Artwork

Content provided by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cybercriminals and Nation-States Look to IoT as the New Frontline

52:58
 
Share
 

Manage episode 348342018 series 3418676
Content provided by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?

Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s discovered from the tool.

The cybersecurity space, he’s found, has focused and refocused and reframed and refocused again. Now, it’s apparent globally that cybercriminals and nation-states are looking at IoT as the new frontline. When new technologies come up, they’re developed with no thought to security, says Richard. Now we’re reaping what was sown.

Let’s get into Things on the IoT Security Podcast!

Follow Richard Stiennon on all his platforms:
https://www.linkedin.com/in/stiennon
https://stiennon.substack.com
https://twitter.com/stiennon
https://www.it-harvest.com

Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos/.

And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi/.

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast/.


Let’s connect about IoT Security!

Follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

32 episodes

Artwork
iconShare
 
Manage episode 348342018 series 3418676
Content provided by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?

Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s discovered from the tool.

The cybersecurity space, he’s found, has focused and refocused and reframed and refocused again. Now, it’s apparent globally that cybercriminals and nation-states are looking at IoT as the new frontline. When new technologies come up, they’re developed with no thought to security, says Richard. Now we’re reaping what was sown.

Let’s get into Things on the IoT Security Podcast!

Follow Richard Stiennon on all his platforms:
https://www.linkedin.com/in/stiennon
https://stiennon.substack.com
https://twitter.com/stiennon
https://www.it-harvest.com

Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos/.

And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi/.

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast/.


Let’s connect about IoT Security!

Follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

32 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide