Latest Posts › Cyber Attacks

Share:

No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward... [Video]

Jayson Street, the dynamic chief adversarial officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “world-class hacker” on National Geographic’s "Breakthrough” series episode “Cyber...more

No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who... [Video]

Jessica Gulick is a woman of many trades. She is the founder and CEO of the cyber marketing firm Katzcy, the founder and commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that...more

No Password Required: Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a Guy With a Mildly Exciting... [Video]

Allan Liska is a threat intelligence analyst at Recorded Future. In this episode, Allan returns to No Password Required to talk with Carlton Fields attorney Jack Clabby and KnowBe4’s Kayley Melton about his experiences in the...more

No Password Required: Threat Researcher at Cisco Talos and a Veteran of the Highest-Profile Cyber Incidents Who Roasts His Own... [Video]

Nick Biasini leads a team of threat researchers at Cisco Talos who patrol the cutting edge of the threat landscape. Not only has he investigated some of the most significant cyberattacks in history, but he also has hands-on...more

No Password Required: The Bob Ross of Infosec, Whose Secretive Job at KnowBe4 Solves Cybersecurity’s Most-Urgent Issues [Video]

Kayley Melton is the Vice President of Security Awareness Company Courseware and Labs at KnowBe4. Although she can’t share too much about what the "labs" portion of her job entails, let's face it, the secrecy makes her even...more

No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical... [Video]

Serge Jorgensen is a founding partner and CTO of Sylint Group, where he provides response and remediation guidance on international espionage incidents, cybersecurity attacks, and counter cyberwarfare. An engineer by...more

No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader [Video]

Chase Fopiano is the Founder of CyberTech Analytics, a cybersecurity provider that combines the worlds of both law enforcement and information security. Chase began his career as a police officer before diving headfirst into...more

No Password Required: Cyber Threat Management Leader at Wells Fargo Who Has a Passion for Adventure [Video]

Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick,...more

No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

CF on Cyber: The Anatomy of a Ransomware Attack - Part 2 [Video]

In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks. Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer...more

CF on Cyber: The Anatomy of a Ransomware Attack - Part 1 [Video]

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more

Credential Stuffing: Where Passwords Go When They Are Stolen and Some Strategies for Defense and Incident Response

Credential stuffing is a growing cyberattack method in which cybercriminals use a set of thousands of compromised user credentials, stolen from one company, to attempt a breach into another company’s secured system. It is...more

Get Your House in Order: Four Steps to Take Now to Prepare for Ransomware

With ransomware attacks surging, companies should evaluate their cybersecurity posture and harden their defenses. This could include working with a third-party security firm to audit the company's security and then follow-up...more

No Password Required: A Corvette-Driving Research Scientist Who Built His Own Video Games [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: An SOC Technical Manager Who Builds Things With Keyboards and Blowtorches... [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: An OSINT Expert Who Credits Much of Her Success to Her Improv Comedy Skills... [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

Biden Administration Issues Practical Guidance for Ransomware Attacks

On June 2, 2021, President Biden issued a memorandum providing "recommended best practices" for protecting against ransomware. The memorandum urged corporate executives and business leaders to...more

No Password Required: A Believer That the Key to Internet Safety Is Simple... [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: A Pen Tester at Rapid7 With a Passion for LEGO Bricks, Star Wars, and Sometimes LEGO Star Wars [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: An Inherently Trusting Person in an Inherently Distrusting Profession [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: A Journey From Math Camp to Cyber Intelligence [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

Baltimore's Three-Week Ransomware Is a Warning for Other Local Governments to Prepare for Cyberattacks

The Baltimore city government's email and other systems have been offline for more than three weeks as the result of a ransomware attack in early May. This is not the first local government to have been the victim of such...more

Cyber Update: What Businesses Must Know about the New Presidential Policy Directive

Last month the White House disclosed how the federal government will coordinate incident response activities in the event of a large-scale cyber incident. While the policy directive is worth reading in its entirety, this...more

28 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide