POPULARITY
In this episode of the Elevate Women in Tech podcast,host Kellie Kwarteng interviews Rebecca Taylor, a Threat Intelligence Knowledge Manager at SecureWorks a Sophos Company, who was recognised as Computing's Security Woman of the Year 2024 and Most Inspiring Woman in Cyber 2024. Rebecca shares her remarkable journey from being a personal assistant to becoming a cybersecurity expert, demonstrating that non-traditional backgrounds can thrivein the industry.Key Highlights:Rebecca reveals her 11-year career path from PA to Threat Intelligence Knowledge Manager The conversation challenges persistent myths about cybersecurity careers, including that you need to be technical or have loved STEM subjects from childhoodRebecca explains threat intelligence as "anything that pertains to our understanding of the threat," and demystifies the "dark web" using an iceberg analogyThe discussion explores how women currently make up 25% of the global cybersecurity workforceRebecca shares insights from her TEDx talk "Digital Shadows" about the dangers of premature digital footprints for childrenRevealing her upcoming book "Securely Yours, An Agony Aunt's Guide to Surviving Cyber" (OUT NOW) Why Listen:This episode offers a refreshing perspective on cybersecurity careers, making the field accessible to listeners from allbackgrounds. Rebecca's journey proves that passion, core skills, and willingness to learn can overcome traditional barriers to entry. The conversation provides practical advice for anyone interested in cybersecurity while delivering eye-opening insights about online safety that are relevant to everyone.Tune in to discover how your unique skills might translate to cybersecurity, understand the realities of the dark web, and learn how to protect yourself and your loved ones in the digital age.Relevant links: SANS Institute - https://www.sans.org/cybersecurity-focus-areas/UK Cyber Security Council - Career Pathways - https://www.ukcybersecuritycouncil.org.uk/careers-and-learning/cyber-career-framework/?gad_source=1&gad_campaignid=20404142818&gbraid=0AAAAApflzhayqCu2PW75Lq-Qx8Z43XTOH&gclid=EAIaIQobChMIpKzhtvSejQMV9JNQBh2MWjdPEAAYASAAEgIS3_D_BwESecurely Yours - Book link - https://amzn.eu/d/1pVjhTvTedX – Digital Shadows https://www.youtube.com/watch?v=VyfhkfE3nHA
* Banks at Risk: Nearly 100 Staff Logins Stolen by Cybercriminals* 'AirBorne' Vulnerabilities Expose Apple Devices to Remote Code Execution Attacks* WhatsApp Introduces 'Private Processing' for Secure Cloud-Based AI Features* Microsoft Warns Default Kubernetes Helm Charts Create Security Vulnerabilities* Security Concerns Grow Over Electric Vehicles as Potential Surveillance PlatformsBanks at Risk: Nearly 100 Staff Logins Stolen by Cybercriminalshttps://www.abc.net.au/news/2025-05-01/bank-employee-data-stolen-with-malware-and-sold-online/105232872Cyber criminals have stolen almost 100 staff logins from Australia's "Big Four" banks, potentially exposing these financial institutions to serious cyber threats including data theft and ransomware attacks, according to recent findings from cyber intelligence firm Hudson Rock.The compromised credentials belong to current and former employees and contractors at ANZ, Commonwealth Bank, NAB, and Westpac, with ANZ and Commonwealth Bank experiencing the highest number of breaches. All stolen credentials included corporate email addresses with access to official bank domains."There are around 100 compromised employees that are related to those four banks," said Hudson Rock analyst Leonid Rozenberg. While this number is significantly smaller than the 31,000 customer banking passwords recently reported stolen, the security implications could be more severe."Technically, [attackers] need only one [login] to do a lot of damage," Rozenberg warned.The credentials were stolen between 2021 and April 2025 using specialized "infostealer" malware designed to harvest sensitive data from infected devices. These stolen credentials have subsequently appeared on Telegram and dark web marketplaces.Security experts explain that these breaches could potentially give hackers "initial access" to the banks' corporate networks. While banks employ additional security measures such as Multi-Factor Authentication (MFA), specialized cybercriminals known as "initial access brokers" focus on finding ways around these protections, often targeting employees working from home.The investigation also uncovered a concerning number of compromised third-party service credentials connected to these banks, with ANZ having more than 100 such breaches and NAB more than 70. These compromised services could include critical communication and project management tools like Slack, JIRA, and Salesforce.All four banks have responded by stating they have multiple safeguards in place to prevent unauthorized access. NAB reports actively scanning cybercrime forums to monitor threats, while CommBank noted investing over $800 million in cybersecurity and financial crime prevention last financial year.The Australian Signals Directorate has already warned that infostealer infections have led to successful attacks on Australian businesses, highlighting that this threat extends beyond the banking sector to organizations across all industries.'AirBorne' Vulnerabilities Expose Apple Devices to Remote Code Execution Attackshttps://www.oligo.security/blog/airborneSecurity researchers at Oligo Security have uncovered a serious set of vulnerabilities in Apple's AirPlay protocol and software development kit (SDK) that could allow attackers to remotely execute code on affected devices without user interaction. These flaws, collectively dubbed "AirBorne," affect millions of Apple and third-party devices worldwide.The security team discovered 23 distinct vulnerabilities that enable various attack vectors, including zero-click and one-click remote code execution, man-in-the-middle attacks, denial of service attacks, and unauthorized access to sensitive information. Perhaps most concerning are two specific flaws (CVE-2025-24252 and CVE-2025-24132) that researchers demonstrated could create "wormable" zero-click attacks, potentially spreading from device to device across networks.Another critical vulnerability (CVE-2025-24206) enables attackers to bypass the "Accept" prompt normally required for AirPlay connections, creating a pathway for truly zero-interaction compromises when combined with other flaws."This means that an attacker can take over certain AirPlay-enabled devices and do things like deploy malware that spreads to devices on any local network the infected device connects to," warned Oligo. "This could lead to the delivery of other sophisticated attacks related to espionage, ransomware, supply-chain attacks, and more."While exploitation is limited to attackers on the same network as vulnerable devices, the potential impact is extensive. Apple reports over 2.35 billion active devices worldwide, and Oligo estimates tens of millions of additional third-party AirPlay-compatible products like speakers, TVs, and car infotainment systems could be affected.Apple released security updates on March 31 to address these vulnerabilities across their product line, including patches for iOS 18.4, iPadOS 18.4, macOS versions (Ventura 13.7.5, Sonoma 14.7.5, and Sequoia 15.4), and visionOS 2.4 for Apple Vision Pro. The company also updated the AirPlay audio and video SDKs and the CarPlay Communication Plug-in.Security experts strongly advise all users to immediately update their Apple devices and any third-party AirPlay-enabled products. Additional protective measures include disabling AirPlay receivers when not in use, restricting AirPlay access to trusted devices via firewall rules, and limiting AirPlay permissions to the current user only.WhatsApp Introduces 'Private Processing' for Secure Cloud-Based AI Featureshttps://engineering.fb.com/2025/04/29/security/whatsapp-private-processing-ai-tools/Meta's WhatsApp has announced a new privacy-focused technology called 'Private Processing' that will allow users to access advanced artificial intelligence features while maintaining data security. The system is designed to enable AI functionalities like message summarization and writing suggestions that are too computationally intensive to run directly on users' devices.The new feature, which will be rolled out gradually over the coming weeks, will be entirely opt-in and disabled by default, giving users complete control over when their data leaves their device for AI processing.Private Processing employs several layers of security to protect user privacy. When activated, the system first performs anonymous authentication through the user's WhatsApp client. It then retrieves public encryption keys from a third-party content delivery network (CDN), ensuring Meta cannot trace requests back to specific individuals.To further enhance privacy, users' devices connect to Meta's gateway through a third-party relay that masks their real IP addresses. The connection establishes a secure session between the user's device and Meta's Trusted Execution Environment (TEE), using remote attestation and TLS protocols.All requests for AI processing use end-to-end encryption with ephemeral keys, and the processing occurs inside a Confidential Virtual Machine (CVM) that remains isolated from Meta's main systems. According to Meta, the processing environment is stateless, with all messages deleted after processing, retaining only "non-sensitive" logs."The AI-generated response is encrypted with a unique key only known to the device and processing CVM and is sent back over the secure session for decryption on the user's device," the company explained.To build trust in the system, WhatsApp has promised to share the CVM binary and portions of the source code for external validation. The company also plans to publish a detailed white paper explaining the secure design principles behind Private Processing.Despite these security measures, privacy experts note that sending sensitive data to cloud servers always carries some inherent risk, even with robust encryption in place. Users concerned about data privacy can either keep the feature disabled or utilize WhatsApp's recently launched 'Advanced Chat Privacy' feature, which provides more granular control over when data can leave the device.Microsoft Warns Default Kubernetes Helm Charts Create Security Vulnerabilitieshttps://techcommunity.microsoft.com/blog/microsoftdefendercloudblog/the-risk-of-default-configuration-how-out-of-the-box-helm-charts-can-breach-your/4409560Microsoft security researchers have issued an urgent warning about significant security risks posed by default configurations in Kubernetes deployments, particularly when using out-of-the-box Helm charts. These configurations can inadvertently expose sensitive data to the public internet without proper authentication protections.According to a new report from Michael Katchinskiy and Yossi Weizman of Microsoft Defender for Cloud Research, many popular Helm charts lack basic security measures, often leaving exploitable ports open and implementing weak or hardcoded passwords that are easy to compromise."Default configurations that lack proper security controls create a severe security threat," the Microsoft researchers warn. "Without carefully reviewing the YAML manifests and Helm charts, organizations may unknowingly deploy services lacking any form of protection, leaving them fully exposed to attackers."Kubernetes has become a widely adopted open-source platform for automating containerized application deployment and management, with Helm serving as its package manager. Helm charts function as templates or blueprints that define resources needed to run applications through YAML files. While these charts offer convenience by simplifying complex deployments, their default settings often prioritize ease of use over security.The report highlights three specific examples demonstrating this widespread issue. Apache Pinot's Helm chart exposes core services through Kubernetes LoadBalancer services with no authentication requirements. Meshery allows public sign-up from exposed IP addresses, potentially giving anyone registration access to cluster operations. Meanwhile, Selenium Grid exposes services across all nodes in a cluster through NodePort, relying solely on external firewall rules for protection.The Selenium Grid vulnerability is particularly concerning as cybersecurity firms including Wiz have already observed attacks targeting misconfigured instances to deploy XMRig miners for cryptocurrency mining.Organizations using Kubernetes are advised to implement several key mitigation strategies. Microsoft recommends thoroughly reviewing default configurations of Helm charts before deployment, ensuring they include proper authentication mechanisms and network isolation. Regular scans for misconfigurations that might publicly expose workload interfaces are crucial, as is continuous monitoring of containers for suspicious activity.The findings underscore a critical tension in cloud deployment between convenience and security, with many users — particularly those inexperienced with cloud security — inadvertently creating vulnerabilities by deploying charts without customizing their security settings.Security Concerns Grow Over Electric Vehicles as Potential Surveillance Platformshttps://www.theguardian.com/environment/2025/apr/29/source-of-data-are-electric-cars-vulnerable-to-cyber-spies-and-hackersCybersecurity experts are raising alarms about the potential for electric vehicles to be exploited as surveillance tools, particularly those manufactured in China, according to recent reports from the UK.British defense firms working with the UK government have reportedly warned staff against connecting their phones to Chinese-made electric cars due to concerns that Beijing could extract sensitive information from their devices. The warning highlights growing security considerations around the increasingly sophisticated technology embedded in modern electric vehicles.Security specialists interviewed by The Guardian note that electric vehicles are equipped with multiple data collection points, including microphones, cameras, and wireless connectivity features that could potentially be leveraged by malicious actors or hostile states."There are lots of opportunities to collect data and therefore lots of opportunities to compromise a vehicle like that," explains Rafe Pilling, director of threat intelligence at cybersecurity firm Secureworks. He points out that over-the-air update capabilities, which allow manufacturers to remotely update a car's operating software, could potentially be used to exfiltrate data.The concerns are particularly focused on individuals in sensitive positions. "If you are an engineer who is working on a sixth-generation fighter jet and you have a work phone that you are connecting to your personal vehicle, you need to be aware that by connecting these devices you could be allowing access to data on your mobile," warns Joseph Jarnecki, a research fellow at the Royal United Services Institute.Chinese electric vehicle manufacturers such as BYD and XPeng have drawn particular scrutiny due to China's National Intelligence Law of 2017, which requires organizations and citizens to cooperate with national intelligence efforts. However, experts also note there is currently no public evidence of Chinese vehicles being used for espionage.Cybersecurity professionals suggest that concerned drivers can click "don't trust" when connecting devices to their vehicles, but this sacrifices many convenient features. They also caution against syncing personal devices with rental cars, as this can leave sensitive data in the vehicle's systems.The UK government has acknowledged the issue, with Defence Minister Lord Coaker stating they are "working with other government departments to understand and mitigate any potential threats to national security from vehicles." He emphasized that their work applies to all types of vehicles, not just those manufactured in China.While the Society of Motor Manufacturers and Traders (SMMT) maintains that all manufacturers selling cars in the UK must adhere to data privacy regulations, the growing integration of connected technologies in electric vehicles continues to raise new security considerations for both government officials and everyday consumers alike. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit edwinkwan.substack.com
Don Smith leads the CTU Threat Research group at Secureworks. His career starting with the creation of dns in 2005, and which was acquired by SecureWorks in 2009. He has extensive knowledge in cybersecurity and is seen as a world-leader in the field. Don is also the industry co-chair of the Strategic Cyber Industry Group in the National Cybercrime Unit at the UK National Crime Agency and a member of the UK National Cyber Advisory Board. He is also the co-chair of the Cyber League at the NCSC.
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc In the leadership and communications segment, The CISO Transformation — A Path to Business Leadership, The CISO's dilemma of protecting the enterprise while driving innovation, When Hiring, Emphasize Skills over Degrees, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-385
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc Show Notes: https://securityweekly.com/bsw-385
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc In the leadership and communications segment, The CISO Transformation — A Path to Business Leadership, The CISO's dilemma of protecting the enterprise while driving innovation, When Hiring, Emphasize Skills over Degrees, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-385
After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc Show Notes: https://securityweekly.com/bsw-385
Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity verification. They have microphones, cameras, depth sensors, and fingerprint readers in some cases. With face scanning quickly becoming the de facto technology used for identity verification, it was a no-brainer for Nametag to build a solution around mobile devices to address employment scams. Segment Resources: Company website Aaron's book, Loyal Listeners of the show are probably aware (possibly painfully aware) that I spend a lot of time analyzing breaches to understand how failures occurred. Every breach story contains lessons organizations can learn from to avoid suffering the same fate. A few details make today's breach story particularly interesting: It was a Chinese APT Maybe the B or C team? They seemed to be having a hard time Their target was a blind spot for both the defender AND the attacker Segment Resources: https://www.binarydefense.com/resources/blog/shining-a-light-in-the-dark-how-binary-defense-uncovered-an-apt-lurking-in-shadows-of-it/ https://www.theregister.com/2024/09/18/chinesespiesfoundonushqfirm_network/ This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-393
Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity verification. They have microphones, cameras, depth sensors, and fingerprint readers in some cases. With face scanning quickly becoming the de facto technology used for identity verification, it was a no-brainer for Nametag to build a solution around mobile devices to address employment scams. Segment Resources: Company website Aaron's book, Loyal Listeners of the show are probably aware (possibly painfully aware) that I spend a lot of time analyzing breaches to understand how failures occurred. Every breach story contains lessons organizations can learn from to avoid suffering the same fate. A few details make today's breach story particularly interesting: It was a Chinese APT Maybe the B or C team? They seemed to be having a hard time Their target was a blind spot for both the defender AND the attacker Segment Resources: https://www.binarydefense.com/resources/blog/shining-a-light-in-the-dark-how-binary-defense-uncovered-an-apt-lurking-in-shadows-of-it/ https://www.theregister.com/2024/09/18/chinesespiesfoundonushqfirm_network/ This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-393
This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-393
This week, in the enterprise security news, Semgrep raises a lotta money CYE acquires Solvo Sophos completes the Secureworks acquisition SailPoint prepares for IPO Summarizing the 2024 cybersecurity market Lawyers that specialize in keeping breach details secret Scientists torture AI Make sure to offboard your S3 buckets extinguish fires with bass All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-393
Ransomware payments saw a 35% decline in 2024—what's driving the drop? Sophos finalizes its $859 million acquisition of SecureWorks, signaling more M&A activity in cybersecurity for 2025. Plus, DeepSeek AI is gaining traction in healthcare, but its data policies raise serious concerns.Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Kyle Falkenhagen is the Chief Product Officer at Secureworks. In this episode, he joins host Charlie Osborne to discuss the concept of taking an open approach to cybersecurity and what it means for organizations, including the main advantages of an open platform, building out a security operations strategy, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Stacy Leidwinger is the VP of Marketing at Secureworks. In this episode, she joins host Charlie Osborne to discuss the risks and ramifications of cyberattacks, including the role security leaders play, as well as how best to mitigate these risks, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Curt Yasm is the senior product manager at Secureworks. In this episode, he joins host Charlie Osborne to discuss identity threats, including how the landscape has evolved, the impact on organizations, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Send us a textBrad's journey from sci-fi enthusiast to cybersecurity expert is an unconventional path filled with unexpected twists and valuable insights. Hear firsthand how his initial pursuit of engineering took a dramatic turn following 9/11, leading him to the military and into the Signal Corps, where his foundation in cybersecurity was forged. Discover how his experiences at SecureWorks highlight his dedication to diversifying the cybersecurity workforce by recruiting and training talent from varied backgrounds, making this field accessible to all with a passion for tech and a willingness to learn.Step into the high-stakes environment of cybersecurity as Brad shares gripping tales from mission deployments where every second counts. Feel the adrenaline of operating in high-pressure situations and the critical role certifications play in carving out a successful career in this field. Brad sheds light on the diverse backgrounds of cybersecurity professionals, illustrating how police officers and others transitioned into this field, proving that aptitude and determination often outweigh traditional education in achieving success.In the face of rapid AI integration, organizations encounter new hurdles with shadow IT and unsanctioned applications. Explore the intricate landscape of AI security threats and the pressing need for secure implementation, as Brad outlines the challenges posed by AI's rise. With over 92% of organizations facing data breaches from unauthorized apps, the urgency for robust security measures is palpable. Concluding with ways to connect with Brad and Morphysack, this episode promises a treasure trove of insights and a peek into future conversations on emerging AI threats.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to slow down for the scan - you can just keep on walking. We don't often cover physical security, so this interview is going to be a treat for us. There are SO many questions to ask here, particularly for our hosts who have done physical penetration tests, social engineering, and tailgating in the past to get past physical security measures. This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts' sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enterprise Security Weekly. Segment description coming soon! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-382
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to slow down for the scan - you can just keep on walking. We don't often cover physical security, so this interview is going to be a treat for us. There are SO many questions to ask here, particularly for our hosts who have done physical penetration tests, social engineering, and tailgating in the past to get past physical security measures. This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts' sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enterprise Security Weekly. Segment description coming soon! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-382
This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts' sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-382
This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts' sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-382
In this episode of "Screaming in the Cloud," we're making sure things are nice and secure thanks to Ryan Nolette, Senior Security Engineer at AWS Outreach. As a part of the Outreach team, he's responsible for making everyone understand the nuances of AWS's Vulnerability Disclosure Program. Corey and Ryan explore the intricacies of AWS's approach to security, including the emphasis on communication with researchers. You'll also get an overview of what goes into Vulnerability Disclosure Programs and how it courts security researchers over “security researchers.” If there's anything you can take away from this episode, it's that Ryan takes great pride in AWS's commitment to transparency and collaboration when it comes to resolving potential security flaws.Show Highlights(0:00) Intro(0:38) Blackblaze sponsor read(1:06) The role of AWS' security team outreach group(2:21) The nuance of the Vulnerability Disclosure Program(4:05) Will the VDP program replace human interactions(10:08) Response disclosure vs. coordinated disclosure(15:26) The high-quality communication of the AWS security team(17:33) Gitpod sponsor read(18:45) Security researchers vs. "security researchers"(25:54) What's next for the VDP Program?(29:26) Avoiding "security by obscurity"(32:08) Being intentional with security messaging(36:16) Where you can find more from RyanAbout Ryan NoletteRyan is AWS's Senior Security Engineer for the Outreach Team and CoAuthor of AWS Detective. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With almost 2 decades in the infosec field, Ryan has been on the development and operations side of companies such as Postman, Sqrrl, Carbon Black, Crossbeam Systems, SecureWorks and Fidelity Investments. Ryan has been an active speaker and writer on threat hunting and endpoint securityLinksAWS VDP on HackerOne: hackerone.com/aws_vdpAWS VDP inbox: aws-security@amazon.comLinkedIn: www.linkedin.com/in/cloudy-with-a-chance-of-securityAWS Vulnerability Reporting site: https://aws.amazon.com/security/vulnerability-reporting/Give your feedback on the recently expanded VDP program: https://pulse.aws/survey/MOOFGRLMSponsorsBackblaze: https://www.backblaze.com/Gitpod: gitpod.io
00:00:00 - PreShow Banter™ — Log Con00:11:41 - BHIS - Talkin' Bout [infosec] News 2024-10-2100:12:51 - Story # 1: Internet Archive exposed again – this time through Zendesk00:14:57 - Story # 1b: Hackers steal information from 31 million Internet Archive users00:20:42 - Story # 2: Sophos buys Secureworks for $859 mln to beef up cybersecurity portfolio00:24:21 - Story # 3: USDoD hacker behind National Public Data breach arrested in Brazil00:27:12 - Story # 4: Debunking Hype: China Hasn't Broken Military Encryption With Quantum00:32:14 - Story # 5: Microsoft said it lost weeks of security logs for its customers' cloud products00:35:03 - Story # 6: Should We Chat, Too? FAQ00:40:05 - Story # 7: More than two dozen countries have used internet outages to sway elections00:43:50 - Story # 8: Pokemon dev Game Freak confirms breach after stolen data leaks online00:46:32 - Story # 9: Hackers made robot vacuums randomly yell racial slurs00:49:19 - Story # 9b: We hacked a robot vacuum — and could watch live through its camera00:50:19 - Story # 10: The government is getting fed up with ransomware payments fueling endless cycle of cyberattacks00:54:55 - Story # 11: Google's Chrome Browser Starts Disabling uBlock Origin01:01:00 - WWHF Recorvery
At Open Compute Summit this past week, key trends shaping the future of computing and infrastructure were discussed. One major concern is the global data center energy consumption, which is projected to triple by 2030, highlighting the urgent need for more efficient energy solutions. As technology advances, the shift from a 3nm process to a 2nm process is proving costly, with design costs estimated to reach a staggering $725 million, according to ARM. In response to both power demands and design challenges, liquid cooling is gaining momentum, emerging as a vital technology to improve efficiency and manage the increasing heat output from advanced computing systems. Time Stamps: 0:00 - Welcome to the Rundown 1:36 - BMC Starts Two New Companies 4:06 - CEO Indicted for Fraud 7:10 - Microsoft goes agentic AI 10:37 - Amazon Teams Up with US Department of Justice 14:30 - Perplexity Is getting Sued by Media Giants 16:44 - Sophos Acuires Secureworks 20:00 - Exciting Developments from Open Compute Summit 31:41 - The Weeks Ahead 32:56 - Thanks for Watching Hosts: Tom Hollingsworth: https://www.linkedin.com/in/networkingnerd/ Jon Swartz: https://www.linkedin.com/in/jonswartz/ Follow Gestalt IT Website: https://www.GestaltIT.com/ Twitter: https://www.twitter.com/GestaltIT LinkedIn: https://www.linkedin.com/company/Gestalt-IT #Rundown, #OCPSummit24, #AgenticAI, @NetworkingNerd, @JSwartz, @GestaltIT, @TechstrongGroup, @TechstrongTV, @TheFuturumGroup, @BMCSoftware, @Microsoft, @AWSCloud, @Sophos, @Secureworks, @perplexity_ai, @OpenComputePrj,
Sophos to acquire Secureworks, Microsoft announces 10 new AI agents, DJI sues the US Department of Defense for being listed as a “Chinese military company.” MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A special thanks to all our supporters–without you, none of thisContinue reading "iOS 18.1 Will Include Using Airpods Pro 2 As Hearing Aids – DTH"
On this episode of the Six Five Podcast - Cybersphere, host Shira Rubinoff is joined by Secureworks' Alex Rose, for a conversation that delves into the critical topic of threat intelligence within the sphere of cybersecurity. Their discussion covers: The evolving landscape of cyber threats and the importance of intelligence-driven security strategies. Insightful analysis of recent high-profile cybersecurity incidents and the lessons learned. Secureworks' unique approach to partnering with governments and organizations to fortify defenses. The role of AI and machine learning in enhancing threat detection and response capabilities. The future of cybersecurity and the collaborative efforts needed to mitigate emerging threats.
Alexandra Rose is the Director, Government Partnerships & Counter Threat Unit at Secureworks. In this episode, she joins host Heather Engel to discuss the value of threat intelligence for security leaders, including how it can reduce organizational risk, inform strategic decision-making, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Security analysts respond to security detections and alerts. As part of this, they have to sift through a mountain of data and they have to do it fast. Not in hours, not in days. In minutes.Tom Harrison, security operations manager at Secureworks, explains it perfectly, “We have a time crunch and it's exacerbated by the other big issue security analysts have: we have an absolute ton of data that we have to sift through.”In this episode:Tom explains that security analysts are forced to go back to a pile of data with each subsequent question in their workflow. That's a huge waste of time. And a terrible user experience. Tom says, “It would lead to better accuracy, faster triage, and a better user experience if you can just take me directly to the answer or at the very least a subsection that has the answer I'm looking for.”What does this mean for you as a UX designer designing security products? You need a deep understanding of security analyst workflows to help them identify and respond to attacks as quickly as possible.That way, you can design security products that support users who are under intense pressure to do things quickly. Tom describes how the UX can “guide or complement the workflow.”Tom talks about what gets him excited about integrating AI into security analyst workflows—and what has him worried, as well.Tom Harrison is a Security Operations Manager at Secureworks. We dubbed Tom an “ideas machine” and a fierce advocate for the security analyst user experience. In fact, Tom is conducting UX research in the field better than most UX researchers. He's a passionate teacher and shares his knowledge and resources in a free security reference guide.
Join Lee Rennick at the #CIO100 as she interviews Mike Aiello, CTO, SecureWorks about the award-winning project, Integrated AI for better Security Options and more.
The global meltdown caused by Crowdstrike's failures last month has thrust online security back into the spotlight.See omnystudio.com/listener for privacy information.
Cybercrime is surging, costing trillions of dollars globally this year alone. Alarmingly, despite this threat, millions of cybersecurity jobs stand vacant. The culprit? A lack of gender diversity. Women are a vast pool of untapped talent, and according to Wendy Thomas, CEO at Secureworks, they hold the key to fortifying our defenses. To learn more about Secureworks, visit https://secureworks.com. For more on women in cybersecurity, you can visit our website at https://cybersecurityventures.com.
Cybercrime Magazine attended the 2024 RSA Conference in San Francisco, California, where we spoke with top executives from some of the hottest companies in cybersecurity. During these discussions, one topic consistently rose to the forefront: artificial intelligence. Featured speakers include Ryan Munsch, Principal Program Manager at Microsoft; Tim Gallo, Head of Global Solutions Architects at Google; Yotam Segev, Co-Founder and CEO at Cyera; Stacy Leidwinger, VP of Marketing at Secureworks; Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4; Debbie Gordon, Founder and CEO at Cloud Range; and Seemant Sehgal, Founder and CEO at Breachlock. • For more on cybersecurity, visit us at https://cybersecurityventures.com
How do you help security teams understand what happened and what to do next? Data science can help with that. Serge-Olivier Paquette, CPO at threat intelligence and analytics platform Flare, combines product, cybersecurity, and data science expertise to develop cutting-edge products and experiences that help security teams make informed decisions.In this episode:The best explanation of data science you've ever heard.Why you need to skeptical of data science models.How to leverage data science to be more helpful to security teams.How to build trust—particularly when tools can increasing perform actions on behalf of users.Serge-Olivier Paquette is CPO at Flare, a cybersecurity platform that helps organizations proactively identify security threats. He works at the intersection of product management, data science, cybersecurity, and platform engineering. Serge-Olivier was previously tech lead and senior manager at Secureworks.
Watch Carol and Tim LIVE every day on YouTube: http://bit.ly/3vTiACF. Bloomberg News National Security Reporter Kate O'Keeffe discusses Huawei Technologies, the Chinese telecommunications giant blacklisted by the US, secretly funding cutting-edge research at American universities including Harvard through an independent Washington-based foundation. Informatica CEO Amit Walia talks about the company's successful transition to a cloud-centric model. Bloomberg Businessweek Columnist Max Chafkin and Bloomberg News US Semiconductor Reporter Ian King provide the details of their Businessweek Magazine story Intel Is Spending $28 Billion to Make Ohio a Global Chip Capital. Wendy Thomas, CEO at Secureworks, discusses the business of cybersecurity ahead of the RSA conference next week. And we Drive to the Close with Louis Navellier, Founder and CIO at Navellier & Associates.Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
In this week's episode of The Future of Security Operations podcast, Thomas is joined by Brent Deterding. Brent has over 25 years of experience in security, both on the vendor side and now as a security leader. He spent a big part of his career with cloud-native security analytics platform SecureWorks, and he's currently the CISO of Afni, a global provider of contact center solutions in the U.S., Philippines, and Mexico. Brent and Thomas discuss: - His unconventional path to becoming a CISO - Building a security team with zero attrition - Removing the burden of stress in incident response - Strategies for risk prioritization - Facing off against cybercriminal group Scattered Spider - Why prioritization and leadership are among security's biggest challenges - Being dubbed "the happy CISO" after reporting high levels of job satisfaction - Brent's four security non-negotiables - The right way to approach CISOs as a security vendor - Measuring success when you're metrics-averse - What the SOC will - and should - look like in five years The Future of Security Operations is brought to you by Tines, the smart, secure workflow builder that powers some of the world's most important workflows. https://www.tines.com/solutions/security Where to find Brent Deterding: LinkedIn: https://www.linkedin.com/in/brent-deterding/ Afni: https://www.afni.com/ Where to find Thomas Kinsella: LinkedIn: https://www.linkedin.com/in/thomas-kinsella/ Twitter/X: https://twitter.com/thomasksec Tines: https://www.tines.com/ Resources mentioned: How to connect with me as a vendor by Brent Deterding on LinkedIn: https://www.linkedin.com/feed/update/urn:li:activity:7146566282128076800/ In this episode: [01:56] Brent's unconventional path to becoming a CISO [04:10] Finding the right fit at Afni [06:09] Separating his identity from his job and removing the burden of stress [10:22] Why Brent sees risk prioritization and leadership as security's biggest challenges [13:02] Brent's first steps as CISO at Afni including deploying MFA across 10,000 employees [16:29] Going up against threat group Scattered Spider [17:43] Brent's custom risk frameworks [23:03] Measuring success as someone who's metrics-averse [26:19] How Brent developed his unique leadership style [29:13] Supporting his team to do their best work [31:55] Brent's tips for security vendors [36:07] Using AI for resilience and protection [39:20] What security could and should look like in five years [42:53] Connect with Brent
Women held 25 percent of cybersecurity jobs globally in 2022, up from 20 percent in 2019 and around 10 percent in 2013. Cybersecurity Ventures predicts that women will represent 30 percent of the global cybersecurity workforce by 2025, increasing to 35 percent by 2031. We need to move the needle to 50 percent. In this episode, Wendy Thomas, CEO at Secureworks, and Gordon Lawson, CEO at Conceal, discuss women in cybersecurity, the talent crunch in our field, diversity, and more. Learn more about our sponsor at https://conceal.io
Watch Carol and Tim LIVE every day on YouTube: http://bit.ly/3vTiACF. Chipotle CEO Brian Niccol shares his thoughts on the restaurant chain's fourth-quarter sales and profit beating expectations. CVS Health CEO Karen Lynch discusses fourth-quarter results and the impact of rising care expenses in its Aetna insurance unit. Bloomberg Businessweek National Correspondent Josh Green provides the details of his Businessweek Magazine story Reagan's Morning in America Offers Lessons for Biden's Campaign. Wendy Thomas, CEO at Secureworks, talks about protecting businesses from deep fakes. And we Drive to the Close with Larry Pitkowsky, Managing Partner at Goodhaven Capital Management. Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
Host Amy and Host James catch up and catch a tan. 1.) MSP Question of The Week What is the best business structure for new MSPs? See: https://www.toptal.com/finance/interim-cfos/c-corp-vs-s-corp#:~:text=Compared%20to%20traditional%20S%20or,it's%20taxed%20as%20a%20corporation --- 2.) More Tech Layoffs? EY Announces Layoffs in Response to Economic Struggles See: https://www.channele2e.com/news/ey-announces-layoffs-in-response-to-economic-struggles "Less than a week after Broadcom finalized its $61 billion acquisition of VMware, layoffs began. This is a familiar pattern for the company, which followed a similar playbook with its acquisition of CA Technologies in 2018. Overall, it's estimated Broadcom will cut about 2,000 employees post-acquisition. Google, Amazon, Snap, Splunk, LinkedIn, Cisco, MariaDB and SecureWorks all recently announced layoffs. Other mass layoffs recently included Intel, Wish and LinkedIn in the San Francisco Bay area. At the beginning of September, Rapid7 announced a restructuring plan following disappointing second-quarter results, resulting in the layoffs of about 18% of the company's workforce. Similarly, AppSec firm Snyk laid off 128 people in April. Cloud security vendor Zscaler announced layoffs after what it called a rough fiscal second quarter. Software tools giant Atlassian laid off 5% of its workforce as it “shifted priorities.” ---- Our upcoming events: AUSTIN TX – MASTERMIND LIVE (March 28-29th) http://bit.ly/kernanmastermind https://kernanconsulting-mastermind.mykajabi.com/mastermind-event Use “EARLYBIRD” as the coupon code to save $200! Irvine CA – SMB Techfest (Feb 8th-9th) Make sure you catch Amy at SMB Techfest! https://www.smbtechfest.com/events.asp Our Social Links: https://www.linkedin.com/in/james-kernan-varcoach/ https://www.facebook.com/james.kernan https://www.facebook.com/karlpalachuk/ https://www.linkedin.com/in/karlpalachuk/ https://www.linkedin.com/in/amybabinchak/ https://www.facebook.com/amy.babinchak/
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence -What keeps Eric up at night -Thinking like an ethical hacker (aka a “penetration tester) -Protecting your information (i.e., “Hardening the attack surface”) -Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections -Having a cool job -The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* -Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* -Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) -The Cyber Zeitgeist – with Dave Bittner (2021) -Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* -What is Hacking? The Economic Times (n.d.) [web] -Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] -Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books -The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) -Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) -Breaking & Entering, J. Smith (Mariner Books, 2019) -The Art of Invisibility, K. Mitnick (L, B & C, 2017) -Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) -Kingpin, K. Poulson (Crown, 2012) -The Cuckoo's Egg, C. Stoll (Doubleday, 1989) -Neuromancer, W. Gibson (Ace, 1984) Articles -2022 State of the Threat: A Year in Review, Secureworks (2022) -The Anthropology of Hackers, The Atlantic (2010) -Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary -DEFCON, The Documentary Network (2013) Resources -Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* -“The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!
Bloomberg Opinion Columnist John Authers and Bloomberg News Equity Markets Reporter Elena Popina share their thoughts on how the Federal Reserve's plan to come down from high rates will be perilous even as the pivot is making everyday a record breaker in the markets. Wendy Thomas, CEO at Secureworks, discusses the impact of new SEC cybersecurity regulations. Sam Darwish, Co-Founder and CEO at IHS Towers, explains the business of building connectivity in developing regions. Bloomberg Businessweek Editor Joel Weber and Bloomberg News Consumer Reporter Deena Shanker provide the details of the Businessweek Magazine story Lab-Grown Chicken Becomes Another Expensive Silicon Valley Mess. And we Drive to the Close with Jay Jacobs, US Head of Thematics and Active Equity ETFs at BlackRock. Hosts: Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
Senior Principal Security Researcher Nestori Syynimaa joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Nestori is an ICT professional with a strong practical and academic background. Since April 2021, Nestori has worked as a Senior Principal Security Researcher at Secureworks' Counter Threat Unit. Before joining Secureworks, he worked as a joint CIO for eight cities and municipalities surrounding Tampere, the largest inland city in Scandinavia. Nestori, Wendy, and Nic discuss the importance of understanding the dynamics between researchers and organizations in addressing security concerns, Nestori's journey as a researcher, his academic background, and his experiences speaking at various conferences worldwide. In This Episode You Will Learn: Challenges and successes in the bug bounty process The importance of researchers confirming fixes to make the process more efficient Ethical considerations for researchers and motivations within the hacking community Some Questions We Ask: What challenges do many organizations face running bug bounty programs? How can you find a trustworthy peer or seasoned researcher to get feedback on your work? Has encountering different cases shaped your understanding of bug bounty programs? Resources: View Nestori Syynimaa on LinkedIn View Wendy Zenone on LinkedIn View Nic Fillingham on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson Uncovering Hidden Risks The Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Hosted on Acast. See acast.com/privacy for more information.
While non-profit doesn't mean "no budget" when it comes to cybersecurity, a lot of smaller to mid-sized non-profits operate on a shoestring, with little to no money for cybersecurity talent or spending. This is where Sightline Security steps in. Sightline's founder and CEO, Kelley Misata joins us today to explain how her own non-profit helps other non-profits improve their cybersecurity posture. As with any category of trends, the success rate of cybercrime ebbs and flows. As Russia seems be a safe haven for cybercriminals, it seemed for a while that the war in Ukraine might disrupt this activity. It did, but only for a short while. Keith Jarvis walks us through the latest types, tactics, and trends in cybercrime. Secureworks' latest State of the Threat report reveals a disturbing dichotomy: how is it we understand our adversaries' so well, but continue to fail to stop them? In this interview, we aim to understand what needs to happen to tilt the odds a bit back in our favor. Segment Resources: Secureworks State of the Threat Report Press Release Segment description coming soon! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw-341
While non-profit doesn't mean "no budget" when it comes to cybersecurity, a lot of smaller to mid-sized non-profits operate on a shoestring, with little to no money for cybersecurity talent or spending. This is where Sightline Security steps in. Sightline's founder and CEO, Kelley Misata joins us today to explain how her own non-profit helps other non-profits improve their cybersecurity posture. As with any category of trends, the success rate of cybercrime ebbs and flows. As Russia seems be a safe haven for cybercriminals, it seemed for a while that the war in Ukraine might disrupt this activity. It did, but only for a short while. Keith Jarvis walks us through the latest types, tactics, and trends in cybercrime. Secureworks' latest State of the Threat report reveals a disturbing dichotomy: how is it we understand our adversaries' so well, but continue to fail to stop them? In this interview, we aim to understand what needs to happen to tilt the odds a bit back in our favor. Segment Resources: Secureworks State of the Threat Report Press Release Segment description coming soon! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw-341
As with any category of trends, the success rate of cybercrime ebbs and flows. As Russia seems be a safe haven for cybercriminals, it seemed for a while that the war in Ukraine might disrupt this activity. It did, but only for a short while. Keith Jarvis walks us through the latest types, tactics, and trends in cybercrime. Secureworks' latest State of the Threat report reveals a disturbing dichotomy: how is it we understand our adversaries' so well, but continue to fail to stop them? In this interview, we aim to understand what needs to happen to tilt the odds a bit back in our favor. Segment Resources: Secureworks State of the Threat Report Press Release Show Notes: https://securityweekly.com/esw-341
Wendy Thomas, CEO at Secureworks, discusses identifying and protecting against cyberattacks. Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
There's much of the electromagnetic spectrum that we cannot see. Like how LED wristbands are triggered at concerts or how to identify someone at DEF CON in a crowd of cellphones and electrical devices. Eric Escobar of SecureWorks provides some really clear analogies to help anyone visualize the differences between NFC, Bluetooth, and Wi Fi such as how your router and your microwave are both 2.4GHz - the difference is the number of watts behind each signal.
In the enterprise security news, Check Point buys Perimeter 81 to augment its cybersecurity 2023 Layoff Tracker: SecureWorks Cuts 300 Jobs Hackers Rig Casino Card-Shuffling Machines for ‘Full Control' Cheating ‘DoubleDrive' attack turns Microsoft OneDrive into ransomware NYC bans TikTok on city-owned devices Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-328
Don Smith is the Vice President of Threat Research at Secureworks. In this episode, he joins host Steve Morgan to discuss CISOs and the boardroom, including what organizations need to know. Secureworks is a leader in cybersecurity providing best-in-class solutions and threat intelligence that reduces risk, optimizes IT and security investments, and fills security team talent gaps. To learn more about our sponsor, visit https://secureworks.com
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence What keeps Eric up at night Thinking like an ethical hacker (aka a “penetration tester) Protecting your information (i.e., “Hardening the attack surface”) Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections Having a cool job The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) The Cyber Zeitgeist – with Dave Bittner (2021) Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* What is Hacking? The Economic Times (n.d.) [web] Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) Breaking & Entering, J. Smith (Mariner Books, 2019) The Art of Invisibility, K. Mitnick (L, B & C, 2017) Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) Kingpin, K. Poulson (Crown, 2012) The Cuckoo's Egg, C. Stoll (Doubleday, 1989) Neuromancer, W. Gibson (Ace, 1984) Articles 2022 State of the Threat: A Year in Review, Secureworks (2022) The Anthropology of Hackers, The Atlantic (2010) Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary DEFCON, The Documentary Network (2013) Resources Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* “The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence What keeps Eric up at night Thinking like an ethical hacker (aka a “penetration tester) Protecting your information (i.e., “Hardening the attack surface”) Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections Having a cool job The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) The Cyber Zeitgeist – with Dave Bittner (2021) Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* What is Hacking? The Economic Times (n.d.) [web] Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) Breaking & Entering, J. Smith (Mariner Books, 2019) The Art of Invisibility, K. Mitnick (L, B & C, 2017) Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) Kingpin, K. Poulson (Crown, 2012) The Cuckoo's Egg, C. Stoll (Doubleday, 1989) Neuromancer, W. Gibson (Ace, 1984) Articles 2022 State of the Threat: A Year in Review, Secureworks (2022) The Anthropology of Hackers, The Atlantic (2010) Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary DEFCON, The Documentary Network (2013) Resources Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* “The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!