Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
Cyber Context exposes the story behind the story with information security that increasingly defines our economy. The podcast features Jonathan Moore, chief technology officer of SpiderOak, a leading voice in cyber, software design, and business. Co-host Christian Whiton is a PR guy and former diplomat and banker.
…
continue reading
Cybersecurity in space! Join us as we talk about protecting assets in space, hardening existing assets, and models for the new space ecosystem. Hosted by Dave Pearah, CEO of SpiderOak and SpiderOak Mission Systems.
…
continue reading
1
The most complex thing humans have produced
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01
Jonathan discusses why enormously complex semiconductor production cannot easily be “nationalized,” but how the industry was never really offshored. What protests in China told us about Chinese citizens’ worries about monitoring and persecution versus censorship. Is iCloud finally going to be secure, and what does that tell us about the encryption …
…
continue reading
1
Automation and Risks - The New Space Race
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53
Jonathan discusses the major evolution to commercial space, the drastic decrease in cost to reach orbit, and how to ensure security as companies scale up with automation to manage proliferated low-Earth orbit.By SpiderOak
…
continue reading
1
New cyber lessons from the war in Ukraine
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26
Jonathan argues that there is no cyber war; there's just war. Russia and Ukraine aren’t failing at cyber war, they are just using their capabilities in a way that we did not expect. Why did we make the mistake of assuming their capabilities would resemble ours? Also, how cyber will always be somewhat ungovernable, and how the implications of cyber …
…
continue reading
1
From Morse code to an iPhone in the span of a single career
39:33
39:33
Play later
Play later
Lists
Like
Liked
39:33
On today’s episode Vice Chair of the National Cybersecurity Research and Development Center, Sam Visnor, joins Dave Pearah to discuss Zero Trust infrastructure in our space networks. What needs to happen to make space secure?By SpiderOak
…
continue reading
1
Pipedream: Hacking Industrial Control Networks
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54
Jonathan talks about the Pipedream attack and the implications of hacking industrial control networks. Can VPNs increase vulnerabilities, and how vulnerable are industrial control networks generally? Christian and Jonathan discuss. Christian Whiton (00:09): Welcome to Cyber Context, the podcast featuring Jonathan Moore, the Chief Technology Officer…
…
continue reading
1
Russia and hacking industrial control networks
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54
Jonathan discusses the reported “Pipedream” Russian attack on U.S. natural gas infrastructure and whether it is a significant escalation. How does it compare to the Colonial Pipeline attack and the Stuxnet compromise of an Iranian nuclear facility? How vulnerable are industrial safety controls? Jonathan also discusses the difficulty of distinguishi…
…
continue reading
1
Russian hacking is different in Ukraine war, not absent
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
Joanthan discusses how Russian cyberwar capabilities are turning out to be different than expected in the Ukraine war, but not nonexistent. Moscow’s reported deployment of wipers indicate that Russia has developed capabilities in a different manner than we have, and that we make a mistake in assuming they would take the same path. Russia may also b…
…
continue reading
1
Hacking North Korea, Mazda, and stealth satellites
39:44
39:44
Play later
Play later
Lists
Like
Liked
39:44
Jonathan discusses how a victim of a North Korean cyber attack shut down that country's internet and whether companies can go on the offensive against cyber threats. He also ponders whether most “hacktivists” are in fact working for governments. Does the disablement of a Mazda via an image file from a HD radio station open up a new attack vector no…
…
continue reading
Today’s guest is Gabriela Voicu. She is a software engineer who comes to software through an interesting path. She went to a code camp and then transitioned to a full time coding job. She’s got lot’s of unique perspectives to provide us with, as well as a great story. Enjoy!By SpiderOak
…
continue reading
1
How secure are Teslas and other semi-autonomous cars?
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47
Jonathan discusses whether adding more computers and network connection to a car increase vulnerabilities. What are the comparative risks of that data cars receive, from radio packets to video to LiDAR? Furthermore, do we need new regulations on collecting data in public given the amount of information these cars will collect store?…
…
continue reading
Today’s guest is Sean Henry. Sean runs a digital marketing agency in Austin, TX. He brings a unique perspective on the importance of digital security for your business’s online assets and accounts. Listen in for some great insights and new ideas that you can apply to your online life. You can check out Sean's marketing firm at https://www.fletching…
…
continue reading
On today’s episode Dave welcomes Professor Hasshi Sudler. Professor Sudler is an adjunct professor at Villinova and an expert in Cybersecurity and Blockchain. Dave and Professor Sudler discuss how Blockchain is being applied in space, why it’s important, rockets exploding, and so much more. Music Credits to Paweł Feszczuk - Sunny Walk Created with …
…
continue reading
1
Russia-Ukraine, cyber war, new global tech divide
50:17
50:17
Play later
Play later
Lists
Like
Liked
50:17
Have we seen the full extent of Russia’s cyber war capabilities, or are they this underwhelming? And will the technology world be torn into two or more camps with so many countries and companies ceasing business with Russia? Jonathan Moore (CTO of SpiderOak) is joined by special guest Matt Erickson (VP Solutions of SpiderOak) to discuss cyber attac…
…
continue reading
1
Socially engineering your crypto stash, etc.
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13
SpiderOak CTO Jonathan Moore discusses the ins and outs of social engineering, and how it can defeat even second-factor authentication in some instances. How secure is 2FA and what are the alternatives? Jonathan also discusses whether crypto is secure, and whether you should be thinking about physicalizing your security problem.…
…
continue reading
1
The Good, the Bad - CyberSecurity in Space
21:38
21:38
Play later
Play later
Lists
Like
Liked
21:38
This week Dave discuss cyber risks in space with MIT scientist, Johns Hopkins professor and Author of the book “Confronting Cyber Risk” Gregory Falco. From Governments to the private sector, what is happing when it comes to Cybersecurity in space? What is the future of Cybersecurity in space? Music Credits to Paweł Feszczuk - Sunny Walk Created wit…
…
continue reading
We may think about cyber warfare very differently than China or Russia. Are we making a mistake conceptualizing it as a space in which we can maneuver, and thinking of exploits as digital bullets? Jonathan argues it may make sense to think of cyber warfare in more tactical terms, and questions whether a true strategic shock like the surprise attack…
…
continue reading
Steven Bjornaas and Ben Fonner from TriSept Corporation join Dave to discuss Satellite security. What is perceived security vs actual security? The people at Trisept are doing their best to provide an affordable option for startup companies to be able to embrace security easier in the satellite space. What companies are currently doing and how thes…
…
continue reading
The Log4j vulnerability has a theoretical reach into anything made with Java. Are there other old but reliable tools in software design that hold hidden risk? And will patches work if they threaten software functionality? How the Log4j vulnerability was identified and…
…
continue reading
Today’s guest is Michael Filipsen. Michael is an expert in cloud migration and helping enterprises move services to public clouds. He’s also a privacy advocate and judo practitioner. Listen in for some great thoughts on how privacy and social media intersect with families and society in general.By SpiderOak
…
continue reading
Should we be worried that the most advanced integrated circuits come from Taiwan, one of the most threatened places in the world? Jonathan outlines photolithography and other techniques that define the world’s most sophisticated chips, and where cyber-attackers would focus their malevolent efforts on hardware. Christian asks whether quantum computi…
…
continue reading
Jonathan discusses the risk to low-Earth orbit from Russia’s successful test of an anti-satellite weapon, and whether the kinetic threat is a big as the cyber one. Are non-attributable attacks in space the ones we really have to worry about?By SpiderOak
…
continue reading
In our first episode, SpiderOak CEO Dave Pearah talks with SpiderOak CTO Jonathan Moore about New Space and the challenges around security in orbit. We are moving into a new space age, one that's about commercialization and scale. Access to space is getting cheaper by the year. Cadence of launches are increasing. There's going to be more and more c…
…
continue reading
1
Fábio de Salles, Business Intelligence Engineer
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44
This episode of SpiderBytes features Fábio de Salles from Brazil. Fábio works in business intelligence and has a strong background in security. Listen in to learn about how Fábio applies security and privacy best practices in his work as well as at home.By SpiderOak
…
continue reading
In this episode we talk with Alex Flaxman, a medical doctor with software development experience. He has unique insights around privacy and security to share.By SpiderOak
…
continue reading
Today we chat with Shannon Morse. She is a content creator and influencer with a focus on infosec and privacy. We talk about her recommendations, how to factor physical security into your threat model, and lots more. You can learn more and see Shannon's videos on YouTube https://youtube.com/shannonmorse. She's also on Twitter, https://twitter.com/S…
…
continue reading
Today we chat with Zach Otte about the intersection of design, security, and privacy. Balancing these is an important part of the work he does at SpiderOak and he's got some great insights to share. Zach has been at SpiderOak for four years and is the primary designer for the UI/UX of SpiderOak apps.…
…
continue reading
1
Ben Webb, Information Security Risk Analyst
24:44
24:44
Play later
Play later
Lists
Like
Liked
24:44
Ben Webb is an information security risk analyst in the financial sector. He’s also heavily involved in SecKC, the largest hacker meetup in the world. If you’re in the Kansas City area and would like to join the next meetup, which happens to be SecKC’s 10th anniversary, go to https://seckc.org.By SpiderOak
…
continue reading
Our first episode is here! We're excited to introduce SpiderBytes to the world, and who better to start us off than SpiderOak's fearless leader Dave Pearah. To learn more about Dave on his LinkedIn profile - https://www.linkedin.com/in/pearah/. SpiderBytes is sponsored by SpiderOak. (Funny that we sponsor our own show. Go figure!) We'd love you to …
…
continue reading