×
Tyler Predale public
[search 0]
×
Best Tyler Predale podcasts we could find (updated December 2019)
Best Tyler Predale podcasts we could find
Updated December 2019
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
The Collective Intelligence Podcast, presented by Flashpoint and hosted by Editorial Director Mike Mimoso, features regular interviews with a diverse set of industry experts and Flashpoint analysts on the latest information security news and industry trends.
 
Loading …
show series
 
Flashpoint's Ian Gray and Max Aliapoulios discuss trends happening inside illicit underground online markets where everything from credit cards and personal information, to drugs and other physical goods, are sold. Ian and Max help characterize these markets, the impact of law enforcement and self-imposed shutdowns on the overall landscape, the ...…
 
Chris Cochran, threat intelligence lead at a media services company, shares his personal and professional journey to a career in information security and intelligence. Cochran, who co-hosts the secdevops.ai podcast, shares his unique career path, one that spans the military, public service, a startup, and now a major enterprise. He's an innovat ...…
 
Longtime Fortune 100 CISO and current managing partner at DelveRisk Anthony Johnson discusses what it takes to drive information security culturally inside the enterprise and smaller organizations. Anthony explains the trends that helped to elevate security to a C-suite and board-level discussion, how employees must be an extension of the secur ...…
 
In this episode of the Collective Intelligence Podcast, recorded during the recent Black Hat conference in Las Vegas, Alexander Klimburg of the The Hague Centre for Strategic Studies discusses how the East—Russia and China specifically—don’t view cyber conflict and cyberwar as a battle for critical infrastructure, as the West might. Instead, re ...…
 
Jeffrey Smith, managing partner of Cyber Risk Underwriters, explains why the adoption of cyber insurance is turning a corner and becoming a constant fixture inside enterprises, smaller companies, and even managed security service providers. Smith discusses how cyber insurance products options are improving, with input from a number of prominent ...…
 
Security researcher Mathy Vanhoef discusses two new vulnerabilities he and colleague Eyal Ronen discovered in the Dragonfly cryptographic handshake in the WPA3 WiFi protocol. The vulnerabilities, nicknamed Dragonblood, are the continuation of research and additional security flaws in the protocol the two disclosed in April. The bugs include sid ...…
 
LAS VEGAS—Akamai Director of Security Strategy Tony Lauro table-sets the annual Black Hat hacker conference with a wide-ranging discussion about some of the threats facing private- and public-sector organizations. Lauro discusses the changing motivations of threat actors, and describes the challenges facing defenders stuck between hackers seeki ...…
 
Eric Lackey of Flashpoint discusses the risk to businesses and the public sector posed by privileged insiders. The insider threat—characterized by a rogue or disgruntled employee, or an accidental disclosure by an employee—requires a mix of technology and understanding of human nature to properly mitigate the risk to the bottom line. Lackey cov ...…
 
Digita Security Chief Research Officer Patrick Wardle discusses a macOS Mojave vulnerability he recently disclosed whereby an attacker can abuse synthetic clicks allowed by the OS to spy on users, access private data, or install additional malicious code. Wardle disclosed the vulnerability during the Objective By The Sea conference in Monte Car ...…
 
Flashpoint Director of Security Research Allison Nixon discusses SIM swap, a lucrative form of fraud that is turning profits for criminals and quickly gaining more attention from the security research community and law enforcement alike. In this podcast, Allison describes the machinations of a SIM swap scheme, starting with the criminals who co ...…
 
Peri Doerfler of the NYU Tandon School of Engineering discusses a recently published paper and research conducted by NYU and Google looking into the efficacy of login challenges in deterring account takeover attacks. The research examined a sample of 1.2 million users and 350,000 hijacking attacks and the success of things like knowledge-based ...…
 
David Maimon, an associate professor and director of the Evidence Based Cybersecurity Research Group at Georgia State University, describes work he and his colleagues did investigating the prevalence and availability of SSL and TLS certificates on the dark web. A paper published by the group explains the results and demonstrates a thriving mark ...…
 
Troy Hunt’s Have I Been Pwned website recently turned 5 years old, and for much of that time it has been the definitive place for computer users to determine their exposure from data breaches. Have I Been Pwned is also a model for usability in security, enabling a free and clearly spelled out answers as to whether account information has been c ...…
 
Bruce Schneier, a cryptography pioneer, and fellow and lecturer at Harvard’s Kennedy Business School, has taken up the cause of public-interest technology and is trying to bring awareness to the current state of affairs, and how not only security professionals but technologists in all fields can make a difference. In this episode of the Collect ...…
 
In this episode of the Collective Intelligence Podcast, Kris Mansson, chief executive officer of technology company Silobreaker, explains how organizations are struggling with unmanageable volumes of security data, and their desire for context around that data in order to make better decisions about threats to their networks, resources, or peop ...…
 
Dr. Avi Rubin, professor of computer science at Johns Hopkins University and technical director of the JHU Information Security Institute, explains the challenges associated with securing IOT devices, and the strides companies such as Harbor Labs, founded by Rubin, are making in analyzing IOT firmware for flaws. Rubin also addresses whether IOT ...…
 
Flashpoint Director of Americas Research and Analysis Ian Gray discusses the proliferation—or lack thereof—of cryptocurrency usage and interest among cybercriminals operating in Latin America. While some criminal elements do cash out or mine cryptocurrency in the region, a lack of legal oversight and technical sophistication makes legitimate pa ...…
 
Verodin CTO Colby DeRodeff talks to Mike Mimoso about his company's new Threat Actor Assurance Program and partnership with Flashpoint. DeRodeff explains the need for threat intelligence to support an examination and evaluation of an enterprise's security controls against advanced and commodity malware and exploits.…
 
Flashpoint Director of Research Chris "Tophs" Elisan discusses the development and business structure behind the GandCrab ransomware. Elisan, along with co-presenters from Microsoft and F5 Networks, discussed GandCrab and other malware and exploits turning a profit for criminal gangs during a talk this week at RSA Conference 2019 in San Francis ...…
 
The Electronic Frontier Foundation has been an advocate for encrypting not only web-based connections between clients and webservers, but for encrypting all internet traffic. Dr. Jeremy Gillula, tech projects director for the EFF, joins Mike Mimoso for a discussion about the technologies and directions required to ensure that encryption of inte ...…
 
Snort creator Marty Roesch is leaving Cisco Feb. 1 for a new adventure, parting ways for the time being with the one of the true success stories in the information security industry. Snort, the ubiquitous open source intrusion detection and prevention system, is a mainstay in many homegrown and commercial security products. It was commercialize ...…
 
Flashpoint Director of Research Vitali Kremez explains the links discovered between malware used to attack Chile interbank network Redbanc and North Korea's Lazarus Group. The state-sponsored attack took place in December and was recently disclosed. The attackers used social engineering to lure a Redbanc employee into installing the malware, wh ...…
 
Flashpoint Director of Security Research Allison Nixon discusses the recent takedown of 15 domains associated with DDoS-for-hire booter and stresser services. The takedown opened an important new legal avenue for law enforcement to take action against these harmful services, which in the past hid behind the notion that they were not responsible ...…
 
Michael Tiffany and Ryan Castellucci of White Ops discuss the recent takedown by law enforcement of the 3ve ad-fraud operation. 3ve was a sophisticated and expansive operation responsible for tens of millions of dollars in losses due to fraudulent ads. Michael and Ryan talk about specifics tactics used by the fraudster, the collaboration requir ...…
 
Flashpoint Director of Research Vitali Kremez discusses the activities, capabilities, and victim targeting associated with the Magecart cybercrime group. Flashpoint and Risk IQ partnered on a research paper called "Inside Magecart" that exposes the inner workings of the seven groups that make up this criminal collective. In this podcast, Vitali ...…
 
Software security expert Gary McGraw discusses the recently released Building Security In Maturity Model report. BSIMM 9 includes contributors from 120 enterprises worldwide, and is used a measurement tool to evaluate software security practices and identify trends in the practice. Gary also comments on the current state of supply chain securit ...…
 
Flashpoint senior malware analyst Ronnie Tokazowski and Editorial Director Mike Mimoso discuss Ronnie being honored with the JD Falk Award for his work in getting the BEC List off the ground. The BEC List is a 530-member working group dedicated to stopping business email compromise attacks; to date, information from this group shared with law e ...…
 
In this episode of the Collective Intelligence Podcast, Harvard fellow and IBM Resilient CTO Bruce Schneier talks about his new book "Click Here to Kill Everybody." The book covers the risks around connecting everything to the internet and why regulation and learning from previous technological revolutions may be the only solution to a worsenin ...…
 
In this episode of the Collective Intelligence podcast, Ken Modeste, the director of cybersecurity and connected technologies at UL, explains how his organization is doing its part to explain these risks and establish cybersecurity standards for connected devices in order to ensure public safety.
 
In this episode of the Collective Intelligence Podcast, Matt Wixey of PwC talks about some research he’s done on what he calls ROSE, or Remote Online Social Engineering. The twist on ROSE is that it’s a long-term social engineering attack, almost a variant of catfishing, with the ultimate goal for an advanced attacker to compromise a targeted n ...…
 
Billy Rios of WhiteScope LLC talks about medical device security, focusing on vulnerabilities in Medtronic implantable cardiac devices. At Black Hat, Rios and Jonathan Butts delivered a talk on vulnerabilities in pacemakers and insulin pumps. They also described how dealing with the manufacturer has been a challenge in remediating these vulnera ...…
 
MacOS security researcher Patrick Wardle talks about some recent MacOS firewall research he did into and discloses some of the architectural issues and resulting limitations present in both the native firewall and commercial products.
 
In this episode of the Collective Intelligence podcast recorded at Black Hat, Chad Seaman, senior engineer on the security intelligence response team at Akamai, explains the importance of collaboration and sharing of threat intelligence, even among companies that compete for the same customers.
 
In this episode of the Collective Intelligence podcast, New York Times senior director of information security Runa Sandvik explains the importance of championing relationships with the Times’ newsroom and how important it is for her team to enable reporters and editors to do their job securely, protecting not only their sources, but in some ca ...…
 
Flashpoint Editorial Director Mike Mimoso talks to Flashpoint Senior Malware Analyst Ronnie Tokazowski about the first-year anniversary of the AlphaBay takedown. AlphaBay was the largest illicit market operating on the Deep & Dark Web (DDW) and it was shuttered on July 20, 2017 by Dutch law enforcement. Ronnie and Mike discuss the days leading ...…
 
Flashpoint Editorial Director Mike Mimoso talks to Director of Intelligence Asia-Pacific Jon Condra about the 2018 mid-year update to the Flashpoint Business Risk Intelligence Decision report. The report is a snapshot of the first six months of the year, covering trends and risk to business related to cybersecurity, the cybercrime criminal unde ...…
 
Flashpoint Editorial Director Mike Mimoso talks to Craig Williams, Director Talos Outreach for Cisco Talos, about the VPNFilter attacks. This state-sponsored attack infected more than 500,000 routers and network-attached storage devices in 54 countries, largely setting the stage for future targeted attacks primarily in Ukraine. The FBI, along w ...…
 
Flashpoint Editorial Director Mike Mimoso talks to director of research Vitali Kremez about the recent leak of the TreasureHunter point-of-sale malware and builder source code, as well as the MaxiDed bulletproof hosting provider takedown. Both events figure to have some impact on cybercrime activity. The TreasureHunter is somewhat unique becaus ...…
 
Flashpoint Editorial Director Mike Mimoso talks to Akamai CSO Andy Ellis about the company's zero-trust implementation, which treats every application, user and device as an external entity. This has been a multiyear process for Akamai, one of the world's largest content distribution networks. Andy and Mike talk about how Akamai moved its secur ...…
 
Live from RSA Conference 2018, Flashpoint Editorial Director Mike Mimoso talks to intelligence analyst Liv Rowley about her presentation on the Spanish-language cybercrime underground. Liv provides her characterization of this segment of the cybercrime dark web with a particular focus on the Cebolla Chan forum. Liv has studied this forum for qu ...…
 
Question: What do you get when you connect a bunch of friends who have worked in or written about security for a long time over a few drinks and fried chicken? Answer: A 62-minute dissection of the RSA Conference, security buzzwords, marketing missteps and lots more that's top-of-mind in the industry. This semi-annual podcast was recorded this ...…
 
Flashpoint Editorial Director Mike Mimoso talks to Eva Galperin of the Electronic Frontier Foundation (EFF) about the high stakes of online privacy, defending human rights, and protecting vulnerable populations against surveillance and censorship.
 
Flashpoint Editorial Director Mike Mimoso talks to security expert, cryptography pioneer and author Bruce Schneier about the security and privacy implications of rampant data collections by organizations. Mike and Bruce also discuss whether market pressure can impose a change on these practices, or if legislation is the inevitable outcome. Bruc ...…
 
Flashpoint Editorial Director Mike Mimoso talks to Flashpoint analyst Paul Burbage about the recent compromise of more than 1,000 Magento ecommerce platform admin panels. Threat actors used brute-force attacks to access sites guarded with default or known credentials. Once they had access, they were loading data-stealing malware and cryptocurre ...…
 
Flashpoint Editorial Director Mike Mimoso talks to director of research Vitali Kremez about the arrest of the leader of the Carbanak cybercrime gang. Carbanak was responsible for more than $1 billion USD in losses and the arrest is a victory for international law enforcement and cross-jurisdictional cooperation between authorities. Mike and Vit ...…
 
Flashpoint Editorial Director Mike Mimoso talks to Chad Seaman and Lisa Beegle of the security intelligence response team at Akamai about the recent and record-setting memcached DDoS attacks. The attacks leveraged memcached servers that were exposed to the internet and topped out at well more than a terabyte of traffic used to take down targets ...…
 
Flashpoint Editorial Director Mike Mimoso talks with Flashpoint senior malware analyst Ronnie Tokazowski about the staggering fraud attributed to business email compromise and what can be done about it. BEC has cost businesses billions of dollars in losses in the last half-decade, according to the FBI, and Ronnie goes into some details about wh ...…
 
Flashpoint Editorial Director Mike Mimoso talks to Mac malware expert and researcher Patrick Wardle about his involvement in investigating two pieces of malware targeting the Mac platform since the start of the year. Wardle, chief research officer at Digita Security, recently published his research into CrossRAT, a cross-platform Java-based imp ...…
 
Flashpoint Editorial Director Mike Mimoso talks to Gary McGraw, vice president of security technology at Synopsys and one of the pioneers of software security. Mike and Gary discuss Synopsys' recent CISO Report, which identifies four approaches to the chief information security officer role in the enterprise. The report provides security execut ...…
 
Google login Twitter login Classic login