Cybereason public
[search 0]

Download the App!

show episodes
 
Loading …
show series
 
The tables are finally turned, as Sam finds himself in the hot-seat. We join Sam’s brother, Red Curry, as he interviews Sam to find out more about their childhood, Sam’s journey into security, and his inspirations. What’s the significance we put on stories? What does it mean to “take in the strays”, and taking care of others? The post Special Inter…
 
Tatu and Sam discuss how the SSH protocol became “viral” when Tatu first created it in the mid-’90s. What led Tatu to dive, head first, into a field he knew little about when he first created SSH. What is the link between security and communication, and what fascinates Tatu so much about language and the transfer of ideas? The post Tatu Ylonen- Fou…
 
How did a fascination with languages lead to a decades-long career in Cryptology? Sam and Stephanie talk about her experience joining the Navy in the 1980’s, and how it eventually led her to the halls of the NSA. What’s the importance of finding the right path, and balancing passion for work with personal life? And why does Stephanie look to histor…
 
Sam and Wayman chat about their chaotic childhood, starting gangs, and climbing mountains. How does sharing information despite disagreement improves our security and society as a whole? And what did Wayman learn falling from the ceiling of a printer room, trying to “hack” into his school’s server room? The post Wayman Cummings- Director, Threat In…
 
Falun Gong is a religious movement heavily persecuted in China. In 2017, members of the movement sued Cisco Systems for aiding and abetting the Chinese government in this persecution – since Cisco helped China erect ‘Golden Shield'”: the massive Chinese IT infrastructure project which combined internet censorship and pervasive Chinese state cybersp…
 
The Great Firewall is just mind-bogglingly big, repressing freedom of speech and information for over 800 million Chinese internet users every year. The Great Firewall is so big that it’s worth asking: how did the Chinese manage to build it in the first place? 20 years ago, our info-sec technology was much less advanced than it is today. China was …
 
Ran & Israel Barak, Cybereason’s CISO, discuss the latest development in ransomware evolution: multi-stage attacks in which the attackers infiltrate the target network, steal data and gather intelligence – before detonating the ransomware to cause maximal denial-of-service to the victim organization. What does this new tactic mean for the use of ba…
 
In 2015 Bastian Obermayer, an investigative journalist for the Süddeutsche Zeitung, received a message every journalist dreams of: the biggest leak in journalism history. But dealing with the massive 2.7 Terabyte data-dump, 11.5 million documents – while making sure his source’s identity could not be uncovered, turned out to be a huge challenge. Th…
 
Conquering and exploring the world was Andreas’ first goal as a child, playing strategy games such as Risk and Civilization. Andreas and Sam talk about how this passion led to computers and eventually security. From securing mainframes to securing the biggest media group in Switzerland- what has Andreas learned over the years that helped shape his …
 
Hackers keep modifying and improving their methods of operations. Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason, tells us about the recent shift to Blackmail – as a way to pressure Ransomware victims to pay the ransom. Assaf’s Webinar will take place on July 14th, 2020. Register to the webinar at https://www.cybereason.com/ran…
 
First encountering computer technology with the Sinclair Spectrum, Keith Barros, Seton Hall CISO, went all-in on security early in his life. Join Sam and Keith for a discussion of American history, what history can teach us about modern security, how Keith’s passion for photography shapes his view on the world, and his advice for anyone coming into…
 
A black market economy has developed around Fortnite’s in-game currency. Cyber criminals are hacking user accounts, juicing credit cards, and selling virtual currency for real-life dollars and cents. To ensure fun and safety for players, the cycle must be stopped. CPRadio Podcast is available at: https://research.checkpoint.com/category/cpradio/ Th…
 
In 2017, Bitcoin was winning. Money, attention, success poured out of every seam. It appeared that a golden age had dawned. But just under the surface, the network was teetering on the verge of collapse. Technical problems that were just nuisances when the community was small now became glaring and potentially lethal. Debates among tight communitie…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login