Monday, September 25, 2023
Home Tags CS Interviews

Tag: CS Interviews

CyberSecurityInterviews

#126 – Douglas Brush (Part 4): Dollars and Cents, Not Bytes

This is the 4th part of the podcast's return after a brief hiatus. Daniel Ayala continues his interview of me. In this fourth part, we will discuss my first forensic litigation case, the importance of data governance, the myth of...
CyberSecurityInterviews

#125 – Douglas Brush (Part 3): What is a Special Master?

This is the 3rd part of the podcast's return after a brief hiatus. Daniel Ayala continues his interview of me. In this third part, we will discuss what I am doing as a Special Master and Court Appointed Neutral, the...
CyberSecurityInterviews

#124 – Douglas Brush (Part 2): Words of Advice

This is the 2nd part of the return of the podcast after a brief hiatus.Daniel Ayala continues his interview of me. In this second part, we will discuss how I got started in the industry, defining moments of my...
CyberSecurityInterviews

#123 – Douglas Brush (Part 1): Guess Who’s Back, Dougie’s Back

After a hiatus, the Cyber Security Interviews podcast is back!A lot has happened in my life over the past 18 months. I have endured death, despair, divorce, and car theft, to name a few traumatic events that made me...
Infosecurity Magazine

BEC Scammer Pleads Guilty to Part in $6m Scheme

Nigerian was extradited to the US from Canada
Infosecurity Magazine

Researchers Spot Novel “Deadglyph” Backdoor

Malware is linked to UAE-backed spies
Infosecurity Magazine

Almost US 900 Schools Breached Via MOVEit

National Student Clearinghouse reveals more details of incident

Don’t Get Burned by CAPTCHAs: A Recipe for Accurate Bot Protection

Traditional CAPTCHAs, such as reCAPTCHA, no longer protect online businesses adequately. Real users hate them. Bots bypass them. It's time to upgrade.
The Hacker News

New Report Uncovers Three Distinct Clusters of China-Nexus Attacks on Southeast Asian Government

An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the region over extended periods of time. "While this activity occurred around the same time and in some instances even simultaneously...