Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
086| Why showing value is more important for CISOs than ever
|
Jan 03, 2024 |
085| NIST Cyber Security Framework V.2 – Help or Hindrance?
|
Nov 22, 2023 |
084| Let's Talk About Threats Baby
|
Nov 01, 2023 |
083| Security by design for CISOs
|
Oct 09, 2023 |
082| Hyped and Hacked - AI in Cyber Security
|
Sep 20, 2023 |
081| Mudge - the man, the myth, the mythbusting
|
Aug 28, 2023 |
080| The Power Of Putting Security Outcomes First
|
Aug 07, 2023 |
079|(Mind the) Detection and Response Gap
|
Jul 17, 2023 |
078| John Grant on the relationship between sustainability and cyber security
|
Jun 26, 2023 |
077| Jessica Berlin and Stephen Robinson on the cyber front
|
Jun 06, 2023 |
076| What we get wrong (and right) about APTs
|
May 08, 2023 |
075| Winning with outcome-based security
|
Apr 04, 2023 |
074| Do you even patch bro?
|
Mar 07, 2023 |
073| 2023 - Looking Forward
|
Feb 01, 2023 |
072| 2022 Wrap-Up
|
Jan 01, 2023 |
071| Deepfakin it: AI content in cyber attacks
|
Dec 05, 2022 |
Cyber Security Sauna: Breaking Views – The Vastaamo case
|
Nov 09, 2022 |
070| Crowdsourcing Security with Bug Bounties
|
Nov 02, 2022 |
069| Cyber conflicts, Corporations and Collateral damage
|
Oct 03, 2022 |
SPHERE SESSION | Johanna Småros on winning the algorithmic retail
|
Sep 26, 2022 |
SPHERE SESSION | Matthew Rosenquist on why value is the cybersecurity blindspot
|
Sep 13, 2022 |
068|The other TTPs: Tools, technologies, and people
|
Sep 07, 2022 |
SPHERE SESSION | Sari Stenfors on AI, humanness and positive futures
|
Aug 19, 2022 |
SPHERE SESSION | Risto Siilasmaa on trust as the building block for businesses
|
Aug 09, 2022 |
SPHERE SESSION | Christine Bejerasco on the development of ransomware
|
Jul 29, 2022 |
067| How Mikko Hypponen learned to stop worrying and love the internet
|
Jul 14, 2022 |
SPHERE SESSION | Simone Giertz on building useless things
|
Jul 11, 2022 |
SPHERE SESSION | Carole Cadwalladr on threats to democracy
|
Jun 30, 2022 |
SPHERE SESSION | Philip Ingram on nation-state threats
|
Jun 13, 2022 |
066| Co-security: collaboration, cooperation and cyber security
|
Apr 05, 2022 |
065| Security for non-profit organizations
|
Feb 28, 2022 |
064| 2021, 2022 and beyond - Part 2
|
Jan 24, 2022 |
063| 2021, 2022 and beyond - Part 1
|
Dec 29, 2021 |
062| Log4j Zero Day: What It Means for Your Org
|
Dec 14, 2021 |
061| AppSec, According to Two Guys Named Antti
|
Nov 24, 2021 |
060| Biometrics: Privacy, Problems and Possibilities
|
Nov 02, 2021 |
059| Keeping Your Latest Tech from Becoming the Latest Threat
|
Oct 11, 2021 |
058| Paths to Infosec: From ER to IR
|
Sep 20, 2021 |
057| Dark Web: The Good, the Bad, and the Ugly
|
Aug 17, 2021 |
056| To Ban or Not to Ban? Ransomware Payment Regulation
|
Jul 15, 2021 |
055| When AI Goes Awry
|
Jun 23, 2021 |
054| Ransomware Incident Response and the Role of Readiness
|
May 27, 2021 |
053| How to Secure Networks and Influence People
|
Apr 28, 2021 |
052| Challenges in Cloud Security
|
Apr 06, 2021 |
051| Looking at Phishing Through the Intrusion Kill Chain
|
Mar 11, 2021 |
050| Getting the Most out of Infosec Conferences
|
Feb 18, 2021 |
049| Ransomware 2.0, with Mikko Hypponen
|
Jan 19, 2021 |
048| The Year in Cyber: 2020
|
Dec 30, 2020 |
047| The Tangled Web of ID Theft
|
Dec 09, 2020 |
046| 10 Burning Mobile Security Questions, Answered
|
Nov 12, 2020 |
045| The Most Frightening Thing About Stalkerware, with Eva Galperin
|
Oct 05, 2020 |
044| 2020 in Cyber Threats, So Far: COVID-19's Effects, Ransomware's Latest Tricks
|
Sep 17, 2020 |
043| Paths to Infosec: Military Vs. Psychology
|
Aug 24, 2020 |
042| The Encryption Debate Rages On
|
Jul 30, 2020 |
041| The Ethics of Red Teaming
|
Jun 29, 2020 |
040| Can Contact Tracing Apps Preserve Your Privacy?
|
May 27, 2020 |
039| Deconstructing the Dukes: A Researcher's Retrospective of APT29
|
May 06, 2020 |
038| Mikko Hypponen on Zoom, COVID-19 Threats, and Working During a Pandemic
|
Apr 16, 2020 |
037| COVID-19 and Your Company's Security: The CISO Speaks
|
Mar 24, 2020 |
036| From Stuxnet to WannaCry to Coinhive, The Past Decade Was All Over The Place
|
Mar 16, 2020 |
035| Threat Hunting & Why It's All About People
|
Feb 19, 2020 |
034| Balancing AI: Privacy, Misuse, Ethics and the Future
|
Jan 29, 2020 |
033| Cyber Security Education from Student and Teacher Perspectives
|
Jan 08, 2020 |
032| How California's New Privacy Law Strikes Where the Pain Is
|
Dec 04, 2019 |
031| Filtered & Fragmented: Is True Internet Freedom a Thing of the Past?
|
Nov 12, 2019 |
030| Talking Infosec to Non-Infosec Folks
|
Oct 22, 2019 |
029| Ask a Hacker: Red Teamer Answers Listener Questions
|
Sep 25, 2019 |
028| When the Well is Poisoned: The Devastation of Supply Chain Attacks
|
Aug 29, 2019 |
027| The Connected Home Meets the IoT Tire Fire
|
Aug 03, 2019 |
026| Safe Browsing & Secure Web Development
|
Jul 04, 2019 |
025| The Psychology of Phishing
|
Jun 12, 2019 |
024| GDPR, One Year Later
|
May 15, 2019 |
023| Electronic Voting & Why it's So Hard to Get Right
|
Apr 23, 2019 |
022| Pro-Brexit Twitter Views Amplified by the Global Far Right
|
Apr 02, 2019 |
021| The Cloud: Security Benefits, Risks & Why You Should Use It
|
Mar 14, 2019 |
020| Defining Cyber Warfare, with Mikko Hypponen
|
Feb 11, 2019 |
019| The Best Defense is Good Offensive Security
|
Jan 23, 2019 |
018| Online Dating and Trading Data for Love (It's Complicated)
|
Dec 26, 2018 |
017| Year in Cyber: Forecasting 2019, Recapping 2018
|
Dec 10, 2018 |
016| Endpoint Protection & Beyond
|
Nov 19, 2018 |
015| Election Security, US Midterm Edition: The Big Picture
|
Oct 29, 2018 |
014| Reinventing the Cold Boot Attack: Modern Laptop Version
|
Oct 08, 2018 |
013| Passwords: A Hacker's Take on Cracking & Protecting Your Creds
|
Sep 14, 2018 |
012| Adventures in Red Teaming
|
Aug 23, 2018 |
011| The Rise of AI and Deliberate Deception
|
Aug 02, 2018 |
010| Ransomware Out, Cryptojacking In? Latest Cybercrime Trends
|
Jul 09, 2018 |
009| Top OpSec Tips for Vacation Travel
|
Jun 21, 2018 |
008| GDPR is Live. What Now?
|
May 31, 2018 |
007| Popping Hotel Locks: The Hard Truth About Hacking
|
May 09, 2018 |
006| Spring Cleaning for Opsec
|
Apr 26, 2018 |
005| Demystifying Hardware Security, with Andrea Barisani
|
Mar 29, 2018 |
004| Security, Privacy and the IoT, with Steve Lord
|
Mar 08, 2018 |
003| Data Breaches: Bridging the Gap
|
Feb 13, 2018 |
002| Breaking Into Infosec: Advice from an Ethical Hacker
|
Dec 21, 2017 |
001| Antivirus in the Hot Seat, with Mikko Hypponen
|
Nov 30, 2017 |