Episodes

  • Messenger of Sympathy and Love Servant of Parted Friends Consoler of the Lonely

    Bond of the Scattered Family Enlarger of the Common Life

    Carrier of News and Knowledge

    Instrument of Trade and Industry

    Promoter of Mutual Acquaintance

    Of Peace and of Goodwill Among Men and Nations

    -- Inscription found on the the Smithsonian Institution's National Postal Museum

    Победить и вернуться

    -- Motto of the Federal Security Service of the Russian Federation

    Imagine being in charge of securing an enterprise comprised of over 450,000 connected devices spread over 31,000 locations worldwide. The United States Postal Service is a pretty serious organization when it comes to the amount of data that flows through its network. It would take a pretty cool individual to stand up to the daily pressure of an organization that big and that diverse.

    Imagine cold calling the Federal Security Service of the Russian Federation and asking to speak with their head of Information Security in order to share the information you have uncovered regarding tens of thousands of incidents of mail and cyberfraud committed by Russian criminals. They took the call… It would take a pretty cool individual would have to be pretty cool to accept the FSB’s invitation to sit face to face in Odessa at FSB headquarters.

    Now imagine that individual is the same person.

    The good news? You don’t have to imagine.

    On today’s No Name Security Podcast, Matt Stephenson welcomes Greg Crabb, founder of TenEight Cyber where he consults with CISOs and organizations needing CISO levels of expertise. With 25 years in law enforcement specializing in mail and cyber fraud as well as 6 years as CISO of the United States Postal Service, Greg has learned some things about security. Want to hear about the time he worked with the Russian FSB on a particularly large fraud case? Stick around…

    About Greg Crabb

    Greg Crabb is the founder of 10-8, LLC. With more than 25 years of law enforcement and security experience, he specializes in providing consultation to cybersecurity leaders and organizations to help protect their digital assets against evolving cyberthreats. Greg focuses specifically on delivering advisory services to C-suite executives, their boards, and other leaders responsible for securing their organization’s operations, products, and services.

    For six years as the U.S. Postal Service’s chief information security officer, Greg secured the agency’s technology and information assets against nation-state threat actors. These efforts helped protect military mail globally and the unprecedented 2020 U.S. elections.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • On this Very Special Episode, Matt Stephenson welcomes Elisa Costante, VP of Research and Ellen Sundra, Chief Customer Officer at Forescout for a discussion about the vulnerabilities that plague Operational Technology and Critical Infrastructure. With nearly 40 years of combined experience finding, understanding and solving the security issues that can cripple a nation, our guests bring some very esoteric knowledge in a way that the rest of us can understand. Dig it…

    About Elisa Costante

    Elisa Costante (@ElisaCostante) is the Vice President of Research at Forescout Technologies. Previously, she has been a part of Security Matters - a Forescout company, where she worked as Chief Technology Officer and Head of Research. Elisa holds a PhD degree in Mathematics and Computer Science from Eindhoven University of Technology.

    About Ellen Sundra

    Ellen Sundra (LNSundra) is the Chief Customer Officers at Forescout. Previously, Ellen was Sr Vice President of Ssytems Engineering and Enablement when she helped to build a global organization responsible for designing customized security solutions for commectial and public sector customers.

    Ellen has over 25 years of experience in the cybersecurity industry and was recently named one of the Top 25 Women in Cybersecurity by Cyber Defense Magazine.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • Missing episodes?

    Click here to refresh the feed.

  • On this Very Special Episode, Matt Stephenson brings in ThreatGEN Founder/CEO and Hacking Exposed: Industrial Control Systems author Clint Bodungen alongside Forescout Technologies Inc. Principal OT Strategist Brian Proctor for a sit-down. We take a hard look at the state of security for Operational Technology, Blue and Red teaming for OT, the cybersecurity Skills Gap and a few other things.

    About Clint Bodungen

    Clint Bodungen (@R1ngZer0) is a world-renowned industrial cybersecurity expert, public speaker, published author, and cybersecurity gamification pioneer. He is the lead author of Hacking Exposed: Industrial Control Systems, and creator of the ThreatGEN Red vs. Blue cybersecurity gamification platform. He is a United States Air Force veteran, has been a cybersecurity professional for more than 25 years, and is an active part of the cybersecurity community, especially in ICS/OT (BEER-ISAC #046). Focusing exclusively on ICS/OT cybersecurity since 2003, he has helped many of the world's largest energy companies, worked for cybersecurity companies such as Symantec, Kaspersky Lab, and Industrial Defender, and has published multiple technical papers and training courses on ICS/OT cybersecurity vulnerability assessment, penetration testing, and risk management.

    Clint hopes to revolutionize the industry approach to cybersecurity education, and help usher in the next generation of cybersecurity professionals, using gamification. His flagship product, ThreatGEN Red vs. Blue, is the world’s first online multiplayer cybersecurity computer game, designed to teach real-world cybersecurity.

    About Brian Proctor

    Brian Proctor (@brianproctor67) is the Principal OT Strategist at Forescout. He spent the majority of his previous professional life as an ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In joined an ICS security startup which was then acquired by Forescout Technologies. Brian jumped to the vendor side to promote the benefits ICS/SCADA/DCS threat detection, network security monitoring, and visualization capabilities can bring critical infrastructure asset owners. He is passionate about helping the ICS security community in any way possible and trying to make a difference for the greater good of our industry and country.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • Once upon a time, Gartner predicted that by 2020, more than 25 percent of cyberattacks in healthcare delivery organizations would involve some kind of IoT device. In medical terms, that means wirelessly connected and digitally monitored implantable medical devices like pacemakers, deep brain neurostimulators and insulin pumps. These aren’t the esoteric things that mioght make the world go round, but are difficult to explain to the layperson. But the people who are literally kept alive by these devices, it their continued functionality is literally a matter of life and death.

    You feel me?

    In 2018 Cybesecurity Ventures released research stating that medical devices have an average of 6.2 vulnerabilities each. Furthers, they found that 60% of medical devices were at end-of-life stage with no patches or upgrades available.

    The scariest of all cyber malintent in the healthcare space may lie ahead. Researchers in Israel announced last year that they’d created a computer virus capable of adding tumors into CT and MRI scans. They are talking about malware designed to fool doctors into misdiagnosing high-profile patients, according to a story by Kim Zetter in The Washington Post.

    So what do we do?

    On today’s No Name Security Podcast, Matt Stephenson welcomes Mitch Greenfield, Director of Core Security Architecture at Humana. We go all over the healthcare security map in a chat ranging from returning to work to securing telehealth operations to the intricacies of securing a wildly diverse enterprise... we might even squeeze in a little bit of pickle ball. Yeah… you read that right. Great stuff this on this episode! Check it out…

    About Mitch Greenfield

    Mitch Greenfield is Director of Core Security Architecture at Humana. He’s been there for over 13 years and has served in previous roles which included ethical hacking and penetration testing for Humana as well as their partners and aqcuisitions.

    Mitch is a Certified Ethical Hacker and Licensed Penetration Tester, among many other things.

    He also co-hosts the Collaboration Chronicles podcast

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • INFRA:HALT vulnerabilities impact the closed source TCP/IP stack NicheStack that is used in millions of Operational Technologies and Industrial Control Systems, especially in the discrete and process manufacturing industries. Among the vulnerabilities are DNS cache poisoning, TCP spoofing, Denial of Service and Remote Code Execution. Successful attacks can result in taking OT and ICS devices offline and having their logic hijacked. Hijacked devices can spread malware to where they communicate on the network.

    Forescout Research Labs partnered with JFrog Security Research to disclose INFRA:HALT, a set of 14 new vulnerabilities affecting the HCC-owned, closed source TCP/IP stack NicheStack. NicheStack was originally developed by InterNiche Technologies and has been in use for 20 years across critical infrastructure sectors. Nearly all major industrial automation vendors incorporate NicheStack in their products and solutions.

    On today’s No Name Security Podcast, Matt Stephenson welcomes Forescout Researchers Daniel dos Santos, Stanislav Dashevskyi and Engineer Anil Mahale for a discussion of Forescout's and JFrog’s joint research project INFRA:HALT. We dive into what the NicheStack TCP/IP stack is, how it is vulnerable and what that means to the cybersecurity world and you. Seems like some pretty esoteric stuff, yeah? You’ll be surprised how much this impacts your life.

    About Daniel dos Santos

    Daniel dos Santos is a Research Manager at Forescout Technologies, where he leads a vulnerability and threat research team. He also collaborates on the research and development of innovative features for network security monitoring.

    Daniel holds a PhD in computer science from the University of Trento, Italy, and has published over 30 journal and conference papers on cybersecurity. He has experience in software development, security testing, and research

    About Stanislav Dashevskyi

    Stanislav Dashevskyi is a Sr. Security Researcher at Forescout Research Labs. His main research interests are network and software security. He is usually happiest doing vulnerability research.

    Stan earned his Master's degree in Automation and Control Systems from the National Mining University of Ukraine, and his Ph.D. from the International Doctorate School in Information and Communication Technologies at the University of Trento

    About Anil Mahale

    Anil Mahale is a Software Engineering Manager at Forescout Technologies. He has over 10 years in the cybersecurity industry both on the product development and engineering side as well as threat and vulnerability research.

    Anil earned his Masters in Computer Science at the University of Texas at Dallas and his Bachelors in Electronics and Communications Engineering at Visvesvaraya Technological University

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away.

    -- Antoine de Saint-Exupéry; French writer, poet, aristocrat, journalist and pioneering aviator

    Me with nothing left to lose, plotting my big revenge in the spotlight. Give me violent revenge fantasies as a coping mechanism

    -- Chuck Palahniuk; author

    We’ve been looking for the enemy for some time now. We’ve finally found him. We’re surrounded. That simplifies things

    -- Chesty Puller, US Marines

    Matt Stephenson welcomes Ampere Industrial Security CEO Patrick Miller and Forescout Principal OT Strategist in for a chat about what is left to hack in the world of Critical Infrastructure. Because Critical Infrastructure seems to be a term that evolves every day, we run all over the place talking about what is vulnerable and why… what is safe and how to protect everything in between. And just to make sure you know we are authentic… Proctor was broadcasting from the floor of a manufacturing facility in full OSHA required protective gear (literally a hard hat, goggles and a day-glo vest)

    About Patrick Miller

    Patrick Miller (@patrickcmiller) shares over 35 years of IT/OT experience through his consulting services as an independent security and regulatory advisor for the Critical Infrastructure and Key Resource sectors. He is currently the CEO of Ampere Industrial Security, an industrial security consultancy based in Portland, OR USA. Patrick is also the founder, president emeritus and currently serves on the board of directors for the Energy Sector Security Consortium, Inc, nonprofit organization in Portland, OR as well as the US Coordinator for the Industrial Cybersecurity Center, based in Spain.

    Patrick is currently an instructor for the SANS ICS456 training on the NERC CIP standards.

    About Brian Proctor

    Brian Proctor (@brianproctor67) is the Principal OT Strategist at Forescout. He spent the majority of his previous professional life as an ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In joined an ICS security startup which was then acquired by Forescout Technologies. Brian jumped to the vendor side to promote the benefits ICS/SCADA/DCS threat detection, network security monitoring, and visualization capabilities can bring critical infrastructure asset owners. He is passionate about helping the ICS security community in any way possible and trying to make a difference for the greater good of our industry and country.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • Coolness is an aesthetic of attitude, behavior, comportment, appearance and style which is generally admired. Because of the varied and changing connotations of cool, as well as its subjective nature, the word has no single meaning. It has associations of composure and self-control and often is used as an expression of admiration or approval. Although commonly regarded as slang, it is widely used among disparate social groups and has endured in usage for generations.

    -- Wikipedia

    On today’s No Name Security Podcast, Matt Stephenson welcomes 3 people doing very cool things in a very cool industry… and… they happen to be to very cool people. Kurtis Minder is the co-founder and CEO at GroupSense, Tom Pace is the co-founder and CEO at NetRise and Scott Scheferman is the Chief Strategist at Eclypsium. They are each legendary incident response types who were at Black Hat for a multitude of reasons. Why were they there…? Stick around and find out!

    About Kurtis Minder

    Kurtis Minder (@kurtisminder) is the founder of GroupSense, a threat intelligence company. He leads a team of analysts and technologists providing custom cybersecurity intelligence to brands around the globe. The company’s analysts conduct cyber research and reconnaissance and map the threats to client risk profiles. He arrived at GroupSense after more than 20 years in role-spanning operations, design and business development at companies such as Mirage Networks (acquired by Trustwave), Caymas Systems (acquired by Citrix) and Fortinet (IPO).

    About Tom Pace

    Tom Pace (@TommyPastry) is the co-founder and CEO of NetRise, an automated, cloud-based platform that provides comprehensive insight into the risks present in a firmware image.

    Prior to founding NetRise, Tom spent 16 years working in security across multiple roles and disciplines. From serving in the United States Marine Corps, being responsible for ICS security within the Department of Energy and most recently serving as Global Vice President for Cylance, he has been a leader and innovator within cybersecurity. Tom has also responded to hundreds of security incidents globally and shared his experience at multiple security conferences such as RSA and Black Hat.

    About Scott Scheferman

    Scott Scheferman (@transhackerism) is the founder of Armanda Intelligence, LLC, with a mission of providing CxO/board advisement, strategy and threat intelligence. He is also Principal Strategist for Eclypsium, Inc.

    Scott keeps a hyper-current beat on the threat landscape and how it continues to fundamentally change business and mission cyber risk dynamics. Battle-hardened from years of red-teaming, incident response and cyber consulting, as well as having served as the technical lead and final security risk determination for the Navy’s Certification Authority (thousands of systems per year, with over 800 validators and 30 risk analysts feeding these risk determinations), Scott draws his perspective from significant real-world high-stakes (multi-billion dollar programs and Fortune 10 enterprise) experience.

    If you want the truth about what is happening in the world of cybersecurity, Scott is a voice you want to be listening to. If you can’t handle the truth… he may not be your guy… but that doesn’t mean he won’t keep telling it.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • “In the best conversations, you don't even remember what you talked about, only how it felt. It felt like we were in some place your body can't visit, some place with no ceiling and no walls and no floor and no instruments”
    ― John Green, Turtles All the Way Down

    For Episode Two of our Black Hat coverage, we sat down for a chat with two Founders to see what their experience of Black Hat 2021 looked like. This was a raw, real conversation… no edits… no podcast host questions… just an ear into the types of conversations that we have missed out on over the past 19 months.

    Today’s No Name Security Podcast sees Matt Stephenson joined by People By Mimi founder Mimi Gross and Cyvatar Co-Founder and CEO Corey White having a chat about all that is going on that week. We dig into what Cyvatar is doing to change the cybersecurity industry and how People By Mimi is changing the cybersecurity recruiting game with their approach to uniting people and companies by considering that releationship from a completely different POV. Think they don’t have anything in common? Think again… check it out!

    About Mimi Gross

    Mimi Gross (@MimiGross13) is the Founder and CEO of People by Mimi.

    About Corey White

    Corey White is the Chief Executive and Experience Officer at Cyvatar.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • Elijah Snow: It's a strange world

    Jakita Wagner: Let's keep it that way"

    -- Planetary: Warren Ellis & John Cassaday

    Black Hat 2021 was unlike any other previous edition and likely will be unlike any that follow. The rise of the Delta Variant of COVID-19 put the world back on edge after we had been slowly creeping toward something that felt like normalcy. When the show was announced, the cybersecurity industry rejoiced as this meant it was time to really get back to how we had been doing things… that meant Black Hat and DEFCON.

    Delta decided to throw us a curve and as a result, many companies, SMEs and potential attendees made the informed decision to skip this year’s show out of justifiable concerns about the repurcussions of their attendance.

    Some of us made the informed decision to take the risk, do the needful and attend Black Hat 2021 in person. It was hot. Like… for real hot… one day was 119F. However, we would not be deterred from getting out there and squeezing the Black Hat fruit for all the juice we could get. For sure, it was smaller than usual. Far fewer vendors, far fewer in-person sessions, far fewer attendees… and while they aren’t nearly as relevant… the parties and events still carried on, albeit in smaller and COVID-responsible fashion.

    There were some great things that came out of attending Black Hat in person. In no way does this cast aspersions upon those who chose not to attend for whatever reason. If you could not be there, we worked to bring the kinds of conversations that we have all been a part of or overheard in previous shows. We’re going to get back to it. And our industry will be better and stronger for the lessons we have learned over the past 19 months.

    For Episode One of our Black Hat coverage, we spoke with a range of cybersecurity professionals to get they takes on a myriad of topics.

    Scott Scheferman: Chief Strategist at Eclypsium

    Mike Bova: Enterprise Account Executive at Acronis

    Cameron Zink: Manager of Technology Infrastructure at Campbell Global

    Shaun Walsh: Vice President Product Marketing at SecurityScorecard
    Mackenzie Kyle: Head of Product and Rohith Kondeti: Forward Deployed Engineer; both at Anvilogic

    This week’s No Name Security Podcast is a mixtape of interviews Matt Stephenson conducted live on the show floor at Black Hat 2021. We run the gamut from hardcore security for firmware, to personnel management for first-time managers to the role of backup/recovery in a security posture to the evolution of SOC analysts out into the world of product development and customer facing engineering. There was still a LOT of action at Black Hat 2021, even if it was radically different from previous years… dig it!

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • -- Calvin and Hobbes courtesy of Bill Waterson

    None of us wants to be judged by our worst act on our worst day, and we consistently judge Burr for that. He was not a perfect man, but he's not a villain. He's a dude, just a guy.

    -- Leslie Odom, Jr.

    What if the worst day of your life ended up being just another Zoom meeting on someone else’s calendar? What if that day ended up being a part of a data breach due to a cyberattack from someone half a world away who didn’t know or care anything about you or the impact it would have on your life and the lives of those around you? How important are the people who are protecting the mechanisms of judicial branch of government? It may not be something that we cared about when everything worked the way we were used to… but when anyone with a good internet connection and a a few hacking tools can become part of the justice system… things get a bit more complicated.

    On this week’s No Name Security podcast Matt Stephenson welcomes New Jersey Courts CISO Sajed Naseem for a chat about what it takes to secure an operation that affects the daily lives of over 10,000 employees, 100,000+ attorneys, police officers and government officials… and, not for nothin’… the entire population of the state of New Jersey. Think a CISO’s job is tough? How about being the CISO who is protecting the data of an entire state… while being a Knicks fan.

    About Sajed Naseem

    Sajed Naseem is the Chief Information Security Officer of New Jersey Courts. Saj has over 20 years of experience with information security and information technology. As the CISO of the New Jersey Courts, Naseem has focused on cybersecurity readiness and performance, information governance, and network security. He holds master degrees from St. John’s University and Columbia University. Saj is routinely a speaker at cybersecurity conferences across the country, Europe, and with the New Jersey Bar Association. He is also an Adjunct Professor at St. John’s University in information security since 2010 and a native of New York City. Saj is a Knicks fan and thinks that they may have actually turned the corner… but… he is also a realist, so he’s waiting to see what happens next.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • -- Photo credit: Huss Harden

    When you lived on the wrong side of the law, information, however vague or apparently meaningless, was everything. It gave you leverage. And leverage was power

    -- Top Dog; 2014, written by Dougie Brimson

    Ransomware is the biggest buzzword in the news right now, and rightfully so. You can’t turn on a network police procedural without someone getting extorted for $100,000 in Bitcoin. But are the news agencies getting the story completely accurate? Yes, the money is always a nice prize to take home, but there is a larger looming question out there… What are these ransomware attacks really all about?

    Matt Stephenson welcomes Eclypsium Chief Strategist Scott Scheferman to the No Name Security podcast for a long overdue discussion on the impact of ransomware on the overall approach of the cybersecurity industry and those who rely on us for defense, protection and prevention. After fighting the good fight together at Cylance, Scott finally joins Matt for a chat about all the bad things the bad guys are getting up to… the mistakes the good guys tend to make… and how we can fix them in order to protect those who really need it.

    About Scott Scheferman

    Scott Scheferman (@transhackerism) is the founder of Armanda Intelligence, LLC, with a mission of providing CxO/board advisement, strategy and threat intelligence. He is also Principal Strategist for Eclypsium, Inc.

    Scott keeps a hyper-current beat on the threat landscape and how it continues to fundamentally change business and mission cyber risk dynamics. Battle-hardened from years of red-teaming, incident response and cyber consulting, as well as having served as the technical lead and final security risk determination for the Navy’s Certification Authority (thousands of systems per year, with over 800 validators and 30 risk analysts feeding these risk determinations), Scott draws his perspective from significant real-world high-stakes (multi-billion dollar programs and Fortune 10 enterprise) experience.

    If you want the truth about what is happening in the world of cybersecurity, Scott is a voice you want to be listening to. If you can’t handle the truth… he may not be your guy… but that doesn’t mean he won’t keep telling it.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • “The bad guys know they are bad guys—they are trying to pretend to be businesspeople… as long as you pretend with them that this is just a normal business transaction, it goes better.”

    -- Kurtis Minder; Fortune, 01 June 2021

    If you have been reading about or watching news shows discussing ransomware, more than likely, you have seen Kurtis Minder. He has been nearly omnipresent across multiple platforms because his team at Groupsense has been putting in the work to help the victims of ransomware attacks negotiate with attackers in order to get their data back.

    Here’s the best part… we’re not talking about that. Not that it’s not important, but there is a lot more that Kurtis and his team have been up to. Kurtis has brought the knowledge on that specific topic to television, podcasts and many other mediums in order to spread the word.

    He has a lot more to say about the state of cybersecurity.

    That is what we are here to talk about. Okay… we do talk about ransomware negotiation a bit, BUT… we dig deep into so much more.

    Matt Stephenson welcomes Groupsense CEO and co-founder Kurtis Minder for a discussion about the Seven Dirty Words of Cybersecurity. Depending on your definition of a Dirty Word, this may be a cautionary or inspirational tale. Either way, Kurtis and his team are busting their asses to help secure the data, prevent attacks and… in the worst case scenario… help victims get their data back so they can continue to do their work. And he may be doing it while riding cross country on a motorcycle…

    About Kurtis Minder

    Kurtis Minder (@kurtisminder) is the founder of GroupSense, a threat intelligence company. He leads a team of analysts and technologists providing custom cybersecurity intelligence to brands around the globe. The company’s analysts conduct cyber research and reconnaissance and map the threats to client risk profiles. He arrived at GroupSense after more than 20 years in role-spanning operations, design and business development at companies such as Mirage Networks (acquired by Trustwave), Caymas Systems (acquired by Citrix) and Fortinet (IPO).

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • How at Risk Are Our Healthcare Networks?

    Civilian hospitals organized to give care to the wounded and sick, the infirm and maternity cases, may in no circumstances be the object of attack, but shall at all times be respected and protected by the Parties to the conflict.

    -- Geneva Conventions; Article 18, Section 3, Fourth Geneva Convention

    Even at humanity’s worst, we could reach agreements on the kind of behavior that was acceptable in times of war. Attacks on healthcare delivery organizations around the world are ramping and it appears that the attackers have little regard for the collateral damage ransomware attacks cause. How can the industry evolve to ensure that devices that are integral to keeping people alive are also protected from attackers

    Matt Stephenson welcomes CynergisTek Executive Vice President David Finn alongside Forescout Senior Director of Healthcare Tony Douglas for an in-depth discussion of what is happening in the world of securing Healthcare Delivery organizations. We talk about leveraging the native complexity of healthcare technology and what can be done to mitigate risk in order to protect the lives of patients as well as the data inside the networks.

    About David Finn

    David Finn (@DavidSFinn) is the Executive Vice President, External Affairs, Information Systems & Security at CynergisTek. He has been involved in leading the planning, management and control of enterprise-wide, mission-critical information technology and business processes for more than 30 years. He was Vice President, CIO and Privacy/Information Officer at Texas Children’s Hospital for nearly eight years. This unique experience in risk management and control objectives of technology (including audit, security, and privacy) allows him a distinctive perspective in the design and implementation of business applications and the processes that the technology must support. He is known for creatively engaging all types of audiences, conveying messages that even change-resistant users listen to and remember. David is a member of the Health Management Technology Editorial Advisory Board.

    True story… David presented Ray Charles with his 40th birthday cake. That is a thing that happened.

    About Tony Douglas

    Tony Douglas is the Senior Director of Healthcare at Forescout. He is an accomplished IT professional with over 19 years of experience, focused in the vertical markets, namely the healthcare industry. Tony operates as strategic partner with the Executive team, where he is passionate about the role of information technology and the possibilities it offers for improving the quality and efficiency of patient care.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

    In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • When the DarkSide hacking group attacked the Colonial Pipeline, they may have gotten a bit more than they bargained for. Colonial has acknowledged paying $4.4 million in ransom in order to bring their systems back online as quickly as possible. It was a decision they had to make quickly, but had to consider a myriad of variables in the process. Joseph Blount, Colonial CEO stated “I know that’s a highly controversial decision… I didn’t make it lightly. I will admit that I wasn’t comfortable seeing money go out the door to people like this… But it was the right thing to do for the country,”

    Pundits everywhere weighed in with thoughts about how long the pipeline could be down, the impact on pricing, shortages of petroleum products ranging from gas to heating fuel. Other questions bubbled up as well. How did the do it? Was it politically motivated? How easy would it be for the next attack?

    Over the last few days, we have seen some pretty remarkable blowback on DarkSide. Even their fellow bad guys don’t want to play with them any more.

    So… now what?

    Matt Stephenson welcomes Duke Energy Technology Manager David Lawrence alongside Forescout Principal OT Strategist Brian Proctor and Sr Systems Engineer Shawn Taylor for a lively chat about the attack on Colonial and the impact it may have on the worlds of critical infrastructure and operational technology. This isn’t just another academic discussion of security… we have a harmonica! Seriously… we do… check it out!

    About David Lawrence

    David Lawrence is the Tehchnology Manager of the Emerging Tchnology at Duke Energy. There he provides leadership on a portfolio of technologies for the Future Grid, including development of use cases and requirements, architectures and designs, and technology test plans. He works in defining and executing technology evaluations, and providing change management support. David is currently focused on Grid distributed autonomous functions, edge analytics, and security for distributed technologies. He has 38 years of experience in the energy industry. He has worked in research and development and IT management for electric metering, transformer, and switchgear product manufacturing. His roles included embedded systems and protocol development, engineering management, global engineering information systems, manufacturing execution and scheduling systems, product lifecycle management, and IT management.

    About Brian Proctor

    Brian Proctor (@brianproctor67) is the Principal OT Strategist at Forescout. He spent the majority of his previous professional life as an ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In joined an ICS security startup which was then acquired by Forescout Technologies. Brian jumped to the vendor side to promote the benefits ICS/SCADA/DCS threat detection, network security monitoring, and visualization capabilities can bring critical infrastructure asset owners. He is passionate about helping the ICS security community in any way possible and trying to make a difference for the greater good of our industry and country.

    About Shawn Taylor

    Shawn Taylor (@smtaylor12) is a Senior Systems Engineer at Forescout. He is an accomplished and well-respected Public Speaker and Systems Engineer. With a strong mix of technical acumen, architectural experience, and sales savvy Shawn is a trusted advisor the customers he's worked with over his 20-year career. His background includes Cybersecurity, Biometrics and Identity Management, IT Operations and Service Management and IT Asset Management.

    As a ForeScout Systems Engineer, Shawn expanded his technical knowledge into cybersecurity, while still leveraging his foundation of IT Operations and Service Management. He is responsible for integrating the ForeScout CounterACT solution with many of the industry-leading Cybersecurity products while in support of sales opportunities.

    Shawn has spoken at industry events around the country and too many online events to list. Additionally, Shawn helps to drive thought leadership around Forescout and continuous visibility being foundational to enterprise ITSM initiatives by authoring White Papers and blogs.

    About Matt Stephenson

    Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, as the host of the InSecurity I have been talking with experts about every corner of the cybersecurity landscape.

    In 10 years in the world of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    If you are listener to Insecurity, there’s great news! An all new show is coming bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • “I'm telling you a lie in a vicious effort that you will repeat my lie over and over until it becomes true”

    -- Lady Gaga

    “The point of modern propaganda isn't only to misinform or push an agenda. It is to exhaust your critical thinking, to annihilate truth.”

    -- Garry Kasparov

    In this week’s Very Special Episode, Matt Stephenson shares a LinkedIn LIVE event featuring Jamil Jaffer and Brandon Soroudi for a chat about the role cybersecurity has and must play in the ongoing battle against Disinformation, Misinformation and Propaganda. Are they the same? How do we know the difference? Where does social manipulation come into the conversation? That’s what we are about to find out…

    About Jamil Jaffer

    Jamil Jaffer (@jamil_n_jaffer) is the Founder and Executive Director of the National Security Institute, and an Assistant Professor of Law and Director of the National Security Law & Policy Program at the Antonin Scalia Law School at George Mason University. Jamil is also the Vice President for Strategy, Partnerships & Corporate Development at IronNet Cybersecurity, a technology products startup founded by Gen (ret.) Keith B. Alexander, the former Director of the National Security Agency and Founding Commander of U.S. Cyber Command. In addition, Jamil is an advisor to Beacon Global Strategies, a strategic advisory firm; 4iQ, a deep and dark web intelligence startup; Duco, a technology platform startup that connects corporations with geopolitical and international business experts; and Amber, a digital authentication and verification startup.

    Among other things, Jamil currently serves on the Board of Directors for the Greater Washington Board of Trade, the Board of Advisors for the Global Cyber Alliance, and the Advisory Board of the Foundation for the Defense of Democracies’ Center on Cyber and Tech Innovation, and is a member of the Center for a New American Security’s Artificial Intelligence and National Security Task Force and the CNAS Digital Freedom Forum. Jamil is also affiliated with Stanford University’s Center for International Security and Cooperation.

    Prior to his current positions, Jamil served on Capitol Hill in a variety of roles, including on the leadership team of the Senate Foreign Relations Committee and as a senior staff member of the House Intelligence Committee. Jamil also previously served in the Bush Administration in a number of positions, including on the leadership team of the Justice Department’s National Security Division and in the White House as an Associate Counsel to President George W. Bush. Jamil holds degrees with honors from UCLA, the University of Chicago Law School, and the United States Naval War College.

    About Brandon Sorouti

    Brandon Soroudi is an experienced security engineer, and system administrator with over 9 years of experience. He currently is a Consultant on BlackBerry’s ThreatZERO team. We’d tell you more if we could, but since he is an experienced security engineer, that’s all he would tell us. He did write the original post that inspired this talk… https://lnkd.in/gwG7N-v

    About Matt Stephenson

    Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts me in front of crowds, cameras, and microphones all over the world. I am the regular host of the InSecurity podcast and video series at events around the globe.

    I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    Can’t get enough of Insecurity? You can find us at Spotify, Apple, Amazon Music & Audible as well as ThreatVector, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • I believe that we should be teaching our kids, students and employees when and how to lie

    -- Maurice Schweitzer; professor, Wharton School at the University of Pennsylvania

    And, after all, what is a lie? 'Tis but
    The truth in masquerade.

    -- Lord Byron; Don Juan, Canto 11

    This week, Matt Stephenson welcomes Attivo Networks CTO Tony Cole to InSecurity for chat about the role deception techniques play in security. But that’s not all… we get into how the privatization of space will impact cybersecurity… where cybersecurity fits into Black Swan events like the Wall Street Bets brouhaha… even a bit of Pink Floyd works into the mix!

    About Tony Cole

    Tony Cole (@NoHackn) is a cyber expert with over thirty-five years of experience as a strategist, risk expert, advisor, and board member. Today, he is the CTO at Attivo Networks, the global leader in lateral movement attack detection and privilege escalation prevention, working to defend enterprises from the impact of cyber-attacks.

    Prior to joining Attivo Networks, Tony held executive positions at FireEye, McAfee and Symantec. He is retired from the U.S. Army, where he worked in intelligence, communications, and cryptography around the world including building out the Network Security Services at the Pentagon.

    Tony served previously on numerous boards and government committees including (ISC)² Board of Directors as Treasurer and Chair of Audit and Risk, the NASA Advisory Council under appointment by the NASA Administrator, and the FCC CSRIC (Communications Security, Reliability, and Interoperability Council). Today he serves on the Gula Tech Foundation Grant Advisory Board helping the Foundation give back to the community and drive a more diverse cyber workforce.

    In 2014, Tony received the Government Computer News Industry IT Executive of the Year award, and in 2015 he was inducted into the Wash 100 by Executive Mosaic as one of the most influential executives impacting Government. In 2018 he was awarded the Reboot Leadership Influencer Award by SC Media.

    About Matt Stephenson

    Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts me in front of crowds, cameras, and microphones all over the world. I am the regular host of the InSecurity podcast and video series at events around the globe.

    I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

    Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    Can’t get enough of Insecurity? You can find us at Spotify, Apple, Amazon Music & Audible as well as ThreatVector, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.

    -- James Comey

    I'm a hacker, but I'm the good kind of hackers. And I've never been a criminal.

    -- Mikko Hypponen

    What happens on InSecurity when Matt Stephenson sits down with Rob Willis, a top-flight ethical hacker, red-teamer and all around cybersecurity expert to talk about… comic books? You get a brand new comic universe created by hackers for hackers that it rooted in actual technology and hacking. The Paraneon Universe is as much cyber-fact as it is science fiction. When you get bored with the same capes, cowls and armor… come check out what the real future is going to look like in Paraneon… where you can’t punch your way out of everything.

    About Rob Willis

    Rob Willis (@rej_ex)’s entire life has been centered around comic books and tech. If he wasn't a cybersecurity professional, there is zero doubt that he would be working in comics full-time.

    To date Rob has self-funded the creation of these titles and other Paraneon assets and will continue to create and expand the Universe with exciting characters and storylines pressure.

    By day he is an InfoSec professional. Rob runs consulting at 1337 Inc among other things. He is a Red team, Blue team, and purple team professional. He isnt just breaking into things for clients, he’s also building and running security programs.

    He is also a part of the hacking collective Sakura Samurai. You may not know them yet, but you’ve likely read about their work already.

    Rob is featured in the popular Tribe of Hackers series from Wiley. He has appeared in the original Tribe of Hackers and new book Tribe of Hackers: Blue Team.

    In a Previous life, Rob was a Researcher at the Breach and Attack Simulation Pioneer ThreatCare.

    He has worked places he can’t disclose, but which I have personally verified… It’s legitimate, as crazy as that sounds. His most mind numbing accomplishments cannot be talked about publicly, but if you become his friend he will likely show you some insane stuff -- as long as it doesnt compromise national security.

    About Paraneon

    Paraneon (@paraneonU) develops and publishes stories from a cyberpunk future. For hackers, by hackers.

    The Paraneon Universe is comprised of technocentric cities, underground worker colonies, and apocalyptic 'drylands'. All factories and production has been moved to Mars due to pollution, and there's more Androids on Mars than Humans.

    The Hive Network

    The Hive is a massive incubator-like structure that humans are placed inside of while their minds integrate with a virtual reality world. Joining the Hive is voluntary, and requires each member to purchase their spot within it. Those in the Hive decided to be added to it, to ‘retire’ after working many years as a lower-class member of society, where most of their time was spent training — then working — in a specialized trade associated with the underground worker colony they were born into.

    The world is advanced with technocentric cities, but living in a city requires decades of saving for a colony member who hopes to purchase citizenship in one. The class system dictates the resources and quality of life more than any period throughout history, and aside from the tribal peoples of the desolate drylands, colony members are the lowest part of society.

    Why would someone choose to be a member of the Hive? It’s not a hard decision for someone to live the remainder of their life in a world where they can have and be whatever they choose.

    It may not be real, but over time it becomes difficult to imagine virtual reality as anything but reality. For this reason many refer to the Hive as the ‘great equalizer’, convinced that their lives in reality are nothing but a painful stepping stone on the path to their digital salvation.

    Portals

    Portals takes place in the drylands. The 'drylanders' do not take kindly to tech or strangers. The first story arc introduces an undercover police officer from one of the cities who enters the drylands in an attempt to blend in, all while searching for 'dangerous' fugitives.

    Neon Skyline

    Sudo is a talented hacker who is placed in a research program surrounding bio-hacking on Mars. He uncovers a massive conspiracy when accidentally finding that many androids, billed as 'next-gen AI' are actually cyborgs, implanted with human brain tissue. Can he sound the alarm and 'free' the cyborgs before he gets killed?

    About Matt Stephenson

    Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts me in front of crowds, cameras, and microphones all over the world. I am the regular host of the InSecurity podcast and video series at events around the globe.

    I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty they weren't there for us, but you never know...

    Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    Can’t get enough of Insecurity? You can find us at Spotify, Apple, Amazon Music & Audible as well as ThreatVector, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • “You got ninety percent of the American public out there with little or no net worth. I create nothing. I own. We make the rules, pal. The news, war, peace, famine, upheaval, the price per paper clip. We pick that rabbit out of the hat while everybody sits out there wondering how the hell we did it. Now you're not naive enough to think we're living in a democracy, are you buddy? It's the free market. And you're a part of it. You've got that killer instinct. Stick around pal, I've still got a lot to teach you”

    -- Gordon Gekko; Wall Street, Oliver Stone, 1987

    We’re stepping outside the normal conventions of cybersecurity for this one. Matt Stephenson welcomes in Advent Technologies President and CFO Bill Hunter to discuss the recent madness in the stock market. When Redditors started flexing their ability to move markets with tools like rocket emojis and a lexicon that brought “tendies” and “diamond hands” to the common language… was that a Hack? Take a listen and decide for your self.

    About William Hunter

    William Hunter is Chief Financial Officer & Director at Advent Technologies Holdings, Inc.

    He is on the Board of Directors at American Battery Metals Corp. (Nevada), AMCI Euro-Holdings BV, Ridley Terminals, Inc. and Advent Technologies Holdings, Inc. Mr. Hunter was previously employed as a President, CEO, CFO & Director by AMCI Acquisition Corp., a Managing Director by Dahlman Rose & Co. LLC, a Vice President by BMO Nesbitt Burns, Inc. (US), an Associate by NatWest Markets Equity Corp., a Financial Analyst by KPMG LLP, a Principal by Jefferies LLC, and a Principal by TD Securities (USA) LLC.

    He also served on the board at Nomura Securities International, Inc. and Teneo Capital LLC.

    He received his undergraduate degree from DePaul University, an MBA from Kellstadt Graduate School of Business and an MBA from DePaul University

    About Matt Stephenson

    Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts me in front of crowds, cameras, and microphones all over the world. I am the regular host of the InSecurity podcast and video series at events around the globe.

    I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty they weren't there for us, but you never know...

    Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    Can’t get enough of Insecurity? You can find us at Spotify, Apple, Amazon Music & Audible as well as ThreatVector, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • Securing embedded systems presents unique and complex challenges when it comes to organizing and assessing software assets during assurance activities. The closed source nature of the supply chain and volume of differing components has made this a onerous and costly activity

    -- IIOT World

    On this Very Special Episode of InSecurity, Matt Stephenson spoke with BlackBerry CTO Adam Boulton and IoT Security Services Lead Ian Todd about protecting embedded systems and how that applies to the automotive world and national public infrastructure. Do you know how to protect embedded systems? Do you know what they are? Do you know what that has to do with your water supply? These folks do… dig it

    About Adam Boulton

    Adam Boulton is a highly experienced and qualified software security professional, with over 15 years’ experience within security engineering. Having successfully accelerated through career progression, Adam is employed as the Chief Technology Officer for BlackBerry Technology Solutions

    About Ian Todd

    Ian Todd leads the BlackBerry IoT security services practice which has developed a set of security solutions for embedded systems across industries such as automotive, industrial, medical, defence and aerospace, transportation and robotics globally.

    About Matt Stephenson

    Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts me in front of crowds, cameras, and microphones all over the world. I am the regular host of the InSecurity podcast and video series at events around the globe.

    I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty they weren't there for us, but you never know...

    Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    Can’t get enough of Insecurity? You can find us at Spotify, Apple, Amazon Music & Audible as well as ThreatVector, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!

  • Together we stand, divided we fall
    Come on now people,

    let's get on the ball and work together
    Come on, come on let's work together, now now people
    Because together we will stand,

    every boy every girl and a man

    -- Let’s Work Together, Canned Heat

    A truly rollicking episode of InSecurity finds Matt Stephenson trying to keep up with National Security Institute Director Jamil Jaffer as we run all over the cybersecurity world. The private sector isn’t charged with defending their skies and shores, should they be responsible for defending their data and users? What can we learn from the US Capital Riots? Is there value in an offensive cybersecurity posture? Why would anyone play Goat Simulator? Yeah, we talk about that and more. Dig it…

    About Jamil Jaffer


    Jamil Jaffer (@jamil_n_jaffer) is the Founder and Executive Director of the National Security Institute, and an Assistant Professor of Law and Director of the National Security Law & Policy Program at the Antonin Scalia Law School at George Mason University. Jamil is also the Vice President for Strategy, Partnerships & Corporate Development at IronNet Cybersecurity, a technology products startup founded by Gen (ret.) Keith B. Alexander, the former Director of the National Security Agency and Founding Commander of U.S. Cyber Command. In addition, Jamil is an advisor to Beacon Global Strategies, a strategic advisory firm; 4iQ, a deep and dark web intelligence startup; Duco, a technology platform startup that connects corporations with geopolitical and international business experts; and Amber, a digital authentication and verification startup.

    Among other things, Jamil currently serves on the Board of Directors for the Greater Washington Board of Trade, the Board of Advisors for the Global Cyber Alliance, and the Advisory Board of the Foundation for the Defense of Democracies’ Center on Cyber and Tech Innovation, and is a member of the Center for a New American Security’s Artificial Intelligence and National Security Task Force and the CNAS Digital Freedom Forum. Jamil is also affiliated with Stanford University’s Center for International Security and Cooperation.

    Prior to his current positions, Jamil served on Capitol Hill in a variety of roles, including on the leadership team of the Senate Foreign Relations Committee and as a senior staff member of the House Intelligence Committee. Jamil also previously served in the Bush Administration in a number of positions, including on the leadership team of the Justice Department’s National Security Division and in the White House as an Associate Counsel to President George W. Bush. Jamil holds degrees with honors from UCLA, the University of Chicago Law School, and the United States Naval War College.

    About Matt Stephenson

    Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts me in front of crowds, cameras, and microphones all over the world. I am the regular host of the InSecurity podcast and video series at events around the globe.

    I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty they weren't there for us, but you never know...

    Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

    InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

    Can’t get enough of Insecurity? You can find us at Spotify, Apple, Amazon Music & Audible as well as ThreatVector, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

    Make sure you Subscribe, Rate and Review!