https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
1
S04.E1 - Crowdstrike - the global blue screen
42:10
42:10
Play later
Play later
Lists
Like
Liked
42:10
Machine's turn up with blue screen all over the world, the cause seems to be a faulty update affecting Crowdstrike. Whats it about, whats going on, and a special segment on responding to your senior management or Board on the matterBy SecurityLah
…
continue reading
1
Mastering Digital Parenting: Navigating Cybersecurity and Privacy for Your Family
1:14:07
1:14:07
Play later
Play later
Lists
Like
Liked
1:14:07
Lunch and Learn Presentation Hosted by Craig Petronella. Video Available at https://youtu.be/OIuxhkb-Njk - Imagine a world where your family's online interactions are as secure as fort Knox, yet as open as a summer's day in the park. That's the reality we're aiming for in this gripping discussion on digital safety. In this episode, we illuminate th…
…
continue reading
1
Mastering Cybersecurity: Strategies, Predictive Solutions, and Simplifying Protection for Businesses with Bala Ramaya
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39
Unlock the mysteries of cybersecurity and learn to navigate the complexities of compliance with expert insights from Bala Ramaya, CEO of ISSquared. This episode takes you on a journey through the evolving world of managed service providers, shedding light on how IA Squared transformed itself into a cybersecurity force. Bala not only shares the comp…
…
continue reading
1
Navigating the Complexities of API Protection and Compliance
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55
Unlock the secrets to ironclad API security with Jeremy Snyder of Firetail as we navigate the often treacherous terrain of digital safety. Peering into the murky depths of API exploitation, Jeremy brings clarity to how Firetail's cutting-edge tools not only bolster developers' efforts in constructing impenetrable APIs but also stand guard, thwartin…
…
continue reading
1
Elevating Airline Safety with Next-Gen Cybersecurity Measures
46:06
46:06
Play later
Play later
Lists
Like
Liked
46:06
Prepare to navigate the turbulent skies of cybersecurity with Sige Brody, CTO of Optinine, as we unpack the pressing dangers and defenses within the aviation sector. Discover how Optinine's managed cloud computing services are revolutionizing the way airlines protect their most valuable assets, with a focus on robust disaster recovery and business …
…
continue reading
1
Navigating the Perils of Crypto: Breaches, Security, and Safeguarding Your Digital Assets
43:54
43:54
Play later
Play later
Lists
Like
Liked
43:54
Imagine discovering that the very foundations of your financial security have been compromised by one of the most infamous crypto-heists in history. That's the chilling tale we unravel from the 2016 Bitfinex breach, with a staggering $4.5 billion at stake. We join forces with cybersecurity experts and dive into the cutting-edge blockchain forensics…
…
continue reading
1
S03E12. The year wrap up and emerging threats for 2024
1:12:06
1:12:06
Play later
Play later
Lists
Like
Liked
1:12:06
team SecurityLah ends the year with a wrap up on the top 10 emerging threats for 2024. Lots of laughs and serious talk on what's up ahead!By SecurityLah
…
continue reading
1
Clashing Titans of Tech and the Rising Tide of Hacking
42:20
42:20
Play later
Play later
Lists
Like
Liked
42:20
Join Blake Rea and Craig Petronella as we unwrap the latest tech and cybersecurity developments faster than you can tear through holiday gift wrapping. From the FBI's tactical strike against the Black Cat ransomware group to the Xfinity data breach leaving millions on edge, we cover it all. We also weigh the consequences of vengeful IT maneuvers in…
…
continue reading
1
Navigating Cryptocurrency Security: Sim Swaps, Vendor Risks and Assertive Measures
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24
What if you could protect your cryptocurrency from hackers with just a few simple security measures? That's what we're diving into today in our exploration of the fascinating yet terrifying world of SIM Swaps and cryptocurrency security. We'll shed light on a real-life cautionary tale of a victim who lost his cryptocurrency to these cunning cyber c…
…
continue reading
1
Unraveling The Complexities Of Cybersecurity, Compliance And Bitcoin Wallet Security
1:01:00
1:01:00
Play later
Play later
Lists
Like
Liked
1:01:00
Do you think you're up-to-date with cybersecurity and compliance? This episode will uncover some surprising facts that you may not be aware of. Firstly, we'll be unravelling the complex challenges that healthcare organizations face, especially when dealing with outdated medical equipment. We'll look at a real-life case where a hospital was hacked, …
…
continue reading
1
Cybersecurity Threats, AI Impacts on Jobs and its Role in the Future of Electric Vehicles
37:52
37:52
Play later
Play later
Lists
Like
Liked
37:52
Are you prepared for the digital dangers lurking in your computer, or the profound impacts of artificial intelligence on our lives? This episode arms you with knowledge of the latest cybersecurity threats, from North Korean state-linked nation group hacking Mac computers, to phishing scams and vulnerabilities in class action lawsuits. We also delve…
…
continue reading
1
Guarding Against the Inevitable: Strategies for Cybersecurity and Prevention
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52
Hold onto your security blankets folks! Are we ever secure enough in this digital age? Get a grip on the pulse-raising lawsuit from the SEC against SolarWinds and the unexpected ban from the Canadian government on WeChat and Kaspersky. We harness the power of hindsight, looking back at how this enormous breach happened and what could have been done…
…
continue reading
1
S03E11. Cyber Security Month Special - Security Awareness
51:39
51:39
Play later
Play later
Lists
Like
Liked
51:39
Team Securitylah explores the challenge of Cyber Security awareness and how organizations (using Malaysia as an example) can better adopt and implement awareness sessions!By SecurityLah
…
continue reading
1
Navigating the Stormy Seas of Cybersecurity and Social Media Evolution
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12
Are you prepared to navigate the rocky terrain of today's cybersecurity landscape? This episode is your compass, guiding you through the treacherous twists and turns of tech threats, from the OKTA breach to the leaking of NSA classified data to Russia and the sneaky Microsoft bug within Active Directory and Azure. We don't tiptoe around the controv…
…
continue reading
1
Unraveling BlackTech: A Deep Dive into Advanced Persistent Threats and Network Security
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05
What if you had a front-row seat to one of the most riveting stories in cybersecurity today? Join us as we unravel the story of the Chinese state-sponsored Advanced Persistent Threat, BlackTech, and their exploitation of the Cisco Zero Day CVE 2023-20109. We dissect their strategy of modifying router firmware on Cisco routers, maintaining a stealth…
…
continue reading
1
Unmasking the Xenomorph: An In-Depth Discussion on Android Security and Cybersecurity
49:01
49:01
Play later
Play later
Lists
Like
Liked
49:01
Do you know how to protect your device from the Xenomorph Banking Trojan? Join us as we dive into the murky waters of Android security threats with our enlightening guest, Blake Rea. We unmask the frightening reality of this new Trojan, aimed solely at Android users. With a chilling focus on over 35 financial institutions and some crypto wallets, t…
…
continue reading
1
MGM Cyber Attack, Personal and Business Cybersecurity Tips and Tricks
53:47
53:47
Play later
Play later
Lists
Like
Liked
53:47
MGM Cyber Attack, Personal and Business Cybersecurity Tips and Tricks. According to Okta, Hackers who breached MGM and Caesars also hit 3 other firms. Learn cybersecurity tips and tricks you can use to security harden yourselves and your business. Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and Link…
…
continue reading
1
S03E10: ChatGPT, Generative AI and Security
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10
AI is all the buzz right now. Using ChatGPT for daily life and work is slowly becoming a norm. Apps embedding AI is the VC's darling. Is there any security risks associated to ChatGPT use? Team #securitylah explores!By SecurityLah
…
continue reading
Recently, SecurityLAH was interviewed by Free Malaysia Today on matters pertaining to Cyber Security and Malaysia. The hosts felt that while the article is out, it is only proper that we have a discussion around the questions, to give our listeners a full context of what the answers were.By SecurityLah
…
continue reading
1
S03E08. ISO 27000 Series - Document Intro, Clause 1 - 3
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, the team looks into the document details, from the front page up to Clause 3.By SecurityLah
…
continue reading
1
S03E07. ISO 27000 Series - Mapping ISO 27001:2013 and ISO27001:2022
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, the team looks into the differences between the older version and the current version, with discussion on what needs to be done when moving to the new standar…
…
continue reading
Singpass, the national digital ID for Singapore has recently made some changes to it's operations and terms of use. In this episode, team #securitylah reviews the changes to see what is the impact to the average Singaporeans and its citizens.By SecurityLah
…
continue reading
Team SecurityLah is joined by Dan from SAINS and Awang from MASA to talk about cybersecurity and Sarawak. What do they have in store?By SecurityLah
…
continue reading
1
S3E04. ISO Series - So you're ready for an ISO Audit (or are you) ?
57:24
57:24
Play later
Play later
Lists
Like
Liked
57:24
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, team #SecurityLah looks into the aspect of audit readiness and getting to the moment of having the ISO certification cert in your hands.…
…
continue reading
1
S3E03. ISO Series - Reading the ISO standard
43:19
43:19
Play later
Play later
Lists
Like
Liked
43:19
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, team #securityLah explains the standard structure and how one "reads" the standard.By SecurityLah
…
continue reading
1
S3E02. ISO Series - Primer to the ISO 27000 series
38:44
38:44
Play later
Play later
Lists
Like
Liked
38:44
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. We've looked at what standards and ISO is, and now we go into the 27k series. Team looks at the progression of the 27k series, the 7799 series and how the standards have evolv…
…
continue reading
1
S3E01. ISO Series - Of International Standards Ep 1/12
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this introductory episode, the team introduces the concept of international standards and the parties involved in making this global initiative happen.…
…
continue reading
Just about a month ago, AirAsia had a data breach. The breach was announced by the ransomware group Daixin. This episode looks into the breach that had happened with team SecurityLah tearing into the details!By SecurityLah
…
continue reading
We're coming to year end, with Christmas around the corner. Here are the hosts with special greetings to all of you!By SecurityLah
…
continue reading
1
S2E15 - Indonesia's PT Telkom & PLN breach
19:46
19:46
Play later
Play later
Lists
Like
Liked
19:46
Pt Telkom and PLN in Indonesia was breached. What happened? Team SecurityLah dives into this recent incident.By SecurityLah
…
continue reading
1
How To Choose A Cybersecurity Provider, Penetration Test Pricing, Zero Trust and The Latest Tips On FTX Crypto Exchange Hack
30:27
30:27
Play later
Play later
Lists
Like
Liked
30:27
How To Choose A Cybersecurity Provider. Learn tips on what to ask for and what to look for. Penetration Tests vs. Vulnerability Scans, Pricing, Zero Trust Technology and The Latest Takeaways from the recent FTX Crypto Exchange Hack. Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and LinkedIn and be sur…
…
continue reading
We use API's almost every day, every.minute and it a hidden aspect of our technology use. API is fast becoming a threat vector and needs to be looked at. In this episode, Sku and Doc looks into Top 5 issues plaguing API Security.By SecurityLah
…
continue reading
1
S2E13: iPay88 breach and notification - Part 2/2
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39
This is the final part to the 2 part series of the iPa88 breach and notification.By SecurityLah
…
continue reading
1
What will happen to my Ethereum after Ethereum's Merge - Blockchain - Zero Trust Solutions - PTG-Podcast-September-7-2022
39:38
39:38
Play later
Play later
Lists
Like
Liked
39:38
What will happen to my Ethereum after Ethereum's Merge? Blockchain Solutions and use cases - Zero Trust Solutions - PTG-Podcast-September-7-2022 Visit https://ComplianceArmor.com for the latest in Cybersecurity and Training. NO INVESTMENT ADVICE The Content is for informational purposes only, you should not construe any such information or other ma…
…
continue reading
1
S2E12: iPay88 breach and notification - Part 1/2
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42
Recently, a Mal;aysian payment gateway named iPay88 released a press release stating that they have been breached. Team #securitylah breaks down the press release to make sense of what happened.By SecurityLah
…
continue reading
Doc came up with a new cyber security plan that, according to him, will revolutionise the industry. What is it?By SecurityLah
…
continue reading
In this episode, team SecurityLah talks about data breaches and why it happens. Sky gives his top 5 reasons and Doc tears it apart.By SecurityLah
…
continue reading
NSO's Pegasus (a commercial malware/spyware) has been hitting the news for sometime. Team #securitylah looks at the genesis of Pegasus/NSO, what has it been and whats happening with it in Thailand.By SecurityLah
…
continue reading
CWE or the Common Weakness Enumeration by MITRE is a catalog of identified weaknesses that should be looked at and addressed. In this episode, Doc goes into this particular weakness and shares how most organizations miss this and how it affects security for the organization.By SecurityLah
…
continue reading
With everything going on on the internet, navigating the digital waters of the internet with your children can be a real challenge. You want to may sure they are safe and that they don't get hacked, but how? In this episode, we give you practical tips and tricks to help keep your kids (and their devices) safe from hackers! Hosts: Craig, Erin, and B…
…
continue reading
1
How the COVID Pandemic Paved the Way for the Cybersecurity Pandemic
55:08
55:08
Play later
Play later
Lists
Like
Liked
55:08
Hackers have no shame. Any opportunity they think they can exploit will be exploited. That includes a global pandemic that has taken the lives of millions of people around the world. The death and destruction are of no consequence to these bad actors and with millions of workers working remotely, hackers have a field day. Did your business go remot…
…
continue reading
1
**Breaking Cybersecurity News Raw & Unfiltered** Teaching Your Kids How NOT to Get Hacked
56:18
56:18
Play later
Play later
Lists
Like
Liked
56:18
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** With everything going on on the internet, navigating the digital waters of the internet with your children can be a real challenge. You want to ma…
…
continue reading
1
Is a Job in Cybersecurity Right for You? A Day in the Life of a Cybersecurity Expert
31:54
31:54
Play later
Play later
Lists
Like
Liked
31:54
In this episode, we talk about what a day in the life of a cybersecurity firm looks like, and what kind of mindset it takes to be successful in this industry. Are you thinking of making a switch? Do you know a young person who is looking for career advice? Listen in, and find out if it's right for you! Hosts: Blake and Erin Support the show - Call …
…
continue reading
1
**Breaking Cybersecurity News Raw & Unfiltered** How the COVID Pandemic Paved the Way for the Cybersecurity Pandemic
1:05:57
1:05:57
Play later
Play later
Lists
Like
Liked
1:05:57
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** Hackers have no shame. Any opportunity they think they can exploit will be exploited. That includes a global pandemic that has taken the lives of …
…
continue reading
1
The REAL Reason the US is Behind the Curve in Cybersecurity
50:28
50:28
Play later
Play later
Lists
Like
Liked
50:28
Sometimes it seems as if America is ALWAYS the target of cybersecurity attacks. And that's because it kinda is! But what remakes the US such an attractive target? It's a complicated answer with multiple reasons - some that aren't too surprising, and others that may be harder to spot. But one thing is for sure: We in the US, collectively, need to ta…
…
continue reading
1
Historically Significant Hacks and How YOUR Business Can Avoid This List
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31
We've all seen the news and read the headlines - Hackers aren't going anywhere anytime soon! In fact, quite the opposite is true... So what can YOU do to keep your company's name out of the papers? Listen in and find out! Hosts: Erin and Blake Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and LinkedIn…
…
continue reading
1
**Breaking Cybersecurity News Raw & Unfiltered** What is a "Zero-Trust" Framework, and is it Right for Your Business?
49:21
49:21
Play later
Play later
Lists
Like
Liked
49:21
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** With the rash of cyberscams and a huge portion of the workforce going remote, there has been a lot of talk about implementing a "Zero-Trust Framew…
…
continue reading
1
Compliance Regs You Should be Following that Nobody Tells You About (And Craig Catches a Gator!)
1:08:31
1:08:31
Play later
Play later
Lists
Like
Liked
1:08:31
Today we welcome Craig back! Not only do we get to hear about Compliance regulations you're probably subject to but unaware of, but we also get to hear Craig's harrowing tail of 'Gator wrestling in the murky waters of North Carolina! Link: Craig Reels in a Gator in Arapahoe, NC! Host: Craig Co-Hosts: BJ, Blake, and Erin Support the show - Call 877-…
…
continue reading
1
Don't Get Cybersecurity Insurance (Until You Listen to this Podcast)!
1:16:28
1:16:28
Play later
Play later
Lists
Like
Liked
1:16:28
Hackers aren't going anywhere, any time soon, so a lot of companies are (wisely!) looking into cyberinsurance. However, not all companies know what they need to do to get cyberinsurance, or they try to use it as a replacement for ACTUAL cybersecurity. On today's podcast, we discuss the right (and wrong) ways to get cyberinsurance for your business.…
…
continue reading
1
S2E08: About CISO, and IT Security Part 2/2
23:32
23:32
Play later
Play later
Lists
Like
Liked
23:32
Team SecurityLAH continues the discussion on the appointment of CISO for organizations due to regulatory and environmental requirements, and at the same time tearing apart the formation of IT Security in organizations.By SecurityLah
…
continue reading