Category Archives: Cyber Security

BrightTALK webinar: Google Docs Phishing Scam

What-is-google-docs-phishing-slide-2

ICYMI: I moderated a BrightTALK webinar on the recent Google Docs phishing attack.

Join BrightTALK and check out this informative panel discussion featuring myself along with panelists Nathan Wenzler and Kowsik Guruswamy.

This slideshow requires JavaScript.

A massive phishing campaign targeting Google accounts ripped through the internet on a Wednesday afternoon in early May. Phishing scams are pretty common. What sets this scam apart is that it is more convincing than most. The email takes users who click on the file to a legitimate Google sign-in screen to grant permissions. If you received the email or are concerned you might be targeted next, join this interactive Q&A panel to get the facts and protect your account and your organization.

We discuss:
– What is the Google Docs email scam?
– How is this scam different from other phishing scams?
– What’s the deal with Eugene Pupov?
– Who’s at risk and how can you avoid being a victim?
– What can we expect in the future?

Moderator:
– Vince Tocce, Vince in the Bay Podcast

Speakers:
– Nathan Wenzler, Chief Security Strategist at AsTech Consulting
– Kowsik Guruswamy, CTO for Menlo Security

Follow me on Twitter!

Tagged , , , , , , , , , , , , , , , , ,

PODCAST: RSA Conference 2017

RSAC2017-Banner

LISTEN TO FULL PODCAST

Another year, another wave of security incidents and threat models to keep the cybersecurity industry busy. So there was plenty to discuss and share as the InfoSec community flocked to San Francisco for the annual RSA Conference last month.

RSAC2017-escalator1

A view from the escalator as I descend into the bowels of RSAC 2017.

As always, the latest trends in the industry were addressed. Large data breaches, quickly growing threat models, security education, political hacking, and the risks posed by the Internet of Things were common threads throughout many of the keynotes, sessions, workshops, expos, and general chatter among attendees.

RSAC has more of a trade show feel compared to other security conferences so I’ve learned over the years that it’s best to approach the conference as an opportunity to meet and network with industry experts. This year I spent less time attending the talks and more time meeting with the players in the industry who are there to make deals and form partnerships.

However, I did catch several enlightening talks and panel discussions featuring the likes of ex-CIA operative Valerie Plame, security guru Bruce Schneier, researcher Rob Graham, people-security expert Masha Sedova, and security consultant Jeff Carr. Also enjoyed the entertaining keynotes by Late Night host Seth Meyers and astrophysicist Neil deGrasse Tyson.

This slideshow requires JavaScript.

CHECK OUT ROB GRAHAM’S TALK ON MIRAI AND IoT BOTNETS HERE!

Throughout the week I was lucky to catch up with several industry professionals representing some of the top tier firms in the cybersecurity sector who shared their take on the challenges and trends facing cybersecurity firms, their clients, and end users.

This episode of the podcast features interviews collected at RSAC 2017.

BIG THANKS TO THE GUESTS ON THIS EPISODE!!

Dave-Lewis-Akamai

Dave Lewis

Dave Lewis – Akamai

rob-graham

Rob Graham – Errata Security

Donald-Meyer

Donald Meyer

Donald Meyer – Check Point Software

Dario

Dario Forte

Dario Forte – DFLabs

Sebastian, Alex and SelenaOnapsis

Scott-Bollinger

Scott Bollinger

Scott Bollinger – Security Researcher

Jeff-Carr

Jeffrey Carr

Jeffrey Carr – 20K League

DOWNLOAD FULL PODCAST MP3

SUBSCRIBE on iTunes, GooglePlay, Stitcher, and Soundcloud!!

1-logo-itunesgoogleplay-logostitcher-logo

Follow on Twitter!

BrightTALK webinar on Cloudbleed

CloudBleed-Slide01

Last week I moderated a BrightTALK webinar on the infamous “Cloudbleed” bug.

Join BrightTALK and check out this informative panel discussion I moderated titled “CloudBleed: The Good, The Bad, and The Ugly for Users, Companies and Society.” Featuring myself along with panelists Kaushik Narayan (Skyhigh Networks), Lori MacVittie (F5 Networks), Bojan Simic (HYPR Corp), and Tom Gorup (Rook Security).

Next Wed at 10 am PDT/ 1pm EDT (March 22, 2017) I will be moderating a BrightTALK webinar on the recent “Vault 7” CIA document leaks titled WikiLeaks Vault 7: Facts, Fiction & Implications with distinguished panelists Jake Kouns, (Risk Based Security), Kenesa Ahmad (WISP) and more to be announced.

Follow me on Twitter!

Tagged , , , , , , ,

PODCAST: Twitter, Snowden and Privacy

pardon-snowden-screen-shot-1

This episode breaks down last week’s online Q & A between Twitter CEO Jack Dorsey and infamous NSA whistle blower Edward Snowden on Periscope. The event, promoted by the organizers of the campaign Pardon Snowden, featured a lengthy discussion on privacy and the role of social media in sharing user data with law enforcement and intelligence agencies.

jacob-young-twitter-avi-1

Jacob Young – who submitted a question to Snowden and had it answered, sorta.

The event also included questions from Twitter users. Jacob Young, a software engineer and privacy advocate, was one of the lucky users who submitted a question and had it answered by Snowden during the event. Jacob joins the podcast to give his reaction to Snowden’s answer to his question and also shares his thoughts on mass surveillance, privacy and more.

If you are curious about the Snowden Q&A in question and want to view the event in it’s entirety, here’s a link to the Periscope video: https://www.periscope.tv/w/1vOxwgnXeYLxB

subscribe to podcast on

1-logo-itunesstitcher-logo

PODCAST MP3 DIRECT DOWNLOAD

Tagged , , , , , , , , ,
%d bloggers like this: