2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Solution Spotlight: Progress on the National Cyber Workforce and Education Strategy. [Special Edition]

    Solution Spotlight: Progress on the National Cyber Workforce and Education Strategy. [Special Edition]

    On this Solution Spotlight, guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach (and how it's not only about hiring) with N2K President Simone Petrella.

    Seeyew shares a progress report on the National Cyber Workforce and Education Strategy nearly one year out.

    For more information, you can visit the press release: National Cyber Director Encourages Adoption of Skill-Based Hiring to Connect Americans to Good-Paying Cyber Jobs.

    The progress report Seeyew and Simone discuss can be found here: National Cyber Workforce and Education Strategy: Initial Stages of Implementation. 
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 35 min
    E-commerce or E-spying?

    E-commerce or E-spying?

    Arkansas sues Temu over privacy issues. Polyfil returns and says they were wronged. An NYPD database was found vulnerable to manipulation. Google slays the DRAGONBRIDGE. Malwarebytes flags a new Mac stealer campaign. Patch your gas chromatographs. Microsoft warns of an AI jailbreak called Skeleton Key.  CISA tracks exploited vulnerabilities in GeoServer, the Linux kernel, and Roundcube Webmail.  In our  'Threat Vector' segment, host David Moulton speaks with Jim Foote, CEO of First Ascent Biomedical, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. Metallica is not hawking metal crypto. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    Threat Vector Segment
    In this segment of the Palo Alto Networks podcast 'Threat Vector,' host David Moulton speaks with Jim Foote, CEO of First Ascent Biomedical, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. They discuss how Foote's personal experience with his son's cancer diagnosis drove him to apply cybersecurity principles in developing an innovative approach, called Functional Precision Medicine, which tailors cancer treatment to individual patients. The conversation also covers the role of mentorship, the importance of interdisciplinary skills, and the transformative potential of AI in both cybersecurity and medical fields. You can listen to the full episode here. 

    Selected Reading
    Arkansas AG lawsuit claims Temu’s shopping app is ‘dangerous malware’ (The Verge)
    Polyfill claims it has been 'defamed', returns after domain shut down (Bleeping Computer)
    NYPD officer database had security flaws that could have let hackers covertly modify officer data (City & State New York)
    Google TAG: New efforts to disrupt DRAGONBRIDGE spam activity (Google)
    ‘Poseidon’ Mac stealer distributed via Google ads (Malwarebytes)
    Gas Chromatograph Hacking Could Have Serious Impact: Security Firm (SecurityWeek)
    Microsoft warns of novel jailbreak affecting many generative AI models (CSO Online)
    CISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilities (SecurityWeek)
    Metallica’s X account hacked to promote crypto token (Cointelegraph)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 29 min
    2024 Cyber Talent Study by N2K and WiCyS. [Special Edition]

    2024 Cyber Talent Study by N2K and WiCyS. [Special Edition]

    Maria Varmazis, N2K host of T-Minus Space Daily, talks with WiCyS Executive Director Lynn Dohm and N2K's Simone Petrella, Dr. Heather Monthie, and Jeff Welgan about the 2024 Cyber Talent Study.

    N2K and WiCyS have come together under a common mission to attract, retain, and advance more women in cybersecurity. Together, we strive to support women throughout their career journey, and secure the future of our industry.  

    This groundbreaking report leverages skills data from the professional members of Women in CyberSecurity (WiCyS), and offers valuable insights into cybersecurity competencies within the industry. The Cyber Talent Study establishes a new benchmark for understanding the capabilities and potential of women in cybersecurity, and can be used to inform both individual training needs and organizational strategies for career advancement and skills enhancement. 

    Resources:

    Landing page: WiCyS Partners with N2K to deepen understanding of cyber competencies within the industry.


    Study Launch article: WiCyS Partners with N2K Networks for Pioneering Cyber Talent Study.



    Key Takeaways:


    Outstanding Performance: WiCyS members have demonstrated exceptional performance across several key areas of the NICE Framework, underscoring the importance of WiCyS’s training and development programs.


    Strategic Insights: Analysis revealed remarkable strengths and areas for development, providing WiCyS with actionable data to tailor future programs and initiatives and ensure its members remain at the forefront of cybersecurity excellence.


    Actionable Insights for Cybersecurity Workforce Development: The study revealed critical areas for targeted development to enhance cybersecurity workforce readiness. This insight empowers WiCyS to tailor its programs specifically to meet the diverse needs of its members, ensuring all participants are prepared to take on significant roles and lead in the cybersecurity industry.


    Leadership Readiness Among WiCyS Members: The study highlights that WiCyS members are highly skilled and uniquely prepared for leadership roles within the cybersecurity industry.


    Proven Expertise in Critical Cybersecurity Domains: The data show the outstanding capabilities of WiCyS members within the cybersecurity landscape. Excelling in nearly every N2K Functional Area mapped to the NICE Framework, WiCyS members have shown they not only meet but exceed the standards in key domains.


    You can access the final report of the 2024 Cyber Talent Study here.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 43 min
    LockBit picks a brawl with banks.

    LockBit picks a brawl with banks.

    LockBit drops files that may or may not be from the Federal Reserve. Progress Software patches additional flaws in MOVEit file transfer software. A popular polyfil open source library has been compromised. DHS starts staffing up its AI Corps. Legislation has been introduced to evaluate the manual operations of critical infrastructure during cyber attacks. Researchers discover a new e-skimmer targeting CMS platforms. A breach at Neiman Marchus affects nearly 65,000 people. South African health services grapple with ransomware amidst a monkeypox outbreak.  Medusa is back. On the Learning Layer, Sam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. The VA works to clear the backlog caused by the ransomware attack onChange Healthcare.
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, which includes a simulated Computer Adaptive Test (CAT) final exam.
    Sam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. Good luck Joe!

    Selected Reading
    Lockbit Leaks Files for Evolve Bank & Trust in Its Alleged ‘Federal Reserve’ Data Dump (Metacurity)
    Progress Software warns of new vulnerabilities in MOVEit Transfer and MOVEit Gateway (Cyber Daily)
    Polyfill supply chain attack hits 100K+ sites (Sansec)
    Exclusive: DHS hires first 10 AI Corps members (Axios)
    US House bill seeks to assess manual operations of critical infrastructure during cyber attacks (Industrial Cyber)
    Caesar Cipher Skimmer targets popular CMS used by e-stores (Security Affairs)
    Neiman Marcus confirms breach. Is the customer data already for sale? (Malwarebytes)
    South Africa’s national health lab hit with ransomware attack amid mpox outbreak (The Record)
    New Medusa malware variants target Android users in seven countries (Bleeping Computer)
    After Crippling Ransomware Attack, VA Is Still Dealing with Fallout, Trying to Pay Providers (Military.com)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 33 min
    U.S. and China dance the telecom tango.

    U.S. and China dance the telecom tango.

    The US scrutinizes Chinese telecoms. Indonesia’s national datacenter is hit with ransomware. RedJulliett targets organizations in Taiwan. Researchers can tell where you are going by how fast you get there. A previously dormant botnet targeting Redis servers becomes active. Thousands of customers may have had info compromised in an attack on Levi’s. A new industry alliance hopes to prevent memory-based cyberattacks. Guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach with N2K President Simone Petrella. Assange agrees to a plea deal.
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Solution Spotlight, guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach (and how it's not only about hiring) with N2K President Simone Petrella. Seeyew shares a progress report on the National Cyber Workforce and Education Strategy nearly one year out. For more information, you can visit the press release: National Cyber Director Encourages Adoption of Skill-Based Hiring to Connect Americans to Good-Paying Cyber Jobs. The progress report Seeyew and Simone discuss can be found here: National Cyber Workforce and Education Strategy: Initial Stages of Implementation. 

    Selected Reading
    Exclusive: US probing China Telecom, China Mobile over internet, cloud risks (Reuters) 
    Indonesian government datacenter locked down in $8M ransomware rumble (The Register)
    Taiwanese tech firms, universities, religious groups among targets in cyber-espionage campaign (The Record)
    New security loophole allows spying on internet users' online activity (HelpNet Security)
    P2PInfect botnet targets REdis servers with new ransomware module (Bleeping Computer)
    Credential Stuffing Attack Hits 72,000 Levi’s Accounts (Infosecurity Magazine)
    CHERI Backers Form Alliance to Promote Memory Safety Chip (GovInfo Security)
    Julian Assange, WikiLeaks Founder, Agrees to Plead Guilty in Deal With U.S. (The New York Times) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 34 min
    The claim heard ‘round the world.

    The claim heard ‘round the world.

    LockBit claims to have hit the Federal Reserve. CDK Global negotiates with BlackSuit to unlock car dealerships across the U.S. Treasury proposes a rule to restrict tech investments in China. An LA school district confirms a Snowflake related data breach. Rafel RAT hits outdated Android devices. The UK’s largest plutonium stockpiler pleads guilty to criminal charges of inadequate cybersecurity. Clearview AI settles privacy violations in a deal that could exceed fifty million dollars. North Korean hackers target aerospace and defense firms. Rick Howard previews CSOP Live. Our guest is Christie Terrill, CISO at Bishop Fox, discussing how organizations can best leverage offensive security tactics. Bug hunting gets a little too real.
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Christie Terrill, CISO at Bishop Fox, joins to discuss how organizations can leverage offensive security tactics not just as strategies to prevent cyber incidents, but as a critical component of a cyberattack recovery process. 
    Rick Howard sits down with Dave to share a preview of what’s to come at our upcoming CSOP Live event this Thursday, going beyond the headlines with our panel of Hash Table experts for an insightful discussion on emerging industry trends, recent threats and events, and the evolving role of executives in our field.
     
    Selected Reading
    LockBit claims the hack of the US Federal Reserve (securityaffairs)
    Why are threat actors faking data breaches? (Help Net Security)
    CDK Global outage caused by BlackSuit ransomware attack (bleepingcomputer)
    US proposes rules to stop Americans from investing in Chinese technology with military uses (AP News)
    Los Angeles Unified confirms student data stolen in Snowflake account hack (bleepingcomputer)
    Ratel RAT targets outdated Android phones in ransomware attacks (bleepingcomputer)
    Sellafield Pleads Guilty to Historic Cybersecurity Offenses (Infosecurity Magazine)
    Sellafield nuclear waste site pleads guilty to IT security breaches (Financial Times)
    Facial Recognition Startup Clearview AI Settles Privacy Suit (SecurityWeek)
    New North Korean Hackers Attack Aerospace and Defense Companies (cybersecuritynews)
    Spatial Computing Hack (Ryan Pickren)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 36 min

Top Podcasts In News

Global News Podcast
BBC World Service
The Take
Al Jazeera
LANZ & PRECHT
ZDF, Markus Lanz & Richard David Precht
Xadrez Verbal
Central 3 Podcasts
The New Yorker Radio Hour
WNYC Studios and The New Yorker
I’m Not As Think As You Drunk I Am ft. The Sandwich Crew
The Sandwich Crew

You Might Also Like

Cyber Security Headlines
CISO Series
Hacking Humans
N2K Networks
Cybersecurity Today
ITWC
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Smashing Security
Graham Cluley & Carole Theriault
Malicious Life
Malicious Life