Department Of Veterans Affairs public
[search 0]
More

Download the App!

show episodes
 
Hosted by Marine Corps Veteran Tanner Iskra, Borne the Battle recognizes each battle, challenge, and sacrifice our Veterans endure during and after their service, as well as spotlighting important resources, offices, and benefits VA offers our Veterans. The Department of Veterans Affairs does not endorse or officially sanction any entities that may be discussed in this podcast, nor any media, products or services they may provide.
 
Dedicated to making a difference in the lives of those who serve, Veterans and their families, Minnesota Military Radio brings you the latest news from Minnesota's proud military community including; the Minnesota National Guard, Minnesota Department of Veterans Affairs, Beyond the Yellow Ribbon and the Minneapolis VA. Whether it's the latest on veterans' benefits, historic stories of service or how you can help our troops and their families, this is your best source to stay up to speed. Wit ...
 
VHA:IE is an official podcast from the Department of Veterans Affairs that features frontline VA employees who are actively engaged in moving the agency forward by developing, implementing, scaling, and spreading innovative approaches and practices that evolve the health care system and improve the way VA serves Veterans. Each episode features a discussion with the employees behind several innovative programs out of the Veterans Health Administration, and sometimes a private-sector guest.
 
Join us to learn the leadership practices from C-Level Customer Experience executives at Airbnb, Walgreens, Audi, Premera, The Smithsonian Institute, Barney’s New York, and Adobe among others. They will fearlessly share with you what works...and what doesn’t work as we debunk this role, why it’s not about ”Kumbaya", but rather how the Chief Customer Officer is acting as the human duct tape of the organization - uniting companies to earn the right to customer-driven growth. Hosted by Jeanne B ...
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
 
Loading …
show series
 
Ben-Gurion University researchers have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled …
 
Energetic Bear is back, and maybe getting ready to go berserk in a network near you, Mr. and Mrs. United States. Someone’s selling publicly available voter and consumer information on the dark web. Sanctions against the GRU for the Bundestag hack. The US sanctions Qods Force and associated organizations for disinformation efforts. Johannes Ullrich …
 
Emailed election threats to US voters are identified as an Iranian influence operation, disruptive, and so more in the Russian style. Both Iran and Russia appear to be preparing direct marketing influence campaigns. Cyber criminals are also exploiting US election news as phishbait. Seedworm is said to be ‘retooling.” Caleb Barlow from Cynergistek o…
 
TrickBot came back, but so did its nemesis from Redmond--Microsoft and its partners have taken down most of the new infrastructure the gang reestablished. CISA publishes election rumor control. The Cyberspace Solarium Commission has a white paper on supply chain security. Japan says it will take steps to secure next summer’s Olympics. Joe Carrigan …
 
Doctors Molly Klote and Chad Kessler join this bonus episode of Borne the Battle to discuss the various ways VA is helping with the national effort to combat COVID-19. The two doctors are fighting it in very different, but equally important ways. Dr. Klote, VA’s director of Office Research Protections, Policy, and Education, oversees all the resear…
 
America’s NSA reviews twenty-five vulnerabilities under active exploitation by Chinese intelligence services. The UK’s NCSC accuses the GRU of more international cyberattacks. The US Justice Department brings its long-expected anti-trust suit against Google. Ben Yelin examines overly invasive company Zoom policies. Our guest is Jessica Gulick from …
 
Updates on influence ops and campaign hacking show that the opposition has its troubles, too. TrickBot operators seem to have returned to business. Schools’ remote learning programs are providing attractive targets for cybercriminals. Iranian news outlets say ports were the targets of last week’s cyberattacks. David Dufour explains how phishing cam…
 
This week's Borne the Battle features Air Force Veteran David Tenenbaum, the creator of Honor Media and Heroes Linked. From a young age, Tenenbaum wanted to help others in need. Inspired by his father, a Holocaust survivor liberated by US forces, he grew up with the stories of seeing good people standing against great injustice. Like the men who fr…
 
This week we learn about the new Minnesota Military Museum, meet with the commander of Camp Ripley and get an update from the Minnesota Association of County Veterans Service Officers. Guests include: Mark Ritchie – Global Minnesota Randal Dietrich – Minnesota Military Museum Brig. Gen. Lowell Kruse – Camp Ripley Marty Howes – Minnesota Association…
 
Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spoc…
 
Bitdefender researchers recently uncovered a sophisticated APT-style attack targeting an international architectural and video production company. The attack shows signs of industrial espionage, similar to another of Bitdefender’s recent investigations of the StrongPity APT group. The real-estate industry is highly competitive, and information exfi…
 
Phishing through redirector domains. Content moderation, influence operations, and Section 230. A Twitter outage is due to an error, not an attack. QQAAZZ money-laundering gang members indicted. Johannes Ullrich tracks Mirai Bots going after Amanda backups. Our guest is Richard Hummel from Netscout with research on cybersecurity trends and forecast…
 
Patti Phillips, CEO of Women's Leaders in College Sports, chats with me about the need for diversity in leadership, and she shares the experience she’s had while working in sports, an industry that’s notoriously male-dominated, and the need for more age and ethnicity representations in leadership positions. Additionally, Patti talks about how her t…
 
Tehran says this week’s cyberattacks are under investigation. Silent Librarian returns to campus for academic year 2020-2021. Crooks are posing as nation-state hackers. Domestic disinformation reported in Guinea and Ghana. Disinformation, content moderation, and the difficulties presented by both. US Cyber Command’s forward engagement campaign. Mik…
 
Reports of cyberattacks against Iranian government and, possibly, economic targets, are circulating, but details are sparse. Norway accuses Russia of hacking parliamentary emails. A cybercriminal gang’s secret is volume. A social engineering campaign singles out victims with US IP addresses. Joe Carrigan on a million dollar REvil recruitment offer.…
 
Trickbot gets hit by both US Cyber Command and an industry team led by Microsoft. CISA and the FBI warn that an unnamed threat actor is chaining vulnerabilities, including Zerologon, to gain access to infrastructure and government targets. Ben Yelin shares his thoughts on the US House’s report on monopoly status for some of tech's biggest players. …
 
According to the Centers for Disease Control & Prevention (CDC), 1 in 4 women and 1 in 10 men experience intimate partner violence (IPV) during their lifetime. Veterans suffering from post-traumatic stress disorder and traumatic brain injuries are at an even greater risk for IPV. Yet, both victims and perpetrators of IPV oftentimes don't seek help.…
 
Ben describes a decades-long global espionage campaign alleged to have been carried out by the CIA and NSA, Dave shares a story about the feds using cell phone location data for immigration enforcement, and later in the show our conversation with Drew Harwell from the Washington Post on his article on how Colleges are turning students’ phones into …
 
This week we focus on the Minneapolis VA Health Care System covering caregiver support and the future of the hospital and clinics all over the state. Guests include: Director Patrick Kelly- Minneapolis VA Health Care System Michael Reckard – Minneapolis VA Health Care System Jill Vinge – Minneapolis VA Health Care System Jessica Behrends – St. Clou…
 
Investigative journalist and author Geoff White talks about tracing a line through the dots of his career covering technology. Geoff shares that he has always been "quite geeky," but came to covering technology after several roles in the journalism industry. Newspapers, magazines and television were all media Geoff worked in before covering technol…
 
Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a new wave of sandboxing tools that use either unikernels, lightweight V…
 
A Parliamentary committee issues a scathing report on Huawei’s connection to the Chinese government and the Communist Party of China. Facebook takes down coordinated inauthenticity with a domestic focus in four countries. Twitter goes after influence operators in four other countries. Betsy Carmelite addresses threats to telehealth platforms. Our g…
 
Add the Bahamut cyber mercenaries to the shadow armies for hire in cyberspace. Reports associate the SlothfulMedia RAT with Chinese intelligence services, and claim that it’s being used against India and China. The US takes down domains the Islamic Revolutionary Guard Corps uses to push disinformation. Trends in phishbait. Caleb Barlow rethinks a T…
 
Cyber ops accompany fighting in the Caucasus. Iranian threat group exploits Zerologon in the wild. The Kraken gets unleashed in Southeast Asia, of all places. Emotet is back, and it’s after state and local governments. The US House identifies the Four Horsemen of Silicon Valley. Monero gains criminal market share. The US Comptroller of the Currency…
 
Spyware version of Mirai detected in the wild. The People’s Liberation Army is told, by its government, to lighten up on US election stories. Centripetal wins a major patent lawsuit. Excel is not a big data tool. John McAfee is arrested on US tax charges. Our guest is Roger Barranco from Akamai on tracking increased DDoS attacks. Ben Yelin on a cas…
 
Attacks on maritime shipping organizations raise concerns about global supply chains. Someone’s pushing spyware through the firmware. Someone else is messing with the heads of Trickbot’s masters. A new ransomware strain, Egregor, shows again that a ransomware attack amounts to a data breach. Huawei may be losing ground in Europe. Mike Benjamin from…
 
This week’s Borne the Battle features Marine Veteran Stephen Kupryk, also known as the WWE Smackdown superstar and Forgotten Sons member, Steve Cutler. In this episode, Kupryk talks about how his participation in high school athletics and the influence of 9/11 took him down a road which would ultimately land him in the country’s premier wrestling p…
 
This week we talk with the Mayo Clinic about care for our Veterans, get an update from Fort Snelling National Cemetery and check in with the Minnesota Patriot Guard. Guests include: Dr. Pierre Noel – Mayo Clinic Maria Baer – Mayo Clinic John Knapp – Fort Snelling National Cemetery Tim Leonhardt – Minnesota Patriot Guard https://MinnesotaMilitaryRad…
 
Commandant for the National Security Agency's National Cryptologic School Diane M. Janosek shares the story of her career going global Diane explains how she's always been drawn to doing things that could help and raise the nation. From a position as a law clerk during law school, to the role of a judicial clerk, and joining the White House Counsel…
 
Threat actors and cybercriminals that don’t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is available via a Dark Web Onion site. At least two threat actors are operating the site, providing ransomware that can be used to target Windows, macOS, and Linux…
 
SlothfulMedia is the new RAT in town. Emotet spam counts on political commitments. ESET describes two distinct spyware campaigns in the Middle East and Eastern Europe. Hackers are paying more attention than usual to the maritime sector. Awais Rashid from the University of Bristol on privacy concerns of contact tracing apps. Our guest is Krystle Por…
 
It was a pleasure for me to interview Chelsie Rae Lee, the Chief Revenue Officer at SnackNation for the second time on my podcast. Though Chelsie Rae Lee is the company's CRO, she’s also responsible for the sales team, customer experience, and customer success. Chelsie and I chat about how she’s worked with her teams to shift business operations du…
 
Two ransomware incidents now seem worse than originally believed. Hacking hospitals raises concerns for patient safety. It appears Fancy Bear was the group that hacked the US Federal agency CISA warned about recently. Chris Novak from Verizon considers whether investigations should be performed under attorney client privilege and if that privilege …
 
Ransomware gangs continue to look for an opportunistic payday. Another exposed database is found, and secured. Captchas and padlock icons have their place, but they’re not a guarantee of security. Microsoft explains how to reduce exposure to Zerologon. The US looks to reduce dependence on foreign microelectronics. Joe Carrigan has thoughts on Faceb…
 
Three (count ‘em) three big ransomware attacks are in progress. One of them has moved into its doxing phase. Microsoft resolves authentication problems that briefly disrupted services yesterday. Tracking trends in cyberattacks--the sophistication seems to lie in the execution. The US Defense Department now has an interim rule implementing its CMMC …
 
The TikTok ban has been delayed; the November goal for the company’s change in ownership still stands, at least for now. Microsoft takes down infrastructure used by a Chinese cyberespionage group. Huawei’s CFO returns to court in Vancouver. The UK shows some of its cyber offensive hand. DDoS in Hungary; malware in Texas. The strange and sad case of…
 
This week's Borne the Battle features Army Veteran Erika Land, who shares the story of how she changed her suicide letter into “War Song.” Before 9/11, Erika joined the Army as a pharmacy technician. Her job was to dispense medications in the emergency department. At work, she experienced pain, sorrow, anger, anxiety, depression and helplessness. A…
 
This week we learn about an upcoming deployment of the 1st Brigade, 34th Infantry Division, discuss Veteran Suicide Prevention with the Minnesota Department of Veterans Affairs and get an update from the Minneapolis VA Health Care System. Guests include: Col. Tim Kemp – 1st Armored Brigade Combat Team, 34th Infantry Division Paula Newinski – Minnes…
 
Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there.…
 
Throughout March and April, QuoIntelligence (QuoINT) observed four attacks (i.e. sightings) utilizing various tools from the Golden Chickens (GC) Malware-as-a-Service (MaaS) portfolio – they recently declassified their findings, after first notifying their clients. Further, during their analysis of the sightings, QuoIntelligence confirmed the GC Ma…
 
Facebook takes down three Russian networks for coordinated inauthenticity: a lot of activity but not much evident ROI. Russia calls for confidence-building measures in cyberspace. CISA detects a successful incursion into an unnamed Federal agency. Governments warn of heightened rates of cyberattacks against medical organizations. Mike Benjamin from…
 
Zerologon is being actively exploited in the wild. The OldGremlin ransomware gang picks on Russian targets. Thought Fancy Bear was done with NATO? (Think again.) The US Treasury Department sanctions more organizations and individuals for malign influence operations. Betsy Carmelite from BAH on vaccine laboratory cybersecurity. Our guest is Shena Th…
 
Facebook takes down coordinated inauthenticity. A ransomware-involved death is attributed to DoppelPaymer. CISA and the FBI warn of coming election disinformation. LokiBot is back in a big way. Operation DisrupTor collars a hundred-seventy Darknet contraband merchants. Joe Carrigan comments on the botched ransomware attack in Germany that led to a …
 
In an unusual lapse, Microsoft briefly left a Bing backend server exposed online--now fixed. Sources say the CIA has concluded that Russian President Putin is personally involved in setting the direction of operations designed to influence the US elections, The deal to spin out TikTok Global to avoid a US ban may not be enough, Europe looks for mor…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login