SpiderOak public
[search 0]
More
Download the App!
show episodes
 
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
  continue reading
 
​Cyber​ ​Context​ ​exposes​ ​the​ ​story​ ​behind​ ​the​ ​story​ ​with​ ​information​ ​security​ ​that​ ​increasingly​ ​defines​ ​our​ ​economy.​ ​The​ ​podcast​ ​features​ ​Jonathan​ ​Moore,​ ​chief​ ​technology​ ​officer​ ​of​ ​SpiderOak,​ ​a​ ​leading​ ​voice​ ​in​ ​cyber,​ ​software​ ​design,​ ​and​ ​business.​ ​Co-host​ ​Christian​ ​Whiton​ ​is​ ​a​ ​PR​ ​guy​ ​and​ ​former​ ​diplomat​ ​and​ ​banker.​ ​
  continue reading
 
Loading …
show series
 
Jonathan discusses why enormously complex semiconductor production cannot easily be “nationalized,” but how the industry was never really offshored. What protests in China told us about Chinese citizens’ worries about monitoring and persecution versus censorship. Is iCloud finally going to be secure, and what does that tell us about the encryption …
  continue reading
 
Jonathan argues that there is no cyber war; there's just war. Russia and Ukraine aren’t failing at cyber war, they are just using their capabilities in a way that we did not expect. Why did we make the mistake of assuming their capabilities would resemble ours? Also, how cyber will always be somewhat ungovernable, and how the implications of cyber …
  continue reading
 
Jonathan talks about the Pipedream attack and the implications of hacking industrial control networks. Can VPNs increase vulnerabilities, and how vulnerable are industrial control networks generally? Christian and Jonathan discuss. Christian Whiton (00:09): Welcome to Cyber Context, the podcast featuring Jonathan Moore, the Chief Technology Officer…
  continue reading
 
Jonathan discusses the reported “Pipedream” Russian attack on U.S. natural gas infrastructure and whether it is a significant escalation. How does it compare to the Colonial Pipeline attack and the Stuxnet compromise of an Iranian nuclear facility? How vulnerable are industrial safety controls? Jonathan also discusses the difficulty of distinguishi…
  continue reading
 
Joanthan discusses how Russian cyberwar capabilities are turning out to be different than expected in the Ukraine war, but not nonexistent. Moscow’s reported deployment of wipers indicate that Russia has developed capabilities in a different manner than we have, and that we make a mistake in assuming they would take the same path. Russia may also b…
  continue reading
 
Jonathan discusses how a victim of a North Korean cyber attack shut down that country's internet and whether companies can go on the offensive against cyber threats. He also ponders whether most “hacktivists” are in fact working for governments. Does the disablement of a Mazda via an image file from a HD radio station open up a new attack vector no…
  continue reading
 
Jonathan discusses whether adding more computers and network connection to a car increase vulnerabilities. What are the comparative risks of that data cars receive, from radio packets to video to LiDAR? Furthermore, do we need new regulations on collecting data in public given the amount of information these cars will collect store?…
  continue reading
 
Today’s guest is Sean Henry. Sean runs a digital marketing agency in Austin, TX. He brings a unique perspective on the importance of digital security for your business’s online assets and accounts. Listen in for some great insights and new ideas that you can apply to your online life. You can check out Sean's marketing firm at https://www.fletching…
  continue reading
 
On today’s episode Dave welcomes Professor Hasshi Sudler. Professor Sudler is an adjunct professor at Villinova and an expert in Cybersecurity and Blockchain. Dave and Professor Sudler discuss how Blockchain is being applied in space, why it’s important, rockets exploding, and so much more. Music Credits to Paweł Feszczuk - Sunny Walk Created with …
  continue reading
 
Have we seen the full extent of Russia’s cyber war capabilities, or are they this underwhelming? And will the technology world be torn into two or more camps with so many countries and companies ceasing business with Russia? Jonathan Moore (CTO of SpiderOak) is joined by special guest Matt Erickson (VP Solutions of SpiderOak) to discuss cyber attac…
  continue reading
 
SpiderOak CTO Jonathan Moore discusses the ins and outs of social engineering, and how it can defeat even second-factor authentication in some instances. How secure is 2FA and what are the alternatives? Jonathan also discusses whether crypto is secure, and whether you should be thinking about physicalizing your security problem.…
  continue reading
 
This week Dave discuss cyber risks in space with MIT scientist, Johns Hopkins professor and Author of the book “Confronting Cyber Risk” Gregory Falco. From Governments to the private sector, what is happing when it comes to Cybersecurity in space? What is the future of Cybersecurity in space? Music Credits to Paweł Feszczuk - Sunny Walk Created wit…
  continue reading
 
We may think about cyber warfare very differently than China or Russia. Are we making a mistake conceptualizing it as a space in which we can maneuver, and thinking of exploits as digital bullets? Jonathan argues it may make sense to think of cyber warfare in more tactical terms, and questions whether a true strategic shock like the surprise attack…
  continue reading
 
Steven Bjornaas and Ben Fonner from TriSept Corporation join Dave to discuss Satellite security. What is perceived security vs actual security? The people at Trisept are doing their best to provide an affordable option for startup companies to be able to embrace security easier in the satellite space. What companies are currently doing and how thes…
  continue reading
 
The​ ​Log4j​ ​vulnerability​ ​has​ ​a​ ​theoretical​ ​reach​ ​into​ ​anything​ ​made​ ​with​ ​Java.​ ​Are​ ​there​ ​other​ ​old​ ​but​ ​reliable​ ​tools​ ​in​ ​software​ ​design​ ​that​ ​hold​ ​hidden​ ​risk?​ ​And​ ​will​ ​patches​ ​work​ ​if​ ​they​ ​threaten​ ​software​ ​functionality?​ ​How​ ​the​ ​Log4j​ ​vulnerability​ ​was​ ​identified​ ​and…
  continue reading
 
Should we be worried that the most advanced integrated circuits come from Taiwan, one of the most threatened places in the world? Jonathan outlines photolithography and other techniques that define the world’s most sophisticated chips, and where cyber-attackers would focus their malevolent efforts on hardware. Christian asks whether quantum computi…
  continue reading
 
In our first episode, SpiderOak CEO Dave Pearah talks with SpiderOak CTO Jonathan Moore about New Space and the challenges around security in orbit. We are moving into a new space age, one that's about commercialization and scale. Access to space is getting cheaper by the year. Cadence of launches are increasing. There's going to be more and more c…
  continue reading
 
Today we chat with Shannon Morse. She is a content creator and influencer with a focus on infosec and privacy. We talk about her recommendations, how to factor physical security into your threat model, and lots more. You can learn more and see Shannon's videos on YouTube https://youtube.com/shannonmorse. She's also on Twitter, https://twitter.com/S…
  continue reading
 
Our first episode is here! We're excited to introduce SpiderBytes to the world, and who better to start us off than SpiderOak's fearless leader Dave Pearah. To learn more about Dave on his LinkedIn profile - https://www.linkedin.com/in/pearah/. SpiderBytes is sponsored by SpiderOak. (Funny that we sponsor our own show. Go figure!) We'd love you to …
  continue reading
 
Loading …

Quick Reference Guide