How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shouldn't get cocky. DevSecOps survey results show tension between innovation and se ... Show More
Mar 17
Mid season reflection with Kim Jones. [CISOP]
In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, un ... Show More
41m 27s
Oct 2019
E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries
0:50 Jason intros Tim Junio<br />
1:44 Tim explains what Expanse does and how "attack surface inventory" is the first step in their cybersecurity platform<br />
5:20 Tim explains the Dyn cyber attack<br />
13:20 How many Fortune 500 companies have been blackmailed via cyber at ... Show More
1h 37m