Content provided by CISO Series. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CISO Series or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED
S
Species Unite


1 Jeff Kerr: Our First Amendment Right to Receive Communications (from Monkeys) 30:14
30:14
Play Later
Play Later
Lists
Like
Liked30:14
"It is a scientific fact that these macaques, like all other primates, including humans, are communicating. They communicate in much the same way we do - facial expressions, vocalizations, body postures, those kinds of things." - Jeff Kerr Jeff Kerr is PETA foundations Chief Legal Officer. I asked him to come on the show to talk about one of PETA’s current lawsuits against the National Institutes of Health (NIH) and Nathional Institute of Mental Health (NIMH). PETA is arguing that the monkeys being tested on in a government run facility are capable of communication (or “are communicating”). And that we have a constitutional right under the First Amendment to receive their communications. This could be a game changer in allowing us to see what’s really going on in labs that are funded by taxpayer money, and which have so far been censored from public view. PETA’s lawsuit follows years of NIH’s attempts to deny Freedom of Information requests banning PETA executives from its campus and illegally censoring animal advocates’ speech on NIH’s public social media pages. Through the lawsuit, PETA is seeking a live audio-visual feed to see and hear real-time communications from the macaques who have been kept isolated, used in fear experiments, and had posts cemented into their heads. Anthropologists and other scientists have studied macaque and other primate communications for decades and know that the monkeys communicate effectively and intentionally through lip smacking, fear grimaces, body language, and various cries and sounds—all of which constitute speech under the law. Primatologists can analyze that speech on a deeper level to share their stories with the world.…
BREAKING: CVE Funding Doesn't Lapse
Manage episode 477364863 series 2780756
Content provided by CISO Series. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CISO Series or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
CISA issued a statement that it execution an option on its contract with MITRE to continue funding the CVE program.
1452 episodes
Manage episode 477364863 series 2780756
Content provided by CISO Series. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CISO Series or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
CISA issued a statement that it execution an option on its contract with MITRE to continue funding the CVE program.
1452 episodes
All episodes
×C
Cyber Security Headlines


1 CoPilot zero-click, Operation Secure, FIN6 targets recruiters 7:43
7:43
Play Later
Play Later
Lists
Like
Liked7:43
Zero-click data leak flaw in Copilot Operation Secure targets infostealer operations FIN6 targets recruiters Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta . With Vanta, GRC can be so. much. easier—while also strengthening your security posture and driving revenue for your business. Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. The impact is real: A recent IDC analysis found that compliance teams using Vanta are one hundred and twenty nine percent more productive. Get back time to focus on strengthening security and scaling your business. Get started at Vanta.com/headlines .…
C
Cyber Security Headlines


1 40K IoT cameras stream secrets to browsers, Marks & Spencer taking online orders post-cyberattack, PoC Code escalates Roundcube Vuln threat 8:04
8:04
Play Later
Play Later
Lists
Like
Liked8:04
CISA, Microsoft warn of Windows zero-day used in attack on ‘major’ Turkish defense org 40K IoT cameras worldwide stream secrets to anyone with a browser Marks & Spencer begins taking online orders again, out for seven weeks due to cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta . With Vanta, GRC can be so. much. easier—while also strengthening your security posture and driving revenue for your business. Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. The impact is real: A recent IDC analysis found that compliance teams using Vanta are one hundred and twenty nine percent more productive. Get back time to focus on strengthening security and scaling your business. Get started at Vanta.com/headlines .…
C
Cyber Security Headlines


1 Cybersecurity News: Brute forcing Google accounts, Guardian's Secure Messaging, UNFI cyberattack 8:13
8:13
Play Later
Play Later
Lists
Like
Liked8:13
Brute forcing phone numbers linked to Google accounts The Guardian launches Secure Messaging service United Natural Foods hit by cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta . With Vanta, GRC can be so. much. easier—while also strengthening your security posture and driving revenue for your business. Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. The impact is real: A recent IDC analysis found that compliance teams using Vanta are one hundred and twenty nine percent more productive. Get back time to focus on strengthening security and scaling your business. Get started at Vanta.com/headlines .…
C
Cyber Security Headlines


1 Cyber executive order, Neuberger’s infrastructure warning, Mirai botnet warning 8:42
8:42
Play Later
Play Later
Lists
Like
Liked8:42
Presidential cyber executive order signed Neuberger warns of U.S. infrastructure’s cyberattack weakness Mirai botnet infects TBK DVR devices Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta . With Vanta, GRC can be so. much. easier—while also strengthening your security posture and driving revenue for your business. Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. The impact is real: A recent IDC analysis found that compliance teams using Vanta are one hundred and twenty nine percent more productive. Get back time to focus on strengthening security and scaling your business. Get started at Vanta.com/headlines . Find the stories behind the headlines at CISOseries.com .…
C
Cyber Security Headlines


1 Week in Review: Senators’ CSRB bid, Deepfakes dodge detection, Microsoft-CrowdStrike collaboration 27:43
27:43
Play Later
Play Later
Lists
Like
Liked27:43
Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guest Rusty Waldron , chief business security officer, ADP Thanks to our show sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close behind. What are you going to do? Here’s a better question: what would Sue do? Sue is Conveyor’s new AI Agent for Customer Trust. She handles the entire security review process like answering every customer request from sales, completing every questionnaire or executing every communications and coordination task in-between. No more manual work. Just a quick review when she’s done. Ready to let Sue take the reins? Learn more at www.conveyor.com. All links and the video of this episode can be found on CISO Series.com…
C
Cyber Security Headlines


1 Kettering data published, Reddit sues Anthropic, North Face breached 7:27
7:27
Play Later
Play Later
Lists
Like
Liked7:27
Stolen Kettering Health data published Reddit sues Anthropic for scraping North Face website customer accounts breached Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close behind. What are you going to do? Here’s a better question: what would Sue do? Sue is Conveyor’s new AI Agent for Customer Trust. She handles the entire security review process like answering every customer request from sales, completing every questionnaire or executing every communications and coordination task in-between. No more manual work. Just a quick review when she’s done. Ready to let Sue take the reins? Learn more at www.conveyor.com. Find the stories behind the headlines at CISOseries.com .…
C
Cyber Security Headlines


1 Russian bomber maker popped, vishing targets Salesforce, MS helps out governments 7:28
7:28
Play Later
Play Later
Lists
Like
Liked7:28
Ukraine claims cyberattack on Russian bomber maker Vishing campaign targets Salesforce Microsoft lends a hand to European governments Huge thanks to our sponsor, Conveyor Ever wish you had a teammate that could handle the most annoying parts of customer security reviews? You know, chasing down SMEs for answers, updating systems, coordinating across teams—all the grunt work nobody wants to do. Plus, having to finish the dang questionnaire itself. Well. That teammate exists—Conveyor just launched Sue, the first AI Agent for Customer Trust. Sue really is the dream teammate. She never misses a deadline, answers every customer request from sales, completes every questionnaire and knocks out all the coordination in-between. Sue handles it all so you don’t have to. Learn more at www.conveyor.com .…
C
Cyber Security Headlines


1 Meta, Yandex take heat on browsing identifiers, Acreed malware makes gains, HPE warns of critical auth bypass 7:52
7:52
Play Later
Play Later
Lists
Like
Liked7:52
Meta and Yandex are de-anonymizing Android users’ web browsing identifiers LummaC2 fractures as Acreed malware becomes top dog Hewlett Packard Enterprise warns of critical StoreOnce auth bypass Huge thanks to our sponsor, Conveyor Tired of herding cats to complete customer security questionnaires? Your team probably spends hours daily juggling the back and forth of completing these security requests. That's why Conveyor created Sue, the first AI Agent for Customer Trust. Sue doesn't just handle completing security questionnaires and sending SOC 2 to prospects – she manages all the communication and follow-up too. You simply get notified when everything's done so you can do a quick review. Stop wrangling cats and see what Sue can do for you at www.conveyor.com .…
C
Cyber Security Headlines


1 MS and CrowdStrike partner, Qualcomm bugs exploited, new CISA cut details 7:30
7:30
Play Later
Play Later
Lists
Like
Liked7:30
Microsoft and CrowdStrike partner to link threat actor names Qualcomm sees Adreno bugs under active exploitation New details on proposed CISA cuts Huge thanks to our sponsor, Conveyor Does trying to get the security questionnaire done and back to your customer ever feel like you’re herding cats? It’s not answering questions - most of you have automation software for that. It’s all of the manual back and forth that becomes a slog like communicating between teams, tracking people down to get their review, updating sources and updating systems. Conveyor just launched an AI agent, Sue, to do all of these things and more for you. Learn about Sue at www.conveyor.com .…
C
Cyber Security Headlines


1 Cisco IOS XE exploit, Senators’ CSRB request, Australia ransomware law 8:06
8:06
Play Later
Play Later
Lists
Like
Liked8:06
Exploit for maximum severity Cisco IOS XE flaw now public Senators as for reinstatement of cyber review board to work on Salt Typhoon investigation Australian ransomware victims now must report their payments Huge thanks to our sponsor, Conveyor Conveyor launched the first AI Agent for Customer Trust. So wtf does that mean? It means the AI agent goes beyond just sharing NDA-gated documents like a SOC 2 with customers or answering security questionnaires. Conveyor’s AI Agent, Sue, handles the entire security review process from start to finish. She answers every customer request from sales, completes every questionnaire and executes every communications and coordination task in-between. It's perfect for B2B infosec teams sick of manual security review work. Check it out at www.conveyor.com . Find the stories behind the headlines at CISOseries.com .…
C
Cyber Security Headlines


1 Week in Review: Chrome password replacer, Luna Moth exploits, ChatGPT declines shutdown command 26:09
26:09
Play Later
Play Later
Lists
Like
Liked26:09
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Steve Knight , former CISO, Hyundai Capital America Thanks to our show sponsor, ThreatLocker ThreatLocker ® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO . All links and the video of this episode can be found on CISO Series.com…
C
Cyber Security Headlines


1 Windows startup failures, Victoria’s Secret cyberattack, stolen cookie threat 7:21
7:21
Play Later
Play Later
Lists
Like
Liked7:21
Windows 11 might fail to start after installing KB5058405, says Microsoft Victoria’s Secret website goes offline following cyberattack Billions of stolen cookies available, worrying security experts Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO . Find the stories behind the headlines at CISOseries.com .…
C
Cyber Security Headlines


1 Microsoft updates Update, LexisNexis leak, cyber insurance premiums 7:58
7:58
Play Later
Play Later
Lists
Like
Liked7:58
Microsoft wants to update all the things LexisNexis breach impacts 364,000 people Cyber insurance premium volume expected to double Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO .…
C
Cyber Security Headlines


1 MathWorks confirms ransomware attack, Adidas has data breach, Dutch intelligence warns of cyberattack 6:32
6:32
Play Later
Play Later
Lists
Like
Liked6:32
MathWorks, Creator of MATLAB, Confirms Ransomware Attack Adidas warns of data breach after customer service provider hack Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO .…
C
Cyber Security Headlines


1 Malicious npm codes, Nova Scotia cyberattack, ChatGPT refuses shutdown command 7:19
7:19
Play Later
Play Later
Lists
Like
Liked7:19
Malicious npm and VS Code packages stealing data Nova Scotia Power confirms ransomware attack Researchers claim ChatGPT o3 bypassed shutdown in controlled test Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO . Find the stories behind the headlines at CISOseries.com .…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.