Inside Security Intelligence

By Recorded Future

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Tech News

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 2
Reviews: 0
Episodes: 243

Description

Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about the world of cyber threat intelligence.

Episode Date
242 The 2022 Threat Intelligence Outlook
Jan 20, 2022
241 Cybersecurity First Principles
Jan 10, 2022
240 Mitigating Synthetic Identity Security Risks
Jan 03, 2022
239 DDoS Defenses Divide and Conquer
Dec 20, 2021
238 Shielding the Nuclear Arsenal From Cyber Attacks
Dec 13, 2021
237 Protecting Veterans from Targeted Online Scams
Dec 06, 2021
236 Preparing for the Next Ransomware Generation
Nov 29, 2021
235 CISA's Collaborative Mission of Public Private Partnerships
Nov 22, 2021
234 Deepfakes and Synthetic Media Ethics Explained
Nov 15, 2021
233 FIN7 Group Lures Cyber Pros With Fake Jobs
Nov 08, 2021
232 Influencing International AI Policy with ForHumanity
Nov 01, 2021
231 Evaluating the WeTheNorth Illicit Online Forum
Oct 25, 2021
230 Maximizing the Value of Open Source Intelligence
Oct 18, 2021
229 Cryptocurrency is a Double Edged Sword
Oct 11, 2021
228 Ransomware Remains a Serious Threat
Oct 04, 2021
227 Correspondent Dina Temple-Raston Joins The Record
Sep 27, 2021
226 The Cozy Relationship Between Russian State and Criminal Actors
Sep 20, 2021
225 Complex Networks and the Cyber Social Terrain
Sep 13, 2021
224 The Wild Ride Toward Actionable Security Analytics
Sep 06, 2021
223 Cyber Citizenship Education is Essential
Aug 30, 2021
222 Action is Critical in US Cyber Policy
Aug 23, 2021
221 Establishing Cyber Rules of the Road with Russia
Aug 16, 2021
220 Understanding Ransomware
Aug 09, 2021
219 China's Ambitions Toward Digital Colonization
Aug 02, 2021
218 You're Not Really Ready for Ransomware
Jul 26, 2021
217 Cutting Through the Cyber Security Noise and Chaos
Jul 19, 2021
216 Rallying Security Intelligence With the Pride Community
Jul 12, 2021
215 A Pivotal Moment for Cyber Insurance
Jun 28, 2021
214 Rage Against the HackMachine
Jun 21, 2021
213 A Nuanced Approach to Insider Threats
Jun 14, 2021
212 Thwarting Upstream Code Flaws From Reaching the Supply Chain
Jun 07, 2021
211 The DOD's SWAT Team of Nerds
May 31, 2021
210 The Challenges and Solutions of Cybersecurity Policy Decisions Today
May 24, 2021
209 Unpacking the Emotet Takedown
May 17, 2021
208 Bringing Tools of National Power to Fight Ransomware
May 10, 2021
207 Navigating the Travel Industry with Threat Intelligence
May 03, 2021
206 Malware Party Tricks and Cybersecurity Trends
Apr 26, 2021
205 Protecting Journalists Online
Apr 19, 2021
204 The Inner Workings of Financially Motivated Cybercrime
Apr 12, 2021
203 Streamlining Third Party Risk Management
Apr 05, 2021
202 Ransomware and Extortion Evolve More Brazen Tactics
Mar 29, 2021
Bonus — CyberWire CSO Perspectives with Rick Howard
Mar 24, 2021
201 An Internet Born In a Threat-Free Environment
Mar 22, 2021
200 The Journey Ahead is the Challenge in ICS
Mar 15, 2021
199 A Call to Arms In Favor of Rationality
Mar 08, 2021
198 Leaders Make Good News Out of Bad
Mar 01, 2021
197 Deepfakes as a Service
Feb 22, 2021
196 A Secure Environment Where People Can Be Their Whole Selves
Feb 15, 2021
Unraveling Disinformation in Social Media
Feb 08, 2021
194 White House Experience Informs Venture Capital
Feb 01, 2021
193 Correlating the COVID-19 Opportunist Money Trail
Jan 25, 2021
192 Technology and Human Stories Intersect at the International Spy Museum
Jan 18, 2021
191 Solarwinds Orion Breach Investigations Continue
Jan 11, 2021
190 AI Enables Predictability and Better Business
Jan 04, 2021
189 Threat Hunting Offsets the Technology Gaps
Dec 21, 2020
188 Visionaries, Builders, and Operators
Dec 14, 2020
187 An Ability to Execute and a Fantastic Amount of Luck
Dec 07, 2020
186 Countering 5G Conspiracy Theories
Nov 30, 2020
185 Cyber is as Much Psychology as it is Technology
Nov 23, 2020
184 Inside the World of Cyber Venture Capital
Nov 16, 2020
183 Trickbot is Down But Not Out
Nov 09, 2020
182 Give Analysts Exactly What They Want
Nov 02, 2020
181 Too Sleepy to be Secure?
Oct 26, 2020
180 The FBI Builds Enduring Partnerships in Cyber
Oct 19, 2020
179 The Fascinating Paradox of Cryptocurrency
Oct 12, 2020
178 Examining Russian Threats to the 2020 Election
Oct 05, 2020
177 Delivering Maximum Impact in the Public Sector
Sep 28, 2020
176 Curating Your Personal Security Intelligence Feed
Sep 21, 2020
175 Passion, Curiosity, and a Dash of Mischief
Sep 14, 2020
174 The Highest Security Intelligence in the Shortest Time
Sep 07, 2020
173 The Diversity of Security Challenges in Higher Education
Aug 31, 2020
172 Launching the Cyber Intelligence News Site The Record by Recorded Future
Aug 24, 2020
171 The Transformation of Managed Security Services
Aug 17, 2020
170 Defending MacOS Against Sophisticated Attacks
Aug 10, 2020
169 Making Security Real in the Context of Business
Aug 03, 2020
168 Ransomware Negotiations and Original Hacker Culture
Jul 27, 2020
167 The Emerging Role of SASE and the Cloud
Jul 20, 2020
166 Inside the Adversary Exploit Process
Jul 13, 2020
165 Empowering Cyber Startups in the UK
Jul 06, 2020
164 A Grab Bag of Pulse Reports
Jun 22, 2020
163 Tooling up to Protect Federal, State, and Local Governments
Jun 15, 2020
162 Broadening Your View With Security Intelligence
Jun 08, 2020
161 The Ultimate Job for a Network Defender
Jun 01, 2020
160 The Essential Skills of Evaluating and Communicating Risk
May 25, 2020
159 Making the Framework for Threat Intelligence Easy
May 18, 2020
158 Planning for Resilience and Eventuality Amidst Global Cyber Threats
May 11, 2020
157 Promoting International Understanding and Trust
May 04, 2020
156 Blazing the Threat Hunting Trail
Apr 27, 2020
155 Faster Decisions Through Automation
Apr 20, 2020
154 The Business Case for Risk-Based Cybersecurity
Apr 13, 2020
153 A Culture of Drive, Work Ethic, and Attention to Detail
Apr 06, 2020
152 Mitigating Threat Actors’ Shift Toward Automation
Mar 30, 2020
151 Meeting the Security Challenges of a Global Pandemic
Mar 23, 2020
150 A Healthy Respect for Ransomware
Mar 16, 2020
149 A Nuanced Approach to MSSP and MDR Services
Mar 09, 2020
148 Gamification of Incident Response in the Cyber Range
Mar 02, 2020
147 Security That Fits the Needs of the Organization
Feb 24, 2020
146 Security Wisdom from the FS-ISAC
Feb 17, 2020
145 Understanding Russia's Global Online Influence
Feb 10, 2020
144 A Journalist's Perspective on Global Cyber Threats
Feb 03, 2020
143 Teachers, Trainers, and Educators
Jan 27, 2020
142 The Physical and the Digital of Open Source Intelligence
Jan 20, 2020
141 Threat Intelligence is the Centerfold
Jan 13, 2020
140 Protecting the Financial Sector Never Goes Out of Style
Jan 06, 2020
139 The Value in Sharing Your Experience With the World
Dec 30, 2019
138 Insights From a Distinguished Law Enforcement Veteran
Dec 16, 2019
137 Traveling the Globe With Threat Intelligence
Dec 09, 2019
136 Threat Hunting, Mentoring, and Having a Presence
Dec 02, 2019
135 From Infamous MySpace Wormer to Open Source Advocate
Nov 25, 2019
134 Solving the Business Challenges of Governance, Risk, and Compliance
Nov 18, 2019
133 Security Intelligence in the Digital Transformation
Nov 11, 2019
132 Municipalities Face Unique Cybersecurity Challenges
Nov 04, 2019
131 Never Underestimate Threat Actors' Persistence
Oct 28, 2019
130 Strategy and Focus Protect New York City
Oct 21, 2019
129 Cybersecurity is National Security
Oct 14, 2019
128 Understanding Social Engineering and Maintaining Healthy Paranoia
Oct 07, 2019
127 Disinformation for Sale
Oct 01, 2019
126 Intelligence from Internet Background Noise
Sep 24, 2019
125 Coming to a City or Town Near You: Ransomware
Sep 16, 2019
124 The Intersection of Political Science, Risk Management, and Cybersecurity
Sep 09, 2019
123 Crowdsourcing Phishing Defenses for Herd Immunity
Sep 03, 2019
122 Hong Kong Protests and the Rise of Online Influence Operations
Aug 27, 2019
121 The Art and Science of SOAR
Aug 19, 2019
120 Pioneering Threat Intelligence Before It Had a Name
Aug 16, 2019
119 The Inevitable Evolution of SIEMs
Aug 05, 2019
118 Public Safety, Digital Forensics, and SOAR
Jul 29, 2019
117 A Passion for Pen Testing
Jul 22, 2019
116 Darknet DDoSer Does Damage to Dread
Jul 15, 2019
115 Intelligence for the OSINT Curious
Jul 08, 2019
114 Unwrapping Fishwrap, a New Social Media Misinformation Methodology
Jul 01, 2019
113 Being Courageous, Curious, and Thoughtful in Cybersecurity
Jun 24, 2019
112 Making the Most of the NIST Cybersecurity Framework
Jun 17, 2019
111 The Threat Intelligence Value Proposition
Jun 10, 2019
110 Advocating OWASP, Securing Elections, and Standing Your Ground
Jun 03, 2019
109 Applying Threat Intelligence Throughout Your Organization
May 28, 2019
108 Investing in Technology, Innovative Leaders, and Yourself
May 20, 2019
107 A Risk-Based Approach From Spammers to Nation-States
May 13, 2019
106 A Fresh Take on Defining Threat Intelligence
May 06, 2019
105 StubHub Leverages Empathy and Emotional Intelligence for Threat Hunting
Apr 29, 2019
104 Information Security Is Not an IT Risk, It's a Business Risk
Apr 22, 2019
103 Business Outcomes and the CISO's Success
Apr 15, 2019
102 Approaching Privacy as a Business Plan for Data
Apr 08, 2019
101 Questions to Ask When Shopping for Threat Intelligence
Apr 01, 2019
100 The grugq Illuminates Influence Operations
Mar 25, 2019
099 Chinese Charm Attempts to Alter American Political Opinion
Mar 18, 2019
098 Tools, Training, and Threat Intelligence Empower Phishing Defense description
Mar 11, 2019
097 Security Needs to Be Easy to Use and Easy to Explain
Mar 04, 2019
096 Ransomware Trends to Watch in 2019
Feb 25, 2019
095 The Challenges of Authentication at Scale and Quantifying Risk
Feb 18, 2019
094 The Value Proposition of Finished Intelligence
Feb 11, 2019
093 Active Threat Hunting Within Your Organization
Feb 04, 2019
092 Managing Third-Party Risk in Real Time
Jan 28, 2019
091 NopSec Analyzes the NVD for Their Annual Risk and Vulnerability Report
Jan 21, 2019
090 Secure Identity and Access Management
Jan 14, 2019
089 Putting Artificial Intelligence to Work
Jan 07, 2019
088 Pioneering Proactive Approaches to Power Protection
Dec 31, 2018
087 Leadership and Buy-In Help Protect BT's Global Networks
Dec 17, 2018
086 Bringing Collaboration to Real-Time Data Feeds
Dec 10, 2018
085 Controlling Online Access in Yemen's War Zone
Dec 03, 2018
084 Bringing Intelligence Community Experience to the Private Sector
Nov 26, 2018
083 The What? So What? and the Why? Why? Why?
Nov 19, 2018
082 Bringing Government Experience to Financial Services Security
Nov 12, 2018
081 Thwarting Organized Crime and Protecting Major Telecoms
Nov 05, 2018
080 Blending Threat Intelligence With Cyber Risk Frameworks
Oct 29, 2018
079 Advanced Security Tactics From Down Under
Oct 22, 2018
078 Intelligence Sharing to Protect Ourselves and Each Other
Oct 15, 2018
077 Threat Intelligence by the Book
Oct 08, 2018
076 Infect Others With Your Security Passion
Oct 01, 2018
075 Dr. Johannes Ullrich and the SANS Internet Storm Center
Sep 24, 2018
074 Fears of GDPR-Triggered Spam So Far Unfounded
Sep 17, 2018
073 Protecting the Brand, Products and People at Perdue Farms
Sep 10, 2018
072 Russia's Vulnerability Database Focuses Inward
Sep 04, 2018
071 A European View of Cyber Security
Aug 27, 2018
070 Chinese Espionage Activity Tracks Economic Development Efforts
Aug 20, 2018
069 A CISO's Journey From City to the Private Sector
Aug 13, 2018
068 Protecting Missiles From Malware
Aug 06, 2018
067 Quantifying Cyber Risk
Jul 30, 2018
066 Securing Your Firmware
Jul 23, 2018
065 Enabling Deeper Board-Level Understanding
Jul 16, 2018
064 How to Keep Finished Intelligence Fresh
Jul 09, 2018
063 Protecting Critical Infrastructure
Jul 02, 2018
062 Securing the C-Suite
Jun 25, 2018
061 How to Empower Teams With Threat Intelligence
Jun 18, 2018
060 Optimizing the Intelligence Cycle at Optum
Jun 11, 2018
059 Keeping Verizon's DBIR Trusted and Relevant
Jun 04, 2018
058 McAfee's Steve Povolny Leads Threat Research
May 29, 2018
057 ICS Security Concerns Explained
May 21, 2018
056 Iran Retaliation Likely After Nuclear Deal Dropped
May 14, 2018
055 Former GCHQ Andy France Targets Big Cyber Problems
May 07, 2018
054 NYC CISO Geoff Brown on Public Privacy and Security
Apr 30, 2018
053 The Importance of Adversarial Focus
Apr 23, 2018
052 7 of the Top 10 Vulnerabilities Target Microsoft
Apr 16, 2018
051 Graham Cluley on Privacy, IoT Risks, and Ransomware
Apr 09, 2018
050 CSO Jim Routh Leads Aetna’s Pioneering Security Team
Apr 02, 2018
049 Optiv’s Stu Solomon on Threat Intelligence in a Changing Industry
Mar 25, 2018
048 Resiliency in the Face of High-Profile Breaches and Trendy Threats
Mar 19, 2018
047 Chinese Government Alters Threat Database Records
Mar 09, 2018
046 False Flags From Olympic Destroyer
Mar 05, 2018
045 McAfee's Michael Rea on Managing Formal Intelligence Requirements
Feb 26, 2018
044 Takeaways From the Gartner Threat Intelligence Market Guide
Feb 19, 2018
043 Litecoin Set to Leapfrog Leading Cryptocurrencies
Feb 12, 2018
042 Understanding Your Environment and Communicating the Threat
Feb 05, 2018
041 Where Does a SIEM Fit In?
Jan 29, 2018
040 North Korea Targets South Korean Cryptocurrency
Jan 22, 2018
039 Protecting Philips Healthcare From Cyber Threats
Jan 15, 2018
038 The 5 Most Relevant Questions for a SOC Analyst
Jan 08, 2018
037 2017 Cybersecurity in Review and Predictions for the New Year
Jan 02, 2018
036 Dispelling Cybersecurity Myths
Dec 18, 2017
035 Predicting Future Threats With Machine Learning
Dec 11, 2017
034 ICS is Serious Business, But There's No Need to Panic
Dec 04, 2017
033 AI, Robots, and Cyborgs — Inside IoT with Chris Poulin
Nov 27, 2017
032 The Practical in Practice — Use Cases for Threat Intelligence
Nov 20, 2017
031 No Phishing Allowed
Nov 13, 2017
030 A Look Into the Thriving Dark Web Criminal Market
Nov 06, 2017
029 Why Does the U.S. Lag Behind China in Vulnerability Reporting?
Oct 30, 2017
028 Know the Threat to Beat the Threat
Oct 23, 2017
027 The Facts on Equifax With John Wetzel
Oct 09, 2017
026 NYC CISO Geoff Brown Protects the Greatest City in the World
Oct 02, 2017
025 TTPs From A Through Z With Levi Gundert
Sep 25, 2017
024 Protecting a Global Telecommunications Company
Sep 18, 2017
023 Analyst and Fantasy Author Myke Cole
Sep 11, 2017
022 Follow the Money: Threat Intelligence for Financial Institutions
Sep 05, 2017
021 Chasing Risky Internet Business
Aug 28, 2017
020 Russia Revisited: How Did We Get Here?
Aug 21, 2017
019 Women in Intelligence: Navigating a Male-Dominated Field
Aug 14, 2017
018 North Korea's Not So Crazy After All
Aug 07, 2017
017 Black Hat and DEF CON 2017 Recap
Jul 31, 2017
016 Making Sense of Artificial Intelligence and Machine Learning
Jul 24, 2017
015 Becoming an Analyst Part 2: Educational Foundations
Jul 17, 2017
014 WannaCry About NotPetya?
Jul 10, 2017
013 Be Vewy Vewy Quiet: We’re Hunting Threats
Jul 03, 2017
012 Best Practices in Threat Intelligence
Jun 26, 2017
011 Building a Threat Intelligence Company
Jun 19, 2017
010 Becoming an Analyst Part 1: Insights From Former Government Analysts
Jun 12, 2017
009 From Russia With Lulz
Jun 05, 2017
008 Military Meets Commercial Threat Intelligence
May 29, 2017
007 Analyzing the Insider Threat
May 22, 2017
006 Insikt: Insights to Intelligence
May 15, 2017
005 Ransomware by the Book
May 08, 2017
004 Going Dark: Fact vs. Fiction on the Dark Web
May 01, 2017
003 It’s Cheap, It’s Easy, It’s Dangerous: Karmen Ransomware Hits the Criminal Black Market
Apr 24, 2017
002 Feeding Frenzy: The Inside Scoop on Threat Intelligence Feeds.
Apr 17, 2017
001 What Exactly Is Threat Intelligence?
Apr 10, 2017