The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Welcome to theCUBE Podcast, where we provide you with the latest news and developments in the world of technology. Join us as we explore the exciting world of technology and its ever-evolving landscape. Tune in to gain valuable insights and stay up-to-date with the latest tech news.
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
Information security with a whiskey filter.
…
continue reading
The Security Perspectives Podcast is a show that explores the world of information security and provides valuable insights into starting and advancing a career in this exciting field. Hosted by Nikolas Behar, each episode features a guest who shares their unique perspective on the latest trends, challenges, and opportunities in information security. From red team operators to chief information security officers, guests offer valuable advice and practical tips for listeners looking to break i ...
…
continue reading
1
Mandiant’s Michael Barnhart on the North Korean IT worker crisis
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22
Since 2022, Mandiant has tracked North Korean IT workers who, posing as non-North Koreans, secure employment in various industries to fund DPRK's weapons programs, often engaging in cyber intrusions with the help of foreign facilitators. In this episode, CyberScoop Editor-in-Chief Greg Otto talks with Mandiant’s Michael Barnhart on what is going on…
…
continue reading
1
74. Intel (sort of) Spins Foundry, Benioff's Agentic Version, Mandiant & Crowdstrike Highlight Business Resilience
1:03:25
1:03:25
Play later
Play later
Lists
Like
Liked
1:03:25
By SiliconANGLE
…
continue reading
1
Cal-Berkeley’s Elijah Baucom on how students are helping nonprofits avoid spyware
28:54
28:54
Play later
Play later
Lists
Like
Liked
28:54
How can small nonprofits and civic organizations defend themselves against some of the most insidious malware on the planet? By reaching out to Elijah Baucom. The director of Citizen Clinic at UC Berkeley, Baucom runs a public-interest cybersecurity program that trains students to support organizations in defending against cyber threats. A digital …
…
continue reading
1
AI Toolkit Risks, CUPS Vulnerabilities, and Google's Infostealer Defenses
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04
🎙️ Catch the latest episode of #CryingOutCloud, where Amitai Cohen and Eden Koby Naftali tackle key cloud security challenges from AI Toolkit Risks to CUPS Vulnerabilities!Tune in to hear about:📌 Wiz Research discovered a vulnerability affecting the Nvidia container toolkit📌 Google's novel Info Stealers Mitigations📌 All the talk around the CUPS vul…
…
continue reading
1
76. OpenAI's Eye Popping Raise, Brad Gershners Thesis & Big Bet, Can Google Challenge OpenAI's Moat
1:03:46
1:03:46
Play later
Play later
Lists
Like
Liked
1:03:46
By SiliconANGLE
…
continue reading
1
From NASA to GitLab: Democratizing Security, Open Source, and Empowering Women – With: Julie Davila
28:28
28:28
Play later
Play later
Lists
Like
Liked
28:28
📢 Tune in for the special episode of Crying Out Cloud with @Gitlab 's Julie Davila! 🚀Join our Co-host Eden Koby Naftali and the cybersecurity leader Julie Davila, VP of Product Security at GitLab as they dive into:📌 Balancing transparency in open-source tooling with security risks.📌 Democratizing security: How GitLab empowers engineers to take owne…
…
continue reading
Vicente Diaz, Threat Intelligence Strategist at VirusTotal, joins host Luke McNamara to discuss his research into using LLMs to analyze malware. Vicente covers how he used Gemini to analyze various windows binaries, the use cases this could help address for security operations, technical challenges with de-obfuscation, and more. For more on this to…
…
continue reading
1
Trellix’s John Fokker on the latest cybercriminal snapshot
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09
CyberScoop Editor-in-Chief Greg Otto was out at Mandiant's mWISE conference last week, and talked with Trellix’s head of threat intelligence, John Fokker, about a host of different subjects. In the first portion of the interview, Greg and John discuss how the Ransomware-as-a-Service landscape has changed in the past year, and how threat actors have…
…
continue reading
1
How Threat Actors Bypass Multi-Factor Authentication
27:20
27:20
Play later
Play later
Lists
Like
Liked
27:20
Josh Fleischer, Principal Security Analyst with Mandiant's Managed Defense organization sits down with host Luke McNamara to discuss trends in MFA bypass and how threat actors are conducting adversary in the middle (AiTM) attacks to gain access to targeted organizations. Josh walks through a case study of MFA bypass, how token theft occurs, the inc…
…
continue reading
1
How organizations are handing AI security
42:59
42:59
Play later
Play later
Lists
Like
Liked
42:59
AI is transforming how companies secure their IT infrastructure, especially in industries like airlines, health care, retail, and telecommunications, which rely on applications and APIs for seamless digital experiences. However, there's a risk of companies improperly deploying AI tools or using insecure vendors, potentially leading to widespread da…
…
continue reading
1
We’re back! RunSafe CEO Joe Saunders on secure-by-design in IoT devices
30:28
30:28
Play later
Play later
Lists
Like
Liked
30:28
Secure-by-design transforms secure code from an afterthought to an inherent feature, weaving a resilient shield directly into the fabric of every application and device from the ground up. But while everyone’s mind gravitates toward the ocean of software we all use, how does secure-by-design translate to the Internet of Things? In this episode, Cyb…
…
continue reading
1
72. Nvidia Antitrust Scrutiny, Is the PC Dead?, King Making in AI, CUBEd Awards
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13
By SiliconANGLE
…
continue reading
1
TAG's Work Tracking Commercial Surveillance Vendors
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58
Host Luke McNamara is joined by Clement Lecigne, security researcher at Google's Threat Analysis Group (TAG) to discuss his work tracking commercial surveillance vendors (CSVs). Clement dives into the history and evolution of the CSV industry, how these entities carry out operations against platforms like mobile, and the nexus of this problem into …
…
continue reading
1
71. The Big GPU Short?, China Chips Reach-around, Explaining Broadcom VMware, Crowdstrike Reset
1:09:41
1:09:41
Play later
Play later
Lists
Like
Liked
1:09:41
By SiliconANGLE
…
continue reading
1
Ted Schlein on the cybersecurity industry and the latest twist in the Trump-Iran hacking saga
46:18
46:18
Play later
Play later
Lists
Like
Liked
46:18
If you want to understand cybersecurity policy, it’s not enough to focus on Washington D.C. — you have to also grok the American tech industry. Few people have bridged that divide more effectively than Ted Schlein, the legendary venture capitalist who is currently at Ballistic Ventures. On this episode of Safe Mode, he sits down with host Elias Gro…
…
continue reading
1
70. Is Matt Garmin Bill Belichick? Cloud Data Wars, Bitcoin Revolution
1:06:47
1:06:47
Play later
Play later
Lists
Like
Liked
1:06:47
By SiliconANGLE
…
continue reading
1
Hack-and-leak op targets Trump; a technical deep dive with John Hammond on the CrowdStrike outage
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20
With Election Day rapidly approaching in the United States, the Trump campaign claims that the first major hack-and-leak operation has arrived. After a handful of U.S. media outlets received leaked material on vice presidential candidate JD Vance, the Trump campaign said it had been the victim of an Iranian hacking operation. On this episode of Saf…
…
continue reading
1
Azure DDoS, Certificate Revocations, and ESXi Ransomware
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11
📢 From DDoS attacks to discovering a new cryptojacking campaign, tune in to our NEW episode of #CryingOutCloud to learn about all the latest cloud security news.Join our hosts Eden and Amitai as they dive into the latest cloud security stories:* SeleniumGreed: Wiz Research discovered a new cryptojacking campaign targeting SeleniumGrid* Why your Sta…
…
continue reading
1
69. AI Bubble, Big Tech Bullseye, Security Community Unites
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33
69. AI Bubble, Big Tech Bullseye, Security Community Unites
…
continue reading
1
A deep dive with Tim Starks on the Biden administration's cybersecurity initiatives
44:35
44:35
Play later
Play later
Lists
Like
Liked
44:35
An epidemic of ransomware, cyberattacks on gas pipelines, Chinese infiltration of American critical infrastructure — these are just some of the cybersecurity issues the Biden administration has tackled during the president’s first term in office. With President Joe Biden’s time in office winding down, it’s worth taking stock: Has his administration…
…
continue reading
1
Navigating Hyper Growth, AI Impact, and Mandiant Memories - Special Guest: Ryan Kazanciyan
37:30
37:30
Play later
Play later
Lists
Like
Liked
37:30
📢 Tune in for an exclusive session with Ryan Kazanciyan on securing a security vendor, hyper-growth, and AI impact in the latest podcast episode of #CryingOutCloud!Join our hosts, Amitai Cohen and Eden Koby Naftali, as they dive into cloud security with Ryan Kazanciyan, our seasoned expert leading security at @Wiz.🔍 Episode Highlights:📌 Managing se…
…
continue reading
1
68. Intels meltdown, tech bloodbath, cloud earnings, AI leaders
51:38
51:38
Play later
Play later
Lists
Like
Liked
51:38
By SiliconANGLE
…
continue reading
1
67. Kamala's tech chops, Databricks/Snowflake survey, the real skinny on cloud market data
52:50
52:50
Play later
Play later
Lists
Like
Liked
52:50
By SiliconANGLE
…
continue reading
1
Sara Hooker on compute thresholds for AI; CrowdStrike breaks the internet
45:57
45:57
Play later
Play later
Lists
Like
Liked
45:57
AI governance regimes the world over have seized on compute thresholds as a mechanism for implementing various controls on artificial intelligence systems. The basic idea is that if an AI model relies on a sufficiently large amount of computing power, then various controls kick in. As AI models get larger, the thinking goes, they also get riskier, …
…
continue reading
1
What Iranian Threat Actors Have Been Up To This Year
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13
Mandiant APT Researcher Ofir Rozmann joins host Luke McNamara to discuss some notable Iranian cyber espionage actors and what they have been up to in 2024. Ofir covers campaigns from suspected IRGC-nexus actors such as APT42 and APT35-related clusters, as well as activity from TEMP.Zagros. For more on this topic, please see: https://blog.google/tec…
…
continue reading
1
66. Crowdstrike chaos, exclusive customer survey reveals financial exposure
1:04:00
1:04:00
Play later
Play later
Lists
Like
Liked
1:04:00
By SiliconANGLE
…
continue reading
1
Dewey Murdick on enabling principles for AI governance; a landmark breach at AT&T
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43
Around the world policymakers seem to be grappling with the same question: How best to govern artificial intelligence? The Center for Security and Emerging Technology, a Washington-based think tank, has emerged as a key and influential player in that conversation. And on this episode of Safe Mode, its executive director, Dewey Murdick, sits down wi…
…
continue reading
1
SAPwned: SAP AI Core vulnerabilities - Special Guest: Hillai Ben-Sasson
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42
📢 Tune in to our special episode with Hillai Ben-Sasson with all you need to know about #SAPwned.TL;DR - The Wiz Research Team uncovered serious vulnerabilities in SAP AI Core, revealing potential risks in #AI infrastructure.
…
continue reading
1
CROC Talks - Securing DBs, Cloud Threat Intel, and Detection- Special Guest: Snowflakes’ Haider Dost
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25
📢 Tune in to Snowflake's Haider Dost for an exclusive session on Securing Databases, Cloud Threat Intelligence, and Detection strategies. The latest podcast episode of #CryingOutCloud is LIVE! Join our special hosts, @Alon Schindel and @Eden, as they dive deep into the world of cloud security with Haider Dost, Head of Global Threat Detection and Th…
…
continue reading
1
Allan Liska on why it’s time to ban ransomware payments; Russian info ops
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02
We are living through an epidemic of ransomware. Last year alone, the amount paid to ransomware operators exceeded $1 billion, and the entities getting hit and seeing their operations disrupted by ransomware included hospitals, schools and libraries. Ransomware is both a public-health and national-security crisis, yet efforts to address the problem…
…
continue reading
1
65. Debate debacle, Amazon $2T, VMware complaints, New Trend: Agentic AI
1:05:49
1:05:49
Play later
Play later
Lists
Like
Liked
1:05:49
By SiliconANGLE
…
continue reading
1
CROC News: Firewall Fumbles, Gitloker Etiquette, and Private Cloud Compute
24:13
24:13
Play later
Play later
Lists
Like
Liked
24:13
📢 From data privacy norms in the age of AI— tune in to the latest episode of #CryingOutCloud with all you need to know from the cloud security news 🚨 Join Eden Naftali and Amitai Cohen as they dive into:🔍 How a new AI processing cloud service is challenging data privacy norms. 🛡️ The implications of a potential firewall misconfiguration and how to …
…
continue reading
1
Selena Larson on e-crime matching nation state hackers; Disinfo before the Supreme Court
44:14
44:14
Play later
Play later
Lists
Like
Liked
44:14
When studying cyberoperations, it’s easy to become enamored with state-backed hackers. Russian and Chinese operations have done much to shape our understanding of how power is exercised online, but it’s not clear that the intense attention dedicated to such operations is well-placed. Amid the current epidemic of ransomware, criminal hacking groups …
…
continue reading
1
Mandiant's Approach to Securely Using AI Solutions
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00
Mandiant Consultants Trisha Alexander, Muhammed Muneer, and Pat McCoy join host Luke McNamara to discuss Mandiant's recently launched services for securing AI. They discuss how organizations can proactively approach securing the implementation of AI workloads, red-team and test these security controls protecting generative AI models in production, …
…
continue reading
1
CROC Talks: RCE Vulnerability in Ollama explained
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35
💥 EXCLUSIVE: Wiz Research uncovers CVE-2024-37032, aka #Probllama — a vulnerability in Ollama that that left thousands of #AI models exposed 😲
…
continue reading
1
64. VMware customer choices, NVIDIA love fest
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33
By SiliconANGLE
…
continue reading
1
Protecting teens against sextortion; threats to election workers
35:16
35:16
Play later
Play later
Lists
Like
Liked
35:16
The proliferation of artificial intelligence is exposing teens to a new online threat: AI-generated sexual imagery. Heather Barnhart is a fellow at the SANS Institute and a digital forensic expert, and on this episode of Safe Mode she sits down with host Elias Groll to discuss how teenagers and their families can protect themselves against the scou…
…
continue reading
1
63. Snowflake Databricks Olympics, GenAI ROI Questions, Perplexity Review
1:03:36
1:03:36
Play later
Play later
Lists
Like
Liked
1:03:36
In this week’s episode of theCUBE Pod, industry analysts John Furrier and Dave Vellante delve into the fierce competition between Snowflake and Databricks, focusing on their distinct strategies and market positions. Vellante highlights Databricks' faster growth and its cleaner revenue model, contrasting it with Snowflake's integration of AWS revenu…
…
continue reading
1
Keeping Ukraine’s grid up and running amid war; Snowflake customers under attack
30:42
30:42
Play later
Play later
Lists
Like
Liked
30:42
Following Russia’s full-scale invasion of Ukraine, the Ukrainian power grid has come under sustained attack by Russian forces, and keeping it up and running has been a significant challenge. One of the major issues Ukrainian energy officials have had to confront is the way in which Russian electronic warfare systems have disrupted GPS, which is a k…
…
continue reading
1
62. The Great Iceberg Debate & A Conversation with Snowflake CEO, Sridhar Ramaswamy
36:03
36:03
Play later
Play later
Lists
Like
Liked
36:03
In this week’s edition of theCUBE Podcast, recorded during Snowflake's Data Cloud Summit, the discussion centered around the challenges of creating governance standards across various compute engines. Snowflake's strategy to open-source the Polaris Catalog and the importance of its Horizon solution for advanced governance were key topics.New episod…
…
continue reading
1
Josh Harguess on AI red-teaming; an Israeli info op targets the U.S.
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46
To address AI risks, policymakers and technologists around the world have embraced the concept of AI red-teaming — the adversarial testing of AI models. But AI red-teaming is such a new concept that few people know how to conduct such tests. The discipline of AI red-teaming very much remains under development, but as AI systems are rolled out far a…
…
continue reading
1
CROC Talks: Chief Llama Officer and IBM CISO - Jerry Bell
39:28
39:28
Play later
Play later
Lists
Like
Liked
39:28
What is it like to be IBM's 'Chief Llama Officer'? 🦙 🎙️ Tune in as Jerry Bell shares his journey from crashing his first computer at 10 to leading IBM's Public Cloud SecurityWhat's on today's agenda?😲 Managing a popular 'Mastodon' server post-Twitter acquisition🛡️ Challenges and surprises as IBM's CISO 🔐 Insights on the security implications of M&A…
…
continue reading
1
Joe Sullivan on his legal battle with the feds; the latest on Russian influence operations
47:17
47:17
Play later
Play later
Lists
Like
Liked
47:17
Joe Sullivan on his legal battle with the feds; the latest on Russian influence operations by Safe Mode PodcastBy Safe Mode Podcast
…
continue reading
1
Lessons Learned from Responding to Cloud Compromises
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16
Mandiant consultants Will Silverstone (Senior Consultant) and Omar ElAhdan (Principal Consultant) discuss their research into cloud compromise trends over 2023. They discuss living off the land techniques in the cloud, the concept of the extended cloud attack surface, how organizations can better secure their identities, third party cloud compromis…
…
continue reading