logo
episode-header-image
Feb 2022
40m 40s

Securing Underserved Organizations with ...

MISSION
About this episode
tail spinning
Up next
Today
How the Smartest Companies Build Infrastructure That Wins
Most companies don’t realize it yet, but the way they built their technology foundations is quietly becoming a liability.Cloud costs are rising. Platforms change underneath you. AI is reshaping infrastructure from hardware to data to governance. And the strategies that once felt ... Show More
1 h
Feb 5
The Next Internet Is Coming… And It’s Smarter Than Ever
Most people assume the internet is stable, durable, and ready for whatever comes next. The truth is a bit more complicated. Modern networks were never designed for today’s scale, and for the first time we are seeing technology that can make them smarter, simpler, and far more rel ... Show More
59m 39s
Jan 22
Why AI Can’t See Most of the Web (Explained by the Founder Building the Fix)
Most leaders assume AI and search already see the whole internet. In reality, they all operate on the same tiny slice of the web.In this episode of IT Visionaries, host Chris Brandt sits down with Sudheesh Nair, Co-Founder and CEO of TinyFish and former CEO of ThoughtSpot, to unp ... Show More
1h 2m
Recommended Episodes
May 2014
Cyber Security
Can you keep business safe from hackers? Many companies now feel besieged by constant attacks and few can claim not to have been targeted. In the first of a new series of the award-winning The Bottom Line Evan Davis and guests discuss the anatomy of a cyber attack - where the thr ... Show More
28m 7s
Dec 2021
Rediscover trust in cybersecurity: A women in cybersecurity podcast. [Special edition]
It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You ca ... Show More
46m 21s
Mar 2023
Detecting sandbox emulations. VEC supply chain attacks. Updates from the hybrid war. CISA and NSA offer IAM guidance. Other CISA advisories. Baphomet gets cold feet after all.
Malware could detect sandbox emulations. A VEC supply chain attack. A new APT is active in Russian-occupied sections of Ukraine. An alleged Russian patriot claims responsibility for the D.C. Health Link attack. CISA and NSA offer guidance on identity and access management (IAM). ... Show More
27m 20s
Mar 2024
2820: The Cyber Insurance Equation: Risk, Responsibility, and Readiness
In today's digital landscape, the role of cybersecurity within organizations is more critical than ever. As businesses navigate the complexities of protecting their data and infrastructure, the Chief Information Security Officer (CISO) stands at the forefront of this evolving bat ... Show More
36m 29s
Mar 2023
Some movement in the cyber underworld. Vishing impersonates the US Social Security Administration. More SVB-themed phishing. And compromise without user interaction.
BianLian gang’s pivot. HinataBot is a Go-based threat. The US Social Security Administration is impersonated in attempted vishing attacks. BlackSnake in the RaaS criminal market. More Silicon Valley Bank-themed phishing. Caleb Barlow from Cylete on security implications you need ... Show More
30 m
Mar 2023
Tools, alerts, and advisories from CISA. Reply phishing scams. Cl0p goes everywhere with GoAnywhere. EW in the hybrid war, and shields stay up.
A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz ... Show More
28m 13s
Oct 2020
TrickBot’s return is interrupted. Election rumor control. Supply chain security. Securing the Olympics. NSS Labs closes down.
TrickBot came back, but so did its nemesis from Redmond--Microsoft and its partners have taken down most of the new infrastructure the gang reestablished. CISA publishes election rumor control. The Cyberspace Solarium Commission has a white paper on supply chain security. Japan s ... Show More
22m 45s
Nov 2023
Cybercriminals at the service of the state, and an array of new underworld tools.
Data brokers offer information on active US military personnel. Current BlueNoroff activity. A new Gootloader variant is active in the wild. Atlassian vulnerabilities actively exploited. The prevalence of breaches. Update on a Barracuda vulnerability. Hacktivism and the cyber cou ... Show More
28m 16s
Oct 2017
No insight yet into Las Vegas gunman's motive as ISIS inspiration generally discounted. Yahoo! breach affected 3, not 1, billion user accounts. Equifax updates.
In today's podcast, we hear that ISIS claims of responsibility for Las Vegas murders continue to lose plausibility, but the shooter's motives remain a mystery. Yahoo!'s epic breach just got even more epic. Equifax looks little better in the wake of its CEO's Congressional testimo ... Show More
18m 3s
Dec 2019
Data center ransomware. Third-party breach hits telco customers. Buran and Buer on the black market. The Great Canon opens fire. Russia trolls Lithuania. Big bad BEC.
Data center operator CyrusOne sustains a ransomware attack. Another third-party breach involves a database inadvertently left exposed on an unprotected server. Buran ransomware finds its place in the black market, as does the new loader Buer. China’s Great Cannon is back and firi ... Show More
22m 46s