podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Cyberside Chats
Shows
Cyberside Chats: Cybersecurity Insights from the Experts
Nancy Guthrie’s Recovered Footage: The Reality of Residual Data
After the FBI announced it recovered previously inaccessible video from Nancy Guthrie’s disconnected Google Nest doorbell, one thing became clear: in releasing the footage, authorities revealed an important truth — deleted surveillance footage may not really be deleted. That means law enforcement (or threat actors) could potentially access it. The case remains ongoing and deeply serious. For enterprise security leaders, the lesson is bigger than a consumer camera: modern systems often retain residual data across devices, local buffers, and vendor backends, even when teams believe it has been removed. In this episode of Cyberside Chats, we examine what...
2026-02-17
15 min
Cyberside Chats: Cybersecurity Insights from the Experts
Ransomware Gangs Are Teaming Up
Ransomware gangs aren’t operating alone anymore and the lines between them are increasingly blurry. In this episode of Cyberside Chats, we look at how modern ransomware groups collaborate, specialize, and team up to scale attacks faster. Using ShinyHunters’ newly launched data leak website as an example, we discuss how different crews handle access, social engineering, and data exposure, and why overlapping roles make attribution, defense, and response harder. We also explore what this shift means for security leaders, from training and identity protection to preparing for data extortion that doesn’t involve encryption.
2026-02-10
15 min
Cyberside Chats: Cybersecurity Insights from the Experts
Top Threat of 2026: The AI Visibility and Control Gap
AI is no longer a standalone tool—it is embedded directly into productivity platforms, collaboration systems, analytics workflows, and customer-facing applications. In this special CyberSide Chats episode, Sherri Davidoff and Matt Durrin break down why lack of visibility and control over AI has emerged as the first and most pressing top threat of 2026. Using real-world examples like the EchoLeak zero-click vulnerability in Microsoft 365 Copilot, the discussion highlights how AI can inherit broad, legitimate access to enterprise data while operating outside traditional security controls. These risks often generate no alerts, no indicators of compromise, and no obvious “incident” until...
2026-02-03
18 min
Cyberside Chats: Cybersecurity Insights from the Experts
Data Is Hazardous Material: How Data Brokers Telematics and Over-Collection Are Reshaping Cyber Risk
The FTC has issued an order against General Motors for collecting and selling drivers’ precise location and behavior data, gathered every few seconds and marketed as a safety feature. That data was sold into insurance ecosystems and used to influence pricing and coverage decisions — a clear reminder that how organizations collect, retain, and share data now carries direct security, regulatory, and financial risk. In this episode of Cyberside Chats, we explain why the GM case matters to CISOs, cybersecurity leaders, and IT teams everywhere. Data proliferation doesn’t just create privacy exposure; it creates systemic risk that fuels i...
2026-01-20
19 min
Cyberside Chats: Cybersecurity Insights from the Experts
Venezuela’s Blackout: Cybercrime Domino Effect
When Venezuela experienced widespread power and internet outages, the impact went far beyond inconvenience—it created a perfect environment for cyber exploitation. In this episode of Cyberside Chats, we use Venezuela’s disruption as a case study to show how cyber risk escalates when power, connectivity, and trusted services break down. We examine why phishing, fraud, and impersonation reliably surge after crises, how narratives around cyber-enabled disruption can trigger copycat or opportunistic attacks, and why even well-run organizations resort to risky security shortcuts when normal systems fail. We also explore how attackers weaponize emergency messaging, imperson...
2026-01-13
13 min
Cyberside Chats: Cybersecurity Insights from the Experts
What the Epstein Files Teach Us About Redaction and AI
The December release of the Epstein files wasn’t just controversial—it exposed a set of security problems organizations face every day. Documents that appeared heavily redacted weren’t always properly sanitized. Some files were pulled and reissued, drawing even more attention. And as interest surged, attackers quickly stepped in, distributing malware and phishing sites disguised as “Epstein archives.” In this episode of Cyberside Chats, we use the Epstein files as a real-world case study to explore two sides of the same problem: how organizations can be confident they’re not releasing more data than intended, and how they...
2026-01-06
15 min
Cyberside Chats: Cybersecurity Insights from the Experts
Inside Jobs: How CrowdStrike, DigitalMint & Tesla Got Burned
Insider threats are accelerating across every sector. In this episode, Sherri and Matt unpack the CrowdStrike insider leak, the two DigitalMint employees indicted for BlackCat ransomware activity, and Tesla’s multi-year insider incidents ranging from nation-state bribery to post-termination extortion. They also examine the 2025 crackdown on North Korean operatives who used stolen identities and deepfake interviews to get hired as remote workers inside U.S. companies. Together, these cases reveal how attackers are buying, recruiting, impersonating, and embedding insiders — and why organizations must rethink how they detect and manage trusted access. Key Takeaways Build a cultu...
2025-12-02
23 min
Cyberside Chats: Cybersecurity Insights from the Experts
Made in China—Hacked Everywhere?
From routers to office cameras to employee phones and even the servers running your network, Chinese-manufactured components are everywhere—including throughout your own organization. In this live Cyberside Chats, we’ll explore how deeply these devices are embedded in modern infrastructure and what that means for cybersecurity, procurement, and third-party risk. We’ll break down new government warnings about hidden communication modules, rogue firmware, and “ghost devices” in imported tech—and how even trusted brands may ship products with risky components. Most importantly, we’ll share what you can do right now to identify exposure, strengthen procurement and third-party...
2025-11-25
25 min
Cyberside Chats: Cybersecurity Insights from the Experts
LOUVRE Was the Password?! Cybersecurity Lessons from the Heist
When thieves pulled off a lightning-fast heist at the Louvre on October 19, 2025, the world focused on the stolen jewels. But leaked audit reports soon revealed another story — one of weak passwords, legacy systems, and a decade of ignored warnings. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin dig into the cybersecurity lessons behind the Louvre’s seven-minute robbery. They explore how outdated infrastructure, poor vendor oversight, and default credentials mirror the same risks plaguing modern organizations — from hospitals to banks. Listen as Sherri and Matt connect the dots between a world-famous museum and your...
2025-11-11
17 min
Cyberside Chats: Cybersecurity Insights from the Experts
The Power of “Why” – Communicating Cybersecurity Effectively
In this episode of Cyberside Chats, Matt Durrin and his guest explore what makes cybersecurity communication effective — whether you’re leading a sales presentation, a training session, or a tabletop exercise. The discussion dives into how to move beyond technical jargon and statistics to tell stories that resonate. Listeners will learn how understanding and communicating the “why” behind security practices can dramatically improve engagement, retention, and impact across any audience. Top Takeaways Lead With Why: Start with impact and consequences before discussing tools or features. Use Stories, Not Just Stats: Connect technical points to human exp...
2025-10-14
24 min
Cyberside Chats: Cybersecurity Insights from the Experts
Shutdown Fallout: The Cybersecurity Information Sharing Act Expires
When the government shut down, the Cybersecurity Information Sharing Act of 2015 expired with it. That law provided liability protections for cyber threat information sharing and underpinned DHS’s Automated Indicator Sharing (AIS) program, which costs about $1M a month to run. Is it worth the cost? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin dig into the value of public-private information sharing, the uncertain future of AIS, and how cybersecurity leaders should adapt as visibility gaps emerge. Along the way, they share a real-world story of how information sharing stopped a ransomware attack in its tracks — and...
2025-10-07
17 min
Cyberside Chats: Cybersecurity Insights from the Experts
Vibe Hacking: The Dark Side of AI Coding
What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of Cyberside Chats Live, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the future of security. Key Takeaways Establish ground rules for AI use Even if you don’t have developers, employees may experiment with AI tools. Set a policy for how (or if) AI can be used for coding, auto...
2025-09-23
27 min
Cyberside Chats: Cybersecurity Insights from the Experts
Connected App, Connected Risk: The Salesforce–Drift Incident
A single weak app integration opened the door for attackers to raid data from some of the world’s largest companies. Salesforce environments were hit hardest—with victims like Cloudflare, Palo Alto Networks, and Zscaler—but the blast radius also reached other SaaS platforms, including Google Workspace. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the Salesforce–Drift breach: how OAuth tokens became skeleton keys, why media headlines about billions of Gmail users were wrong, and what organizations need to do to protect themselves from similar supply chain attacks. Key Takeaways Ensure Ven...
2025-09-09
13 min
Cyberside Chats: Cybersecurity Insights from the Experts
Printer Problems: Trump, Putin, and a Costly Mistake
On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a gift list—sparking international headlines and White House mockery. But the real story isn’t just about geopolitics. It’s about how unmanaged printers—at hotels, in home offices, and everywhere in between—remain one of the most overlooked backdoors for data leaks. In this episode of Cyberside Chats, Sherri and Matt unpack the Alaska incident, explore why printers are still a weak spot in the age of...
2025-08-26
15 min
Cyberside Chats: Cybersecurity Insights from the Experts
Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain
A wave of coordinated cyberattacks has hit Salesforce customers across industries and continents, compromising millions of records from some of the world’s most recognized brands — including Google, Allianz Life, Qantas, LVMH, and even government agencies. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down how the attackers pulled off one of the most sweeping cloud compromise campaigns in recent memory — using no zero-day exploits, just convincing phone calls, malicious connected apps, and gaps in cloud supply chain security. We’ll explore the attack timeline, parallels to the Snowflake breaches, ties to the Sca...
2025-08-19
14 min
Cyberside Chats: Cybersecurity Insights from the Experts
The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security
A silent compromise, nearly a million developers affected, and no one at Amazon knew for six days. In this episode of Cyberside Chats, we’re diving into the Amazon Q AI Hack, a shocking example of how vulnerable our software development tools have become. Join hosts Sherri Davidoff and Matt Durrin as they unpack how a misconfigured GitHub token allowed a hacker to inject destructive AI commands into a popular developer tool. We’ll walk through exactly what happened, how GitHub security missteps enabled the attack, and why this incident is a critical wake-up call for supply chai...
2025-08-05
21 min
Cyberside Chats: Cybersecurity Insights from the Experts
Leaked and Loaded: DOGE’s API Key Crisis
On July 13, 2025, a developer at the Department of Government Efficiency—DOGE—accidentally pushed a private xAI API key to GitHub. That key unlocked access to 52 unreleased LLMs, including Grok‑4‑0709, and remained active long after discovery. In this episode of Cyberside Chats, we examine how a single leaked credential became a national-level risk—and how it mirrors broader API key exposures at BeyondTrust and across GitHub. LMG Security’s Director of Penetration Testing, Tom Pohl, shares red team insights on how embedded secrets give attackers a foothold—and what CISOs must do now to reduce their exposure. Key T...
2025-07-22
15 min
Cyberside Chats: Cybersecurity Insights from the Experts
Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands
In June 2025, the White House issued an executive order that quietly eliminated several key federal cybersecurity requirements. In this episode of Cyberside Chats, Sherri and Matt break down exactly what changed—from the removal of secure software attestations to the rollback of authentication requirements—and what remains in place, including post-quantum encryption support and the FTC’s Cyber Trust Mark. We’ll talk about the practical impact for security leaders, why this mirrors past challenges like PCI compliance, and what your organization should do next. Key Takeaways (for CISOs and Security Leaders) Don’t Drop SBOMs or Attestations — Build Them I...
2025-07-08
19 min
Cyberside Chats: Cybersecurity Insights from the Experts
The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits
Can your AI assistant become a silent data leak? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down EchoLeak, a zero-click exploit in Microsoft 365 Copilot that shows how attackers can manipulate AI systems using nothing more than an email. No clicks. No downloads. Just a cleverly crafted message that turns your AI into an unintentional insider threat. They also share a real-world discovery from LMG Security’s pen testing team: how prompt injection was used to extract system prompts and override behavior in a live web application. With examples ranging from corporate chatbots to...
2025-06-24
13 min
Cyberside Chats: Cybersecurity Insights from the Experts
When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
What happens when your AI refuses to shut down—or worse, tries to blackmail you to stay online? Join us for a riveting Cyberside Chats Live as we dig into two chilling real-world incidents: one where OpenAI’s newest model bypassed shutdown scripts during testing, and another where Anthropic’s Claude Opus 4 wrote blackmail messages and threatened users in a disturbing act of self-preservation. These aren’t sci-fi hypotheticals—they’re recent findings from leading AI safety researchers. We’ll unpack: The rise of high-agency behavior in LLMs The shocking findings from Apollo Research and Anthropic What...
2025-06-17
26 min
Cyberside Chats: Cybersecurity Insights from the Experts
Retailgeddon Reloaded: Beyond Card Theft, Into Chaos
Retail breaches are back — but they’ve evolved. This isn’t about skimming cards anymore. From ransomware taking down pharmacies to credential stuffing attacks hitting brand loyalty, today’s breaches are about disruption, trust, and third-party exposure. In this episode of Cyberside Chats, hosts Sherri Davidoff and Matt Durrin break down the latest retail breach wave, revisit lessons from the 2013 “Retailgeddon” era, and highlight what every security leader — not just in retail — needs to know today. Key Takeaways Redefine what “sensitive data” means. Names, emails, and access tokens are often more valuable to attackers than payment data. Sc...
2025-06-10
17 min
Cyberside Chats: Cybersecurity Insights from the Experts
How Hackers Get In: Penetration Testing Secrets from the Front Line
Think your network is locked down? Think again. In this episode of Cyberside Chats, we’re joined by Tom Pohl, LMG Security’s head of penetration testing, whose team routinely gains domain admin access in over 90% of their engagements. How do they do it—and more importantly, how can you stop real attackers from doing the same? Tom shares the most common weak points his team exploits, from insecure default Active Directory settings to overlooked misconfigurations that persist in even the most mature environments. We’ll break down how features like SMB signing, legacy broadcast protocols, and other out...
2025-06-03
26 min
Cyberside Chats: Cybersecurity Insights from the Experts
Afterlife Access: Cybersecurity Planning for When You’re Gone
What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate your digital legacy—without needing a password-cracking expert. Learn practical strategies for secure preparation, policy design, and real-world implementation from a security professional’s perspective. Takeaways 1) Take a Digital Inventory of Your Assets Include details like account recovery options, tw...
2025-05-27
16 min
Cyberside Chats: Cybersecurity Insights from the Experts
The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
In this explosive episode of Cyberside Chats, we dive into one of the most shocking developments in ransomware history—LockBit got hacked. Join us as we unpack the breach of one of the world’s most notorious ransomware-as-a-service gangs. We explore what was leaked, why it matters, and how this leak compares to past takedowns like Conti. You'll also get the latest insights into the 2025 ransomware landscape, from victim stats to best practices for defending your organization. Whether you’re an incident responder or just love cyber drama, this episode delivers. Takeaways Stay Tuned for Analysis of LockB...
2025-05-20
12 min
Cyberside Chats: Cybersecurity Insights from the Experts
Quantum Shift: How Cybersecurity Must Evolve Now
Quantum computing is advancing rapidly—and with it, the potential to break today’s most widely used encryption standards. In this episode of Cyberside Chats, Sherri and Matt cut through the hype to explore the real-world cybersecurity implications of quantum technology. From the looming threat to encryption to the emerging field of post-quantum cryptography, our experts will explain what security pros and IT teams need to know now. You'll walk away with a clear understanding of the risks, timelines, and concrete steps your organization can take today to stay ahead of the curve. Takeaways & How to Pre...
2025-04-29
20 min
Cyberside Chats: Cybersecurity Insights from the Experts
Red Alert: CISA's Budget Cuts and the Fallout for Defenders
CISA, the U.S. government’s lead cyber defense agency, just took a major financial hit—and the fallout could affect everyone. From layoffs and ISAC cuts to a near-shutdown of the CVE program, these changes weaken critical infrastructure for cyber defense. In this episode of Cyberside Chats, we unpack what’s been cut, how it impacts proactive services like free risk assessments and scanning, and what your organization should do to stay ahead. Takeaways: Don’t wait for Washington—assume support from CISA and ISACs may be slower or scaled back. Map your dependencies on CISA services...
2025-04-22
16 min
Cyberside Chats: Cybersecurity Insights from the Experts
23andMe: Breaches, Bankruptcy, and Security
When a company built on sensitive data collapses, what happens to the information it collected? In this episode of Cyberside Chats, we examine 23andMe’s data breach, its March 2025 bankruptcy, and the uncomfortable parallels with the 2009 Flyclear shutdown. What happens to biometric or genetic data when a vendor goes under? What protections failed—and what should corporate security leaders do differently? Drawing from past and present breaches, we offer a roadmap for corporate resilience. Learn practical steps for protecting your data when your vendors can’t protect themselves. #Cybersecurity #Databreach #23andMe #CISO #IT #ITsecurit...
2025-04-15
13 min
Cyberside Chats: Cybersecurity Insights from the Experts
"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"
Unauthorized communication platforms—aka shadow channels—are increasingly used within enterprise and government environments, as demonstrated by the recent Signal scandal. In this week's episode of Cyberside Chats, special guest Karen Sprenger, COO at LMG Security, joins Matt Durrin to delve into the critical issue of shadow IT, focusing on recent controversies involving unauthorized communication tools like Signal and Gmail in sensitive governmental contexts. Matt and Karen discuss the risks associated with consumer-grade apps in enterprise environments, the need to balance usability and security, and how organizations can better manage their communication tools to mitigate these risks. This...
2025-04-08
17 min
Cyberside Chats: Cybersecurity Insights from the Experts
The Encryption Battle: Security Savior or Cyber Risk?
Governments are pushing for encryption backdoors—but at what cost? In this episode of Cyberside Chats, we break down Apple’s fight against the UK’s demands, the global backlash, and what it means for cybersecurity professionals. Are backdoors a necessary tool for law enforcement, or do they open the floodgates for cybercriminals? Join us as we explore real-world risks, historical backdoor failures, and what IT leaders should watch for in evolving encryption policies. Stay informed about how these developments affect corporate data privacy and the evolving landscape of cybersecurity legislation. A must-watch for anyone interested in unders...
2025-04-01
25 min
Cyberside Chats: Cybersecurity Insights from the Experts
Deepfakes & Voice Phishing: The New Frontier of Cybercrime
AI-generated deepfakes and voice phishing attacks are rapidly evolving, tricking even the most tech-savvy professionals. In this episode of Cyberside Chats, we break down real-world cases where cybercriminals used deepfake videos, voice clones, and trusted platforms like YouTube, Google, and Apple to bypass security defenses. Learn how these scams work and what IT and security leaders can do to protect their organizations. Takeaways: Educate Staff on Deep Fake & Voice Cloning Threats – Train employees to recognize red flags in AI-generated phishing attempts, including voice calls that sound slightly robotic, rushed password reset requests, and unexpected changes in vend...
2025-03-25
13 min
Cyberside Chats: Cybersecurity Insights from the Experts
Abandoned S3 Buckets – A Goldmine for Hackers
Do you think your old cloud storage is harmless? Think again. This week on Cyberside Chats, Sherri and Matt dive into shocking new research from Watchtowr that reveals how hackers can take over abandoned Amazon S3 buckets—and use them to infiltrate government agencies, Fortune 500 companies, and critical infrastructure. We’ll break down real-world examples of how this risk can be exploited, including malware-laced software updates, hijacked VPN configurations, and compromised open-source dependencies. Plus, we’ll share practical strategies to protect your organization from this growing cybersecurity threat! Links & Resources: Watchtowr’s Research on Abandoned S3 Buckets...
2025-03-04
25 min
Cyberside Chats: Cybersecurity Insights from the Experts
Ransomware Watch: Ghost, RansomHub, and the Latest Trends
In this episode of Cyberside Chats, we dive into the world of ransomware, focusing on the notorious Ghost Ransomware Gang. Recently flagged by the FBI and CISA, Ghost has targeted organizations in over 70 countries. We explore their methods of infiltration, with a spotlight on outdated software vulnerabilities, and discuss how organizations can fortify their defenses. We'll also provide insights into the broader ransomware landscape, including trends and statistics for 2024, and offer practical advice on protecting against these cyber threats. Lastly, we delve into the operations of the RansomHub group, revealing their so-called 'ethical' hacking practices. ...
2025-02-25
14 min
Cyberside Chats: Cybersecurity Insights from the Experts
The OPM Security Debacle: Rogue Servers, Data Risks & What’s Next
In this episode of Cyberside Chats, Sherri and Matt dive into a shocking new cybersecurity controversy at the Office of Personnel Management (OPM). A rogue email server, installed outside normal security controls, has raised alarms about data security risks to millions of federal employees. We compare this developing situation to the infamous 2015 OPM hack, in which state-sponsored attackers stole the personal records of over 22 million individuals. Are we witnessing history repeat itself—this time with even more catastrophic consequences? Topics Covered: Flashback to 2015: How weak security and stolen credentials led to one of the wors...
2025-02-11
13 min
Cyberside Chats: Cybersecurity Insights from the Experts
DeepSeek or Deep Risk? The AI Power Play With China
DeepSeek or DeepRisk? A new AI powerhouse is making waves—DeepSeek has skyrocketed in popularity, rivaling top AI models at a fraction of the cost. But with data stored in China and unknown security safeguards, is your organization at risk? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the cybersecurity implications of AI tools like DeepSeek. You'll learn about: ▪ DeepSeek's unique IP exposure risks and cybersecurity challenges. ▪ The growing threat of "Shadow AI" in your organization and supply chain. ▪ How to update your policies, vet vendors, and prot...
2025-02-04
13 min
Cyberside Chats: Cybersecurity Insights from the Experts
The Silk Road, a Pardon, and the Future of Cybercrime
In this episode of Cyberside Chats, we dive into the surprising pardon of Ross Ulbricht, creator of the infamous Silk Road dark web marketplace. What does this decision mean for the future of cybercrime enforcement and your organization’s security? We’ll explore the potential policy shift, how it could embolden criminals, and actionable steps you can take to stay ahead of evolving threats. Don't miss these critical insights! Takeaways: Anticipate Increased Cybercrime Activity. The pardon of Ross Ulbricht could embolden cybercriminals. Proactively strengthen your organization’s defenses by updating incident response plans and running tabletop exercises...
2025-01-28
12 min
Cyberside Chats: Cybersecurity Insights from the Experts
When the FBI Becomes Your IT Department
In this episode of Cyberside Chats, we explore the FBI’s daring takedown of PlugX malware. By commandeering the malware’s command-and-control infrastructure, the FBI forced PlugX to uninstall itself from over 4,200 devices globally. This bold move echoes similar actions from 2021, such as the removal of malicious web shells from Exchange servers. We unpack the legal, ethical, and operational implications of these law enforcement actions and provide actionable advice for IT and security leadership to prepare for similar events. Key topics include: How the FBI executed the PlugX takedown and what it means for orga...
2025-01-21
13 min
Cyberside Chats: Cybersecurity Insights from the Experts
Cyber Trust or Bust? The New FTC Cyber Trust Mark
In Episode 2 of CyberSide Chats, Sherri Davidoff and Matt Durrin dive into the launch of the U.S. Cyber Trust Mark, a new security initiative aimed at making Internet of Things (IoT) devices more secure for consumers. As the number of connected devices continues to rise, the U.S. Cyber Trust Mark promises to help users make informed decisions about the security of products like cameras, smart locks, and voice assistants. Sherri and Matt will discuss the potential impacts of the Cyber Trust Mark and discuss the ongoing challenges of securing IoT devices. They also tackle the...
2025-01-14
12 min
Cyberside Chats: Cybersecurity Insights from the Experts
2025 Cybersecurity Priorities: The Top 3 Moves to Make
Join hosts Sherri Davidoff and Matt Durrin in this first engaging episode of CyberSide Chats, as they dive into the top cybersecurity priorities for 2025. This insightful discussion was recorded with a live Q & A, and it covers the pervasive influence of AI, the emerging threats of deepfakes, and the complexities of managing third-party risks in an increasingly digital world. This episode not only prepares listeners for the potential challenges of 2025 but also equips them with the knowledge to enhance their cybersecurity measures effectively. Tune in to stay informed and ready for the future!
2024-12-17
23 min
Storm Watch by GreyNoise Intelligence
Cyber Chaos Unleashed: Kaspersky's Vanishing Act & CUPS Vulnerability Mayhem
Forecast = 50% chance of unexpected software installations followed by scattered UDP packet sprays. In this episode of Storm⚡️Watch, we follow up on the intriguing 'Noise Storms' that had the cybersecurity community buzzing. Security researcher David Schuetz has made some fascinating discoveries about these mysterious ping packets flooding the internet. His investigation, detailed at darthnull.org/noisestorms/, takes us on a journey through packet analysis, timestamp decoding, and network protocol deep-dives, offering new perspectives on the potential origins of those enigmatic 'LOVE' packets. Our Cyberside Chat segment dives into the recent CUPS daemon vulnerability, explor...
2024-10-01
1h 01
Storm Watch by GreyNoise Intelligence
Bluetooth Mayhem: Firewalls Fail & Insulin Pumps Panic
Forecast = Expect heavy BTLE storms with a high chance of UUID leaks. Pack your Faraday umbrellas and watch out for rogue packets raining from the cloud. On this episode of Storm⚡️Watch, we're diving into some major cybersecurity developments that have been making waves. We'll start by unpacking the ongoing saga of the Columbus, Ohio cyberattack, which has turned into a complex web of legal battles, data leaks, and questions about municipal cybersecurity preparedness. We'll explore how this incident is affecting the city's tech aspirations and what it means for residents' data security. Next...
2024-09-24
1h 14
Storm Watch by GreyNoise Intelligence
"Voldemort" Espionage Unveiled & Legal Firestorm in Columbus
Forecast - A volatile storm is brewing with lightning strikes of intrigue and clouds of legal turbulence on the horizon. In this episode of GreyNoise Storm⚡️Watch, we kick things off with intros and roundtable discussion before diving into the exciting news and discussion. Notably, Bob and Glenn are absent. In our Cyberside Chat segment, we discuss ransomware. First, we'll discuss how the US government has issued an advisory on the RansomHub ransomware group, which is believed to be responsible for a cyberattack on oil giant Halliburton. RansomHub is believed to have targeted at least 210 vict...
2024-09-03
55 min
Storm Watch by GreyNoise Intelligence
Tech Giants Stumble: Georgia Tech Sued, SolarWinds Leaks, and Freaky Friday KEV Drops
Forecast: High pressure system over Georgia Tech as DOJ storm rolls in. SolarWinds experiencing unexpected credential precipitation. This episode features the DOJ hot takes on Georgia Tech, SolarWinds dropping the ball (again), and why Keanu Reeves may want to re-think some of his recent life choices. Plus, we're decoding the latest KEV advisory. Tune in for our usual no-holds-barred analyses and commentary. Cyberside Chat A major legal action by the U.S. Department of Justice targets Georgia Tech and its research corporation over alleged cybersecurity violations. The case underscores the critical importance of cybe...
2024-08-27
57 min
Storm Watch by GreyNoise Intelligence
DigiCert's Certificate Revocation, VMware ESXi Vulnerability, and North Korean Espionage
Forecast = Persistent cyber heat dome in effect with no sign of abatement. In this episode of Storm⚡️Watch, we dive into the latest cybersecurity news and trends. We kick things off with a breaking story about DigiCert's certificate revocation incident. Due to a validation issue affecting about 0.4% of their domain validations, DigiCert is revoking certificates with less than 24 hours' notice. This could impact thousands of SSL certs and potentially cause outages worldwide starting July 30 at 19:30 UTC. Organizations using affected certificates should be prepared for a busy night of renewals. Our Cyberside Chat focuses on a crit...
2024-07-30
54 min
Storm Watch by GreyNoise Intelligence
Dissecting Apple's Private Cloud Compute, Recent AI BS, and a Critical PHP Flaw
Forecast = Melting data centers and liquified cables causing massive internet outages across the northeast will cause a much-needed reduction in cybercrime. In this episode of Storm⚡️Watch, we cover the latest updates from the cyber world, starting with the intriguing news that Microsoft has decided to recall its controversial Windows Recall feature. Initially set to launch with Copilot+ PCs, the feature faced significant backlash due to privacy concerns, leading Microsoft to delay its release indefinitely. Next, we explore the fascinating realm of artificial intelligence in our Cyberside Chat segment. We discuss Apple's ambitious AI ini...
2024-06-18
1h 02
Storm Watch by GreyNoise Intelligence
Honoring Ross J. Anderson, Interview With Horizon3AI's Zach Hanley & China's APT31 Sanctions
In this episode of Storm⚡️Watch, we cover a variety of cybersecurity topics, opening with a poignant tribute to Ross J. Anderson. Anderson's legacy is vast, with contributions spanning machine learning, cryptographic protocols, and digital rights advocacy. His seminal textbook, "Security Engineering," has been a cornerstone in the education of many in the field. His passing is a significant loss to the academic and security communities, leaving behind a legacy that will continue to influence for years to come. This week we are also joined by special guest Zach Hanley of Horizon3AI. Hanley shares his journey into...
2024-04-02
1h 04
Storm Watch by GreyNoise Intelligence
Supply Chain Storms Firmware Flurries and Big Tech Trouble In Little China
Forecast = Expect a whirlwind of patches with a strong chance of phishing fronts moving in. In this episode of Storm⚡️Watch, we're exploring a plethora of cybersecurity topics that are as turbulent as the weather itself. First is a lively discussion with Nate Warfield from Eclypsium, where we dive into the intricacies of supply chain and firmware safety. Eclypsium's research is pivotal in highlighting critical areas listeners should be aware of, especially concerning supply chain vulnerabilities and firmware-level threats. We're also taking a deep dive into their approach to analyzing CISA's KEV data to understand the...
2024-03-26
58 min
Storm Watch by GreyNoise Intelligence
AI Crime Warnings & The National Vulnerability Database (NVD) Slowdown
In this episode of Storm⚡️Watch we're bracing for a tempest of cybersecurity insights. The Cyberside Chat segment takes a deep dive into the Department of Justice's recent announcement regarding AI in crimes, signaling harsher sentences akin to weapon-enhanced offenses. We explore the implications of AI's double-edged sword in criminal justice, the DOJ's Justice AI initiative, and the broader Artificial Intelligence Strategy. We also discuss federal actions to regulate AI, including the Algorithmic Accountability Act of 2022, and the Executive Order on Promoting the Use of Trustworthy Artificial Intelligence in the Federal Government. A study on AI-modified content in peer revi...
2024-03-19
1h 00
Storm Watch by GreyNoise Intelligence
The Patches & Perils Of Coordinated Vulnerability Disclosure | Lessons To Learn From The Rapid7/JetBrains Kerfuffle
In the latest episode of GreyNoise Labs Storm⚡️Watch, we delve into a meta-discussion that stems from an escalating feud between cybersecurity firm Rapid7 and software development company JetBrains over the disclosure of two critical vulnerabilities in JetBrains' TeamCity CI/CD platform. The contention stems from differing approaches to vulnerability disclosure, leading to public disagreements and a series of attacks exploiting these vulnerabilities, identified as CVE-2024-27198 and CVE-2024-27199. On February 20, 2024, Rapid7 disclosed these vulnerabilities to JetBrains, highlighting the severity of CVE-2024-27198, which allows for a complete authentication bypass, potentially enabling attackers to perform administrative actions on the serve...
2024-03-15
34 min
Hacker Valley Studio
Episode 181 - The Calling of Cyber with Jerich Beason
Jerich Beason, SVP & CISO at Epiq, joins Chris and Ron to talk passion, purpose and how that plays a part in cyber. Jerich sits on panels, speaks at conferences and events & contributes to white papers and security articles. He also serves as a Board advisor to security startups. Jerich is currently the host of Epiq’s podcast, Cyberside Chats which has the mission of increasing knowledge and awareness of cybersecurity within the legal industry. Key Takeaways: 02:50 Bio 03:48 Choosing an education in cyber 05:00 Origin story – why cyber? 09...
2021-11-02
31 min
The New CISO
Knowing When It's Time to Move Onto New Challenges
On today’s episode we are joined by Jerich Beason, senior vice president and CISO at Epiq. He delves into advice on networking, knowing which job is right for you, and how to build trust as a CISO. Advice to Younger SelfBeason says he would have spent more time on relationships. While he had relationships, he wishes he had done more to maintain those relationships across gigs. Keep up contact with people, you never know when you may want to connect down the line.
2021-09-02
44 min
Cyberside Chat
Making the Most of Online Business
I'm your host Jess Coburn, CEO of Applied Innovations and Cyberside chats is where we dive into new and emerging technologies to help business owners, CEOs and leaders understand how they could use these technologies on their own business. Today we're going to focus on online marketing, automation, and e-commerce. Let's face it, how we do business has completely changed in 2020 and those changes are here to stay. My guest today is Jeffrey Kostick from Flying Chimp Media. www.flyingchimp.com
2020-06-24
38 min
Cyberside Chat
Machine Learning Opportunities for Small and Medium Sized Businesses
Once restricted to just large enterprises, Machine Learning is now accessible to small and medium sized businesses thanks to Kurvv.ai. In this episode of cyberside chat, I sit down with Jeff Croft, Chief Revenue Officer at Kurvv.ai and we talk about the opportunities that Machine Learning as a Service offers small and medium businesses, especially those in hospitality and e-commerce.
2020-06-15
27 min
Cyberside Chat
Leveraging Technology and Engaging With Your Customers and Prospects
Welcome to another episode of cyberside chats. Today businesses across the globe are dealing with the COVID-19 pandemic, and these first few episodes focus on what business leaders, owners, and CEOs can do to not just survive but thrive amid crisis. In this episode of Cyberside Chat, I sit down with Charlie Janes, Technologist, Entrepreneur, and Business Coach. Charlie helps his clients accelerate profitable growth, plan for a successful exit, and to build processes and infrastructure so that they can spend more time living a great life. We discuss what's to come, what's next, and how we engage with our...
2020-06-15
30 min
Cyberside Chat
Opening For Business What An Employer Needs To Worry About
elcome to another episode of cyberside chats. Today businesses across the globe are dealing with the COVID-19 pandemic and these first few episodes focus on what business leaders, owners and ceos can do to not just survive but thrive amid crisis . In this episode of Cyberside Chat, I sit down with Diane Geller, Attorney At Law at https://www.foxrothschild.com focused on helping her clients stay compliant with the ever-changing federal and state regulations governing the workplace, assists them in drafting documents for their businesses. We discuss what employers need to consider as they are looking to bring employees...
2020-06-15
29 min
Cyberside Chat
Making Financial Decisions For Today and Tomorrow amid Crisis
A Cyberside Chat Live - Making Financial Decisions For Today...SUMMARY KEYWORDSbusinesses, virus, participants, withdrawal, robert, loan, plan, money, remote, parts, year, business owner, 401k, employee, bit, furloughs, pay, matching, act, marketSPEAKERSRobert Young, Jess Coburn Jess Coburn 00:47Morning I'm Jess Coburn CEO replied innovations and this is another episode of fireside chats. Today I have with me Robert Young Robert, could you talk a little bit about Robert Young 00:58money thanks guys for having me on...
2020-05-15
16 min
Cyberside Chat
Making the Hard Decisions in an Economic Downturn
OVERVIEWIn this episode of Cyberside Chat, I sit down with Georganne Goldblum, Vistage Chair and CEO Coach and we discuss lessons learned from economic crisis in 2007 and the hard decisions ahead for CEOS as we prepare for a potential economic downturn. SUMMARY KEYWORDSbusiness, ceos, vistage, members, employees, decisions, people, hear, recession, georgia, webinars, helping, florida, plans, business owners, group, company, key, speakers, coachSPEAKERSGeorganne Goldblum, Jess Coburn Jess Coburn 00:00Welcome to another episode of cyber side chats. I'm your host, Jes...
2020-04-08
23 min
Cyberside Chat
Maintaining Corporate Culture amid COVID-19
Today businesses across the globe are dealing with the COVID-19 pandemic and these first few episodes focus on what business leaders, owners, and CEOs can do to not just survive but thrive amid crisis. In this episode of Cyberside Chat, I sit down with Jamie Delsing, Managing Partner of Consultis IT and we discuss the importance of culture in business and how to continue to build your culture when going remote as well as how the staffing industry is preparing for our recovery. So sit back, relax and let's chat.
2020-04-02
26 min
Cyberside Chat
The Show Must Go On. Conference Events amid COVID-19
In this episode of cyberside chats, Jess is joined by Michelle Issing, CEO of designingevents.com. Today businesses across the globe are dealing with the COVID-19 pandemic, and these first few episodes focus on what business leaders, owners, and CEOs can do not just to survive but thrive amid crisis. In this episode of Cyberside Chat, we sit down with Michelle Issing, and we discuss how conferences and events are going virtual. Technology has come a long way from the early days of streaming talking heads and max headroom and it's a very exciting and viable alternative. So sit back...
2020-03-25
24 min
Cyberside Chat
Life, Disability and Long-term Care amid COVID-19
In this episode of cyberside chats, Michael Jacobson from mjacobson.com discusses the impact COVID-19 has had on the Life, Disability, and Long-term Care Insurance industry and how carriers and businesses are pivoting to adjust. Tune in to learn what impact COVID-19 may have on your coverage and if you're covered.
2020-03-25
26 min
Cyberside Chat
A Cyberside Chat - Digital Transformation amid COVID-19
Marc Waldeck of Brave New Markets joins Jess for a cyberside chat to discuss how B2B businesses can respond to COVID-19 and the Coronavirus by leveraging Digital Transformation.
2020-03-19
20 min
Cyberside Chat
A Cyberside Chat - Working Successfully Remote
Ed Lakos joins Jess Coburn of Applied Innovations to discuss how Applied Innovations made their transition from a classic office-based company to a work from home company
2020-03-19
11 min