Ryan Williams Sr public
[search 0]
Download the App!
show episodes
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Loading …
show series
 
In this episode, Ryan Williams Sr. interviews Shauna Weatherly from FedSubK, a website that provides resources and guidance for small businesses navigating the federal procurement process. Shauna shares her background in federal procurement and her motivation for starting FedSubK. They discuss the challenges and complexities of government procureme…
  continue reading
 
The hosts discuss the use of facial recognition technology in stadiums to expedite entry and enhance the fan experience. They explore the potential privacy concerns and the balance between security and personal liberties. The conversation touches on the accuracy of facial recognition technology, the value of personal data, and the future of consume…
  continue reading
 
The conversation discusses a cybersecurity lawsuit filed against the Georgia Institute of Technology and Georgia Tech Research Corporation for alleged cybersecurity violations. The university was accused of submitting false results and not implementing the required system security plan for their networks. The discussion highlights the importance of…
  continue reading
 
In this episode, Ryan, Shannon, and Chris discuss their week and various topics, including their children's first week of school, video games they're playing, and TV shows they're watching. They also talk about the upcoming House of the Dragon series and their hopes for our favorite football teams. The conversation covers a range of themes, includi…
  continue reading
 
The FAA proposes new cybersecurity rules for airplanes to protect against intentional unauthorized electronic interactions that could create safety hazards. This is long overdue, as airplanes and other forms of mass transit have the potential to be used as weapons. The airline industry needs to take cybersecurity more seriously, especially with the…
  continue reading
 
The discussion revolves around the proposed CMMC 2.0 rule by the US Department of Defense (DoD) to enhance cybersecurity in the defense industrial base. The rule aims to improve contractor implementation of cybersecurity requirements and tighten regulations. The hosts express the need for stricter measures, especially for large companies with gover…
  continue reading
 
The podcast episode discusses the need for stronger encryption standards to protect against the threat of quantum computers. The Department of Defense and NIST are working on developing new encryption standards to safeguard sensitive information. IBM is leading the way in developing quantum-resistant encryption algorithms. The current administratio…
  continue reading
 
In this episode, the hosts discuss a data breach in which 2.9 billion records, including social security numbers, were stolen. They emphasize the importance of taking precautions to protect personal information, such as using multi-factor authentication, updating passwords, and being cautious with email and social media accounts. The hosts also sha…
  continue reading
 
In this episode, the hosts discuss their opinions on the Deadpool and Wolverine movies [SPOILER FREE]. They share their thoughts on the humor, action sequences, and overall storylines. The conversation also touches on the success of the Deadpool franchise and its impact on the R-rated movie genre. The hosts have differing opinions on certain aspect…
  continue reading
 
In this episode, the hosts discuss an article about a cybersecurity researcher who befriended and then exposed the leader of a ransomware gang. They explore whether this approach could be a future strategy for dealing with ransomware gangs. They also discuss the risks and implications of such actions, as well as the difference between cybersecurity…
  continue reading
 
The conversation discusses the constant cyber attacks on the healthcare sector and the need to boost healthcare cybersecurity. The healthcare sector is a soft target and is frequently targeted by ransomware attacks, putting lives at risk. The article highlights the importance of protecting hospitals and the healthcare sector as they are critical en…
  continue reading
 
The conversation discusses a vulnerability known as the '0.0.0.0 day' that has been present for 18 years and allows attackers to bypass browser security. The hosts express concern that this vulnerability is still widely used and that it could lead to unauthorized access and remote code execution on local services. They debate whether a complete reb…
  continue reading
 
In this episode, the hosts discuss their week, including watching YouTube videos, the Olympics, and TV shows. They also talk about their media consumption, such as movies and manga. The conversation then shifts to Marvel movies and their disappointment with recent releases. They also mention their beach trips and vacations, including a stay at a Sa…
  continue reading
 
In this episode, the hosts discuss a news article about a Fortune 50 company that paid a record-breaking $75 million ransom to the Dark Angels ransomware gang. They express frustration with the current state of cybersecurity hiring and the need to attract talented individuals to the field. The hosts also highlight the importance of building securit…
  continue reading
 
In this episode, the hosts discuss the article titled 'Digicert to Delay Cert Revocation for Critical Infrastructure'. They talk about the challenges faced by companies in reissuing certificates within a short timeframe and the need for more time to ensure a seamless transition. They emphasize the importance of having a robust business continuity a…
  continue reading
 
The conversation discusses a vulnerability in VMware ESXi hypervisors that grants full admin privileges to threat actors. The vulnerability has been exploited by ransomware groups to deploy ransomware after gaining access to a network. The hosts emphasize the importance of patching systems and working with security teams or MSP/MSSPs to address the…
  continue reading
 
In this episode, Shannon, Chris, and Daniel discuss their week and share their thoughts on movies, TV shows, and the Olympics. They talk about the extreme heat in Japan and other parts of the world, their media consumption, and their excitement for the upcoming Deadpool vs. Wolverine movie. They also mention their love for anime and manga, with a f…
  continue reading
 
In this episode, Shannon and Chris discuss the recent article about CrowdStrike's cybersecurity insurance losses and the warning from Warren Buffett. They explore the challenges of cybersecurity insurance, including the difficulty of obtaining coverage and the potential for disputes over potential losses. They also highlight the need for organizati…
  continue reading
 
In this episode, Shannon, Chris, and Daniel discuss a cyber attack carried out by Russia on Ukraine, where they used malware to sabotage the heating utility of 600 buildings in the middle of winter. This affected 100,000 people and was a deliberate attempt to break the will of the Ukrainian people. The hosts highlight the evolving nature of warfare…
  continue reading
 
In this episode, Shannon, Chris, and Daniel discuss an article about a North Korean fake IT worker who duped, KnowBe4, a security firm. The person used AI and facial recognition to pretend to be someone else and successfully got hired as a software engineer. The hosts discuss the sophistication of the attack and the importance of verification measu…
  continue reading
 
In this conversation, Ryan Williams Sr. interviews Professor Roger Whyte, a cybersecurity solutions architect and founder of Professor Roger Cyber Lounge. They discuss Professor Roger's mission to increase diversity in cybersecurity, particularly among African Americans. Professor Roger shares his experience as a mentor and coach, helping individua…
  continue reading
 
In this episode, the hosts discuss the recent news that Microsoft laid off its diversity, equity, and inclusion (DEI) lead. They express their disappointment and concern about the future of DEI initiatives in companies. They highlight the importance of representation and diversity in the workplace and question why a trillion-dollar company like Mic…
  continue reading
 
Kaspersky is shutting down its business in the United States after being sanctioned by the U.S. Treasury Department. The Department of Industry and Security also banned the company from selling software and delivering antivirus updates. This move is part of a trend where the U.S. is cutting ties with foreign companies due to concerns about data sec…
  continue reading
 
In this episode, the hosts discuss the recent CrowdStrike EDR update that crashed Windows systems worldwide. They highlight the impact of the update on various industries, including airlines and healthcare. The hosts also discuss the potential long-term consequences for CrowdStrike and Microsoft, as well as the need for better testing and quality c…
  continue reading
 
In this episode, Ryan Williams and Elizabeth Stephens discuss the recent IT outage caused by a bad patch from CrowdStrike that impacted Microsoft systems. They emphasize the importance of investing in people, processes, and tools to prevent such incidents and highlight the need for digital resilience. They also address the role of AI in cybersecuri…
  continue reading
 
In this episode, the hosts discuss their recent activities and media consumption. They mention watching documentaries, TV shows, and movies, as well as their experiences with family activities like bowling. They also talk about exploring different cuisines and cooking healthier meals. Additionally, they mention their interest in Japanese culture an…
  continue reading
 
In this conversation, Ryan Williams Sr. interviews Miguel Clarke, a retired Supervisory Special Agent from the FBI, now a Cybersecurity and GRC Evangelist, at Armor Defense. Miguel shares his background in law enforcement and his transition into cybersecurity. He discusses the early days of cyber investigations and the collaboration between differe…
  continue reading
 
The podcast discusses a recent article about a Russian troll farm that uses AI-enhanced software to spread disinformation. The hosts highlight the importance of verifying information and diversifying news sources to combat the spread of fake news. They also discuss the need for social media platforms to implement better troll detection and verifica…
  continue reading
 
The conversation discusses a recent article about a new attack on a 30-year-old protocol called RADIUS. The protocol is widely used in networks for client-server interactions, including VPN access, DSL and fiber connections, and 5G authentication. The attack, called Blast Radius, exploits vulnerabilities in the MD5 hash used in the protocol. The at…
  continue reading
 
AT&T experiences another major data breach, exposing call and text records of millions of customers, including non-AT&T users. The breach highlights the vulnerability of personal information and the potential for location tracking and targeted attacks. Snowflake, a third-party platform, was involved in the breach, but investigations suggest user er…
  continue reading
 
In this conversation, Ryan and Shannon discuss various topics, including cybersecurity news, movies, and TV series. They mention OpenAI being victims of espionage, the impact of password compilations, and the role of CISOs. They also talk about the movies they watched, such as 'The Beekeeper' and 'Clipped,' and the TV series 'Barbershop.' They shar…
  continue reading
 
The conversation discusses the increasing scrutiny of CISOs by the government after a major breach. It highlights the challenges faced by CISOs, including being the fall guy for breaches and lacking decision-making power in the C-suite. The importance of communication, collaboration, and documentation is emphasized as a way for CISOs to protect the…
  continue reading
 
In this episode, Ryan and Shannon discuss a recent security alert about a hacker who uploaded 10 billion passwords to a crime forum. They explain the concept of credential stuffing and the risks of using the same password for multiple accounts. They emphasize the importance of enabling multi-factor authentication and suggest that biometrics may be …
  continue reading
 
OpenAI's internal AI details were stolen in a 2023 breach, but the company did not disclose it until now. The hacker gained access to the internal messaging systems and stole details about the design of OpenAI's artificial intelligence technologies. Although the actual technologies were not compromised, the breach raises concerns about the lack of …
  continue reading
 
In this episode, the hosts discuss their week and what they've been watching. Shannon talks about his week and shares his thoughts on the TV show 'My Adventures with Superman' and the Netflix movie 'A Family Affair'. Chris talks about watching local news and streaming anime on Crunchyroll. Daniel shares his experience with stomach problems and his …
  continue reading
 
In this episode, Ryan and Shannon discuss a recent article about a massive HTTP DDoS attack that reached a record high of 71 million requests per second. They highlight the increasing sophistication and frequency of DDoS attacks, as well as the potential life-threatening effects of such attacks in the future. They also discuss the role of IoT devic…
  continue reading
 
The conversation revolves around the lack of comprehensive privacy legislation in the United States and the need for stronger data protection measures. The discussion highlights the failure of the American Privacy Rights Act and the removal of civil rights protections from the bill. The hosts express frustration with the slow progress in implementi…
  continue reading
 
The conversation discusses a recent cybersecurity attack on Evolve Bank, which was initially mistaken for an attack on the Federal Reserve. The hackers, known as Lockbit, threatened to release sensitive information unless a ransom was paid. However, it was later revealed that the Federal Reserve was not hacked, and it was actually Evolve Bank that …
  continue reading
 
The conversation discusses the article titled 'TikTok confirms it offered US government a kill switch' from BBC.com. The hosts express concerns about data sharing and the potential infiltration of Chinese companies. They question the effectiveness of a kill switch in protecting user data and highlight the need for transparency and regulation in soc…
  continue reading
 
In this episode, Ryan, Shannon, and Chris discuss their week and share their experiences. They talk about family time, vacations, and their favorite TV shows and games. They also mention their podcast content and ask for feedback. The conversation touches on topics like cybersecurity, movies, and pop culture. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Th…
  continue reading
 
Rebekah Skeete, COO of BlackGirlsHack, discusses the organization's mission and initiatives in the cybersecurity field. The organization was founded by Tennisha Martin to provide support and resources for black women interested in cybersecurity. BlackGirlsHack offers a monthly book club, weekly trainings, and cohorts for technical skill development…
  continue reading
 
The conversation discusses the use of AI in art and the impact it has on artists. Artists are using anti-AI poison to create images that confuse and disrupt AI-generated art. While AI makes it easier for people to create art, it also threatens the livelihood of artists. The use of poisoning tools like Glaze and Nightshade can prevent AI from genera…
  continue reading
 
The city of Cleveland refuses to pay a ransom demand by cyber attackers, which is a positive sign. The team speculates that the city of Cleveland likely have good cyber hygiene and a recovery plan in place. It's important to not pay ransom demands as it encourages more attacks. Cleveland's segmentation of networks and adherence to best practices is…
  continue reading
 
A software company called CDK was hacked, causing 15,000 car dealerships across North America to be crippled. The dealerships relied on CDK's software for various operations, including car sales and maintenance. Some dealerships had to resort to pen and paper, while others were unable to perform any tasks. The attack had a significant impact on the…
  continue reading
 
In this episode, Ryan and Daniel discuss Daniel's experiences in Japan. Daniel talks about house hunting and the unique architecture of houses in Japan, exploring the city of Yokosuka and the abundance of food options. Daniel shares his arcade and lounge experiences in Tokyo, highlighting the social aspect of arcades in Japan. They also mention TV …
  continue reading
 
In this lost episode from December 4, 2022, Ryan and Shannon how hackers are using the trending TikTok invisible challenge to spread malware. Threat actors are tricking users into downloading malware by capitalizing on the invisible challenge, where users apply a filter that leaves behind a silhouette of their body. The malware is hidden inside Pyt…
  continue reading
 
Microsoft and Google are offering cyber help to rural hospitals in an initiative by the Biden administration. The hospitals, which are critical for surrounding areas, often lack proper cybersecurity measures and are vulnerable to cyber-attacks. Microsoft is offering discounts on security products and free licenses to upgrade their systems, while Go…
  continue reading
 
The conversation discusses the trend of regulated industries adopting military-grade cyber defenses and the importance of information sharing and collaboration in the cybersecurity field. It emphasizes the need for a collective approach to cybersecurity and the adoption of strategies like zero trust. The conversation also highlights the significanc…
  continue reading
 
In this episode, Ryan and Daniel discuss the recent Microsoft cybersecurity hearing and the implications for the company's relationship with the government. They highlight the importance of Microsoft's role in the federal sector and the need for improved security practices. The breach attributed to China and the loss of encryption keys are discusse…
  continue reading
 
In this episode, Ryan, Shannon, and Daniel discuss their recent activities and interests. They talk about their media consumption, including TV shows, movies, and comedy specials. They also share updates on their personal lives, such as graduations and college orientations. Ryan mentions his plans for the podcast and upcoming appearances, while Sha…
  continue reading
 
Loading …

Quick Reference Guide