show episodes
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Welcome to theCUBE Podcast, where we provide you with the latest news and developments in the world of technology. Join us as we explore the exciting world of technology and its ever-evolving landscape. Tune in to gain valuable insights and stay up-to-date with the latest tech news.
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
The Security Perspectives Podcast is a show that explores the world of information security and provides valuable insights into starting and advancing a career in this exciting field. Hosted by Nikolas Behar, each episode features a guest who shares their unique perspective on the latest trends, challenges, and opportunities in information security. From red team operators to chief information security officers, guests offer valuable advice and practical tips for listeners looking to break i ...
  continue reading
 
Loading …
show series
 
Since 2022, Mandiant has tracked North Korean IT workers who, posing as non-North Koreans, secure employment in various industries to fund DPRK's weapons programs, often engaging in cyber intrusions with the help of foreign facilitators. In this episode, CyberScoop Editor-in-Chief Greg Otto talks with Mandiant’s Michael Barnhart on what is going on…
  continue reading
 
How can small nonprofits and civic organizations defend themselves against some of the most insidious malware on the planet? By reaching out to Elijah Baucom. The director of Citizen Clinic at UC Berkeley, Baucom runs a public-interest cybersecurity program that trains students to support organizations in defending against cyber threats. A digital …
  continue reading
 
🎙️ Catch the latest episode of #CryingOutCloud, where Amitai Cohen and Eden Koby Naftali tackle key cloud security challenges from AI Toolkit Risks to CUPS Vulnerabilities!Tune in to hear about:📌 Wiz Research discovered a vulnerability affecting the Nvidia container toolkit📌 Google's novel Info Stealers Mitigations📌 All the talk around the CUPS vul…
  continue reading
 
📢 Tune in for the special episode of Crying Out Cloud with @Gitlab 's Julie Davila! 🚀Join our Co-host Eden Koby Naftali and the cybersecurity leader Julie Davila, VP of Product Security at GitLab as they dive into:📌 Balancing transparency in open-source tooling with security risks.📌 Democratizing security: How GitLab empowers engineers to take owne…
  continue reading
 
Vicente Diaz, Threat Intelligence Strategist at VirusTotal, joins host Luke McNamara to discuss his research into using LLMs to analyze malware. Vicente covers how he used Gemini to analyze various windows binaries, the use cases this could help address for security operations, technical challenges with de-obfuscation, and more. For more on this to…
  continue reading
 
CyberScoop Editor-in-Chief Greg Otto was out at Mandiant's mWISE conference last week, and talked with Trellix’s head of threat intelligence, John Fokker, about a host of different subjects. In the first portion of the interview, Greg and John discuss how the Ransomware-as-a-Service landscape has changed in the past year, and how threat actors have…
  continue reading
 
Josh Fleischer, Principal Security Analyst with Mandiant's Managed Defense organization sits down with host Luke McNamara to discuss trends in MFA bypass and how threat actors are conducting adversary in the middle (AiTM) attacks to gain access to targeted organizations. Josh walks through a case study of MFA bypass, how token theft occurs, the inc…
  continue reading
 
AI is transforming how companies secure their IT infrastructure, especially in industries like airlines, health care, retail, and telecommunications, which rely on applications and APIs for seamless digital experiences. However, there's a risk of companies improperly deploying AI tools or using insecure vendors, potentially leading to widespread da…
  continue reading
 
Secure-by-design transforms secure code from an afterthought to an inherent feature, weaving a resilient shield directly into the fabric of every application and device from the ground up. But while everyone’s mind gravitates toward the ocean of software we all use, how does secure-by-design translate to the Internet of Things? In this episode, Cyb…
  continue reading
 
Host Luke McNamara is joined by Clement Lecigne, security researcher at Google's Threat Analysis Group (TAG) to discuss his work tracking commercial surveillance vendors (CSVs). Clement dives into the history and evolution of the CSV industry, how these entities carry out operations against platforms like mobile, and the nexus of this problem into …
  continue reading
 
If you want to understand cybersecurity policy, it’s not enough to focus on Washington D.C. — you have to also grok the American tech industry. Few people have bridged that divide more effectively than Ted Schlein, the legendary venture capitalist who is currently at Ballistic Ventures. On this episode of Safe Mode, he sits down with host Elias Gro…
  continue reading
 
With Election Day rapidly approaching in the United States, the Trump campaign claims that the first major hack-and-leak operation has arrived. After a handful of U.S. media outlets received leaked material on vice presidential candidate JD Vance, the Trump campaign said it had been the victim of an Iranian hacking operation. On this episode of Saf…
  continue reading
 
📢 From DDoS attacks to discovering a new cryptojacking campaign, tune in to our NEW episode of #CryingOutCloud to learn about all the latest cloud security news.Join our hosts Eden and Amitai as they dive into the latest cloud security stories:* SeleniumGreed: Wiz Research discovered a new cryptojacking campaign targeting SeleniumGrid* Why your Sta…
  continue reading
 
An epidemic of ransomware, cyberattacks on gas pipelines, Chinese infiltration of American critical infrastructure — these are just some of the cybersecurity issues the Biden administration has tackled during the president’s first term in office. With President Joe Biden’s time in office winding down, it’s worth taking stock: Has his administration…
  continue reading
 
📢 Tune in for an exclusive session with Ryan Kazanciyan on securing a security vendor, hyper-growth, and AI impact in the latest podcast episode of #CryingOutCloud!Join our hosts, Amitai Cohen and Eden Koby Naftali, as they dive into cloud security with Ryan Kazanciyan, our seasoned expert leading security at @Wiz.🔍 Episode Highlights:📌 Managing se…
  continue reading
 
AI governance regimes the world over have seized on compute thresholds as a mechanism for implementing various controls on artificial intelligence systems. The basic idea is that if an AI model relies on a sufficiently large amount of computing power, then various controls kick in. As AI models get larger, the thinking goes, they also get riskier, …
  continue reading
 
Mandiant APT Researcher Ofir Rozmann joins host Luke McNamara to discuss some notable Iranian cyber espionage actors and what they have been up to in 2024. Ofir covers campaigns from suspected IRGC-nexus actors such as APT42 and APT35-related clusters, as well as activity from TEMP.Zagros. For more on this topic, please see: https://blog.google/tec…
  continue reading
 
Around the world policymakers seem to be grappling with the same question: How best to govern artificial intelligence? The Center for Security and Emerging Technology, a Washington-based think tank, has emerged as a key and influential player in that conversation. And on this episode of Safe Mode, its executive director, Dewey Murdick, sits down wi…
  continue reading
 
📢 Tune in to Snowflake's Haider Dost for an exclusive session on Securing Databases, Cloud Threat Intelligence, and Detection strategies. The latest podcast episode of #CryingOutCloud is LIVE! Join our special hosts, @Alon Schindel and @Eden, as they dive deep into the world of cloud security with Haider Dost, Head of Global Threat Detection and Th…
  continue reading
 
We are living through an epidemic of ransomware. Last year alone, the amount paid to ransomware operators exceeded $1 billion, and the entities getting hit and seeing their operations disrupted by ransomware included hospitals, schools and libraries. Ransomware is both a public-health and national-security crisis, yet efforts to address the problem…
  continue reading
 
📢 From data privacy norms in the age of AI— tune in to the latest episode of #CryingOutCloud with all you need to know from the cloud security news 🚨 Join Eden Naftali and Amitai Cohen as they dive into:🔍 How a new AI processing cloud service is challenging data privacy norms. 🛡️ The implications of a potential firewall misconfiguration and how to …
  continue reading
 
When studying cyberoperations, it’s easy to become enamored with state-backed hackers. Russian and Chinese operations have done much to shape our understanding of how power is exercised online, but it’s not clear that the intense attention dedicated to such operations is well-placed. Amid the current epidemic of ransomware, criminal hacking groups …
  continue reading
 
Mandiant Consultants Trisha Alexander, Muhammed Muneer, and Pat McCoy join host Luke McNamara to discuss Mandiant's recently launched services for securing AI. They discuss how organizations can proactively approach securing the implementation of AI workloads, red-team and test these security controls protecting generative AI models in production, …
  continue reading
 
The proliferation of artificial intelligence is exposing teens to a new online threat: AI-generated sexual imagery. Heather Barnhart is a fellow at the SANS Institute and a digital forensic expert, and on this episode of Safe Mode she sits down with host Elias Groll to discuss how teenagers and their families can protect themselves against the scou…
  continue reading
 
In this week’s episode of theCUBE Pod, industry analysts John Furrier and Dave Vellante delve into the fierce competition between Snowflake and Databricks, focusing on their distinct strategies and market positions. Vellante highlights Databricks' faster growth and its cleaner revenue model, contrasting it with Snowflake's integration of AWS revenu…
  continue reading
 
Following Russia’s full-scale invasion of Ukraine, the Ukrainian power grid has come under sustained attack by Russian forces, and keeping it up and running has been a significant challenge. One of the major issues Ukrainian energy officials have had to confront is the way in which Russian electronic warfare systems have disrupted GPS, which is a k…
  continue reading
 
In this week’s edition of theCUBE Podcast, recorded during Snowflake's Data Cloud Summit, the discussion centered around the challenges of creating governance standards across various compute engines. Snowflake's strategy to open-source the Polaris Catalog and the importance of its Horizon solution for advanced governance were key topics.New episod…
  continue reading
 
To address AI risks, policymakers and technologists around the world have embraced the concept of AI red-teaming — the adversarial testing of AI models. But AI red-teaming is such a new concept that few people know how to conduct such tests. The discipline of AI red-teaming very much remains under development, but as AI systems are rolled out far a…
  continue reading
 
What is it like to be IBM's 'Chief Llama Officer'? 🦙 🎙️ Tune in as Jerry Bell shares his journey from crashing his first computer at 10 to leading IBM's Public Cloud SecurityWhat's on today's agenda?😲 Managing a popular 'Mastodon' server post-Twitter acquisition🛡️ Challenges and surprises as IBM's CISO 🔐 Insights on the security implications of M&A…
  continue reading
 
Mandiant consultants Will Silverstone (Senior Consultant) and Omar ElAhdan (Principal Consultant) discuss their research into cloud compromise trends over 2023. They discuss living off the land techniques in the cloud, the concept of the extended cloud attack surface, how organizations can better secure their identities, third party cloud compromis…
  continue reading
 
Loading …

Panduan Referensi Cepat