Talks about ESG at ESET with diverse areas and guests.
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
Cutting through the noise for Canadian VARs and MSPs
…
continue reading
Health Innovation Matters is a biweekly, 30-minute podcast focusing on the next generation of healthcare innovators and movers-and-shakers who are disrupting the healthcare space. This podcast is all about increasing awareness of future health trends, accelerating technologies, and art and design perspectives. The podcast also provides a forum for elevating public discourse on ways healthcare can be more accessible, less costly, and more efficient. You'll hear about dynamic collaborations, b ...
…
continue reading
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
…
continue reading
1
ESET Israel wiper malware, China's Volt Typhoon response, Kaspersky sanctions and isolation
1:38:18
1:38:18
Play later
Play later
Lists
Like
Liked
1:38:18
Three Buddy Problem - Episode 17: News of a wiper malware attack in Israel implicating ESET, threats from wartime hacktivists, China's strange response to Volt Typhoon attribution and Section 702 messaging, an IE zero-day discovery and web browser rot in South Korea, the ongoing isolation of Kaspersky due to sanctions, and the geopolitical influenc…
…
continue reading
1
The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela
1:54:14
1:54:14
Play later
Play later
Lists
Like
Liked
1:54:14
Three Buddy Problem - Episode 19: We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bra…
…
continue reading
1
Fortinet 0days, Appin hack-for-hire exposé, crypto heists, Russians booted from Linux kernel
1:26:44
1:26:44
Play later
Play later
Lists
Like
Liked
1:26:44
Three Buddy Problem - Episode 18: This week’s show covers the White House's new Traffic Light Protocol (TLP) guidance, Reuters expose of Appin as a hack-for-hire mercenary company, Fortinet zero-day exploitation and missing CSRB investigations, major cryptocurrency heists, Apple opening Private Cloud Compute to public inspection, Russians removed f…
…
continue reading
1
Typhoons and Blizzards: Cyberespionage and national security on front burner
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09
Three Buddy Problem - Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge…
…
continue reading
1
Careto returns, IDA Pro pricing controversy, crypto's North Korea problem
1:30:38
1:30:38
Play later
Play later
Lists
Like
Liked
1:30:38
Three Buddy Problem - Episode 15: Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean c…
…
continue reading
1
Exploding beepers, critical CUPS flaws, Windows Recall rebuilt for security
1:19:07
1:19:07
Play later
Play later
Lists
Like
Liked
1:19:07
Three Buddy Problem - Episode 14: The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky's controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebano…
…
continue reading
1
Making smart VPN recommendations for customers
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50
Tony Anscombe, global security evangelist at ESET The virtual private network is a tried-and-true part of many companies’ approach to both remote access and security. So what do solution providers need to know about VPN technology today? How can you recommend and implement the best solutions for your customers, and make sure they are secure and sta…
…
continue reading
1
Ep13: The Consolation of Threat Intel (JAG-S LABScon keynote)
31:41
31:41
Play later
Play later
Lists
Like
Liked
31:41
Three Buddy Problem - Episode 13: This is a special edition of the show, featuring Juan Andres Guerrero-Saade's full keynote day remarks at LABScon2024. In this talk, Juanito addresses the current state of the threat intelligence industry, expressing a need for a difficult conversation about its direction and purpose. He discusses feelings of disen…
…
continue reading
1
What MSPs need to know about cyber insurance today
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13
Stephen Nichols, director of solution engineering for Acronis As ransomware and other attacks have become ubiquitous, so has cyber insurance as businesses try to ensure they’re covered if the worst should happen. However, insurance companies are loathed to lose money, meaning that MSPs and their customers must stay on their toes to stay protected. …
…
continue reading
1
Ep12: Security use-cases for AI chain-of-thought reasoning
1:14:20
1:14:20
Play later
Play later
Lists
Like
Liked
1:14:20
Three Buddy Problem - Episode 12: Gabriel Bernadett-Shapiro joins the show for an extended conversation on artificial intelligence and cybersecurity. We discuss the hype around OpenAI's new o1 model, AI chain-of-thought reasoning and security use-cases, pervasive chatbots and privacy concerns, and the ongoing debate between open source and closed s…
…
continue reading
1
Ep11: Cyberwarfare takes an ominous turn
1:15:13
1:15:13
Play later
Play later
Lists
Like
Liked
1:15:13
Three Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chi…
…
continue reading
1
Ep10: Volt Typhoon zero-day, Russia's APT29 reusing spyware exploits, Pavel Durov's arrest
1:18:37
1:18:37
Play later
Play later
Lists
Like
Liked
1:18:37
Three Buddy Problem - Episode 10: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia's APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Window…
…
continue reading
1
Ep9: The blurring lines between nation-state APTs and the ransomware epidemic
1:06:16
1:06:16
Play later
Play later
Lists
Like
Liked
1:06:16
Three Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misat…
…
continue reading
1
Product Design in Healthcare with Preethi Raju, Formerly of Amazon One Medical
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43
Michael chats with Preethi Raju, Product Design Leader, most recently at Amazon One Medical. In this episode, Michael and Preethi discuss Preethi's background and journey toward her role, the importance of holistic design in healthcare, innovation and collaboration in healthcare through design, how thoughful product design creates real impact in he…
…
continue reading
1
Ep8: Microsoft's zero-days and a wormable Windows TCP/IP flaw known to China
1:17:45
1:17:45
Play later
Play later
Lists
Like
Liked
1:17:45
Three Buddy Problem - Episode 8: This week’s show digs into Microsoft’s in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran’s aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions. Hosts: Costi…
…
continue reading
1
Ep7: Crowd2K and the kernel, PKFail supply chain failures, Paris trains sabotage and Russian Olympic attacks
1:10:03
1:10:03
Play later
Play later
Lists
Like
Liked
1:10:03
Three Buddy Problem - Episode 7: In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and …
…
continue reading
1
Ep6: After CrowdStrike chaos, should Microsoft kick EDR agents out of Windows kernel?
1:16:37
1:16:37
Play later
Play later
Lists
Like
Liked
1:16:37
Three Buddy Problem - Episode 6: As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid in…
…
continue reading
1
Ep5: CrowdStrike's faulty update shuts down global networks
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51
Three Buddy Problem - Episode 5: Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms. We also discuss the AT&T mega-breach and t…
…
continue reading
1
Life-Saving Endothermic Technology with ColdVest’s Tracie Wagman
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59
Michael chats with Tracie Wagman, CEO of ColdVest. In this episode, Michael and Tracie discuss ColdVest and how it addresses the growing issue of heat-related deaths, the benefits of ColdVest and its endothermic technology, how Tracie sees ColdVest evolving in the future, and much more. This episode is sponsored by ColdVest, ColdVest.com.…
…
continue reading
1
Ep4: The AT&T mega-breach, iPhone mercenary spyware, Microsoft zero-days
1:11:39
1:11:39
Play later
Play later
Lists
Like
Liked
1:11:39
Three Buddy Problem - Episode 4: The boys delve into the massive AT&T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets. Plus, thoughts on Microsoft's…
…
continue reading
1
Ep3: Dave Aitel joins debate on nation-state hacking responsibilities
1:04:29
1:04:29
Play later
Play later
Lists
Like
Liked
1:04:29
The 'Three Buddy Problem' Podcast Episode 3: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on …
…
continue reading
1
Ep2: A deep-dive on disrupting and exposing nation-state malware ops
1:08:42
1:08:42
Play later
Play later
Lists
Like
Liked
1:08:42
The 'Three Buddy Problem' Podcast Episode 2: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky r…
…
continue reading
1
Ep1: The Microsoft Recall debacle, Brad Smith and the CSRB, Apple Private Cloud Compute
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55
Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week. Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering …
…
continue reading
1
How Ingram Micro’s configuration centre adds value to Lenovo ISG products
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51
In this special bonus episode of the podcast from Ingram Micro Canada, Lenovo Canada’s Bill Tirpkos interviews Ingram’s Ayon Khan and Roger Silvestre about the relationship between the vendor and the distributor, and how Ingram adds value to Lenovo’s data centre lineup. Tune in to find out what partners can get from the configuration centres at Ing…
…
continue reading
1
Optimizing Patient Relationship Management with TeleVox’s Vik Krishnan
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41
Michael chats with Vik Krishnan, President of Televox. In this episode, Michael and Vik discuss how Vik became interested in and involved with healthcare technology, patient relationship management and how it differs from patient engagement, the use of AI in patient relationship management, other areas that TeleVox is helping in the healthcare fiel…
…
continue reading
In the second episode of our ESET WE. DO. Podcast we are talking to Boris Bečvarov, and initiative Bike to Work. Hope you'll like it.By ESET Security
…
continue reading
1
Cris Neckar on the early days of securing Chrome, chasing browser exploits
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:36
Episode sponsors: Binarly, the supply chain security experts (https://binarly.io) XZ.fail backdoor detector (https://xz.fail) Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital. In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at…
…
continue reading
1
Costin Raiu joins the XZ Utils backdoor investigation
51:33
51:33
Play later
Play later
Lists
Like
Liked
51:33
Episode sponsors: Binarly, the supply chain security experts (https://binarly.io) XZ.fail backdoor detector (https://xz.fail) Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor. We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, a…
…
continue reading
Stephen Nichols, director of solution engineering for Acronis They can guide and shape your security practices and services, ensure you’re on the right side of regulation and governance, and help you sell higher-margin security services. Frameworks like NIST can do a lot for MSPs. Stephen Nichols, director of solution engineering for Acronis, joins…
…
continue reading
1
AI, Profitability, and the Future of Medicine with Access Healthcare’s Kumar Shwetabh
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37
Michael chats with Kumar Shwetabh, President and Chief Growth Officer at Access Healthcare. In this episode, Michael and Kumar discuss the U.S. healthcare industry’s reluctance to adopt AI and advanced automation compared with other industries, why hospital operating margins are continuously sliding, how they can remain profitable without increasin…
…
continue reading
1
Protecting Health Systems from Cyber Attacks with Hyland’s Dylan Border
45:14
45:14
Play later
Play later
Lists
Like
Liked
45:14
Michael chats with Dylan Border, Director of Cyber Security at Hyland, leading the company’s Cyber Security Operations and Governance and Risk and Compliance teams. In this episode, Michael and Dylan discuss the prevalence of cyber attacks in healthcare, several types of cyber attacks and how potential resulting shutdowns can be prevented, what to …
…
continue reading
Tony Anscombe, global security evangelist at ESET Backups. Not a super-sexy topic of conversation, but when you or your clients have been breached, they can be a lifesaver. So this week, we’re having a chat with frequent podcast guest Tony Anscombe, global security evangelist at ESET, about the strategy behind backing up. We discuss: how backup fit…
…
continue reading
1
Getting Out Ahead of Cyber Attacks with ESET’s Tony Anscombe
29:14
29:14
Play later
Play later
Lists
Like
Liked
29:14
Michael chats with Tony Anscombe, Chief Security Evangelist at ESET. In this episode, Michael and Tony discuss the motivation behind and nature of healthcare cyber attacks, the pros and cons of using AI in healthcare, protection in light of the prevalence of telehealth, the importance of threat intelligence and human expertise in preventing cyber a…
…
continue reading
1
AI Assurance: What It Is, and Why It Matters with HITRUST’s Jeremy Huval
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45
Michael chats with Jeremy Huval, Chief Innovation Officer at HITRUST. In this episode, Michael and Jeremy discuss how HITRUST serves the healthcare industry; how the company is expanding into AI through its AI Assurance program; takeaways for buyers, users, and sellers of AI-enabled systems; and much more. This episode is sponsored by HITRUST, hitr…
…
continue reading
1
Greater Efficiency in Healthcare Data Security with rf IDEAS’ David Cottingham
19:17
19:17
Play later
Play later
Lists
Like
Liked
19:17
Michael chats with David Cottingham, President of rf IDEAS. In this episode, Michael and David discuss rf IDEAS’ background and mission, how the company provides efficiencies in data security for healthcare, how healthcare organizations can strengthen their data security practices, some major trends in healthcare data security, and much more. This …
…
continue reading
1
Healthcare Cybersecurity in Today’s Regulatory Environment with DigiCert’s Mike Nelson
23:46
23:46
Play later
Play later
Lists
Like
Liked
23:46
Michael chats with Mike Nelson, Vice President of Digital Trust at DigiCert. In this episode, Michael and Mike discuss the latest cybersecurity regulations surrounding medical devices, how public key infrastructure (PKI) connects compliance and security to help medical device manufacturers meet those regulations, the meaning of “crypto-agility” and…
…
continue reading
1
The Need for Better Headsets with Clear Choice’s Peter Goldstein and Ann Seigler
27:50
27:50
Play later
Play later
Lists
Like
Liked
27:50
Michael chats with Peter Goldstein, Chief Revenue Officer, and Ann Seigler, Strategic Sales Executive, both at Clear Choice Headsets & Technology. In this episode, Michael, Peter, and Ann discuss the intersection of technological evolution and headset development, how headsets affect employee well-being and productivity, the challenges and needs of…
…
continue reading
1
Diving Into Value-Based Care with Revelar Analytics’ Maria Nikol
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42
Michael chats with Maria Nikol, CEO and founder of Revelar Analytics. In this episode, Michael and Maria discuss the genesis of Revelar Analytics, the evolution and impact of accountable care organizations and value-based care, price transparency as it relates to value-based care, strategies in implementing national-scale healthcare initiatives, th…
…
continue reading
1
Avaya Canada chief Robertson on innovation, hybrid work, and more
21:46
21:46
Play later
Play later
Lists
Like
Liked
21:46
David Robertson, managing director and president of sales at Avaya Canada Avaya Canada had a big year in 2023 and is gearing up for 2024. David Robertson, managing director and president of sales for Avaya Canada, joins us on this edition of the podcast to discuss how the Canadian organization fits into the company’s overall view, innovation and in…
…
continue reading
1
Where Radiology Imaging Meets AI with RamSoft’s Vijay Ramanathan
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53
Michael chats with Vijay Ramanathan, co-founder and CEO of RamSoft, a healthcare imaging software provider. In this episode, Michael and Vijay discuss the development of RamSoft’s OmegaAI solution, how it’s changing the landscape of radiology imaging, helping healthcare providers overcome challenges with radiology imaging, improving workflow effici…
…
continue reading
1
Katie Moussouris on building a different cybersecurity businesses
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50
Episode sponsors: Binarly, the supply chain security experts (https://binarly.io) FwHunt (https://fwhunt.run) Katie Moussouris founded Luta Security in 2016 and bootstrapped it into a profitable business with a culture of equity and healthy boundaries. She is a pioneer in the world of bug bounties and vulnerability disclosure and serves in multiple…
…
continue reading
Tyler Coughlan, chief country executive at Ingram Micro Canada The new year brings new leadership at Ingram Micro Canada. The distributor has introduced Tyler Coughlan, formerly a sales leader with the company, as its new chief country executive for Canada as longtime former Canadian boss Bill Brandel heads back to the U.S. to lead go-to-market in …
…
continue reading
1
Cyber security year in review and look ahead with ESET’s Tony Anscombe
31:34
31:34
Play later
Play later
Lists
Like
Liked
31:34
Tony Anscombe, global security evangelist at ESET It was a banner year for ransomware, but is it going under the radar more than in years past? Is cyber security insurance a net good or evil force, and why? And why are managed services around security set to increase? We kick off the podcast for 2024 as we’re joined by Tony Anscombe, global securit…
…
continue reading
1
Costin Raiu: The GReAT exit interview
1:32:13
1:32:13
Play later
Play later
Lists
Like
Liked
1:32:13
Episode sponsors: Binarly, the supply chain security experts (https://binarly.io) FwHunt (https://fwhunt.run) Costin Raiu has spent a lifetime in anti-malware research, working on some of the biggest nation-state APT cases in history, including Stuxnet, Duqu, Equation Group, Red October, Turla and Lazarus. In this exit interview, Costin digs into w…
…
continue reading
1
Danny Adamitis on an 'unkillable' router botnet used by Chinese .gov hackers
34:07
34:07
Play later
Play later
Lists
Like
Liked
34:07
Episode sponsors: Binarly, the supply chain security experts (https://binarly.io) FwHunt (https://fwhunt.run) Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team's recent discovery of an impossible-to-kill botnet pac…
…
continue reading
1
Allison Miller talks about CISO life, protecting identities at scale
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12
Episode sponsors: Binarly, the supply chain security experts (https://binarly.io) FwHunt (https://fwhunt.run) Allison Miller is founder and CEO of Cartomancy Labs and former CISO and VP of Trust at Reddit. She has spent the past 20 years scaling teams and technology at Bank of America, Google, Electronic Arts, PayPal/eBay, and Visa International. I…
…
continue reading
1
The Evolution of Enterprise Imaging with Apollo’s Kevin Stinson and Tom Coppa
26:34
26:34
Play later
Play later
Lists
Like
Liked
26:34
Michael chats with Apollo Enterprise Imaging’s Kevin Stinson, Chief Revenue Officer, and Tom Coppa, Chief Product Officer. In this episode, Michael, Kevin, and Tom discuss challenges and needs related to implementing enterprise imaging, why healthcare providers need to be able to view all images on a single screen, the paradigm shift in enterprise …
…
continue reading
1
Bringing Drugs to Market the Smarter Way with VeriSIM Life’s Dr. Jo Varshney
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57
Michael chats with Dr. Jo Varshney, Founder and CEO of VeriSIM Life, which aims to bring clarity to drug development through computational sciences rather than the existing trial and error experimentation approach. In this episode, Michael and Jo discuss how VeriSIM Life’s work brings better outcomes without redundant trials and subjecting animals …
…
continue reading
1
Rob Ragan on the excitement of AI solving security problems
51:16
51:16
Play later
Play later
Lists
Like
Liked
51:16
Episode sponsors: Binarly (https://binarly.io) FwHunt (https://fwhunt.run) Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of pro…
…
continue reading
1
Seth Spergel on venture capital bets in cybersecurity
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56
Episode sponsors: Binarly (https://binarly.io) FwHunt (https://fwhunt.run) Seth Spergel is managing partner at Merlin Ventures, where he is responsible for identifying cutting-edge companies for Merlin to partner with and invest in. In this episode, Seth talks about helping startups target US federal markets, the current state of deal sizes and val…
…
continue reading