Tuesday, September 27, 2022

Fractured Web with Charlie Northrup

Charlie Northrup is the co-founder of NeurSciences, a software technology, architecture, and solutions development company that provides there artificially intelligent digital brain applications to integrate, manage, and automate the things that truly matter to us. He’s focused on the...

The Weakest Link with Arun Vishwanath

Arun Vishwanath, a leading expert in human cyber risk, has held faculty positions at the University at Buffalo, Indiana University, and the Berkman Klein Center for Internet & Society at Harvard University. He has published close to 50 peer-reviewed...

Biomatrix with Jeff Jockisch and Dave Burnett

Jeff Jockisch is a privacy expert with experience in privacy rights, privacy laws, data breaches, intrusion detection, as well as other areas, such as cognitive computing, content development and trust systems. He is also cohost of “Your Bytes, Your...

Breaking into Cyber with Alyssa Miller

Alyssa Miller is a life-long hacker and experienced security executive. She has a passion for security which she advocates to fellow business leaders and industry audiences both as a high-level cyber security professional and through her presence in the...

Flavor with Anastasia Edwards

Anastasia Edwards is an innovative thinker and Cybersecurity Professional with refreshing soft skills in empathy, emotional intelligence, awareness communications, and cultural change implementation. Her sweet spot is melding Cybersecurity Awareness together with Insider Threat monitoring and detection. She is...

Quantum Village with Mark Carney and Victoria Kumaran

Mark Carney and Victoria Kumaran are the founders/ organizers of the up and coming Quantum Village that will debut DEFCON 30, August 2022.Mark, aka @LargeCardinal is a researcher and Technical Specialist in Quantum Cybersecurity and ML at a bank....

The Futurist with Pablos Holman

Pablos Holman is a notorious hacker, inventor, entrepreneur and technology futurist who thinks differently to solve the world’s biggest problems by inventing new technology. At The Intellectual Ventures Lab, he has worked on a brain surgery tool, a machine...

Lethal Weapwn with Frankie McRae

Frankie McRae is a storied former US Army Special Forces soldier and assault team leader. Since his retirement, Frankie has developed Range 37PSR, founded Raidon Tactics (a premiere training organization), deployed all over the world as a contractor to...

Threat Hunter Girl with Nicole Hoffman

Experienced Intelligence Analyst and creator of the Cognitive Stairways of Analysis Framework, Nicole Hoffman has a passion for developing the analytic tradecraft. Her work, research, and presentations have inspired and educated others around the international analytic community.  For someone...

Shred with George Gerchow

For those unfamiliar with the snowboarding slang term Shred, it means “to ride with exceptional speed, ability, or enthusiasm, especially in difficult terrain and conditions”.Sumo Logic’s CSO, George Gerchow, applies this methodology whether it’s by way of Board, or...

Unanimous AI with Louis Rosenberg, PhD

Louis Rosenberg, PhD is a technology pioneer in fields of virtual reality (AR), augmented reality (AR) and artificial intelligence (AI). He founded Unanimous AI to amplify the intelligence of networked human groups using the biological principle of Swarm Intelligence combined...

YinYang with Jeremy Miller

The YinYang philosophy says that the universe is composed of competing and complementary forces governed by a cosmic duality, sets of two opposing and complementing principles or energies that can be observed in nature.Similarly, the nature of offensive security...

Legal Robbery with Matt Barnett

Matt Barnett is a nationally recognized expert on physical and cybersecurity, incident response, identity theft, and digital forensics. His expertise is backed by decades of combined information security and law enforcement experience. As a certified forensic analyst, Matt conducts...

Hacker DNA with Gummo

Gummo is a former blackhat hacker and reverse engineer turned whitehat who has been breaking shit since '86. His success has been attributed to a unique gift we discuss as well as his extensive knowledge of defeating secure networks...

In The Shadows with Jim Tiller

Jim Tiller is a security executive with over two decades of information security experience, leadership, a history of outstanding performance and growth, business turnarounds, and global recognition for innovation in security strategies and execution. He currently serves as the...
The Register

Ukraine fears ‘massive’ Russian cyberattacks on power, infrastructure

Will those be before or after the nuke strikes Putin keeps banging on about? Russia plans to conduct "massive cyberattacks" on Ukraine and its allies' critical infrastructure and energy sector, according to Kyiv.…

BrandPost: Extortion Economics: Ransomware’s New Business Model

Did you know that over 80% of ransomware attacks can be traced to common configuration errors in software and devices? This ease of access is one of many reasons why cybercriminals have become emboldened by the underground ransomware economy.And...

Police ‘all over’ dark web ransom threat to release 10,000 customer records a day, Optus CEO says

Purported hackers post ultimatum demanding $1m within four days after massive Optus data breachFollow our Australia news live blog for the latest updatesGet our free news app, morning email briefing or daily news podcastThe chief executive of Optus, Kelly...

Barracuda Unveils New Capabilities To Protect Against Persistent And Evolving Threats

Barracuda announced a number of product enhancements and innovative new capabilities at its recent Secured.22 virtual conference to expand the protection for customers and help them defend against the latest cyber threats.

Zoho ManageEngine flaw is actively exploited, CISA warns

A remote code execution vulnerability in Zoho's ManageEngine, a popular IT management solution for enterprises, is being exploited in the wild. The US Cybersecurity & Infrastructure Security Agency (CISA) added the flaw to its catalog of known exploited vulnerabilities...