50 episodes

Welcome to The Security Swarm Podcast – a weekly conversation of the most critical issues facing the world of cybersecurity today, hosted by Andy Syrewicze, Security Evangelist at Hornetsecurity.

From the malicious use of AI tools to social engineering scams, each episode hones in on a pertinent topic dissected by an industry expert and backed up by real-world data direct from our Security Lab.

The world of cybersecurity should not be taken on alone – it’s time to join the swarm.

The Security Swarm: A Hornetsecurity Podcast Hornetsecurity

    • Technology
    • 5.0 • 1 Rating

Welcome to The Security Swarm Podcast – a weekly conversation of the most critical issues facing the world of cybersecurity today, hosted by Andy Syrewicze, Security Evangelist at Hornetsecurity.

From the malicious use of AI tools to social engineering scams, each episode hones in on a pertinent topic dissected by an industry expert and backed up by real-world data direct from our Security Lab.

The world of cybersecurity should not be taken on alone – it’s time to join the swarm.

    A Breakdown of CSRB's Findings on Microsoft Storm-0558 Breach (PART 1)

    A Breakdown of CSRB's Findings on Microsoft Storm-0558 Breach (PART 1)

    In this episode of The Security Swarm Podcast, Andy and Paul discuss the Cyber Safety Review Board's findings of the Microsoft Storm-0558 breach. During the episode, they talk about the implications of the breach and explore Microsoft’s security culture, stressing the need to prioritize robust security measures over rapid feature developments. 

    Key Takeaways: 

    Microsoft's security culture requires a significant overhaul to address existing vulnerabilities and prevent future breaches.  Transparency and accurate risk assessments are crucial in understanding and mitigating security threats in cloud environments.  Prioritizing security over rapid feature development is essential to prevent security risks and enhance overall product integrity.  Standardized audit logging practices should be a fundamental offering in cloud services to enable effective intrusion detection and investigation. 
    Timestamps: 

    (10:07) - Microsoft's Security Culture: Past, Present, and Future 
    (15:45) - Uncovering Lack of Transparency and Accountability in Major Cloud Vendors 
    (20:09) - Microsoft's Security Standards: A Critical Assessment and Call for Action 
    (28:53) - A Discussion on Cloud Audit Logging 

    Episode Resources: 

    Cyber Safety Review Board Report - https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf 

    Microsoft Trustworty Computing Memo - https://news.microsoft.com/2012/01/11/memo-from-bill-gates/ 

     

    • 32 min
    The XZ Utils Backdoor, CSRB's Report on Storm-0558 & More

    The XZ Utils Backdoor, CSRB's Report on Storm-0558 & More

    In this episode of the Security Swarm Podcast, our host Andy Syrewicze discusses the key findings from Hornetsecurity’s Monthly Threat Report with guest Michael Posey. The Monthly Threat Report is a valuable resource that provides monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space.  

    In this episode, Andy and Michael talk about recent security events such as the Cyber Safety Review Board's (CSRB) report assessment of the Storm-0558 attack, the FTC’s reports on impersonation attacks, and an alarming potential supply chain attack on the XZ Utils package in open-source Linux distributions. 

    Key takeaways: 

    The cybersecurity landscape is evolving rapidly with a variety of threats, from supply chain attacks to impersonation scams.  Transparency and security diligence are crucial in preventing and mitigating cyber threats.  End-user training and awareness play a significant role in enhancing overall cybersecurity posture. 
    Timestamps: 

    (05:26) - Rising Trends in Email Threats and Cybersecurity Impersonation Tactics 
    (15:26) - The Importance of Email Security and Supply Chain Attacks in Today's Cyber Landscape 
    (18:12) - Uncovering the Storm-0558 Breach: Analysis and Recommendations 
    (27:33) - FTC Reports on Impersonation Attacks and the Importance of End User Training in Cybersecurity 
    (34:25) - Major Security Threat Uncovered in XZ Utils Package in Open Source Linux Distributions 
    (40:22) - Insights on Cybersecurity Issues and Mitigations 
    Episode Resources: 

    The Full Monthly Threat Report for April 2024

    Fully automated Security Awareness Training Demo 

    • 43 min
    Security Risks of Always On Remote Access

    Security Risks of Always On Remote Access

    In this episode of The Security Swarm Podcast, host Andy Syrewicze is joined by Matt Lee from Pax8 to discuss the risks associated with deploying always on remote access software on managed endpoints.  

    The conversation spans various topics, including Matt Lee's extensive background in the MSP space, where he shares insights gained from his experience with a mass ransomware event. Together, they explore the risks and implications of constant remote access, emphasizing the need for organizations to adopt a more proactive stance toward cybersecurity.  
    Key takeaways: 

    Embrace the journey of continuous improvement in cybersecurity practices, focusing on being reasonable and defensible rather than striving for perfection.  Follow established cybersecurity controls and be willing to adapt and improve security measures over time.  Consider the risks associated with constant remote access and prioritize security measures that reduce exposure to threats.  Take small steps towards improving cybersecurity practices and be open to learning from past failures to enhance security protocols.  Timestamps: 

    (11:08) - Navigating Remote Access in Highly Regulated Managed Service Provider (MSP) Environments 

    (14:02) - Maximizing Security with Just in Time, Just Enough Access 

    (17:41) – The ConnectWise ScreenConnect Vulnerability and the Importance of Communication 

    (26:32) – The Need for Maturity in the Cybersecurity Space 

    (31:10) – Don't Let Perfect be the Enemy of Good 

    Episode Resources: 

    Matt Lee 
    Hornetsecurity

     

    • 35 min
    Passkeys: The Future of Authentication?

    Passkeys: The Future of Authentication?

    We're thrilled to have Jan Bakker, a seasoned Cloud Consultant with over 10 years of IT experience, joining us from the Netherlands. In this episode, Andy and Jan explore the revolutionary concept of passkeys, a technology that aims to replace traditional passwords and enhance security by providing phishing resistance. The conversation delves into the significance of passkeys and their value in improving user experience and security measures. The guys even discuss what is currently known publicly about passkeys in M365. 

    Key takeaways 

    Passkeys offer a more secure and user-friendly alternative to traditional passwords by eliminating the need for storing secrets on the server side. 
    Public key cryptography forms the foundation of passkeys, ensuring strong authentication without the risk of password breaches. 
    Passkeys provide phishing resistance and streamline the authentication process for end users, reducing the reliance on complex passwords and additional MFA steps. 
    While passkeys offer significant security benefits, they are not a standalone solution and should be complemented with other security measures such as phishing prevention and identity protection strategies. 

    Timestamps: 

    (00:13) - Unveiling the Power of Pass Keys in Cybersecurity with Jan Bucker 

    (03:47) - The Rise of MFA Bypass Kits and Adversary in the Middle Attacks 

    (14:55) - Unlocking the Future of Passwordless Authentication with Passkeys 

    (24:55) - Addressing Persistent Access in Malicious Apps and OAuth: A Call for Improved Security Practices 

    (29:59) - Unpacking the Importance of Phishing Resistance and Token Security in Cybersecurity 

    (33:01) - Enhancing Security with Passkeys and Onboarding Procedures in Public Services 

    Episode resources: 

    Passkeys Directory 

    Jan Bakker’s website 

    The Security Swarm Podcast - EP24: The Danger of Malicious OAuth Apps in M365 
    Start your free trial of M365 Total Protection
     

    • 38 min
    Are Tech “Innovations” Accelerating Security Threats?

    Are Tech “Innovations” Accelerating Security Threats?

    In today's fast-paced world, digital transformation has become a necessity for businesses to stay ahead of the game. With the increasing reliance on digital tools, however, there has been a seemingly corresponding rise in security incidents. Coincidence?  

    The evolving landscape of IT and technology has brought to the forefront the question of whether the latest tech "innovations" are actually accelerating security threats.  

    In this episode, Andy and Paul delve deeper into this issue, exploring how businesses can balance their need for technological advancements with maintaining robust security measures to protect against cyber threats. 

    Timestamps: 

    (2:54) – Commentary on the Rate of Change in Technology 

    (13:21) – How has Innovation in Microsoft Cloud Services Contributed? 

    (23:33) – What is the Cost of Innovation on Security Postures? 
    Episode Resources:
    Article from Andy Robbins
    Listen to episode 34
    Listen to episode 22
    365 Total Protection Free Trial
     

    • 36 min
    Tips and Tricks for Getting Started in Cybersecurity

    Tips and Tricks for Getting Started in Cybersecurity

    Ever wondered what it takes to break into the exciting world of cybersecurity? Join us in our latest podcast episode as we sit down with Grant Collins, an infrastructure security engineer and cybersecurity career coach. From choosing the right degree to navigating the hiring process, acquiring essential skills, and building a robust professional network, Grant and Andy share their personal experiences and insights. 

    Throughout the episode, they debate on academic vs practical learning by comparing the merits of pursuing a cybersecurity/IT degree versus gaining real-world experience and self-directed training. They discuss the pros and cons of each approach, offering valuable insights to help you chart your own path in the cybersecurity landscape. 
    Timestamps: 

    (5:08) – Why Should You Consider a Career in Cybersecurity? 

    (11:30) – What Educational Pathways Can I Take to Learn Cybersecurity? 

    (26:15) – How can I Cultivate Practical Skills in Cybersecurity? 

    (34:13) – What are Some Tips and Tricks for Landing a Job in Cybersecurity? 
    Episode Resources:
    Check out Grant’s YouTube Channel
    cybersecurity (reddit.com)
    TryHackMe | Cyber Security Training
    Hack The Box: Hacking Training For The Best | Individuals & Companies

    • 43 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Technology

Dwarkesh Podcast
Dwarkesh Patel
Deep Questions with Cal Newport
Cal Newport
13 Minutes to the Moon
BBC World Service
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Security Now (Audio)
TWiT
Hard Fork
The New York Times

You Might Also Like

2.5 Admins
The Late Night Linux Family
Security Now (Audio)
TWiT
Malicious Life
Malicious Life
Darknet Diaries
Jack Rhysider
Blue Security
Andy Jaw & Adam Brewer
The Cloud Architects Podcast
The Cloud Architects