46 episodes

Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.

Cyber Security Sauna F-Secure

    • Technology
    • 4.7 • 11 Ratings

Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.

    10 Burning Mobile Security Questions, Answered

    10 Burning Mobile Security Questions, Answered

    Is iOS really more secure than Android? What are the pros and cons of biometric authentication? How can you know which apps are safe? In this episode we dive into a range of mobile security issues. Who better to answer our questions than a couple of mobile experts? F-Secure's Ken Gannon and Ben Knutson join the show to discuss app permissions, company mobile device management, mobile hygiene tips, signs your phone's been hacked and more. Plus, is your Facebook app listening in on you, or not?

    • 34 min
    The Most Frightening Thing About Stalkerware, with Eva Galperin

    The Most Frightening Thing About Stalkerware, with Eva Galperin

    You know about malware, ransomware, spyware. But there's an increasing concern about stalkerware, a creepy breed of apps that allow someone else to digitally monitor you. What is stalkerware all about and how can you recognize it? Who plants it and why, and who are its victims? Joining the show are Eva Galperin, director of cyber security at the Electronic Frontier Foundation who also helped found the Coalition Against Stalkerware, and Anthony Melgarejo, threat researcher at F-Secure.

    • 25 min
    2020 in Cyber Threats, So Far: COVID-19's Effects, Ransomware's Latest Tricks

    2020 in Cyber Threats, So Far: COVID-19's Effects, Ransomware's Latest Tricks

    It's a year like none we've ever experienced. COVID-19's effects have reverberated around the world, and around cyberspace. What's happened in the threat landscape while we've been preoccupied with the pandemic? How have attackers adapted to the new normal? Christine Bejerasco and Calvin Gan of F-Secure's Tactical Defense Unit join us to discuss the latest email and phishing threats, how threat actors are taking advantage of remote work, and why a ransomware infection may be just the tip of the iceberg.

    • 30 min
    Paths to Infosec: Military Vs. Psychology

    Paths to Infosec: Military Vs. Psychology

    There is no one set path to a cybersecurity career, and today's guests have arrived in the field in very different ways. Logan Whitmire comes from a military background and Derek Stoeckenius has a degree in psychology. They share what sparked their interest in infosec, their journey to their current roles, and how their unique backgrounds influenced the way they approach their work. Also: Tips on getting into the field, and what they might have done differently.

    • 22 min
    The Encryption Debate Rages On

    The Encryption Debate Rages On

    Encryption plays a critical role in protecting our data from hackers and theft. But at the same time, it presents a challenge for law enforcement when it comes to their work catching dangerous criminals and terrorists. What are the possible options at the end of the encryption debate, and are any of them actually viable? How can we protect our data while still enabling law enforcement to do their jobs? F-Secure CISO Erka Koivunen joins us to discuss why there are no easy answers to the encryption debate.

    • 30 min
    The Ethics of Red Teaming

    The Ethics of Red Teaming

    Red team testing is intrusive by nature, as it involves breaking into companies - albeit at their request - to improve their security. Red teamers must bluff past receptionists and hack into employee computers, things that would put anyone else in a lot of trouble. At what point do red teaming activities cross the line into being unethical or even ciminal? Veteran red teamer Tom Van de Wiele stopped by to draw the clear and hazy lines, and to share what a red teamer won't do in the name of security.

    • 35 min

Customer Reviews

4.7 out of 5
11 Ratings

11 Ratings

JoshCrist ,

Illuminating, insightful and actionable! 🔥

Whether you’re well established as someone innovating in the data and compliance ecosystem, or just getting started as a catalyst for change - this is a must-listen podcast for you! Janne does an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of navigating an ever changing cyber security environment - from leaders who’ve actually walked the path. Highly recommend listening and subscribing!

espoo snow ,

Very interesting and timely discussion

Mikko Hypponen is always so interesting to listen to.

Jason Sattler ,

Top-Notch Cyber Security Talk

From F-Secure, this podcast cuts through noise to deliver pure signal about cyber security. Don't miss the first episode with Mikko Hypponen.

Top Podcasts In Technology

Listeners Also Subscribed To