Cyber Security Sauna

By WithSecure™

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by WithSecure™

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 147
Reviews: 0
Episodes: 95

Description

Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.

Episode Date
086| Why showing value is more important for CISOs than ever
Jan 03, 2024
085| NIST Cyber Security Framework V.2 – Help or Hindrance?
Nov 22, 2023
084| Let's Talk About Threats Baby
Nov 01, 2023
083| Security by design for CISOs
Oct 09, 2023
082| Hyped and Hacked - AI in Cyber Security
Sep 20, 2023
081| Mudge - the man, the myth, the mythbusting
Aug 28, 2023
080| The Power Of Putting Security Outcomes First
Aug 07, 2023
079|(Mind the) Detection and Response Gap
Jul 17, 2023
078| John Grant on the relationship between sustainability and cyber security
Jun 26, 2023
077| Jessica Berlin and Stephen Robinson on the cyber front
Jun 06, 2023
076| What we get wrong (and right) about APTs
May 08, 2023
075| Winning with outcome-based security
Apr 04, 2023
074| Do you even patch bro?
Mar 07, 2023
073| 2023 - Looking Forward
Feb 01, 2023
072| 2022 Wrap-Up
Jan 01, 2023
071| Deepfakin it: AI content in cyber attacks
Dec 05, 2022
Cyber Security Sauna: Breaking Views – The Vastaamo case
Nov 09, 2022
070| Crowdsourcing Security with Bug Bounties
Nov 02, 2022
069| Cyber conflicts, Corporations and Collateral damage
Oct 03, 2022
SPHERE SESSION | Johanna Småros on winning the algorithmic retail
Sep 26, 2022
SPHERE SESSION | Matthew Rosenquist on why value is the cybersecurity blindspot
Sep 13, 2022
068|The other TTPs: Tools, technologies, and people
Sep 07, 2022
SPHERE SESSION | Sari Stenfors on AI, humanness and positive futures
Aug 19, 2022
SPHERE SESSION | Risto Siilasmaa on trust as the building block for businesses
Aug 09, 2022
SPHERE SESSION | Christine Bejerasco on the development of ransomware
Jul 29, 2022
067| How Mikko Hypponen learned to stop worrying and love the internet
Jul 14, 2022
SPHERE SESSION | Simone Giertz on building useless things
Jul 11, 2022
SPHERE SESSION | Carole Cadwalladr on threats to democracy
Jun 30, 2022
SPHERE SESSION | Philip Ingram on nation-state threats
Jun 13, 2022
066| Co-security: collaboration, cooperation and cyber security
Apr 05, 2022
065| Security for non-profit organizations
Feb 28, 2022
064| 2021, 2022 and beyond - Part 2
Jan 24, 2022
063| 2021, 2022 and beyond - Part 1
Dec 29, 2021
062| Log4j Zero Day: What It Means for Your Org
Dec 14, 2021
061| AppSec, According to Two Guys Named Antti
Nov 24, 2021
060| Biometrics: Privacy, Problems and Possibilities
Nov 02, 2021
059| Keeping Your Latest Tech from Becoming the Latest Threat
Oct 11, 2021
058| Paths to Infosec: From ER to IR
Sep 20, 2021
057| Dark Web: The Good, the Bad, and the Ugly
Aug 17, 2021
056| To Ban or Not to Ban? Ransomware Payment Regulation
Jul 15, 2021
055| When AI Goes Awry
Jun 23, 2021
054| Ransomware Incident Response and the Role of Readiness
May 27, 2021
053| How to Secure Networks and Influence People
Apr 28, 2021
052| Challenges in Cloud Security
Apr 06, 2021
051| Looking at Phishing Through the Intrusion Kill Chain
Mar 11, 2021
050| Getting the Most out of Infosec Conferences
Feb 18, 2021
049| Ransomware 2.0, with Mikko Hypponen
Jan 19, 2021
048| The Year in Cyber: 2020
Dec 30, 2020
047| The Tangled Web of ID Theft
Dec 09, 2020
046| 10 Burning Mobile Security Questions, Answered
Nov 12, 2020
045| The Most Frightening Thing About Stalkerware, with Eva Galperin
Oct 05, 2020
044| 2020 in Cyber Threats, So Far: COVID-19's Effects, Ransomware's Latest Tricks
Sep 17, 2020
043| Paths to Infosec: Military Vs. Psychology
Aug 24, 2020
042| The Encryption Debate Rages On
Jul 30, 2020
041| The Ethics of Red Teaming
Jun 29, 2020
040| Can Contact Tracing Apps Preserve Your Privacy?
May 27, 2020
039| Deconstructing the Dukes: A Researcher's Retrospective of APT29
May 06, 2020
038| Mikko Hypponen on Zoom, COVID-19 Threats, and Working During a Pandemic
Apr 16, 2020
037| COVID-19 and Your Company's Security: The CISO Speaks
Mar 24, 2020
036| From Stuxnet to WannaCry to Coinhive, The Past Decade Was All Over The Place
Mar 16, 2020
035| Threat Hunting & Why It's All About People
Feb 19, 2020
034| Balancing AI: Privacy, Misuse, Ethics and the Future
Jan 29, 2020
033| Cyber Security Education from Student and Teacher Perspectives
Jan 08, 2020
032| How California's New Privacy Law Strikes Where the Pain Is
Dec 04, 2019
031| Filtered & Fragmented: Is True Internet Freedom a Thing of the Past?
Nov 12, 2019
030| Talking Infosec to Non-Infosec Folks
Oct 22, 2019
029| Ask a Hacker: Red Teamer Answers Listener Questions
Sep 25, 2019
028| When the Well is Poisoned: The Devastation of Supply Chain Attacks
Aug 29, 2019
027| The Connected Home Meets the IoT Tire Fire
Aug 03, 2019
026| Safe Browsing & Secure Web Development
Jul 04, 2019
025| The Psychology of Phishing
Jun 12, 2019
024| GDPR, One Year Later
May 15, 2019
023| Electronic Voting & Why it's So Hard to Get Right
Apr 23, 2019
022| Pro-Brexit Twitter Views Amplified by the Global Far Right
Apr 02, 2019
021| The Cloud: Security Benefits, Risks & Why You Should Use It
Mar 14, 2019
020| Defining Cyber Warfare, with Mikko Hypponen
Feb 11, 2019
019| The Best Defense is Good Offensive Security
Jan 23, 2019
018| Online Dating and Trading Data for Love (It's Complicated)
Dec 26, 2018
017| Year in Cyber: Forecasting 2019, Recapping 2018
Dec 10, 2018
016| Endpoint Protection & Beyond
Nov 19, 2018
015| Election Security, US Midterm Edition: The Big Picture
Oct 29, 2018
014| Reinventing the Cold Boot Attack: Modern Laptop Version
Oct 08, 2018
013| Passwords: A Hacker's Take on Cracking & Protecting Your Creds
Sep 14, 2018
012| Adventures in Red Teaming
Aug 23, 2018
011| The Rise of AI and Deliberate Deception
Aug 02, 2018
010| Ransomware Out, Cryptojacking In? Latest Cybercrime Trends
Jul 09, 2018
009| Top OpSec Tips for Vacation Travel
Jun 21, 2018
008| GDPR is Live. What Now?
May 31, 2018
007| Popping Hotel Locks: The Hard Truth About Hacking
May 09, 2018
006| Spring Cleaning for Opsec
Apr 26, 2018
005| Demystifying Hardware Security, with Andrea Barisani
Mar 29, 2018
004| Security, Privacy and the IoT, with Steve Lord
Mar 08, 2018
003| Data Breaches: Bridging the Gap
Feb 13, 2018
002| Breaking Into Infosec: Advice from an Ethical Hacker
Dec 21, 2017
001| Antivirus in the Hot Seat, with Mikko Hypponen
Nov 30, 2017