Podcast appearances and mentions of israel barak

  • 14PODCASTS
  • 24EPISODES
  • 34mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Dec 30, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about israel barak

Latest podcast episodes about israel barak

Research Saturday
Encore: What malicious campaign is lurking under the surface?

Research Saturday

Play Episode Listen Later Dec 30, 2023 23:33


Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign. The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used. The research can be found here: Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Encore: What malicious campaign is lurking under the surface? [Research Saturday]

The CyberWire

Play Episode Listen Later Dec 30, 2023 23:33


Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign. The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used. The research can be found here: Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

P40 Ministries
Judges 4:6-16 (From Creation) - Barak Asks Deborah to Go to War

P40 Ministries

Play Episode Listen Later Aug 9, 2023 17:49


Barak is introduced as the next military leader of Israel Barak asks Deborah to go to war. Was this wise or evil? Deborah agrees and gives Barak a prophecy  Jenn discusses women in battle and the mustard seed of faith   Save babies with Seven Weeks whole bean or ground coffee:  https://sevenweekscoffee.com/?ref=P40   Don't go away before clicking these links: YouTube - https://youtu.be/qKqhPoz55n8  Out of the Mire on YouVersion - https://www.bible.com/reading-plans/38267-out-of-the-mire-trusting-god-in-the-middle  Website - https://www.p40ministries.com Facebook - https://www.facebook.com/p40ministries  Contact - jenn@p40ministries.com  Books - https://www.amazon.com/Jenn-Kokal/e/B095JCRNHY/ref=aufs_dp_fta_dsk  Merch Store - https://www.p40ministries.com/shop   

Study the Bible with Arthur Bailey
Genesis: Israel Barak His Sons Chapter 49:13-28

Study the Bible with Arthur Bailey

Play Episode Play 30 sec Highlight Listen Later Apr 17, 2023 45:07


This week we continue in Genesis 49 where Israel has called his sons together and is speaking to them about their future and their posterity.  Last week, we heard the pronouncements over Rueben, Simeon, Levi, and Judah.   Join Arthur as Israel continues to speak prophetically to his sons and reveals the future of their posterity beyond their stay, captivity, and deliverance from bondage in Egypt.   

Study the Bible with Arthur Bailey
Genesis: Israel Barak His Sons - Chapter 49:1-12

Study the Bible with Arthur Bailey

Play Episode Play 30 sec Highlight Listen Later Apr 10, 2023 44:58


In this portion of Torah, Genesis 49 opens with Israel calling his sons together to tell them what is going to happen in the future concerning them and their posterity. In the previous Chapter, he speaks to Joseph, adopts Joseph's two sons, and speaks over their lives.  Those words that Israel spoke to Ephraim and Manasseh are still being used today.  Join Arthur in this portion of Torah, as Israel speaks prophetically to his sons and reveals their future in the message Israel Barak His Sons.

Research Saturday
What malicious campaign is lurking under the surface?

Research Saturday

Play Episode Listen Later Jul 30, 2022 22:48


Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign. The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used. The research can be found here: Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

The CyberWire
What malicious campaign is lurking under the surface? [Research Saturday]

The CyberWire

Play Episode Listen Later Jul 30, 2022 22:48


Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign. The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used. The research can be found here: Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

The Gary Null Show
The Gary Null Show - 03.16.22

The Gary Null Show

Play Episode Listen Later Mar 16, 2022 50:32


Eating nuts and peanuts associated with reduced overall, cardiovascular death   Vanderbilt University School of Medicine, March 2, 2022   Eating nuts and peanuts was associated with a reduced risk of overall death and death from cardiovascular disease across different ethnic groups and among individuals with low socioeconomic status, which suggests that peanuts, because of their affordability, may be a cost-effective measure to improve cardiovascular health, according to an article published by JAMA Internal Medicine. The authors analyzed three large study groups involving 71,764 low-income black and white men and women living in the southeastern United States and 134,265 Chinese men and women living in Shanghai, China. Men in both the U.S. and Chinese study participant groups consumed more peanuts than women. In the U.S. group, about 50 percent of the nut/peanut consumption was peanuts and in the participant groups from China only peanut consumption was assessed.   (NEXT)   People with diabetes who eat less processed food at night may live longer   Study finds eating carbs earlier in the day is linked to better heart health   Harbin Medical University (China), March 15, 2022   The time of day that people with diabetes eat certain foods may be just as important to their well-being as portion size and calories, according to a new study published in the Endocrine Society's Journal of Clinical Endocrinology and Metabolism. Mealtimes should be in line with the biological clock—a natural, internal process that regulates the sleep–wake cycle and repeats every 24 hours. Health outcomes for people with diabetes may be improved if certain foods are eaten at different times of the day.   (NEXT)   Researchers find out why yogurt lowers the risk of developing diabetes   Université of Laval (Quebec), March 15, 2022    Scientists have known for some years that eating yogurt is associated with a reduced risk of diabetes, but the reasons behind this protective effect were unclear. A study published today in Nature Communications reveals that this protection could come partly from the gut microbiota as well as from specific metabolites produced by the lactic bacteria in yogurt. “These metabolites, called branched chain hydroxy acids (BCHA), result from the action of yogurt lactic bacteria on naturally occurring amino acids in milk. “ The researchers made this discovery when observing the effects of yogurt on mice fed a diet rich in sugars and fats. One of the groups was given the equivalent of two daily servings of yogurt. After the 12-week experiment, the researchers found better control of blood sugar, insulin resistance, and liver function in the yogurt fed group. They then analyzed all the metabolites present in their livers and observed changes in BCHA.   (NEXT)   Low blood folate may be linked to heightened dementia and death risks in older people   Icahn School of Medicine at Mount Sinai, March 15, 2022   Low levels of folate (vitamin B9) in the blood may be linked to a heightened risk of dementia and death from any cause in older people, suggests research published online in the journal Evidence Based Mental Health. Levels should be routinely monitored and deficiencies corrected in older age, especially given that blood levels of folate tend to tail off with age, with up to 1 in 5 older adults estimated to be folate deficient, say the researchers. The evidence to date suggests that folate deficiency affects cognition and nerve signaling in the brain, making it a possible risk factor for subsequent dementia.   (OTHER NEWS)   Darktrace and Cybereason: The Intelligence Front Companies Seeking to Subjugate the World with the A.I. Singularity   Meet two power cybersecurity companies riddled with American, British, and Israeli intelligence agents who plan on using AI technology to target foreign populations as well as their own. BY JOHNNY VEDMORE UNLIMITED HANGOUT NOVEMBER 3, 2020   We have all been dreaming, a dream where you can float or glide across your dreamscape effortlessly. This leads to the feeling of trepidation, as though you have the ability to let go, and if you do let go, you'll either soar or fall. We're now at a point in history where either the coming events will be studied for thousands of years, or it will be remembered as the point where we lost our humanity completely. Artificial Intelligence (A.I.) technology has entered a new phase over the past several years, where instead of the A.I. algorithms learning from humans, they are now teaching themselves, changing their own algorithms as they learn. We are on the cusp of letting go of control entirely, so early on, because of a few small companies who have quietly been given free reign under the guise of “protecting” our digital lives, all within a tech sector that is moving so fast that we can no longer see what's just around the bend. The entire free thinking population of Earth would love a little more time to discuss such epochal change. However, the technocrats and scientists, supported by venture capitalists, are already putting into action the future before the masses have a chance to even consider discussing its consequences. With very little legislation governing A.I. technologies on the books, our governments are eager to get every tech pioneer inventing whilst there is no accountability for any resulting harm. We're not talking major societal disruption, we're talking about a potential extinction level event of our own creation. Where we should be taking cautious baby steps, instead we're expecting to fly just by letting go. We are about to experience a monumental change in technology, starting with “next-generation” cybersecurity that will then move quickly into the unknown. Unsupervised A.I., now running on critical networks throughout the world as a “cybersecurity” product, is evolving its own algorithm without the need for humans to be involved. Meanwhile, the wealthy patrons funding this cutting edge future tech are out in force, working to propel our societies into this new, unexplored and dystopian technological frontier. But who are the companies that these eager wealthy venture capitalists are funding to create an autonomous, A.I.-powered cyber defence system like never before? Are they even companies at all when we consider their deep and direct ties to intelligence agencies? Should these firms instead be reclassified as simply extensions of state intelligence apparatus acting without the restrictions of public accountability? Each of these companies have been built by teams of former intelligence operatives, some of who have sat in the highest echelons of the intelligence apparati of their respective countries. MI5 and C.I.A. both carry considerable weight in these sinister sounding enterprises, but it is Israel's Unit 8200 that are the main group capitalising on this advance into the world-altering realm of unsupervised Artificial Intelligence algorithms. Yet, these very companies appear to be selling a defence against a potential apocalypse that they themselves may be responsible for. They have the solutions to everyone's cyber-woes, or at least that's the image they wish to portray. Let me introduce you to the most dangerous intelligence operations masquerading as cybersecurity companies on planet Earth. Darktrace – The Unsupervised Machine Learning A.I. Cybersecurity Solution The members of Darktrace are open about their aims. They talk about publicly held dataas though they already have the rights to sell it to anyone around the world. Data is the fuel of the Fourth Industrial Revolution and Darktrace has made almost $2 billion in the data business during its relatively short history, reaching Unicorn status with great ease. When Darktrace first launched its website in 2013, its description of the company's vision was entitled, “The New Normal: Learn Human and Machine Behavior to Reduce Cyber Security Risks.” Back then we were less familiar with the term “the new normal,” but now it surrounds us. Darktrace is already active within the NHS, the U.K. power grid, and many other major parts of Britain's critical infrastructure and they are rapidly expanding around the globe. Dave Palmer was an MI5 anti-terror agent working on the 2012 London Olympics when he and some of his colleagues first bashed out the initial idea for what would become Darktrace. They wanted to create an A.I. cybersecurity system that was based on the human immune system, a system that differed from the traditional, reactive antivirus software approach. This system would look for abnormalities in a computer network's processes to target a wider range of more sophisticated cyber issues. In a TechCrunch talk in 2016, the freshly installed co-CEO of Darktrace, Poppy Gustafsson, is caught misleading the audience about the company's origins. She uses the TechCrunch stage to claim that the “spark” for the creation of Darktrace originally came from the mathematicians at Cambridge and downplayed the involvement of intelligence agencies like MI5, GCHQ, and the C.I.A. The TechCrunch moderator, Natasha Lomas, displayed some fine journalistic integrity on this occasion and asked for clarification. “So did the maths research come first and then you got together with the spies. Which way round was it?” asked the intrepid Lomas. Gustafsson squirms a little before saying, “it was exactly that. First the machine learning that was talking about how to critique a computer to help it understand itself. And then it was the, um, experts from the government intelligence agencies who thought ‘ooh, this could be applied to the problem of cybersecurity.'” But that statement was an outright lie and Gustafsson isn't the most skilled deceiver. Gustafsson, who was initially CFO and COO for the fledgling Darktrace, runs the company alongside the other co-CEO Nicole Eagen, an alumnus of Oracle, a major tech company that also has its origins in intelligence. Both parts of Darktrace's female power duo were brought over from Invoke Capital by Darktrace's initial angel investor and advisory boardmember, UK billionaire Dr. Mike Lynch OBE. Describing himself as the “UKs answer to Bill Gates“, Dr. Mike Lynch is lauded as one of the most influential investors in the tech sector. His previous successful endeavours had been with Autonomy, a tech firm that has Lynch caught up in a legal wrangle with HP over the fraudulent inflation of its valuation, and Blinkx, a video search company where Lynch was later forced to step down from the board. Yet, Darktrace is not just one man working alone. The company boasts that over 4000 organisations worldwide now rely on Darktrace's A.I. technologies. With headquarters in San Francisco, US, and Cambridge, UK, Darktrace has over 1300 employees spread across 44 countries and their numbers are rising. And although the connections to the state intelligence agencies are clear and obvious, Darktrace is officially a completely private enterprise with big investors including KKR, Summit Partners, Vitruvian Partners, Samsung Ventures, TenEleven Ventures, Hoxton Ventures, Talis Capital, Invoke Capital and Insight Venture Partners. Sitting alongside the controversial Dr. Mike Lynch OBE on the advisory board for Darktrace are some seriously influential people deeply connected to US and UK intelligence agencies. If you were to walk into the advisory boardroom at Darktrace, you could be forgiven for thinking that you were actually attending a U.K. Home Office meeting from the past. The former Home Secretary under Prime Minister Theresa May, Amber Rudd, became part of Darktrace after her time in government ended in 2019. She is also on the advisory team of Teneo, a consulting firm co-founded and led by Doug Band, the former advisor to Bill Clinton and close friend of the infamous Jeffrey Epstein. As always, when investigating the murky world of intelligence, many connections to Epstein and his partner Ghislaine Maxwell are revealed. With that being said, yet another member of Darktrace's advisory board also has Epstein/Maxwell links. The C.I.A. stalwart, Alan Wade, is one of the most interesting members of the Darktrace advisory team. He was announced as joining their growing advisory board on 10 May 2016 and had been the former Chief Information Officer of the Central Intelligence Agency. His thirty- five year career at the top echelons of the C.I.A. ended in 2006 and afterwards he would dedicate his time to assisting companies with C.I.A. links from the private sector. While he had been at one of the top posts in the entire U.S. intelligence community, Wade co-founded Chiliad alongside Ghislaine Maxwell's sister, Christine Maxwell. As Unlimited Hangout reported earlier this year, Christine Maxwell was personally involved in leading the opeartions of the front company used by Robert Maxwell to market the PROMIS software, which had a backdoor for Israeli intelligence, to both the U.S.' public and private sectors. Given this history, it is certainly telling that Wade would choose to co-found a major software company with Christine Maxwell of all people. Cybereason – From Offensive, State-Sponsored Hackers to A.I. Cybersecurity As we have experienced at other memorable moments in history, coincidental simulations prior or during any intelligence agency led manipulated event are commonplace. On this occasion, a company named Cybereason is here to provide us with a short glimpse of our pending fearful futures. In multiple simulations Cybereason has run over the last few years, they have been gaming out how potential cyberattacks could cause unthinkable disaster for the U.S. 2020 election. Cybereason's CEO and co-founder is an enigmatic former Israeli Intelligence agent Lior Div-Cohen, often simply referred to as Lior Div. Div, an IDF Medal of Honor recipient and former Israeli Unit 8200 member, co-founded Cybereason in 2012 alongside Yossi Naar and Yonatan Striem-Amit, who are also fellow veterans of Israel's military cybersecurity corps. A scholar from the Academic College of Tel-Aviv, Lior Div afterwards worked as a software engineer for Xacct a network service provider followed by the notorious firm Amdocs, which was accused of eavesdropping on American government officials on behalf of Israel. In between Amdocs and Cybereason, Lior Div was the CEO and co-founder of Israeli cybersecurity firm AlfaTech which is described in its national media as“a cybersecurity services company for Israeli government agencies.” Some of the simulations that Cybereason have hosted over the past two years lead us to election day. In a video entitled: 2018 -10 Hacking the Vote from a scenario and simulation which was actually entitled Blackout; Protect the Vote, the simulation examines which parts of an election day processes were vulnerable to hackers. They make clear from the start it won't be all about voting machines themselves. Operation Blackout Nolandia, the fictional city which was ground zero during Operation Blackout, was based on an average American city nestled within a crucial swing state on election day. Here in Nolandia, three teams of cyber-fighters would battle with each other over control of the city. These would be the three teams each with succinct roles in the polling day pretence, as told to us by Cybereason's Ross Rustici and Sam Curry: Red Team AKA Broken Eagle Task Force: The basic aim of the Broken Eagle's Task Force was to disrupt the election processes in real time. The Red's approach evolved throughout the simulation from causing as much harm as they could into making the result of the election as in doubt and politically biased as possible. They attempted to control the narrative that the system was broken and that the elections could not be trusted. Blue Team AKA Nolandia Event Task Force: The Blue's were fundamentally reactive during the simulation and were constantly on the backfoot. The Blue's, responding to a reported gas leak at a Nolandia polling station early in the scenario, contacted the Secretary of State's office to ask whether they needed to close the polling station. Luckily, the real State Department had two advisors sitting in on the simulation who were able to offer alternative contingency plans that existed in real world America. By the end of the simulation, the Blue's were all aware that they had largely failed the exercise. White Team AKA White Control Team: This team acted as support to give advice or permission to either team, in a role very much like the Dungeon Master in a D&D game. The White's main task was to balance the realism of the scenario and create problems for either team that they'd experience in the real world. In November 2019, Cybereason re-ran their election day attack simulation at an event in Washington D.C. and have run multiple simulations over the last year. The last imagined American city was called Adversaria. As the election day creeps ever closer, Cybereason have been releasing it's more well produced promo videos online. If you're paying very close attention then you will have noticed that Cybereason have spent all of October 2020 marketing heavily as their big day approaches. Representatives of Cybereason are being quoted in every mainstream scare story out there. Vice News released an article on 7 October entitled: “Hospitals Have Become ‘Prime Targets' for Crippling Ransomware Attacks,” where they quote Israel Barak, Cybereason's Chief Information Security Officer, the article states that Barak is “a cyber warfare expert at Cybereason, spent nine years in the Israel Defence Forces specialising in cyber defence systems.” And when Computer Weekly's Adam Scroxton, on 20 October, was reporting on the conviction of the six supposed Russian hackers in the famous NotPetya attack, Cybereason rolled out their CSO, Sam Curry, to give a statement. In a Wired article on 22 October titled: 12 Cyber Threats That Could Wreak Havoc on the Election, Wired explains: “The security firm Cybereason last year ran a series of tabletop exercises specifically looking at how real-world attacks might impact Election Day. One exercise focused on a hacktivist group—known in the exercise as “Kill Organized Systems (K-OS),” pun intended—that disrupted traffic lights and brought the election to a standstill by paralyzing the city's transportation system.” The media appearances for Cybereason have never come so thick and fast as they have this past October. One could even assume that these appearances are a media campaign leading up towards a big event.

Hashtag Realtalk with Aaron Bregg
Episode 59 - Preparing for a Ransomware Attack

Hashtag Realtalk with Aaron Bregg

Play Episode Listen Later Dec 22, 2021 59:36


In this episode I had a chance to talk with Israel Barak about a listener submitting topic, 'How do I prepare for a ransomware attack?'. Israel is the CISO for Cybereason and has intricate knowledge of ransomware and cybersecurity dating back to his days in the Israeli Defense Force.Using his extensive knowledge we talked through his concept of having different security 'pillars' to help navigate the lifecycle of ransomware: Security Hygiene - Checklists are in security hygiene - you don't build a program around ransomwarePeople - Executive Leadership (how to educate exec leadership), Awareness (do you know what to do when you have already clicked), Security People (surgery example)Recovery - How do you plan for a recovery processInsurance - Do you really need it, do you trust it with your CFOEpisode Sponsor:This episode is sponsored by Cybereason. Cybereason is an eXtended Detection and Response solution company with Global Headquarters based out of Boston Massachusetts. Proceeds from the sponsorship fee will be going towards a local Youth Mental Health program that is happening in 2022.

כל תכני עושים היסטוריה
[Malicious Life] Special: The SolarWinds Hack

כל תכני עושים היסטוריה

Play Episode Listen Later Dec 30, 2020 34:58


Ran talks to Israel Barak, Cybereason's CISO and a Cyber-defense and Warfare expert, about the recent SolarWinds hack that impacted upto 18,000(!) enterprise organizations in the US. What is a Supply Chain Attack, how can organizations defend against it - and what does all this have to do with Evolution and Natural Selection?...Visit the podcast website Malicious.Life and follow us on twitter @maliciouslife

Malicious Life
Special: The SolarWinds Hack

Malicious Life

Play Episode Listen Later Dec 28, 2020 34:58


Ran talks to Israel Barak, Cybereason's CISO and a Cyber-defense and Warfare expert, about the recent SolarWinds hack that impacted upto 18,000(!) enterprise organizations in the US. What is a Supply Chain Attack, how can organizations defend against it - and what does all this have to do with Evolution and Natural Selection?... The post Special: The SolarWinds Hack appeared first on Malicious Life.

Malicious Life
Multi-Stage Ransomware (Live!)

Malicious Life

Play Episode Listen Later Aug 2, 2020 47:07


Ran & Israel Barak, Cybereason's CISO, discuss the latest development in ransomware evolution: multi-stage attacks in which the attackers infiltrate the target network, steal data and gather intelligence - before detonating the ransomware to cause maximal denial-of-service to the victim organization. What does this new tactic mean for the use of backups as a mean to mitigate the risk from ransomware? This episode was recorded live on July 29th, 2020. The post Multi-Stage Ransomware (Live!) appeared first on Malicious Life.

World Wide Technology - TEC17
Cyber Threats with Cybereason

World Wide Technology - TEC17

Play Episode Listen Later Aug 6, 2019 27:33


One of the most serious cyber threats in the last few years is Soft Cell.  This cyber threat has been targeting telecommunication companies for years.  In 2018 it was spotted and identified by Cybereason.  In this new TEC17 podcast from World Wide Technology (WWT) Matt Berry from the WWT Security practice and two experts from Cybereason,  Israel Barak and Maor Franco, discuss what the Soft Cell threat is and why it is so important.  Our experts also discuss why Soft Cell is a threat to other verticals besides telecommunications, how enterprise organizations can assess if they are vulnerable to the Soft Cell threat and the solutions that the WWT and Cybereason partnership offer to these organizations to counter this serious cyber threat.     WWT Security Practice   Cybereason's Operation Soft Cell

Salted Hash
Honeypots and the evolution of botnets | Salted Hash Ep 23

Salted Hash

Play Episode Listen Later May 23, 2018 11:59


Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

Hack Naked News (Audio)
Hack Naked News #117 - March 28, 2017

Hack Naked News (Audio)

Play Episode Listen Later Mar 29, 2017 22:29


LastPass fixes vulnerabilities, Instagram adds 2FA, scammers target iOS porn viewers, and more. Israel Barak of Cybereason joins us to deliver expert commentary on unifying industrial control system security operations into an enterprise SOC. Stay tuned!

Paul's Security Weekly
Hack Naked News #117 - March 28, 2017

Paul's Security Weekly

Play Episode Listen Later Mar 28, 2017 22:29


LastPass fixes vulnerabilities, Instagram adds 2FA, scammers target iOS porn viewers, and more. Israel Barak of Cybereason joins us to deliver expert commentary on unifying industrial control system security operations into an enterprise SOC. Stay tuned!

Hack Naked News (Video)
March 28, 2017 - Hack Naked News #117

Hack Naked News (Video)

Play Episode Listen Later Mar 28, 2017 22:36


LastPass fixes vulnerabilities, Instagram adds 2FA, scammers target iOS porn viewers, and more. Israel Barak of Cybereason joins us to deliver expert commentary. Stay tuned! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/HNNEpisode117 Visit http://hacknaked.tv to get all the latest episodes!

Paul's Security Weekly TV
March 28, 2017 - Hack Naked News #117

Paul's Security Weekly TV

Play Episode Listen Later Mar 28, 2017 22:36


LastPass fixes vulnerabilities, Instagram adds 2FA, scammers target iOS porn viewers, and more. Israel Barak of Cybereason joins us to deliver expert commentary. Stay tuned! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/HNNEpisode117 Visit http://hacknaked.tv to get all the latest episodes!

Hack Naked News (Audio)
Hack Naked News #107 - January 17, 2017

Hack Naked News (Audio)

Play Episode Listen Later Jan 17, 2017 27:22


Israel Barak of Cybereason joins us to discuss endpoint security, malware, ransomware, and more news stories in this week’s episode of Hack Naked News!

Hack Naked News (Video)
Hack Naked News #107 - January 17, 2017

Hack Naked News (Video)

Play Episode Listen Later Jan 17, 2017 27:38


Israel Barak of Cybereason joins us to discuss endpoint security, malware, ransomware, and more news stories in this week’s episode of Hack Naked News! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Hack_Naked_News_107_January_17_2017 Visit http://hacknaked.tv to get all the latest episodes!

Paul's Security Weekly TV
Hack Naked News #107 - January 17, 2017

Paul's Security Weekly TV

Play Episode Listen Later Jan 17, 2017 27:38


Israel Barak of Cybereason joins us to discuss endpoint security, malware, ransomware, and more news stories in this week’s episode of Hack Naked News! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Hack_Naked_News_107_January_17_2017 Visit http://hacknaked.tv to get all the latest episodes!

Paul's Security Weekly
Hack Naked News #107 - January 17, 2017

Paul's Security Weekly

Play Episode Listen Later Jan 17, 2017 27:22


Israel Barak of Cybereason joins us to discuss endpoint security, malware, ransomware, and more news stories in this week’s episode of Hack Naked News!

Paul's Security Weekly TV
Episode 414: Israel Barak

Paul's Security Weekly TV

Play Episode Listen Later Apr 19, 2015 33:33


israel israel barak
Paul's Security Weekly
Security Weekly #414 - Interview with Jon Callas and Israel Barak

Paul's Security Weekly

Play Episode Listen Later Apr 19, 2015 122:40


israel security weekly israel barak jon callas