All Posts

Who Do You Need to Trust When You Build a Zero Trust Architecture?

Uggh, just saying “zero trust” sends shivers down security professionals’ spines. The term is fraught with so many misnomers. The most important is who are…

Cybersecurity News: Google buys Mandiant, Redbleed mitigations hurt, Meta hands over PyTorch

Google closes on Mandiant Back in March, Google announced it intended to acquire the threat intelligence firm Mandiant in a $5.4 billion deal. This came…

What’s the REAL Value of Tracking a Cybercrook?

I know that it’s good to know the criminal’s behavior, but why? How is that going to truly improve our defenses? As a preview for…

Cybersecurity News: Intermittent encryption warning, HP firmware bugs, SEC crypto office

Ransomware gangs switching to new intermittent encryption tactic A growing number of ransomware groups are adopting a new tactic that helps them encrypt their victims’…

Cybersecurity News Week in Review: TikTok breach, China accuses US, CISA feedback

This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Jason Elrod, CISO, Multicare Health System…

Cybersecurity News: China accuses US, London buses hacked, New APT42 group

China accuses US of cyberattacks and cyberespionage On Monday, the Chinese National Computer Virus Emergency Response Center (CVERC) published a report, co-authored by the private…

Join CISO Series’ 4th Anniversary – Super Cyber Friday

Please join us on Friday September 30th, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking the CISO Series: We’re turning four…

Can You Have Culture Fit and Diversity, or Are They Mutually Exclusive?

Hiring managers speak about looking for culture fit and diversity, but never at the same time. Can they coexist? Are they mutually exclusive? Check out…

Cybersecurity News: CISA incident reporting, Linux-focused IoT malware, Albania cuts ties over cyberattack

CISA asks for feedback on reporting rules Back in March, President Biden signed a new law requiring critical infrastructure owners and operators to report major…

“Hacking Phishing” – Super Cyber Friday

Please join us on Friday, September 23rd, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking Phishing: An hour of critical thinking…

Cybersecurity News: Ex-Uber exec heads to trial, Twitter fires back at Mudge, FBI K-12 warning

Uber’s ex-cyber exec heads to trial Joe Sullivan, former security chief at Facebook and Uber, was fired by Uber back in 2017 for mishandling a…

The Best Interview Questions and the Answers You Want to Run From

You want an awesome job in cybersecurity, and you want to ask the right questions. What are the right answers, and which ones are red…

Cybersecurity News: Sextortion ring busted, TikTok denies breach, Cloudflare cuts off Kiwi Farms

Transnational sextortion ring dismantled  Interpol’s cybercrime division worked with police in Singapore and Hong Kong to take down the operation. The police agency arrested 12…

Cybersecurity News: Federal supply chain security tips, Apple lawsuit settlement, Neopets hack update

Federal agencies share supply chain security tips  On Thursday, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released tips for…

How to Follow Up With a CISO

Cyber sales is hard. But don’t let the difficulty of doing it get in way of your good judgement. So what is the right way…

Cybersecurity News: Google’s open-source bug bounty, Ragnar Locker hits airline, Cloudflare won’t cut off services

Google launches open-source bug bounty Google launched the Open Source Software Vulnerability Rewards Program. This will pay up to $31,337 for bugs on open-source projects…

[9-16-22] “Hacking Like a Cybercrook” – CISO Series Video Chat

Please join us on Friday, September 16th, 2022 for Super Cyber Friday. Topic will be “Hacking Like a Cybercrook: An hour of critical thinking about…

Why Is Cyber Risk Management Such a Popular Topic?

On our weekly Super Cyber Friday event we’ve approached the topic of risk, and every single time it’s one of our most popular shows. And…

Cybersecurity News: Google Translate malware, White House aviation briefing, book distributor ransomed

Google Translate app is actually Windows crypto-mining malware Someone is spreading cryptocurrency-mining malware disguised as legitimate-looking applications such as Google Translate, on free software download…

But I Spent All This Money. Why Are You Still Ignoring Me?

Are RSA and other big conferences worth it? It seems that fewer CISOs are actually walk the floor at these big trade shows. The really…

Cybersecurity News: Log4Shell Hits Israel, Russian cyber attacks on Montenegro, AlphaBay Turns 1

Microsoft warns Iranians using Log4Shell According to a new report from the Redmond giant, the Iranian group MuddyWater continues to target Israeli organizations using the…

Cybersecurity News: Hackers breach LastPass, new Agenda ransomware, Facebook Cambridge settlement

Hackers breach LastPass developer system to steal source code Password management service LastPass has confirmed a security incident that resulted in the theft of certain…

Cybersecurity News Week in Review: ZIP file passwords, Uninsurable hacks, Twitter’s cybersecurity

This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, John McClure, CISO, Sinclair Broadcast Group…

Cybersecurity News: North Korea at Black Hat, Ransomware attacks jump, Pentagon software requirements

North Korean malware present at Black Hat IronNet, a security firm hired to assist at Black Hat’s Network Operations Center discovered several active malware infections…