Player FM - Internet Radio Done Right
Checked 24h ago
Додано two роки тому
Вміст надано Safe Mode Podcast. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Safe Mode Podcast або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !
Переходьте в офлайн за допомогою програми Player FM !
Подкасти, які варто послухати
РЕКЛАМА
Why do so many of us get nervous when public speaking? Communication expert Lawrence Bernstein says the key to dealing with the pressure is as simple as having a casual chat. He introduces the "coffee shop test" as a way to help you overcome nerves, connect with your audience and deliver a message that truly resonates. After the talk, Modupe explains a similar approach in academia called the "Grandma test," and how public speaking can be as simple as a conversation with grandma. Want to help shape TED’s shows going forward? Fill out our survey ! Become a TED Member today at https://ted.com/join Learn more about TED Next at ted.com/futureyou Hosted on Acast. See acast.com/privacy for more information.…
Safe Mode Podcast
Відзначити всі (не)відтворені ...
Manage series 3499462
Вміст надано Safe Mode Podcast. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Safe Mode Podcast або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Podcast by Safe Mode Podcast
…
continue reading
92 епізодів
Відзначити всі (не)відтворені ...
Manage series 3499462
Вміст надано Safe Mode Podcast. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Safe Mode Podcast або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Podcast by Safe Mode Podcast
…
continue reading
92 епізодів
Усі епізоди
×Greg Otto talks with RSA CEO Rohit Ghai on the global shift toward passkeys and passwordless authentication. Together, they explore pressing issues including the differences between consumer and enterprise solutions, infrastructure vulnerabilities, regulatory challenges, and how emerging threats are evolving as passwordless adoption accelerates. The discussion also covers the complexities practitioners face as they navigate credential transitions in a rapidly changing security landscape. In the reporter chat, Greg talks with Matt Kapko about the attack on a top grocery distributor in the United States.…
Greg Otto talks with Eran Barak, CEO and co-founder of MIND, on the dramatic rise of insider threats in cybersecurity, exploring recent high-profile cases and the factors fueling this surge. He discusses which industries and data types are most at risk, how insider tactics have evolved, and practical strategies for organizations to detect and prevent internal threats. In our reporter chat, Greg talks with Derek Johnson on how vibe coding can be secure as it grows into a practice that software developers rely on for their work. LINK: https://cyberscoop.com/vibe-coding-ai-cybersecurity-llm/…
Greg Otto talks with Rob Ragan, Principal Technology Strategist at Bishop Fox, as he shares his vision of building an “Iron Man suit” for human security testers that is shaping how AI is used in offensive cybersecurity. Rob dives into lessons learned from developing adaptive AI tools, the unique challenges and risks facing modern AI systems, and effective strategies for safeguarding against adversarial attacks and data leakage. Discover how ethical frameworks, innovation, and industry collaboration can drive responsible offensive security, what organizations often get wrong about AI threats, and what’s needed to secure the future as AI transforms the cybersecurity landscape. In our reporter chat, Greg Otto talks with Matt Kapko about a new wave of zero-days impacting Ivanti products.…
In this episode, Greg sits down with Olivia Rose, Founder and CISO of the Rose CISO Group, to talk about her role in "CISO: The Worst Job I Ever Wanted," a groundbreaking cybersecurity docuseries that reveals the real experiences of Chief Information Security Officers. This podcast uncovers the pressures, sleepless nights, and personal sacrifices these leaders endure while making critical decisions and shouldering the responsibility of defending the digital world. Through honest and compelling stories, listeners gain a rare glimpse into the human side of one of the most challenging and misunderstood roles in technology. In our reporter chat, Greg Otto talks with Derek Johnson and Tim Starks about their deep dives into why Salt Typhoon may never be out of U.S. telecom systems.…
In this episode, Greg sits down with Semperis CEO Mickey Bresman to explore how organizations can proactively prepare for cyber crises before they strike. The conversation centers on the power of tabletop exercises—simulated attack scenarios that test response plans, reveal hidden vulnerabilities, and build muscle memory across teams. Together, Greg and Mickey discuss why preparation is far more than a technical checklist, how effective tabletop exercises bridge the gap between policy and real-world action, and what practical steps leaders can take to protect their organizations from the inside out. In our reporter chat, Greg Otto talks with Cynthia Brumfield about the future of the CVE program.…
In this episode, we sit down with Dave Merkel, CEO of Expel to take an honest, practical look at how AI and automation are reshaping the modern Security Operations Center (SOC). Our discussion covers the most tangible changes in daily SOC operations since AI adoption, cutting through industry hype to reveal which claims deserve skepticism and which use cases have delivered meaningful, measurable value. Dave also gives insights into quantifying unique workloads, shaping policies, and fostering understanding between tech teams and business leaders are also addressed, along with the unintended risks AI can introduce to analyst workflows. In our reporter chat, Greg Otto talks with Tim Starks about a jury verdict that compels NSO Group to pay $168M in damages to WhatsApp over spyware infections.…
In this episode, Greg talks with Alexander Leslie, Threat Intelligence Analyst for Recorded Future’s Insikt Group and his research on “Marko Polo” – a notorious cybercriminal empire that orchestrates an array of scams, primarily using infostealer malware. Discover how this sophisticated syndicate has victimized tens of thousands worldwide and raked in millions in illicit revenue. Our guest breaks down the inner workings of these elusive "traffer teams," exploring their adaptable tactics, relentless persistence, and the insidious underground economy they fuel. Greg Otto breaks down his biggest takeaways from the RSAC 2025 Conference.…
On this episode of Safe Mode, Greg talks with Alex Pinto, Associate Director of Threat Intelligence at Verizon Business, as we unpack the key findings from this year’s Data Breach Investigations Report (DBIR). Pinto offers expert analysis on the most pressing cybersecurity trends impacting organizations worldwide—including ransomware’s dramatic spike, shifting attacker tactics, and evolving victim responses. We explore why ransomware now features in 44% of breaches, what’s driving a surge in exploited vulnerabilities and zero-day attacks on edge devices, and why small and mid-sized businesses are seeing more frequent and devastating impacts. Pinto sheds light on the motivations behind declining ransom payments, the rise of third-party risks, and the complex challenge of timely patching and remediation. In our reporter chat, Greg talks with Derek Johnson on one company’s security testing of OpenAI’s newest GPT model.…
In this episode, Greg talks with Will Pearce, CEO and Co-founder of Dreadnode about the rapidly evolving field of offensive AI security. Greg and Will discuss the unique challenges researchers face in testing AI models for vulnerabilities compared to traditional software, unveiling how adversarial attacks impact AI security and the ethical considerations at play. We also examine the role of regulatory frameworks and emerging threats, shedding light on how insights from offensive AI security can enhance human-AI interactions and elevate security standards across industries. In our reporter chat, Greg talks with Matt Kapko on Ivanti’s issues with security in their network edge devices.…
In this episode, Greg talks with Lior Div, co-founder and CEO of 7AI. Lior and Greg explore how security teams are being reinforced with AI Agents and identify the areas where CISO are embracing this technological shift to optimize their talent resources. We'll also discuss the specific security functions these agents are performing, including email security, threat hunting, and other critical cybersecurity domains. Join us as we delve into the future of AI-augmented cybersecurity teams and the potential impact on the industry's ongoing battle against sophisticated cyber threats. In our reporter chat, Greg talks with Derek Johnson about Google’s experimental LLM made for cybersecurity analysts.…

1 Ken Bagnall on how companies can work with governments to take down malicious infrastructure 32:38
In this episode, Greg Otto talks with Ken Bagnall, CEO of Silent Push Ken sheds light on the dynamics of the current cybercrime ecosystem. Ken reveals that a significant portion of the infrastructure is actually operated by affiliate networks using pre-existing technologies. During the discussion, Ken elaborates on how this ecosystem is fueled and examines the influential role played by affiliate groups, particularly those emerging from Africa and other developing countries. By offering these insights, the episode provides a fresh perspective on the often-overlooked aspects of global cybercrime operations. In our reporter chat, Greg talks with Matt Kapko about the growing problem with remote IT workers from North Korea.…
In this episode, Greg Otto talks with Edera co-founder and CTO Alex Zenla, charting her path from beginnings in Minecraft IRC channels to pioneering container isolation technology. Alex discusses her unique expertise in container security, GPU protection, and AI infrastructure, and how Edera is transforming the tech landscape with a commitment to balancing open-source benefits with robust security, setting new standards for cloud security's future. In our reporter chat, Greg talks with Derek B. Johnson about a controversial executive order from Donald Trump that upends the way elections could be conducted in the future.…
In this episode, Greg Otto talks with FTI Consulting’s Allie Bohan exploring the challenges organizations face in maintaining effective communication during cyberattacks. Allie and Greg uncover essential strategies for incidents, ensuring companies remain connected with stakeholders even when digital channels are compromised. We also talk on how to keep morale boosted within an organization during a time that many would consider one of the worst chapters in a business’s history. In our reporter chat, Greg talks with Matt Kapko about who is sending those massively annoying scam text messages about unpaid toll violations.…
In this episode, Greg Otto talks with Sunil Mallik, the CISO of Discover Financial Services. Sunil shares his career path and the evolving challenges and responsibilities in cybersecurity, covering how he communicates with his board, strategic approaches to cybersecurity, and the importance of balancing technological investment with personnel training. In our reporter chat, Greg talks with Tim Starks about Sean Plankey being nominated for CISA director. Editor's Note: At 13:42, Mallik misspoke about his former employer. He was previously employed by Freddie Mac, not Fannie Mae.…
In this episode, Greg Otto talks with Dan Lorenc, CEO and co-founder of Chainguard. They explore the challenges organizations face with CVE management, where dealing with vulnerabilities often drains valuable engineering resources. They also discuss how new visualization tools are redefining this landscape by offering clear insights into CVE trends, empowering teams to make informed decisions and optimize both security and efficiency in their software development processes. In our reporter chat, Greg talks with Matt Kapko about the United States’ indictment of China-linked hackers.…
S
Safe Mode Podcast

In this episode, we delve into the escalating cyber threat posed by China with guest Sean McNee, Head of Threat Research at DomainTools. Sean shares insights on how China is closely observing the ongoing cyberwar between Russia and Ukraine to strategize its potential moves concerning Taiwan. In our reporter chat, Greg Otto talks with Derek B. Johnson about the U.S. government’s attempt to rein in data brokers and bulk data collection by “countries of concern.” LINK: https://cyberscoop.com/justice-department-data-broker-regulation-china-russia-iran/…
This episode of Safe Mode explores the critical issue of software supply chain security with Saša Zdjelar, ReversingLabs' chief trust officer. Discover why the hidden components of commercial off-the-shelf software pose significant risks to enterprises and how current security practices fall short. We'll discuss the explosive growth in breaches due to third-party software, the limited utility of Software Bill of Materials (SBOMs), and the need for more comprehensive security assessments. Saša will share insights on how to effectively "open the black box," enabling companies to identify threats and ensure compliance before deploying applications. In our reporter chat, CyberScoop senior reporter Tim Starks talks with Greg Otto about the indictments brought against Anonymous Sudan. LINK: https://cyberscoop.com/alleged-anonymous-sudan-leaders-charged-prolific-gangs-tool-disabled/…
S
Safe Mode Podcast

How can small nonprofits and civic organizations defend themselves against some of the most insidious malware on the planet? By reaching out to Elijah Baucom. The director of Citizen Clinic at UC Berkeley, Baucom runs a public-interest cybersecurity program that trains students to support organizations in defending against cyber threats. A digital security expert and educator, Baucom talks with Greg Otto about making cybersecurity resources accessible to all students and vulnerable groups, drawing on his extensive background in management consulting and network engineering. In our reporter chat, Greg talks with Derek Johnson about the work OpenAI is doing to prevent malicious actors from user generative AI in their schemes. LINK: https://cyberscoop.com/openai-threat-report-foreign-influence-generative-ai/…
Since 2022, Mandiant has tracked North Korean IT workers who, posing as non-North Koreans, secure employment in various industries to fund DPRK's weapons programs, often engaging in cyber intrusions with the help of foreign facilitators. In this episode, CyberScoop Editor-in-Chief Greg Otto talks with Mandiant’s Michael Barnhart on what is going on in terms of North Korea’s goals, and how organizations can take precautions to prevent remote worker fraud. Greg also talks to CyberScoop reporter AJ Vicens on the latest LockBit takedown, which was conducted by a host of different countries. LINK: https://cyberscoop.com/russian-cybercrime-raids-cryptex-uaps/…
CyberScoop Editor-in-Chief Greg Otto was out at Mandiant's mWISE conference last week, and talked with Trellix’s head of threat intelligence, John Fokker, about a host of different subjects. In the first portion of the interview, Greg and John discuss how the Ransomware-as-a-Service landscape has changed in the past year, and how threat actors have adjusted to the changes the industry has made in order to stop their schemes. In the second half, Greg and John talk about threat actors’ use of AI, which is in its experimentation phrase (like everyone else). In the reporter chat, Greg talks with AJ Vicens about research that shows how the walls are closing in on a suspect responsible for breaches tied to Snowflake. LINK: https://cyberscoop.com/snowflake-hacker-judische-labscon-2024/…
AI is transforming how companies secure their IT infrastructure, especially in industries like airlines, health care, retail, and telecommunications, which rely on applications and APIs for seamless digital experiences. However, there's a risk of companies improperly deploying AI tools or using insecure vendors, potentially leading to widespread data breaches and operational outages. CyberScoop Editor-in-Chief Greg Otto talks with F5 Networks CTO Kunal Anand about the increasing challenges in IT security and complexity as more AI applications are adopted and what companies should focus on to safeguard their systems as policies and regulations evolve. CyberScoop reporter Derek B. Johnson also sits down with Greg to talk about a congressional hearing that heavily focused on cybersecurity issues for election officials ahead of November.…
Secure-by-design transforms secure code from an afterthought to an inherent feature, weaving a resilient shield directly into the fabric of every application and device from the ground up. But while everyone’s mind gravitates toward the ocean of software we all use, how does secure-by-design translate to the Internet of Things? In this episode, CyberScoop Editor-in-Chief Greg Otto talks with RunSafe CEO Joe Saunders on how to incentivize manufacturers to create secure IoT devices. CyberScoop reporter Christian Vasquez also sits down with Greg to talk about two projects launched at this year’s DEF CON aimed at using volunteers to respond to localized cyber incidents.…
S
Safe Mode Podcast

1 Ted Schlein on the cybersecurity industry and the latest twist in the Trump-Iran hacking saga 46:18
If you want to understand cybersecurity policy, it’s not enough to focus on Washington D.C. — you have to also grok the American tech industry. Few people have bridged that divide more effectively than Ted Schlein, the legendary venture capitalist who is currently at Ballistic Ventures. On this episode of Safe Mode, he sits down with host Elias Groll to discuss Washington D.C., Silicon Valley and the relationship between the two. CyberScoop senior reporter AJ Vicens also joins the show to discuss the latest developments regarding Iran’s efforts to hack Donald Trump’s presidential campaign.…
S
Safe Mode Podcast

1 Hack-and-leak op targets Trump; a technical deep dive with John Hammond on the CrowdStrike outage 32:20
With Election Day rapidly approaching in the United States, the Trump campaign claims that the first major hack-and-leak operation has arrived. After a handful of U.S. media outlets received leaked material on vice presidential candidate JD Vance, the Trump campaign said it had been the victim of an Iranian hacking operation. On this episode of Safe Mode, CyberScoop senior reporter Tim Starks sits down with host Elias Groll to discuss what we know about the operation and its significance. Also on this episode, John Hammond of Huntress provides a technical deep dive on how an errant CrowdStrike software update managed to break large parts of the internet.…
S
Safe Mode Podcast

An epidemic of ransomware, cyberattacks on gas pipelines, Chinese infiltration of American critical infrastructure — these are just some of the cybersecurity issues the Biden administration has tackled during the president’s first term in office. With President Joe Biden’s time in office winding down, it’s worth taking stock: Has his administration managed to move the needle on cybersecurity? On this episode of Safe Mode, CyberScoop Senior Reporter Tim Starks sits down with host Elias Groll to discuss the administration’s numerous cybersecurity initiatives and to consider their impact.…
AI governance regimes the world over have seized on compute thresholds as a mechanism for implementing various controls on artificial intelligence systems. The basic idea is that if an AI model relies on a sufficiently large amount of computing power, then various controls kick in. As AI models get larger, the thinking goes, they also get riskier, and this means that AI governance regimes should focus on the largest models, as measured by computing power. But does this idea make any sense as a governing tool for the models of today and tomorrow? Sara Hooker leads Cohere’s research operation, and she’s looked hard at whether compute thresholds can be applied to AI systems to mitigate risks. On this episode of Safe Mode, she sits down with host Elias Groll to discuss her research on compute thresholds. CyberScoop’s newly minted editor in chief, Greg Otto, also joins the show to discuss how an errant CrowdStrike software update took down a huge number of critical services across the internet. Links: On the Limits of Compute Thresholds as a Governance Strategy | arXiv CrowdStrike Falcon flaw sends Windows computers into chaos worldwide | CyberScoop…
S
Safe Mode Podcast

Around the world policymakers seem to be grappling with the same question: How best to govern artificial intelligence? The Center for Security and Emerging Technology, a Washington-based think tank, has emerged as a key and influential player in that conversation. And on this episode of Safe Mode, its executive director, Dewey Murdick, sits down with host Elias Groll to describe what he sees as the enabling principles of AI governance. Also on the show this week, CyberScoop reporter AJ Vicens discusses a landmark breach affecting AT&T that saw call and text records of nearly all the company’s customers be stolen.…
We are living through an epidemic of ransomware. Last year alone, the amount paid to ransomware operators exceeded $1 billion, and the entities getting hit and seeing their operations disrupted by ransomware included hospitals, schools and libraries. Ransomware is both a public-health and national-security crisis, yet efforts to address the problem are not making a dent. Allan Liska is a senior intelligence analyst at Recorded Future and a leading analyst of the ransomware phenomenon, and on this episode of Safe Mode he sits down with host Elias Groll to discuss why it’s long past time to ban ransomware payments. CyberScoop reporter Derek Johnson also joins the show to discuss the U.S. intelligence community’s observations of information operations targeting the 2024 election.…
S
Safe Mode Podcast

When studying cyberoperations, it’s easy to become enamored with state-backed hackers. Russian and Chinese operations have done much to shape our understanding of how power is exercised online, but it’s not clear that the intense attention dedicated to such operations is well-placed. Amid the current epidemic of ransomware, criminal hacking groups are arguably having as much if not a greater impact on the lives of ordinary people. On this week’s episode of Safe Mode, Selena Larson, a senior threat intelligence analyst at Proofpoint, sits down with host Elias Groll to make the case for why e-crime groups should be afforded just as much attention as state-backed hackers, reframing how we think about the cybersecurity landscape. CyberScoop reporter Derek Johnson also joins the show to discuss the fallout of a major Supreme Court ruling on the fight against disinformation.…
The proliferation of artificial intelligence is exposing teens to a new online threat: AI-generated sexual imagery. Heather Barnhart is a fellow at the SANS Institute and a digital forensic expert, and on this episode of Safe Mode she sits down with host Elias Groll to discuss how teenagers and their families can protect themselves against the scourge of sextortion. CyberScoop reporter Derek Johnson also joins the show to discuss how election administrators are leaving their posts due to widespread harassment.…
Ласкаво просимо до Player FM!
Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.