Player FM - Internet Radio Done Right
Checked 4M ago
Added five years ago
Content provided by Lookout. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lookout or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Security Soapbox | Privacy, Security and Everything in Between
Mark all (un)played …
Manage series 2781537
Content provided by Lookout. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lookout or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
43 episodes
Mark all (un)played …
Manage series 2781537
Content provided by Lookout. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lookout or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
43 episodes
All episodes
×
1 Cybersecurity Predictions: A Look into 2025's Security Landscape 41:17
41:17
Play Later
Play Later
Lists
Like
Liked41:17
2024 saw a surge in cyberattacks alongside rapid tech advancements, making it clear that staying ahead in the digital world is more important than ever. In this week's session, we’ll explore the top cybersecurity predictions for 2025 — highlighting emerging threats, key trends, and the latest strategies for fortifying your defenses. Listen as our expert panel shares valuable insights and predictions on: New ransomware tactics and data breach methods How AI is shaping both security solutions and cyberattacks Growing threats from nation-states The latest security regulations and compliance frameworks…

1 Securing Democracy: Election Integrity, Threats and Solutions with Jim Coyle 32:46
32:46
Play Later
Play Later
Lists
Like
Liked32:46
On this week’s episode of Security Soapbox, we are joined by Jim Coyle, US Public Sector Field CTO at Lookout. We’re diving into the hot topic of election security; unpacking various threats, like disinformation campaigns, cyber espionage, and weaknesses in our election infrastructure — and who’s behind them. We’ll also chat about current protective measures and some innovative ideas, like using blockchain to fight misinformation. Watch the Billington Cybersecurity Summit session on Election Security here. Follow Hank on LinkedIn Follow Jim on LinkedIn…

1 Why is my CEO Texting me? What to do About Executive Impersonation Attacks 5:12
5:12
Play Later
Play Later
Lists
Like
Liked5:12
We’ve all received that urgent text message from our “CEO” asking us to take care of an urgent task. This form of social engineering has become a preferred tactic by threat actors who want to create a high-pressure situation in order to convince employees to send money or share sensitive data. This week’s episode will cover the why and how behind these attacks. We will also cover the critical role they play in the modern kill chain and how to protect against them. To see how Lookout protects against advanced smishing and executive impersonation attacks, read our release blog or watch the short overview video below. Blog: https://www.lookout.com/blog/smishing-prevention-executive-impersonation Video: https://vimeo.com/1009294652…

1 Advanced Web Threats: Data Leaks, Shadow IT, and AI 13:48
13:48
Play Later
Play Later
Lists
Like
Liked13:48
On this week’s episode of Security Soapbox, we are joined by Charity Spiri, who oversees the Security Service Edge (SSE) product portfolio at Lookout. Were challenging the common perception of web-based threats being solely network attacks. Web threats encompass a wider range of risks, including data leakage, shadow IT, and security concerns from AI platforms. While not entirely new issues, these pose significant challenges within the ever-evolving web-based threat landscape. For a deeper dive into advanced web threats and how to protect your organization, check out Charity’s recent session, Defending Against Advanced Threats with a Modern Secure Web Gateway. Follow Hank Schless on LinkedIn Follow Charity Spiri on LinkedIn…

1 5 Minute Friday | A New EU Mandate Makes iOS Less Secure 6:32
6:32
Play Later
Play Later
Lists
Like
Liked6:32
In this week's episode of 5 Minute Friday, we discuss the new Digital Markets Act (DMA) in the EU and its potential impact on iOS security. We talk through the possible security risks and malware threats that could come from opening iOS devices to third-party app stores. To keep up to date on current threats: www.lookout.com/threat-intelligence…

1 5 Minute Friday | BadBazaar: iOS and Android Used to Target Tibetans and Uyghurs 4:38
4:38
Play Later
Play Later
Lists
Like
Liked4:38
In this week's episode of 5 Minute Friday, we discuss BadBazaar, an iOS & Android surveillanceware by China's APT-15, designed to target Uyghur Muslims. We take a dive into the invasive nature of Chinese "pre-criminal" surveillance and BadBazaar's recent expansion to iOS devices, providing insights into its early development and the evolving landscape of mobile threats. To keep up to date on current threats: www.lookout.com/threat-intelligence…

1 5 Minute Friday | Critical Vulnerabilities in iOS & Android 5:02
5:02
Play Later
Play Later
Lists
Like
Liked5:02
In this week's episode of 5 Minute Friday, we discuss three critical vulnerabilities affecting both iOS and Android devices. We also discuss the importance of patching these vulnerabilities, and the modern phishing attack tactics used to exploit them. To keep up to date on current threats: www.lookout.com/threat-intelligence…

1 Unveiling the Impact of Cyber Poverty with Ramy Houssaini 28:52
28:52
Play Later
Play Later
Lists
Like
Liked28:52
In this episode, host Hank Schless welcomes back Ramy Houssaini, Chief Cyber & Technology Risk Officer at BNP Paribas and Founding Chair of The Cyber Poverty Line Institute. They explore the concept of 'cyber poverty,' and shed light on the global disparity in cybersecurity resources, highlighting the critical need for inclusive cyber capability building to safeguard individuals and societies worldwide. For more information on the Cyber Poverty Line Institute, visit: www.cyberpovertyline.org For more information on Lookout, visit: www.lookout.com Connect with Ramy Houssaini on LinkedIn here: www.linkedin.com/in/strategicleadership Connect with Hank Schless on LinkedIn here: www.linkedin.com/in/hank-schless…

1 5 Minute Friday | Robin Banks: A Poster Child for MFA Bypass 3:32
3:32
Play Later
Play Later
Lists
Like
Liked3:32
In this week's episode of 5 Minute Friday, we discuss the resurgence of the Robin Banks, a phishing-as-a-service kit, and its tactics like MFA bypass. We also discuss related threats such as 0ktapus, showcasing evolving cyber threats and the replication of successful attack methods among different groups. To stay up to date on recent threat intelligence, click here.…
In this episode of 5 Minute Friday, we discuss droppers, a type of mobile malware that serves as a middleman between a target device and the threat actor's command and control server. Droppers are now being offered as a service, which could enable more advanced malware to get on more devices. To stay up to date on recent threat intelligence, click here.…

1 5 Minute Friday | Arid Viper: The Mobile Malware Threat 4:29
4:29
Play Later
Play Later
Lists
Like
Liked4:29
In this episode of 5 Minute Friday, we discuss recent research related to the advanced persistent threat (APT) group Arid Viper. Learn about how their tactics for targeting mobile users are exemplary of an attack chain that many cybercriminals use and why it's so effective To stay up to date on recent threat intelligence, click here .…

1 5 Minute Friday | Unveiling Infamous Chisel, Sandworm, and Deblind 4:29
4:29
Play Later
Play Later
Lists
Like
Liked4:29
In this episode of Five Minute Friday, we delve into the shadowy world of cyber espionage as we explore Infamous Chisel, Sandworm, and Deblind. Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel. Learn about Deblind, a system-level Android app that operates with unprecedented privileges, collecting user activity and suppressing security warnings. For more information, visit: www.lookout.com/threat-intelligence/article/russian-sandworm-apt-infamous-chisel-deblind-spyware…

1 5 Minute Friday | Red Alert-Rocket Alerts: A Malicious Threat Exploiting Societal Disruption 5:03
5:03
Play Later
Play Later
Lists
Like
Liked5:03
In this episode of Five Minute Friday, we discuss how societal disruption creates opportunities for malicious actors to exploit people's uncertainties. In this case, we examine a recent case where a malicious version of the legitimate mobile app, RedAlert - Rocket Alerts, was distributed, targeting individuals in Israel. To stay protected against these types of mobile threats, click here .…

1 5 Minute Friday | iLeakage: The Hidden Threat to Your iOS Device 3:46
3:46
Play Later
Play Later
Lists
Like
Liked3:46
On this week’s episode of 5 Minute Friday, we are discussing a recent iOS vulnerability, iLeakage, that exploits your web browser including opened tabs and login credentials. Learn more about iLeakage and the importance of protecting your mobile device — the device that goes everywhere you do. For additional resources on protecting your mobile device, visit: www.lookout.com/products/endpoint-security/mobile-endpoint-security…

1 5 Minute Friday | Scattered Spider, MGM, and Caesars 4:53
4:53
Play Later
Play Later
Lists
Like
Liked4:53
Caesars Entertainment and MGM resorts were recently breached by a well-known cybercrime group, Scattered Spider. Listen to this week’s 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target. For a deeper dive, visit: www.lookout.com/documents/threat-reports/us/lookout_tg_scatteredspider.pdf…
S
Security Soapbox | Privacy, Security and Everything in Between

1 Go Cloud or go Home: Why Cybersecurity Needs to Live in the Cloud 17:16
17:16
Play Later
Play Later
Lists
Like
Liked17:16
Cloud-delivered security solutions offer unrivaled storage flexibility and computing power. But do they introduce new risks? Join host Hank Schless and Lookout head of sales engineering for International, Tom Davison, as they discuss the differences between on-premise security solutions and cloud-delivered ones. Check out our blog on why cloud-delivered security is critical: https://bit.ly/3EqYdga…
S
Security Soapbox | Privacy, Security and Everything in Between

1 When Your Old Reliable is no Longer Enough: Why it’s Time to Move on From VPNs 22:01
22:01
Play Later
Play Later
Lists
Like
Liked22:01
Businesses have relied on VPNs for over two decades. But with the rapid adoption of cloud services and mobile technology, the way we store and access data has changed. On this week’s Endpoint Enigma, Lookout CTO of SASE Products Sundaram Lakshmanan joins Hank Schless to discuss why VPNs fall short when it comes to security and user experience and what the best alternative is for providing secure network access to your remote workers. Check out our blog about ZTNA and how it augments VPN deployments: https://bit.ly/3K0Mnuq…
S
Security Soapbox | Privacy, Security and Everything in Between

1 Healthcare Security in the Age of 5G and Remote Work 21:00
21:00
Play Later
Play Later
Lists
Like
Liked21:00
The healthcare industry has undergone a major digital transformation since HIPAA was introduced in 1996. With technology rapidly outpacing regulations, keeping patient data safe and hospitals up and running has become more challenging than ever. Mike Murray, CEO of Scope Security and former Lookout CISO sits down with host Hank Schless to assess what healthcare looks like in the age of 5G and our work-from-anywhere world. Check out our blog about healthcare security challenges: https://bit.ly/3Eqk7Ae…
S
Security Soapbox | Privacy, Security and Everything in Between

1 Mission Possible: Kiersten Todt on Securing the Public Sector 23:20
23:20
Play Later
Play Later
Lists
Like
Liked23:20
When it comes to defending a nation, a strong cybersecurity plan is vital. In this episode, we’re joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security and Managing Director of the Cyber Readiness Institute to discuss the top cybersecurity challenges facing the U.S. public sector. Check out our blog about challenges in the public sector: https://bit.ly/3rCg1zQ…
S
Security Soapbox | Privacy, Security and Everything in Between

1 Women Making Waves in Cybersecurity (feat. guest host Kristina Balaam) 33:09
33:09
Play Later
Play Later
Lists
Like
Liked33:09
This episode, Lookout threat researcher Kristina Balaam takes over as guest host to discuss the importance of diversity in cybersecurity with federal sales engineer Victoria Mosby. Victoria is a member of the Day of Shecurity initiative and the Lookout Foundation. Tune in to hear their experiences as engineers in a traditionally male-dominated field and their advice for starting your career in cybersecurity. Check out Kristina's blog about why we need more women in cybersecurity: https://bit.ly/3L03L3J…
S
Security Soapbox | Privacy, Security and Everything in Between

1 New Year, New Challenges: What to Expect in 2021 21:11
21:11
Play Later
Play Later
Lists
Like
Liked21:11
2020 was an especially challenging year, including for the cybersecurity industry. But what should we expect for 2021? Join host Hank Schless, threat researcher Kristina Balaam and Christoph Hebeisen, head of the Lookout Threat Research team, to find out what’s going on with privacy, COVID-19-related threats, ransomware and other trends. Check out our 2021 Predictions blog: https://bit.ly/3vvktkV…
S
Security Soapbox | Privacy, Security and Everything in Between

1 The Supply Chain Reaction: Lessons from SolarWinds 18:58
18:58
Play Later
Play Later
Lists
Like
Liked18:58
A software supply chain attack put SolarWinds in the headlines of every news publication in America. In this episode, we’re joined by Tim LeMaster, Director of Systems Engineering at Lookout, to discuss what happened, whether this could happen to mobile devices and how a Zero Trust security model can safeguard your infrastructure. Check out our blog about SolarWinds: https://bit.ly/3vrhtpL…
S
Security Soapbox | Privacy, Security and Everything in Between

1 Threat Hunt With the Right Red Thread: Why You Need Mobile EDR 20:58
20:58
Play Later
Play Later
Lists
Like
Liked20:58
Offices are empty and people are working from home. Tablets and smartphones have become a primary way workers are staying productive. Alex Gladd, Principal Product Manager joins us to talk about why you can’t stop breaches without including mobile devices as part of your threat hunting efforts. Check out this blog about why mobile endpoint detection and response is critical: https://bit.ly/3MfipUX…
S
Security Soapbox | Privacy, Security and Everything in Between

1 Why Legacy Security Can't Protect Modern Devices 21:13
21:13
Play Later
Play Later
Lists
Like
Liked21:13
Tablets and smartphones are increasingly becoming the center of our personal and professional lives. In this episode, we’re joined by Aaron Cockerill, Chief Strategy Officer at Lookout. We discuss what’s different about securing mobile endpoints compared to desktops and laptops, and why desktop security can’t protect mobile. Check out this blog about the critical capabilities you need in a mobile security solution: https://bit.ly/3jOlNdv…
S
Security Soapbox | Privacy, Security and Everything in Between

1 Multiyear Surveillance Campaigns Discovered Targeting Uyghurs 28:32
28:32
Play Later
Play Later
Lists
Like
Liked28:32
The Lookout Threat Intelligence team discovered a series of Chinese campaigns targeting the Uyghur Muslim minority spanning across 14 countries dating back to at least 2013. This week we’re joined by threat researchers Apurva Kumar and Kristin Del Rosso and Threatpost.com reporter Lindsey O’Donnell to discuss the importance of this discovery and what we can learn from it. Read our threat discovery blog here: https://bit.ly/3jPO7Ms…
S
Security Soapbox | Privacy, Security and Everything in Between

1 The Dangers of Phishing in Our Modern World 19:27
19:27
Play Later
Play Later
Lists
Like
Liked19:27
With the proliferation of smartphones and tablets, phishing attacks are no longer what they used to be – delivered via email and opened on a desktop computer. Tune in to find out how the likes of WhatsApp, Twitter, and Tinder have made phishing so dangerous on the mobile device. Check out this blog about business email compromise and modern phishing: https://bit.ly/3MfgW0T…
S
Security Soapbox | Privacy, Security and Everything in Between

1 Management Isn't Security: Why You Need More Than MDM 18:54
18:54
Play Later
Play Later
Lists
Like
Liked18:54
In this episode, we chat with our mobile security experts about mobile device management. Why is MDM in and of itself not security. What’s the best way to protect an organization’s smartphones and tablets? Listen in to find out. Check out this blog to learn the five reasons you need mobile security, even if you already have MDM: https://bit.ly/386W0ut…
S
Security Soapbox | Privacy, Security and Everything in Between

The outbreak of COVID-19 has forced many organizations to speed up the adoption of remote working. In parallel, cyber attackers responded with a variety of new emerging threats, taking advantage of the situation. In this episode our guest, David Richardson, who brings more than 10 years of experience in security, will expose some of those threats and review the challenges and solutions in order to quickly adapt to a secure remote workforce. To learn more, check out our blog about remote work: https://bit.ly/3rFsjr9…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.