logo
episode-header-image
Feb 2023
30m 21s

Cisco fixes vulnerabilities in ICS appli...

N2K Networks
About this episode
Cisco patches a command injection vulnerability. NIST issues antiphishing guidance. HeadCrab malware's worldwide distribution campaign. The Gamaredon APT is more interested in collection than destruction. Kathleen Smith of ClearedJobs.Net looks at hiring trends in the cleared community. Bennett from Signifyd describes the fraud ring that’s launched a war on ... Show More
Up next
Today
Are we a trade or a profession? [CISO Perspectives]
Please enjoy this encore of CISO Perspectives. We're sharing a episode from another N2K show we thought you might like. It's the second episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: Cybersecurity has an identity problem where the indus ... Show More
44m 33s
Yesterday
Investing in the security tech market with NightDragon. [T-Minus Space Daily Special Edition]
While our team is away from the mic observing the Martin Luther King, Jr. holiday in the United States, we share this thoughtful discussion from our T-Minus Space Daily team. Signals Intelligence (SIGINT) is the practice of intercepting and analyzing electronic signals, like phon ... Show More
19m 38s
Yesterday
Pentesting at the speed of thought. [CyberWire-X]
While our team is observing the Martin Luther King, Jr. holiday in the United States, please enjoy this CyberWire-X episode featuring the team from Horizon3.ai. In this CyberWire-X episode, Dave Bittner speaks with Horizon3.ai co-founder and CEO Snehal Antani about how continuous ... Show More
24m 10s
Recommended Episodes
Mar 2022
Russie : un malware inédit contre l’Ukraine ?
<p>Si le conflit entre l’Ukraine et la Russie est un drame absolu pour les citoyens, force est de constater que le monde de la tech y joue un rôle de premier plan. Ces derniers jours, nous vous avons présenté différentes actions mises en place par les occidentaux pour tenter d’af ... Show More
2m 31s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
<p>The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ... Show More
40m 57s
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
58m 4s