CyberScoop public
[search 0]
Download the App!
show episodes
 
Artwork

1
Pressing Matters

Big Valley Marketing

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Pressing Matters, from Big Valley Marketing, features conversations with the top influencers in B2B Technology. From Fortt Knox to Audible, the (mostly) journalists we interview on this podcast have been there for all of it – and they have thoughts on where things are going. Whether you're interested in humans, chips, cybercrime, or long-necked lutes ... welcome to Pressing Matters, presented by Big Valley Marketing.
  continue reading
 
Loading …
show series
 
Are you ready for RSA 2025? Matt Kapko of CyberScoop is, and he definitely doesn't want to hear about AI, although he and I–and everyone listening to the podcast today–all know he will. In addition to AI, Matt joined us to talk about his early days singing in a punk rock band in Orange County, his time in a string of hyperlocal newspapers, and more…
  continue reading
 
In this episode, we sit down with Dave Merkel, CEO of Expel to take an honest, practical look at how AI and automation are reshaping the modern Security Operations Center (SOC). Our discussion covers the most tangible changes in daily SOC operations since AI adoption, cutting through industry hype to reveal which claims deserve skepticism and which…
  continue reading
 
In this episode, Greg talks with Alexander Leslie, Threat Intelligence Analyst for Recorded Future’s Insikt Group and his research on “Marko Polo” – a notorious cybercriminal empire that orchestrates an array of scams, primarily using infostealer malware. Discover how this sophisticated syndicate has victimized tens of thousands worldwide and raked…
  continue reading
 
On this episode of Safe Mode, Greg talks with Alex Pinto, Associate Director of Threat Intelligence at Verizon Business, as we unpack the key findings from this year’s Data Breach Investigations Report (DBIR). Pinto offers expert analysis on the most pressing cybersecurity trends impacting organizations worldwide—including ransomware’s dramatic spi…
  continue reading
 
In this episode, Greg talks with Will Pearce, CEO and Co-founder of Dreadnode about the rapidly evolving field of offensive AI security. Greg and Will discuss the unique challenges researchers face in testing AI models for vulnerabilities compared to traditional software, unveiling how adversarial attacks impact AI security and the ethical consider…
  continue reading
 
In this episode, Greg talks with Lior Div, co-founder and CEO of 7AI. Lior and Greg explore how security teams are being reinforced with AI Agents and identify the areas where CISO are embracing this technological shift to optimize their talent resources. We'll also discuss the specific security functions these agents are performing, including emai…
  continue reading
 
In this episode, Greg Otto talks with Ken Bagnall, CEO of Silent Push Ken sheds light on the dynamics of the current cybercrime ecosystem. Ken reveals that a significant portion of the infrastructure is actually operated by affiliate networks using pre-existing technologies. During the discussion, Ken elaborates on how this ecosystem is fueled and …
  continue reading
 
In this episode, Greg Otto talks with Edera co-founder and CTO Alex Zenla, charting her path from beginnings in Minecraft IRC channels to pioneering container isolation technology. Alex discusses her unique expertise in container security, GPU protection, and AI infrastructure, and how Edera is transforming the tech landscape with a commitment to b…
  continue reading
 
In this episode, Greg Otto talks with FTI Consulting’s Allie Bohan exploring the challenges organizations face in maintaining effective communication during cyberattacks. Allie and Greg uncover essential strategies for incidents, ensuring companies remain connected with stakeholders even when digital channels are compromised. We also talk on how to…
  continue reading
 
Fred Vogelstein wanted to be a Moscow bureau chief. He did manage to get to Berlin as a student in the months after the Berlin Wall fell in 1989, but he still hasn't been to Moscow. Instead, Fred became one of the most influential technology reporters of his generation, with stints at the Wall Street Journal, Wired, The Information, US News, and Fo…
  continue reading
 
In this episode, Greg Otto talks with Sunil Mallik, the CISO of Discover Financial Services. Sunil shares his career path and the evolving challenges and responsibilities in cybersecurity, covering how he communicates with his board, strategic approaches to cybersecurity, and the importance of balancing technological investment with personnel train…
  continue reading
 
In this episode, Greg Otto talks with Dan Lorenc, CEO and co-founder of Chainguard. They explore the challenges organizations face with CVE management, where dealing with vulnerabilities often drains valuable engineering resources. They also discuss how new visualization tools are redefining this landscape by offering clear insights into CVE trends…
  continue reading
 
In this episode, Greg Otto talks with Virtru Co-founder and CEO John Ackerly , discussing the significance of open standards, the challenges and successes of implementing the Trusted Data Format across federal agencies, and the critical role of interoperability and compliance. John also gives us details on how close the country was to a national pr…
  continue reading
 
In this episode, you will hear Cynthia Kaiser, deputy assistant director in the bureau’s cyber division talk about the implications of the Salt Typhoon breach, which she spoke about during CyberScoop’s Zero Trust Summit. Kaiser characterized the breach as “a different level of insidiousness” from Beijing, one that reflects its “ambition and reckles…
  continue reading
 
Unlike most of our previous guests, Catherine Sbeglia Nin didn't set out to be a reporter. She was a doctoral candidate in film theory. When realizing she was miserable, she figured she'd find other ways to tell stories after dipping her toes in the journalism waters. RCR Wireless, one of the magazines of record for Telco Wireless and networking, o…
  continue reading
 
Greg Otto talks with Jackie Burns-Koven, Head of Cyber Threat Intelligence at Chainalysis. They discuss research from Chainalysis that shows a 35% drop in ransom payments over the second half of 2024. They also discuss the growing refusal of victims to pay ransoms and how attackers are adapting their tactics. Additionally, she highlights the influe…
  continue reading
 
Greg Otto talks with John Hultquist, Chief Analyst for Google Threat Intelligence Group. They explore the qualitative differences between AI-generated and human-crafted social engineering tactics, and discuss the technical limitations of AI when used by less sophisticated threat actors like those in North Korea. Additionally, the episode addresses …
  continue reading
 
Greg Otto talks with Hugh Thompson, Executive Chairman for RSAC Conference. Greg and Hugh discuss how the SEC's cyber disclosure regulations have fallen short of their intended purpose, failing to provide investors with enhanced transparency due to ongoing debates about materiality and insufficient market consequences. Additionally, they discuss th…
  continue reading
 
Greg Otto talks with Exabeam’s Gabrielle Hempel about the complex terrain of AI regulation at both the federal and state levels, offering a deep dive into the legislative challenges, and the balancing act of fostering innovation while protecting public interests. They also reflect on how public interaction with AI systems is shaping legislative eff…
  continue reading
 
It's pretty rare these days to find anyone in tech media who has been at the same outlet for a quarter century. But Patrick Seitz has been covering the fascinating world of tech, finance, and the stock market for exactly that: 25 years at Investors' Business Daily. A Chicago-area native who cut his teeth covering courts and crime, Pat switched to c…
  continue reading
 
As we head into 2025, Greg talks with Jason Baker, a ransomware negotiator for Guidepoint Security, on how ransomware has shifted and evolved, and the challenges it poses for businesses and governments alike. Jason also sheds light on the top threat actors, the future of international regulations and where they might fall concerning the contentious…
  continue reading
 
In the first episode of 2025, Greg Otto dives into a conversation with Phil Venables, the Chief Information Security Officer of Google Cloud, who shares insights from his expansive career in cybersecurity. From his beginnings as Goldman Sachs' first CISO to his current role leading risk and security at Google, Phil discusses the evolving challenges…
  continue reading
 
In the latest episode of Safe Mode, Greg Otto talks with Vik Phatak, Chairman and CEO of CyberRatings.org. Cyber Ratings recently released a report assessing the native firewalls provided by major cloud service providers like Microsoft, Google, and AWS. These cloud-native firewalls, included with their instances, were put to the test by Cyber Ratin…
  continue reading
 
Michael Krigsman doesn't call himself a journalist. Yes, he has produced 800 podcasts and videos in the past 11 years as the founder and host of CXOTalk, but he doesn't have a journalism degree or any editorial training, and his pieces are a mix of editorial and sponsored. That said, Michael does have an innate sense of story. He's not afraid to ch…
  continue reading
 
In the latest episode of Safe Mode, Greg Otto talks with Emily Crose about her new book “Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers.” Emily explains how the US government managed to weaponize a subculture widely seen as misanthropic and awkward into a lever of power that now has far-reaching geopolitical i…
  continue reading
 
In the latest episode of Safe Mode, Greg Otto talks with Andrew Morris, founder and chief architect of GreyNoise. Greg and Andrew talk about some recent work GreyNoise has released including one of the first instances where threat detection has been augmented by AI to discover zero-day vulnerabilities. In our reporter chat, Greg talks with Tim Star…
  continue reading
 
In the latest episode of Safe Mode, we talk to Peter Anaman, principalinvestigator in Microsoft’s Digital Crimes Unit. Peter takes us on a deep dive on how the Digital Crimes Unit (DCU) has morphed since its inception in 2008. We'll explore how investigative approaches have evolved over the years and discuss how cybercriminals are adapting in respo…
  continue reading
 
At the age of eight, Esther Ajao did something braver than most of us will do in our entire lives. Having spent her early years in her native Nigeria, raised by an extended family of grandparents and uncles, Esther moved across the ocean to Brooklyn to reunite with her mother, who had moved to America when Esther was just six months old. Removed fr…
  continue reading
 
In this episode, Greg Otto chats with David Brumley, an offensive cybersecurity professor at Carnegie Mellon and CEO of Mayhem Security, as he is collaborating with the FAA and airplane manufacturers to tackle critical software security challenges in the aerospace industry. David delves into the most pressing cybersecurity threats facing aircraft t…
  continue reading
 
In the latest episode of Safe Mode, Greg Otto talked with Casey Bleeker, CEO of the generative AI security firm SurePath AI, about the future of AI regulation in the U.S. and how it might unfold compared to other countries in 2025. They explore whether AI oversight will differ from state to state, mirroring the current landscape of data privacy law…
  continue reading
 
In case you didn't have the chance to attend CyberTalks, we have the keynote address from the event: National Cyber Director Harry Coker highlighted the White House's focus on strategy and policy to address internet routing vulnerabilities, particularly with the Border Gateway Protocol (BGP). Coker emphasized the importance of Resource Public Key I…
  continue reading
 
In this episode, we delve into the escalating cyber threat posed by China with guest Sean McNee, Head of Threat Research at DomainTools. Sean shares insights on how China is closely observing the ongoing cyberwar between Russia and Ukraine to strategize its potential moves concerning Taiwan. In our reporter chat, Greg Otto talks with Derek B. Johns…
  continue reading
 
The path Michael Nuñez took to a seemingly straightforward gig – Editorial director at VentureBeat – was anything but direct. He covered the fun side of Hong Kong, the travel beat in Korea, and even wrote for an airline magazine in New York City after various tech writing gigs. He spent two years and change as head of marketing at a VC, but for com…
  continue reading
 
This episode of Safe Mode explores the critical issue of software supply chain security with Saša Zdjelar, ReversingLabs' chief trust officer. Discover why the hidden components of commercial off-the-shelf software pose significant risks to enterprises and how current security practices fall short. We'll discuss the explosive growth in breaches due…
  continue reading
 
How can small nonprofits and civic organizations defend themselves against some of the most insidious malware on the planet? By reaching out to Elijah Baucom. The director of Citizen Clinic at UC Berkeley, Baucom runs a public-interest cybersecurity program that trains students to support organizations in defending against cyber threats. A digital …
  continue reading
 
Since 2022, Mandiant has tracked North Korean IT workers who, posing as non-North Koreans, secure employment in various industries to fund DPRK's weapons programs, often engaging in cyber intrusions with the help of foreign facilitators. In this episode, CyberScoop Editor-in-Chief Greg Otto talks with Mandiant’s Michael Barnhart on what is going on…
  continue reading
 
CyberScoop Editor-in-Chief Greg Otto was out at Mandiant's mWISE conference last week, and talked with Trellix’s head of threat intelligence, John Fokker, about a host of different subjects. In the first portion of the interview, Greg and John discuss how the Ransomware-as-a-Service landscape has changed in the past year, and how threat actors have…
  continue reading
 
Hello everyone. We've got a very special episode for you this month as we celebrate the pod's second anniversary. Given that AI is the topic of the decade, not just in tech and journalism, but the whole wide world, we asked two of our favorite guests back to discuss where this is all going. Jennifer Strong of the Shift Podcast, who also was a Pulit…
  continue reading
 
AI is transforming how companies secure their IT infrastructure, especially in industries like airlines, health care, retail, and telecommunications, which rely on applications and APIs for seamless digital experiences. However, there's a risk of companies improperly deploying AI tools or using insecure vendors, potentially leading to widespread da…
  continue reading
 
Secure-by-design transforms secure code from an afterthought to an inherent feature, weaving a resilient shield directly into the fabric of every application and device from the ground up. But while everyone’s mind gravitates toward the ocean of software we all use, how does secure-by-design translate to the Internet of Things? In this episode, Cyb…
  continue reading
 
If you want to understand cybersecurity policy, it’s not enough to focus on Washington D.C. — you have to also grok the American tech industry. Few people have bridged that divide more effectively than Ted Schlein, the legendary venture capitalist who is currently at Ballistic Ventures. On this episode of Safe Mode, he sits down with host Elias Gro…
  continue reading
 
In this edition of the Pressing Matters podcast, host Dave Reddy, head of Big Valley Marketing's Media and Influencers Practice, speaks with Jennifer Strong, a seasoned podcaster who began her radio career at 12 in Tennessee. Jennifer's extensive experience includes work with NPR, The Wall Street Journal, and MIT Tech Review. Now at Shift, she prod…
  continue reading
 
With Election Day rapidly approaching in the United States, the Trump campaign claims that the first major hack-and-leak operation has arrived. After a handful of U.S. media outlets received leaked material on vice presidential candidate JD Vance, the Trump campaign said it had been the victim of an Iranian hacking operation. On this episode of Saf…
  continue reading
 
An epidemic of ransomware, cyberattacks on gas pipelines, Chinese infiltration of American critical infrastructure — these are just some of the cybersecurity issues the Biden administration has tackled during the president’s first term in office. With President Joe Biden’s time in office winding down, it’s worth taking stock: Has his administration…
  continue reading
 
AI governance regimes the world over have seized on compute thresholds as a mechanism for implementing various controls on artificial intelligence systems. The basic idea is that if an AI model relies on a sufficiently large amount of computing power, then various controls kick in. As AI models get larger, the thinking goes, they also get riskier, …
  continue reading
 
Diana Goovaerts initially got into the publishing business. But frustrated by that industry’s speed - or lack thereof - she shifted to the fast-paced world of journalism, first as a local reporter in her native North Jersey and, later, in the past decade, at WirelessWeek, GSMA and now Fierce Network, where she serves as executive editor. We’re all …
  continue reading
 
Around the world policymakers seem to be grappling with the same question: How best to govern artificial intelligence? The Center for Security and Emerging Technology, a Washington-based think tank, has emerged as a key and influential player in that conversation. And on this episode of Safe Mode, its executive director, Dewey Murdick, sits down wi…
  continue reading
 
We are living through an epidemic of ransomware. Last year alone, the amount paid to ransomware operators exceeded $1 billion, and the entities getting hit and seeing their operations disrupted by ransomware included hospitals, schools and libraries. Ransomware is both a public-health and national-security crisis, yet efforts to address the problem…
  continue reading
 
When studying cyberoperations, it’s easy to become enamored with state-backed hackers. Russian and Chinese operations have done much to shape our understanding of how power is exercised online, but it’s not clear that the intense attention dedicated to such operations is well-placed. Amid the current epidemic of ransomware, criminal hacking groups …
  continue reading
 
Next month, Fortune Brainstorm Tech will once again bring together the top thinkers in tech and business in Park City, Utah. And for the first time since 2020, Andrew Nusca will be leading the show as editorial director. He promises the typical knockout conference with big-name keynotes, Olympic-level networking and panels on everything from AI to …
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play