Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Podcast

Challenges of Law Enforcement in the Digital Age Navigating the Limits of Disruption

Join us as we navigate the complex challenges faced by law enforcement in the digital age. Despite efforts to take down, disrupt, and pressure criminal elements, the reality remains that these actions may not be enough to halt their activities. In this candid discussion, we explore the limitations of law enforcement in combating digital crime, acknowledging the difficulties they face in reaching elusive perpetrators hiding across the globe. While not dismissing their efforts entirely, we recognize the inherent challenges they encounter when confronting organized crime in cyberspace.

Reddit's Matt Johansen on renouncing superhero culture and what comes after "shift left"

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Matt Johansen. Matt is a security veteran who has helped defend startups, the biggest financial companies in the world, and everything in between. Alongside his day job as Head of Software Security at Reddit, he teaches companies how to protect against cyber attacks, and coaches entrepreneurs and CISOs that need help with infrastructure, application, cloud, and security policies. He also writes Vulnerable U, a weekly newsletter that talks about embracing the power of vulnerability for growth.

Unraveling Global Financial Scandals: Insights into State-Sponsored Operations

Dive into the murky world of global financial scandals and state-sponsored operations with us. From the Wirecard scandal to the 1MDB debacle, and the infamous case of Edward Snowden, we uncover the intricate web of espionage and corruption that spans nations. Join the discussion as we explore the role of nation-states in these high-profile cases, where operatives are allegedly turned by foreign intelligence agencies to carry out nefarious deeds. From missing COOs to operatives fleeing to foreign countries, the plot thickens as we delve deeper into the shadows of international intrigue.

Economic Panic: Exploring the Dual Nature of Employment in the Age of AI | Razorthorn Security

Delve into the current economic landscape of the West with us as we explore the phenomenon of job redundancy and the rise of dual employment. Despite some attributing layoffs to AI, the reality may be a broader downturn in the economy. Join the discussion as we uncover the motivations behind individuals opting for multiple jobs, driven by the desire for higher earnings and the perception of overworking. Discover how programmers, in particular, navigate dual roles, potentially working for both legitimate companies and malware operators, exploiting the system for financial gain.

Random but Memorable - Episode 12.4: Change Future Banter Rating with Verity Harding

How can we shape the future of AI and make sure it's used for good? We sit down with Verity Harding, author of the newly released: AI Needs You: How We Can Change AI's Future and Save Our Own. 🦸‍♂️🤖 Tune in for the historical lessons we can learn from previous tech revolutions of the twentieth-century – from the space race to the internet – and how they can empower us to join the conversation about AI and its possible futures.

The 443 Podcast - Episode 283 - Trucking Worms

This week on the podcast we discuss a vulnerability in required commercial truck hardware that could enable an automatically propagating worm across the entire US. Before that, we cover Apple's "un-patchable" vulnerability in their M-series processors as well as a vulnerability that could let attackers unlock hotel room doors at will. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Unraveling Cyber Intrigue: Decoding the Complexities of State-Sponsored Hacking Groups

Join us as we uncover the intricate web of state-sponsored hacking groups and the hidden motivations driving their actions. Explore insights from recent revelations, including examples from China dating back to 2012-2013, where various government agencies sponsored competing hacking groups. In this eye-opening discussion, we delve into the financial motivations behind these operations and shed light on the key players pulling the strings. From government agencies vying for dominance to clandestine funding sources, the landscape of cyber intrigue is more complex than meets the eye.

Unveiling Blind Spots Navigating Threat Intelligence Alignment in Government Agencies

Join us as we delve into the critical importance of using the right threat intelligence tailored to the unique identity of your organization. Discover insights from a recent encounter with a major government agency responsible for key elements of the UK economy, where the lack of awareness about their own data protection and adversaries was startling.