The CyberWire Daily Podcast is our look at what's happening in cyberspace. It provides a clear and concise summary of the news and offers commentary from industry experts as well as our Academic and Research Partners. We publish each weekday afternoon (in time for US East Coast drive-time.)
The CyberWire Daily Podcast for 04.28.17
Researchers name Iran as responsible for attempted hack of Israeli targets. Shamoon seems to be under the same management. Roles and missions dispute among Israeli security organizations. Thales takes a look at data security in the US Federal sector. Financial malware vector startles phishing victims into clicking. Vigilante botnets are not helping the IoT. Countermessaging is harder than it looks. And there's a lot of thinly sourced hope about hacking North Korean missiles.
In today's podcast, we hear that researchers have named the hitherto unnamed country that attempted to hack Israeli targets. Other researchers conclude Shamoon is still under the same management. Roles and missions dispute among Israeli security organizations. Peter Galvin from Thales takes a look at data security in the US Federal sector. VA Tech's Dr. Charles Clancy explains the pros and cons of 5G mobile technology. Financial malware vector startles phishing victims into clicking. Vigilante botnets are not helping the IoT. Countermessaging is still not as easy as it looks. And there's a lot of thinly sourced hope about hacking North Korean missiles.
Palo Alto NetworksPalo Alto Networks, a next-generation security company, maintains trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives. Learn more at paloaltonetworks.com.
Control RisksControl Risks is a global specialist risk consultancy. We help clients find opportunities and grow, build secure, compliant and resilient organisations, and resolve critical business issues and crises. Our unique expertise and geographical reach support decision-making with crucial intelligence and insight. Learn more at controlrisks.com.
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network and connect them with nearly every active domain on the Internet. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work. Learn more at domaintools.com
Women in Cybersecurity 2017: A CyberWire Special Edition
The 2017 Women in Cybersecurity conference was held in Tucson Arizona, and the CyberWire was on hand to cover the event. We spoke with a variety of cyber security professionals, at different stages of their careers. We covered some of their career journeys and professional insights on our daily podcast, and in this special edition learn why a women in cybersecurity conference is more important than ever, what they wish they knew when they were starting out, as well as some advice for the men in the industry.
- Svetla Walsh and Deja Baker are midshipmen at the US Naval Academy.
- Amanda Rousseau is a Malware Researcher at Endgame.
- Andrea Little Limbago is Chief Social Scientist at Endgame.
- Wendi Whitmore is Global Partner & Lead, IBM X-Force Incident Response & Intelligence Services
- Michelle Dennedy is Chief Privacy Officer at Cisco.
- Kathleen Smith is Chief Marketing Officer at cybersecjobs.com and clearedjobs.net.