All Posts

Cybersecurity News – February 22, 2022

Researches find decryption for Hive ransomware A research paper from the Kookmin University of Seoul documented a vulnerability in Hive’s ransomware encryption, allowing for the…

Six Explanations of Data Sprawl in 80 Seconds

Here I am with Collin Boyce, CISO, City of Tucson as he provides six rather varied explanations of data sprawl in under a minute and…

Cybersecurity News – February 21, 2022

White House attributes Ukraine DDoS incidents to Russia’s GRU Following up on a story we brought you last week, Anne Neuberger, deputy national security adviser…

Cybersecurity News – Week in Review – Feb 14-18, 2022

This week’s Cyber Security Headlines – Week in Review, Feb 14-18, is hosted by Rich Stroffolino with our guest, Mike Hanley, CSO, GitHub Cyber Security…

Cybersecurity News – February 18, 2022

DOJ beefs up efforts to combat criminal use of cryptocurrencies Speaking at the Munich Cyber Security Conference, Deputy Attorney General Lisa Monaco said that the…

Defense in Depth: Building a Cybersecurity Culture

How do you begin building a cybersecurity culture for the whole company? And, more importantly, how do you maintain that? Check out this post for the discussion…

Cybersecurity News – February 17, 2022

State-sponsored hackers hits defense contractors A new alert issued by CISA, the FBI and NSA claims that state-sponsored hackers linked to Russia targeted cleared defense…

[3-4-22] “Hacking Automated Response” – Super Cyber Friday

Please join us on Friday, March 4th, 2022 for Super Cyber Friday. Topic will be “Hacking Automated Response: An hour of critical thinking about more than…

Best moments from “Hacking Promises of Automation” – CISO Series Video Chat

Here is a six minute video of our best moments from CISO Series Video Chat: “Hacking Promises of Automation: An hour of critical thinking of…

Cybersecurity News – February 16, 2022

Cyberattacks take down Ukrainian military and bank websites On Tuesday, the websites of Ukraine’s military and two of its largest banks, PrivatBank and Oschadbank, were…

What We Lack In Security We’ll Make Up in School Spirit

Yikes, this security hole one concerned student found in the school’s network is going to require one heck of a pep rally to fix. This…

Cybersecurity News – February 15, 2022

FTC warns VoIP providers about robocalls The US Federal Trade Commission warned VoIP providers that it will take legal action against them if they do…

Cybersecurity News – February 14, 2022

San Francisco 49ers hit by Blackbyte ransomware attack The 49ers confirmed the attack in a statement to BleepingComputer and said it caused a temporary disruption…

Cybersecurity News – Week in Review – Feb 7-11, 2022

This week’s Cyber Security Headlines – Week in Review, Feb 7-11, is hosted by Rich Stroffolino with our guest, Dave Stirling, CISO, Zions Bancorporation Cyber…

Cybersecurity News – February 11, 2022

Donation site for Ottawa truckers’ “Freedom Convoy” protest exposed donors’ data The donation site used by truckers in Ottawa who are currently protesting against national…

Defense in Depth: How to Pitch a Security Analyst

You’re a security vendor and you’ve got a short briefing with a security analyst from a research firm. What do you want to get across…

Cybersecurity News – February 10, 2022

Ukraine takes down social media bot farm The Ukrainian Security Service announced it shut down two bot farms used to manage over 18,000 accounts that…

[2-25-22] “Hacking Sprawl” – CISO Series Video Chat

Please join us on Friday, February 25th, 2022 for CISO Series Video Chat: “Hacking Sprawl: An hour of critical thinking about how to manage everyone’s…

Best moments from “Hacking SaaS Ecosystem” – CISO Series Video Chat

Here is a quick five minute video of our best moments from CISO Series Video Chat: “Hacking SaaS Ecosystem: An hour of critical thinking about…

Cybersecurity News – February 9, 2022

DOJ arrests New York couple, seizing $3.6 billion in bitcoin The Justice Department has seized a record total $3.6 billion in cryptocurrency tied to the…

What’s the Least Annoying Way to Follow Up with a CISO?

If we had such a great conversation at the conference, why don’t you want to respond to my emails? This week’s episode is hosted by…

Cybersecurity News – February 8, 2022

Stolen crypto used to fund North Korean missile program A UN report found that North Korean cyberattacks stole over $50 million worth of digital assets…

5 Explanations of Security Automation in 90 Seconds

Here I am with Leonid Belkind (@Torq_IO ), CTO of Torq, who I challenge to give me five different explanations of security automation. They’re not as straightforward as…

Cybersecurity News – February 7, 2022

US House passes bill to boost chip manufacturing and R&D On Friday the US House of Representatives passed a bill that will to equip America…