Welcome to the Simple Cyber podcast, where Internet 2.0's cyber intelligence specialists talk with other domain experts about the steps you can take to keep your organisation safe.
Episode 3 - A New Approach to Cyber Forensics
In this episode of the Simple Cyber podcast, Chris Lawley, our CCO, and our Co-Founder & CEO Robert Potter, discuss the new approach to cyber forensics and intelligence analysis that Internet 2.0 is pioneering.
This episode focuses on how diversity of skills, experience, and domain knowledge can improve the functions of a team, and how this collective thinking approach helped uncover one of the more significant discoveries from Internet 2.0 in recent memory; the ‘unusual levels’ of PCR procurement in Wuhan.
After listening in, you can get more information on the report discussed by visiting here to download the full report.
Download file | Play in new window | Duration: 00:22:59 | Recorded on November 10, 2021
Episode 2 - Cyber Vulnerabilities, Working From Home
In this episode of the Simple Cyber podcast, two senior members of our Advisory Board, Christopher Painter and Maria Macnamara, dive into the new model of remote work.
In their discussion, they seek to address the security challenges that have emerged as businesses have enabled employees to adopt a Working From Home (WFH) policy due to COVID-19.
After listening in, you can get more information on new critical cyber issues, and how you can protect your business, by visiting our other resources here.
Episode 1 - Business Email Compromise
In this episode of the Simple Cyber podcast, our Chief Commercial Officer, Chris Lawley, sits down to interview David Robinson. David is the Co-CEO and Co-Founder of Internet 2.0, and a retired Australian Army Intelligence Officer with deep expertise in the threats to organisations, and the best ways to put countermeasures in place to defence against them.
Chris and David tackle one of the most pressing and critical cyber threats facing organisations today, Business Email Compromises (BECs). They answer the question of what they look like in the real world, and how businesses of any size can take steps to safeguard their organisation.
After listening in, you can get more information on new critical cyber issues, and how you can protect your business, by visiting our other resources here, including our dedicated paper on Business Email Compromises (BECs).