POPULARITY
On this edition of the ESW news, we're all over the place! Funding and acquisitions are a little sad right now, but AI and TikTok bans raise our spirits. The hosts are split on feelings about the new .zip gTLD, there's a new standard for scoring an "AI Influence Level" (AIL), and lessons learned from Joe Sullivan's case and other Uber breaches. Also, don't miss the new AI tool DragGAN, which enables near magical levels of ease when manipulating photos. What's even real anymore? We might not be able to tell for long... The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in the private and public sectors, Jon Check, executive director of Cyber Protection Solutions at Raytheon Intelligence & Space, will share the critical steps organizations must take to best prepare for a security breach. This segment is sponsored by Raytheon. Visit https://securityweekly.com/raytheonrsac to learn more about them! While companies utilize dozens of security solutions, they continue to be compromised and are continually searching for their real cybersecurity gaps amongst the overload of vulnerability data. A primary issue security teams face is that they lack a way to continuously validate the effectiveness of the different security solutions they have in place. Automated Security Validation is revolutionizing cybersecurity by applying software validation algorithms, for what was once manual penetration testing jobs. It takes the attacker's perspective to challenge the integrity and resilience of security defenses by continuously emulating cyber attacks against them. This segment is sponsored by Pentera. Visit https://securityweekly.com/penterarsac to learn more about them! Security teams are always on the lookout for external threats that can harm our organizations. However, an internal threat can derail productivity and lead to human error and burnout: repetitive, mundane tasks. To effectively defend against evolving threats, organizations must leverage no-code automation and free analysts to focus on higher-level projects that can improve their organization's security posture. This segment is sponsored by Tines. Visit https://securityweekly.com/tinesrsac to learn more about them! In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them! Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw319
On this edition of the ESW news, we're all over the place! Funding and acquisitions are a little sad right now, but AI and TikTok bans raise our spirits. The hosts are split on feelings about the new .zip gTLD, there's a new standard for scoring an "AI Influence Level" (AIL), and lessons learned from Joe Sullivan's case and other Uber breaches. Also, don't miss the new AI tool DragGAN, which enables near magical levels of ease when manipulating photos. What's even real anymore? We might not be able to tell for long... The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in the private and public sectors, Jon Check, executive director of Cyber Protection Solutions at Raytheon Intelligence & Space, will share the critical steps organizations must take to best prepare for a security breach. This segment is sponsored by Raytheon. Visit https://securityweekly.com/raytheonrsac to learn more about them! While companies utilize dozens of security solutions, they continue to be compromised and are continually searching for their real cybersecurity gaps amongst the overload of vulnerability data. A primary issue security teams face is that they lack a way to continuously validate the effectiveness of the different security solutions they have in place. Automated Security Validation is revolutionizing cybersecurity by applying software validation algorithms, for what was once manual penetration testing jobs. It takes the attacker's perspective to challenge the integrity and resilience of security defenses by continuously emulating cyber attacks against them. This segment is sponsored by Pentera. Visit https://securityweekly.com/penterarsac to learn more about them! Security teams are always on the lookout for external threats that can harm our organizations. However, an internal threat can derail productivity and lead to human error and burnout: repetitive, mundane tasks. To effectively defend against evolving threats, organizations must leverage no-code automation and free analysts to focus on higher-level projects that can improve their organization's security posture. This segment is sponsored by Tines. Visit https://securityweekly.com/tinesrsac to learn more about them! In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them! Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw319
In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them! Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw319
In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them! Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw319
Steve Ragan is the Co-chair of National Philanthropy Day Awards Committee. He Joins The Mitch Albom Show to discuss National Philanthropy Day.
Researchers describe Trojan Source, a hard-to-detect threat to the software supply chain. A ransomware gang takes a page from the information operator's book. From double extortion to triple extortion, as other ransomware gangs add distributed denial-of-service to encryption and doxing. Criminals are now hacking on material, non-public information, the FBI warns. Joe Carrigan looks at multifactor adoption at Twitter. Our guest is Steve Ragan from Akamai on API security. And criminals hit healthcare providers in Newfoundland. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/211
Hacker History sits down with Steve Ragan. Steve tells us about his early years of computer games, hacking, warez, modems, and dumpster diving. He eventually ends up as a security journalist and now is responsible for the yearly State of the Internet report. Show Notes Steve Ragan State of the Internet report
Steve Ragan, security researcher with Akamai, joins Lindsey O’Donnell-Welch to discuss the evolution of phishing kits over the past year, and how attacks on the identity and trust model will change as employees start to go back into the office.
In our latest episode of Security Nation, Steve Ragan joined the podcast to discuss his unlikely journey from reluctant security expert to journalist. For Steve, having the tech knowledge is important, but so is crafting a good story. We take deep dives on topics like where the industry was in the ‘90s plus the unique way he approaches Akamai’s “The State of the Internet” report (and their own podcast). We’ll hear why writing with empathy is a foundation of Steve’s process when tackling deeper technical subjects. Also, the joys of shameless self-promotion... Stick around for our Rapid Rundown, where we get quite the rapid rundown of three big events in security: North Korea’s campaign targeting security researchers, the takedown of the Emotet botnet, and (most importantly) the long-awaited cracking of Tod’s seven-year-old Dogecoin CTF.
Many of us know the risks of creating obvious and uncomplicated passwords like "password123," "12345," or (gulp) our name and birthday. But has that really stopped us from changing our ways? Not really, according to Steve Ragan, Lead Security Researcher at Akamai. Ragan has been covering the cybersecurity space for about 15 years and he believes that although the threats have become more sophisticated and widespread, retailers' and consumers' response plans haven't changed effectively. As a result, retail and hospitality businesses have become prime targets. According to Akamai's State of the Internet Report, 90% of all credential stuffing attacks during a two-year period targeted retail.
Podcast: Technical OutcastEpisode: IOCs and CVEs in the OT - Ep 002Pub date: 2020-10-25Today we're joined by Ron Brash, the Director of Cyber Security Insights at Verve Industrial Protection. In this episode, Steve and Ron talk about operational technologies (OT), and how CVEs are a tricky task to tackle these days. In addition, the two discuss the issues related to Ripple 20 - the collection of zero-day vulnerabilities in a widely used low-level TCP/IP software library developed by Treck, Inc that were disclosed by JSOF.The podcast and artwork embedded on this page are from Steve Ragan, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data breach.
In this episode, host Steve Ragan talks with Charles Henderson, global managing partner at IBM's X-Force Red, about smart cities and the potential vulnerabilities in IoT, as well as Daniel Crowley, research director at X-Force Red.
Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.
In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.
In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.
In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.
What is a phishing kit? In this podcast, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.
In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.
In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.
Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.
Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.
In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.
Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.
What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and security evangelist at VASCO Data Security.
As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game of phishing.
With the General Data Protection Regulation (GDPR) deadline fast approaching, host Steve Ragan explores the implications of noncompliance for companies -- and possible penalties -- with Greg Reber, founder/CEO of AsTech Consulting.
Robert Gibbons, CTO at Datta, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.
Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the world.
CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.
Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.
What does it mean to be a security professional? CSO's Fahmida Rashid and Steve Ragan break down what it takes to get ahead in the field.
Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.
Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?
So much of security comes down to 4 little words: Keep it simple, stupid. CSO’s Steve Ragan and Fahmida Rashid explain why there’s no magical mystery cure for ransomware. Also, how much is data from the Equifax breach worth? (Hint: It's a whole lot less than you might think.)
CSO's Fahmida Rashid and Steve Ragan dig into the latest phishing attempts (and how to sidestep them), plus the debate over application security, and some cool new tools.
Does attack attribution really matter? CSO's Fahmida Rashid and Steve Ragan argue that what, when and how a breach happened are the most immediate concerns. Who did it comes later.
Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.
The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.
A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.
In this exciting edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss how information security professionals should interact with the media. Steve (@SteveD3) prior to becoming an InfoSec Journalism Wizard for CSO he spent 15 years as an IT contractor. Last year Steve gave talks on how to interact with the media at conferences such as CircleCityCon and DerbyCon. With information security getting more play in the media recently it's important that we all have a basic understanding of how to interact with the media. In this episode we discuss: interacting with different types of media; contacting media to make a correction; the difference between on-the-record and off-the-record; not being afraid of the media; and a bonus story.
PodCast Show Notes: ControlTalk NOW thanks this week’s sponsors Contemporary Controls and International Solutions of America (ISA). 2014 ControlTrends Awards Nominees Nino DiCosmo, Tridium’s President and General Manager, and Thermokon’s North American Sales Manager, David Alliband, join us this week on ControlTalk NOW, providing unique insights into Nino DiCosmo’s high-profile executive role in running one of the world’s leading software platforms and David Alliband’s vigorous efforts to take the Thermokon product portfolio to the next level in the North American market. Contemporary Controls is your ideal partner for applying network technology to your BACnet building automation project. The industry is embracing Ethernet connectivity to Direct Digital Controllers (DDC) along with open protocols such as BACnet, Modbus, and Sedona Framework. ISA’s warehouse maintains a large inventory of new and reconditioned parts. From years of experience, we know the parts our customers need most. So in most cases, your parts are shipped within 24 hours — in many instances, the same day — saving you the expense of lengthy down-time. ControlTrends Awards Finalist Sky Foundryy: Are you drowning in a sea of Big Data? John Petze and his team at SkyFoundry have created a Building Automation Controls analytics package that allow you to easliy find the data that matters to you. Whether you are looking at trends, alarms, or faults SkyFoundry enables the creation of “Sparks” (events) that allow you to interact with your data in powerful ways that make your buildings safer and more efficient. Lynxspring Nominated for Multiple 2014 ControlTrends Awards! E-news from Marc Petock. We are pleased to announce that Lynxspring has been nominated as finalists in the 2014 Control Trend Awards in several categories. The Control Trend Awards recognize the people, product, and manufacturers in our industry that make the HVAC, Controls, and Building Automation Industry what it is today. Heads Up! Hackers Hint at Terror Attacks, Release More Data from Sony Pictures. We received this notice from IT World’s Senior Staff Writer, Steve Ragan. Now that we learned of this potential threat, we need to pass it on to the ControlTrends Community for greatest dissemination. Sony’s $60 Million dollar insurance coverage will not be enough to recover from theft of Sony Pictures Entertainment content and the leakage of more than 200GB of data, including pre-release movies, executive emails, sales and marketing data, and nearly everything from human resources. Niagara Framework Changed Our World! Tridium’s Niagara AX is nominated for the 2014 ControlTrends Awards Building Integration & Automation Software of the Year. And,understandably so. The Niagara Software platform has driven change and innovation — and made the smart connected building, as we able to perceive it, a reality. Tridium’s next gen framework, Niagara 4, whose full release is imminent, is even more awesome. CTN Interview with Tridium’s Nino DiCosmo, nominated for the 2014 ControlTrends Awards Executive of the Year, Large Manufacturer. Nino DiCosmo is an accomplished global executive recognized for commitment to setting and achieving Tridium’s vision and goals. Nino is an expert at scaling operations, building customer focused teams, and leading innovative product development. Thermokon — Keeping in Touch with the Future. Thermokon EasySens- EnOcean is nominated for the 2014 ControlTrends Wireless Product/Solution of the Year. David Alliband, Sales Manager, North America is excited about Thermokon’s continued success and the many wired and wireless products and solutions Thermokon has to offer. When Thermokon Sensortechnik GmbH was founded in 1987 by Harald Zygan in Mittenaar-Bicken, Germany, hardly anyone expected the business to grow out of this scale. CTN Interview with David Alliband, Sales Manager, North America. David Alliband reviews the variety of wired and wireless products available from Thermokon and the HVAC applications the Thermokon products are especially well-suited for. Thermokon has grown from a sensor manufacturer to a solutions provider with a broad range of highly competitive quality products available from a distributor near you. Rising Plug-in Electric Vehicle Adoption — Impacts on the Grid (Negligible, for Now). December, 2014: Six utilities that participated in DOE’s cost-shared Smart Grid Investment Grant (SGIG) program deployed in-home and public electric vehicle charging stations and evaluated customer charging behaviors and impacts on the grid. There are relatively few plug-in electric vehicles on the road today, and as a result the six SGIG projects focused on establishing the charging infrastructure with a relatively low number of stations and evaluated a small number of participating vehicles. CTN’S Smart Building Tip of the Week: Accruent’s Facility 360 — Become a Driver of Success. Convert your facility from a cost center to a strategic contributor. Great information from Accruent on how facilities management teams can play a more strategic role in organizations.7 Ways to Save Time, Costs, and Energy: Download White Paper. In a world where you must find ways to “do more with less,” finding ways to cut costs can be challenging – and time consuming. The post ControlTalk NOW for the Week Ending December 21, 2014 appeared first on ControlTrends.