A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possib…
Cybersecurity interview with ChatGPT.
In part one of CyberWire’s Interview with the AI, Brandon Karpf interviews ChatGPT about topics related to cybersecurity. Rick Howard joins Brandon to analyze th…
Nadine Michaelides from Anima People sits down with Dave to discuss preventing insider threat using behavioral science and psych metrics. Joe and Dave share some follow up regarding a Facebook scamme…
A software program installed unintentionally by a user that typically performs tasks not asked for by the installer.
CyberWire Glossary link: https://thecyberwire.com/glossary/potentially-unwanted-p…
Rohit Dhamankar from Fortra’s Alert Logic joins Dave to discuss the decline in ransomware attacks and lessons learned from the front lines. Dave and Joe share some listener follow up from Keith regar…
Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.
CyberWire Glossary link: https://thecyberwire.com/glossary…
Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its sell…
The name of a wireless access point.
CyberWire Glossary link.
Audio reference link: SSID Management - CompTIA Security+ SY0-401: 1.5, Professor Messer, uploaded August 3rd, 2014.
Guest Eric Levine, Co-founder and CEO at Berbix, joins Dave to discuss identity fraud. Dave and Joe share comments from listener Chris on a series of SMS messages he got from "Wells Fargo." Joe's sto…
A U.S. Government specification for data encryption using an asymmetric key algorithm.
CyberWire Glossary link: https://thecyberwire.com/glossary/advanced-encryption-standard
Audio reference link: pa…
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined …
Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson St…
This week, Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram scams and how to avoid them. Dave and Joe share some follow-up on Apple, why they ar…
A set of tools designed to safeguard data while in use in motion and at rest.
CyberWire Glossary link: https://thecyberwire.com/glossary/data-loss-prevention
Audio reference link: HistoryHeard. “Dat…
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined …
Kaspars Ruklis, the Program Manager for Media Literacy from IREX sits down with Dave to talk about the very verified media literacy program. Dave and Joe share some listener followup on some of the b…
A system that translates text-based URLs to their underlying numerical IP addresses.
CyberWire Glossary link: https://thecyberwire.com/glossary/domain-name-system-dns
Audio reference link: HistoryHea…
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined …
Guest Giulia Porter, Vice President of RoboKiller, discusses their mid-year report on phone scams. Following that phone scam line, Dave has a story about the international takedown of online crimewar…
A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.…
00:06:07 |
Tue 06 Dec 2022
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.