Threats

man in front of whiteboard

Episode 166: But Why, AI? ZestAI’s Quest to make Artificial Intelligence Explainable

In this episode of the podcast (#166): Jay Budzik, the Chief Technology Officer at ZestAI, joins us to talk about that company’s push to make artificial intelligence decisions explainable and how his company’s technology is helping to root out synthetic identity fraud.

Episode 161: 3 Years after Mirai, IoT DDoS Problem may get Worse

Three years after the Mirai botnet launched some of the biggest denial of service attacks ever seen, DDoS is a bigger problem and ever. Even worse: we stand on the made up of webcams and other Internet of things as technologies like 5G bring greater bandwidth to connected endpoints. In this podcast, we speak with Hardik Modi, the senior director of threat intelligence at the firm NetScout Systems* about the lessons from his company’s latest threat intelligence report.

Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk

We talk to Bruce McDonnell of the East West Institute about how insurers are responding.

Episode 157: Do we need an FDA for Software? Also: operationalizing Threat Intelligence

Sarah Zatko of the Cyber Independent Testing Lab joins us to talk about CITL’s big new study of firmware security. In our second segment, we’re joined by Allan Thomson who is the Chief Technology Officer at LookingGlass Cyber Solutions to talk about the growing use of cyber threat intelligence and the need to evolve cybersecurity practices to keep ahead of fast-evolving threats.

MH-17 Disinformation Tweets

Episode 155: Disinformation is a Cyber Weapon and APTs warm to Mobile Malware

In this week’s episode of the Podcast (#155): Jerome Segura of Malwarebytes joins us to talk about how disinformation campaigns and cyber crime are part of the same toxic cocktail in the world’s trouble spots, like Ukraine. Also: Adam Meyers of CrowdStrike joins us to talk about that company’s first ever report on mobile malware, which is gaining currency with advanced persistent threat (APT) groups.