The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
Tune in to our podcast to hear expert speakers on the links between global environmental change, security, development, and health. The Environmental Change and Security Program is a part of the Woodrow Wilson International Center for Scholars, the living, national memorial to President Wilson established by Congress in 1968 and headquartered in the District of Columbia. It is a nonpartisan institution, supported by public and private funds, engaged in the study of national and world affairs ...
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading
Privacy and information security
…
continue reading
Policy Forum Pod is the podcast of PolicyForum.net - Asia and the Pacific's platform for public policy debate, analysis and discussion. Policy Forum is based at Crawford School of Public Policy at The Australian National University. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
This is the podcast where I, Jared, talk about assistive technology, security, driving cars, and anything else that may cross my desk. If you wish to contribute, please feel free to contact me through the contact information available on the blog or contact information available in the podcast itself. You may also go to my web site for other public contact information. I look forward in participation and comments from everyone. The Security Box, otherwise known as TSB is a weekly talk show t ...
…
continue reading
Vanguard is Canada’s oldest trade journal of record that provides a forum for Canada’s security and defence community, discussing strategic perspectives and overviews of government and military policy and practice, through interviews with leading practitioners and contributions from renowned experts, including representatives from industry. The Vanguard Podcast follows in the footsteps of this great history and seeks to serve the Canadian Government by providing clear and concise information ...
…
continue reading
“The Forum,” where science comes to socialize, is a biweekly audio podcast produced by a team of female scientists who specialize in contextualizing S&T advances for sci-curious novices and experts alike. The show is hosted by the Institute on Science for Global Policy (ISGP). Interested in infectious disease, food security, climate change, or synthetic biology? Curious about how scientific advancements, such as GMOs or medical interventions, are regulated? Wonder how science might help us s ...
…
continue reading
The USENIX Invited Talks Podcast brings you industry leaders covering the latest in security, system administration, systems research, and more need-to-know technology topics. USENIX, The Advanced Computing Systems Association, has been the premier forum for presenting groundbreaking technology information for over 30 years. Check out excerpts from the luminary-led invited talks programs of past USENIX Conferences.
…
continue reading
Hosted by award winning veteran radio and television anchor, journalist, and marketing/public relations professional Sam Yates, this is a compelling show for seniors, about seniors, and featuring seniors. Yates is recognized as an expert in the senior care and urgent care business categories. The Great American Senior Show delves into topics that impact senior health and wellness; updates pandemic policies; is a forum for multi-political views; details financial and investment information; a ...
…
continue reading
The Oceanology International 2008 Podcast is where you’ll hear the views of the conference chairman, Dr Ralph Rayner, and other key speakers and companies attending the world’s largest forum for the marine science and ocean technology community, discussing issues such as climate change, energy from the oceans, marine renewables, civil & environmental security. Visit www.oceanologyinternational.com for more information.
…
continue reading
The Air Line Pilot Podcast provides news and information for pilots to stay up to date on what is happening in their union and across the industry. Through discussions about labor relations, tips for pilots, and aviation news, the podcast brings together pilot leaders, industry experts, policymakers, and more to keep ALPA members informed. The Air Line Pilot Podcast is hosted by Capt. Jason Ambrosi and is a product of the Air Line Pilots Association, Int’l.
…
continue reading
The Circuit is the number #1 source of information on protection matters and is the industry-leading magazine for all security professionals who want to stay ahead of the game. If you're new to the industry or an old-school veteran, the Circuit is the place for you. Through the podcast, we bring the stories and the contributors from the magazine to life. The Circuit team is: Elijah Shaw, Jon Moss, Shaun West and Phelim Rowe. For more information on all things Circuit related, visit us at: ht ...
…
continue reading
I believe that business executives are a separate class of cyber targets that could be protected better. In order to do this, my company, Cyber Smartz, provides cybersecurity/information security training for business executives who do not have an IT background. As a strong advocate for privacy, my point of point of view will most likely conflict with some of the mainstream views on this subject. But that's also why its more effective. Support this podcast: https://podcasters.spotify.com/pod ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The Global Center for Women and Justice launched the Ending Human Trafficking podcast in 2011. Our hosts are Dr. Sandie Morgan and Dr. Dave Stachowiak. Our mantra is Study the Issues. Be a voice. Make a difference. We believe that if you do not study first, you may say or do the wrong thing.
…
continue reading
The Case from Israel is a podcast on Israeli law and democracy from the Israel Law and Liberty Forum. Together, we're going to delve deeply into Israel's political and legal ideas, meet the major figures who have shaped our society, and share perspectives on the biggest debates facing this incredible little country as it continues to shape its very democracy after 75 years. If you care about Israeli security, its Jewish and democratic character, its start-up nation, its social cohesion – thi ...
…
continue reading
The Atlanta Personal Injury Lawyer Podcast features legal information for residents of Georgia who need help with their personal injury, motor vehicle accident, workers' compensation, shooting, wrongful death, nursing home abuse, or social security disability claims. Gary is an experienced personal injury lawyer who is dedicated to serving the people of Georgia. His legal accomplishments include being a member of the prestigious Multi-Million Dollar Advocate’s Forum, a society limited to tho ...
…
continue reading
Russia’s unprovoked invasion of Ukraine has set in motion a catastrophic war. The consequences of this war will be both tragic and far-reaching, including with respect to nuclear nonproliferation and risk reduction. Consistent with the CNS mission of promoting nonproliferation education and analysis, the Center offers a podcast about the nuclear challenges and risks that have arisen as a result of this unfolding crisis. In a fast-changing landscape with countless unknowns, this podcast aims ...
…
continue reading
1
The Security box, podcast 200: Our 4th year anniversary show
3:30:57
3:30:57
Play later
Play later
Lists
Like
Liked
3:30:57
Hello folks, welcome to program 200. On this edition, we're going to cover the landscape, one of the biggest breaches that will possibly affect everyone in one form or another, as well as hear from participents on what they found of value from the last 4 years. Thanks so much for listening! AT&T breach Snowflake is going to be the biggest talk in t…
…
continue reading
1
CYFIRMA Research: Threat Actors Actively Exploiting CVE-2024-24919: Underground Forums Share IP Addresses of Vulnerable Check Point Security Gateway Devices
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30
A critical vulnerability (CVE-2024-24919) with a CVSS score of 8.6 has been discovered in EOL Check Point devices, allowing remote attackers to read arbitrary files. The Hacktivist group "Ghost Clan Malaysia" has shared affected IP addresses worldwide. Upgrade to supported versions and apply necessary hotfixes immediately to protect your data and i…
…
continue reading
1
CYFIRMA Research: Braodo Info Stealer Targeting Vietnam and Abroad
3:48
3:48
Play later
Play later
Lists
Like
Liked
3:48
Braodo Info Stealer, a Python-based malware, is targeting users in Vietnam and several other countries. This sophisticated threat spreads possibly through phishing emails, uses GitHub for hosting malicious code, and exfiltrates stolen data via Telegram channels. Learn more about this emerging threat impacting global cybersecurity. Link to the Resea…
…
continue reading
1
#195 Michael Zequeira on the Effects of Social Media on Military Recruiting
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, US Army Major Michael Zequeira di…
…
continue reading
1
CYFIRMA Research- TRACKING RANSOMWARE – JUNE 2024
4:44
4:44
Play later
Play later
Lists
Like
Liked
4:44
Stay informed about the latest developments in cybersecurity with CYFIRMA's Tracking Ransomware-June 2024 Report. This month's report highlights key trends, including a decrease in ransomware attacks by groups like Play and RansomHub, while Akira and Qilin increased their operations. Discover significant changes in targeted industries, with most se…
…
continue reading
1
S27 Ep4: Steve Durbin & Julie MacDonald - Risky Business: Aligning enterprise strategy with human-centred security
14:21
14:21
Play later
Play later
Lists
Like
Liked
14:21
Steve recently sat for an interview with veteran journalist Julie MacDonald for a feature with The European. For the next two weeks, we’ll be presenting that conversation in two parts. In the first part, Julie and Steve discuss the regulatory landscape, improving communication across the business, and how enterprises can successfully marry technolo…
…
continue reading
1
Environmental Cooperation in the Middle East: A Conversation with Dr. Tareq Abu Hamed
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
In today’s episode of New Security Broadcast, Wilson Center Global Fellow and environmental journalist Anneliese Palmer speaks with longtime leader in regional environmental diplomacy and Executive Director of the Arava Institute for Environmental Studies, Dr. Tareq Abu Hamed. In their conversation, Dr. Hamed unpacks the opportunities and challenge…
…
continue reading
1
CYFIRMA Research- PHP CGI Argument Injection (CVE-2024-4577)- Vulnerability Analysis and Exploitation
3:09
3:09
Play later
Play later
Lists
Like
Liked
3:09
Critical Alert: Organizations using PHP in CGI mode must act now! CVE-2024-4577 presents a severe risk of remote code execution. With millions of websites potentially affected globally, immediate action is crucial. Attackers can exploit CGI argument injection to execute arbitrary commands, leading to unauthorized access or server compromise. Update…
…
continue reading
1
The Security box, podcast 199: Don't be Blinded by Snowblind
3:03:27
3:03:27
Play later
Play later
Lists
Like
Liked
3:03:27
Hello folks, welcome to the security box. On this edition of the podcast, we're going to talk about something called Snowblind. We also have news, notes, te landscape; and something I heard via a podcast that we can discuss in regards to scams. We also have a laugh that might have you laughing as well. We hope you enjoy the program! How about a lau…
…
continue reading
1
CYFIRMA Research: Kematian-Stealer- A Deep Dive into a New Information Stealer
5:24
5:24
Play later
Play later
Lists
Like
Liked
5:24
The CYFIRMA team has uncovered "Kematian-Stealer," a sophisticated info stealer targeting Windows systems, hosted on GitHub. This open-source malware is designed to stealthily extract data from a wide range of sources, including browsers, cryptocurrency wallets, messaging apps, gaming platforms, VPNs, and email clients. Kematian-Stealer employs adv…
…
continue reading
This year’s Olympic games come at a heightened moment for international conflict & terrorism. The potential for a jihadi group or individuals inspired by one to take the world’s attention with a potential attack or for Russia to try to embarrass France with acts of sabotage are very high. Link to the Research Report: Paris Olympics - CYFIRMA #Geopo…
…
continue reading
1
S2 Ep14: Celebrating Infosec and the Podcast
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07
Today marks the 50th episode of the Analyst Insights podcast! This milestone episode celebrates the positives of working in InfoSec. Drawing on testimonies from previous guests, Patric Versteeg and Mike Cartwright, as well as conversations among ISF regulars Paul Watts and Esther Schagen-van Luit, this episode brings to life all the ways InfoSec ca…
…
continue reading
1
S27 Ep3: Ruth Rathblott - Unseen and Unheard: Creating an inclusive culture through storytelling
26:27
26:27
Play later
Play later
Lists
Like
Liked
26:27
Today, author and disability diversity expert Ruth Rathblott offers a fresh perspective on how we understand and approach diversity in the workplace. She and Steve discuss how DEI can benefit both your culture and your business, and they give practical tips for leaders looking to build a more inclusive environment. Key Takeaways: 1. Leaders need to…
…
continue reading
1
The Security box, podcast 198: Week 2 of the 2 weeks of open forum
4:05:53
4:05:53
Play later
Play later
Lists
Like
Liked
4:05:53
Hello folks, welcome to the security box. On this program, an open forum full of stuff from scams, to articles on the blog and the most important ones of those. Hope you enjoy the program. Running time, 4 hrs, 5 minutes.
…
continue reading
1
The Security box, podcast 197 intermediate a: The Language of the Business
52:38
52:38
Play later
Play later
Lists
Like
Liked
52:38
Welcome to podcast 197, intermediate A. J Wolfgang Goerlich is along with a very interesting talk. While I've not listened to it in full, I did think of putting this out as it talks about risk. Maybe its a risk you don't know much about, so let's learn together. J Wolfgang Goerlich: My RSA talk is up. Join me in dismantling the myth of the weakest …
…
continue reading
1
NATO’s Paul Rushton on the Alliance’s Climate Security Efforts
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34
When senior officials from 32 countries meet in Washington, DC next week for the NATO Summit, deterrence and defense, as well as Ukraine and global partnerships, are at the top of the agenda. Under Secretary General Stoltenberg’s leadership, NATO has recognized that climate change is also reshaping the security landscape. In today’s episode of New …
…
continue reading
1
#194 Mike Hall on the Moral Imperative of Our Time
1:10:25
1:10:25
Play later
Play later
Lists
Like
Liked
1:10:25
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Dr. Wayne “Mike” Hall discusses h…
…
continue reading
1
S27 Ep2: Jane Hyun - The Art of Cultural Fluency in the Workplace
13:13
13:13
Play later
Play later
Lists
Like
Liked
13:13
Today is the second in a two-part conversation centered on cultural fluency with global leadership strategist and corporate coach Jane Hyun. Jane is the author of Leadership Toolkit for Asians: The Definitive Resource Guide for Breaking the Bamboo Ceiling and Breaking the Bamboo Ceiling: Career Strategies for Asians, and co-author of Flex: The New …
…
continue reading
1
CYFIRMA Research: Lumma Stealer-Tactics, Impact, and Defense Strategies
3:27
3:27
Play later
Play later
Lists
Like
Liked
3:27
Cyfirma research team has examined a variant of Lumma Stealer malware, and this report provides a comprehensive analysis of this advanced information-stealing malware, explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Lumma S…
…
continue reading
1
The Security box, podcast 197: week 1 of two for open forum
2:53:45
2:53:45
Play later
Play later
Lists
Like
Liked
2:53:45
We realize after the podcast was created that we did not put the file in for thanking our affiliates. This was an oversite and that should not happen again. The podcast had lots of discussion though, and I hope you enjoy it. We'll have another week of open forum, next week. We hope you enjoy.
…
continue reading
1
CYFIRMA Research- Digital Warfare: Pakistan-Based Terrorist Organizations Utilize Digital Platforms in J&K for Psy Ops
4:01
4:01
Play later
Play later
Lists
Like
Liked
4:01
CYFIRMA's latest investigation reveals how terrorist groups in Kashmir are still exploiting digital platforms to spread propaganda and influence people. Their psychological operations (Psy Ops) aim to manipulate public perception, spread fear, and destabilize the region. Despite a reduction in physical presence, groups like TRF and Kashmir Tigers a…
…
continue reading
Research at the ISF is changing to align more closely with the evolving nature of information security and the demands of Members. In a follow-up episode to 'Research in 2024', Principal Research Analyst Richard Absalom joins Senior Analyst and podcast host Mark Ward to discuss in detail what’s changing with ISF Research. Richard and Mark outline w…
…
continue reading
1
S27 Ep1: Jane Hyun - Leading From Afar: Getting the best out of our remote workforce
14:57
14:57
Play later
Play later
Lists
Like
Liked
14:57
Today is the first in a two-part conversation centered on cultural fluency with global leadership strategist and corporate coach Jane Hyun. Jane is the author of Leadership Toolkit for Asians: The Definitive Resource Guide for Breaking the Bamboo Ceiling and Breaking the Bamboo Ceiling: Career Strategies for Asians, and the co-author of Flex: The N…
…
continue reading
1
323 – Tactical Intelligence Analyst’s Role in Online Safety, with Corinne St. Thomas Stowers
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12
Dr. Sandie Morgan is joined by Corinne St. Thomas Stowers as the two discuss the role that fusion centers play in protecting a community and its children from sexual exploitation and online human trafficking. Corinne St. Thomas Stowers Corinne St. Thomas Stowers is the Supervising Tactical Intelligence Analyst assigned to the Orange County Intellig…
…
continue reading
1
CYFIRMA Research- Tracking Ransomware May 2024
4:20
4:20
Play later
Play later
Lists
Like
Liked
4:20
Stay informed about the latest trends in the ransomware landscape with CYFIRMA's May 2024 Ransomware report. This edition highlights significant increases in ransomware activity, with LockBit3 surging tremendously and Play rising by 10.34%. Incransom's activity doubled, while RansomHub and Medusa also showed notable activity. Manufacturing, real es…
…
continue reading
1
#193 Hatteras Hoops on Human Domain Security
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Hatteras Hoops discusses business…
…
continue reading
1
The Security Box, podcast 195: What Are .env Files and why should I care?
5:03:59
5:03:59
Play later
Play later
Lists
Like
Liked
5:03:59
Hello folks, welcome to podcast 195 of the security box. Let's start off with a set of questions that came out of something we did not cover as part of last week's box. If you listen via the podcast, please submit your guesses before the answers are revealed. I'll personally give you credit where credit is due, and we can work out what you will get…
…
continue reading
1
Navigating Pilot Mental Health and Wellness
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58
ALPA President, Capt. Jason Ambrosi interviews Dr. Susan Northrup the FAA’s Federal Air Surgeon, who oversees the FAA’s aviation medical programs— about how pilots can stay healthy and navigate mental health concerns with their aviation medical examiner. It is vital that pilots have the resources, support, and access to help mental wellness. Listen…
…
continue reading
1
S2 Ep12: Exploring Careers: Security audit
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42
In this third installment of the 'Exploring Careers' series, which puts infosec careers under the microscope, experienced security auditors - Aarti Ajay, Einat Segal, and Deepak Uniyal - join ISF Analyst and podcast host Mark Ward, along with ISF Principal Consultant Bharat Thakrar, to discuss auditing. Together, they delve into the role, its respo…
…
continue reading
1
S26 Ep5: Amanda Fennell - The Unicorn Leader's Self-help Guide to Confidence and Competence
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44
In this episode, Steve speaks with Amanda Fennell, a security professional with over two decades in the industry who currently serves as CISO and CIO of Prove and adjunct professor of cybersecurity at Tulane University. She talks to Steve about why a CISO must be an educator at heart, how to embrace feedback in order to grow, and how young professi…
…
continue reading
1
322 – The Intersection of Cyber- Security and Sexual Exploitation, with Ioana Bauer
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37
Dr. Sandie Morgan is joined by Ioana Bauer as the two discuss the important role that cyber-security plays in preventing sexual exploitation. Ioana Bauer Ioana Bauer completed her anti-human trafficking certificate through Vanguard University. She has been a leader in Romania since 2010 in eradicating human trafficking. She has helped pilot survivo…
…
continue reading
1
The Security box, podcast 194: News, notes and section 230 discussion
4:21:55
4:21:55
Play later
Play later
Lists
Like
Liked
4:21:55
Hello folks, welcome to the security box podcast 194. On this podcast, we're going to talk about section 230 and its potential repeal. We've also got the news, the notes and the landscape. True stories are also told, one dealing with crypto and one dealing with a potential job. Running time, 4 hrs 21 minutes. We hope that you enjoy the program as m…
…
continue reading
1
CYFIRMA Research- Vidar Stealer: An In-depth Analysis of an Information-Stealing Malware
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17
CYFIRMA research team has examined a variant of Vidar Stealer malware, and this in-depth examination explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Additionally, it describes the use of social media platforms to procure co…
…
continue reading
1
#192 Dr. Josh "Bugsy" Segal on the American Maginot Line
1:03:09
1:03:09
Play later
Play later
Lists
Like
Liked
1:03:09
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Dr. Josh “Bugsy” Segal discusses …
…
continue reading
1
S26 Ep4: Geoff White - From Cartels to Crypto: The digitalisation of money laundering
22:50
22:50
Play later
Play later
Lists
Like
Liked
22:50
Today, Steve is speaking with investigative tech journalist Geoff White, who has been covering tech and financial crime for more than 20 years. Listeners may be familiar with his popular podcast The Lazarus Heist for the BBC World Service, and now his new book, Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadl…
…
continue reading
1
The Security box, podcast 193: a discussion on AI and tools for the disabled
3:34:12
3:34:12
Play later
Play later
Lists
Like
Liked
3:34:12
Hello folks, welcome to the security box, podcast 193. On this program, we're going to talk in an open forum about AI. We'll find some articles, but we aren't going to cover articles in full but in passing. We'll also cover the news, the landscape and more including a demo on the capital one application and virtual cards. Things to ponder Capital O…
…
continue reading
1
CYFIRMA Research- Threat Actors Actively Exploiting CVE-2024-3273: Underground Forums Share IP Addresses of Vulnerable D-Link NAS Devices
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17
Urgent Alert: Hackers are actively exploiting CVE-2024-3273, a critical vulnerability in D-Link NAS devices, with affected device IP addresses being shared on underground forums. With over 90,000 potentially impacted devices globally and inclusion in CISA's Known Exploited Vulnerabilities list, immediate action is crucial to secure data and prevent…
…
continue reading
1
S2 Ep11: BISO or CISO - Which one should you hire?
38:45
38:45
Play later
Play later
Lists
Like
Liked
38:45
The emergence of the Business Information Security Officer (BISO) role shows how far security leadership has evolved. But how different is it really from the CISO role? Recruitment expert Ross Tanner debates the difference between the two, and when an organisation should go hunting for each one with ISF analysts Paul Watts and Mark Ward. If you w…
…
continue reading
1
CYFIRMA Research- Iluria Stealer; a Variant of Another Discord Stealer
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49
The notorious Nikki Stealer group has transitioned into the Iluria Stealer group, maintaining a strong presence with a predominantly Portuguese-speaking user base. Both their websites are hosted by Hostinger, and the current owner, as per his Discord bio, claims to be the former CEO of Nikki Stealer. Dynamic analysis reveals that Iluria Stealer has…
…
continue reading
1
S26 Ep3: Steve Durbin & Juliette Foster - Good Cyber Strategy Begins and Ends with Alignment to Business Priorities
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57
Recently, British journalist Juliette Foster interviewed Steve for a feature in The European, and today we’re listening to that conversation. Steve and Juliette explore a range of topics, including how to get buy-in to your security strategy at all levels of the organization, how much security should cost, navigating the regulatory landscape, and w…
…
continue reading
1
CYFIRMA Research - Synapse Ransomware Technical Analysis
4:41
4:41
Play later
Play later
Lists
Like
Liked
4:41
Meet Synapse ransomware, the newest digital threat on the block. This latest threat, emerging in February 2024, operates under a Ransomware-as-a-Service model, distributing its malicious payload via the dark web. Our research sheds light on the internal working of this malware. Discover how it selectively avoids encrypting Iranian systems, raising …
…
continue reading
1
321 – The Toolkit For Building Survivor Informed Organizations Part 2, with Crystal Bennett
36:44
36:44
Play later
Play later
Lists
Like
Liked
36:44
Crystal Bennett returns to join Dr. Sandie Morgan for part 2 of their conversation about how the Toolkit for Building Survivor Informed Organizations integrates effective strategies and builds assessment measures. Crystal Bennett Crystal Bennett is a seasoned professional serving as the Deputy Director of Diversity, Equity, Inclusion, and Accessibi…
…
continue reading
1
CYFIRMA Research- Tinyproxy (CVE-2023-49606) – Vulnerability Analysis and Exploitation
4:58
4:58
Play later
Play later
Lists
Like
Liked
4:58
Critical Alert: Organizations relying on Tinyproxy must act now! CVE-2023-49606 poses a grave risk of remote code execution. With 1.6M+ servers potentially affected globally; swift action is imperative. Attackers exploit HTTP requests to trigger memory corruption, risking unauthorized access or service disruptions. Update Tinyproxy, monitor for ano…
…
continue reading