2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News
    • 5.0 • 1 Rating

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]

    Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]

    Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.

    • 9 min
    Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]

    Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]

    In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

    In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.
    Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.
    Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.

    You can learn more about Muddled Libra at
    https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.

    Join the conversation on our social media channels:
    Website: ⁠https://www.paloaltonetworks.com/unit42⁠
    Threat Research: ⁠https://unit42.paloaltonetworks.com/⁠
    Facebook: ⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠
    LinkedIn: ⁠https://www.linkedin.com/company/unit42/⁠
    YouTube: ⁠@PaloAltoNetworksUnit42⁠
    Twitter: ⁠https://twitter.com/PaloAltoNtwks⁠

    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    PALO ALTO NETWORKS
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 7 min
    The great firewall breached: China's covert cyber assault on America exposed.

    The great firewall breached: China's covert cyber assault on America exposed.

    An alleged sinister hacking plot by China. CISA and the FBI issued a 'secure-by-design' alert. Ransomware hits municipalities in Florida and Texas. The EU sets regulations to safeguard the upcoming European Parliament elections. ReversingLabs describe a suspicious NuGet package. Senator Bill Cassidy questions a costly breach at HHS. A data center landlord sues over requests to reveal its customers. On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency while avoiding tool overload & complexity. And Google's AI Throws Users a Malicious Bone.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency including automation & tool streamlining, IT automation/automated patching, and tool overload & complexity. You can learn more in Automox’s 2024 State of IT Operations Research Report.

    Selected Reading
    Millions of Americans caught up in Chinese hacking plot (BBC)
    US Government Urges Software Makers to Eliminate SQL Injection Vulnerabilities (SecurityWeek)
    CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
    St. Cloud most recent in string of Florida cities hit with ransomware (The Record)
    Hackers demand $700K in ransomware attack on Tarrant Appraisal District (MSN)
    The impact of compromised backups on ransomware outcomes (Sophos News)
    EU sets rules for Big Tech to tackle interference in European Parliament elections (The Record)
    Suspicious NuGet package grabs data from industrial systems (ReversingLabs)
    Senator demands answers from HHS about $7.5 million cyber theft in 2023 (The Record)
    Data center landlord refuses Fairfax County demand for tenant information (Washington Business Journal)
    Google's AI-powered search feature recommends malicious sites, including scams and malware (TechSpot)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 34 min
    Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]

    Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]

    Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 

    • 9 min
    Python developers under attack.

    Python developers under attack.

    A supply chain attack targets python developers. Russia targets German political parties. Romanian and Spanish police dismantle a cyber-fraud gang. Pwn2Own prompts quick patches from Mozilla. President Biden nominates the first assistant secretary of defense for cyber policy at the Pentagon. An influential think tank calls for a dedicated cyber service in the US. Unit42 tracks a StrelaStealer surge. GM reverses its data sharing practice. Our guest is Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, who shares trends in cloud-native security. And a Fordham Law School professor suggests AI creators take a page from medical doctors. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, shares trends in cloud-native security. To learn more, you can check out Sysdig’s 2024 Cloud-Native Security and Usage Report. 

    Selected Reading
    Top Python Developers Hacked in Sophisticated Supply Chain Attack (SecurityWeek)
    Russian hackers target German political parties with WineLoader malware (Bleeping Computer)
    Police Bust Multimillion-Dollar Holiday Fraud Gang (Infosecurity Magazine)
    Mozilla Patches Firefox Zero-Days Exploited at Pwn2Own (SecurityWeek)
    Biden nominates first assistant defense secretary for cyber policy (Nextgov/FCW)
    Pentagon, Congress have a ‘limited window’ to properly create a Cyber Force (The Record)
    StrelaStealer targeted over 100 organizations across the EU and US (Security Affairs)
    General Motors Quits Sharing Driving Behavior With Data Brokers (The New York Times)
    AI's Hippocratic Oath by Chinmayi Sharma (SSRN)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 34 min
    Encore: Marcelle Lee: Cyber sleuth detecting emerging threats. [Research] [Career Notes]

    Encore: Marcelle Lee: Cyber sleuth detecting emerging threats. [Research] [Career Notes]

    Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.

    • 7 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In News

Эхо Москвы
Feed Master by Umputun
LRT Aktualijų studija
LRT
Du Bitai
Jonas Lekevičius ir Lukas Keraitis
Lietuvos diena
LRT
Ukraine: The Latest
The Telegraph
Global News Podcast
BBC World Service

You Might Also Like

Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
Hacking Humans
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Malicious Life
Malicious Life
Smashing Security
Graham Cluley & Carole Theriault