Recorded Future - Inside Security Intelligence

Recorded Future - Inside Security Intelligence

www.recordedfuture.com/podcast
Inside the world of security intelligence.


176 Curating Your Personal Security Intelligence Feed
Sep 21 • 24 min
Our guest is Sal Aurigema, associate professor of computer information systems at the University of Tulsa. He shares his experience in nuclear engineering and serving aboard submarines in the U.S. Navy, his shift to the intelligence community, and his…
175 Passion, Curiosity, and a Dash of Mischief
Sep 14 • 23 min
Kevin Magee is Chief Security Officer for Microsoft Canada. He joins us with his story of early entrepreneurship, persistent curiosity, and a lifelong passion for learning. He shares the career path that earned him his leadership position with…
174 The Highest Security Intelligence in the Shortest Time
Sep 7 • 21 min
Craig Adams is the chief product and engineering officer at Recorded Future. He joins us with insights from his decades of experience in the industry, including valuable lessons learned while developing security and business strategies at Akamai. He…
173 The Diversity of Security Challenges in Higher Education
Aug 31 • 23 min
Security professionals at institutions of higher education face a broad spectrum of challenges, from protecting the internal networks of their organizations, to securing intellectual property of research groups, to protecting the personal information…
172 Launching the Cyber Intelligence News Site The Record by Recorded Future
Aug 24 • 14 min
Recorded Future recently announced the launch of a new cyber intelligence news site called The Record by Recorded Future. The publication aims to fill the gap between fast-breaking headlines and long-lead research with expertly sourced reporting and…
171 The Transformation of Managed Security Services
Aug 17 • 18 min
Our guest today is Jim Aull. He’s a solutions architect specializing in security at Verizon. We’ll hear about Jim’s career path, and then we’ll learn about his role in guiding customers through the technical and organization challenges…
170 Defending MacOS Against Sophisticated Attacks
Aug 10 • 22 min
Our guest today is Phil Stokes. He’s a security researcher at SentinelOne, where he specializes in the analysis of attacks against MacOS. In our conversation, Phil shares his professional journey, how he came to focus on the Mac platform, as…
169 Making Security Real in the Context of Business
Aug 3 • 24 min
Our guest today is Shamla Naidoo, a managing partner at IBM Security. With a career spanning over three decades, including 20 years as a CISO, Shamla has excelled in a variety of positions, from engineer to executive. Shamla joins us with…
168 Ransomware Negotiations and Original Hacker Culture
Jul 27 • 19 min
Our guest today is Sherri Davidoff. She’s the founder and CEO of LMG Security, a cybersecurity and digital forensics firm with clients across the globe. She shares the story of her professional journey, including her time deep in the hacker culture…
167 The Emerging Role of SASE and the Cloud
Jul 20 • 21 min
As many organizations accelerate their move to the cloud — thanks in no small part to the global pandemic and the shift to working from home — the adoption of SASE protocols is proving attractive. SASE stands for Secure Access Service Edge, but as…
166 Inside the Adversary Exploit Process
Jul 13 • 18 min
With reported and classified each year, it can be challenging to keep track of which exploits are actually being used by threat actors. Researchers with Recorded Future’s Insikt Group have been exploring this issue, and one of their key findings is…
165 Empowering Cyber Startups in the UK
Jul 6 • 20 min
London has, for centuries, enjoyed its status as one of the cornerstones of the global economy. So it makes sense that it would also be a beacon of innovation and investment in cybersecurity. Our guest today is Jonathan Luff. He’s the co-founder of…
164 A Grab Bag of Pulse Reports
Jun 22 • 17 min
Recorded Future’s Allan Liska is our guest once again this week. This time, he brings a collection of interesting trends and anomalies that he and his team have been tracking. They publish these on the Recorded Future website under the title of…
163 Tooling up to Protect Federal, State, and Local Governments
Jun 15 • 22 min
Our guest is John Zanni, CEO at Acronis SCS, a company dedicated to providing secure backup, disaster recovery, and cyber protection for the U.S. public sector. He shares his unconventional journey into a career in cybersecurity, as well as insights…
162 Broadening Your View With Security Intelligence
Jun 8 • 18 min
Alex Noga is a solutions engineering manager at Recorded Future, and on this week’s show, he joins us to share his insights on enhancing organizations’ ability to make the most of the information they’re gathering by adopting security…
161 The Ultimate Job for a Network Defender
Jun 1 • 21 min
Our guest this week is Rick Howard, chief analyst and chief security officer at the CyberWire. Rick’s career included stops in the U.S. Army in signals intelligence, teaching computer science at Westpoint, and pioneering roles in threat intelligence…
160 The Essential Skills of Evaluating and Communicating Risk
May 25 • 24 min
Our guest is IT risk analyst James Dawson. James provides advice to global organizations on the issues of threat and cyber risk, and has also consulted with many organizations in the financial industry, including Danske Bank and Freddie Mac. James…
159 Making the Framework for Threat Intelligence Easy
May 18 • 20 min
Our guest is Chris Cochran, threat intelligence and operations lead at Netflix, and cohost of the Hacker Valley Podcast. We discuss his career in cybersecurity, from his ambitious beginnings as a student, his service in the U.S. Marine Corp and his…
158 Planning for Resilience and Eventuality Amidst Global Cyber Threats
May 11 • 21 min
Our guest is Adeel Saeed, veteran cybersecurity expert, technologist, and former CISO at State Street, previously having worked for organizations including the London Stock Exchange and the American Stock Exchange. Our conversation centers on…
157 Promoting International Understanding and Trust
May 4 • 25 min
Our guest is Mihoko Matsubara, chief cybersecurity strategist at Japanese telecommunications company NTT Corporation in Tokyo, where she’s responsible for cybersecurity thought leadership. Previously, Mihoko worked at the Japanese Ministry of…
156 Blazing the Threat Hunting Trail
Apr 27 • 30 min
Yolonda Smith is head of cybersecurity at Sweetgreen, a fast casual restaurant chain that focuses on salads, with over 100 locations coast to coast in the U.S. Yolonda shares the challenges of securing the array of elements involved in a farm-to-table…
155 Faster Decisions Through Automation
Apr 20 • 22 min
Our guest this week is Bob Stasio, global cyber threat leader at Dupont, a global Fortune 500 company with around 35,000 employees. Bob shares his professional pathway beginning in the U.S. Army, with stops along the way at NSA and U.S. Cyber Command,…
154 The Business Case for Risk-Based Cybersecurity
Apr 13 • 22 min
On today’s show, we welcome back Recorded Future’s senior vice president of global intelligence, Levi Gundert, to discuss his newly published book, “.” In our conversation, Levi makes the case for risk-based cybersecurity and describes the…
153 A Culture of Drive, Work Ethic, and Attention to Detail
Apr 6 • 20 min
Our guest today is Nick Kael. He’s chief technology officer at Ericom Software, a company that provides secure web isolation and remote application access software and cloud services. In our conversation, Nick shares his professional journey,…
152 Mitigating Threat Actors’ Shift Toward Automation
Mar 30 • 23 min
Researchers from Recorded Future’s Insikt Group have been tracking the increased use of automation by a variety of threat actors around the world. Similar to the way that legitimate businesses use automation to increase their efficiency and…
151 Meeting the Security Challenges of a Global Pandemic
Mar 23 • 19 min
The COVID-19 global pandemic has set us all back on our heels, as we make adjustments to our day-to-day lives and prepare for what is yet to come. The situation is evolving quickly, and when it comes to security, there are a number of concerns —…
150 A Healthy Respect for Ransomware
Mar 16 • 20 min
Despite the cybersecurity industry’s best efforts, ransomware continues to affect individuals and organizations of just about every shape and size — from mom-and-pop shops, to global organizations, and even municipalities. As the developers of…
149 A Nuanced Approach to MSSP and MDR Services
Mar 9 • 18 min
Many organizations find themselves puzzling through the countless security products and services on offer these days, decoding the buzzwords and acronyms, hoping to find clarity and understanding. MSSP and MDR services are among those offerings. MSSP…
148 Gamification of Incident Response in the Cyber Range
Mar 2 • 25 min
When it comes to incident response — just like in sports — you’ve got to practice like you play. In warfare, they say, “No plan survives contact with the enemy,” and heavyweight boxing champion Mike Tyson had his own version: “Everyone has…
147 Security That Fits the Needs of the Organization
Feb 24 • 20 min
There’s that old saying, “The more things change, the more things stay the same.” In cyber security and incident response, even with all of the new tools, increased speed and mounting threats, a large part of keeping any organization safe comes…
146 Security Wisdom from the FS-ISAC
Feb 17 • 20 min
Our guest this week is DK Lee. He’s an information sharing operations manager at FS-ISAC, the financial services information sharing and analysis center. They’re an industry consortium focused on reducing cyber risk in the global financial system,…
145 Understanding Russia’s Global Online Influence
Feb 10 • 25 min
Our guest is Oscar Jonsson. He’s the director of the Stockholm Free World Forum, a Swedish foreign and security policy think tank, and an associated researcher at the Swedish Defense University. Previously, Oscar was a subject-matter expert at the…
144 A Journalist’s Perspective on Global Cyber Threats
Feb 3 • 18 min
Hakan Tanriverdi is a journalist covering cybersecurity for Germany’s public broadcasting network. In our conversation this week, we discuss the challenges of reporting on a highly technical subject area, making your stories accessible to the…
143 Teachers, Trainers, and Educators
Jan 27 • 21 min
Our guest this week is Jeremy Blackthorne, president of the Boston Cybernetics Institute. They provide a variety of cybersecurity services, and our conversation focuses on their unique approach to training, specifically for members of the U.S….
142 The Physical and the Digital of Open Source Intelligence
Jan 20 • 16 min
Our guest this week is Nico Dekens. Online, people know him as the “Dutch OSINT Guy,” a handle he’s earned through his extensive knowledge and background in open source intelligence. Nico shares his own history getting into the field, as…
141 Threat Intelligence is the Centerfold
Jan 13 • 40 min
Our guest this week is Steven Atnip. He’s a senior advisor for Verizon’s threat research advisory center and the dark web hunting team. Steven shares his early career experience in the U.S. Navy and explains why he believes the military provides…
140 Protecting the Financial Sector Never Goes Out of Style
Jan 6 • 19 min
Our guest this week is Daniel Cuthbert. He’s the global head of cybersecurity research for Banco Santander, and he sits on both the Black Hat review board and the Black Hat training board. Our conversation centers on his work in the financial…
139 The Value in Sharing Your Experience With the World
Dec 30, 2019 • 20 min
139 The Value in Sharing Your Experience With the World
138 Insights From a Distinguished Law Enforcement Veteran
Dec 16, 2019 • 18 min
138 Insights From a Distinguished Law Enforcement Veteran
137 Traveling the Globe With Threat Intelligence
Dec 9, 2019 • 19 min
137 Traveling the Globe With Threat Intelligence
136 Threat Hunting, Mentoring, and Having a Presence
Dec 2, 2019 • 24 min
136 Threat Hunting, Mentoring, and Having a Presence
135 From Infamous MySpace Wormer to Open Source Advocate
Nov 25, 2019 • 21 min
135 From Infamous MySpace Wormer to Open Source Advocate
134 Solving the Business Challenges of Governance, Risk, and Compliance
Nov 18, 2019 • 25 min
134 Solving the Business Challenges of Governance, Risk, and Compliance
133 Security Intelligence in the Digital Transformation
Nov 11, 2019 • 22 min
133 Security Intelligence in the Digital Transformation
132 Municipalities Face Unique Cybersecurity Challenges
Nov 4, 2019 • 28 min
132 Municipalities Face Unique Cybersecurity Challenges
131 Never Underestimate Threat Actors’ Persistence
Oct 28, 2019 • 20 min
131 Never Underestimate Threat Actors’ Persistence
130 Strategy and Focus Protect New York City
Oct 21, 2019 • 23 min
130 Strategy and Focus Protect New York City
129 Cybersecurity is National Security
Oct 14, 2019 • 19 min
129 Cybersecurity is National Security
128 Understanding Social Engineering and Maintaining Healthy Paranoia
Oct 7, 2019 • 21 min
128 Understanding Social Engineering and Maintaining Healthy Paranoia
127 Disinformation for Sale
Oct 1, 2019 • 27 min
127 Disinformation for Sale
126 Intelligence from Internet Background Noise
Sep 24, 2019 • 22 min
126 Intelligence from Internet Background Noise
125 Coming to a City or Town Near You: Ransomware
Sep 16, 2019 • 22 min
125 Coming to a City or Town Near You: Ransomware
124 The Intersection of Political Science, Risk Management, and Cybersecurity
Sep 9, 2019 • 31 min
124 The Intersection of Political Science, Risk Management, and Cybersecurity
123 Crowdsourcing Phishing Defenses for Herd Immunity
Sep 3, 2019 • 21 min
123 Crowdsourcing Phishing Defenses for Herd Immunity
122 Hong Kong Protests and the Rise of Online Influence Operations
Aug 27, 2019 • 23 min
122 Hong Kong Protests and the Rise of Online Influence Operations
121 The Art and Science of SOAR
Aug 19, 2019 • 23 min
121 The Art and Science of SOAR
120 Pioneering Threat Intelligence Before It Had a Name
Aug 16, 2019 • 24 min
120 Pioneering Threat Intelligence Before It Had a Name
119 The Inevitable Evolution of SIEMs
Aug 5, 2019 • 23 min
119 The Inevitable Evolution of SIEMs
118 Public Safety, Digital Forensics, and SOAR
Jul 29, 2019 • 22 min
118 Public Safety, Digital Forensics, and SOAR
117 A Passion for Pen Testing
Jul 22, 2019 • 15 min
117 A Passion for Pen Testing
116 Darknet DDoSer Does Damage to Dread
Jul 15, 2019 • 22 min
116 Darknet DDoSer Does Damage to Dread
115 Intelligence for the OSINT Curious
Jul 8, 2019 • 24 min
115 Intelligence for the OSINT Curious
114 Unwrapping Fishwrap, a New Social Media Misinformation Methodology
Jul 1, 2019 • 19 min
114 Unwrapping Fishwrap, a New Social Media Misinformation Methodology
113 Being Courageous, Curious, and Thoughtful in Cybersecurity
Jun 24, 2019 • 31 min
113 Being Courageous, Curious, and Thoughtful in Cybersecurity
112 Making the Most of the NIST Cybersecurity Framework
Jun 17, 2019 • 29 min
112 Making the Most of the NIST Cybersecurity Framework
111 The Threat Intelligence Value Proposition
Jun 10, 2019 • 16 min
111 The Threat Intelligence Value Proposition
110 Advocating OWASP, Securing Elections, and Standing Your Ground
Jun 3, 2019 • 35 min
110 Advocating OWASP, Securing Elections, and Standing Your Ground
109 Applying Threat Intelligence Throughout Your Organization
May 28, 2019 • 20 min
109 Applying Threat Intelligence Throughout Your Organization
108 Investing in Technology, Innovative Leaders, and Yourself
May 20, 2019 • 22 min
108 Investing in Technology, Innovative Leaders, and Yourself
107 A Risk-Based Approach From Spammers to Nation-States
May 13, 2019 • 22 min
107 A Risk-Based Approach From Spammers to Nation-States
106 A Fresh Take on Defining Threat Intelligence
May 6, 2019 • 26 min
106 A Fresh Take on Defining Threat Intelligence
105 StubHub Leverages Empathy and Emotional Intelligence for Threat Hunting
Apr 29, 2019 • 21 min
105 StubHub Leverages Empathy and Emotional Intelligence for Threat Hunting
104 Information Security Is Not an IT Risk, It’s a Business Risk
Apr 22, 2019 • 28 min
104 Information Security Is Not an IT Risk, It’s a Business Risk
103 Business Outcomes and the CISO’s Success
Apr 15, 2019 • 28 min
103 Business Outcomes and the CISO’s Success
102 Approaching Privacy as a Business Plan for Data
Apr 8, 2019 • 31 min
102 Approaching Privacy as a Business Plan for Data
101 Questions to Ask When Shopping for Threat Intelligence
Apr 1, 2019 • 25 min
101 Questions to Ask When Shopping for Threat Intelligence
100 The grugq Illuminates Influence Operations
Mar 25, 2019 • 34 min
100 The grugq Illuminates Influence Operations
099 Chinese Charm Attempts to Alter American Political Opinion
Mar 18, 2019 • 27 min
099 Chinese Charm Attempts to Alter American Political Opinion
098 Tools, Training, and Threat Intelligence Empower Phishing Defense description
Mar 11, 2019 • 23 min
098 Tools, Training, and Threat Intelligence Empower Phishing Defense description
097 Security Needs to Be Easy to Use and Easy to Explain
Mar 4, 2019 • 21 min
097 Security Needs to Be Easy to Use and Easy to Explain
096 Ransomware Trends to Watch in 2019
Feb 25, 2019 • 26 min
096 Ransomware Trends to Watch in 2019
095 The Challenges of Authentication at Scale and Quantifying Risk
Feb 18, 2019 • 22 min
095 The Challenges of Authentication at Scale and Quantifying Risk
094 The Value Proposition of Finished Intelligence
Feb 11, 2019 • 16 min
094 The Value Proposition of Finished Intelligence
093 Active Threat Hunting Within Your Organization
Feb 4, 2019 • 21 min
093 Active Threat Hunting Within Your Organization
092 Managing Third-Party Risk in Real Time
Jan 28, 2019 • 17 min
092 Managing Third-Party Risk in Real Time
091 NopSec Analyzes the NVD for Their Annual Risk and Vulnerability Report
Jan 21, 2019 • 26 min
091 NopSec Analyzes the NVD for Their Annual Risk and Vulnerability Report
090 Secure Identity and Access Management
Jan 14, 2019 • 25 min
090 Secure Identity and Access Management
089 Putting Artificial Intelligence to Work
Jan 7, 2019 • 29 min
089 Putting Artificial Intelligence to Work
088 Pioneering Proactive Approaches to Power Protection
Dec 31, 2018 • 23 min
088 Pioneering Proactive Approaches to Power Protection
087 Leadership and Buy-In Help Protect BT’s Global Networks
Dec 17, 2018 • 24 min
087 Leadership and Buy-In Help Protect BT’s Global Networks
086 Bringing Collaboration to Real-Time Data Feeds
Dec 10, 2018 • 23 min
086 Bringing Collaboration to Real-Time Data Feeds
085 Controlling Online Access in Yemen’s War Zone
Dec 3, 2018 • 22 min
085 Controlling Online Access in Yemen’s War Zone
084 Bringing Intelligence Community Experience to the Private Sector
Nov 26, 2018 • 23 min
084 Bringing Intelligence Community Experience to the Private Sector
083 The What? So What? and the Why? Why? Why?
Nov 19, 2018 • 19 min
083 The What? So What? and the Why? Why? Why?
082 Bringing Government Experience to Financial Services Security
Nov 12, 2018 • 20 min
082 Bringing Government Experience to Financial Services Security
081 Thwarting Organized Crime and Protecting Major Telecoms
Nov 5, 2018 • 25 min
081 Thwarting Organized Crime and Protecting Major Telecoms
080 Blending Threat Intelligence With Cyber Risk Frameworks
Oct 29, 2018 • 23 min
080 Blending Threat Intelligence With Cyber Risk Frameworks
079 Advanced Security Tactics From Down Under
Oct 22, 2018 • 24 min
079 Advanced Security Tactics From Down Under
078 Intelligence Sharing to Protect Ourselves and Each Other
Oct 15, 2018 • 29 min
078 Intelligence Sharing to Protect Ourselves and Each Other
077 Threat Intelligence by the Book
Oct 8, 2018 • 21 min
077 Threat Intelligence by the Book