Podcasts

Enjoy in-depth conversations and examination of cutting edge security topics with our industry leading podcasts.

Malicious Life Podcast: Operation GhostShell - An Iranian Espionage Campaign

Newly identified Iranian threat actor MalKamak that has been leveraging a new and sophisticated RAT (remote access trojan) dubbed ShellClient that abuses Dropbox for C2 (command and control)...

October 18, 2021 /

CISO Stories Podcast: Security Awareness that Actually Works

Steven Lentz joins the podcast to explain how he successfully engaged the workforce through creative and visible security awareness methods - check it out...

October 14, 2021 /

Malicious Life Podcast: Smart TVs - a New Security Battlefield

Smart TVs - equipped with microphones, cameras, and an internet connection - are the weakest link in smart home security. So, is a person's smart home still their castle? Check it out...

October 11, 2021 /

CISO Stories Podcast: Extending Detection and Response to the Cloud

CISO Kathy Wang discusses challenges in extending detection and response capabilities to cloud deployments while ensuring threats are correlated across endpoints, mobile, application suites and user identities - check it out...

October 7, 2021 /

Malicious Life Podcast: Inside the MITRE ATT&CK Framework

Cybereason CISO Israel Barak delves into the MITRE ATT&CK framework and explains how it can help organizations get better at detecting stealthy advanced attacks - check it out...

October 4, 2021 /

CISO Stories Podcast: Security from Scratch - Incident Response on a Budget

Every organization must be able to respond to an attack quickly - Sam Monasteri joins the podcast to discuss key steps to implement in an incident response plan without breaking the bank...

September 30, 2021 /

Malicious Life Podcast: Should the U.S. Ban Chinese and Russian Technology?

Every year there’s a new story of some software like 'Tik Tok' or 'FaceApp' from a hostile country that may be a security threat to us in the West - so what should be done in cases like this? Ira Winkler joins the discussion - check it out...

September 27, 2021 /

CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community

CISO Kevin Novak explains how to bring business units together to form your own DEFCON-type event in-house or in partnership with other organizations - check it out...

September 23, 2021 /

Malicious Life Podcast: Jack Rhysider and the Darknet Diaries

Jack Rhysider discusses the origins of Darknet Diaries and the effect the show’s success has had on his personal life - which you might be surprised to discover wasn’t always 100% positive - check it out...

September 20, 2021 /

CISO Stories Podcast: Communications Before, During and After a Breach

Melanie Ensign joins the podcast to explain how security teams benefit from relationships with the communications and public relations specialists before, during and after a breach event - check it out...

September 16, 2021 /

Malicious Life Podcast: The Tesla Hack

A mysterious stranger approached an employee of Tesla's Gigafactory and offered him 1 million dollars to insert a malware-laden USB flash drive into a company computer - check it out...

September 13, 2021 /

CISO Stories Podcast: The Unpatchable Vulnerability that is Human Nature

Rachel Tobac delves into social engineering where she leverages her background in neuroscience and behavioral psychology to exploit the unpatchable vulnerability that is human nature - check it out...

September 9, 2021 /

Malicious Life Podcast: Understanding China’s Cyber Culture

Lt. Colonel (Ret.) Bill Hagestad examines how China's culture and troubled history of western colonialism influenced its government views regarding the internet and its interactions with western tech companies...

September 7, 2021 /

CISO Stories Podcast: Did You Ask For (and Get) Too Much Security Budget?

What happens when you get the funding you asked for? CSO James Christiansen joins the podcast to discuss security budgeting lessons learned you won’t want to miss - check it out...

September 2, 2021 /

Malicious Life Podcast: The Life and Times of John McAfee

What do you get when you take a gun-toting cybersecurity pioneer and add a serious amount of money to the mix? You get John McAfee's unbelievable life and times - check it out...

August 30, 2021 /

CISO Stories Podcast: Practical Considerations for Managing Your MSSP

Jonathan Nguyen-Duy, VP Field CISO Team, joins this podcast to discuss strategies for working with MSSPs to ensure that your organization is obtaining the most value - check it out...

August 26, 2021 /

Malicious Life Podcast: Ten Years On - Are We Doing Security Right?

So how far have security solutions and capabilities come in a decade? Art Coviello, former CEO of RSA Security, is joined by Malcolm Harkins, former CSO at Intel, to discuss the cybersecurity landscape 10 years after the RSA Breach - check it out...

August 23, 2021 /

CISO Stories Podcast: Achieving Security Buy-In - Change Approach Not Culture

David Nolan, Vice President of Information Security at Aaron’s, joins the podcast to discuss how to achieve consensus on security in the organizations - check it out...

August 19, 2021 /

Malicious Life Podcast: DeadRinger - Exposing Chinese APTs Targeting Major Telcos

Cybereason identified several attack campaigns targeting the telecoms industry across Southeast Asia that are assessed to be the work of multiple Chinese APT groups - Nocturnus Team lead Assaf Dahan discusses the implications...

August 16, 2021 /

CISO Stories Podcast: Hacking Your Way Into Cybersecurity

Kerissa Varma discusses the security skills shortage and her initiative to recruit people from fields who have skill sets applicable to security, but they might not even know it - check it out...

August 11, 2021 /

Malicious Life Podcast: The Jester - Hacktivist for Good

The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets. So, who is The Jester and what can we make of his reported exploits? Check it out…

August 9, 2021 /

CISO Stories Podcast: Managing the Security Product Salesperson

Kevin Morrison, CISO at Alaska Air Group, joins the podcast to discuss strategies for dealing with salespeople and selecting the best products for the organization - check it out...

August 5, 2021 /

Malicious Life Podcast: The State of Credit Card Security

When Albert Gonzalez was hacking the networks of retail chains credit cards were still very insecure. We are joined by special guest Sherri Davidoff, CEO of LMG Security, who discusses the past and present state of credit card security - check it out…

August 2, 2021 /

CISO Stories Podcast: Ransomware Attacks and the True Cost to Business

An esteemed panel of subject matter experts examine recent research findings on ransomware attacks and the impact to businesses, and discuss how to prepare to defend against them - check it out...

July 30, 2021 /

CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable

Special guest Glenn Kapetansky, CSO Tat Trexin Consulting, discusses how security can be embedded into agile software development to produce fast and secure code - check it out...

July 28, 2021 /

Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 3

A fateful meeting between a U.S. Secret Service agent and a notorious European carder marks the beginning of the end for Albert Gonzalez and his 'All Star' crew of hackers...

July 26, 2021 /

Malicious Life Podcast: Dave Kennedy on the History of DerbyCon

Dave Kennedy, one of the founders of DerbyCon, talks about the unique vibe of the conference, his fear of clowns, and why he'll never listen to a Busta Rhymes album again - check it out…

July 19, 2021 /

Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 2

Special guest Sherri Davidoff continues the story where we find ShadowCrew's Gonzales working with the Secret Service on orchestrating the largest cybercrime bust in U.S history - check it out…

July 12, 2021 / 1 minute read

CISO Stories Podcast: CISO Business Enablement - Getting to Yes

CSO Dan Lohrmann discusses how he faced a dilemma where he was asked to implement a technology despite the fact that the technology was insecure - check it out...

July 8, 2021 /

Malicious Life Podcast: Jeff Moss on the History of DEF CON

Jeff Moss discusses the origins of DEF CON and its interesting relationship with law enforcement and the intelligence community over the years...

July 6, 2021 /

CISO Stories Podcast: Why Relationships Matter if You Want to Elevate Security

CISO Mark Weatherford navigates the rough waters by focusing on relationships and his knowledge of security activities across government - check it out...

July 1, 2021 /

Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 1

Special guest Sherri Davidoff has skillfully researched the fascinating life and exploits of Albert Gonzales, as detailed in her book Data Breaches - check it out…

June 28, 2021 /

CISO Stories Podcast: Fixing the Talent Shortage - Cybersecurity Talent Initiative

Special guest Alexander Niejelow, SVP for Cybersecurity at Mastercard discusses the Cybersecurity Talent Initiative, a public/private partnership which provides student loan assistance...

June 23, 2021 /

Malicious Life Podcast: History of the THOTCON Hacking Conference

How did a small-scale event in Chicago grow to become a major hacker conference? THOTCON co-founders Nick Percoco and Jonathan Tomek reveal all - check it out…

June 22, 2021 /

CISO Stories Podcast: So You Want to be a Cyber Spy?

Ira Winkler recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author...

June 17, 2021 /

Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 3

Special guest Lieutenant Colonel, USMC (retired) Bill Hagestad, a leading international authority on cyberwarfare and Chinese cyber operations and capabilities...

June 15, 2021 /

CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

Special guest Dawn Cappelli, VP Global Security and CISO at Rockwell Automation, discusses strategies to build a better insider risk program to mitigate these threats - check it out...

June 9, 2021 /

Malicious Life Podcast: Inside the DarkSide Colonial Pipeline Attack

Threat researcher Assaf Dahan examines the DarkSide attack on Colonial Pipeline, and the implications for the security of critical infrastructure...

June 8, 2021 / 1 minute read

CISO Stories Podcast: CISOs Cross the Bridge to the Cloud

Join special guest Jim Reavis, CEO at the Cloud Security Alliance, to learn how to use appropriate controls to manage cloud environments securely...

June 3, 2021 /

Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 2

Nortel was positioning itself China's partner, not knowing it was China's primary target for corporate espionage and 'Unrestricted Warfare' doctrine...

June 1, 2021 /

CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets

Roland Cloutier, Global CSO at TikTok, discusses five critical elements for developing an effective Critical Asset Protection Program (CAPP) - check it out...

May 25, 2021 /

Malicious Life Podcast: The Untold Story of the RSA Breach Part 2

No longer bound by NDA, former RSA execs share the untold story behind one of the most impactful attacks of all time - check it out...

May 24, 2021 / 1 minute read

Malicious Life Podcast: The Untold Story of the RSA Breach Part 1

No longer bound by NDA, former RSA execs tell how the infamous breach unfolded and share the untold story behind one of the most impactful attacks of all time - check it out...

May 20, 2021 / 1 minute read

CISO Stories Podcast: Passion for Solving Problems is Key to Security

Will Lin, co-creator of the CISO community Security Tinkerers, discusses his passion for technology and how it led him to a career helping security companies launch and supporting CISOs through collaboration...

May 18, 2021 /

CISO Stories Podcast: Effective Health Care Security is More Than HIPAA

Hear how one healthcare CISO is having risk-based discussions at the right levels to address the security challenge...

May 13, 2021 /

Malicious Life Podcast: Creating BSides - A Grassroots Security Conference

Jack Daniel recalls how the BSides conference started and what 'community-oriented' events contribute that other events often cannot - check it out...

May 11, 2021 /

CISO Stories Podcast: Stop Reporting Useless Security Metrics!

Edward Marchewka, founder at Chicago Metrics, explains the strategy behind different measures and how they can be applied to improve performance...

May 6, 2021 /

Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 1

Special guest Bill Hagestad, a leading international authority on cyberwarfare, gives us a look inside Chinese cyber operations - check it out...

May 4, 2021 /

CISO Stories Podcast: Necessity is the Mother of Security

Tatu Ylönen, SSH founder and inventor of Secure Shell, discusses the protocol and the application of technological solutions to security challenges...

April 29, 2021 /

Malicious Life Podcast: Can Nuclear Power Plants Be Hacked?

Andrew Ginter dives into cybersecurity challenges for Nuclear facilities - how secure are modern nuclear power plants from cyber attacks? Check it out...

April 27, 2021 /

CISO Stories Podcast: He Fought the FTC Over a Breach and Won

Hear how Mike Daugherty, CEO of LabMD, took on the FTC and mounted a multi-year defense to combat the outrageous allegations leveled by the regulatory agency...

April 21, 2021 /

Malicious Life Podcast: Shutting Down the Internet in 30 Minutes

Chris Wysopal, one of L0pht's founding members, talks about the group's 1998 Senate testimony and how they used shaming to force corporations to secure their software...

April 20, 2021 / 1 minute read

CISO Stories Podcast: Is There a Magic Security Control List?

Tony Sager, a 35-year NSA software vulnerability analyst and executive, discusses how the CIS Controls can be used effectively to manage your environment...

April 15, 2021 /

Malicious Life Podcast: The Story of LØpht Heavy Industries, Part 2

By the end of the ‘90s many of the L0pht hackers had quit their day jobs and incorporated under the name L0pht Heavy Industries...

April 13, 2021 /

CISO Stories Podcast: Doing Security Before Security Was a Career Path

Special guest Petri Kuivala, CISO at NXP Semiconductors, recounts his journey from municipal police officer to cybercrimes unit investigator to Chief Information Security Officer during the early days when security was largely an afterthought...

April 8, 2021 /

Malicious Life Podcast: The Story of L0pht Heavy Industries, Part 1

'L0pht' was one of the most influential hacker collectives of the '90s: they were even invited to testify in front of Congress on the state of Internet security. In this episode of Malicious Life, four of L0pht's members talk about the beginning and influence of the L0pht on cybersecurity. - check it out...

April 6, 2021 /

CISO Stories Podcast: The Colonoscopy of CyberSecurity

The information & cybersecurity industry has no shortage of regulations, many organizations simply rundown the list of requirements, load them into a spreadsheet and check the boxes to show they are compliant. But is being compliant the same as being secure? Tune in to this CISO podcast episode with guest Lee Parrish

April 1, 2021 /

CISO Stories Podcast: Going All-In on a Career in Security

Mauro Israel, CISO at BIOOOS, discusses his colorful background and how he – like many in the security field – discovered his true calling late in life and was able to apply his wide range of knowledge & experience to the role of CISO in the healthcare field. Check out the new episode of the CISO stories podcast

March 26, 2021 /

Malicious Life Podcast: Inside the HAFNIUM Microsoft Exchange Attacks

The recent HAFNIUM attacks hit tens of thousands of organizations’ Microsoft Exchange servers. What happened, what were the vulnerabilities exploited in the attack, and what can we do to defend against such attacks in the future? In this episode, Host Ran Levi is joined by Israel Barack, Cybereason CISO

March 23, 2021 /

Malicious Life Podcast: Inside NotPetya, Part 2

Listen as we break down the chain of events from the moment NotPetya began to spread around the world to the moment it was stopped by Amit Serper who was on his way to friends when he decided to take a swipe at the malware. Catch the latest episode of the Malicious Life podcast with guest Cyber Analyst Amit Serper

March 22, 2021 /

CISO Stories Podcast: Is Cybersecurity ROI Necessary?

Business units are challenged to demonstrate ROI on their spending, why should information security departments be any different? Tune in to the latest podcast episode to learn why calculating ROI for security may not be necessary and how reducing risk involves different considerations

March 17, 2021 /

CISO Stories Podcast: Your Job is to Make Cybersecurity Simple

The CISO position in some organizations is relatively new, but the role has actually been evolving over the past 25 years - ever since Citibank named the first CISO, Steve Katz, in 1995. Join this podcast to learn how Steve navigated the early days of security and the changes he sees in the role today...

March 10, 2021 /

CISO Stories Podcast: …and Other Useless Security Constructs

"Bob Bigman, former CISO for the CIA, simplifies the conversation by slaughtering some of the industry’s most sacred cows like risk tolerance as a key driver for security programs..."

March 4, 2021 /

CISO Stories Podcast: Without Building a CISO EQ, You May Be On Your Own

Join us as we welcome special guest Marci McCarthy, CEO and President at T.E.N. Inc., to learn how CISOs can better maintain self-awareness, exercise empathy and emotional intelligence to gain trust of others, and exercise appropriate self-care.

March 3, 2021 /

Malicious Life Podcast: Inside NotPetya, Part 1

Host Ran Levi is joined by Amit Serper, the first researcher to tackle NotPetya and provide a solution when he was Principal Security Researcher at Cybereason...

March 3, 2021 /

CISO Stories Podcast: Doing Privacy Right vs. Doing Privacy Rights

Organizations need to be conscious of where they are in reference to the ‘creepy line.’ Join this podcast with special guest Valerie Lyons to learn how to determine the data collection and processing appropriate for your organization...

February 25, 2021 /

Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 2

Host Ran Levi is joined by attorney and privacy expert Ted Claypoole, and Andrew Maximov, CEO at Promethean AI who uses AI to fight Belarus's dictatorship, to explore the implications...

February 17, 2021 /

CISO Stories Podcast: SLED Security - Pandemics, Policies, and Penny-Pinching

The Cybersecurity Coalition’s Ari Schwartz brings us up to date on some of the organization’s initiatives and then dives into some of the challenges SLED defenders are facing in trying to do more with less…

February 17, 2021 /

CISO Stories Podcast: Telling Scary Stories to the Board? Stop. Here’s Why…

Enjoy this podcast with special guest Mischel Kwon to learn how to translate information security technical issues into a business-focused language and determine the right amount of technical language to share with executives…

February 12, 2021 /

Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 1

Clearview AI scrapes billions of images off social media and the open web, applies facial recognition algorithms on them, and sells that data to law enforcement agencies all over the world. But who are the people behind this secretive company, and what did a breach into its databases reveal?

February 12, 2021 /

Malicious Life Podcast: Inside Clearview AI Facial Recognition

Clearview AI scrapes billions of images off social media and the open web, applies facial recognition algorithms on them, and sells that data to law enforcement agencies all over the world. But who are the people behind this secretive company, and what did a breach into its databases reveal?

February 3, 2021 /

Malicious Life Podcast: Breaking Into Secure Buildings

FC - aka 'Freaky Clown' - is an expert in physical security assessments - otherwise known as breaking into ultra-secure buildings like big international banks - check it out...

January 7, 2021 /

Malicious Life Podcast Special: The SolarWinds Attacks

Security expert Israel Barak discusses the SolarWinds Supply Chain Attacks, how can organizations defend against similar attacks, and what all this has to do with evolution and natural selection - check it out...

December 28, 2020 /

Malicious Life Podcast: 100th Episode Special

Here's three stories that were just too good to leave on the editing room floor: Shadow Inc.  and Election Hacking, J&K / Max Headroom, and T-Shirt-Gate and Yahoo's Ugly Death - check it out...

December 21, 2020 /

Malicious Life Podcast: Jan Sloot's Incredible Data Compression System

In the mid-'90s, a Dutch TV repairman claimed he invented a revolutionary data compression technology that could compress a full-length movie into just 8KB - check it out...

December 7, 2020 /

Malicious Life Podcast: Operation GUNMAN and the World's First Keylogger

Operation GUNMAN commenced debugging of electronic devices in the US embassy in the USSR and resulted in a surprising discovery that made the NSA what it is today - check it out...

November 22, 2020 /

Malicious Life Podcast: Election Hacking Part 2

The upcoming elections are plagued with uncertainty - and uncertainty and democracy go together like wet hands and electrical outlets - check it out...

November 2, 2020 /

Malicious Life Podcast: Election Hacking Part 1

Depending on which way this one state leans may bring the entire electoral college with it - a situation where the election systems cannot afford to be hacked, but might be - check it out...

October 26, 2020 /

Malicious Life Podcast: MDR vs. The TrickBot Gang

The Cybereason Managed Detection and Response team (aka MDR) uncovered an attack involving Russian cybercriminals, POS devices and an new family of malware - check it out...

October 12, 2020 /

Malicious Life Podcast: Yahoo's Ugly Death Part 1

When Marissa Mayer joined Yahoo as CEO, the company's stock rose 2% the day of the announcement. But the new CEO was basically initiated into her job by a major data breath - and the worst was yet to come...

September 11, 2020 /

Malicious Life Podcast: The Great Firewall of China Part 2 - Cisco's Trial

Falun Gong movement members sued Cisco Systems for aiding and abetting the Chinese government in their persecution - having helped China erect Golden Shield - the massive IT infrastructure which combined internet censorship and cyber-spying...

August 22, 2020 /

Malicious Life Podcast: The Great Firewall of China Part 1

The Great Firewall is just mind-bogglingly big, repressing freedom of speech and information for over 800 million Chinese internet users every year. How did the Chinese manage to build it in the first place?

August 14, 2020 /

Malicious Life Podcast: Multi-Stage Ransomware

Israel Barak, Cybereason CISO, discusses the latest development in ransomware evolution: multi-stage attacks. What does this new tactic mean for the use of backups as a mean to mitigate the risk from ransomware?

August 2, 2020 /

Malicious Life Podcast: Protecting the Panama Papers Whistleblower

In 2015 Bastian Obermayer, an investigative journalist received a message about the biggest leak in journalism history. But dealing with the massive 2.7 Terabyte data dump, 11.5 million documents turned out to be a huge challenge...

July 16, 2020 /

Malicious Life Podcast: From Ransomware to Blackmail

Attackers keep modifying and improving their methods of operations. Assaf Dahan, Sr. Director and Head of Threat Research at Cybereason, tells us about the recent shift to double extortion blackmail as a way to pressure ransomware victims to pay up...

July 7, 2020 /

Malicious Life Podcast: SegWit2x Part 3

When Bitcoin forked, it wasn't the SegWit2x fork everyone was talking about - It was a different fork, supported by a coalition of miners who were essentially ditching SegWit2x in favor of their own scaling solution. What happened here and who betrayed SegWit2x?

July 2, 2020 /

Malicious Life Podcast: SegWit2x Part 2

SegWit2x was proposed as a solution to Bitcoin's network problems - but some people in the anti-2x movement claimed that it is nothing less than a cyber-attack: a 51% attack on Bitcoin, to be precise. This is getting ugly...

June 18, 2020 /

Malicious Life Podcast: SegWit2x or the Year Bitcoiners Will Never Forget Part 1

In 2017, Bitcoin was winning. It appeared that a Golden Age had dawned. But just under the surface, the network was teetering on the verge of collapse...

June 4, 2020 /

Malicious Life Podcast: No Honor Among Thieves

Amit Serper was doing a routine inspection on a client's network, when he came across a suspicious-looking pen-testing tool, exhibiting RAT-like behavior. We'll follow Amit's investigation, and in the process learn the basics of cyber research...

May 21, 2020 /

Malicious Life Podcast: Maintaining Secure Business Continuity with a Remote Workforce

The COVID19 pandemic forced organizations to transition to a work-from-home model - CSO Sam Curry talks about the lessons learned and what steps should Cyber Security professionals take in order to be ready for a future outbreak...

May 14, 2020 /

Malicious Life Podcst: The Problem with Passwords

It’s easy to blame people for reusing bad passwords, but since so many do we have to look at the common factor. - there are flaws inherent to the mechanism of authenticating users by static password strings...

May 7, 2020 /

Malicious Life Podcast: The Huawei Ban, Part 2

At the end of our last episode, it seemed like Huawei was completely innocent. They were being accused of crimes they may not have committed, based on evidence that largely did not exist. But there’s another side to this story...

April 23, 2020 /

Malicious Life Podcast: The Huawei Ban, Part 1

Over the past 20 years, western governments have accused Huawei of everything from IP theft to financial fraud to cyber espionage. Is Huawei really a national security threat, or are they a political scapegoat?

April 9, 2020 /

Malicious Life Podcast: The Max Headroom Signal Hijack

On November 22nd, 1987, a hacker took over the signals of two Chicago-area TV stations and broadcast two bizarre and somewhat vulgar messages. We explore this notorious hack and its implications...

March 24, 2020 /

Malicious Life Podcast: ToTok, Part 3: Becoming a Spyware Superpower

The fact that ToTok came out of the UAE is no surprise: in recent years, the UAE has deployed some of the most sophisticated mobile device exploits ever seen. But they got a lot of help from one country in particular...

March 24, 2020 /

Malicious Life Podcast: ToTok, Part 2: The Masterminds of Mobile Malware

The corporate structure supporting ToTok involved at least half a dozen real companies, shell companies, and intelligence groups, with every path leading to one very rich and powerful man at the heart of the Emirati state...

March 10, 2020 /

Malicious Life Podcast: ToTok, Part 1: How to Convince Someone to Download Spyware

Only a few months after its release, ToTok - an ordinary messaging app - had over 5 million downloads. What was it that made ToTok so popular, so quickly? The answer: nothing good...

March 5, 2020 /

Malicious Life Podcast: How to Defend a Bank Part 2 - Right of Bang

As much as we can imagine what it’s like to be a defender in a cyber conflict, we don’t really know unless we’re in the shoes at the time of it happening. That's what simulations are for...

February 27, 2020 /

Malicious Life Podcast: How to Defend a Bank Part 1 - Fusion Centers

Banks and other financial institutions face a variety of security threats. - to survive in this hostile landscape, these organizations turned to the military for inspiration...

February 13, 2020 /

Malicious Life Podcast: Triton Part 2 - The World’s Most Dangerous Malware

Petro Rabigh were facing lots of problems in defending their systems, but they did get lucky in one sense: their attackers were unprepared when their plan went awry...

January 29, 2020 /