100 episodes

Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about the world of cyber threat intelligence.

Recorded Future - Inside Threat Intelligence for Cyber Security Recorded Future

    • Tech News
    • 4.6, 114 Ratings

Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about the world of cyber threat intelligence.

    170 Defending MacOS Against Sophisticated Attacks

    170 Defending MacOS Against Sophisticated Attacks

    Our guest today is Phil Stokes. He’s a security researcher at SentinelOne, where he specializes in the analysis of attacks against MacOS. 
    In our conversation, Phil shares his professional journey, how he came to focus on the Mac platform, as well as insights on the state of security on Apple’s desktop operating system. He tracks the growing sophistication of those seeking to attack MacOS, and provides tips for security professionals looking to bolster their defenses.

    • 22 min
    169 Making Security Real in the Context of Business

    169 Making Security Real in the Context of Business

    Our guest today is Shamla Naidoo, a managing partner at IBM Security. With a career spanning over three decades, including 20 years as a CISO, Shamla has excelled in a variety of positions, from engineer to executive. 
    Shamla joins us with perspectives on why security teams need to effectively communicate with their organization’s board of directors, the best ways to make security indispensable to a business, and why those communication skills are critical to the success and security of an organization. We’ll learn about the unique way she goes about building her teams, and why she believes there are opportunities in cybersecurity for just about everyone.

    • 24 min
    168 Ransomware Negotiations and Original Hacker Culture

    168 Ransomware Negotiations and Original Hacker Culture

    Our guest today is Sherri Davidoff. She’s the founder and CEO of LMG Security, a cybersecurity and digital forensics firm with clients across the globe. She shares the story of her professional journey, including her time deep in the hacker culture at MIT, where she adopted the hacker nickname Alien. 
    She also discusses her insights on the evolution of ransomware, and how she and her team help negotiate with the ransomers on behalf of her clients. We’ll learn more about her leadership style, the importance of team building, and what she looks for when hiring.

    • 19 min
    167 The Emerging Role of SASE and the Cloud

    167 The Emerging Role of SASE and the Cloud

    As many organizations accelerate their move to the cloud — thanks in no small part to the global pandemic and the shift to working from home — the adoption of SASE protocols is proving attractive. SASE stands for Secure Access Service Edge, but as with most of these technologies, there’s more to it than that.
    Joining us this week to help our understanding of SASE is John Peterson, chief product officer at Ericom Software. We discuss the motivations for the industry’s move toward SASE, the potential pros and cons, as well as what kinds of businesses it is best suited for. In addition, John shares his views on leadership and what he looks for when hiring members of his team.

    • 21 min
    166 Inside the Adversary Exploit Process

    166 Inside the Adversary Exploit Process

    With thousands of vulnerabilities reported and classified each year, it can be challenging to keep track of which exploits are actually being used by threat actors. Researchers with Recorded Future’s Insikt Group have been exploring this issue, and one of their key findings is that less sophisticated threat actors often resort to using older vulnerabilities with easily accessible resources and tutorials. 
    Greg Lesnewich is a threat intelligence researcher at Recorded Future, and he joins us with insights on the tactics, techniques, and procedures commonly seen from these threat actors, the likely motivation behind them, and what security professionals can do to best protect their networks against them.

    • 18 min
    165 Empowering Cyber Startups in the UK

    165 Empowering Cyber Startups in the UK

    London has, for centuries, enjoyed its status as one of the cornerstones of the global economy. So it makes sense that it would also be a beacon of innovation and investment in cybersecurity.
    Our guest today is Jonathan Luff. He’s the co-founder of Epsilon Advisory Partners and CyLon, an incubator for early-stage cybersecurity companies based in the United Kingdom. He discusses his story of his early career in public service, sharing his talents and expertise around the world, his transition from public servant to entrepreneur, and why he believes the U.K. is well positioned for leadership in the growing global cybersecurity industry.

    • 20 min

Customer Reviews

4.6 out of 5
114 Ratings

114 Ratings

signorafranco ,

Current & exciting cyber stories

I personally love the variety of guests they have on the pod. It’s always entertaining and I love the different perspectives.

[REDACTED] USER ,

great podcast

i highly recommend this podcast along with the cyberwire! all great stuff!

soveitpowerisamyth ,

Glez Destroyer

Can your most recent guest analyst get a sentence out of his mouth without saying ‘uh’ or ‘um’? He sounds like he was raised in a house painted with lead based paint. Other than that great episode. Thank you for your time.

Top Podcasts In Tech News

Listeners Also Subscribed To