Just Room Silence. Nothing More. There is nothing else here. Just episodes once a week of just room silence.
…
continue reading
Connect: https://darylxdr.com/connect/ Subscribe: http://bit.ly/subscribe_xdRYouTube These are the thoughts of a random Filipino who lives in the heart of Brampton, ON and has embarked on a journey of becoming an Enlightened Herculean Time Traveller. You've stumbled on the Enlightened series, which is only one part of the trilogy. We'll be focusing on topics of our soul, spirituality, life purpose and philosophy. From time to time, we will dive deep into the depths of life mysteries, and swi ...
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
…
continue reading
Podcast by SRAM and SimplyStu
…
continue reading
bOred fAt kiD mAkinG baD pOdcaSts
…
continue reading
IT in the Bay podcast is bringing you causal enterprise IT conversations about networking, security and collaboration.
…
continue reading
After getting through a recurrence of lymphoma that damaged the base of my spine, I’m left pondering the concept of survival and how it's not as easy as it seems. In a series of interviews with people who have experienced all kinds of life-changing disease and trauma, I explore what it means to survive and perhaps, at some point, live happily ever after.
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
Welcome to 'Community Connect,' this is the space where we dive into the benefits of seamlessly integrating security products using open source software and standards, all with the goal of fostering a more interoperable security ecosystem. In each episode, we'll embark on a journey into the heart of the OCA community, engaging in insightful conversations with the individuals who are actively shaping the open source security landscape. Expect to stay up-to-date with the very latest developmen ...
…
continue reading
1
What does materiality mean exactly? [CSO Perspectives]
12:21
12:21
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
12:21
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the meaning of cybersecurity materiality. References: Amy Howe, 2024. Supreme Court strikes down Chevron, curtailing power of federal agencies [Blog] Cydney Posner, 2023. SEC Adopts Final Rules on Cybersecurity Disclosure [Explainer]. The Harvard Law School Forum on Corporate G…
…
continue reading
1
Cybersecurity is radically asymmetrically distributed. [CSOP]
18:53
18:53
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:53
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the idea that Cybersecurity is radically asymmetrically distributed. It means that cybersecurity risk is not the same for all verticals and knowing that may impact the first principle strategies you choose to protect your enterprise. For a complete reading list and even more in…
…
continue reading
1
The Tech Outage Heard Around the World
48:53
48:53
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
48:53
The Ripple Effect of Crowdstrike's Technical Outage was truly the outage heard round the world. In this show we discuss the issue with a seasoned IT and cybersecurity veteran, not only from a “what happened” perspective but from a vulnerability and cyber futures perspective. This podcast welcomes Ben Card, Co-Founder and CTO/CISO at Webcheck Securi…
…
continue reading
1
The current state of zero trust. [CSOP]
18:29
18:29
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:29
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the current state of zero trust with CyberWire Hash Table guest John Kindervag, the originator of the zero trust idea. References: Jonathan Jones, 2011. “Six Honest Serving Men” by Rudyard Kipling [Video]. YouTube. Dave Bittner, Rick Howard, John Kindervag, Kapil Raina, 2021. Z…
…
continue reading
1
The current state of Cyber Threat Intelligence. [CSOP]
17:31
17:31
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
17:31
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant’s Chief Analyst. References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Josephine Wolff, Octob…
…
continue reading
1
The current state of MITRE ATT&CK. [CSOP]
18:37
18:37
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:37
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of MITRE ATT&CK with CyberWire Hash Table guests Frank Duff, Tidal Cyber’s Chief Innovation Officer, Amy Robertson, MITRE Threat Intelligence Engineer and ATT&CK Engagement lead, and Rick Doten, Centene’s VP of Information Security. References: Amy L. R…
…
continue reading
1
The current state of IAM: A Rick-the-toolman episode. [CSOP]
13:56
13:56
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
13:56
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K CyberWire, discusses the current state of Identity and Access Management (IAM) with CyberWire Hash Table guests Ted Wagner, SAP National Security Services, and Cassio Sampaio Chief Product Officer for Customer Identity, at Okta. References: John Kindervag, 2010. No More Chewy Centers: In…
…
continue reading
This podcast welcomes Jake Hiller, Co-Founder and Sales Director at Nexus IT, as we discuss ever evolving cyber strategy and services.Bởi Gregory Johnson
…
continue reading
1
The current state of XDR: A Rick-the-toolman episode. [CSOP]
19:29
19:29
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
19:29
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of “eXtended Detection and Response” (XDR) with CyberWire Hash Table guests Rick Doten, Centene’s VP of Security, and Milad Aslaner, Sentinel One’s XDR Product Manager. References: Alexandra Aguiar, 2023. Key Trends from the 2023 Hype Cycle for Security…
…
continue reading
Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, presents the argument for why the SEC was misguided when it charged the SolarWinds CISO, Tim Brown, with fraud the after the Russian SVR compromised the SolarWinds flagship product, Orion. Our guests are, Steve Winterfeld, Akamai’s Advisory CISO, and Ted Wagner, SAP Nationa…
…
continue reading
Rick Howard, N2K CyberWire’s Chief Analyst, CSO, and Senior Fellow, commemorates Memorial Day. References: Abraham Lincoln, 1863. The Gettysburg Address [Speech]. Abraham Lincoln Online. Amanda Onion, Original 2009, Updated 2023. Memorial Day 2022: Facts, Meaning & Traditions [Essay]. HISTORY. Brent Hugh, 2021. A Brief History of “John Brown’s Body…
…
continue reading
1
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us by Eugene Spafford, Leigh Metcalf, Josiah Dykstra ...
16:21
16:21
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
16:21
Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, interviews Eugene Spafford about his 2024 Cybersecurity Canon Hall of Fame book: “Cybersecurity Myths and Misconceptions.” References: Eugene Spafford, Leigh Metcalf, Josiah Dykstra, Illustrator: Pattie Spafford. 2023. Cybersecurity Myths and Misconceptions: Avoiding the Ha…
…
continue reading
1
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Tracers in the Dark by Andy Greenberg. [CSOP]
18:21
18:21
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:21
Rick Howard, N2K’s CSO and The Cyberwire’s Chief Analyst and Senior Fellow, interviews Andy Greenberg about his 2024 Cybersecurity Canon Hall of Fame book: “Tracers in the Dark.” References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Larry Pesce, 2024. Tracers in the Dark: The…
…
continue reading
In this episode of OCA Community Connect, we speak with Md Saroer-E Azam, a software developer at IBM and a key maintainer/contributor to STIX Shifter. The focus of today's discussion is the STIX Shifter project, an open-source python library designed to facilitate the connection and querying of diverse data sources no matter where they reside. It …
…
continue reading
Welcome back to OCA Community Connect, your source for all things related to the Open Cybersecurity Alliance. In today's episode, we have the pleasure of speaking with Vasilios Mavroeidis, a cybersecurity professor at the University of Oslo and a member of the OCA governing board. So, join us as Vasilios Mavroeidis shares his expertise and insights…
…
continue reading
Host Greg Johnson delves into the details and differences between automated and manual penetration testing. Find out which is right for you!Bởi Gregory Johnson
…
continue reading
Welcome back to another insightful episode of OCA Community Connect. Today, our host Roseann Guttierrez engages in a compelling conversation with Mark Mastrangeli, the cloud engagement director at Palo Alto Networks and co-chair of the OCA Project Governing Board (PGB). Mark shares his remarkable journey into the tech industry and the pivotal role …
…
continue reading
1
Kestrel as a Service (KaaS) - Nov 2023
11:40
11:40
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
11:40
Welcome to another fascinating episode of OCA Community Connect! In this installment, our host, Roseann Guttierrez, engages in an insightful conversation with Kenneth Peeples, a principal cybersecurity architect at Red Hat, to unravel the ins and outs of the cutting-edge Kestrel as a Service (KaaS) project. As Kenneth shares the nitty-gritty detail…
…
continue reading
1
Open XDR Architecture (OXA) - July 2023
14:06
14:06
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
14:06
In this episode of OCA Community Connect, we delve into the world of Open XDR Architecture (OXA) with our guest, David Bizeul, the co-founder and chief scientific officer of Sequoia IO. David provides an in-depth look at OXA, its significance, and the impact it has on the cybersecurity community. He emphasizes the importance of preserving expert re…
…
continue reading
1
Cybersecurity Automation Sub Project (CASP) and Village - June 2023
11:02
11:02
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
11:02
In this episode of OCA Community Connect, we have the pleasure of welcoming Duncan Sparrell, chief cyber curmudgeon of sFractal Consulting LLC, and OASIS Board member. Duncan gives us a glimpse into the Cybersecurity Automation Sub-Project (CASP) and also shares information on the recent cybersecurity automation village event, providing highlights …
…
continue reading
In this episode of OCA Community Connect, our host Roseann Guttierrez sits down with Xiaokui Shu, a senior research scientist from IBM and chair of the OCA technical steering committee, to delve into the world of cybersecurity and the Kestrel subproject. Xiaokui provides an insightful overview of Kestrel as a threat hunting language aimed at stream…
…
continue reading
Jason Keirstead, a Distinguished Engineer with IBM and the CTO of Threat Management, discusses the importance of the Open Cybersecurity Alliance (OCA) in addressing the problem of interoperability in cybersecurity. He explains that the lack of common ways to integrate cybersecurity products has led to inefficiencies and high costs for vendors and c…
…
continue reading
1
Continuous Threat & Exposure Management with Shield Cyber
35:34
35:34
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
35:34
This podcast welcomes Dylan Hutchinson, Head of Channel & Alliances at Shield Cyber. Our topic: Continuous Threat & Exposure ManagementBởi Gregory Johnson
…
continue reading
In this episode of OCA Community Connect, our guest Danny Elliott, a senior product owner for UDI and CAR integrations at IBM Security, gives us an inside look into the STIX Shifter project. He explains how this Python library facilitates data retrieval from various security products and data repositories using STIX Patterning. Once the data is fou…
…
continue reading
In this podcast episode, Charles Frick, a Chief Scientist at Johns Hopkins University Applied Physics Laboratory, discusses the Indicators of Behavior (IOB) subproject under the Open Cybersecurity Alliance. He explains the need for open standards to represent cyber adversary behaviors, aiming to share detections with longer shelf lives than current…
…
continue reading
1
Bonus: Examining the current state of security orchestration. [CyberWire-X]
32:13
32:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
32:13
In this bonus episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by guest Rohit Dhamankar, Fortra's Vice President of Product Strategy, and Hash Table member Steve Winterfeld, Akamai's Advisory CISO to discuss CISO initiatives such as vendor consolidation, automation, and attack surface management as a way t…
…
continue reading
This podcast welcomes Neil Gonsalves, Founder and CEO of Webcheck Security’s longtime partner, AARC-360. Joining Neil is Bernie Wedge, a key member of AARC-360's Advisory Board. Today’s topic: What’s New in IT Compliance in 2024Bởi Gregory Johnson
…
continue reading
1
Webinar Recording: Improve your defenses against security threats!
54:59
54:59
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
54:59
Join LookingPoint and Arctic Wolf, our team of security experts highlight how organizations combat security threats by leveraging Arctic Wolf Incident Response and 24x7 Detection & Response for a fraction of the cost of hiring a full-time employee!Bởi LookingPoint
…
continue reading
The CyberWire honors U.S. veterans on the national holiday. Learn more about your ad choices. Visit megaphone.fm/adchoicesBởi N2K Networks
…
continue reading
1
The Need for Security Awareness in the Rank and File
36:10
36:10
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
36:10
Every day we receive emails that look compelling – from “new salary authorization” to Docusign and other signature envelopes or other means of phishing and downloading malware onto my system. The problem is, the rank and file employee gets fooled by these daily, and can cost an organization millions of dollars in damages through data leakage, ranso…
…
continue reading
1
Endpoint Security: Entering the Era of AI and XDR. - CFH #30
12:56
12:56
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
12:56
Endpoints are everywhere and come in many forms, and especially in today’s BYOD environment, it’s becoming increasingly difficult to maintain visibility and control over all of them. Unfortunately, rouge endpoints represent an enticing attack vendor for adversaries who are always looking for a way inside your network. But according to an August 202…
…
continue reading
1
Level Up: How Managed Services Providers Can Exceed Evolving SecOps Expectations - Christopher Fielder - CFH #30
36:34
36:34
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
36:34
The days of an MSSP or MSP being a security device babysitter are over. Clients expect more from your SOC, SIEM and SecOps offerings, and evolving attacks will demand more of you. It's time to level up -- but how does one upgrade from basic to top-tier services? According to our featured speaker, there are several key steps: more comprehensive, cro…
…
continue reading
In the early 2000’s the cyber industry started with LogRhythm and Splunk by storing logs which might provide insight into data breach and anomaly; 20 years later and light years beyond mere SIEM, the XDR Market is flooded with products and full service vendors and MSSPs. What is real and what is hype? In this podcast we learn from CEO Matt Daley fr…
…
continue reading
1
Best practices for MITRE ATT&CK(R) mapping.
17:41
17:41
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
17:41
Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, discusses the latest developments in mapping the MITRE ATT&CK(R) wiki to your deployed security stack with guests James Stanley, section chief at the U.S. Cybersecurity and Infrastructure Security Agency, John Wunder, Department Manager for Cyber Threat Intelligence and Adv…
…
continue reading
Rick Howard, the CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of cybersecurity risk forecasting with guests Fred Kneip, CyberGRX’s founder and President of ProcessUnity, and Kevin Richards, Cyber Risk Solutions President. Howard, R., 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Wi…
…
continue reading
1
Distributed Denial of Service prevention: Current state.
17:35
17:35
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
17:35
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Distributed Denial of Service (DDOS) prevention with CyberWire Hash Table guests Steve Winterfeld, Akamai’s Field CSO, and Jim Gilbert, Akamai’s Director Product Management, and Rick Doten, the CISO for Healthcare Enterprises and Centene. Howard, R.,…
…
continue reading
1
Quantum computing: A threat to asymmetric encryption.
17:33
17:33
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
17:33
Rick Howard, the CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the meaning of quantum computing through a cybersecurity perspective with CyberWire Hash Table guests Dr. Georgiana Shea, Chief Technologist at the Foundation for Defense of Democracies, and Jonathan France, the Chief Information Security Officer at ISC2. Research contri…
…
continue reading
1
Supply Chain Security: How Moving Accountability Upstream Helps & Hurts MSSPs - Dave Sobel - CFH #29
35:35
35:35
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
35:35
One of the most significant takeaways of the White House's recently unveiled National Cybersecurity Strategy is the assertion that software developers, OEMs, and technology service providers must bear the brunt of the responsibility -- rather than end-users -- for keeping cyber environments secure. With the looming prospect of further legislation a…
…
continue reading
1
Sign Language: How to Write Effective Security Services Contracts - CFH #29
26:17
26:17
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
26:17
There's a lot that goes into the creation of a managed services contract before the client ever puts their John Hancock on the dotted line. As an MSSP, you want to make sure that expectations, for both sides of the relationship are spelled out clearly and cogently. The language within must address key terms and stipulations related to payments, rol…
…
continue reading
1
The Evolving Cyber Insurance Landscape
53:11
53:11
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
53:11
The cyber insurance landscape has changed. In this episode, we’re blessed to discuss this topic with two amazing experts, COO Kelsey Kelly and CEO Bob Sargent, of eSpecialty Insurance.Bởi Gregory Johnson
…
continue reading
1
First principle strategies with CJ Moses.
17:44
17:44
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
17:44
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses cybersecurity first principle strategies with CJ Moses, CISO of AWS. Howard, R., 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Wiley. URL: https://www.amazon.com/Cybersecurity-First-Principles-Strategy-Tactics/dp/1394173083. Staff, 2022. …
…
continue reading
1
Patrolling the dark web: The challenges and opportunities of outsourced threat intel - Alex Holden - CFH #28
36:38
36:38
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
36:38
Our guest for this segment spends his days where others dare not tread: the deep dark web. Here he collects information on cybercriminal activity that could be a precursor to major attack or evidence that one has already occurred. For companies that can't or won't conduct dark-web recon for themselves, outsourcing this threat intelligence service i…
…
continue reading
1
Equal Time? Ensuring Each MSSP Client Gets Their Fair Share of Attention - CFH #28
19:37
19:37
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
19:37
Every MSSP customer is different in their own way. But they all deserve to remain secure from attacks. And so it's important that managed services providers don't play favorites to the point where certain clients eat up a disproportionate amount of time and resources. MSSPs must ensure that they are fairly and proportionally allocating their accoun…
…
continue reading
1
Non-compliant Clients: Righting the Ship Before Regulators Pounce - Brian Johnson - CFH #27
31:53
31:53
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:53
Try as they might to keep their clients in compliance with privacy and security regulations, managed services providers are still at the mercy of the organizations they serve. Unfortunately, companies don't always follow the MSSP's or vCISO's advice on items like responsible data stewardship, privacy policies and breach notification. If an attack d…
…
continue reading
1
Beware FUD: Avoiding Fear Tactics when Selling Your Managed Services - CFH #27
28:10
28:10
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
28:10
The consequences of a cyberattack can be devastating, and it does make sense for managed security services providers to impress on their current and prospective clients the risks of not investing in prevention and response. However, many cyber thought leaders believe that certain lines should not be crossed. Advice is one thing; fearmongering is an…
…
continue reading
Webcheck partners with IT Assurance or CPA firms to provide SOC 2, ISO 27001 and other services. In this podcast, we learn about client-focused professional services firm Johanson Group, LLP, and trends in the cyber assurance space! With Guest Ryan Johanson.Bởi Gregory Johnson
…
continue reading
1
M&A Madness: Overcoming MSSP Integration Challenges Following an Acquisition - Jim Broome - CFH #26
36:33
36:33
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
36:33
Last year, ChannelE2E listed more than 1,000 merger and acquisition deals involving MSPs, MSSPs and other similar service provider organizations. Typically when any M&A deal occurs, there are bound to be redundancies and overlaps in services, tools and personnel. For MSSPs that find themselves in this situation, it's important to consolidate and in…
…
continue reading
1
Avoiding Security Monitoring Alert Fatigue: When Do You Escalate to Your Client? - CFH #26
25:33
25:33
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
25:33
MSSP SOC analysts are often barraged with security alerts that pop up as anomalous activity is detected on clients' networks. Not all of these notifications are worth reporting and acting upon, but it takes only one overlooked incident to result in a full-fledged attack on the customer. This segment will look at the perennially challenging question…
…
continue reading
1
Webinar Recording: Learn How To Modernize Your Physical Security
39:11
39:11
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
39:11
We'll be discussing these game-changing solutions and showcasing how the integration of Genea's cloud-based access control and Meraki's cutting-edge cameras and sensors can make this possible.Bởi LookingPoint
…
continue reading
1
Risk Quantification & Optimization: Reducing the Randomness of Risk Response - Ira Winkler - CFH #25
38:21
38:21
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
38:21
Risk isn't a static measurement. Threats like malware campaigns, vulnerabilities, human error and unreliable third-party partners can fluctuate in their severity depending on ever-changing circumstances. That's why knowing which risk is of highest priority at any given time can allow MSSPs to dynamically adjust their prevention and mitigation effor…
…
continue reading