show episodes
 
Artwork

1
BlåSkjerm Brødrene

BlåSkjerm Brødrene

Unsubscribe
Unsubscribe
Monthly+
 
Den offisielle podkast siden til de gretne gamle gubbene i "BlåSkjerm Brødrene" (BluesScreen Brothers), sett på scener rundt omkring i verden på diverse IT- konferanser. Brødrene er Olav Tvedt (@OlavTwitt), Alexander Solaat Rødland [@AlexSolaat], Pål-Erik Winther (@PeWinther) og Marius Solbakken (@mariussmellum). Dukker også opp forskjellige gjester av varierende kvalitet ;-) Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Hva er det egentig som skjer i verden, og hvorfor er det sånn? I Utenrikshospitalet forsøker vi å diagnostisere verden én episode av gangen. Podkasten ledes av Ane Teksum Isbrekken, Marie Furhovden eller Therese Leine, og sammen med gode kollegaer ved Norsk utenrikspolitisk institutt (NUPI), setter vi ulike hendelser og temaer under lupen. Har du ris eller ros, eller kanskje tips til tema vi burde se nærmere på? Send oss en epost til post@nupi.no da vel! Vi høres! Hosted on Acast. See acast. ...
  continue reading
 
Loading …
show series
 
Ethical social engineering Even the best pentesters out there can be fooled by a social engineering attempt under the right circumstances. But how do we treat the ones that have been tested and failed? Ragnhild «Bridget» Sageng, Senior Security Advisor at Norwegian Customs, has several years of experience from the IT and cybersecurity industry, and…
  continue reading
 
How will AI impact the next generation of people working with computer science? This question is probably relevant for anyone making their way through school now, in all fields of study. Without looking for a definite answer, but to help him navigate this question, Robby has invited two people with quite different backgrounds: Richard Stiennon, aut…
  continue reading
 
Brødrene Olav og Alexander har fått storfint besøkt av Tony Bardalen som begynner å bli en stuevarm fetter. Hva vil det si når produkter kommer i public- preview uten annonsert pris, er GA virkelig GA og hvilke tre huskeregler er det du bør ta med inn i et Co- pilot prosjekt? Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
How does cybersecurity play a part in ensuring food security? As part of the ISACA series of the mnemonic security podcast, we’re welcoming Karianne Kjønås, Cyber & Privacy Associate at PwC Norway. Karianne recently won the ISACA master’s thesis award with her thesis on how cybersecurity incidents can affect Norwegian food production. During her co…
  continue reading
 
Conflictual coexistence Today’s guest, Raymond Andrè Hagen, holds over 20 years of experience in cybersecurity and information security, and is currently researching advanced persistent threats for his PhD in Computer and Information Systems Security. He also has experience as a Security Specialist at the Norwegian Digitalization Agency (Digdir), i…
  continue reading
 
To join Robby for this episode on Russian cybercrime and ransomware, we’re welcoming Sam Flockhart, Cyber Threat Intelligence Manager at Santander UK. Sam has a background in military intelligence from the British army, where he has spent a large part of his career looking at Russian influence in Eastern Europe. Including experience from the Britis…
  continue reading
 
Metaverses Have you been to the metaverse yet? And are you among the 78% that believe the metaverse will provide a significant value to their organisation in the future? To join Robby for this episode, we’re welcoming Julia Hermann, Senior Technology and Innovation Manager at Giesecke+Devrient, where she works on identifying opportunities in the me…
  continue reading
 
Defending EVE Online How does combatting botting, hacking, and fraud in a virtual game relate to fighting real cybercrime? To share his take on this, Maksym Gryshchenko joins us to share how he works as a Security analyst at CCP Games, a leading game developer based in Iceland, and the developers behind the sci-fi role-playing game EVE Online. EVE …
  continue reading
 
"Vi lever i et tidsskille", sa Tysklands forbundskansler Olaf Scholz da han annonserte at Tyskland skulle ruste opp sitt forsvar med 100 milliarder euro. Også andre land i Europa har fullstendig endret sin sikkerhetspolitikk i kjølvannet av Russlands storskala krig mot Ukraina. Hvordan går det med opprustningen? Hva har dette å si for Norge? Og hvo…
  continue reading
 
Last year, threat researchers all over the world got a sneak peek into the inner workings of the Russian defence contractor NTC Vulkan. The Vulkan files leak provided an interesting behind the scenes look at Russian cyber capabilities and scalability, and the ways state sponsored organisation work. Joe Slowik, managing threat intelligence at the cy…
  continue reading
 
Alle 4 brødrene er samlet i siste episode av Klientmåned spesial. Alexander lurer på om Wifi på kontoret er en nødvendighet med dagens 5G tilbud. Marius og Olav sitter stor pris på den automatiske ryggvarme funksjonen på Windows PCer. Mens Pål-Erik skryter uhemmet av sin nye mobil telefon Nokia 6310, men han hadde gladelig byttet den i snus. Hosted…
  continue reading
 
Cryptology is fundamental for the way the internet works today. But what exactly is modern cryptology, and what are the most common areas in which it’s being used? To guide us through this complex area, Robby’s joined by Bor de Kock, PhD. in Cryptology and Assistant Professor at NTNU. They talk about some of the main challenges to cryptology these …
  continue reading
 
Å få brødrene til å dekke et så hyper aktuelt tema som historie er sjeldent et problem, men hvor langt bakover kan de gå når en av dinosaur brødrene er bort? Selv med Pål-Erik savnet (er han på en arkeologis utgraving for å finne den første printeren), klarer Olav og gå tilbake i både PC, OS og mus sin spede begynnelse. Marius kjemper for livets re…
  continue reading
 
Physical penetration testing | ISACA series For this episode that is part of our ISACA series, we’re joined by Rob Shapland, Ethical Hacker/Head of Cyber Innovation at Falanx Cyber. Rob talks about what he’s learned from his 15 years of testing physical and cyber security for his clients, including more than 200 building intrusions assignments. He …
  continue reading
 
Denne gangen ser brødrene Alexander, Marius og Olav på den nåværende statusen på klienter. Vi starter med Windows 11 og jobber oss både oppover og nedover, samt litt til siden over på andre operativsystemer. Vi deler litt rundt favoritt funksjoner som kommer i 23H2, og ting som ikke kommer ennå (Autopilot for EU land) Hosted on Acast. See acast.com…
  continue reading
 
Artificial intelligence (AI) and machine learning (ML) models have already become incorporated into many facets of our lives. In this episode, we discuss what happens if these models are attacked. How can the models that AI and ML are built upon be attacked? And how can we defend them? Eoin Wickens, Senior Adversarial ML Researcher at HiddenLayer, …
  continue reading
 
What do you really know about your vendors? And about your vendors' vendors? To talk about supply chain attacks, and how to best mitigate and meet these risks, Robby is joined by a pair with a lot of experience on this topic: Roger Ison-Haug, CISO of StormGeo, and Martin Kofoed, CEO of Improsec. Martin and Roger discuss what a supply chain attack l…
  continue reading
 
Kunstig intelligens er helt klart ikke i bruk på denne episoden, noen vil vel kanskje påstå at ingen form for intelligens er i bruk når Alexander, Marius, Pål og Olav ser på Microsoft Co pilot og andre KI-produkter. Hva er det, hvordan brukes det og er det egentlig verdt pengene? Ble Pål shaken eller stirred? Er Alexander sin dialekt Siri ready? Sk…
  continue reading
 
How to succeed with bug bounties Responsible disclosure and vulnerability reporting have come a long way in recent years, and have gone from being feared and even something you took legal action against, to something that is appreciated for its value. Ioana Piroska, Bug Bounty Program Manager at Visma, joins Robby to share how Visma has succeeded w…
  continue reading
 
Influencing the board What are some of the most effective methods of gaining a board’s support, and how do you maintain this trust and improve it over time? Our guest today has worked with a lot of boards, and joins us to share his experiences providing boards with the tools to ask the right questions when it comes to cybersecurity, and conveying t…
  continue reading
 
KraftCERT trusselvurdering 2023 | In Norwegian only Our podcast guest this week is Espen Endal, previous mnemonic colleague and currently OT Security Analyst at the Norwegian energy sector CERT: KraftCERT/InfraCERT. InfraCERT is an ISAC (Information Sharing and Analysis Center) and an IRT (Incident Response Team). Mainly working to update their mem…
  continue reading
 
Kunstig intelligens, søk, indeksering, skygge it og mye annet kan være med på at bedriftens data kommer på avveie. Har du en strategi på dette? Pål-Erik, Marius og Olav tenker på hvordan ting har endret seg, kanskje uten at strategien og kompentanse har fulgt helt med? Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
Avoiding overload and managing stress in cybersecurity For today’s episode, Robby’s joined by Lisa Ventura, Cybersecurity Specialist, Author, and qualified Mental Health First Aider. After many years of experience from the industry, she’s become particularly interested in the human aspects of cybersecurity, especially when it comes to mental health…
  continue reading
 
Møt Claudia Aanonsen, doktorgradsstipendiat ved NUPI, som for første gang skal delta på en internasjonal forskerkonferanse. Hun gruer seg, og er engstelig for å dumme seg ut blant sine fagfeller. Klarer hun å bestå ildprøven? Andre NUPI-forskere som deltar i episoden er: Pernille Rieker, Anna Rio, Niels Nagelhus Schia, Karsten Friis, Line Marie Bre…
  continue reading
 
Asset Intelligence Imagine a scenario where your organisation discovers that a threat actor currently possesses more knowledge about your environments than you do. Let’s find a way to make sure we don’t end up there - but how? For this episode, Robby is joined by a serial entrepreneur and serial guest at the mnemonic security podcast. For the fourt…
  continue reading
 
Operationalising Threat Intelligence What can you do to get the most out of your threat intelligence initiatives? A good place to start, is picking Kyle Wilhoit’s brain. Kyle’s the Director of Threat Research at Palo Alto Network's Unit 42, and author of the book Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber…
  continue reading
 
Crypto Finance How does a crypto finance agency work with security? To answer this question, and provide insight into security in the world of crypto, we’re joined by Dr. Dominik Raub. He has more than 10 years of experience from the financial industry, a Doctor of Sciences in Cryptography, and works as CISO at Crypto Finance AG, an organisation pr…
  continue reading
 
Office IoT Can you say for certain that you have a full overview of the IoT devices that are set up in your office environment? Smart Lighting, thermostats, locks, appliances, security cameras, sensors... perhaps even a fish tank? To talk about the importance of securing our office IoT, and specifically our printers, Robby is joined by Quentyn Tayl…
  continue reading
 
Passwords and their managers How do you create your passwords? Do you get help from a password manager, or is your personal “system” bulletproof? Robby has invited two guests passionate about passwords, and how we manage them. Not surprisingly, they can with confidence say that our own “systems” are highly guessable, and not as unique as you might …
  continue reading
 
Darkwebs Most of us have our ideas and perceptions of what the Dark Web is. But could it be more than just the dark side of the World Wide Web? To talk about the Dark Web, Robby is joined by Keven Hendricks, Dark Web Subject Matter Expert at The Ubivis Project. Keven has worked in law enforcement in the US since 2007, in areas such as computer and …
  continue reading
 
Hva skjer når de 2 eldste brødrene kommer i snakk? Og spesielt når det viser seg at de begge er Microsoft Certified Professional på Exchange 5.x Jo, episoden som omhandler exit strategier blir rimelig fokusert på Exchange hybrid løsningen. Men Pål og Olav koser seg de, håper dere gjør det også. Hosted on Acast. See acast.com/privacy for more inform…
  continue reading
 
The importance of identity within our field has been established. According to analysis from CrowdStrike, 8/10 attacks are identity-based. But what does that actually mean? How do we even define identity these days, and how has it changed? To look into this, Robby has invited an expert within the field, Peter Barta. Peter works as a Senior Cloud Se…
  continue reading
 
Bots; they can be both helpful assistants and harmful pests, and you’ll find them all over the internet targeting most public facing applications in some way or another. But what actually are they? To explore the bad bots on the Internet, Robby is joined by someone that has spent the last seven years studying them, Dan Woods, Global Head of Intelli…
  continue reading
 
This episode is for anyone working within cybersecurity that has ever had to explain what they actually do, or defend why they are investing in security. We’re happy to welcome Jeff Barto back to the podcast, to go through his presentation “We are Defending” that he presented at mnemonic’s C2 summit this summer. Jeff is the CISO of a large hedge fo…
  continue reading
 
House of Pain: new EU cyber regulations NIS2, DORA, the Cyber Resilience and Artificial Intelligence acts; have you started to familiarise yourself with the new EU cyber regulations that are coming into force? In this episode, Robby welcomes Rolf von Roessing, former Vice Chair of ISACA Global, and CEO of FORFA Consulting, a German company speciali…
  continue reading
 
Marius og Olav har fått med seg Petter Arnesen for å få litt innsikt hva Azure Arc er og hva det brukes til. Er det mulig å få Azure funksjoner i ditt egent datasenter, kan du få felles management på tvers av forskjellige leverandører? Dette og mye mer kan det hende vi får svar på Du finner masse mer info på Petter sin Youtube kanal som du finner h…
  continue reading
 
Visste du at det første skuddet i Russlands storoffensiv mot Ukraina var digitale koder? I denne episoden av Utenrikshospitalet får du høre om den digitale skuddvekslingen – om koder, og ikke kuler. Det er ett år siden kolonner med russiske tanks rullet inn over Ukraina og sendte sjokkbølger over hele verden. Men hvordan ser krigen ut i cyberspace?…
  continue reading
 
What happens when cyber criminals don’t get what they believe they're owed? For this episode, Robby is joined by John Fokker, Head of Trellix Threat Intelligence. John shares from his long experience fighting cybercrime, where he among other places has worked for the Dutch National High-Tech Crime Unit (NHTCU), the Dutch National Police unit dedica…
  continue reading
 
Alexander og Olav får besøk av Jan Ketil fra Cloudway på en oppsummering etter Cloud Technology Townhall Tallinn. Vi kommer inn på ting rundt community konferanser, med tips rundt både deltagere og hvordan skaffe seg nett for å kunne bli foredrags holdere Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
Network detection and response (NDR): the value of evidence What exactly is NDR, how have these technologies changed over the years, and are they more relevant now than ever? To help answer these questions, Robby is joined by Jean Schaffer. She’s had, to say the least, an interesting career with more than 33 years of experience from the US Departme…
  continue reading
 
På slutten av fjoråret la et skip som er like langt som tre fotballbaner til kai nedenfor Akershus festning. Symbolverdien i at det største hangarskipet som noensinne er bygget for Storbritannia nettopp besøkte Norge, skal man ikke kimse av. Men hva er egentlig Storbritannias rolle i europeisk forsvars- og sikkerhetspolitikk nå som Russland har gåt…
  continue reading
 
Loading …

Quick Reference Guide