Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.
Learn more about your ad choices. Visit me ... Show More
Nov 11
Private Network Access (PNA) (noun)
Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link. Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022. ... Show More
5m 36s
Feb 2017
The Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Ransomware developments. Industry notes.
In today's podcast we review some updates on the Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Researchers take a look at ransomware developments. It's been an active week for the cyber sector in mergers, acquisitions, and ventu ... Show More
16m 33s
Apr 2013
The Cloudcast (.net) #82 - SDN, Big Data, Internet of Things and What's Next?
Amy Lewis (@CommsNinja) talks with Lew Tucker (@lewtucker, SVP/CTO @ Cisco) and Dave McCrory (@mccrory, SVP @ Warner Music) about the latest keynotes at CloudConnect, the intersection between SDN / Big Data / Sensor Data, and how Cloud Computing and Networking are evolving as a r ... Show More
32m 40s
May 2024
AI Is a Cybersecurity Tool and Threat
<p dir="ltr">When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. </p> <p><strong> </strong></p> <p dir="ltr">Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the con ... Show More
26m 19s