×
Mike Mimoso public
[search 0]
×
Best Mike Mimoso podcasts we could find (updated February 2020)
Best Mike Mimoso podcasts we could find
Updated February 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Loading …
show series
 
The RSA 2020 conference kicks off next week in San Francisco, this year with a theme looking at the "human element" of cybersecurity. As they prepare to cover the show, Threatpost editors Lindsey O'Donnell-Welch, Tom Spring and Tara Seals break down the biggest news, stories and trends that they expect to hear about at RSA 2020 this year - from tre…
 
Threatpost editors Tara Seals and Lindsey O'Donnell-Welch break down the top stories for this week, ended Feb. 14, including: Recent phishing scams - including ones with a romance hook - continue to trick victims, showing that phishing tactics still work in stealing millions from individuals, corporations, and even government agencies. Emotet has a…
 
Bug bounty programs continue to increase in popularity – but that popularity has its downsides. Since the launch of the Hack the Pentagon program in 2016, bug bounty programs have quickly grown in popularity. However, as more programs are created, some companies are forgetting the real reason behind bug bounties. That is, instead of making their sy…
 
Researchers on Wednesday disclosed five critical vulnerabilities in Cisco Discovery Protocol (CDP), the Cisco Proprietary Layer 2 network protocol that is used to discover information about locally attached Cisco equipment. Threatpost talked to Ben Seri, VP of Research at Armis, who discovered the flaws, about the CDPwn flaws, their impact, and why…
 
Oded Vanunu, head of products vulnerability research at Check Point research, has seen his share of WhatsApp vulnerabilities – the researcher at Black Hat 2019 demoed several flaws in the messaging platform could be used to manipulate chats, for instance. However, Vanunu told Threatpost at CPX 360, Check Point's annual security conference that take…
 
This week's news wrap podcast breaks down the biggest Threatpost security stories of the week, including: Various proof-of-concept exploits being released for serious vulnerabilities this week - including for the recently-patched crypto-spoofing vulnerability found by the National Security Agency and reported to Microsoft. Multiple cable modems use…
 
A major Microsoft crypto-spoofing bug impacting Windows 10 made waves this Patch Tuesday, particularly as the flaw was found and reported by the U.S. National Security Agency (NSA). Microsoft's January Patch Tuesday security bulletin disclosed the "important"-severity vulnerability, which could allow an attacker to spoof a code-signing certificate,…
 
The California Consumer Privacy Act is being touted as one of the strongest privacy regulations in the U.S. enacted so far. However, though the CCPA was adopted on January 1, 2020, the act still has several loose ends and privacy loopholes that need to be fleshed out. At a high level ,the CCPA mandates strict requirements for companies to notify us…
 
It's New Year's Eve, the perfect day to reflect on the year's best episodes of the Collective Intelligence Podcast. It also happens to be the 50th episode, so thanks for subscribing, listening, and sharing the podcast so far. Enjoy the recap. Flashpoint's Allison Nixon on SIM swap fraud (1:04) Troy Hunt on changing behaviors around password reuse (…
 
In 2019, diversity in the cybersecurity was thrust to the forefront with recognition from both vendors and experts. The tech industry is facing challenges around diversity in general, but women are particularly underrepresented. And with an estimated 3.5 million jobs are expected to remain unfilledby 2021, infosec is certainly a lucrative space for…
 
In a new report, "Holiday Season Cyber Heists" released Thursday morning, Carbon Black said that cybercrime activity tracked during 2019 is already setting the holiday shopping season for an upward trajectory in malware and ransomware attacks. From constantly-evolving malware like Kryptik, to island hopping attacks, holiday shoppers are the ones wh…
 
In this week's Threatpost news wrap, editors Tara Seals and Lindsey O'Donnell break down the top infosec news, including: Authorities cracked down on cybercrime group Evil Corp. with sanctions and charges against its leader, known for his lavish lifestyle. The developers behind a commodity remote-access tool (RAT) that allows full control of a vict…
 
The "identifiers" behind data collection - the ways that companies identify consumers who they're collecting the data from - has extended far beyond cookies prevalent in web browsers, privacy experts warn. Now, consumers and regulators struggling to understand who is collecting data, how that data is being shared and how it's being stored, must als…
 
Black Friday and Cyber Monday-related scams are nothing new - but researchers warn that this year, they are seeing an uptick in scams using more sophisticated methods to lure users to hand over their payment data. A research report released Tuesday by ZeroFOX uncovered some of the threats that attackers are using to tap into the Black Friday shoppi…
 
Threatpost news editors break down the top stories of the week, including: The Coalition Against Stalkerware launched this week, with the aim of offering a centralized location for helping victims of stalkerware, as well as defining what stalkerware is in the first place. Five U.S. Senators are demanding that Amazondisclose how it's securing Ring h…
 
In this sponsored podcast, Threatpost podcast host Cody Hackett and Sam McLane, chief technical services officer with Arctic Wolf, discuss important considerations when building a multi-layered cybersecurity strategy and best practices when evaluating security vendors in a crowded landscape.By Mike Mimoso, Chris Brook
 
Threatpost editors break down the top news stories for the week ended Nov. 8. The top stories of the week include: Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise - a Threatpost feature looks at why. The DoJ charged two former Twitter employeesfor alle…
 
Emotet, the infamous banking trojan that mysteriously disappeared over the summer, returned last monthdropping other banking trojans, information stealers, email harvesters, self-propagation mechanisms and ransomware. But since the malware returned from its hiatus, there was no clear novel technique or tactic that researchers observed - until event…
 
Flashpoint's Ian Gray and Max Aliapoulios discuss trends happening inside illicit underground online markets where everything from credit cards and personal information, to drugs and other physical goods, are sold. Ian and Max help characterize these markets, the impact of law enforcement and self-imposed shutdowns on the overall landscape, the eco…
 
Threatpost editors Tara Seals and Lindsey O'Donnell break down the top security news of this week, from data breaches to Advanced Persistent Threat (APT) activity. Top stories include: A Microsoft alert that APT group Fancy Bearhas targeted anti-doping authorities and sporting organizations around the world as the world begins to gear up for the To…
 
Loading …
Google login Twitter login Classic login