All Posts

Best moments from [3-4-22] “Hacking Automated Response” – Super Cyber Friday

Here are six minutes of our best moments from Friday, March 4th, 2022 for Super Cyber Friday. Topic will be â€œHacking Automated Response: An hour of…

Cybersecurity News – March 9, 2022

Google to purchase cybersecurity firm Mandiant for $5.4 billion Google has entered into an agreement to acquire Mandiant in a whopping, all-cash deal worth $5.4…

How to Be So Awesome CISOs Can’t Ignore You

The trick to getting the attention of CISOs is to create an awesome company. Focus on that and the attention will follow. This week’s episode…

Cybersecurity News – March 8, 2022

Leaked Nvidia data used in malware Last week we covered that the extortion group Lapsus$ accessed Nvidia’s systems and stole proprietary data as well as…

8 Explanations of Extreme Vulnerabilities in 90 Seconds

Here I am with Doug DeMio, leader ransomware task force, American Family Insurance as we’re discussing the real world consequences of extreme vulnerabilities. I challenged Doug to…

Cybersecurity News – March 7, 2022

Charities and NGOs that provide support to Ukraine hit by malware The report comes from Amazon, who is crediting the attacks to state-sponsored hackers while…

Cybersecurity News – Week in Review – Feb 28-Mar 4, 2022

This week’s Cyber Security Headlines – Week in Review, Feb 28-Mar 4, is hosted by Rich Stroffolino with our guest, Ody Lupescu, CISO, Ethos Life…

Cybersecurity News – March 4, 2022

Cyberattack attempts on Ukraine surge tenfold A Russia-supporting threat actor has compromised at least 30 Ukrainian universities as vulnerability exploit attempts have surged, according to…

Defense in Depth: Offensive Security

Offensive security or “hacking back” has always been seen as either unethical or illegal. But now, we’re seeing a resurgence in offensive security solutions. Are…

Cybersecurity News – March 3, 2022

Conti and Trickbot code leaks We previously covered the pro-Ukranian member of the Conti ransomware gang who leaked the group’s chat logs as a result…

[3-18-22] “Hacking Security Validation” – Super Cyber Friday

Please join us on Friday, March 18th, 2022 for Super Cyber Friday. Topic will be “Hacking Security Validation: An hour of critical thinking about verifying the…

Best moments from “Hacking Sprawl” – CISO Series Video Chat

Here are five moments of our best moments from CISO Series Video Chat: “Hacking Sprawl: An hour of critical thinking about how to manage everyone’s…

Cybersecurity News – March 2, 2022

Russia-Ukraine War update Tech giants continue to unite to take action in response to Russia’s invasion of Ukraine. Apple announced that it is pausing all…

Attract the Best Candidates with Crappy Benefits and Low Pay

If you’re up against Google, Facebook, or Apple for hiring talent, chances are pretty good that your company is not going to match their pay…

Cybersecurity News – March 1, 2022

Toyota suspends Japanese production due to cyberattack Toyota suspended all of its 14 factories in Japan due to what a spokesperson called a “supplier system…

7 Explanations of Automated Response in 90 Seconds – CISO Series Video Chat

Here is Wesley Mullins, CTO, Deepwatch going through the gauntlet of questions from me. The two of them talked about how can security set up…

Cybersecurity News – February 28, 2022

Ukraine recruits volunteer IT army to hack list of Russian entities The list is composed of 31 targets including Russian critical infrastructure, government agencies, banks,…

Cybersecurity News – Week in Review – Feb 21-25, 2022

This week’s Cyber Security Headlines – Week in Review, Feb 21-25, is hosted by Rich Stroffolino with our guest, Mark Eggleston, CISO, CSC Cyber Security…

Cybersecurity News – February 25, 2022

Cyberattacks accompany Russian military assault on Ukraine The websites of Ukraine’s defense, foreign and interior ministries were unreachable or painfully slow to load Thursday morning…

Defense in Depth: When Vendors Pounce on New CISOs

A security professional announces a new position as CISO. As a vendor you see this as good timing to try a cold outreach to sell…

Cybersecurity News – February 24, 2022

Samsung shipped devices with flawed encryption In a paper set to be presented at the Real World Crypto and USENIX Security summit, researchers showed that…

[3-11-22] “Hacking Extreme Vulnerabilities” – Super Cyber Friday

Please join us on Friday March 11th, 2022 for Super Cyber Friday. Topic will be â€œHacking Extreme Vulnerabilities: An hour of critical thinking about the confluence…

Cybersecurity News – February 23, 2022

IRS is allowing taxpayers to opt out of facial recognition After drawing criticism from both parties in Congress and from privacy advocates, the IRS has…

If the Network Is Up, Somebody Is Violating Our Acceptable Use Policy

Every organization has an Acceptable Use Policy (AUP) for their computers and network. Nobody reads it and everybody violates it. How the heck do you…