Podcasts about Security

Degree of resistance to, or protection from, harm

  • 19,654PODCASTS
  • 82,806EPISODES
  • 37mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Sep 28, 2023LATEST
Security

POPULARITY

20162017201820192020202120222023

Categories




    Best podcasts about Security

    Show all podcasts related to security

    Latest podcast episodes about Security

    Citadel Dispatch
    CD112: Lightning Node Security with Ken of the VLS Project (HSMs for Lightning)

    Citadel Dispatch

    Play Episode Listen Later Sep 28, 2023 73:09


    support dispatch: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://citadeldispatch.com/donate⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ EPISODE: 112 BLOCK: 809610 PRICE: 3813 sats per dollar TOPICS: using HSMs to reduce lightning hot wallet risk nostr live chat: ⁠⁠⁠⁠https://citadeldispatch.com/stream⁠⁠⁠⁠ youtube: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@citadeldispatch⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ twitch: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitch.tv/citadeldispatch⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ bitcointv: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bitcointv.com/video-channels/citadeldispatch/videos⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ podcast: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.podpage.com/citadeldispatch⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ telegram: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://t.me/citadeldispatch⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ stream sats to the show: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.fountain.fm/

    project security lightning node
    ITSPmagazine | Technology. Cybersecurity. Society
    Synergy in Security | A Conversation with Dr. Nikki Robinson | 2 Cyber Chicks Podcast With Erika McDuffie And Jax Scott

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Sep 28, 2023 22:34


    Guest: Nikki Robinson, DSc, PhD, Security Architect at IBMOn LinkedIn | https://www.linkedin.com/in/ACoAACvFM8sBiEX_BJr6dIgw-ACWfS1I-ZJg3OM__________________________SponsorsAre you interested in sponsoring an ITSPmagazine Channel?

    Sea Control - CIMSEC
    Sea Control 466 – Deliberate Campaigning in the Pacific with Benjamin Van Horrick and Steven Bancroft

    Sea Control - CIMSEC

    Play Episode Listen Later Sep 28, 2023


    By Jared Samuelson Benjamin Van Horrick and Steven Bancroft discuss their work in the Pacific with Task Force 76/3 and re-imagining command and control relationships. Benjamin is a Marine Corps logistics officer, and the current logistics operations officer for Task Force 76/3. Steven is the future operations officer for TF 76/3. Download Sea Control 466 … Continue reading Sea Control 466 – Deliberate Campaigning in the Pacific with Benjamin Van Horrick and Steven Bancroft →

    China In Focus
    Planned U.S. Rare Earth Factory Tied to China Footprint

    China In Focus

    Play Episode Listen Later Sep 27, 2023 21:39


    Planned U.S. Rare Earth Factory Tied to China FootprintWho Caused the Maui Wildfires? Pro-China Campaign Blames U.S.Ford Pauses Work on China-Linked EV Battery PlantBiden Makes New Pledges to Pacific States as China's Influence GrowsU.S. Army Chief Calls for Free Indo-PacificS. Korea Holds Military Parade, Cautions N. KoreaChina Warns Philippines to Not Make ‘Provocations'China, S. Korea, Japan to Host Trilateral TalksU.S. Blacklists 28 Chinese, Russian EntitiesTaiwan President: Safeguard Free, Open Indo-Pacific; Australian Lawmakers Echo Message on Taipei VisitSwiss Bank UBS to Expand Cooperation with China's ICBCProperty Giant Evergrande Shares Tumble for Second DayExpert on Why Pacific Nations Are Key to U.S. Security

    EM Weekly's Podcast
    Proactive School Safety and the Reality of Shootings with David Riedman

    EM Weekly's Podcast

    Play Episode Listen Later Sep 27, 2023 52:43


    This is a must listen episode! This week's guest is David Riedman, researcher and creator of the K-12 School Shooting Database. We discuss the surprising realities around shootings and violence at schools that often go unreported in the media. How can emergency managers help schools be more proactive with safety planning and preparedness? David shares insights from the data and patterns seen in the 300+ school shootings in the database. We also talk about the role of gun detection technology like ZeroEyes, the company David now works for, that uses AI and cameras to immediately detect firearms and provide alerts. Tune in to learn more about current school safety issues beyond the mass shooting incidents covered in the news.Learn more about the K-12 School Shooting Database: https://k12ssdb.org/Zero Eyes is an AI-powered, human-verified gun detection system that uses facility's existing security cameras. Learn more by visiting https://zeroeyes.com/Check out a recent news story on Zero Eyes and how this technology works: https://abcnews.go.com/US/new-jerseys-ocean-city-taps-ai-gun-detection/story?id=102960788Support our podcast! Everything EM Weekly: www.thereadinesslab.com/em-weekly-links EM Weekly shirts and merch: https://www.thereadinesslab.com/shop/ The Readiness Lab: https://www.thereadinesslab.com/ Connect with me! https://www.linkedin.com/in/zborst/ Major Endorsements: L3Harris Technologies' BeOn PPT App. Learn more about this amazing product here: www.l3harris.com Doberman Emergency Management Group provides subject matter experts in planning and training: www.dobermanemg.com

    Core Conversations
    Does Low Wildfire Risk Create a False Sense of Security? Spoiler: Yes

    Core Conversations

    Play Episode Listen Later Sep 27, 2023 19:41 Transcription Available


    Knowing the wildfire risk of a home is becoming increasingly important — both for homeowners and insurers. However, it is insufficient to simply know that there is a probability of a wildfire occurring at a certain property. It is imperative to understand the development of historic risks into current risks and how this score will evolve in the future. After all, low risk today does not mean no risk tomorrow.While only about 9% of U.S. properties meet the threshold for high or extreme wildfire risk, it is worth questioning why wildfires are creating increasingly large damage figures for homeowners and insurers. In short, climate change, where homes are built, and their construction type all play a role.However, that is not the full story.Understanding how risk scores are created, what a property's risk score actually means, and knowing how to promote mitigation — even among homes that qualify as low risk — are essential strategies for maintaining safety in environments that are experiencing prolonged and more frequent wildfire seasons than usual.In this episode, host Maiclaire Bolton Smith sits down with CoreLogic Chief Actuary Howard Kunst to talk about wildfire risk, how to use a risk score to map those potential threats, and what different actions insurers can take based on the score.In this Episode:2:14 – How do we calculate wildfire risk?3:25 – How are these scores used and why are they different than probabilistic models?7:04 – How long is a risk score valid, and why is it wise to annually evaluate risk scores across a property portfolio?8:52 – What are the thresholds for low, medium and high risk? Why are nearly all U.S. properties low risk?12:08 – Erika Stanley goes over the numbers in the property market with The Sip.13:15 – Why are low-risk areas like Maui, Hawaii seeing wildfire events that cause widespread devastation?Links:U.S. Home Price Insights ReportWildfire Risk ReportHow Will Property Data Help Manage the California Insurance Crisis?Up Next: Can Wildfire Mitigation Stop the California Insurer Exodus?Find full episodes with all our guests in our podcast archive here: https://clgx.co/3zqhBZt

    Derek Prince Ministries Podcast
    Where to Find Security? - Part 3 - How To Be Irresistible

    Derek Prince Ministries Podcast

    Play Episode Listen Later Sep 27, 2023 12:37


    The quest springs from a universal craving of the human heart... but only the Bible reveals how we may achieve total, permanent security.Support the show

    Unsolicited Response Podcast
    ICS Security - Q3 In Review

    Unsolicited Response Podcast

    Play Episode Listen Later Sep 27, 2023 63:43


    Patrick Miller of Ampere Industrial Security joins Dale to discuss the three big stories of the quarter and give their win, fail and prediction. Stories US National Cybersecurity Strategy Implementation Plan + CISA 2024-2026 Strategic Plan The cybersecurity / OT cybersecurity vendor market news. We just had Cisco buy Splunk, plus the Dragos "extension", and SCADAfence selling to Honeywell. Seems like some tough times. Ransomware again … Port of Nagoya, Clorox, hospitals, CISA Ransomware Vulnerability Notification Service Links S4x24 Ticket Sales Ampere Industrial Security Critical Assets Podcast  

    The Epstein Chronicles
    A Look Back: Prince Andrew And the Loss Of His Security Detail

    The Epstein Chronicles

    Play Episode Listen Later Sep 27, 2023 12:15


    Prince Andrew is losing his security detail and from all reports, he isn't happy about it. However, it is far passed time that the English tax payer stopped footing the bill for a national embarrassment like Andrew. With financial uncertainty gripping the UK, it is hardly justifiable to spend money on a security detail for a man who is no longer a working royal and the monarchy plans to put an end to it.(commercial at 6:58)to contact me:bobbycapucci@protonmail.comsource:https://www.dailymail.co.uk/news/article-11474001/Prince-Andrew-furious-axe-3m-year-police-bodyguard-Epstein-scandal.htmlThis show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5003294/advertisement

    Security Now (Video LO)
    SN 941: We told you so! - NSA hacked Huawei? MS big AI data blunder, ValiDrive update

    Security Now (Video LO)

    Play Episode Listen Later Sep 27, 2023 145:54


    Apple has quietly removed support for Postscript in macOS Ventura over security concerns with the outdated interpreter language. China has formally accused the NSA of hacking and maintaining access to Huawei servers since 2009, based on documents from Edward Snowden. A misconfigured Azure Shared Access Signature token resulted in 38TB of sensitive internal Microsoft data being exposed, including employee backups with passwords. The Signal messaging platform has added a post-quantum encryption protocol called PQXDH, combining its existing X3DH with the believed quantum-resistant CRYSTALS-Kyber system. A zero-day iOS exploit chain was used to target Egyptian presidential candidate Ahmed Eltantawy, redirecting his traffic to install spyware after visiting a non-HTTPS site. Steve gave an update on the status of his forthcoming ValiDrive USB validation utility, explaining delays due to challenges working at the USB level under Windows. A blog post argued that the complexity of modern web browsers has made it impossible to create competitive new browsers from scratch. An emailer claimed to have a mathematical algorithm that can generate truly random numbers. Another emailer asked whether encrypting and deleting a hard drive could substitute for overwriting with random data. There was an explanation of how public key encryption can be used bidirectionally for both encryption and authentication. Listener questions whether all stolen LastPass vaults will eventually be decrypted. Show Notes - https://www.grc.com/sn/SN-941-Notes.pdf Hosts: Steve Gibson and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT GO.ACILEARNING.COM/TWIT Melissa.com/twit

    Security Now (Video HI)
    SN 941: We told you so! - NSA hacked Huawei? MS big AI data blunder, ValiDrive update

    Security Now (Video HI)

    Play Episode Listen Later Sep 27, 2023 145:54


    Apple has quietly removed support for Postscript in macOS Ventura over security concerns with the outdated interpreter language. China has formally accused the NSA of hacking and maintaining access to Huawei servers since 2009, based on documents from Edward Snowden. A misconfigured Azure Shared Access Signature token resulted in 38TB of sensitive internal Microsoft data being exposed, including employee backups with passwords. The Signal messaging platform has added a post-quantum encryption protocol called PQXDH, combining its existing X3DH with the believed quantum-resistant CRYSTALS-Kyber system. A zero-day iOS exploit chain was used to target Egyptian presidential candidate Ahmed Eltantawy, redirecting his traffic to install spyware after visiting a non-HTTPS site. Steve gave an update on the status of his forthcoming ValiDrive USB validation utility, explaining delays due to challenges working at the USB level under Windows. A blog post argued that the complexity of modern web browsers has made it impossible to create competitive new browsers from scratch. An emailer claimed to have a mathematical algorithm that can generate truly random numbers. Another emailer asked whether encrypting and deleting a hard drive could substitute for overwriting with random data. There was an explanation of how public key encryption can be used bidirectionally for both encryption and authentication. Listener questions whether all stolen LastPass vaults will eventually be decrypted. Show Notes - https://www.grc.com/sn/SN-941-Notes.pdf Hosts: Steve Gibson and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT GO.ACILEARNING.COM/TWIT Melissa.com/twit

    Security Now (Video HD)
    SN 941: We told you so! - NSA hacked Huawei? MS big AI data blunder, ValiDrive update

    Security Now (Video HD)

    Play Episode Listen Later Sep 27, 2023 145:54


    Apple has quietly removed support for Postscript in macOS Ventura over security concerns with the outdated interpreter language. China has formally accused the NSA of hacking and maintaining access to Huawei servers since 2009, based on documents from Edward Snowden. A misconfigured Azure Shared Access Signature token resulted in 38TB of sensitive internal Microsoft data being exposed, including employee backups with passwords. The Signal messaging platform has added a post-quantum encryption protocol called PQXDH, combining its existing X3DH with the believed quantum-resistant CRYSTALS-Kyber system. A zero-day iOS exploit chain was used to target Egyptian presidential candidate Ahmed Eltantawy, redirecting his traffic to install spyware after visiting a non-HTTPS site. Steve gave an update on the status of his forthcoming ValiDrive USB validation utility, explaining delays due to challenges working at the USB level under Windows. A blog post argued that the complexity of modern web browsers has made it impossible to create competitive new browsers from scratch. An emailer claimed to have a mathematical algorithm that can generate truly random numbers. Another emailer asked whether encrypting and deleting a hard drive could substitute for overwriting with random data. There was an explanation of how public key encryption can be used bidirectionally for both encryption and authentication. Listener questions whether all stolen LastPass vaults will eventually be decrypted. Show Notes - https://www.grc.com/sn/SN-941-Notes.pdf Hosts: Steve Gibson and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT GO.ACILEARNING.COM/TWIT Melissa.com/twit

    All TWiT.tv Shows (MP3)
    Security Now 941: We told you so!

    All TWiT.tv Shows (MP3)

    Play Episode Listen Later Sep 27, 2023 145:54


    Apple has quietly removed support for Postscript in macOS Ventura over security concerns with the outdated interpreter language. China has formally accused the NSA of hacking and maintaining access to Huawei servers since 2009, based on documents from Edward Snowden. A misconfigured Azure Shared Access Signature token resulted in 38TB of sensitive internal Microsoft data being exposed, including employee backups with passwords. The Signal messaging platform has added a post-quantum encryption protocol called PQXDH, combining its existing X3DH with the believed quantum-resistant CRYSTALS-Kyber system. A zero-day iOS exploit chain was used to target Egyptian presidential candidate Ahmed Eltantawy, redirecting his traffic to install spyware after visiting a non-HTTPS site. Steve gave an update on the status of his forthcoming ValiDrive USB validation utility, explaining delays due to challenges working at the USB level under Windows. A blog post argued that the complexity of modern web browsers has made it impossible to create competitive new browsers from scratch. An emailer claimed to have a mathematical algorithm that can generate truly random numbers. Another emailer asked whether encrypting and deleting a hard drive could substitute for overwriting with random data. There was an explanation of how public key encryption can be used bidirectionally for both encryption and authentication. Listener questions whether all stolen LastPass vaults will eventually be decrypted. Show Notes - https://www.grc.com/sn/SN-941-Notes.pdf Hosts: Steve Gibson and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT GO.ACILEARNING.COM/TWIT Melissa.com/twit

    Security Now (MP3)
    SN 941: We told you so! - NSA hacked Huawei? MS big AI data blunder, ValiDrive update

    Security Now (MP3)

    Play Episode Listen Later Sep 27, 2023 145:54


    Apple has quietly removed support for Postscript in macOS Ventura over security concerns with the outdated interpreter language. China has formally accused the NSA of hacking and maintaining access to Huawei servers since 2009, based on documents from Edward Snowden. A misconfigured Azure Shared Access Signature token resulted in 38TB of sensitive internal Microsoft data being exposed, including employee backups with passwords. The Signal messaging platform has added a post-quantum encryption protocol called PQXDH, combining its existing X3DH with the believed quantum-resistant CRYSTALS-Kyber system. A zero-day iOS exploit chain was used to target Egyptian presidential candidate Ahmed Eltantawy, redirecting his traffic to install spyware after visiting a non-HTTPS site. Steve gave an update on the status of his forthcoming ValiDrive USB validation utility, explaining delays due to challenges working at the USB level under Windows. A blog post argued that the complexity of modern web browsers has made it impossible to create competitive new browsers from scratch. An emailer claimed to have a mathematical algorithm that can generate truly random numbers. Another emailer asked whether encrypting and deleting a hard drive could substitute for overwriting with random data. There was an explanation of how public key encryption can be used bidirectionally for both encryption and authentication. Listener questions whether all stolen LastPass vaults will eventually be decrypted. Show Notes - https://www.grc.com/sn/SN-941-Notes.pdf Hosts: Steve Gibson and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT GO.ACILEARNING.COM/TWIT Melissa.com/twit

    All TWiT.tv Shows (Video LO)
    Security Now 941: We told you so!

    All TWiT.tv Shows (Video LO)

    Play Episode Listen Later Sep 27, 2023 145:54


    Apple has quietly removed support for Postscript in macOS Ventura over security concerns with the outdated interpreter language. China has formally accused the NSA of hacking and maintaining access to Huawei servers since 2009, based on documents from Edward Snowden. A misconfigured Azure Shared Access Signature token resulted in 38TB of sensitive internal Microsoft data being exposed, including employee backups with passwords. The Signal messaging platform has added a post-quantum encryption protocol called PQXDH, combining its existing X3DH with the believed quantum-resistant CRYSTALS-Kyber system. A zero-day iOS exploit chain was used to target Egyptian presidential candidate Ahmed Eltantawy, redirecting his traffic to install spyware after visiting a non-HTTPS site. Steve gave an update on the status of his forthcoming ValiDrive USB validation utility, explaining delays due to challenges working at the USB level under Windows. A blog post argued that the complexity of modern web browsers has made it impossible to create competitive new browsers from scratch. An emailer claimed to have a mathematical algorithm that can generate truly random numbers. Another emailer asked whether encrypting and deleting a hard drive could substitute for overwriting with random data. There was an explanation of how public key encryption can be used bidirectionally for both encryption and authentication. Listener questions whether all stolen LastPass vaults will eventually be decrypted. Show Notes - https://www.grc.com/sn/SN-941-Notes.pdf Hosts: Steve Gibson and Ant Pruitt Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT GO.ACILEARNING.COM/TWIT Melissa.com/twit

    Paul's Security Weekly TV
    Avoiding Negative Value, Feedback-Driven Culture, & Don't Buy Too Many Security Tools - BSW #321

    Paul's Security Weekly TV

    Play Episode Listen Later Sep 26, 2023 32:01


    This week in the leadership and communications section: building a feedback-driven culture, letting go of the reins, 25 hard-hitting lessons from 17 years in cybersecurity, and more! Show Notes: https://securityweekly.com/bsw-321

    Digital Politics with Karen Jagoda
    Need for Cybersecurity Tools to Protect Political Campaigns with Michael Kaiser Defending Digital Campaigns

    Digital Politics with Karen Jagoda

    Play Episode Listen Later Sep 26, 2023 21:30


    Michael Kaiser is the President and CEO of Defending Digital Campaigns, a nonprofit and nonpartisan organization working with Federal campaigns to secure their organizations and staff against cybercrime. DDC is providing free and low-cost security tools not counted as a campaign contribution with special permission by the FEC because unsafe political campaign practices are seen as a national security threat. We talk about Most significant cyber threats to political campaigns What cyber bad actors are trying to accomplish Security tools that DDC is making available to campaigns, staffers, candidates and their family members Focusing on what might happen, not what could happen Expanding this model to state and local races #DefendingDigitalCampaigns #DDC #2024Elections #PoliticalCampaigns #AI #Deepfakes #Disinformation #Misinformation #Cybersecurity #CampaignTech DefendCampaigns.org  

    ITSPmagazine | Technology. Cybersecurity. Society
    The 5 Step Process Framework for Success | A Conversation with Theresa Payton | The Soulful CXO Podcast with Dr. Rebecca Wynn

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Sep 26, 2023 28:43


    Guest: Theresa Payton, Chief Advisor and CEO of Fortalice®, LLC [@FortaliceLLC] and former White House Chief Information Officer (CIO) of the Executive Office of the President (EOP) from 2006-2008. She was the first woman to hold this position.On Twitter | https://twitter.com/TrackerPaytonOn LinkedIn | https://www.linkedin.com/in/theresapayton________________________________Host: Dr. Rebecca WynnOn ITSPmagazine  

    To The Point - Cybersecurity
    Ransomware Evolution: From Business Nuisance to National Security Threat with Megan Stifel

    To The Point - Cybersecurity

    Play Episode Listen Later Sep 26, 2023 33:43


    This week, Audra is joined by Megan Stifel, chief strategy officer for the Institute for Security and Technology, to discuss how ransomware has evolved from a business nuisance to now a threat to national security. Megan also shares how the United States' overall response to ransomware has the potential to impact the types of attacks faced by its organizations and touches on the need for greater transparency when it comes to international cyber information sharing. Megan Stifel is the Chief Strategy Officer for the Institute for Security and Technology. She is the founder of Silicon Harbor Consultants, which provides strategic cybersecurity operations and policy counsel. Prior to founding Silicon Harbor Consultants, she was an attorney in the National Security Division at the U.S. Department of Justice (DOJ). She most recently served as Global Policy Officer and Capacity and Resilience Program Director at the Global Cyber Alliance. She was previously the Cybersecurity Program Director at Public Knowledge. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e252

    Fintech Leaders
    Jean-Denis Greze, Plaid CTO – At the Cutting Edge of Privacy and Security, Powerful Network Effects, How LLMs Will Reshape Our Digital Experience

    Fintech Leaders

    Play Episode Listen Later Sep 26, 2023 47:39


    Miguel Armaza sits down with Jean-Denis Greze, CTO at Plaid, a data network and one of the foundational fintech companies that works with thousands of firms, including several Fortune 500s and some of largest banks in the world. Founded in 2013 by Zach Perret and William Hockey, Plaid's network covers 12,000+ financial institutions across the US, Canada, UK and Europe. They've raised over $700 million from Felicis, Homebrew, NEA, Spark Capital, Citi, Goldman, AmEx, Ribbit, and a long list of great investors.We discuss:How Plaid stays at the forefront of security and privacyThriving in a competitive market and how the only way to win is to play a different game than your competitorsThe future of Open Finance in the US and some regulatory predictionsHow AI LLMs are revolutionizing user interfaces… and a lot more!Live Recording Alert! Join us for a live Fintech Leaders recording and Happy Hour with Stuart Sopp, CEO & Co-Founder of Current, a multibillion-dollar fintech built in New York City.  See you at Barclays Rise New York on Monday, October 16 to kick off New York Tech Week. Register here --> https://bit.ly/3sMaIBjWant more podcast episodes? Join me and follow Fintech Leaders today on Apple, Spotify, or your favorite podcast app for weekly conversations with today's global leaders that will dominate the 21st century in fintech, business, and beyond.Do you prefer a written summary, instead? Check out the Fintech Leaders newsletter and join almost 60,000 readers and listeners worldwide!Miguel Armaza is Co-Founder and General Partner of Gilgamesh Ventures, a seed-stage investment fund focused on fintech in the Americas. He also hosts and writes the Fintech Leaders podcast and newsletter.Miguel on LinkedIn: https://bit.ly/3nKha4ZMiguel on Twitter: https://bit.ly/2Jb5oBcFintech Leaders Newsletter: bit.ly/3jWIp

    The Key Point Podcast
    Keypoint Intelligence Guide to Cybersecurity - Planning for Cybersecurity Awareness Month 2023

    The Key Point Podcast

    Play Episode Listen Later Sep 26, 2023 16:59


    This year marks the 20th anniversary of Cybersecurity Awareness Month, and what better time than now to prepare for October! Join Keypoint Intelligence's Anne Valaitis as she sits down with Carlos Fernandes, Founder and CEO of Agile Cybersecurity Solutions (ACS), to discuss how businesses could and should protect themselves, the latest threats and what to do about them, and the role everyone plays in keeping our digital world safe.

    Derek Prince Ministries Podcast
    Where to Find Security? - Part 3 - Security Through Doing God's Will

    Derek Prince Ministries Podcast

    Play Episode Listen Later Sep 26, 2023 12:24


    The quest springs from a universal craving of the human heart... but only the Bible reveals how we may achieve total, permanent security.Support the show

    The SysAdmin DOJO Podcast
    EP22: Can You Trust Microsoft with Security?

    The SysAdmin DOJO Podcast

    Play Episode Listen Later Sep 26, 2023 38:40


    In this week's episode, Andy and Paul have a discussion that has been brewing for the past several episodes. Microsoft has experienced a series of security incidents in the last few years. For example, the SolarWinds debacle in 2020, multiple exchange server on-prem issues, and more recently the Storm-0558 incident.  The core issue that all these problems raise, especially for a major global cloud provider, is trust. Can Microsoft be trusted to secure these services that millions around the globe use every single day? This is the main question that the guys get into in this episode along with lots of other great discussions around security in the Microsoft Cloud.   Timestamps: (1:55) – There has been a recent string of security issues at Microsoft  (6:42) – Storm-0558  (16:38) – Follow up on the SolarWinds attack from 2020  (20:50) – Multiple Exchange on-prem vulnerabilities over the last several years  (22:55) – Power Platform cross-tenant un-authorized access  (26:61) – Communication seems to be a sore spot across all these issues  (31:21) – Trust is critical for the survival of “the cloud”  Episode Resources: Monthly Threat Report - September 2023 Microsoft 365: The Essential Companion Guide - Free eBook Paul's recent article on Microsoft's security issues Results of Microsoft's Storm-0558 Investigation Find Andy on LinkedIn, Twitter or Mastadon Find Paul on LinkedIn or Twitter

    Today with Claire Byrne
    Shoplifting – the true toll

    Today with Claire Byrne

    Play Episode Listen Later Sep 26, 2023 9:12


    Conor Lally, Security & Crime Editor, Irish Times & Willie O'Brien Shopkeeper on Cork's Exchequer Street discuss the true toll of shoplifting.

    Found
    Live from TechCrunch Disrupt with cybersecurity trailblazer Window Snyder from Thistle Technologies

    Found

    Play Episode Listen Later Sep 26, 2023 21:04


    The Found team recorded this episode live from TechCrunch Disrupt. Dom and Becca sat down with Window Snyder, a trailblazer in the cybersecurity industry who has dedicated her decades-long career to ensuring the internet and our devices are secure.  Snyder talked about why after years of working at companies like Apple, Microsoft, Fastly, and Square now was the right time to launch her startup, Thistle, which looks to build the security infrastructure needed to keep internet-connected smart devices safe.They also covered:The way her mother's career as a programmer inspired her to learn how to code has a teenagerWhy a core value of Thistle is making cyber security easy for developersHer biggest challenge in fundraising was demonstrating that this is a problem that the rest of the industry recognizes that they're going to want to leverage these capabilities in order to improve the security of their products.Check out the UpFlip  Podcast  where you get to unravel how great businesses are built, how they are run behind the scenes and how their success can be replicated. We think you'll love episode 79 where they featured this guest who transformed his passion for gardening into a $7.3 million-a-year venture. You can find the podcast on Youtube or where ever you listen to podcasts.Subscribe to Found to hear more stories from founders each week.Connect with us:On TwitterOn InstagramVia email: found@techcrunch.com

    Cybercrime Magazine Podcast
    Consumer Security. Smartphone Payments. Burton Kelso, The Technology Expert.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Sep 26, 2023 2:57


    Burton Kelso, The Technology Expert, is the weekly consumer products contributor for the Cybercrime Magazine Podcast. In this episode of Consumer Security, he joins host Sam White to share tips and tricks to help listeners avoid hackers and keep their devices and gadgets safe. For more tech tips from Burton, visit https://burtonkelso.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

    Application Security PodCast
    Itzik Alvas -- Secrets Security and Management

    Application Security PodCast

    Play Episode Listen Later Sep 26, 2023 37:05 Transcription Available


    Itzik Alvas, Co-founder and CEO of Entro, is an expert on secrets security.Itzik joins Chris and Robert to discuss the significance of understanding and managing secrets, emphasizing the importance of knowing how many secrets an organization has, where they are located, and their potential impact. He elaborates on the three pillars of secrets management: listing and locating secrets, classifying and understanding their potential blast radius, and monitoring them for any abnormal behavior.The conversation takes a turn towards the future of secrets management, where Itzik believes there's a need for a shift in mentality. He stresses the importance of education in this domain, urging listeners to seek knowledge, understand the potential risks, and start with actionable steps. Itzik's perspective on prioritizing risks, investing in processes, and the challenges of remediation offers a fresh take on application security.As the episode wraps up, Itzik shares a key takeaway for the audience: the importance of getting educated about secrets, understanding their potential risks, and starting with quick, actionable steps. Chris Romeo, the host, and Itzik also touch upon their love for sci-fi, adding a personal touch to the conversation. This episode is a must-listen for anyone keen on enhancing their understanding of secrets security and management.Helpful Links:Entro -- https://entro.security/Recommended Reading:Foundation by Isaac Asimov -- https://www.amazon.com/Foundation-Isaac-Asimov/dp/0553293354Ringworld by Larry Niven -- https://www.amazon.com/dp/B0B1911GL1Seveneves by Neal Stephenson -- https://www.amazon.com/Seveneves-Neal-Stephenson/dp/0062334514FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    Fringe Radio Network
    Julian Charles Week! - JFK and His Private War

    Fringe Radio Network

    Play Episode Listen Later Sep 26, 2023 75:40


    Jacob Hornberger centering in the thesis that Kennedy's assassination is best understood as an instance of the US national security state's exercise of its illegitimate power of assassination, we discuss subjects such as: The Bay of Pigs, The Cuban Missile Crisis, The Berlin Crisis of 1961, Laos, Vietnam, and the CIA's alleged involvement in various regime-change operations around the world.This show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/4656375/advertisement

    ITSPmagazine | Technology. Cybersecurity. Society
    Habits and Hutchisms: The CISO Revolving Door | CISO Circuit Series: Episode 1 | With Michael Piacente and Sean Martin on the Redefining CyberSecurity Podcast

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Sep 26, 2023 55:02


    About the CISO Circuit SeriesSean Martin and Michael Piacente will join forces roughly once per month to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and so much more. Join us to help us understand the role of the CISO so that we can collectively find a path to Redefining CyberSecurity. If you have a topic idea or a comment on an episode, feel free to contact Sean Martin.____________________________Guest: Michael Piacente, Managing Partner and Cofounder of Hitch PartnersOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacente____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesIn this special episode of Redefining Cybersecurity—the CISO Circuit Series—Sean Martin and Michael Piacente come together to explore the role of a CISO and the challenges they face. They discuss how organizations are trimming cybersecurity activities, including the reduction or elimination of CISO roles, due to the impact of the economy. They explore the concept of "battlefield promotions," where individuals within organizations take on CISO responsibilities without the official title. They discuss the trend of an increasing number of job seekers in the cybersecurity market, with data revealing a significant rise in both proactive and reactive candidates. They also discuss the importance of executive-level support for CISOs and the impact it has on their job satisfaction and success.The conversation touches on the issue of executive sponsorship, with many companies failing to fully support their security programs, leading to frustration and turnover among CISOs. The conversation highlights the collaborative nature of the CISO community and its influence on the hiring process. They also explore the concept of ESG (Environmental, Social, and Governance) and its influence on individuals seeking new security roles.The desire to make a positive impact on the world and align with organizations that share that goal emerges as a driving force for CISOs. Give the challenges cybersecurity leadership encounters, the need for adequate support and resources continues to mount.Throughout the episode, Sean and Michael provide valuable insights into the evolving nature of the CISO role and the factors that influence job satisfaction and career moves in the cybersecurity industry. Listeners can expect a thoughtful and informative conversation that highlights the complexities and nuances of the CISO role in today's dynamic cyber landscape.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

    ITSPmagazine | Technology. Cybersecurity. Society
    Is Shift Left Overrated? | An Imperva Brand Story With Peter Klimek

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Sep 26, 2023 40:31


    In this Brand Story episode, hosts Marco and Sean have a thought-provoking discussion with Peter Klimek from Imperva about the concept of "shift left" in application security. Have we gone too far?The conversation revolves around the challenges and benefits of identifying vulnerabilities earlier in the software development lifecycle and the need for collaboration between development and security teams. Peter emphasizes the importance of finding a balance between tools and human expertise in addressing vulnerabilities. He highlights the common issue of organizations having a backlog of vulnerabilities that need to be fixed, rather than a problem of finding vulnerabilities—it's "easy" to find them, harder to fix them all.The conversation also touches on the measurement of closure velocity and the significance of development team velocity as a core metric in application security. They discuss the role of APIs, platform engineering, and infrastructure as code in improving collaboration, automation, and trust in systems.Peter draws a parallel between guardrails on a highway and the need for guardrails in application security, emphasizing the importance of providing development teams with time to address critical vulnerabilities. They also explore the challenges of coordinating multiple teams and the role of operations in orchestrating the development and security processes.The need for a defensive mindset and the importance of leveraging the guardrails Peter noted to prevent fatal vulnerabilities is also discussed as they emphasize the significance of collaboration, measurement, and a balance between development and security teams in implementing shift left practices effectively.The episode provides valuable insights into the nuances, challenges, and benefits of integrating shift left practices into application security, while emphasizing the need for collaboration, balance, and the ethical use of tools.Note: This story contains promotional content. Learn more.Guest: Peter Klimek, Director of Technology - Office of the CTO at Imperva [@Imperva]On LinkedIn | https://www.linkedin.com/in/peter-klimek-37588962/ResourcesLearn more about Imperva and their offering: https://itspm.ag/imperva277117988DevOps Research and Assessment (DORA): https://dora.dev2023 Imperva Bad Bot Report: https://itspm.ag/impervv0sg47.4% of internet traffic wasn't human in 2022! Get the research from @Imperva to learn how bots are taking over the internet.The Impact Of Log4j Since Its Disclosure | Steps Businesses Can Take To Maintain Software Supply Chain Security:Part 1: https://redefining-cybersecurity.simplecast.com/episodes/the-impact-of-log4j-since-its-disclosure-steps-businesses-can-take-to-maintain-software-supply-chain-security-part-1-of-2-an-imperva-story-with-gabi-stapelPart 2: https://redefining-cybersecurity.simplecast.com/episodes/why-protecting-your-business-data-is-more-like-securing-a-museum-than-a-bank-demystifying-data-protection-an-imperva-story-with-terry-ray-07mq5xex-q5rc-fw8From Enrolling In College To Gambling, Traveling, And Shopping, Evasive Bad Bots Are A Major Source Of Online Fraud | The Bad Bot Report 2022 | An Imperva Brand Story With Ryan Windham:Part 1: https://redefining-cybersecurity.simplecast.com/episodes/from-enrolling-in-college-to-gambling-traveling-and-shopping-evasive-bad-bots-are-a-major-source-of-online-fraud-the-bad-bot-report-2022-part-1-an-imperva-story-with-ryan-windhamPart 2: https://redefining-cybersecurity.simplecast.com/episodes/from-enrolling-in-college-to-gambling-traveling-and-shopping-evasive-bad-bots-are-a-major-source-of-online-fraud-the-bad-bot-report-2022-part-2-an-imperva-story-with-ryan-windhamCatch more stories from Imperva at https://www.itspmagazine.com/directory/impervaAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

    PNW Haunts & Homicides
    PART 2: Wayne Adam Ford: The Serial Killer with a Conscience?

    PNW Haunts & Homicides

    Play Episode Listen Later Sep 26, 2023 70:59


    We're wrapping up part 2 of the case series - if you need a palate cleanser we suggest checking out MERMAIDS, our Patreon livestream from this past weekend. Experience how the disturbing tale of Wayne Adam Ford, commonly known as a serial killer with a conscience, unfolds in a chilling narrative. His complex backstory, weaves through his troubled past, mental health struggles, and disturbing criminal tendencies. We shine a light on his rocky marriage, his unjustifiable animal cruelty, as well as the lives of his victims. Listen in as we unveil the tragic tale of a descent into darkness, underlining the detrimental effects of untreated mental health issues and toxic relationships.The concluding chapter of this episode reveals the heart-wrenching story of Kerry Ann Cummings, Ford's first victim, only identified decades after her tragic demise. Narrated alongside a tarot reading, we explore how her struggles with mental health may have sadly knitted her into Ford's sinister tale. As we reveal the sinister depths of the human psyche, we hope to shed light on the importance of addressing mental health issues.This week we share a promo for the Greyhorn Pagans Podcast with hosts StijnFawkes and FireFae! --------- EPISODE KEYWORDS ---------Serial Killer, Wayne Adam Ford, Mental Health, Toxic Relationships, Animal Cruelty, Son, Rodney, Kerrie Ann Cummings, Tarot Reading, Patreon Support, 1980s, Abusive Nightmare, Deviant Journey, Quick Romance, Unjustifiable Cruelty, Final Victim, Mental Illness, Security, Stability, Practicality, Five of Swords, Rape Victims, Kerry Ann Cummings. If you're enjoying our podcast, please consider leaving a rating & review on Apple Podcasts. It helps get us seen by more creepy people just like you! Stay connected with us for more creepy content. Visit our website! Find us on Facebook, Instagram, TikTok, Patreon, & more! If you have any true crime, paranormal, or witchy stories you'd like to share with us & possibly have them read (out loud) on an episode, email us at pnwhauntsandhomicides@gmail.com or use this link. There are so many ways that you can support the show: BuyMeACoffee, Apple Podcasts or by leaving a rating & review on Apple Podcasts. Pastebin: for sources.This show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5955451/advertisementThis show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5955451/advertisement

    TechStuff
    The High Tech Heist

    TechStuff

    Play Episode Listen Later Sep 25, 2023 43:53 Transcription Available


    On September 11th, 2023, MGM Resorts International posted that the company experienced a "cybersecurity issue." That issue links to two different hacker groups, a ransomware attack, and a similar incident that happened to another major casino company earlier in the year. This is the story so far.See omnystudio.com/listener for privacy information.

    ITSPmagazine | Technology. Cybersecurity. Society
    Preview of Devo's SOC Analyst Appreciation Day | Celebrating SOC Analysts: A Day of Appreciation and Happiness | An Event Coverage Conversation with Kayla Williams, CISO of Devo

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Sep 25, 2023 30:42


    Guest: Kayla Williams, CISO of Devo Inc. [@devo_Inc] and co-host of the Locked Down Podcast [@LockedDownKT]On Linkedin | https://www.linkedin.com/in/kaylamwilliams1/On Twitter | https://twitter.com/kayla_obviouslyOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/kayla-williams____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this episode, hosts Marco and Sean are joined by Kayla Williams, CISO for Devo Technology, to discuss the upcoming SOC Analyst Appreciation Day. The conversation covers various sessions that will be part of the event, including topics such as mental health, a day in the life of a SOC analyst, and the impact of AI and automation. They emphasize the need for empathy and understanding when it comes to mental health, highlighting the importance of recognizing signs of distress and offering support. They also discuss the challenges faced by SOC analysts, such as burnout and the lack of recognition, and stress the need for better communication and collaboration within the industry.The CISO panel that will be part of the event, titled "CISOs in the Hot Seat," sparks curiosity about the discussion topics, with hopes that people management and understanding the mental health of teams will be addressed. The session on AI and automation raises questions about whether it will make the life of SOC analysts easier or increase the threat landscape. There is tons of excitement from Sean and Marco about hosting the "Day in the Life of a SOC Analyst" panel, where they aim to explore the daily struggles and experiences of analysts. They underscore the importance of appreciation and recognition within the industry, as indicated by statistics showing that many analysts are seeking a way out of their roles.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

    Phil and Leroy The Judgementals Podcast
    The "Super Mayor" and Her Security Detail - Episode 167

    Phil and Leroy The Judgementals Podcast

    Play Episode Listen Later Sep 25, 2023 49:38


    We talk about a good Samaritan was killed Inside of a Walmart coming to the aid of a woman he didn't know. "Super Mayor" Tiffany Henyard spending the taxpayers money on her security detail. A man arrested for impersonating police officer while working as security just so he can get paid double. Eagles vs Buccaneers Monday Night Football preview Twitter: https://twitter.com/PnLJudgementals TikTok: https://www.tiktok.com/@pnljudgementals Facebook: https://www.facebook.com/PnLJudgementals Instagram: https://www.instagram.com/the__judgementals Email: pnljudgementals@gmail.com Music:  Bread Crumbs - Successful

    Your Morning Show On-Demand
    3Things You Need To Know: Live Security TSA Times

    Your Morning Show On-Demand

    Play Episode Listen Later Sep 25, 2023 2:15


    7 years after leaving earth a probe came back with samples from an asteroid in space. Live Security wait times are up at Reagan National airport via DCA app. The next Powerball drawing is tonight and its up to 700Million. Make sure to also keep up to date with ALL our podcasts we do below that have new episodes every week:The Thought ShowerLet's Get WeirdCrisis on Infinite Podcasts

    Church Safety Guys
    Episode 175. Real Stories of Church Safety & Security (Preventing Human Trafficking)

    Church Safety Guys

    Play Episode Listen Later Sep 25, 2023 64:32


    Join the Church Safety Guys as they talk about church safety & security!

    PurePerformance
    The Future of Ops is Sleep with Amit Chiba from Nedbank

    PurePerformance

    Play Episode Listen Later Sep 25, 2023 10:59


    I was fortunate to travel to South Africa and meet many tech leaders in Johannesburg and Cape Town to talk about Observability, Security, Automation, Platform Engineering, DevOps and FinOps. One of those leaders is Amit Chiba, Multi Product Specialist at Nedbank. I sat down with Amit to discuss his personal journey and his projects at Nedbank, one of the leading financial institutions in South Africa. Tune in and hear from Amit how self-service platform engineering helps them to scale observability, how they tackle cloud costs and why he thinks that the future of IT Ops is more Sleep!

    Dale & Keefe
    Patriots TE Hunter Henry on the importance of ball security in yesterday's win

    Dale & Keefe

    Play Episode Listen Later Sep 25, 2023 13:11


    Patriots tight end Hunter Henry joined the show to discuss the play of the tight ends, the Patriots running game in yesterday's win, finding ways to close out games, Pharaoh Brown's touchdown, getting their first win, looking ahead to next Sunday's game against the Dallas Cowboys, and the play of QB Mac Jones.

    Rethinking Palestine
    The Palestinian Authority's Revolving Door with Alaa Tartir

    Rethinking Palestine

    Play Episode Listen Later Sep 25, 2023 21:18


    Alaa Tartir joins host Yara Hawari to discuss the revolving door/al-bab al-dawaar, a critical component of PA-Israeli security coordination. They situate the policy within the wider “collaboration paradigm" and examine its disruptive impact on Palestinian resistance and the liberation movement.Support the show

    The CyberWire
    Cyberespionage in East and Southeast Asia, for both intelligence collection and domestic security, Spyware tools tracked. Shifting cyber targets in Russia's hybrid war. Securing the Super Bowl.

    The CyberWire

    Play Episode Listen Later Sep 25, 2023 30:50


    The Gelsemium APT is active against a Southeast Asian government. A multi-year campaign against Tibetan, Uighur, and Taiwanese targets. Stealth Falcon's new backdoor. Predator spyware is deployed against Apple zero-days. An update on Pegasus spyware found in Meduza devices. There's a shift in Russian cyberespionage targeting. A rumor of cyberwar in occupied Crimea. In our Industry Voices segment, Amit Sinha, CEO of Digicert, describes digital trust for the software supply chain. Our guest is Arctic Wolf's Ian McShane with insights on the MGM and Caesars ransomware incident. And if you're looking for a Super Bowl pick, go with an egg-laying animal…and, oh, the NFL and CISA are noodling cyber defense for the big game. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/183 Selected reading. Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government (Unit 42) Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government (IBM X-Force Exchange) Evasive Gelsemium hackers spotted in attack against Asian govt (BleepingComputer) Unit 42 Researchers Discover Multiple Espionage Operations Targeting Southeast Asian Government (Unit 42) EvilBamboo Targets Mobile Devices in Multi-year Campaign (Volexity)  From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese (The Hacker News) Stealth Falcon preying over Middle Eastern skies with Deadglyph (We Live Security) t Deadglyph: Covertly preying over Middle Eastern skies (LABScon)  New stealthy and modular Deadglyph malware used in govt attacks (BleepingComputer)  Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics (The Hacker News)  0-days exploited by commercial surveillance vendor in Egypt (Google). PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions (The Citizen Lab)  New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware (The Hacker News)  Egyptian presidential hopeful targeted by Predator spyware (Washington Post) Russian news outlet in Latvia believes European state behind phone hack (the Guardian)  Exclusive: Russian hackers seek war crimes evidence, Ukraine cyber chief says (Reuters). Russian hackers trying to steal evidence of Moscow's war crimes in Ukraine - cyber chief (Ukrinform). Large-scale cyberattack reported in occupied Crimea (The Kyiv Independent)  NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII (Dark Reading)  Learn more about your ad choices. Visit megaphone.fm/adchoices

    The Gate 15 Podcast Channel
    Weekly Security Sprint EP 35. Yes, Virginia, Jen is a big deal, plus security planning, scams, threat TTPs, and more!

    The Gate 15 Podcast Channel

    Play Episode Listen Later Sep 25, 2023 22:22


    In this week's Security Sprint, Dave and Andy talked about the following topics. Security Planning CISA: New Product - Protecting Houses of Worship: Perimeter Security Considerations Infographic. The Cybersecurity and Infrastructure Security Agency (CISA) released the Protecting Houses of Worship: Perimeter Security Considerations Infographic. CISA: Security Planning Workbook. Security Planning Workbook (PDF) DHS: This #SeeSayDay Take the Pledge to Protect Your Community If You See Something, Say Something® #SeeSayDay.  Selected FB reports: Statement from President Joe Biden on Yom Kippur Synagogues brace for bomb threats, ‘swatting' attacks as Yom Kippur begins Escambia County church a 'total loss' after overnight fire Bomb Threat Forces Evacuation at Screening of John MacArthur's ‘The Essential Church' at G3 National Conference Anne Arundel police announce arrests in three hate bias cases at area churches FBI WARNED SIKHS IN THE U.S. ABOUT DEATH THREATS AFTER KILLING OF CANADIAN ACTIVIST INVITATION: Protecting Places of Worship Weeks of Action Virtual Events + DHS Resources Bomb threats target US synagogues during Rosh Hashanah West Virginia Man Admits to Obstructing Tree of Life Trial TikTok Shoplifting Threats. https://www.the-sun.com/news/9148713/retail-chains-tiktok-videos-shoplifting-warning-employees/ Jen Walker, Superstar, and Ransomware Resilience Congratulations to our 2023 SC Media Women in IT Security honorees. “Today SC Media shines a spotlight on 20 business leaders as part of our 2023 Women in IT Security program. Thank you to SC Media for recognizing Gate 15's very excellent Jennifer Lyn Walker in the 2023 Women in IT Security list‼️ Private Public Partnership. FBI Director Christopher Wray Speaks at 2023 mWISE Cybersecurity Conference. Cyberspace Solarium Commission's (CSC's) 2023 Annual Report on Implementation. Key Takeaways from the 2023 Security Summit Hosted at the Fortinet Championship. Ransomware. House Oversight Committee: Combating Ransomware Attacks MGM Resorts are operating ‘normally' after hacks, sort of TribalNet: Cyber experts wrap up MGM hack at San Diego conference. The MGM Breach and the Role of IdP in Modern Cyber Attacks TribalNet: Gaming tech exec says it's time finally to talk about cybersecurity MGM vs. Caesars: Cybersecurity Expert Rates Hacking Responses PhilHealth hit by Medusa ransomware, aims for site restoration by Monday Ransomware group claimed to have hit a New Jersey cardiology group. Did they? Growing Ransomware Threats: Looming Danger for ICS, Industrial Companies   Morroco disaster scams / misinformation on social media, scams The Gate 15 Interview: Malicious Info Operations & MDM, the Space Sector, supply chain resilience, the City of Light, and nudging the world in a better direction. Misinformation research is buckling under GOP legal attacks GOP legal attacks create a chilling effect on misinformation research The Rise of Generative AI and the Coming Era of Social Media Manipulation 3.0   Quick Hits: Perspective: Homeland Security and the Shutdown Threat: Planning for an Unnecessary Contingency Alarm bells ring as lawmakers prep for possible shutdown U.S. braces for calamitous, costly government shutdown in eight days IT-ISAC: Cyber experts set out plan to secure crucial 2024 US election Health-ISAC QR Codes. https://www.aha.org/h-isac-white-reports/2023-09-19-h-isac-tlp-white-observed-increase-qr-code-phishing-attacks-september-19-2023 Harmonization of Cyber Incident Reporting to the Federal Government. El Nino winter. https://www.cnn.com/2023/09/25/weather/el-nino-winter-us-climate/index.html