Artwork

Treść dostarczona przez CISO Tradecraft®. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez CISO Tradecraft® lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

#180 - There's Room For Everybody In Your Router (with Giorgio Perticone)

1:06:55
 
Udostępnij
 

Manage episode 416781931 series 2849492
Treść dostarczona przez CISO Tradecraft®. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez CISO Tradecraft® lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

In this joint episode of the Security Break podcast and CISO Tradecraft podcast, hosts from both platforms come together to discuss a variety of current cybersecurity topics. They delve into the challenge of filtering relevant information in the cybersecurity sphere, elaborate on different interpretations of the same news based on the reader's background, and share a detailed analysis on specific cybersecurity news stories. The discussion covers topics such as the implications of data sharing without user consent by major wireless providers and the fines imposed by the FCC, the significance of increasing bug bounty payouts by tech companies like Google, and a comprehensive look at how edge devices are exploited by hackers to create botnets for various cyberattacks. The conversation addresses the complexity of the cybersecurity landscape, including how different actors with varied objectives can simultaneously compromise the same devices, making it difficult to attribute attacks and protect networks effectively.

Transcripts: https://docs.google.com/document/d/1GtFIWtDf_DSIIgs_7CizcnAHGnFTTrs5

Chapters

  • 00:00 Welcome to a Special Joint Episode: Security Break & CISO Tradecraft
  • 01:27 The Challenge of Filtering Cybersecurity Information
  • 04:23 Exploring the FCC's Fine on Wireless Providers for Privacy Breaches
  • 06:41 The Complex Landscape of Data Privacy Regulations
  • 16:00 The Economics of Data Breaches and Regulatory Fines
  • 24:23 Bug Bounties and the Value of Security Research
  • 33:21 Exploring the Economics of Cybersecurity
  • 33:50 The Lucrative World of Bug Bounties
  • 34:38 The Impact of Security Vulnerabilities on Businesses
  • 35:50 Navigating the Complex Landscape of Cybersecurity
  • 36:22 The Ethical Dilemma of Selling Exploit Information
  • 37:32 Understanding the Market Dynamics of Cybersecurity
  • 38:00 Focusing on Android Application Security
  • 38:34 The Importance of Targeting in Cybersecurity Efforts
  • 42:33 Exploring the Threat Landscape of Edge Devices
  • 46:37 The Challenge of Securing Outdated Technology
  • 49:28 The Role of Cybersecurity in Modern Warfare
  • 53:15 Strategies for Enhancing Cybersecurity Defenses
  • 01:05:25 Concluding Thoughts on Cybersecurity Challenges
  continue reading

184 odcinków

Artwork
iconUdostępnij
 
Manage episode 416781931 series 2849492
Treść dostarczona przez CISO Tradecraft®. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez CISO Tradecraft® lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

In this joint episode of the Security Break podcast and CISO Tradecraft podcast, hosts from both platforms come together to discuss a variety of current cybersecurity topics. They delve into the challenge of filtering relevant information in the cybersecurity sphere, elaborate on different interpretations of the same news based on the reader's background, and share a detailed analysis on specific cybersecurity news stories. The discussion covers topics such as the implications of data sharing without user consent by major wireless providers and the fines imposed by the FCC, the significance of increasing bug bounty payouts by tech companies like Google, and a comprehensive look at how edge devices are exploited by hackers to create botnets for various cyberattacks. The conversation addresses the complexity of the cybersecurity landscape, including how different actors with varied objectives can simultaneously compromise the same devices, making it difficult to attribute attacks and protect networks effectively.

Transcripts: https://docs.google.com/document/d/1GtFIWtDf_DSIIgs_7CizcnAHGnFTTrs5

Chapters

  • 00:00 Welcome to a Special Joint Episode: Security Break & CISO Tradecraft
  • 01:27 The Challenge of Filtering Cybersecurity Information
  • 04:23 Exploring the FCC's Fine on Wireless Providers for Privacy Breaches
  • 06:41 The Complex Landscape of Data Privacy Regulations
  • 16:00 The Economics of Data Breaches and Regulatory Fines
  • 24:23 Bug Bounties and the Value of Security Research
  • 33:21 Exploring the Economics of Cybersecurity
  • 33:50 The Lucrative World of Bug Bounties
  • 34:38 The Impact of Security Vulnerabilities on Businesses
  • 35:50 Navigating the Complex Landscape of Cybersecurity
  • 36:22 The Ethical Dilemma of Selling Exploit Information
  • 37:32 Understanding the Market Dynamics of Cybersecurity
  • 38:00 Focusing on Android Application Security
  • 38:34 The Importance of Targeting in Cybersecurity Efforts
  • 42:33 Exploring the Threat Landscape of Edge Devices
  • 46:37 The Challenge of Securing Outdated Technology
  • 49:28 The Role of Cybersecurity in Modern Warfare
  • 53:15 Strategies for Enhancing Cybersecurity Defenses
  • 01:05:25 Concluding Thoughts on Cybersecurity Challenges
  continue reading

184 odcinków

Wszystkie odcinki

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi