2 episodes

CSIAC's Mission
Mission Statement
CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.

CSIAC Podcast CSIAC

    • Technology

CSIAC's Mission
Mission Statement
CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.

    CS Digest Roundtable #3: Neural Networks, CIA Imposter, Int'l Data Privacy, and Encrypted Malware

    CS Digest Roundtable #3: Neural Networks, CIA Imposter, Int'l Data Privacy, and Encrypted Malware

    In today's episode the CSIAC takes the most important articles in a past CS Digest and discusses the articles' importance in the world of technology and cyber security.

    • 16 min
    The CSIAC Podcast - CS Digest Roundtable #1: Emotet Trojan, Cryptojacking, and User Data Exposure

    The CSIAC Podcast - CS Digest Roundtable #1: Emotet Trojan, Cryptojacking, and User Data Exposure

    The CSIAC Digest roundtable features the most important articles from the latest CSDigest provided by the CSIAC. The CSDigest is a professionally curated list of the top cybersecurity news articles from the last two weeks. Subscribe here: https://www.csiac.org/cs-digest/

    Articles discussed in episode:
    Hackers attacking plants and infrastructure points
    https://www.reuters.com/article/us-cyber-infrastructure-attack/hackers-halt-plant-operations-in-watershed-cyber-attack-idUSKBN1E8271

    US Census and Consumer data breach in Oct.
    https://www.upguard.com/breaches/cloud-leak-alteryx

    Rapid re-wrapping of malware
    https://blogs.bromium.com/emotet-banking-trojan-malware-analysis/

    Hackers installing crypto miners on wordpress sites
    https://www.bleepingcomputer.com/news/security/massive-brute-force-attack-infects-wordpress-sites-with-monero-miners/

    Large scale data breach testing
    https://phys.org/news/2017-12-scientists-simple-tool-websites-breach.html

    • 17 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Apple Events (video)
Apple
Apple Events (audio)
Apple
The TED AI Show
TED
Deep Questions with Cal Newport
Cal Newport