

Business of Tech

Play Episode Listen Later Mar 12, 2025 16:15


Former Trump administration cybersecurity official Sean Planky has been nominated to lead the Cybersecurity and Infrastructure Security Agency (CISA). His nomination comes amid significant layoffs at the agency, where over 100 employees were let go, including key members of the Red Team responsible for simulating cyberattacks. These cuts raise concerns about CISA's ability to maintain cybersecurity amid ongoing federal budget constraints, potentially leading to increased threats in the private sector as federal infrastructure and intelligence sharing weaken.In the realm of artificial intelligence, the General Services Administration (GSA) has introduced a custom chatbot named GSAI to automate various government tasks, coinciding with significant job cuts within the agency. While the chatbot aims to enhance efficiency, internal memos have warned employees against inputting sensitive information. This trend reflects a broader movement in the federal government towards tech-driven workforce reductions, raising questions about data privacy and the reliability of AI tools in government operations.Utah has made headlines by passing legislation requiring App Store operators to verify the ages of users and obtain parental consent for minors downloading apps. This law, aimed at enhancing online safety for children, has garnered support from major tech companies but has also faced criticism regarding potential infringements on privacy rights. The Supreme Court is expected to examine age verification issues, particularly concerning adult content websites, highlighting the ongoing debate over online safety regulations.The podcast also discusses the competitive landscape of AI, with Google reporting continued growth in search queries despite the rise of ChatGPT. New benchmarks have been developed to measure the honesty of AI models, revealing that larger models do not necessarily correlate with higher honesty rates. As companies like Microsoft and Amazon introduce advanced AI tools, the implications for businesses are significant, emphasizing the need for oversight and governance in AI deployment to mitigate risks associated with inaccuracies and compliance issues. Three things to know today00:00 Cybersecurity Jobs Cut, AI Hired, and Kids Get ID'd—Welcome to the Future of Tech Policy05:45 ChatGPT Isn't Killing Google Search—And AI Lies More Than You'd Think08:27 Microsoft and OpenAI: A Rocky Relationship, While AI Prices Tumble Supported by:  https://getflexpoint.com/msp-radio/  Event: https://www.nerdiocon.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

RunAs Radio
Secure by Design with Karinne Bessette

RunAs Radio

Play Episode Listen Later Mar 5, 2025 40:04


What does it mean to be secure by design? Richard chats with Karinne Bessette about the scope of the problem around making more secure software. Karinne talks about the US government's Cybersecurity and Infrastructure Security Agency (CISA) push to promote more secure software products. The conversation digs into some of the more famous exploits in recent years and some of the challenges of dealing with development tools that require super-user privileges, getting security testing done promptly and responding to exploits effectively when they happen.LinksWomen in TeamsCISA Secure by DesignAzure Kubernetes ServiceMicrosoft Security Response CenterRecorded February 21, 2025

Business of Tech
U.S. Cyber Policy Shift: MSPs Face New Threats, Talent Retention Challenges, and IPO Market Decline

Business of Tech

Play Episode Listen Later Mar 4, 2025 13:42


U.S. Cyber Command has been ordered to halt all planning against Russia, marking a significant shift in the country's cyber policy. This decision, directed by Defense Secretary Pete Hedgeset, comes as the focus of U.S. cybersecurity efforts pivots away from Russia and towards threats from China and other adversaries. Reports indicate that this change has raised concerns about potential vulnerabilities, especially as Russian cybercriminal groups remain active. The Cybersecurity and Infrastructure Security Agency (CISA) has denied claims that it is reducing its focus on Russian threats, asserting its commitment to defending against all cyber threats to U.S. critical infrastructure.The podcast also discusses the challenges faced by IT service providers in retaining new talent. A recent report highlights that employees with one to three years of experience have a significantly higher churn rate compared to their more experienced counterparts. This situation underscores the need for managed service providers (MSPs) to enhance their onboarding processes, career progression paths, and workplace culture to improve employee retention. Additionally, the limited role of remote work in the industry suggests that MSPs must compete on factors beyond salary, such as workplace environment and benefits.Furthermore, the episode touches on the financial performance of Enable, a key player in the MSP software market. Despite reporting a year-over-year revenue growth of 7% and transitioning a significant portion of its revenue to annual contracts, Enable's stock price plummeted by over 25% following its earnings call. Analysts have adjusted their price targets downward, indicating a lack of confidence in the market for MSP-focused software companies. This trend suggests that the dream of an IPO resurgence for such companies may be fading, with a shift towards private equity consolidation becoming more prevalent.Finally, the podcast emphasizes the importance of resilience, vendor risk management, and strategic alignment for MSPs in light of these market dynamics. As the landscape evolves, providers are encouraged to focus on enhancing their cybersecurity offerings and adapting to regulatory changes. The episode concludes with a reminder for MSPs to be proactive in their approach to business, as the days of passive compliance are over, and security and regulation are becoming critical factors in the IT services industry. Three things to know today 00:00 U.S. Cyber Policy Shifts—Providers May Need to Step Up as Government Focus Changes05:27 IT Service Providers Are Hiring—But Can They Keep Their New Talent?08:25 MSP IPOs? The Market Says No—N-able's Stock Drop Tells the Story Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship https://getflexpoint.com/msp-radio/  Event: : https://www.nerdiocon.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

The Shared Security Show
Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors

The Shared Security Show

Play Episode Listen Later Mar 3, 2025 23:55


In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple's decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the […] The post Cybersecurity Impact of DOGE, Apple's Stand Against Encryption Backdoors appeared first on Shared Security Podcast.

Business of Tech
AI's Role in Cybersecurity: Insider Threats, Phishing Scams, and Deepfake Risks with Bryant G. Tow

Business of Tech

Play Episode Listen Later Feb 22, 2025 35:35


The episode delves into the impact of artificial intelligence (AI) on cybersecurity, particularly focusing on the rise of AI-driven phishing attacks. Bryant G. Tow, Chief Security Officer at LeapFrog Services, discusses how cybercriminals are leveraging generative AI to create more convincing phishing schemes, which can lead to identity theft. Despite the advancements in attack methods, Tao emphasizes that the fundamental defenses against these threats remain unchanged. He highlights the importance of understanding the evolving landscape of cyber threats and the necessity for organizations to adapt their security measures accordingly. Tow elaborates on the concept of an "arms race" in cybersecurity, where defenders must continuously improve their strategies to keep pace with increasingly sophisticated attacks. He points out that while phishing remains a common entry point for cyber threats, the use of AI is transforming these attacks into more personalized and effective schemes. The conversation shifts to the implications of deepfake technology, which can create realistic impersonations of individuals, further complicating the security landscape. Tao warns that the ability to produce convincing deepfake videos and audio can lead to significant risks for organizations. The discussion also touches on the challenges of insider threats, particularly when employees intentionally disregard security policies. Tao stresses the importance of establishing clear acceptable use policies and implementing a zero-trust framework to mitigate these risks. He notes that most insider threats are accidental, but organizations must be prepared to address malicious actions as well. Effective governance, training, and monitoring are essential components in managing insider threats and ensuring compliance with security protocols. Finally, the episode highlights the evolving role of government agencies like the Cybersecurity and Infrastructure Security Agency (CISA) in addressing cybersecurity challenges. Tow reflects on recent changes in leadership and the potential for new perspectives on cybersecurity governance. He expresses hope that the shift in focus will lead to more accessible resources and support for organizations navigating the complex landscape of cyber threats. The conversation underscores the need for continuous adaptation and vigilance in the face of emerging technologies and evolving attack methods. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Virtual Sentiments
Kris Rose on Deliberative Democracy and Meta's Community Forums

Virtual Sentiments

Play Episode Listen Later Jan 29, 2025 72:33


Season 3 is here!On this episode of Virtual Sentiments, host Kristen Collins interview Kris Rose on deliberative democracy and Meta's community forums. Kris discusses Meta's efforts to incorporate public input into decision-making through the Oversight Board and Community Forums. The Oversight Board, an independent body with binding authority over content moderation decisions, provides external accountability, while Community Forums proactively engage users on emerging technologies and policies. In particular, they focus on Meta's Generative AI Community Forum, held in the US, Germany, Spain, and Brazil, which aimed to gather diverse perspectives on the principles that should guide AI development and use. Kristen also raises several concerns including selection biases, lacking transparency, and the potential influence of political pressures on corporate decision-making.**This conversation was recorded in August 2024Kris Rose is a Governance Director at Meta, where he works across the company to drive thought on emerging trends at the intersection of technology, society, and governance. He also leads the team's community governance work, including community forums and other pilots focused on empowering user voice in the company's decision making. Prior to this role, Kris helped launch the company's Oversight Board, served as a geopolitical analyst at the Central Intelligence Agency for a decade—to include a secondment as the President's Daily Brief (PDB) briefer to then US Vice President Mike Pence—and most recently served as a Senior Advisor at the Cybersecurity & Infrastructure Security Agency (CISA) during the Biden administration. Kris holds a Master's in Public Policy from Georgetown University and is a Term Member with the Council on Foreign Relations.Read more work from Kristen Collins.Notes: Stanford University's Deliberative Democracy Lab's Deliberative Polling MethodologyMeta's 2023 Community Forum on Generative AI, conducted in collaboration with Stanford University's Deliberative Democracy Lab and the Behavioral Insights TeamMeta's January 7, 2025 Policy AnnouncementMeta's Transparency ReportsIf you like the show, please subscribe, leave a 5-star review, and tell others about the show! We're available on Apple Podcasts, Spotify, Amazon Music, and wherever you get your podcasts.Follow the Hayek Program on Twitter: @HayekProgramLearn more about Academic & Student ProgramsFollow the Mercatus Center on Twitter: @mercatus

RIMScast
Cyberrisk Trends in 2025 with Tod Eberle of Shadowserver

RIMScast

Play Episode Listen Later Jan 21, 2025 35:23


Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society.   In this episode, Justin interviews Shadowserver Foundation Alliance Director Tod Eberle about cybersecurity. Tod tells how his background as a prosecutor led to his interest in cybersecurity, how he encountered the non-profit Shadowserver Foundation, and how he left the public sector to work with them. He explains how Shadowserver provides actionable data to alert network owners and law enforcement of network vulnerabilities that need to be mitigated. He discusses trends in malware attacks, especially in ransomware. He shares his thoughts on ransomware threats of 2025 and the years to come. He provides tips on preparing your network against ransomware.   Listen to how you can harden your organization's network against malware attacks. Key Takeaways: [:01] About RIMS and RIMScast. [:14] Public registration is open for RISKWORLD 2025! RIMS wants you to Engage Today and Embrace Tomorrow in Chicago from May 4th through May 7th. Register at RIMS.org/RISKWORLD and the link in this episode's show notes. [:33] About this episode. We will discuss cybersecurity with Tod Eberle, the Alliance Director of the Shadowserver Foundation. [:55] RIMS-CRMP Workshops! On February 19th and 20th, there will be a two-day virtual workshop for the RIMS-CRMP led by former RIMS President Chris Mandel and presented by the RIMS Greater Bluegrass Chapter, the 2024 RIMS Chapter of the Year. [1:18] The next RIMS-CRMP-FED exam course will be held from February 4th through the 6th, 2025. Links to these courses can be found through the Certification page of RIMS.org and this episode's show notes. [1:34] Virtual Workshops! Chris Hansen will return on February 11th and 12th to lead the two-day course “Claims Management”. Gail Kiyomura of The Art of Risk Consulting will host the “Fundamentals of Insurance” virtual workshop on February 19th and 20th, 2025. [1:58] On February 26th and 27th, Elise Farnham of Illumine Consulting will lead “Applying and Integrating ERM”. “Managing Data for ERM” will be hosted by Pat Saporito. That course starts on March 12th, 2025. [2:20] A link to the full schedule of virtual workshops can be found on the RIMS.org/education and RIMS.org/education/online-learning pages. A link is also in this episode's show notes. [2:31] The RIMS Legislative Summit 2025 is back! It will be held on March 19th and 20th in Washington, D.C. Join RIMS for two days of Congressional meetings, networking, and advocating on behalf of the risk management community. [2:49] This event is open for RIMS members only so if you're not a member, join now! Visit RIMS.org/advocacy for registration details. [3:02] Interview! Our guest Tod Eberle is the Alliance Director of the Shadowserver Foundation, a non-profit security organization working altruistically behind the scenes to make the internet more secure for everyone. [3:15] Tod Eberle is with us to discuss the cybersecurity trends on his risk radar and the threats he wants risk professionals to be aware of as 2025 kicks into high gear. Shadowserver Alliance Director, Tod Eberle, welcome to RIMScast! [3:41] Justin saw that Shadowserver Foundation was promoted by the National Cybersecurity Alliance and he thought it would be great to have a follow-up on his appearance there. [3:54] Tod says the National Cybersecurity Alliance is a great organization. After working together with them for a year, they invited Tod to do a webinar. It was a great experience. [4:28] Tod's background is as a career prosecutor, starting as a county prosecutor in Western Pennsylvania in 1997. In 2004, Tod became a Federal Prosecutor in Pittsburgh for the U.S. Department of Justice. [5:00] In 2014, He transitioned over to the National Security and Cybercrime section in Pittsburgh. Pittsburgh was at the forefront of cyber investigations by both the U.S. Attorney's Office and the FBI. Tod wanted to be a part of that. [5:34] The Pittsburgh office has run investigations and issued indictments against Chinese Military Intelligence officers and Russian GRU officers for hacking. In 2014, Pittsburgh had the first criminal indictment of nation-state threat actors. [6:00] In that case, Chinese Military Intelligence PLA officers hacked into Pittsburgh companies Westinghouse, ALCOA, U.S. Steel, and United Steel Workers. Some forward-thinking folks at the FBI and the U.S. Attorney's Office, particularly U.S. Attorney David Hickton, focused on cyber. [6:29] That continued over the years until the present. [6:46] To begin an investigation, the FBI and U.S. Attorney's Office in Pittsburgh, need to have some aspect of an organization's criminal activity touch that district, the Western District of Pennsylvania. A national ransomware case with one victim in Pittsburgh can be investigated. [7:16] In the investigation of Russian GRU actors responsible for the destructive NotPetya malware attack, a district hospital's network was attacked and destroyed. They expanded the investigation and charging documents to include other attacks around the country. [7:58] In 2015 Tod was a prosecutor working with the FBI on an investigation. He was at Europol at the Hague in the Netherlands, a center that brings together investigators and prosecutors from different countries who investigate the same threat group through Europol and Eurojust. [8:33] Tod met the Shadowserver Foundation non-profit group at the Hague in 2015. They were helping, through free technical support to the takedown operation, to dismantle the infrastructure of a crime group, using sinkholing and other security measures. [9:08] Tod Joined the Shadowserver Foundation in January of 2023. He is the Shadowserver Alliance Director. As a small non-profit, everyone wears many hats. The Shadowserver Foundation is a 501(c)(3) in the U.S. and a separate non-profit legal entity in the Netherlands. [9:47] The Shadowserver Foundation started about 2004. It celebrated its 20th anniversary in 2024. It began as a loose group of volunteers made up of cybersecurity researchers and technical experts who came together to help network owners and law enforcement. [10:15] Over the years they became more structured and became a non-profit organization. It's an unusual non-profit organization working 100% in operations. It works in three core areas. First, it's the world's largest provider of free, actionable cyber threat intelligence. [10:45] Second, the Shadowserver Foundation does cybersecurity capacity-building around the world. Third, it also provides free support to law enforcement investigations and disruption operations with technical support and expertise. Those three things are its core mission. [11:07] Justin notes commonalities between RIMS cyber risk reporting and the Shadowserver Foundation's work. Shadowserver collects a vast amount of threat data daily. What are the patterns it sees for 2025? [11:29] Shadowserver Foundation can help organizations mitigate risks. It collects cyber threat data at its data center in California through internet-wide scanning, honeypot sensors, sinkholing operations, and collecting and analyzing malware samples. [11:57] Every day for free the Shadowserver Foundation takes that data and provides it to over 9,000 organizations around the world and to 201 National C-CERTs that cover about 176 countries. [12:13] These reports identify exposed, misconfigured, vulnerable, compromised instances or devices on networks that need patching. [12:25] The organizations that get Shadowserver's data can be anything from banks to hospitals, universities, K-12 school districts, ISPs, local, state, and federal governments, small, medium, and large businesses, Fortune 500s, and NGOs; just about anyone can sign up. [12:46] The idea behind this is that cyber security should be available to everyone, regardless of the ability to pay. Organizations can sign up at the Shadowserver Foundation website, and provide their contact information and network information with IP ranges and ASNs. [13:12] The Shadowserver Foundation does its due diligence and if everything checks out, it automates those reports to go out to the organization daily. About 9,000 organizations sign up directly to receive daily reports. [13:22] The Shadowserver Foundation also sends out data for entire countries to the national C-CERT designated to handle that in those countries. In the U.S., CISA gets hundreds of millions of events from them every day for all the U.S. It is the same around the world. [13:52] Tod says that some things never change. Networks are breached primarily through phishing attacks, malicious links or attachments, and social engineering. [14:09] One trend is a focus on vulnerabilities. Criminals exploit vulnerabilities in the network that aren't timely patched and before they are patched. Shadowserver gives organizations an external snapshot view of their networks just as criminals are scanning for themselves. [14:52] Cybercriminal groups increasingly leverage zero-day vulnerabilities to breach a network. A zero-day vulnerability is a flaw in software or hardware that's unknown to the vendor and has no patch. The vendor has had zero days to fix the vulnerability after it has been discovered. [15:16] That was the case with the Clop ransomware gang. In 2024, they started exploiting zero-day vulnerabilities in Fortra's GoAnywhere software. That continued in May, with them exploiting Progress Software's MOVEit file transfer application. [15:38] Very recently, in December, the Clop Ransomware group claimed responsibility for using a zero-day vulnerability in Clio's file transfer platform that breached victims' networks. [15:49] Cyber criminals extort victims and steal data with ransomware attacks. Risk managers in cybersecurity need to stay on top of critical vulnerabilities that often go unpatched. Those are often the easiest gateway into a network. [16:26] Plug Time! RIMS Webinars! Resolver will be joining us on February 6th to discuss “4 Themes Shaping the Future of GRC in 2025”. [16:38] HUB International continues its Ready for Tomorrow Series with RIMS. On February 20th, they will host “Ready for the Unexpected? Strategies for Property Valuation, Disaster Recovery and Business Continuity in 2025”. [16:54] More webinars will be announced soon and added to the RIMS.org/webinars page. Go there to register. Registration is complimentary for RIMS members. [17:06] Nominations are also open for the Donald M. Stuart Award which recognizes excellence in risk management in Canada. Links are in this episode's show notes. [17:17] The Spencer Educational Foundation's goal to help build a talent pipeline of risk management and insurance professionals is achieved in part by its collaboration with risk management and insurance educators across the U.S. and Canada. [17:35] Since 2010, Spencer has awarded over $3.3 million in general grants to support over 130 student-centered experiential learning initiatives at universities and RMI non-profits. Spencer's 2026 application process will open on May 1st, 2025, and close on July 30th, 2025. [17:58] General grant awardees are typically notified at the end of October. Learn more about Spencer's general grants through the Programs tab at SpencerEd.org. [18:08] Let's Return to the Conclusion of My Interview with Tod Eberle of Shadowserver! [18:49] Justin notes that In December of 2024, China attackers breached the Committee on Foreign Investment in the U.S. That is the government office that assesses foreign investments for national security risks. [18:58] China also targeted the Treasury's Sanctions Office after it sanctioned a Chinese company for its alleged role in cyberattacks. [19:14] Tod thinks we should acknowledge that this is nothing new and nothing we should be surprised about. It's been going on for many years and it's going to continue. Justin was in the Federal government in 2013 and 2014. [19:32] In 2015, it was announced that the U.S. Office of Personnel Management had been breached. Personal sensitive data for 42 million people were stolen. [19:44] In May 2014, five Chinese military officers were indicted for computer hacking and economic espionage against companies based in Pittsburgh. This is nothing out of the ordinary. Unfortunately, indictments don't seem to have a deterrent effect. [20:21] Countries can deny the charges of hacking even with strong evidence of their involvement. [20:37] There are different types of hacking, with different types of motivation. There is traditional espionage against U.S. government agencies. There is theft of intellectual property with nation-states trying to gain a commercial advantage in business. [21:23] There are destructive hacks by nation-state actors, like the NotPetya attack, or attacks on the Ukrainian power grid and banking systems in 2015 and 2016. [21:36] The Volt Typhoon threat actor group and its access to the U.S. critical infrastructure is one of the greatest national security concerns because of its potential to disrupt everything from water to power, to food, to transportation. [22:10] The ripple effect that can come from those disruptions would be enormous. The Colonial Pipeline ransomware attack of a few years ago affected fuel supplies, commerce, and the prices of goods. [22:31] Nation-state hacking is no longer just a concern for government agencies and companies that do business internationally, but it's now a concern for all of society. There's the potential to affect the daily lives of innocent civilians through attacks on critical infrastructure. [23:16] Tod mentions another 2014 indictment out of Pittsburgh, on the GameOver Zeus Botnet takedown. Part of that was a crypto locker ransomware disruption. This was in the infancy of ransomware, for $300 ransoms. Now ransom demands are in the tens of millions of dollars. [23:53] We have seen a huge evolution in ransomware. It's not going away. One thing we're seeing is bypassing data encryption and focusing on data theft. It's easier and less time-consuming for the threat actors because they don't have to map out the network. [24:41] If a victim company had good backups and easy restoration, that was an issue ransomware actors had to deal with, so why would the threat actors bother with that? They just focus on easy data theft and extortion of ransom for the data. [25:04] Tod thinks we will continue to see extortion. Ransomware continues to be the greatest concern for companies. The use of AI has been increasing both for defenders and attackers.  [25:14] A new ransomware group, FunkSec, is claiming large numbers of victims of extortion, encryption, and data theft. They seem to have ransom demands of less than $10,000. They have sold stolen data. Researchers think this is a less experienced group using AI to write code. [27:22] Shadowserver's very talented team collects the data. It's free. They want to get it into the hands of those who can use it. The reports identify things that are seen to be misconfigured or unnecessarily exposed to the internet. Sometimes they can show if something is compromised. [28:12] Shadowserver designates the events by severity level so the end user can prioritize their patching and address first the ones that are most critical and severe. The reports act both as an early warning system and a victim notification system if a device is seen to be compromised. [28:59] The network owner needs to remediate that and patch it before further exploitation like a ransomware attack can occur. [29:07] Shadowserver has two ways to detect that a device is compromised. The first is if they have indicators that tell them a device on the network is compromised. The second is with their support for law enforcement, law enforcement may share sensitive data with Shadowserve. [29:32] When law enforcement does a takedown and they get victim identification data like IP addresses, they must do victim notification. Law enforcement isn't scaled to do victim notification for hundreds of thousands of users. Shadowserver helps them with notifications. [30:48] Shadowserver is very careful to share data responsibly. Company A will get the data they have for Company A and it won't be shared with Company B and vice versa. Shadowserver views the data as belonging to that network owner. [31:08] If a company authorizes Shadowserver and wants them to share their data with a third party, Shadowserver will happily do it. There are several companies with MSSPs to manage their security. If the company asks, Shadowserver will send the data to their MSSP. [31:43] As a small, non-profit organization, not everyone has heard of the Shadowserver Foundation. They want people to know they have this data and they want to share it. It could be relevant for cyber insurance companies' due diligence, with the insurance applicant's consent. [32:20] It's important because those reports can show whether a network has remained healthy and secure over time. Tod would love to see Shadowserver be able to help more in the risk mitigation areas. [32:56] Special thanks again to Shadowserver Foundation's Tod Eberle for joining us here on RIMScast! Check out this episode's show notes for links to the Shadowserver reports we mentioned. [33:07] Be sure to tune in next week for Data Privacy Day! We've got a special episode with James Burd, Chief Privacy Officer of the Cybersecurity and Infrastructure Security Agency (CISA). That's going to be a good one! [33:22] More RIMS Plugs! You can sponsor a RIMScast episode for this, our weekly show, or a dedicated episode. Links to sponsored episodes are in our show notes. [33:50] RIMScast has a global audience of risk and insurance professionals, legal professionals, students, business leaders, C-Suite executives, and more. Let's collaborate and help you reach them! Contact pd@rims.org for more information. [34:07] Become a RIMS member and get access to the tools, thought leadership, and network you need to succeed. Visit RIMS.org/membership or email membershipdept@RIMS.org for more information. [34:25] Risk Knowledge is the RIMS searchable content library that provides relevant information for today's risk professionals. Materials include RIMS executive reports, survey findings, contributed articles, industry research, benchmarking data, and more.  [34:41] For the best reporting on the profession of risk management, read Risk Management Magazine at RMMagazine.com. It is written and published by the best minds in risk management. [34:55] Justin Smulison is the Business Content Manager at RIMS. You can email Justin at Content@RIMS.org. [35:03] Thank you all for your continued support and engagement on social media channels! We appreciate all your kind words. Listen every week! Stay safe!   Mentioned in this Episode: RIMS Risk Management magazine RISKWORLD 2025 — May 4‒7 | Register today! RIMS Legislative Summit — March 19‒20, 2025 Nominations for the Donald M. Stuart Award Spencer Educational Foundation — General Grants 2026 — Application Dates RIMS-Certified Risk Management Professional (RIMS-CRMP) RISK PAC | RIMS Advocacy Shadowserver Foundation National Cybersecurity Alliance RIMS Webinars: RIMS.org/Webinars “4 Themes Shaping the Future of GRC in 2025” | Sponsored by Resolver | Feb. 6, 2025 “Ready for the Unexpected? Strategies for Property Valuation, Disaster Recovery and Business Continuity in 2025” | Sponsored by Hub International | Feb. 20, 2025 Upcoming Virtual Workshops: “Claims Management” | February 11‒12, 2025 | Instructor: Chris Hansen “Fundamentals of Insurance” | Feb. 19‒20, 2025 “Applying and Integrating ERM” | Feb. 26‒27 “Managing Data for ERM” | March 12, 2025 See the full calendar of RIMS Virtual Workshops RIMS-CRMP Prep Workshops   Upcoming RIMS-CRMP Prep Virtual Workshops: “Stay Competitive with the RIMS-CRMP | Presented by the RIMS Greater Bluegrass Chapter” February 19‒20, 2025 | Instructor: Chris Mandel Full RIMS-CRMP Prep Course Schedule Full RIMS-CRMP Prep Course Schedule   Related RIMScast Episodes: “Kicking off 2025 with RIMS CEO Gary LaBranche” “Year In Risk 2024 with Morgan O'Rourke and Hilary Tuttle” “AI and Regulatory Risk Trends with Caroline Shleifer” “Cybersecurity Awareness and Risk Frameworks with Daniel Eliot of NIST” (2024)   Sponsored RIMScast Episodes: “Simplifying the Challenges of OSHA Recordkeeping” | Sponsored by Medcor “Risk Management in a Changing World: A Deep Dive into AXA's 2024 Future Risks Report” | Sponsored by AXA XL “How Insurance Builds Resilience Against An Active Assailant Attack” | Sponsored by Merrill Herzog “Third-Party and Cyber Risk Management Tips” | Sponsored by Alliant “RMIS Innovation with Archer” | Sponsored by Archer “Navigating Commercial Property Risks with Captives” | Sponsored by Zurich “Breaking Down Silos: AXA XL's New Approach to Casualty Insurance” | Sponsored by AXA XL “Weathering Today's Property Claims Management Challenges” | Sponsored by AXA XL “Storm Prep 2024: The Growing Impact of Convective Storms and Hail' | Sponsored by Global Risk Consultants, a TÜV SÜD Company “Partnering Against Cyberrisk” | Sponsored by AXA XL “Harnessing the Power of Data and Analytics for Effective Risk Management” | Sponsored by Marsh “Accident Prevention — The Winning Formula For Construction and Insurance” | Sponsored by Otoos “Platinum Protection: Underwriting and Risk Engineering's Role in Protecting Commercial Properties” | Sponsored by AXA XL “Elevating RMIS — The Archer Way” | Sponsored by Archer “Alliant's P&C Outlook For 2024” | Sponsored by Alliant “Why Subrogation is the New Arbitration” | Sponsored by Fleet Response “Cyclone Season: Proactive Preparation for Loss Minimization” | Sponsored by Prudent Insurance Brokers Ltd. “Subrogation and the Competitive Advantage” | Sponsored by Fleet Response   RIMS Publications, Content, and Links: RIMS Membership — Whether you are a new member or need to transition, be a part of the global risk management community! RIMS Virtual Workshops On-Demand Webinars RIMS-Certified Risk Management Professional (RIMS-CRMP) RISK PAC | RIMS Advocacy RIMS Strategic & Enterprise Risk Center RIMS-CRMP Stories — Featuring RIMS Vice President Manny Padilla!   RIMS Events, Education, and Services: RIMS Risk Maturity Model®   Sponsor RIMScast: Contact sales@rims.org or pd@rims.org for more information.   Want to Learn More? Keep up with the podcast on RIMS.org, and listen on Spotify and Apple Podcasts.   Have a question or suggestion? Email: Content@rims.org.   Join the Conversation! Follow @RIMSorg on Facebook, Twitter, and LinkedIn.   About our guest: Tod Eberle, Shadowserver Foundation   Production and engineering provided by Podfly.  

Aperture: A Claroty Podcast
CISA's Matthew Rogers on Secure by Demand for OT

Aperture: A Claroty Podcast

Play Episode Listen Later Jan 19, 2025 39:23


Matthew Rogers, ICS Cybersecurity Strategy & R&D Lead at the Cybersecurity & Infrastructure Security Agency (CISA) joins the Nexus Podcast to discuss the agency's latest publication: “Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products.” This guide features 12 cybersecurity recommendations that OT owners and operators should be looking for during procurement cycles with automation and control system vendors. Read Claroty's blog on the guide.Listen to every episode of the Nexus Podcast here. 

@BEERISAC: CPS/ICS Security Podcast Playlist
CISA's Matthew Rogers on Secure by Demand for OT

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 19, 2025 39:23


Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: CISA's Matthew Rogers on Secure by Demand for OTPub date: 2025-01-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationMatthew Rogers, ICS Cybersecurity Strategy & R&D Lead at the Cybersecurity & Infrastructure Security Agency (CISA) joins the Nexus Podcast to discuss the agency's latest publication: “Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products.” This guide features 12 cybersecurity recommendations that OT owners and operators should be looking for during procurement cycles with automation and control system vendors. Read Claroty's blog on the guide.Listen to every episode of the Nexus Podcast here. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Business of Tech
FBI Strikes Back: The Takedown of PlugX Malware and LockBit's Struggles

Business of Tech

Play Episode Listen Later Jan 15, 2025 12:29


The FBI successfully hacked approximately 4,200 computers across the U.S. to eliminate the PlugX malware, which has been a tool for state-sponsored hackers in China since 2012. This operation, conducted in collaboration with French law enforcement, marks a proactive approach to combating cyber threats and underscores the importance of government intervention in mitigating advanced persistent threats.Sobel also discusses the ongoing struggles of the LockBit cybercriminal organization following a major takedown last year. The U.S. Justice Department's efforts to dismantle LockBit's infrastructure have left the group reeling, with a significant reduction in their operational capacity. This case serves as a powerful example of how coordinated law enforcement actions can disrupt ransomware-as-a-service operations, providing IT providers with a narrative to educate clients on effective ransomware defense strategies.The episode further explores the dual pressures faced by Chief Information Security Officers (CISOs) regarding the adoption of generative artificial intelligence (AI). While a majority of C-suite executives recognize the potential benefits of generative AI, they also express deep concerns about the associated security risks. The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a new initiative aimed at addressing these vulnerabilities, emphasizing the need for effective risk management strategies as companies increasingly integrate AI technologies into their operations.Finally, Sobel highlights the recent developments from Gradient MSP and Citricom, both of which are addressing critical pain points for managed service providers (MSPs). Gradient MSP has launched a Managed Billing Reconciliation Service to streamline billing processes, while Citricom's acquisition of Televi aims to enhance its cybersecurity offerings. These initiatives reflect the evolving landscape of MSP services, where operational efficiency and robust security measures are paramount for success in a competitive market. Three things to know today00:00 Good News Alert: FBI Crushes PlugX Malware, LockBit Stumbles, and Cybersecurity Gains Momentum06:15 Billing, Breaches, and Bots: How MSPs and AI Security Are Tackling 2025's Biggest Challenges08:58 From Billing to Cybersecurity: Gradient MSP and Cytracom Address Critical MSP Pain Points  Supported by:  https://getnerdio.com/nerdio-manager-for-msp/   All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Cybercrime Magazine Podcast
Security Nudge. Use Encrypted Messaging & Calling Apps. Sponsored By CybSafe.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 2, 2025 1:30


Chinese hacker group Salt Typhoon's breach of telecommunications networks has given it unprecedented access to networks across the US and around the world – but there is something you can do about it. If your work involves confidential and sensitive information – or if records of who you are communicating with could be valuable information for outsiders – the Verge reports that the FBI and Cybersecurity and Infrastructure Security Agency (CISA) are recommending that you use encrypted messaging and calling apps where possible. That means using services like Signal and WhatsApp to make sensitive calls instead of regular phone services. These services bypass cell phone networks and use the Internet instead, encrypting all data sent between your phone and that of the person you're calling – meaning that even if the hackers wanted to listen to your call, they wouldn't be able to. If you're not sure how to use them, whether your company policies prevent their use, or whether your company prefers that you use a different system, check with your IT department. The 60-second "Security Nudge" is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com

AURN News
FBI Urges Smartphone Users to Prioritize Encrypted Messaging Amid Cybersecurity Threats

AURN News

Play Episode Listen Later Dec 10, 2024 1:45


If you're a smartphone user, you may want to listen up. The Federal Bureau of Investigation (FBI) is urging smartphone users to rethink how they communicate, warning iPhone and Android users against texting and recommending encrypted messaging platforms like WhatsApp, Signal, and Facebook Messenger. However, the Bureau also raises concerns about these apps, stressing the need for responsible, managed encryption. This comes amid revelations of a cyber espionage campaign linked to China's Ministry of State Security known as "Salt Typhoon." The hackers have breached U.S. telecommunications networks comprised of sensitive metadata and private communications, including those of government officials. While China denies involvement, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) confirmed the attacks are part of a broader pattern targeting U.S. infrastructure. The FBI and CISA are urging organizations to bolster defenses and report suspected breaches. Learn more about your ad choices. Visit megaphone.fm/adchoices

Minimum Competence
Legal News for Tues 11/26 - Biden Wishes to Expand Medicare for Weight-loss Drugs, Trump's Cybersecurity Challenges, Disney $43m Pay Equity Settlement, Legality of Military Deportation Plans

Minimum Competence

Play Episode Listen Later Nov 26, 2024 7:26


This Day in Legal History: Squeaky Fromme ConvictedOn this day in 1975, Lynette “Squeaky” Fromme, a devoted follower of cult leader Charles Manson, was found guilty by a federal jury in Sacramento, California, for attempting to assassinate President Gerald Ford. The incident occurred on September 5, 1975, in Sacramento's Capitol Park, where Fromme aimed a Colt .45 handgun at Ford as he greeted the public. Though the weapon did not discharge—later found to lack a bullet in the firing chamber—the act was a chilling reminder of the volatile political atmosphere of the 1970s. Fromme claimed she wanted to draw attention to environmental issues and the plight of California redwoods, framing her actions as a desperate bid to make her concerns heard.The trial was marked by Fromme's erratic behavior, including disruptions and self-represented courtroom antics that reflected her unwavering loyalty to Manson and his apocalyptic worldview. Prosecutors argued that Fromme's actions posed a genuine threat to the president's life, even though the gun had not fired. The jury deliberated for just over a day before convicting her of attempted assassination under federal law, a crime that carried a potential life sentence.The case underscored the rising threats to public officials during a turbulent era in American history, following closely on the heels of other high-profile political attacks. Sentenced to life imprisonment, Fromme served 34 years before being paroled in 2009. Her conviction remains a stark reminder of the enduring dangers posed by extremist ideologies and the individuals who act upon them.The Biden administration has proposed a rule to expand Medicare and Medicaid coverage to include weight-loss drugs, potentially providing access to millions of Americans with obesity while significantly increasing government healthcare costs. Medicare currently covers related medications like Ozempic and Mounjaro for diabetes but excludes obesity drugs such as Wegovy and Zepbound. Only 13 state Medicaid programs cover these high-cost treatments, which can exceed $1,000 monthly. The proposed rule could reduce patient out-of-pocket costs by up to 95% and offset expenses through lowered rates of obesity-linked diseases, including diabetes and heart conditions.The Congressional Budget Office estimates the expanded Medicare coverage could cost $35 billion over nine years. However, these costs might decrease after 2025 when semaglutide, the active ingredient in several weight-loss drugs, becomes subject to government price negotiations under the Inflation Reduction Act. Drugmakers Novo Nordisk and Eli Lilly stand to benefit from this policy, as the global market for obesity drugs is projected to reach $130 billion by 2030.The proposal is seen as a win for patients and physicians advocating for broader access, but it also poses challenges to efforts to reduce government spending. Some, including Robert F. Kennedy Jr., argue that healthier food initiatives could address obesity more affordably. Novo and Lilly have been working to demonstrate additional health benefits of these medications, aiming to expand insurance coverage and increase acceptance among policymakers. The proposed rule must undergo a formal review process before implementation.Biden Proposes Medicare, Medicaid Coverage of Obesity Drugs (1)Donald Trump's incoming administration faces a rapidly evolving cybersecurity landscape with increased cyber threats, growing system vulnerabilities, and challenges from generative AI. Balancing national security with deregulation goals adds uncertainty to its approach, particularly as it inherits initiatives from the Biden era. The Cybersecurity and Infrastructure Security Agency (CISA), established during Trump's first term, remains pivotal for safeguarding critical infrastructure but faces scrutiny from Republicans over its efforts to counter election misinformation. Proposed rule changes under the 2022 Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), which require entities to report cyber incidents, await finalization amid industry pushback.The Biden administration emphasized industry-specific cybersecurity rules, such as water system safeguards, aviation security standards, and transportation cyber risk requirements, but these have faced challenges, including legal and political opposition. Trump's administration may prioritize oversight while easing regulatory burdens, potentially reducing the influence of agencies like the Federal Trade Commission (FTC) and the Securities and Exchange Commission (SEC) in cybersecurity enforcement.CISA's future is uncertain, with calls to shift it under the Transportation Security Administration, which could impact its authority. Jen Easterly, CISA's current director, will step down on Inauguration Day, leaving leadership decisions to Trump. A possible reduction in enforcement, especially targeting executives, may be welcomed by companies in the cybersecurity space, which have faced intense scrutiny in recent years. The administration's ultimate stance on these policies remains unclear, signaling a potential shift away from the Biden administration's regulatory approach.Trump's Cybersecurity Faces Biden's Legacy, Rising Threats AheadDisney has agreed to pay $43.3 million to settle a lawsuit alleging that its female employees in California earned significantly less than male colleagues over an eight-year span. Filed in 2019 by LaRonda Rasmussen, the lawsuit claimed disparities of up to $20,000 annually for women holding the same job titles as men, including those with less experience. The case eventually grew to represent 9,000 current and former female employees.As part of the settlement, Disney will employ a labor economist for three years to assess and address pay equity among full-time, non-union California employees below the vice president level. An analysis of Disney's HR data, conducted by a University of California professor, found that women were paid approximately 2% less than men during the analyzed period.Although Disney denied wrongdoing, a spokesperson emphasized the company's commitment to fair pay. The settlement agreement, filed in California state court, awaits judicial approval.Disney settles suit over women's pay for $43 million | ReutersPresident-elect Donald Trump's plan to use the military in deportation efforts breaks with U.S. norms against deploying troops domestically but may avoid legal challenges if confined to support roles, such as building detention camps or transporting migrants. The 1878 Posse Comitatus Act bars the military from law enforcement activities, but exceptions, such as the Insurrection Act and National Guard deployments under state control, create legal ambiguity. Trump's proposal to increase deportation capacity by 20 times would require extensive use of these exceptions and could lead to conflicts with state governors.Critics argue that this approach undermines constitutional norms, with legal scholars highlighting the potential for overreach. Governors refusing to deploy their National Guard could force Trump to invoke the Insurrection Act, historically used for civil rights and law enforcement emergencies, though courts typically defer to presidential authority in national security matters. Experts warn that expanded military roles could open avenues for legal challenges, especially if funding or state jurisdiction issues arise.This plan raises significant concerns about its impact on democratic principles. Using the military for mass deportations would set a troubling precedent for civilian governance and law enforcement. While legally feasible in limited roles, the proposal's broad ambitions risk undermining constitutional traditions and provoking legal and political pushback.Trump plan to use military in deportations should stand up in court | Reuters This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.minimumcomp.com/subscribe

Security Visionaries
2025 Predictions

Security Visionaries

Play Episode Listen Later Nov 14, 2024 20:27


In this episode of Security Visionaries, we're joined by Kiersten Todt, President at Wondros and former Chief of Staff for the Cybersecurity and Infrastructure Security Agency (CISA) to discuss predictions for 2025 and beyond.Topics include  the role of artificial intelligence in security, the potential for an AI bubble burst, and reclassifying the cloud as critical infrastructure. Kiersten also predicts an increase in detections of  cyber intrusions from nation-state actors, especially China, underscoring the need for readiness and global cooperation. The discussion concludes with Kiersten's resolution for 2025, emphasizing the role of individuals in demanding more safety and security measures.

Business of Tech
AI Adoption Challenges, Cybersecurity Threats, Kaseya on Automation, and Windows Server 2025 Launch

Business of Tech

Play Episode Listen Later Nov 5, 2024 12:38


The findings of a recent report highlight the challenges faced by C-suite executives regarding aging IT systems amidst a surge in AI adoption. While 90% of executives believe their technology is top-notch, nearly two-thirds acknowledge that outdated infrastructure poses significant issues, with many critical IT systems nearing the end of their life cycle. The report also reveals that although 75% of organizations are investing in AI and machine learning, less than half report a positive return on investment, raising concerns about cyber attack preparedness among executives.The episode also delves into a growing trend of cloud repatriation, as organizations grapple with unexpected costs and performance issues in cloud environments. A recent IDC report indicates that 50% of companies spent more on cloud services than anticipated, prompting some to transition specific workloads back in-house. The case of SaaS company 37Signals, which plans to save $10 million over five years by moving away from cloud services, exemplifies this trend. Sobel emphasizes the importance of differentiating between various levels of AI adoption, noting that many organizations may only be conducting small-scale experiments rather than full-scale implementations.Host Dave Sobel highlights the rising threat of voice-based AI scams, referencing a study from the University of Illinois that demonstrates how OpenAI's ChatGPT-4 can be exploited for financial scams with success rates between 20% to 60%. Additionally, he discusses a new threat campaign where hackers impersonate IT support on Microsoft Teams, urging organizations to implement training programs to raise awareness of evolving social engineering threats. The Cybersecurity and Infrastructure Security Agency (CISA) has also issued warnings about a large-scale spear-phishing campaign targeting federal executives, emphasizing the need for protective measures.Finally, the episode covers significant developments in automation and AI within the managed services sector, particularly at DattoCon, where Kaseya projected that up to 70% of repetitive tasks performed by managed service providers will be automated by 2026. Sobel also discusses Runway's innovative AI tool that customizes outreach to potential clients, reflecting a broader trend of leveraging AI to optimize sales processes. The episode concludes with a discussion on the general availability of Windows Server 2025, which introduces significant advancements and is positioned as a robust solution for on-premises and hybrid cloud deployments. Four things to know today00:00 Kyndryl Report Reveals Struggle with Aging IT as AI Adoption Soars but ROI Falls Short, Fueling Demand for Service Support04:18 Voice-Based AI Scams Rise as Study Shows ChatGPT Vulnerability; New Tactics on Microsoft Teams and Spear Phishing Surge06:20 At DattoCon, Kaseya Emphasizes Automation as Core to MSP Efficiency, Parallel to Runway's AI-Enhanced Sales Tactics08:50 Microsoft Launches Windows Server 2025 with Hybrid Enhancements as KnowBe4 Unveils New Security Training Post-Breach  Supported by:  https://www.huntress.com/mspradio/https://mspradio.com/engage/    All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

Lock and Code
Why your vote can't be “hacked,” with Cait Conley of CISA

Lock and Code

Play Episode Listen Later Nov 3, 2024 39:34


The US presidential election is upon the American public, and with it come fears of “election interference.”But “election interference” is a broad term. It can mean the now-regular and expected foreign disinformation campaigns that are launched to sow political discord or to erode trust in American democracy. It can include domestic campaigns to disenfranchise voters in battleground states. And it can include the upsetting and increasing threats made to election officials and volunteers across the country.But there's an even broader category of election interference that is of particular importance to this podcast, and that's cybersecurity.Elections in the United States rely on a dizzying number of technologies. There are the voting machines themselves, there are electronic pollbooks that check voters in, there are optical scanners that tabulate the votes that the American public actually make when filling in an oval bubble with pen, or connecting an arrow with a solid line. And none of that is to mention the infrastructure that campaigns rely on every day to get information out—across websites, through emails, in text messages, and more.That interlocking complexity is only multiplied when you remember that each, individual state has its own way of complying with the Federal government's rules and standards for running an election. As Cait Conley, Senior Advisor to the Director of the US Cybersecurity and Infrastructure Security Agency (CISA) explains in today's episode:“There's a common saying in the election space: If you've seen one state's election, you've seen one state's election.”How, then, are elections secured in the United States, and what threats does CISA defend against?Today, on the Lock and Code podcast with host David Ruiz, we speak with Conley about how CISA prepares and trains election officials and volunteers before the big day, whether or not an American's vote can be “hacked,” and what the country is facing in the final days before an election, particularly from foreign adversaries that want to destabilize American trust.”There's a pretty good chance that you're going to see Russia, Iran, or China try to claim that a distributed denial of service attack or a ransomware attack against a county is somehow going to impact the security or integrity of your vote. And it's not true.”Tune in today.You can also find us on Apple Podcasts, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and

GZero World with Ian Bremmer
US election security and the threats of foreign interference: CISA Director Jen Easterly discusses

GZero World with Ian Bremmer

Play Episode Listen Later Nov 2, 2024 39:00


On the GZERO World podcast, Ian Bremmer sits down with Jen Easterly, the top US official behind America's election security infrastructure. As Director of Homeland Security's Center for Cybersecurity and Infrastructure Security Agency (CISA), she is on the frontlines of safeguarding the voting process. In their conversation, Easterly talks about the massive improvements to the nation's voting systems and emphasizes “with great confidence that election infrastructure has never been more secure.” Yet what worries Easterly is the potential for election meddling and disinformation after voting ends and before certification is complete.Easterly discusses how the "firehose of disinformation" can have serious consequences on the country. She calls out Trump and other political leaders who have peddled false narratives pushed by foreign actors—a move that risks eroding public trust in our democracy. Again, though, her main concern is for that volatile period after the votes are cast and before they're certified. She argues that "between November 5th and January 6th—when the Congress is going to certify the vote—our foreign adversaries are going to go hog wild.” In particular, threats coming from Russia, China, and Iran. So as voters head to the polls, Easterly and her agency are making it a priority to rebuild trust and confidence with American voters.Host: Ian BremmerGuest: Jen Easterly Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.

The Lawfare Podcast
Lawfare Daily: How CISA Is Working to Protect the Election

The Lawfare Podcast

Play Episode Listen Later Oct 30, 2024 47:21


The Cybersecurity and Infrastructure Security Agency (CISA) has taken a leading role in coordinating efforts to secure the 2024 election—from ensuring the physical security of election workers, to protecting election systems from cyber threats, to identifying foreign influence campaigns and preparing for deepfakes. With a week until Election Day, Senior Editors Quinta Jurecic and Eugenia Lostri spoke with CISA's Cait Conley, Senior Advisor to the agency's director, about how CISA is working to protect the vote. To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/c/trumptrials.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.

The Cybersecurity Defenders Podcast
#166 - Intel Chat: Microsoft logs, USDoD, SolarWinds WHD, & CISA KEV

The Cybersecurity Defenders Podcast

Play Episode Listen Later Oct 24, 2024 29:58


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.Microsoft has recently confirmed that a software bug caused the loss of more than two weeks' worth of critical security logs from several of its cloud services.Brazil's Federal Police have arrested a hacker suspected to be "USDoD," a notorious cybercriminal involved in several high-profile data breaches.A critical vulnerability has been discovered in SolarWinds' Web Help Desk (WHD) software, involving hardcoded credentials that could be exploited by attackers. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added several critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling that these flaws are being actively used in cyberattacks.

Business of Tech
AI Regulations, New, Unusual Cybersecurity Threats, and Intel's Foundry Challenges

Business of Tech

Play Episode Listen Later Sep 18, 2024 12:07


The episode opens with a report on a series of explosions involving handheld pagers in Lebanon and Syria, which injured multiple individuals, including members of Hezbollah. This incident is believed to be a sophisticated attack attributed to Israel, highlighting the ongoing tensions in the region. Sobel also covers a new covert attack method, PIX-L, which can exploit air-gapped networks using sound waves, emphasizing the need for organizations to bolster their defenses against such unconventional threats.The episode shifts focus to cybersecurity measures being implemented in the U.S. ahead of the presidential election. The Cybersecurity and Infrastructure Security Agency (CISA) has released new checklists aimed at enhancing the security of election systems, recommending practices such as multi-factor authentication and encrypted backups. Additionally, Sobel discusses the rollout of the Cybersecurity Maturity Model Certification (CMMC) by the Pentagon, which aims to improve the protection of controlled unclassified information (CUI) among contractors. This phased rollout is expected to take three years and underscores the importance of cybersecurity in the defense sector.Sobel then delves into the regulatory landscape surrounding artificial intelligence, particularly in California, where Governor Gavin Newsom is considering the implications of AI Bill SB 1047. This bill seeks to hold AI vendors accountable and prevent AI-related disasters. While Newsom has signed several other AI-related bills into law, he remains cautious about the potential impact of SB 1047 on the industry. The episode also highlights an upcoming global AI safety summit hosted by the Biden administration, aimed at fostering international cooperation on AI development and addressing concerns about generative AI.Finally, the episode addresses Intel's ongoing challenges in the semiconductor market, including its decision to separate its foundry business into an independent subsidiary to attract external capital. Sobel discusses Intel's recent partnership with Amazon to develop an AI fabric chip and the significant funding it has received under the CHIPS Act. However, the company faces setbacks, such as losing a major contract to AMD for the PlayStation 6 chip, which could have generated substantial revenue. Sobel emphasizes the fragility of Intel's turnaround efforts and the importance of securing key clients to ensure future growth in a competitive landscape. Three things to know today 00:00 Rogue Pagers, Pixhell Exploits, and CMMC Rollout04:41 Governor Newsom Signs AI Regulations on Deepfakes and Political Ads, While SB 1047 Awaits Final Decision07:23 Intel's Foundry Gamble: Balancing External Capital and Contract Losses to Drive Semiconductor Growth  Supported by:  https://www.huntress.com/mspradio/http://blumira.com/radio/  CoreView Sept 19 Webinar: https://okt.to/CLa4Uf   All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

The Langley Files: CIA's Podcast
FILE 017 - CIA Cyber Safety 101

The Langley Files: CIA's Podcast

Play Episode Listen Later Aug 22, 2024 38:03


CIA's digital systems need to process some of the most sensitive data in the world—intelligence that is vital to keeping Americans safe and must be kept from falling into the wrong hands. But who is responsible for ensuring the security of those systems? And do they have any best practices that you could incorporate into your own tech life? On this episode of The Langley Files, you'll find out. Dee and Walter are sitting down with Jennifer Link, CIA's Chief Information Security Officer, to discuss her background and responsibilities, and how she goes about keeping herself cyber-safe in everyday life. So, from mystery phone calls and online pop ups to the increasing world of cyber-enabled home appliances—this is an episode chock full of CIA cyber safety news you can use. Look Inside FILE 017Want to dive deeper into today's episode? Here's a look into more of Langley's (unclassified) files:Interested in cyber security and want to take your skills to the next level? Put them to the test defending CIA—and the nation—from cyber threats. Check out career opportunities as a CIA Cyber Security Officer here.   Looking for handy factsheets on keeping yourself, your family, or your business safe online? The US Government's Cybersecurity and Infrastructure Security Agency (CISA) has you covered.  Did you know that Morocco borders both the Atlantic Ocean and the Mediterranean Sea? Learn incredible facts about places near and far with CIA's World Factbook.