loader from loading.io

038| Mikko Hypponen on Zoom, COVID-19 Threats, and Working During a Pandemic

Cyber Security Sauna

Release Date: 04/16/2020

052| Challenges in Cloud Security show art 052| Challenges in Cloud Security

Cyber Security Sauna

Cloud computing was one of the last decade's most transformative technologies. It helped organizations launch exciting new applications and services, as well as innovate the way they operate. But moving critical parts of IT infrastructure and operations outside of organizations' perimeters has significant security implications. The cloud is definitely here to stay, so security consultants Laura Kankaala and Nick Jones join Janne to talk about the cloud security challenges organizations face.  

info_outline
051| Looking at Phishing Through the Intrusion Kill Chain show art 051| Looking at Phishing Through the Intrusion Kill Chain

Cyber Security Sauna

Phishing is the number one vector leading to data breaches. It's an easy, effective way for attackers to trick users into giving up credentials or running malicious code. While organizations cannot stop motivated attackers from trying to phish their employees, they can make it harder to succeed. F-Secure's director of consulting, Riaan Naudé, joins the show to talk about how companies can combat phishing by addressing the earlier stages of the intrusion kill chain.

info_outline
050| Getting the Most out of Infosec Conferences show art 050| Getting the Most out of Infosec Conferences

Cyber Security Sauna

Infosec conferences give cybersecurity professionals a chance to network, hear the latest research, exchange ideas, and demo hacks and new tools. But how do you decide which ones to attend? How can you get the most out of your experience? Are they worth your time and money? What's it like to be a presenter, or even an organizer? Janne speaks to Noora Hammar of the Nordic security event Disobey and the HelSec Association; and F-Secure's Tomi Tuominen, founder of the T2 infosec conference.

info_outline
049| Ransomware 2.0, with Mikko Hypponen show art 049| Ransomware 2.0, with Mikko Hypponen

Cyber Security Sauna

We thought locking up data and demanding a fee to decrypt it was bad. But ransomware criminals have stooped even lower and now, threats of public data exposure on top of ransom demands are routine. What's next? Where's ransomware 2.0 going in 2021? F-Secure's chief research officer Mikko Hypponen joins us to give his take. Also in this episode: Ransomware's evolution, why it's mainly a Windows problem, the impact of remote work, how ransomware's industrialization affects the threat landscape, and more.

info_outline
048| The Year in Cyber: 2020 show art 048| The Year in Cyber: 2020

Cyber Security Sauna

2020 has been a year no one predicted. COVID-19 made remote work the norm and shook up the attack landscape. Through it all, breaches and ransomware attacks continued to plague organizations. In this episode we're looking back at some of the trends that defined the cyber world in 2020 with F-Secure's Tom Van de Wiele and Nick Jones. Also in this episode: The supply chain attack on SolarWinds; update on the cyber skills shortage; 2020's effect on VPN, Zero Trust, and cloud; the 2020 US elections and more.

info_outline
047| The Tangled Web of ID Theft show art 047| The Tangled Web of ID Theft

Cyber Security Sauna

With the holidays accelerating online shopping, more online transactions means more reasons to be careful about fraud like identity theft and account takeover. ID theft claims millions of victims per year, but how does it happen and how can you avoid being a victim? Olli Bliss of F-Secure joins the show with answers. Also in this episode: How attackers get your data, how they crack passwords and break into accounts, what's happening to your data on the dark web, the new trend in credit card fraud, and more.

info_outline
046| 10 Burning Mobile Security Questions, Answered show art 046| 10 Burning Mobile Security Questions, Answered

Cyber Security Sauna

Is iOS really more secure than Android? What are the pros and cons of biometric authentication? How can you know which apps are safe? In this episode we dive into a range of mobile security issues. Who better to answer our questions than a couple of mobile experts? F-Secure's Ken Gannon and Ben Knutson join the show to discuss app permissions, company mobile device management, mobile hygiene tips, signs your phone's been hacked and more. Plus, is your Facebook app listening in on you, or not?

info_outline
045| The Most Frightening Thing About Stalkerware, with Eva Galperin show art 045| The Most Frightening Thing About Stalkerware, with Eva Galperin

Cyber Security Sauna

You know about malware, ransomware, spyware. But there's an increasing concern about stalkerware, a creepy breed of apps that allow someone else to digitally monitor you. What is stalkerware all about and how can you recognize it? Who plants it and why, and who are its victims? Joining the show are Eva Galperin, director of cyber security at the Electronic Frontier Foundation who also helped found the Coalition Against Stalkerware, and Anthony Melgarejo, threat researcher at F-Secure.

info_outline
044| 2020 in Cyber Threats, So Far: COVID-19's Effects, Ransomware's Latest Tricks show art 044| 2020 in Cyber Threats, So Far: COVID-19's Effects, Ransomware's Latest Tricks

Cyber Security Sauna

It's a year like none we've ever experienced. COVID-19's effects have reverberated around the world, and around cyberspace. What's happened in the threat landscape while we've been preoccupied with the pandemic? How have attackers adapted to the new normal? Christine Bejerasco and Calvin Gan of F-Secure's Tactical Defense Unit join us to discuss the latest email and phishing threats, how threat actors are taking advantage of remote work, and why a ransomware infection may be just the tip of the iceberg.

info_outline
043| Paths to Infosec: Military Vs. Psychology show art 043| Paths to Infosec: Military Vs. Psychology

Cyber Security Sauna

There is no one set path to a cybersecurity career, and today's guests have arrived in the field in very different ways. Logan Whitmire comes from a military background and Derek Stoeckenius has a degree in psychology. They share what sparked their interest in infosec, their journey to their current roles, and how their unique backgrounds influenced the way they approach their work. Also: Tips on getting into the field, and what they might have done differently.

info_outline
 
More Episodes

It's the topic on everyone's minds: The new state of our world amid and after a global pandemic. Mikko Hypponen, F-Secure's Chief Research Officer, joins Janne to discuss a host of COVID-19-related security topics. In this episode: Avoiding Zoom bombers, new concerns for IT environments, COVID-19 hoaxes and spam, ransomware and hospitals, APT activity, privacy concerns of coronavirus tracking apps, and how the infosec community can help.

Links:

Episode 38 transcript

Webinar: Mikko Hypponen - Cyber Security and COVID-19