• Securing the Skies: Aerospace Cybersecurity with David Brumley
    Nov 14 2024
    In this episode, Greg Otto chats with David Brumley, an offensive cybersecurity professor at Carnegie Mellon and CEO of Mayhem Security, as he is collaborating with the FAA and airplane manufacturers to tackle critical software security challenges in the aerospace industry. David delves into the most pressing cybersecurity threats facing aircraft today, examines the types of software currently in use on airplanes, and highlights areas of concern within the broader aerospace sector. He also discusses potential strategies the FAA could employ to strengthen cybersecurity in aviation. Also in this episode: ThreatLocker co-founder and CEO Danny Jenkins joins SNG host Wyatt Kash in a sponsored podcast discussion on why zero trust and least privilege access are foundational to how critical infrastructure enterprises should secure their operations today. This segment was sponsored by ThreatLocker. Greg also chats with Tim Starks about the latest cybersecurity news related to the incoming Trump administration. LINK: https://cyberscoop.com/dhs-nominee-kristi-noem-cyber-grants-trump-admin/
    Show More Show Less
    36 mins
  • What will GenAI regulation look like in 2025?
    Nov 7 2024
    In the latest episode of Safe Mode, Greg Otto talked with Casey Bleeker, CEO of the generative AI security firm SurePath AI, about the future of AI regulation in the U.S. and how it might unfold compared to other countries in 2025. They explore whether AI oversight will differ from state to state, mirroring the current landscape of data privacy laws. Additionally, they discuss the challenges of formulating and passing a comprehensive national AI regulation. Greg also reviews a September piece by Tim Starks that looked at who would be in line to run the cybersecurity leadership of a forthcoming Trump administration. LINK: https://cyberscoop.com/trump-cybersecurity-second-term-white-house-cisa/
    Show More Show Less
    27 mins
  • Special CyberTalks Edition with National Cyber Director Harry Coker
    Nov 1 2024
    In case you didn't have the chance to attend CyberTalks, we have the keynote address from the event: National Cyber Director Harry Coker highlighted the White House's focus on strategy and policy to address internet routing vulnerabilities, particularly with the Border Gateway Protocol (BGP). Coker emphasized the importance of Resource Public Key Infrastructure (RPKI) for authenticating BGP routing information, acknowledging its slow adoption and implementation challenges, but reported progress with expectations for significant federal coverage by year's end. In our reporter chat, Greg Otto talks with Tim Starks about his story examining the legal barriers anti-spyware advocates are dealing with in a number of high-profile court cases aimed at bringing victims justice. LINK: https://cyberscoop.com/spyware-court-cases-nso-group-meta-whatsapp-apple/
    Show More Show Less
    31 mins
  • DomainTools’ Sean McNee on how China is watching the Russia-Ukraine conflict
    Oct 24 2024
    In this episode, we delve into the escalating cyber threat posed by China with guest Sean McNee, Head of Threat Research at DomainTools. Sean shares insights on how China is closely observing the ongoing cyberwar between Russia and Ukraine to strategize its potential moves concerning Taiwan. In our reporter chat, Greg Otto talks with Derek B. Johnson about the U.S. government’s attempt to rein in data brokers and bulk data collection by “countries of concern.” LINK: https://cyberscoop.com/justice-department-data-broker-regulation-china-russia-iran/
    Show More Show Less
    31 mins
  • ReversingLabs’ Saša Zdjelar on the ‘black box’ of commercial software
    Oct 17 2024
    This episode of Safe Mode explores the critical issue of software supply chain security with Saša Zdjelar, ReversingLabs' chief trust officer. Discover why the hidden components of commercial off-the-shelf software pose significant risks to enterprises and how current security practices fall short. We'll discuss the explosive growth in breaches due to third-party software, the limited utility of Software Bill of Materials (SBOMs), and the need for more comprehensive security assessments. Saša will share insights on how to effectively "open the black box," enabling companies to identify threats and ensure compliance before deploying applications. In our reporter chat, CyberScoop senior reporter Tim Starks talks with Greg Otto about the indictments brought against Anonymous Sudan. LINK: https://cyberscoop.com/alleged-anonymous-sudan-leaders-charged-prolific-gangs-tool-disabled/
    Show More Show Less
    30 mins
  • Cal-Berkeley’s Elijah Baucom on how students are helping nonprofits avoid spyware
    Oct 10 2024
    How can small nonprofits and civic organizations defend themselves against some of the most insidious malware on the planet? By reaching out to Elijah Baucom. The director of Citizen Clinic at UC Berkeley, Baucom runs a public-interest cybersecurity program that trains students to support organizations in defending against cyber threats. A digital security expert and educator, Baucom talks with Greg Otto about making cybersecurity resources accessible to all students and vulnerable groups, drawing on his extensive background in management consulting and network engineering. In our reporter chat, Greg talks with Derek Johnson about the work OpenAI is doing to prevent malicious actors from user generative AI in their schemes. LINK: https://cyberscoop.com/openai-threat-report-foreign-influence-generative-ai/
    Show More Show Less
    29 mins
  • Trellix’s John Fokker on the latest cybercriminal snapshot
    Sep 26 2024
    CyberScoop Editor-in-Chief Greg Otto was out at Mandiant's mWISE conference last week, and talked with Trellix’s head of threat intelligence, John Fokker, about a host of different subjects. In the first portion of the interview, Greg and John discuss how the Ransomware-as-a-Service landscape has changed in the past year, and how threat actors have adjusted to the changes the industry has made in order to stop their schemes. In the second half, Greg and John talk about threat actors’ use of AI, which is in its experimentation phrase (like everyone else). In the reporter chat, Greg talks with AJ Vicens about research that shows how the walls are closing in on a suspect responsible for breaches tied to Snowflake. LINK: https://cyberscoop.com/snowflake-hacker-judische-labscon-2024/
    Show More Show Less
    40 mins