Tuesday, March 19, 2019
CyberSecurityInterviews

#62 – Chad Loder: Just Because It’s Basic, Doesn’t Mean It’s Easy

Chad Loder is the CEO and co-founder of Habitu8, a Los Angeles-based cyber security startup that’s transforming the security awareness industry away from its traditional “training-centric” approach to an approach that is based on measurable risk reduction through influencing...
CyberSecurityInterviews

#61 – Yonathan Klijnsma: If They Get Compromised, You Get Compromised

Yonathan Klijnsma is a threat researcher at RiskIQ, leading threat response and analysis efforts with the help of RiskIQ’s expansive data set. Both his work and hobbies focus on threat intelligence in the form of profiling threat actors as...
CyberSecurityInterviews

#060 – Mike Johnson: Let’s Do The Right Thing

Mike Johnson is the CISO of Lyft, where he is responsible for Security, Data Privacy, and a few other key areas he can’t talk about. He’s been in the security field long enough to be able to use “decades”...
CyberSecurityInterviews

#059 – Jacob Williams: What Didn’t We Catch

Jacob Williams is the Founder and President of Rendition Infosec. Jake started his information security career doing classified work with the U.S. government and was awarded the National Security Agency (NSA) Exceptional Civilian Service Award, which is given to fewer...
CyberSecurityInterviews

058 – Josh Corman: The Absence of Good

Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Josh previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai,...
CyberSecurityInterviews

057 – Ron Gula: Encourage People To Be Entrepreneurs

Ron Gula is the President of Gula Tech Adventures. Ron started his cybersecurity career as a network penetration tester for the NSA. At BBN, he developed network honeypots to lure hackers and he ran US Internetworking’s team of penetration testers...
CyberSecurityInterviews

056 – It’s Just Data!

This is a special episode where my guests actually turn the mics and spotlight on me. In this episode, I speak with Kristopher Wasserman and Ricky Brooman, both governance and eDiscovery experts that wanted to get deeper knowledge about cyber security....
CyberSecurityInterviews

055 – Mark Greisiger: What Could a Future Breach Cost Me

Mark Greisiger has led NetDiligence, a Cyber Risk Assessment and Data Breach Services company, since its inception in 2001. During that time, Mark has been responsible for the creation of highly-focused services that are used by leading cyber liability...
CyberSecurityInterviews

054 – Brian Vecci: Understanding the Value of What We Have

Brian Vecci is the Technical Evangelist at Varonis where he supports a wide range of security initiatives by helping Varonis’ customers and employees get the most out of the company’s products to tackle today’s biggest security challenges. In his 20-year technical...
CyberSecurityInterviews

053 – Cameron Williams: Make Your Day Easier

Cameron Williams is the Founder and CTO of OverWatchID. Cam has more than 22 years of experience as a leader in the cyber security industry. He has led breach mitigation and designed security solutions/countermeasures for leading global companies such...
CyberSecurityInterviews

052 – Jeremiah Grossman: The Cavalry Is Not Coming

Jeremiah Grossman is the CEO of Bit Discovery.  Jeremiah’s career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. Since Jeremiah earned a Brazilian Jiu-Jitsu black belt, the...
CyberSecurityInterviews

051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult

Robert M. Lee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical...
CyberSecurityInterviews

050 – Chris Roberts: Make New Mistakes

Chris Roberts is the Chief Security Architect at Acalvio and is regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry. At Acalvio, Chris helps drive Technology Innovation and Product Leadership. In addition,...
CyberSecurityInterviews

049 – Keith McCammon: We Have An Analysis Problem

Keith McCammon is the Chief Security Officer and Co-founder of Red Canary in Denver, CO. Keith runs Red Canary’s Security Operations Center and leads a group of expert analysts that monitor a continuous stream of potential attacks detected in...
CyberSecurityInterviews

048 – Tom Brennan: Engage the Community In a Positive Way

Tom Brennan is the Founder of Proactive Risk with two decades of hands on the keyboard experience  building, breaking and defending data for clients worldwide. He is a an alumni of McAfee, Intel Security, SafeCode, Trustwave, WhiteHat, ADP, Datek...
SC Magazine

Norwegian aluminum producer Norsk Hydro hit by an unspecified cyberattack

Norwegian aluminum producer Norsk Hydro was hit by a cyber attack which began Monday evening and escalated into the night. The Norwegian National Security Authority (NSM) declined to comment on what type of attack it was but said the extent...
SC Magazine

Glitch exposes Sprint customer data to other users

A bug has allowed some Sprint customers to see the personal data of other customers from their online accounts. The information visible includes names, cell phone numbers as well as calls made by other users and, and a Tech Crunch report cited...

6 Ways Mature DevOps Teams Are Killing It in Security

New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.
The Register

Ransomware drops the Lillehammer on Norsk Hydro: Aluminium giant forced into manual mode after systems scrambled

Norway the power and metals wrangler could have seen this one coming Norwegian power and metals giant Norsk Hydro is battling an extensive ransomware infection on its computers.…

Old Tech Spills Digital Dirt on Past Owners

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.