Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 3

For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal important technical and operational information. When… Continue reading Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 3

CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

We want to trust our employees and contractors working within our organizations. For the most part, people are doing their jobs with integrity every day. What happens when an employee decides to leave the organization and start their own business … Continue reading CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

Malicious Life Podcast: Inside the DarkSide Colonial Pipeline Attack

On Friday, May 7th, 2021, Colonial Pipeline suffered a cyberattack that forced the company to shut down its operations. As a result, gasoline outages were reported across the U.S. East Coast.
The post Malicious Life Podcast: Inside the DarkSide Co… Continue reading Malicious Life Podcast: Inside the DarkSide Colonial Pipeline Attack

Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 2

In China’s Unrestricted Cyberwarfare Part 1 we explored the story of two Chinese military officers, veterans of the semi-conflict with Taiwan, who helped shape the role of cyber in modern warfare in China and beyond with special guest Lieutenant C… Continue reading Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 2

CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets

We have limited investment dollars and therefore must ensure we are protecting the right assets. The practical side of determining “what” needs to be protected and “how” is a convoluted maze of academics, taxonomies, frameworks, and inconsistent a… Continue reading CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets

Malicious Life Podcast: The Untold Story of the RSA Breach Part 2

In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company’s flagship SecureID product, a solution that was in-use by thousands of high-profile clients around the world including the U…. Continue reading Malicious Life Podcast: The Untold Story of the RSA Breach Part 2

Malicious Life Podcast: The Untold Story of the RSA Breach Part 1

In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company’s flagship SecureID product. The solution was in-use by thousands of high-profile clients around the world, including the U.S…. Continue reading Malicious Life Podcast: The Untold Story of the RSA Breach Part 1

CISO Stories Podcast: Effective Health Care Security is More Than HIPAA

Healthcare security today is extremely complex due to the integrated clinical systems and connected community networks. As well, no longer are the medical records stored with a single provider.
The post CISO Stories Podcast: Effective Health Care… Continue reading CISO Stories Podcast: Effective Health Care Security is More Than HIPAA

Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 1

Back in the 1990s, cyberwarfare was a word rarely used in the West – and definitely unheard of in China, which was just taking its first steps on the Internet. Two Chinese military officers, veterans of the semi-conflict with Taiwan, helped shape … Continue reading Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 1

CISO Stories Podcast: Necessity is the Mother of Security

Tatu Ylönen, SSH founder and inventor of Secure Shell, discusses the genesis for the protocol and his keen interest in the application of technological solutions to fundamental cybersecurity challenges – check it out…
The post CISO Stories Podca… Continue reading CISO Stories Podcast: Necessity is the Mother of Security