Episodit
-
In this episode of the TOSS C3 Podcast, host Neil Haley engages in a dynamic conversation with Greg Hanna, the founder of TOSS C3, about the critical issue of zero-day vulnerabilities. The discussion centers around a significant cybersecurity breach involving Sony Interactive Entertainment, which was caused by a zero-day vulnerability in Progress Software's MOVEit Transfer platform. This incident impacted nearly 6,791 individuals, highlighting the severe consequences of such exploits.
Greg and Neil delve into the nature of zero-day vulnerabilities, emphasizing their unpredictability and the lack of available defenses until they are discovered and patched by vendors. The conversation also explores a recent SQL injection attack on MOVEit, which underscores the importance of timely patching and vigilant cybersecurity measures.
The episode provides valuable insights into proactive steps organizations can take to protect themselves, such as implementing advanced technologies from the security sector, zero trust network access systems, and constant posture checking devices. Greg shares his experiences and the innovative solutions TOSS C3 is developing to safeguard against these threats.
The podcast concludes with a broader discussion on the impact of cybersecurity breaches on consumer behavior, particularly in online sales, and the increasing reliance on trusted, large-scale e-tailers like Amazon. Greg Hanna encourages listeners to stay informed and vigilant, highlighting the need for ongoing cybersecurity awareness and preparedness.
-
In this episode of the Toss C3 podcast, host Greg Hanna, founder of Toss C3, discusses the crucial role of automation in incident response and cybersecurity. As cyber threats become increasingly sophisticated and frequent, the need for automated, real-time responses is more vital than ever. Greg explains how Toss C3 utilizes advanced technologies such as artificial intelligence, behavioral analysis, and machine learning to automatically detect and neutralize potential threats.
-
Puuttuva jakso?
-
In this episode of the Toss C3 podcast, Greg Hanna, founder of Toss C3, delves into the vulnerabilities associated with biometric authentication on mobile devices. While facial recognition and fingerprint scanning offer convenience, they also present significant security risks. Greg explains how hackers can exploit these features using advanced techniques like 3D printing and photographic manipulation to gain unauthorized access to your devices and sensitive information.
Greg discusses the pros and cons of using biometrics for different applications and provides practical advice on when to avoid these features, especially for banking and critical apps. He also touches on the importance of multi-factor authentication and the limitations it may have if your device falls into the wrong hands. Tune in to learn why convenience shouldn't compromise your security and how to better protect your mobile devices from sophisticated attacks.
-
In this episode of the Toss C3 podcast, Greg Hanna, the founder of Toss C3, sheds light on the sinister practice of juice jacking and its implications for mobile device users. With the proliferation of public charging stations in airports, malls, and even ride-sharing services, the convenience comes with a hidden risk. Greg explains how hackers exploit these charging stations to inject malware, extract data, or worse, leaving unsuspecting users vulnerable to cyberattacks.
Greg shares practical advice on mitigating this threat, including the use of juice jack preventatives available on platforms like Amazon. By understanding the anatomy of charging cables and implementing simple precautions, listeners can safeguard their devices against potential breaches. Tune in to learn more about the dangers of juice jacking and how to stay protected in an increasingly connected world.
-
Join Greg Hanna, founder of Toss C3, in a deep dive into the world of password management and cybersecurity best practices. In this episode, Greg discusses the importance of robust passwords, the pitfalls of common practices, and the critical role of password managers in keeping your digital identity secure. Learn about recent breaches, the dark web's role in password vulnerabilities, and why multi-factor authentication is non-negotiable in today's threat landscape. Don't miss this eye-opening conversation on protecting your digital assets in an ever-evolving cyber landscape.
-
In this episode of the Toss C3 Podcast, founder Greg Hanna addresses the critical issue of IT delegation within organizations. Joined by Neil, they explore the common tendency for management to pass off IT responsibilities to specialized personnel without fully grasping the implications. From municipalities to law firms, the consequences of this disconnect are dire, as evidenced by recent breaches and lawsuits. Greg emphasizes the importance of executive involvement in cybersecurity measures, urging leaders to ask the tough questions and hold their IT teams accountable. Through real-world examples and practical insights, they shed light on the risks of complacency and the necessity of proactive leadership in safeguarding against cyber threats. Tune in to learn how to bridge the gap between management and IT for a more resilient and secure organization.
-
In this episode of the TOSC3 Podcast, host Greg Hanna delves into the unsettling truth behind the seemingly innocuous interfaces of AI technologies like Chat GPT. Joined by Neil, they uncover the undisclosed API interfaces granting programmers unfettered access to the capabilities of AI engines like Chat GPT and Bart. From scraping email lists to crafting malware, the implications for cybersecurity and privacy are profound. As they explore the evolving landscape of AI and its intersection with security, Greg offers invaluable insights and actionable strategies to safeguard against these emerging threats. Tune in to stay ahead of the curve in the battle against cyber adversaries.
-
In this episode of the TOSS C3 podcast, host Greg Hanna delves into the world of ethical hacking, shedding light on its crucial role in fortifying digital defenses. Discover the nuances between white hat and black hat hackers, and learn how ethical hackers simulate real-world cyber threats to identify vulnerabilities before malicious actors exploit them. Gain insights into the proactive measures organizations can take to bolster their cybersecurity posture and stay one step ahead of potential breaches. Tune in to explore the importance of constant vigilance in the digital landscape and how ethical hacking serves as a vital tool in safeguarding against evolving cyber threats.
-
Join Greg Hanna, founder of Toss C3, as he delves into the murky depths of cybersecurity threats lurking on the dark web. In this episode, Greg sheds light on recent cyber attacks, including an 18-year-old's infiltration of 60,000 user accounts, and discusses the alarming prevalence of credential stuffing attacks. Discover the importance of proactive cybersecurity measures and why having a specialist is crucial in safeguarding against potential disasters in the digital realm. Tune in for valuable insights on protecting your business from cyber threats before it's too late.
-
In this episode of the TOSC3 podcast, host Neil and cybersecurity expert Greg Hanna delve into the intricate world of digital deception. They explore the insidious tactics of phishing, smishing, and vishing used by hackers to target individuals and organizations. From spoofed emails requesting sensitive information to text messages enticing unwary recipients to divulge personal details, listeners gain insights into the diverse strategies employed by cybercriminals. Through engaging discussion and practical advice, Neil and Greg illuminate the complexities of these cyber threats and offer valuable tips for safeguarding against them. Tune in to unravel the web of deception and fortify your defenses against digital intruders.
-
In this episode of the TOSC3 podcast, host Neil and cybersecurity expert Greg Hanna delve into the ever-present dangers lurking in the digital landscape. From the deceptive tactics of hackers using fake browser updates to distribute malware to the insidious capabilities of the Android Trojan Spy Note, they shed light on the critical importance of remaining vigilant in safeguarding personal and organizational cybersecurity. Through insightful analysis and practical tips, listeners gain valuable insights into protecting their devices and data from digital intruders. Tune in to learn how to navigate the complexities of the online world and fortify your defenses against cyber threats.
-
On this podcast, Greg Hanna will explain the differences between SIEM and XDR.
-
In this episode, Greg Hanna explains ways an Android can carry Malware.
-
In this episode, Greg will discuss how browsers can be hacked.
-
In this episode, Greg Hanna will discuss Spynote.
-
Greg Hanna and discusses the previous episode featuring the UK Chili Queen. Upcoming interviews, including Ricky Schroeder, are teased.
Topic Overview:
The focus of the episode is on transforming cybersecurity in 2024 for a cost of $19.99 a month. Greg emphasizes the importance of cybersecurity for businesses and the evolving challenges they face.Understanding Attack Surfaces:
Greg explains the concept of 'attack surfaces' such as servers, PCs, laptops, mobile devices, etc. The package offered by Toss C3 aims to protect these devices from various cyber threats.Toss C3's Cybersecurity Solution:
Integration of 24/7 monitoring, AI responses, and a global team of experts. Sentinel One's role in endpoint protection and XDR solutions.The Human Factor in Security:
Importance of training and awareness in preventing cyber attacks. Real-world examples of phishing and smishing attacks.The Consultation Process:
A 15-minute consultation to understand unique environments and technology use. External and internal vulnerability assessment and penetration testing.Cloaking Technology:
Discussion about making companies invisible to hackers using cloaking technology. Greg draws parallels to concepts from 'Star Trek' and 'Predator'.Recent Cybersecurity Incidents:
Discussion about large-scale attacks and the implications for businesses and municipalities. The importance of having a robust cybersecurity strategy.Social Media and Cybersecurity:
The rise of fake accounts and scams on social media platforms. The allure of cryptocurrency scams and the difficulty in tracing such transactions.Special Offer and Conclusion:
Greg details how listeners can access the special $19.99 offer. The episode concludes with a reminder of the importance of staying safe and secure online. -
In this episode, Greg Hanna will discuss the film and how it relates to cybersecurity.
-
In This Episode, Greg Hanna will discuss Splunk Augmentation.
-
In this episode, Greg Hanna will explain how that happen.
-
Welcome to the TOSS C3 Podcast, your gateway to the forefront of cybersecurity. I'm Greg Hanna, founder of TOSS C3, and in this episode, we're focusing on a critical domain where cybersecurity is paramount – healthcare.
Join me as we delve into the intricacies of "Safeguarding Health: Navigating the Frontlines of Cybersecurity in Healthcare." In an era where technology intersects with patient care, the importance of robust cybersecurity measures cannot be overstated.
In this episode, we explore the unique challenges faced by the healthcare industry, from protecting sensitive patient data to ensuring the seamless operation of critical medical systems. I'll share insights into how TOSS C3 is at the forefront of navigating the frontlines of cybersecurity in healthcare, providing tailored solutions to safeguard the well-being of patients and the integrity of healthcare organizations.
Whether you're a healthcare professional, an IT specialist in the industry, or simply intrigued by the intersection of technology and healthcare, this episode offers a deep dive into the strategies and technologies essential for maintaining a secure digital healthcare landscape.
Tune in to the TOSS C3 Podcast and join me as we unravel the complexities of cybersecurity in healthcare. Together, let's explore how we can collectively ensure the safety and security of health information, navigating the frontlines of cybersecurity in this critical sector.
- Näytä enemmän