Podcast by Safe Mode Podcast
…
continue reading
1
Securing the Skies: Aerospace Cybersecurity with David Brumley
35:46
35:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:46
In this episode, Greg Otto chats with David Brumley, an offensive cybersecurity professor at Carnegie Mellon and CEO of Mayhem Security, as he is collaborating with the FAA and airplane manufacturers to tackle critical software security challenges in the aerospace industry. David delves into the most pressing cybersecurity threats facing aircraft t…
…
continue reading
1
What will GenAI regulation look like in 2025?
27:00
27:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:00
In the latest episode of Safe Mode, Greg Otto talked with Casey Bleeker, CEO of the generative AI security firm SurePath AI, about the future of AI regulation in the U.S. and how it might unfold compared to other countries in 2025. They explore whether AI oversight will differ from state to state, mirroring the current landscape of data privacy law…
…
continue reading
1
Special CyberTalks Edition with National Cyber Director Harry Coker
31:26
31:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:26
In case you didn't have the chance to attend CyberTalks, we have the keynote address from the event: National Cyber Director Harry Coker highlighted the White House's focus on strategy and policy to address internet routing vulnerabilities, particularly with the Border Gateway Protocol (BGP). Coker emphasized the importance of Resource Public Key I…
…
continue reading
1
DomainTools’ Sean McNee on how China is watching the Russia-Ukraine conflict
31:03
31:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:03
In this episode, we delve into the escalating cyber threat posed by China with guest Sean McNee, Head of Threat Research at DomainTools. Sean shares insights on how China is closely observing the ongoing cyberwar between Russia and Ukraine to strategize its potential moves concerning Taiwan. In our reporter chat, Greg Otto talks with Derek B. Johns…
…
continue reading
1
ReversingLabs’ Saša Zdjelar on the ‘black box’ of commercial software
29:41
29:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:41
This episode of Safe Mode explores the critical issue of software supply chain security with Saša Zdjelar, ReversingLabs' chief trust officer. Discover why the hidden components of commercial off-the-shelf software pose significant risks to enterprises and how current security practices fall short. We'll discuss the explosive growth in breaches due…
…
continue reading
1
Cal-Berkeley’s Elijah Baucom on how students are helping nonprofits avoid spyware
28:54
28:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:54
How can small nonprofits and civic organizations defend themselves against some of the most insidious malware on the planet? By reaching out to Elijah Baucom. The director of Citizen Clinic at UC Berkeley, Baucom runs a public-interest cybersecurity program that trains students to support organizations in defending against cyber threats. A digital …
…
continue reading
1
Mandiant’s Michael Barnhart on the North Korean IT worker crisis
38:22
38:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:22
Since 2022, Mandiant has tracked North Korean IT workers who, posing as non-North Koreans, secure employment in various industries to fund DPRK's weapons programs, often engaging in cyber intrusions with the help of foreign facilitators. In this episode, CyberScoop Editor-in-Chief Greg Otto talks with Mandiant’s Michael Barnhart on what is going on…
…
continue reading
1
Trellix’s John Fokker on the latest cybercriminal snapshot
40:09
40:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
40:09
CyberScoop Editor-in-Chief Greg Otto was out at Mandiant's mWISE conference last week, and talked with Trellix’s head of threat intelligence, John Fokker, about a host of different subjects. In the first portion of the interview, Greg and John discuss how the Ransomware-as-a-Service landscape has changed in the past year, and how threat actors have…
…
continue reading
1
How organizations are handing AI security
42:59
42:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
42:59
AI is transforming how companies secure their IT infrastructure, especially in industries like airlines, health care, retail, and telecommunications, which rely on applications and APIs for seamless digital experiences. However, there's a risk of companies improperly deploying AI tools or using insecure vendors, potentially leading to widespread da…
…
continue reading
1
We’re back! RunSafe CEO Joe Saunders on secure-by-design in IoT devices
30:28
30:28
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:28
Secure-by-design transforms secure code from an afterthought to an inherent feature, weaving a resilient shield directly into the fabric of every application and device from the ground up. But while everyone’s mind gravitates toward the ocean of software we all use, how does secure-by-design translate to the Internet of Things? In this episode, Cyb…
…
continue reading
1
Ted Schlein on the cybersecurity industry and the latest twist in the Trump-Iran hacking saga
46:18
46:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
46:18
If you want to understand cybersecurity policy, it’s not enough to focus on Washington D.C. — you have to also grok the American tech industry. Few people have bridged that divide more effectively than Ted Schlein, the legendary venture capitalist who is currently at Ballistic Ventures. On this episode of Safe Mode, he sits down with host Elias Gro…
…
continue reading
1
Hack-and-leak op targets Trump; a technical deep dive with John Hammond on the CrowdStrike outage
32:20
32:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:20
With Election Day rapidly approaching in the United States, the Trump campaign claims that the first major hack-and-leak operation has arrived. After a handful of U.S. media outlets received leaked material on vice presidential candidate JD Vance, the Trump campaign said it had been the victim of an Iranian hacking operation. On this episode of Saf…
…
continue reading
1
A deep dive with Tim Starks on the Biden administration's cybersecurity initiatives
44:35
44:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:35
An epidemic of ransomware, cyberattacks on gas pipelines, Chinese infiltration of American critical infrastructure — these are just some of the cybersecurity issues the Biden administration has tackled during the president’s first term in office. With President Joe Biden’s time in office winding down, it’s worth taking stock: Has his administration…
…
continue reading
1
Sara Hooker on compute thresholds for AI; CrowdStrike breaks the internet
45:57
45:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
45:57
AI governance regimes the world over have seized on compute thresholds as a mechanism for implementing various controls on artificial intelligence systems. The basic idea is that if an AI model relies on a sufficiently large amount of computing power, then various controls kick in. As AI models get larger, the thinking goes, they also get riskier, …
…
continue reading
1
Dewey Murdick on enabling principles for AI governance; a landmark breach at AT&T
39:43
39:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:43
Around the world policymakers seem to be grappling with the same question: How best to govern artificial intelligence? The Center for Security and Emerging Technology, a Washington-based think tank, has emerged as a key and influential player in that conversation. And on this episode of Safe Mode, its executive director, Dewey Murdick, sits down wi…
…
continue reading
1
Allan Liska on why it’s time to ban ransomware payments; Russian info ops
38:02
38:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:02
We are living through an epidemic of ransomware. Last year alone, the amount paid to ransomware operators exceeded $1 billion, and the entities getting hit and seeing their operations disrupted by ransomware included hospitals, schools and libraries. Ransomware is both a public-health and national-security crisis, yet efforts to address the problem…
…
continue reading
1
Selena Larson on e-crime matching nation state hackers; Disinfo before the Supreme Court
44:14
44:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:14
When studying cyberoperations, it’s easy to become enamored with state-backed hackers. Russian and Chinese operations have done much to shape our understanding of how power is exercised online, but it’s not clear that the intense attention dedicated to such operations is well-placed. Amid the current epidemic of ransomware, criminal hacking groups …
…
continue reading
1
Protecting teens against sextortion; threats to election workers
35:16
35:16
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:16
The proliferation of artificial intelligence is exposing teens to a new online threat: AI-generated sexual imagery. Heather Barnhart is a fellow at the SANS Institute and a digital forensic expert, and on this episode of Safe Mode she sits down with host Elias Groll to discuss how teenagers and their families can protect themselves against the scou…
…
continue reading
1
Keeping Ukraine’s grid up and running amid war; Snowflake customers under attack
30:42
30:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:42
Following Russia’s full-scale invasion of Ukraine, the Ukrainian power grid has come under sustained attack by Russian forces, and keeping it up and running has been a significant challenge. One of the major issues Ukrainian energy officials have had to confront is the way in which Russian electronic warfare systems have disrupted GPS, which is a k…
…
continue reading
1
Josh Harguess on AI red-teaming; an Israeli info op targets the U.S.
36:46
36:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:46
To address AI risks, policymakers and technologists around the world have embraced the concept of AI red-teaming — the adversarial testing of AI models. But AI red-teaming is such a new concept that few people know how to conduct such tests. The discipline of AI red-teaming very much remains under development, but as AI systems are rolled out far a…
…
continue reading
1
Joe Sullivan on his legal battle with the feds; the latest on Russian influence operations
47:17
47:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
47:17
Joe Sullivan on his legal battle with the feds; the latest on Russian influence operations by Safe Mode Podcastبقلم Safe Mode Podcast
…
continue reading
1
Omkhar Arasaratnam on open source security; AI dogfighting
36:16
36:16
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:16
In recent weeks, a series of troubling operations targeting open source software libraries have been uncovered in which bad actors — likely tied to nation states — have attempted to use social engineering to be designated as maintainers of security critical libraries. Operations such as these have the potential to insert backdoors in widely used so…
…
continue reading
1
The FBI’s Brett Leatherman on LockBitSupp’s unmasking; a spyware reckoning in Poland
33:21
33:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:21
In recent years, the persona known as LockbitSupp has emerged as a notorious figure in the cybercrime underground. The primary administrator of the LockBit ransomware, LockbitSupp has become fantastically wealthy operating the world’s most prolific ransomware. Last week, the FBI and a coalition of international law enforcement agencies unmasked Loc…
…
continue reading
1
Stefan Soesanto on Ukrainian hack and leak ops; cyberattack in Georgia
41:57
41:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
41:57
When Russia invaded Ukraine in February of 2022, it was immediately apparent that the conflict would in part be waged in cyberspace. As Russian tanks rolled into Ukraine, Russian forces also launched a cyberattack against satellite modems that impacted the Ukrainian military’s ability to communicate. Since then, Russian cyberattacks have been a reg…
…
continue reading
1
Rumman Chowdhury on AI red-teaming; a Sisense supply chain attack
49:55
49:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
49:55
At last August’s DEF CON computer security conference, more than 2,000 people tried their hands at breaking some of the world’s most advanced AI models. That event was the largest-ever public red-teaming event of large language models, and since then policymakers are continuing to look to red-teaming as a key tool in responsibly deploying AI system…
…
continue reading
1
Sayash Kapoor on AI risk; Federal agencies affected by Russian breach of Microsoft
43:36
43:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
43:36
Amid the endless hype about AI — how it will either revolutionize the world or end it as we know it — Sayash Kapoor is a rare voice of reason. A PhD candidate at Princeton University and a researcher at the Center for Information Technology and Policy, he is also the author of the newsletter AI Snake Oil, an essential resource to understand AI, its…
…
continue reading
1
Dave Aitel on ‘secure by design’; CISA’s rules for cyber incident reporting
46:03
46:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
46:03
In order to deliver major improvement in the security of the digital systems we all rely on, the Biden administration has embarked on a major initiative known as secure by design. That initiative aims to build more secure hardware and software by prioritizing security in the design process and asks developers to rethink how they approach building p…
…
continue reading
1
Byron Tau on data brokers; US sanctions, indicts Chinese hackers
43:42
43:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
43:42
Journalist Byron Tau sits down with host Elias Groll to discuss his eye-opening book about commercially available data. CyberScoop reporter Derek B. Johnson joins the show to discuss recent indictments and sanctions targeting Chinese hackers accused of surveilling politicians and dissidents.بقلم Safe Mode Podcast
…
continue reading
1
Sherrod DeGrippo on APT groups experimenting with AI
40:30
40:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
40:30
When ChatGPT debuted in the fall of 2022, it set the internet ablaze and opened many people’s eyes to the capabilities of a new generation of machine learning technology. It also caught the attention of some of the world’s most sophisticated hackers. For the companies developing leading edge AI models, preventing hackers from misusing them now repr…
…
continue reading
1
Kiersten Todt on the cybersecurity policy landscape; AI training for election officials
39:39
39:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:39
Kiersten Todt has worked on just about every hot-button cybersecurity issue you can imagine. Currently the CEO of Liberty Group Ventures, her most recent role in government was as the chief of staff at the Cybersecurity and Infrastructure Security Agency. As a Senate staffer, she drafted key parts of the legislation that created the Department of H…
…
continue reading
1
David Haber breaks down the AI security industry; ALPHV snarls U.S. health care
47:39
47:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
47:39
Every day, AI models are being deployed in new places, and that is creating demand for a new industry: companies that secure AI systems. Whether it’s preventing models from being used to write malicious code or creating spearphishing emails or keeping safe the data that companies are using to train AI systems, large language models raise a host of …
…
continue reading
1
Robert M. Lee on critical infrastructure attacks; and is LockBit back?
44:59
44:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:59
In recent months, U.S. security officials have issued a series of dire warnings about the hacking threat to American critical infrastructure. According to a chorus of intelligence officials, Chinese hacking groups have infiltrated U.S. critical infrastructure entities like ports and power grids, prepositioning themselves in the event of a conflict.…
…
continue reading
1
LockBit’s very bad day; Adam Meyers on Israel-Gaza cyber ops
35:46
35:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:46
When Hamas fighters crossed into Israel on Oct. 7, killing some 1,200 Israelis and kidnapping hundreds more, it marked a new era of the conflict between Israel and an array of militant groups. Most of that conflict has played out in the form of brutal, bloody fighting, but it has also taken place online in the form of cyber operations. Adam Meyers,…
…
continue reading
1
Legal aid for hackers; Big Tech wants action on commercial spyware
33:14
33:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:14
Whether you call it hacking or legitimate security research, getting computers to do things that they shouldn’t is an activity that exists in a legal gray area. Sometimes, hackers acting in good faith will find themselves on the other end of a cease-and-desist letter, a lawsuit, or even a prosecution. A new initiative called the Security Research L…
…
continue reading
1
How the Pentagon is embracing AI; election officials’ concerns going into 2024
45:50
45:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
45:50
Everyone seems to agree that AI is going to revolutionize warfare, but exactly how is very much up for debate. Jack Shanahan has worked at the center of the U.S. military’s attempt to integrate AI into how wars are fought. In 2020, he retired as a Lieutenant General from the U.S. Air Force after a 36-year career. He was the inaugural director of th…
…
continue reading
1
Craig Newmark on why he’s funding cybersecurity projects
37:47
37:47
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:47
Founded in 1995, Craigslist helped shape the modern web as we know it today, reshaping online economies and how people bought and sold goods. Today, its founder Craig Newmark is perhaps better known for his philanthropy than the classifieds site he founded. Newmark’s philanthropy spans issues of cybersecurity, technology and journalism, and he join…
…
continue reading
1
Threats to elections in 2024 and a deepfake in New Hampshire
44:18
44:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:18
In the year 2024, elections will take place around the world affecting some 4 billion people — an election year unlike any other. Besides the United States, voters will go to the polls in the European Union, the United Kingdom, India, Mexico and Indonesia, just to name a few. The next time we’ll see this many elections in one year will be in 2048. …
…
continue reading
1
How do you prevent a political campaign from getting hacked?
42:58
42:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
42:58
The upcoming year will feature an unprecedented number of democratic elections. In addition to the United States’s pivotal federal elections, countries that collectively make up more than half of the world’s populations will head to the polls. These elections are taking place against the backdrop of pervasive security vulnerabilities and come on th…
…
continue reading
1
Looking back at 2023 with the NSA’s Rob Joyce and Morgan Adamski
52:09
52:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
52:09
In our first episode of the year, we begin by looking back at 2023. The NSA’s Rob Joyce and Morgan Adamski sit down with host Elias Groll to examine the major cybersecurity trends of the year, the evolution of Russian hacking operations, how China is targeting U.S. critical infrastructure and how AI is changing the cybersecurity business. FedScoop …
…
continue reading
1
Major breaches, the government’s AI push and UFOs: Scoop reporters on 2023’s biggest stories
51:08
51:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
51:08
In our final episode of the year, host Elias Groll sits down with reporters from CyberScoop, FedScoop and Defense Scoop to discuss the biggest stories of the year. Christian Vasquez and AJ Vicens join the show to talk through the biggest breaches of the year and how the cybersecurity landscape changed in 2023. Madison Alder and Rebecca Heilweil com…
…
continue reading
1
Five years of Distributed Denial of Secrets and a dangerous automotive vulnerability
1:02:32
1:02:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:02:32
It was WikiLeaks that pioneered the publishing and hosting of sensitive information, and while Julian Assange’s whistleblowing project has withered away, groups like Distributed Denial of Secrets are carrying on the work of trying to make public interest material more widely available — and to do so more responsibly. Emma Best is the founder of DDO…
…
continue reading
1
Iranian attacks on U.S. water systems and the data broker economy
46:07
46:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
46:07
To be a person in the world today is to have your data collected. Whether it’s your internet browsing history, your location history as you walk around with your phone in your pocket, or the purchases you make online, there’s few human activities today that aren’t in one way or another tracked. So what happens with all that data once it’s collected…
…
continue reading
1
Supercomputers for AI and the proliferation of commercial spyware
30:32
30:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:32
A growing industry exists today that provides governments with highly advanced tools to surveil their opponents. While this industry has become personified by Israel’s NSO Group, it in fact goes far beyond this one firm. The commercial spyware industry is growing rapidly, posing major human rights concerns and exposing dissidents, journalists and m…
…
continue reading
1
A deep dive on cyberpsychology and a look at autonomy in the U.S. military
45:49
45:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
45:49
Just as behavioral psychology revolutionized economics by integrating human behavior into the study of financial decisions — creating the field of behavioral economics — the study of cyberpsychology tries to put the human being at the center of conversations about cybersecurity. Dr. Mary Aiken is one of its foremost practitioners and also happens t…
…
continue reading
1
Russian cyberattack cut power in Ukraine, Michigan secretary of state talks election security
35:44
35:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:44
Russia’s cyberattacks against Ukraine’s electrical grid occupy a canonical place in the history of cyber warfare. By turning out the lights in Ukraine in 2016 and 2017, Russia demonstrated the reach of digital weapons. Now researchers have revealed that Moscow’s hackers struck the Ukrainian grid in 2022. CyberScoop reporters AJ Vicens and Christian…
…
continue reading
1
Biden’s AI executive order and a CIA veteran on North Korean cyber ops
58:37
58:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
58:37
President Joe Biden’s sprawling executive order on artificial intelligence has finally arrived. The sprawling document contains a long list of new requirements. Leading AI companies have to report training runs and the results of red team tests. A slew of agencies are tasked with developing new standards and rules to address AI risks. And a long li…
…
continue reading
1
The “new elite” shaping coverage of Israel and Gaza
41:03
41:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
41:03
Over the past 15 years, Twitter — now X — has become pivotal to how we understand crises. From the Arab Spring to Russia’s invasion of Ukraine and, now, the conflict between Israel and Hamas, X is the first platform to which many people turn to understand and report on rapidly unfolding events.Elon Musk’s acquisition of the platform has fundamental…
…
continue reading
1
Inside the FBI’s DDOS investigations with Special Agent Elliott Peterson
36:51
36:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:51
Distributed denial of service attacks are one of the great nuisances of online life today, but they can also have more serious impact on the internet, disrupting access to crucial services and information at critical moments. FBI Special Agent Elliott Peterson is one of the bureau’s most seasoned investigators of the networks responsible for launch…
…
continue reading
1
Perri Adams on DARPA’s AI cyber challenge and Israeli cyber operations
38:57
38:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:57
Cybersecurity firms have pioneered the use of artificial intelligence in their products, but the latest generation of AI technology offers hope that a greater share of the work to secure computer systems could be automated. A new competition at the Defense Advanced Projects Research Agency aims to jump start efforts to build open source AI tools to…
…
continue reading
1
GOP presidential candidate Will Hurd on cyber, AI and China
47:14
47:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
47:14
When Will Hurd served in the House of Representatives he quickly made a name for himself as one of the Congress’s leading voices on cybersecurity. The Texas Republican helped pass a series of key technology modernization bills and gained a reputation as a sensible bipartisan dealmaker. A former CIA operations officer, Hurd was once billed as the fu…
…
continue reading