2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News
    • 5.0 • 1 Rating

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us by Eugene Spafford, Leigh Metcalf, Josiah Dykstra and Illustrated by Pattie Spafford. [CSOP]

    Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us by Eugene Spafford, Leigh Metcalf, Josiah Dykstra and Illustrated by Pattie Spafford. [CSOP]

    Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, interviews Eugene Spafford about his 2024 Cybersecurity Canon Hall of Fame book: “Cybersecurity Myths and Misconceptions.”
    References:
    Eugene Spafford, Leigh Metcalf, Josiah Dykstra, Illustrator: Pattie Spafford. 2023. Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us [Book]. Goodreads.
    Helen Patton, 2024. Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us [Book Review]. Cybersecurity Canon Project.
    Staff, 2024. CERIAS - Center for Education and Research in Information Assurance and Security [Homepage]. Purdue University.
    Rick Howard Cybersecurity Canon Concierge
    Cybersecurity Canon Committee members will be in the booth outside the RSA Conference Bookstore to help anybody interested in the Canon’s Hall of Fame and Candidate books. If you’re looking for recommendations, we have some ideas for you.
    RSA Conference Bookstore
    JC Vega: May 6, 2024  | 02:00 PM PDT
    Rick Howard: May 7, 2024  | 02:00 PM PDT
    Helen Patton: May 8, 2024  | 02:00 PM PDT
    Rick Howard RSA Birds of a Feather Session: 
    I'm hosting a small group discussion called  “Cyber Fables: Debating the Realities Behind Popular Security Myths.” We will be using Eugene Spafford’s Canon Hall of Fame book, “ “Cyber Fables: Debating the Realities Behind Popular Security Myths” as the launchpad for discussion.
    If you want to engage in a lively discussion about the infosec profession, this is the event for you. 
    May. 7, 2024 | 9:40 AM - 10:30 AM PT
    Rick Howard RSA Book Signing
    I published my book at last year’s RSA Conference. If you’re looking to get your copy signed, or if you just want to tell me how I got it completely wrong, come on by. I would love to meet you.
    RSA Conference Bookstore
    May 8, 2024 | 02:00 PM PDT
    Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
    Rick Howard Cyware Panel: 
    The Billiard Room at the Metreon | 175 4th Street | San Francisco, CA 94103
    May 8, 2024 | 8:30am-11am PST
    Simone Petrella and Rick Howard RSA Presentation: 
    Location: Moscone South Esplanade level
    May. 9, 2024 | 9:40 AM - 10:30 AM PT
    Simone Petrella, Rick Howard, 2024. The Moneyball Approach to Buying Down Risk, Not Superstars [Presentation]. RSA 2024 Conference.

    • 16 min
    Charting the course: Biden's blueprint for global cybersecurity.

    Charting the course: Biden's blueprint for global cybersecurity.

    Secretary of State Antony Blinken is set to unveil a new international cybersecurity strategy at the RSA Conference in San Francisco. Paris prepares for Olympic-sized cybersecurity threats. Wichita, Kansas is recovering from a ransomware attack. A massive data breach hits citizens of El Salvador. Researchers steal cookies to bypass authentication. Cuckoo malware targets macOS systems. Iranian threat actors pose as journalists to infiltrate network targets. A former Microsoft insider analyzes the company’s recommitment to cybersecurity. Guest Mark Terenzoni, Director of Risk Management at AWS, joins N2K’s Rick Howard to discuss the benefits of security lakes in a post-AI world. Ukrainian officials introduce an AI generated spokesperson. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Mark Terenzoni, Director of Risk Management at AWS, joins N2K’s Rick Howard to discuss the benefits of security lakes and other security considerations for a post-AI world. 

    Selected Reading
    Biden administration rolls out international cybersecurity plan (POLITICO)
    Paris 2024 gearing up to face unprecedented cybersecurity threat (Reuters)
    Wichita government shuts down systems after ransomware incident (The Record)
    El Salvador suffered a massive leak of biometric data (Security Affairs)
    Stealing cookies: Researchers describe how to bypass modern authentication (CyberScoop)
    Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware (Kandji)
    Iranian hackers pose as journalists to push backdoor malware (Bleeping Computer)
    Breaking down Microsoft’s pivot to placing cybersecurity as a top priority (DoublePulsar)
    Ukraine unveils AI-generated foreign ministry spokesperson | Artificial intelligence (AI) (The Guardian)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 33 min
    Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Tracers in the Dark by Andy Greenberg. [CSOP]

    Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Tracers in the Dark by Andy Greenberg. [CSOP]

    Rick Howard, N2K’s CSO and The Cyberwire’s Chief Analyst and Senior Fellow, interviews Andy Greenberg about his 2024 Cybersecurity Canon Hall of Fame book: “Tracers in the Dark.”
    References:
    Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads.
    Larry Pesce, 2024. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book Review]. Cybersecurity Canon Project.
    Rick Howard, 2024. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book Review]. Cybersecurity Canon Project.
    Ben Rothke, 2024. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book Review]. Cybersecurity Canon Project.
    TheScriptVEVO, 2012. The Script - Hall of Fame (Official Video) ft. will.i.am [Music Video]. YouTube.
    Satoshi Nakamoto, 2008. Bitcoin: A Peer-to-Peer Electronic Cash System [Historic and Important Paper]. Bitcoin.
    Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
    RSA Presentation: 
    May. 9, 2024 | 9:40 AM - 10:30 AM PT
    Rick Howard, Simone Petrella , 2024. The Moneyball Approach to Buying Down Risk, Not Superstars [Presentation]. RSA 2024 Conference.

    • 18 min
    Encore: Elizabeth Wharton: Strong shoulders for someone else to stand on. [Legal] [Career Notes]

    Encore: Elizabeth Wharton: Strong shoulders for someone else to stand on. [Legal] [Career Notes]

    Technology attorney and startup chief of staff Elizabeth Wharton shares her experiences and how she came to work with companies in technology. Elizabeth talks about how she always liked solving problems and Nancy Drew mysteries, but not litigation. These morphed finding into her home in the policy legal world and some time later, technology law. Elizabeth describes how she loves planning and strategy in her work and encourages others to ask questions and absorb all of the information. Our thanks to Elizabeth for sharing her story with us. 

    • 6 min
    Geopolitical tensions rise with China. [Research Saturday]

    Geopolitical tensions rise with China. [Research Saturday]

    Adam Marré, CISO at Arctic Wolf, is diving deep into geopolitical tension with China including APT31, iSoon and TikTok with Dave this week. They also discuss some of the history behind China cyber operations.
    Adam shares information on how different APT groups are able to create spear phishing campaigns, and provides info on how to combat these groups.

    • 35 min
    Ransomware attack turns legal attack.

    Ransomware attack turns legal attack.

    A Texas operator of rehab facilities faces multiple lawsuits after a ransomware attack. Microsoft warns Android developers to steer clear of the Dirty Stream. The Feds warn of North Korean social engineering. A flaw in the R programming language has been patched. Zloader borrows stealthiness from ZeuS. The GAO highlights gaps in NASA’s cybersecurity measures. Indonesia is a spyware hot-spot. Germany summons a top Russian envoy to address cyber-attacks linked to Russian military intelligence. An Israeli PI is arrested in London following allegations of a cyberespionage campaign. In our Industry Voices segment, Allison Ritter, Senior Product Manager from Cyberbit shares her career journey, off the bench and onto the court. A cybersecurity consultant allegedly attempts to extort a one-point-five million dollar exit package. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Industry Voices segment, Allison Ritter, Senior Product Manager from Cyberbit, shares her cybersecurity journey: “Off the bench and onto the court.”

    Selected Reading
    Rehab Hospital Chain Hack Affects 101,000; Facing 6 Lawsuits (GovInfo Security)
    Microsoft Warns of 'Dirty Stream' Vulnerability in Popular Android Apps (SecurityWeek)
    U.S. Govt Warns of Massive Social Engineering Attack from North Korean Hackers (GB Hackers)
    R-bitrary Code Execution: Vulnerability in R's Deserialization (HiddenLayer)
    ZLoader Malware adds Zeus's anti-analysis feature (Security Affairs)
    GAO report indicates that NASA should update spacecraft acquisition policies and standards for cybersecurity (Industrial Cyber) 
    Indonesia is a Spyware Haven, Amnesty International Finds (InfoSecurity Magazine)
    Germany summons Russian envoy over 2023 cyber-attacks (The Guardian)
    Israeli private eye arrested in London over alleged hacking for US firm (Reuters)
    Cybersecurity consultant arrested after allegedly extorting IT firm (Bleeping Computer) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 39 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In News

Global News Podcast
BBC World Service
Close The Door
Deddy Corbuzier
YOLO (YOur Life with Ours!)
MRA Media
VOA This Morning Podcast - Voice of America | Bahasa Indonesia
VOA
Economist Podcasts
The Economist
NHKラジオニュース
NHK (Japan Broadcasting Corporation)

You Might Also Like

Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
Hacking Humans
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Smashing Security
Graham Cluley & Carole Theriault
Malicious Life
Malicious Life