Friday, June 5, 2020
CyberSecurityInterviews

#089 – Ed Bellis: Complexity is the Enemy

Ed Bellis is a security industry veteran and expert and was once named “Information Security Executive of the Year”. He currently serves as the Chief Technology Officer and Co-founder of Kenna Security. He founded Kenna Security to deliver a...
CyberSecurityInterviews

#088 – Mikko Hyppönen: You Might Have an Enemy In the Future

Mikko Hypponen is a global security expert and has worked at F-Secure since 1991. Currently, he serves as F-Secure's Chief Research Officer.Mikko has written on his research for the New York Times, Wired, and Scientific American, and he frequently...
CyberSecurityInterviews

#087 – Steve Moore: It’s a Balancing Act

Stephen Moore is a Vice President and the Chief Security Strategist at Exabeam and is also the host of The New CISO podcast. Stephen has more than 15 years of experience in information security, intrusion analysis, threat intelligence, security architecture, and...
CyberSecurityInterviews

#086 – Dave Kennedy: The Basics Are Still Challenging

David Kennedy is the founder of Binary Defense and TrustedSec. Both organizations focus on the betterment of the security industry. David also served as a board of director for the ISC2 organization. David was the former CSO for a Diebold Incorporated,...
CyberSecurityInterviews

#085 – John Strand: Making the Industry Better

John Strand is the owner of Black Hills Information Security, a firm specializing in penetration testing, Active Defense, and Hunt Teaming services. He is also the CTO of Active Countermeasures, a firm dedicated to tracking advanced attackers inside and outside...
CyberSecurityInterviews

#084 – Adam Hunt: A Game We Play

Adam Hunt is the CTO and Chief Data Scientist at RiskIQ. As Chief Data Scientist, Adam leads the data science, data engineering, and research teams at RiskIQ. Adam pioneers research automating the detection of adversarial attacks across disparate digital...
CyberSecurityInterviews

#083 – Nate Fick: Give Teams Autonomy

Nate Fick is the General Manager of Elastic Security and former CEO of Endgame. He is also an Operating Partner at Bessemer Venture Partners. Before joining Endgame, Nate was CEO of the Center for a New American Security. He...
CyberSecurityInterviews

#082 – Jamil Jaffer: Not All Nation-state Activity Is the Same

Jamil Jaffer is Senior Vice President for Strategy, Partnerships & Corporate Development at IronNet, a startup technology firm founded by former National Security Agency (NSA) Director Gen. Keith Alexander (ret.).Prior to joining IronNet, Jamil served as the Chief Counsel...
CyberSecurityInterviews

#081 – James Patchett: Make Small Businesses Safe

James Patchett is the President and CEO of the New York City Economic Development Corporation. James has spent his career building stronger cities through investments in affordable housing, innovation, and 21st-century infrastructure.During his tenure, he has overseen some of...
CyberSecurityInterviews

#080 – Heather Mahalik: Earn The Tool

Heather Mahalik is the Senior Director of Digital Intelligence at Cellebrite and a Senior Instructor, author and course lead for FOR585: Smartphone Forensic Analysis In-Depth. To say that digital forensics is central to Heather's life is quite an understatement....
CyberSecurityInterviews

#079 – Mari DeGrazia: Not Just One Technology

Mari DeGrazia is a Senior Vice President in the Cyber Risk practice of Kroll, a division of Duff & Phelps. Over the course of a 12-year career in the computer industry, Mari has become a leader within the digital...
CyberSecurityInterviews

#078 – Nadean Tanner: Boil It Down

When my 7-year-old introduced me to his second-grade class, he put it best: "My Mom teaches the good guys how to keep the bad guys out of their computers. She has a blue lightsaber."- Nadean TannerNadean Tanner is the...
CyberSecurityInterviews

#077 – Frank Downs: Know When To Leave

Frank Downs is the director of cybersecurity practices at ISACA. Frank, a 14-year cybersecurity specialist, graduated with a bachelor’s degree in English from the University of Maryland, after which he promptly joined the US Department of Defense as a...
CyberSecurityInterviews

#076 – Lesley Carhart: You’ve Got to Play the Game

Lesley Carhart is a Principal Threat Analyst at the Threat Operations Center at Dragos. She is recognized as a subject matter expert in cybersecurity, incident response, and digital forensics, regularly speaking at conferences and universities. She has spent the...
CyberSecurityInterviews

#075 – Brian Martin (Jericho): The Hacker Mindset

Brian Martin (a.k.a. Jericho) has been poking about the hacker and security scene for over 22 years, building valuable skills such as skepticism and anger management. As a hacker-turned-security whore, Jericho has a great perspective to offer an unsolicited...

FTC Slams Children’s App Developer for COPPA Violations

Children's app developer HyperBeard must pay $150,000 after the FTC claimed it violated privacy laws.
SecurityWeek

Business Services Provider Conduent Hit by Ransomware

Business process services provider Conduent has been the victim of a ransomware attack that appears to be the work of Maze operators. Formed in 2017 as a divestiture from Xerox and headquartered in New Jersey, the company offers digital platforms...
SC Magazine

Cisco security advisories address 47 flaws, three critical

Cisco Systems on Wednesday, June 3 released a series of security advisories addressing a total of 47 vulnerabilities, including three critical bugs that were found and fixed in IOS or IOS EX software. Among the most series flaws is a...

Electrolux, Others Conned Out of Big Money by BEC Scammer

Kenenty Hwan Kim has pleaded guilty to swindling the appliance giant and other companies in a set of elaborate schemes.
The Register

Kind of goes without saying, but fix your admin passwords or risk getting borged by this brute-forcing botnet

Publishing platforms, hosts being targeted by Stealthworker malware Servers are being targeted with a malware attack that uses its infected hosts to brute-force other machines.…