Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to situations that matter. Come and enjoy the witty and humorous dialog backed by many years of cyber experience.
Vulnerability research and inevitable conflicts with software companies has been a part of hacker culture for at least three decades. In this podcast, we’re joined by Casey John Ellis, co-founder of Bugcrowd and of Disclose.io where we discuss the evolution towards bug bounty programs, what this all means for the world of AI vulnerabilities, and how hackers are making the world more secure. We may sprinkle in some light economics a...
We often think of DDoS as something that is only affecting gamers and is launched by misbehaving youth, but the landscape of people who leverage DDoS runs the gamut all the way up to nation-state actors. Join us as we talk with Richard Hummel of NETSCOUT as we discuss the evolving landscape of DDoS attacks and what's coming next over the horizon.
One of the great things about cybersecurity is that there are always new problems to research and try to solve. Join us as we talk with Jaime Blasco on his journey towards trying to solve security challenges in software as a service application.
Often when we think of cyber security, we think of financial fraud, ransomware, or data theft. In recent years we've seen an increase in malware targeting industrial control systems such as sewage treatment plants, the power grid, and utilities necessary for basic human life. We are joined by Jimmy Wylie of Dragos to discuss the trends and what he sees in this world, and how the problem is getting worse.
Everything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCarthy from Open Source Context joins us to talk about how he sees threat actors changing...
In this episode, we are joined by Dr. Anton Chuvakin, Office of the CISO, at Google Cloud Security, where we discuss the evolution of SIEM from on-premise to the Cloud, and to autonomic security operations. Can our industry innovate to move beyond current SIEM limitations to reach “ops nirvana” to a data analytics-fueled security operations?
We are joined this week by John Giglio, director of cloud security for SADA, with tales from the trenches on how automation has helped threat hunting and threat analytics to improve the lives of security organizations.
For this week’s interview, Netenrich’s John Bambenek chats with Merys Raymer, Partner Engineering at Google Cloud Security. Merys shares her personal journey as a former threat and security analyst, fighting fires in the SOC trenches. She provides real world insights on the need for advanced SIEMs, data analytics, and automation to optimize security operations.
Muddy Waters is an active and prolific APT threat using some unique tactics and malware to actual exfiltrate data. We are joined by Allison Wikoff, who is an expert in this threat actor to discuss what techniques they are using and what it means for enterprise defenses.
In this episode, we’re joined by Juan Andres Guerrero-Saade discussing how language learning models can be used by security analysts, and those teaching, the next generation of cyber security professionals to aid them, and their work.
John Bambenek covers the rise of domain clustering of malicious phishing domains that security analysts need to care about. He is joined by cybersecurity expert Ed Gibbs, Field CTO at Whois API, who shares enlightening techniques on how to find, investigate and resolve these types of daily attacks.
John Bambenek talks with security expert Ronnie Tokazowski, Principal Threat Advisor at Cofense, on the rise of behavioral-led attacks impacting organizations. Recent exposures involving romance scams and pig butchering techniques target people and their emotions involving business email compromises. Ronnie delves into the methods organizations can detect and prevent issues from escalating. It centers on finding the gaps that tradi...
Host John Bambenek, threat researcher at Netenrich, interviews leading security experts and threat researchers on the latest cyberattacks and compromises impacting businesses today. Listeners will gain insights on proven techniques and approaches to advanced threat hunting, detection, and response. Listen in to the witty and humorous conversations backed by decades of security and SOC expertise.
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.
For more than 30 years The River Cafe in London, has been the home-from-home of artists, architects, designers, actors, collectors, writers, activists, and politicians. Michael Caine, Glenn Close, JJ Abrams, Steve McQueen, Victoria and David Beckham, and Lily Allen, are just some of the people who love to call The River Cafe home. On River Cafe Table 4, Rogers sits down with her customers—who have become friends—to talk about food memories. Table 4 explores how food impacts every aspect of our lives. “Foods is politics, food is cultural, food is how you express love, food is about your heritage, it defines who you and who you want to be,” says Rogers. Each week, Rogers invites her guest to reminisce about family suppers and first dates, what they cook, how they eat when performing, the restaurants they choose, and what food they seek when they need comfort. And to punctuate each episode of Table 4, guests such as Ralph Fiennes, Emily Blunt, and Alfonso Cuarón, read their favourite recipe from one of the best-selling River Cafe cookbooks. Table 4 itself, is situated near The River Cafe’s open kitchen, close to the bright pink wood-fired oven and next to the glossy yellow pass, where Ruthie oversees the restaurant. You are invited to take a seat at this intimate table and join the conversation. For more information, recipes, and ingredients, go to https://shoptherivercafe.co.uk/ Web: https://rivercafe.co.uk/ Instagram: www.instagram.com/therivercafelondon/ Facebook: https://en-gb.facebook.com/therivercafelondon/ For more podcasts from iHeartRadio, visit the iheartradio app, apple podcasts, or wherever you listen to your favorite shows. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com
Listen to 'The Bobby Bones Show' by downloading the daily full replay.
The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!