Wednesday, June 19, 2019
CyberSecurityInterviews

#071 – Renaud Deraison: Complexity Breeds Insecurity

Renaud Deraison is known in the global security community as the father of the Nessus vulnerability scanner. His original creation, Nessus, celebrated its 15th anniversary in 2013 and is considered the de facto standard for vulnerability scanning worldwide. Renaud...
CyberSecurityInterviews

#070 – Lorrie Cranor: Help Open The Doors

Lorrie Faith Cranor is the Director and Bosch Distinguished Professor in Security and Privacy Technologies of CyLab and the FORE Systems Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University. She also directs the...
CyberSecurityInterviews

#069 – Ben Johnson: Break Down The Problems

Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded Carbon Black and most recently served as the company’s Chief Security Strategist. As the company’s original CTO, he led efforts to create the powerful...
CyberSecurityInterviews

#068 – Deborah Blyth: Security Is Everybody’s Job

Deborah Blyth is the Chief Information Security Officer (CISO) State of Colorado, Governor’s Office of Information Technology. In August 2014, Deborah Blyth became the state’s new CISO, bringing a diverse 25-year technology background including 14 years of information security...
CyberSecurityInterviews

#067 – Fred Kneip: Compliance Does’t Equal Security

Fred Kneip is the CEO and Founder of CyberGRX. Since founding the company in 2015, Fred has led the creation of the world’s first global third-party cyber risk management (TPCRM) exchange. During his tenure at CyberGRX, Fred has been...
CyberSecurityInterviews

#066 – Alissa Torres: A Well Balanced Approach

Alissa Torres is a SANS analyst and Principal SANS instructor specializing in advanced digital forensics and incident response (DFIR). Alissa was recognized by SC Magazine as one of its “2016 Women to Watch.” and a recipient of the Enfuse...
CyberSecurityInterviews

#065 – Lizzie Cookson: Attackers Adapt With Us

Lizzie Cookson is an Associate Director of Cyber Investigations at Kivu Consulting. She specializes in cyber extortion and threat intelligence with a focus on attacker negotiations, threat actor profiling, and data breach remediation. Lizzie’s case work has included network...
CyberSecurityInterviews

#064 – Georgia Weidman: Cyber Security Lion Repellent

Georgia Weidman is the founder and CTO of Shevirah and is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, author, and angel investor. She holds a MS in computer science as well as holding CISSP, CEH, and OSCP...
CyberSecurityInterviews

#063 – Dean Sysman: You Are Swamped With Data

Dean Sysman, is the CEO and co-founder, Axonius. Dean is a world renowned expert in cybersecurity and has been honored with being in the Forbes 30 Under 30 Israel 2017 list. Before founding Axonius, Dean co-founded Cymmetria, A YC-backed...
CyberSecurityInterviews

#62 – Chad Loder: Just Because It’s Basic, Doesn’t Mean It’s Easy

Chad Loder is the CEO and co-founder of Habitu8, a Los Angeles-based cyber security startup that’s transforming the security awareness industry away from its traditional “training-centric” approach to an approach that is based on measurable risk reduction through influencing...
CyberSecurityInterviews

#61 – Yonathan Klijnsma: If They Get Compromised, You Get Compromised

Yonathan Klijnsma is a threat researcher at RiskIQ, leading threat response and analysis efforts with the help of RiskIQ’s expansive data set. Both his work and hobbies focus on threat intelligence in the form of profiling threat actors as...
CyberSecurityInterviews

#060 – Mike Johnson: Let’s Do The Right Thing

Mike Johnson is the CISO of Lyft, where he is responsible for Security, Data Privacy, and a few other key areas he can’t talk about. He’s been in the security field long enough to be able to use “decades”...
CyberSecurityInterviews

#059 – Jacob Williams: What Didn’t We Catch

Jacob Williams is the Founder and President of Rendition Infosec. Jake started his information security career doing classified work with the U.S. government and was awarded the National Security Agency (NSA) Exceptional Civilian Service Award, which is given to fewer...
CyberSecurityInterviews

058 – Josh Corman: The Absence of Good

Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Josh previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai,...
CyberSecurityInterviews

057 – Ron Gula: Encourage People To Be Entrepreneurs

Ron Gula is the President of Gula Tech Adventures. Ron started his cybersecurity career as a network penetration tester for the NSA. At BBN, he developed network honeypots to lure hackers and he ran US Internetworking’s team of penetration testers...
TechRepublic

How AI-enhanced malware poses a threat to your organization

Malware controlled by artificial intelligence could create more convincing spam, avoid security detection, and better adapt itself to each target, says a new report from Malwarebytes.
TechRepublic

Tech news roundup: HPE Discover 2019, Facebook’s Libra cryptocurrency, and Google Cloud’s debacle

This week's TechRepublic and ZDNet news stories include a look at the companies that hire the most data scientists, four significant impacts of a security breach, and a first-hand account of a major hack job.
SC Magazine

ACLU tells Ga. Supreme Court Fourth Amendment should apply to personal data stored by cars

Fourth Amendment protections should apply to personal data in a car’s Event Data Recorder, the American Civil Liberties Union (ACLU) will argue before the Georgia Supreme Court today. The state’s high court is hearing oral arguments in Mobley v. State, which challenges law...
PC Mag

Can Anything Protect Us From Deepfakes?

Along with fake news, forged videos have become a national security concern, especially as the 2020 presidential elections draw near. Researchers at the University of Surrey have developed a solution that might solve the problem.

How Hackers Emptied Church Coffers with a Simple Phishing Scam

Cyber thieves aren't bound by a code of ethics. They look for weak targets and high rewards, which is exactly what Saint Ambrose Catholic offered.