Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
1
Dr. Jessica Barker: Cybersecurity has a huge people element to it. [Socio-technical] [Career Notes]
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40
Enjoy this encore episode where we are joined by Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, as she shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was a…
…
continue reading
1
Podcast bait, malware switch. [Research Saturday]
22:44
22:44
Play later
Play later
Lists
Like
Liked
22:44
Joshua Miller from Proofpoint is discussing their work on "Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset." Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before send…
…
continue reading
Our guest today is Astronomer Kat Troche. Kat participates in sidewalk astronomy, setting up her telescope in New York City to make space for everyone. She recently had the opportunity to learn more about astronomy and dark skies in Chile and shared her story with us. You can follow Kat’s outreach program on Instagram. Remember to leave us a 5-star…
…
continue reading
Interpol arrests eight in an international cybercrime crackdown. A MedusaLocker variant targets financial organizations. Cloudflare mitigates a record DDoS attempt. Insights from the Counter Ransomware Initiative summit. Fin7 uses deepnudes as a lure for malware. Researchers discovered critical vulnerabilities in DrayTek routers. CISA issues urgent…
…
continue reading
1
Second cert flight for ULA’s Vulcan Centaur.
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19
United Launch Alliance’s (ULA) Vulcan Centaur successfully lifts off for its second certification launch for the US Space Force. NASA is establishing an entirely new mission class for astrophysics, filling a gap in the Explorers Program between major flagship operations and small-scale missions. Impulse Space has secured $150 million in Series B fu…
…
continue reading
It's October, and that means it’s Cybersecurity Awareness Month. This feels like a good moment to review how to keep our personal and professional worlds secure, because it is not just one department's job, it's really up to each and every one of us to do our bit to keep our important stuff safe from cybercriminals. Remember to leave us a 5-star ra…
…
continue reading
1
Election Propaganda Part 1: How does election propaganda work? [CSO Perspectives]
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. References: David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. Jeff Berman, Renée DiResta, 2023. Disinformat…
…
continue reading
1
The Global Race for the 21st Century [Special Edition]
42:11
42:11
Play later
Play later
Lists
Like
Liked
42:11
In this episode, Dmitri Alperovitch discusses his book World on the Brink: How America Can Beat China in the Race for the Twenty-First Century with host Ben Yelin. Alperovitch highlights the rising tensions between the U.S. and China, focusing on Taiwan as a critical flashpoint that could ignite a new Cold War. He shares insights on the strategies …
…
continue reading
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Palo Alto Networks, hosts cybersecurity experts Qiang Huang, VP of Product Management for Cloud Delivered Security Services, and Michela Menting, Senior Research Director in Digital Security at ABI Research. They discuss the pressing challenges of securing Operationa…
…
continue reading
In this episode, Dmitri Alperovitch discusses his book World on the Brink: How America Can Beat China in the Race for the Twenty-First Century with host Ben Yelin. Alperovitch highlights the rising tensions between the U.S. and China, focusing on Taiwan as a critical flashpoint that could ignite a new Cold War. He shares insights on the strategies …
…
continue reading
T-Minus Producer Alice Carruth participated in the NASA Social Media event ahead of the Crew 9 launch from Florida. She shares her experience with the tour and launch. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a…
…
continue reading
1
Election Propaganda Part 1: How does election propaganda work?
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. References: David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. Jeff Berman, Renée DiResta, 2023. Disinformat…
…
continue reading
1
ULA’s Vulcan Centaur rolled out to the pad.
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57
United Launch Alliance’s Vulcan Centaur rocket rolled out to Space Launch Complex 41 at Cape Canaveral ahead of its scheduled Friday launch. The Deep Space Network (DSN) managed by NASA’s Jet Propulsion Laboratory successfully completed end-to-end test communications with Astrobotic’s Griffin lunar lander. The China Manned Space Agency has shared t…
…
continue reading
A global news agency suffers a cyberattack. CISA and the FBI provide guidance on cross site scripting attacks. A Texas health system diverts patients following a ransomware attack. Western Digital patches a critical vulnerability in network attached storage devices. California passes a law protecting domestic abuse survivors from being tracked. Ver…
…
continue reading
1
non-fungible tokens (NFT) (noun) [Word Notes]
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34
Enjoy this encore of Word Notes. Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.By N2K Networks
…
continue reading
1
The Dark Arts of cyber. [Only Malware in the Building]
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46
Welcome, witches, wizards, and cybersecurity sleuths! You’ve entered, Only Malware in the Building. Join us each month to brew potions of knowledge and crack the curses of today’s most intriguing cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building …
…
continue reading
A critical vulnerability has been discovered in the NVIDIA Container Toolkit. Representatives from around the world are meeting in Washington to address ransomware. The Pentagon shoots down the notion of a separate cyber service. A genetic testing company leaves sensitive information in an unsecured folder. A public accounting firm breach affects 1…
…
continue reading
1
SpaceX’s Falcon 9 under investigation, again.
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23
SpaceX Dragon “Freedom” carrying the two-man Crew 9 team docked to the International Space Station on Sunday. SpaceX’s Falcon 9 is once again grounded pending investigation after it experienced an off-nominal deorbit burn. A new report on NASA’s Management of Risks to Sustaining ISS Operations through 2030 has shared that the leak rate on the orbit…
…
continue reading
1
Funding Friday and Starlink’s fantastic future.
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09
D-Orbit completes their Series C round. Agile Space locks in new funding, too. Starlink subscriptions continue to balloon. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on Linke…
…
continue reading
1
Security remediation automation. [CSO Perspectives]
18:56
18:56
Play later
Play later
Lists
Like
Liked
18:56
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Rick Doten, the VP of Information Security at Centene and one of the original contributors to the N2K CyberWire Hash Table. He makes the case to invigorate the automation first principle cybersecurity strategy. In this case, he is specifically addre…
…
continue reading
1
Steve Blank, national security, and the dilemma of technology disruption. (Part 2 of 2) [Special Edition]
37:21
37:21
Play later
Play later
Lists
Like
Liked
37:21
In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption. Listen to part 1 here. In this series, Steve Blank, a renowned expert in national security innovati…
…
continue reading
1
Jason Clark: Challenge the way things are done. [Strategy] [Career Notes]
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42
Enjoy this encore episode where we are joined by the Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service.…
…
continue reading
1
Beyond the permissions wall. [Research Saturday]
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47
We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the s…
…
continue reading
Our guest today is Jason Roberson, Industry Value Expert, Aerospace & Defense at Dassault Systèmes. You can connect with Jason on LinkedIn and learn more about Dassault Systèmes on their website. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Sp…
…
continue reading
International Law Enforcement Seizes Domains of Russian Crypto Laundering Networks. The real-world risk of a recently revealed Linux vulnerability appears low. Criminal Charges Loom in the Iranian Hack of the Trump Campaign. Meta is fined over a hundred million dollars for storing users’ passwords in plaintext. Delaware’s public libraries grapple w…
…
continue reading