Romain Basset, Director of Customer Service, at Vade joins Dave to discuss the threat of initial contact spearphishing emails now that many employees are returning to the office. Dave and Joe share s…
This week, Carole Theriault sits down to talk with Paul Ducklin from Sophos on extortion scams targeting LGBTQ+ communities. Joe and Dave share multiple pieces of listener follow up, the first from M…
The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube,…
Kelly Shortridge, a Senior Principal from Fastly, joins Dave to discuss her talk at RSAC on why behavioral science and behavioral economics matters for InfoSec. Joe's story shares an old scam with a …
A set of solutions for ensuring that the right users can only access the appropriate resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management
Audio referen…
Josh Yavor, CISO at Tessian, joins Dave to discuss a new report they released on cyber mistakes and why employees make them. Joe and Dave share a listener follow-up from Jon, who writes in about ment…
A process of hiding the complexity of a system by providing an interface that eases its manipulation.
CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer
Audio reference link…
Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe a…
A set of services for managing identity and access management, or IAM across all of an organization's data islands.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric
Audio re…
Carole Theriault interviews author and journalist Geoff White on his upcoming book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War." Joe and Dave share some…
A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.
CyberWire Glossary link: https://thecyberwire.com/glossary/intr…
Abhik Mitra, Head of Portfolio Strategy at Code42, shares the findings on Code 42's 2022 Data Exposure Report (DER). Joe breaks down a story that follows a couple in Westlake, where the woman was cal…
A subset of security orchestration, the management of identities across an organization's set of digital islands.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration
Andrew Morris, founder and CEO of GreyNoise Intelligence, joins Dave to discuss the explosive increase in opportunistic scan-and-exploit cyber attacks, and what security analysts can do to combat it.…
A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the a…
Ryan Kovar, distinguished security strategist at Splunk and leader of SURGe, discusses the speed of ransomware, as well as the first-of-its-kind research the SURGe team is releasing on how quickly th…
A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation.
CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck
Audio re…
Ann Johnson, Security Executive at Microsoft and host of the afternoon cyber tea podcast, joins Dave to discuss social engineering and ways to help prevent it, as well as the different types of socia…
The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.
CyberWire Glossary link:
Audio reference link: "10+ Deploys…
Mark Horne, Chief Marketing Officer at Pindrop, joins Dave to discuss voice authentication, Dave and Joe have some follow up about business phishing (BECs) from listeners Nick and Michael, Joe's stor…
00:48:02 |
Thu 19 May 2022
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.