Navigating Trust in the Age of Manipulation: Big Tech, Media, and Cyber Warfare

Navigating Trust in the Age of Manipulation: Big Tech, Media, and Cyber Warfare

In today's complex information landscape, trust is harder to come by than ever before. Join us as we delve into the unsettling realities of manipulation by both big tech and traditional media. In a world where it seems nearly impossible to find unbiased sources, who can we turn to for reliable information? We explore the notion that trust often lies with those who reinforce our existing beliefs. But here's where cyber warfare takes a chilling turn. By strategically manipulating information, a population can be swayed towards a specific candidate or agenda, potentially steering an entire country down a predetermined path. Buckle up for a thought-provoking discussion on the dangers posed by cyber warfare and the urgent need for critical thinking and media literacy. Subscribe now to stay informed and empowered in this digital age.

Watch the full video "Reality of Cyber Warfare" https://youtu.be/QRI2AeV8zd4

GUEST BIOS

Oliver Rochford
Oliver has worked in cyber security as a penetration tester, consultant, researcher, and industry analyst for over 20 years. Interviewed, cited, and quoted by media, think tanks, and academia, he has written for SecurityWeek, CSO Online and Dark Reading. While working at Gartner, he co-named the Security Orchestration, Automation and Response (SOAR) market, worked on the SIEM Magic Quadrant, and also covered the European MSSP Market. In past lives, Oliver worked for Qualys, Verizon, Gartner, Tenable and Securonix and is currently Chief Furitist at Tenzir, where he works on product strategy and marketing.

Victor Acin
Victor Acin has been working in threat intelligence since 2016 and is now leading the Kraken Labs unit at Outpost24, performing tasks related to the generation of threat intelligence (mainly reverse engineering of malicious samples and research of global actors), and the development of the department's internal products, such as the malware analysis sandbox. In addition, he has also worked as an ethical hacker, performing penetration tests against web applications, external and internal infrastructure, and mobile devices.

Resources Mentioned

Sun Tzu - Art of War
Facebook report on campaigns targeting army officers from Ukraine
Cambridge Analytica Legal Case
TikTok Ban USA

Other episodes you'll enjoy

Defence In Depth: Strengthening Your Cyber Security Strategy
https://www.razorthorn.com/defence-in-depth-strengthening-your-cyber-security-strategy/

Cyber security and Critical Infrastructure: Are We Prepared for the Worst?
https://www.razorthorn.com/critical-infrastructure/

For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com.
If you need consultation, visit www.razorthorn.com, We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion.

Linkedin: Razorthorn Security
Youtube: Razorthorn Security
Twitter: @RazorThornLTD
Website: www.razorthorn.com