Podcast appearances and mentions of james lyne

  • 17PODCASTS
  • 24EPISODES
  • 40mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jun 27, 2025LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about james lyne

Latest podcast episodes about james lyne

BLUEPRINT
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard

BLUEPRINT

Play Episode Listen Later Jun 27, 2025 53:31


Click here to send us your ideas and feedback on Blueprint!This podcast episode is from the SANS Cyber Leaders Podcast.The episode features Blueprint host John Hubbard, where he talks with hosts James Lyne and Ciaran Martin on the ever-changing threat landscape and how SOC teams can stay ahead. John shares his expertise on spotting threats early, how to test your defences before the real attackers show up, and why he's on a mission to simplify cybersecurity operations for the next generation of defenders.Check out John's SOC Training Courses for SOC Analysts and Leaders: SEC450: Blue Team Fundamentals - Security Operations and Analysis LDR551: Building and Leader Security Operations Centers Follow and Connect with John: LinkedIn

blueprint cyber soc fighting back leaders podcast john hubbard ciaran martin james lyne
English Academic Vocabulary Booster
3673. 170 Academic Words Reference from "James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk"

English Academic Vocabulary Booster

Play Episode Listen Later Aug 11, 2023 152:25


This podcast is a commentary and does not contain any copyrighted material of the reference source. We strongly recommend accessing/buying the reference source at the same time. ■Reference Source https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it ■Post on this topic (You can get FREE learning materials!) https://englist.me/170-academic-words-reference-from-james-lyne-everyday-cybercrime-and-what-you-can-do-about-it-ted-talk/ ■Youtube Video https://youtu.be/Kf4DIpjhh0U (All Words) https://youtu.be/zmkzL1oUxUU (Advanced Words) https://youtu.be/3UOdxEB07uw (Quick Look) ■Top Page for Further Materials https://englist.me/ ■SNS (Please follow!)

BFM :: The Breakfast Grille
Selling Premium High-End Gym Equipment In Malaysia

BFM :: The Breakfast Grille

Play Episode Listen Later Aug 22, 2022 20:53


Technogym is a maker of premium high-end gym equipment that has been supplying the hospitality, corporate, business and home segments since it was founded in Cesena, Italy, in 1983. Today it is worth over US$2.4 billion and is present in over a hundred countries. It wants to expand its footprint in Malaysia and the region. We talk to James Lyne, Executive Director at Technogym Malaysia, to find out what its strategies are here in these economically challenging times.

Goldstein on Gelt
Do This to Protect Your Money From Cyber Crime

Goldstein on Gelt

Play Episode Listen Later Dec 12, 2019 27:08


Cyber crime is on the rise. How can you keep your money safe? James Lyne, global head of security research at the security firm Sophos, explains how to protect yourself and your money against the malicious codes that hackers create every day. Discover: Why individual investors are targeted more often than banks and large companies The most common tactics that cyber criminals use What could happen if a scammer steals your email login and password What should you do at the end of the fiscal year? There are a few financial steps you should take at the end of 2016. Doug Goldstein, CFP®, explains what tax-loss harvesting is and why it’s often done before the New Year. How should you get your financial plan ready for January? What specific items do you need to review? Follow James Lyne on Twitter @jameslyne and watch his TED talk here.

Science for the People
#470 Information Spookyhighway

Science for the People

Play Episode Listen Later Apr 19, 2018 60:00


This week we take a closer look at a few of the downsides of the modern internet, and some of the security and privacy challenges that are becoming increasingly troublesome. Rachelle Saunders speaks with cyber security expert James Lyne about how modern hacking differs from the hacks of old, and how an internet without national boards makes it tricky to police online crime across jurisdictions. And Bethany Brookshire speaks with David Garcia, a computer scientist at the Complexity Science Hub and the Medical University of Vienna, about the recent Cambridge Analytica scandal, and how social media platforms put a wrench...

Solo Documental
Nos vigilan

Solo Documental

Play Episode Listen Later Apr 11, 2017 54:39


Ahora sabemos que el sistema de escuchas policiales Sitel es capaz de escuchar el sonido ambiente del micrófono de un teléfono móvil que recibe una llamada incluso antes de descolgar. Ahora también sabemos que el Tribunal Supremo avala que un juez admita como prueba esos datos, es decir, el uso del teléfono como "micrófono ambiental", como parte de una intervención telefónica. Pero lo cierto es que estamos vigilados casi constantemente. Echemos un vistazo a nuestro alrededor. Cualquier compañero de trabajo tiene su teléfono a mano, entramos y salimos del metro rodeados de cámaras, tenemos relojes y pulseras inteligentes que emiten datos sin parar, usamos tarjetas electrónicas para pagar y entrar a edificios. Incluso ahora podemos hablar con nuestros smartphones o nuestros televisores. EL MÓVIL "No sé por qué les llamamos teléfonos, cuando son en realidad ordenadores que tienen una aplicación que se llama teléfono", explica Juan. La creciente potencia y capacidad de los smartphones multiplica su complejidad y también las posibilidades de su manipulación. "Cuando se establece la comunicación con el terminal que permitirá que la llamada tenga lugar, en ese momento existe ya un canal de comunicación por lo que, técnicamente, es perfectamente posible abrir el micrófono, la cámara, lo que quieras, según el nivel de acceso que tengas", comenta este experto. La sentencia del Supremo ha sorprendido porque viene a confirmar algo que era bien sabido en los círculos de la ciberseguridad, pero más oscuro para el gran público: un teléfono móvil como el que usted tiene en el bolsillo o encima de la mesa puede actuar como un dispositivo de escucha. "Imagina que estamos en una reunión, y yo tengo mi teléfono boca abajo encima de la mesa", explica a EL ESPAÑOL David Maeztu, abogado especializado en nuevas tecnologías que ha analizado la sentencia en su blog. "Me llama alguien con el teléfono intervenido y, como no veo la llamada, pues no cojo el teléfono; mientras el teléfono suena y no somos conscientes de ello, lo que estamos hablando entre nosotros lo está oyendo y grabando la Policía sin necesidad de instalar nada en el dispositivo". "Lo que el Supremo está diciendo", explica el letrado, "es que ese sonido ambiente antes de descolgar, que es el equivalente a tener un dispositivo de escucha, es válido como prueba si existe intervención de comunicaciones". LAS APLICACIONES Dependiendo de los permisos que concedamos a las aplicaciones que alegremente instalamos en móviles y tabletas, sus dueños tienen acceso a una gran cantidad de datos: localización del aparato, acceso a las fotos y vídeos del dispositivo, incluso a veces a la propia agenda del usuario, con la excusa de buscar otros usuarios con los que interactuar. Así damos acceso a compañías -y, a veces, a ciberintrusos- a un nivel muy profundo en nuestros dispositivos. Interactuar con los dispostivos mediante la voz está de moda. La interfaz para hablar con una máquina requiere que ésta tenga micrófono. "Siri, de Apple, por ejemplo, no hace la interpretación de tu voz en el teléfono, sino que la comprime y la envía a un servidor que tienen en Cupertino o donde sea, y desde allí devuelve el resultado a tu teléfono, que es el que parece que te responde", explica Juan. "Básicamente, todo lo que le dices a Siri sale de tu teléfono; es más, existe una opción de activar a Siri sin necesidad de apretar el botón, por lo que lo que esto nos dice es que el teléfono necesariamente te está escuchando". Si encima permites que la aplicación envíe más información para mejorar el servicio, estás dando permiso a los responsables de la aplicación de turno para hacer casi lo que quieran. Existen herramientas que afirman ser capaces de monitorizar el uso de los teléfonos corporativos -o el de los de nuestros hijos- a fondo. Por supuesto, muchas aplicaciones son una puerta de entrada a malware espía que puede exponer todo tu contenidos a terceros. Y los propios servicios de espionaje de medio planeta utilizan programas espía como FinFisher de Gamma Group o las plataformas de control remoto de Hacking Team, con capacidad para espiar en todo tipo de sistemas. EL COCHE En plena euforia de coche conectado, los problemas en cuanto a la vigilancia son muy parecidos a los que tienen los teléfonos inteligentes. De hecho, coche y móvil tienen cada vez una relación más estrecha. Aquí no hablamos de los automóviles autónomos y sus posibles problemas -como el hackeo de sus sistemas o las cuestiones de responsabilidad ante posibles accidentes- sino simplemente lo que el vehículo puede llegar a saber de ti. Existe una enorme cantidad de datos que se pueden recoger de un conductor sin que éste apenas se entere: cómo conduce, a qué velocidad, si es prudente o agresivo, si es propenso a bruscos acelerones o frenazos, por dónde circula (gracias al GPS), qué música escucha si utiliza algún servicio online... Y la vigilancia no sólo se limita al propio vehículo, sino a las carreteras y las calles por las que circula: cámaras, sensores y radares se encargan de medir y controlar el comportamiento de los ciudadanos al volante. Esos datos son muy valiosos para, por ejemplo, la compañías aseguradoras, que podrían variar los precios de sus clientes de una forma personalizada. LA TELE Y LAS CONSOLAS Las consolas de videojuegos fueron pioneras a la hora de introducir cámaras y micrófonos en el salón de casa, pero su generalización llegó con el boom de los televisores inteligentes conectados a internet. "Los televisores conectados a Internet son capaces de captar imágenes y audio, especialmente la voz del usuario, para interpretar movimientos y recibir órdenes", comenta Juan. "Una vez que tienes la tele conectada a internet, y ésta tiene micrófono, estás perdido: te pueden espiar en tu propia casa, de forma relativamente fácil además", añade, y apunta: "Recuerdo que uno de los primeros televisores con conexión a internet que salieron ya tenía una vulnerabilidad que permitía, precisamente, escuchar lo que pasaba en el salón del dueño del aparato; esto ya no es ciencia ficción, sino una realidad muy cotidiana". MÁS Y MÁS CONECTADOS En un mundo con cada vez más dispositivos conectados, cualquier objeto 'inteligente' que disponga de sensores, cámaras o micrófonos puede 'vigilar' tus movimientos y enviar datos a servidores que raramente sabemos dónde están. ¿Está tu nevera conectada a la Red? ¿Y tu lavadora? ¿Y la cámara que controla al bebé de la habitación de al lado? Tal y como advierten expertos en ciberseguridad como James Lyne, máximo responsable de investigación de la compañía Sophos, las tecnologías y técnicas asociadas al fenómeno big data -recogida y análisis masivo de datos- hace que sea muy fácil estar constantemente monitorizado y, casi siempre, desconocemos hasta qué punto. Por eso, la sentencia del Tribunal Supremo que avala el uso del móvil como "micrófono ambiental" incluso antes de descolgar una llamada inquieta a los más concienciados sobre la importancia de la privacidad. La única forma segura 100% de que no te estén haciendo nada con el teléfono es romperlo Según el abogado especializado en nuevas tecnologías Carlos Sánchez Almeida, "hoy por hoy no hay nada ni nadie que escape a la vigilancia". Y apunta que la Ley Orgánica 13/2015 dejó en manos de los jueces la decisión de permitir a la Policía utilizar medios de intrusión electrónica para perseguir "delitos cometidos a través de instrumentos informáticos o de cualquier otra tecnología de la información o la telecomunicación o servicio de comunicación" con un amplio margen de maniobra. "En la práctica, pueden inspeccionarnos todo", advierte, "esta ley supone una colonoscopia a toda nuestra intimidad". Desde el punto de vista tecnológico, Miguel Ángel Juan recuerda que "antes, en la época analógica, no era posible tanto intrusismo, pero con la llegada de más y más electrónica las posibilidades se ampliaron". "Incluso con el teléfono apagado, hay determinadas aplicaciones con privilegios suficientes capaces de dar la posibilidad a un tercero de encender el teléfono; igualmente podrían activarte el micrófono", dice, y comenta: "La única forma segura 100% de que no te estén haciendo nada con el teléfono es romperlo".

The CyberWire
RSA 2017 Roundup – Perspectives, Pitches and Predictions

The CyberWire

Play Episode Listen Later Mar 6, 2017 45:09


In this CyberWire 2017 RSA Conference special edition, we wrap up our show coverage with insights from experts, about the trends they’re seeing, the products they’re pitching, and where they think we, as an industry, need to go. Guests include: Mark Dufresne, Director, Threat Research and Adversary Prevention, Endgame https://www.linkedin.com/in/mark-dufresne-b3275610a/   James Lyne, Global Head of Security Research, Sophos https://www.linkedin.com/in/jameslyne/   Emily Mossburg, Principal, Cyber Risk Services Leadership Team, Deloitte & Touche https://www.linkedin.com/in/emilymossburg/   Mark Nunnikhoven, Vice President, Cloud Research, Trend Micro https://www.linkedin.com/in/marknca/   Levi Gundert, Vice President of Intelligence and Strategy, Recorded Future https://www.linkedin.com/in/levigundert/   Carl Leonard, Principal Security Analyst, Forcepoint https://www.linkedin.com/in/carl-leonard-5486405/   Evan Blair, Founder, ZeroFOX https://www.linkedin.com/in/evanblair/   Gabby Nizri, Founder and CEO, Ayehu Software Technologies https://www.linkedin.com/in/gabbynizri/   Jason Porter, Vice President Security Solutions, AT&T https://www.linkedin.com/in/jason-porter-4a604757/  

The CyberWire
Ukraine accused Russia of renewed hacking by BlackEnergy actors. ASLR bypass proof-of-concept reported.  Notes from RSA, and an update on Android gunnery malware.

The CyberWire

Play Episode Listen Later Feb 16, 2017 14:33


In today's podcast, in addition to notes from RSA, we hear some fresh accusations of Russian government hacking from Ukraine. Threat actors adapt. ASLR bypass exploit demonstrated. Yahoo!'s acquisition by Verizon appears likely to be deeply discounted. From RSA, notes on coming industry consolidation. Dale Drew from Level 3 Communications offers a strategy for choosing security vendors. James Lyne from Sophos provides his take of the RSA conference from the show floor. An update on the Popr-D3 Android malware. How they name the bears.

ControlTalk Now  The Smart Buildings Podcast
ControlTalk NOW — Smart Buildings VideoCast|PodCast for Week Ending Nov 13, 2016

ControlTalk Now The Smart Buildings Podcast

Play Episode Listen Later Nov 13, 2016 72:33


ControlTalk NOW — Smart Buildings VideoCast|PodCast for week ending Nov 13, 2016 features an interview with Therese Sullivan of BuildingContext.Me, our eyes and ears covering Silicon Valley and the possibility of buying back your data from your cloud services provider. Much more to follow: EasyIO Europe training dates; Yardi Matrix 2016 Review and 2017 Forecast Webinar; CoRE Tech 2016 Review; Flame Safeguard Parable from CGNA Distributors; Honeywell N4 Certification Discount; Sophos’ James Lyne How to Hack CCTV Cameras; and ControlTalk Rewind with Ken Sinclair, “The Times They are A Changin’.” ControlTalk NOW interview with Therese Sullivan of BuildingContext.Me, our eyes and ears from Silicon Valley. In this interview Therese tells us about her latest Silicon Valley coverage and delivers another round of advanced sapience, issuing a not so far-fetched warning about the next lock-in battlefield — waged in the cloud, where your data is being sold, and like it or not, you may have to buy it back from your service provider. EasyIO Europe CPT & EasyStack Training Sessions Coming Up. We are very pleased to inform you about the upcoming CPT and EasyStack trainings. The CPT training is scheduled for the 28th and the 29th of November. The EasyStack training is scheduled for the 30th of November and the 1st and the 2nd of December. The trainings are the best way to get to know how to work with the CPT tools and the EasyIO FG series and EasyStack. Yardi Matrix – 2016 Review and 2017 Forecast – Webinar Thursday, Nov 10, 2016 10:00AM PDT – 11:00AM PDT. Professional investors are worried. 2016 has done little to allay the fear that the investment cycle has hit a slowdown, and questions have emerged. Is this the end of a successful long run and will those still in the market be left holding assets with diminishing values? CoRE Tech 2016 – Realcomm Nov 16-17, 2016 Program Details: The CoRE Tech education program is designed to give CORPORATE REAL ESTATE DIRECTORS, CIOs, FACILITY MANAGERS, BUILDING ENGINEERS, ENERGY and SUSTAINABILITY EXECUTIVES, PORTFOLIO MANAGERS and ASSET MANAGERS the technology tools they need to positively impact the bottom line of their companies – from automating business processes, to general technology solutions specifically for corporate real estate organizations, to smarter intelligent building technologies. A Flame Safeguard Parable from the Distributors at Controls Group North America.There is a saying we have all heard, “penny wise, pound foolish.” which I’ve taken to mean, “making decisions to save small amounts of money (pennies), that end up making bad sense for affecting larger amounts of money and potential liability.” In this video, created by the elite Flame Safeguard Distributors that are members of Controls Group North America, you get to experience a realistic simulation of what could happen when you take financial shortcuts at the sake of safety. Contact your nearest CGNA Distributor for assistance. Honeywell Discount on Niagara 4 Certification Training. 50% Discount on Niagara 4 Certification Training! Honeywell is offering a 50% discount to Authorized System Distributors towards Niagara 4 (WEBs-N4) Certification training (unlike the WEBs-N4 Crossover training) when an order of $60K or greater of WEBs integration products that are purchased between now and November 21, 2016. In addition, Authorized WEBs Contractors earn double CPRO points on any order amount of WEBs integration products purchased between November 11, 2016 through December 2, 2016. How to Hack a CCTV Camera with Primitive Methods from James Lyne of Sophos. Sophos researcher James Lyne demonstrates how to hack an Internet-connected CCTV camera and an Android-powered phone using staggeringly simple methods. James Lyne is global head of security research at the security firm Sophos. James, a self-professed ‘massive geek’ has technical expertise spanning a variety of the security domains from forensics to offensive security. He has worked with many organizations on security strategy, handled a number of severe incidents and is a frequent industry advisor. ControlTalk Rewind: Ken Sinclair “The Times They Are A Changin’.” “The Times They Are A Changin’” Bob Dylan said this in a song in 1964, and our very own Ken Sinclair echoes this sentiment in 2016. If you missed the October 30th Episode of ControlTalk Now The Smart Buildings Video Cast, you missed our awesome interview with Ken in which he lays out the changes that are afoot in the Building Automation and Smart Buildings controls world. Make no mistake, these changes will have a dramatic effect on all of us. So if you missed the show, no worries, you can see the interview with Ken right here right now. The post ControlTalk NOW — Smart Buildings VideoCast|PodCast for Week Ending Nov 13, 2016 appeared first on ControlTrends.

InfosecurityEurope's posts
Keynote Roundup: James Lyne, Global Head of Security Research, Sophos & Certified SANS Instructor

InfosecurityEurope's posts

Play Episode Listen Later Jun 16, 2016 44:10


Listen to Global Head of Security Research, Sophos & Certified SANS Instructor, James Lyne's keynote on Securing the Internet of Things: What is the Real Risk for Enterprise Cyber Security? from #infosec16

Paul's Security Weekly (Podcast-Only)
Paul's Security Weekly #459 - Interview with James Lyne

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Jun 2, 2016 94:29


We interview James Lyne from SANS. He comes from a background in cryptography but over the years has worked in a wide variety of security problem domains including anti-malware and hacking. James spent many years as a hands-on analyst dealing with deep technical issues and is a self-professed "massive geek".

snoop dogg lyne antimalware james lyne paul's security weekly
Paul's Security Weekly (Video-Only)
Security Weekly #459 - Interview with James Lyne

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Jun 2, 2016 45:22


We interview James Lyne from SANS. He comes from a background in cryptography but over the years has worked in a wide variety of security problem domains including anti-malware and hacking. James spent many years as a hands-on analyst dealing with deep technical issues and is a self-professed "massive geek".

snoop dogg lyne security weekly antimalware james lyne
Paul's Security Weekly TV
Security Weekly #459 - Interview with James Lyne

Paul's Security Weekly TV

Play Episode Listen Later Apr 8, 2016 45:22


We interview James Lyne from SANS. He comes from a background in cryptography but over the years has worked in a wide variety of security problem domains including anti-malware and hacking. James spent many years as a hands-on analyst dealing with deep technical issues and is a self-professed "massive geek".

snoop dogg lyne security weekly antimalware james lyne
Paul's Security Weekly
Security Weekly #459 - Interview with James Lyne, Instructor at SANS Institute

Paul's Security Weekly

Play Episode Listen Later Apr 8, 2016 94:29


We interview James Lyne from SANS. He comes from a background in cryptography but over the years has worked in a wide variety of security problem domains including anti-malware and hacking. James spent many years as a hands-on analyst dealing with deep technical issues and is a self-professed "massive geek".

CBI
James Lyne, Global Head of Security Research, Sophos

CBI

Play Episode Listen Later Jun 30, 2015 31:11


James presents a live demo of how attackers gain access to your network and steal your data, with top level advice on the critical security controls you can put in place to protect your data at the CBI's Cyber Security Conference. June 2015. Read more about the event here - http://bit.ly/1g5YHfp

Säkerhetspodcasten
Intervjuavsnitt #10 - James Lyne

Säkerhetspodcasten

Play Episode Listen Later Aug 6, 2014 30:14


Detta avsnittet av Säkerhetspodcasten bjuder vi på en "exklusiv" intervju med Sophos egna James Lyne. Inspelat på SANS Pentest Training i Berlin 2014.

Sophos Podcasts
Operation Aurora: The attack on Google

Sophos Podcasts

Play Episode Listen Later Oct 25, 2013 11:55


Chester Wisniewski of Sophos Canada and James Lyne from the Office of the CTO discuss Operation Aurora: The attack on Google, what it means to businesses, and what we should be doing to better protect our networks.

Sophos Podcasts
Windows 7 in the security spotlight

Sophos Podcasts

Play Episode Listen Later Oct 25, 2013 11:02


Sophos senior technologist James Lyne discusses Windows 7 from the security point of view, looking at the Action Center, enhancements in the Windows firewall, Direct Access and the controversy surrounding XP mode.

Sophos Podcasts
Virtualization and encryption: the security facts

Sophos Podcasts

Play Episode Listen Later Oct 25, 2013 5:57


More organizations are looking to virtualize their servers, but few are considering the associated security concerns. James Lyne, senior technologist at Sophos, explains why encrypting virtualized servers will avoid costly leaks.

Sophos Podcasts
Understanding hypervisor security

Sophos Podcasts

Play Episode Listen Later Oct 25, 2013 7:06


James Lyne, senior technologist at Sophos, and Sunil Choudrie, virtualisation specialist, discuss the capability gap between hypervisor scanning agents and the modern protection agent.

security sophos hypervisor james lyne
Sophos Podcasts
Sophos Security Chet Chat - Episode 7 - April 27, 2010

Sophos Podcasts

Play Episode Listen Later Oct 25, 2013 11:10


This week Chester Wisniewski talks about "Social Engineering-as-a-Service," false positives and data security with James Lyne from the Office of the CTO at Infosecurity Europe 2010 in London.

Sophos Podcasts
Security and server virtualization

Sophos Podcasts

Play Episode Listen Later Mar 24, 2009 6:47


Carole Theriault interviews James Lyne from the technology office at Sophos about the security risks associated with virtualized server systems and how new security technologies may help to overcome these attacks.

security server virtualization sophos james lyne carole theriault