loader from loading.io

040| Can Contact Tracing Apps Preserve Your Privacy?

Cyber Security Sauna

Release Date: 05/27/2020

076| What we get wrong (and right) about APTs show art 076| What we get wrong (and right) about APTs

Cyber Security Sauna

Advanced persistent threats, or APTs, are generally seen as a sort of apex predator in the cyber threat landscape. And while they’re certainly noteworthy, their reputation can distort what makes them unique, and what they may have in common with other adversaries. In this episode, we’re joined by Senior Threat Intelligence Analyst Stephen Robinson, and Security Consultant Richard Suls, to shed some light on APTs and how we can protect ourselves against them. Read more:  

info_outline
075| Winning with outcome-based security show art 075| Winning with outcome-based security

Cyber Security Sauna

Security protects organizations from cyber attacks. However, studies show that limiting your understanding of security to this basic premise can hinder protection efforts or even other business goals. Instead of spending more and more on security to simply keep things running, maybe it’s time for a different approach. In this episode, we are joined by WithSecure Chief Information Security Officer Christine Bejerasco, and guest speaker Laura Koetzle, Vice President and Group Director at Forrester to discuss a strategy called outcome-based security.

info_outline
074| Do you even patch bro? show art 074| Do you even patch bro?

Cyber Security Sauna

Vulnerabilities and security gaps are increasingly being identified in software and applications daily. Attackers are often quick to act when any vulnerabilities are made known - even within minutes. You may have heard of the term patching in cyber security, but what is it exactly, and how does it figure into an organization's security posture? WithSecure security consultants Katie Inns and Antti Laatikainen join us to discuss all things patching.

info_outline
073| 2023 - Looking Forward show art 073| 2023 - Looking Forward

Cyber Security Sauna

In our last episode, we were joined by cyber security advisor Paul Brucciani and WithSecure Intelligence Researcher Andy Patel to discuss some notable 2022 infosec developments. Now that 2022 is in the rear-view mirror, all eyes are turning to the year ahead. What should we expect? Is there some disaster on the horizon for which we need to prepare? Conversely, are there any positive devlopments that we can look forward to? We're once again joined by Paul and Andy to discuss some of the trends we should look out for in 2023.  

info_outline
072| 2022 Wrap-Up show art 072| 2022 Wrap-Up

Cyber Security Sauna

As the year draws to a close, it’s time for us to review and reflect on notable infosec events and trends from 2022, and also what might happen in 2023. In this episode we’re joined by cyber security advisor Paul Brucciani and WithSecure Intelligence Researcher Andy Patel to hear their thoughts on the impact of Russia’s invasion of Ukraine on cyber security, what they think about the changes at Twitter, and other significant developments from the last 12 months. 

info_outline
071| Deepfakin it: AI content in cyber attacks show art 071| Deepfakin it: AI content in cyber attacks

Cyber Security Sauna

Until recently, AI-generated synthetic content has been more commonly used for gaming and art creation, where the tech is still relatively new, and pixel perfection is unnecessary. However, with the tech rapidly advancing in complexity and speed, it's probably only a matter of time before it's genuinely challenging to determine if something is fake or not. Unfortunately, this increase in technology will also provide many avenues for disinformation and other assorted nefariousness. Digital artist and YouTuber Nerdy Rodent and WithSecure Researcher Andy Patel join is to discuss how the...

info_outline
Cyber Security Sauna: Breaking Views – The Vastaamo case show art Cyber Security Sauna: Breaking Views – The Vastaamo case

Cyber Security Sauna

In this Cyber Security Sauna special edition podcast, we cover new developments in the data breach of Finnish Psychotherapy provider Vastaamo in 2020. This case has recently hit the news again, with the Finnish authorities arresting a suspect in absentia. The suspect in the breach and subsequent leaking of patient data is a 25-year-old Finnish citizen. Officials believe he is at large somewhere in Europe. Neglect by Vastaamo system administrators prior to the incident has also been called out by officials and cyber security experts. Cyber Security Sauna host Janne Kauhanen is joined...

info_outline
070| Crowdsourcing Security with Bug Bounties show art 070| Crowdsourcing Security with Bug Bounties

Cyber Security Sauna

Bug bounties (also known as vulnerability reward programs) crowdsource security expertise to address vulnerabilities in products or services before attackers exploit them. Many companies have adopted reward programs and sometimes offer hefty rewards for finding vulnerabilities. It's a great way for white hat hackers to make some money and showcase their talents for a possible job, and for companies to improve their security. In this episode, we’re joined by Intigriti’s Head of Hackers, Inti De Ceukelaire, a bug bounty expert that connects organizations with the ethical hacking community,...

info_outline
069| Cyber conflicts, Corporations and Collateral damage show art 069| Cyber conflicts, Corporations and Collateral damage

Cyber Security Sauna

Geo-political conflicts are increasingly being played out in cyberspace, and organizations, whether they are aware or not, are often caught in the crossfire. Janne Taalas and Johannes Laaksonen from CMI - Martti Ahtisaari Peace Foundation and WithSecure™ Chief Technology Officer Christine Bejerasco joined us to discuss how we can resolve these conflicts and try to make cyberspace a safer place for everyone.    

info_outline
SPHERE SESSION | Johanna Småros on winning the algorithmic retail show art SPHERE SESSION | Johanna Småros on winning the algorithmic retail

Cyber Security Sauna

Co-founder & CMO at RELEX Solutions, Johanna Småros, joined us in our cyber sauna recording booth at , the world's first co-security unconference, for a discussion on supply chain management, both in retail and in a broader aspect.

info_outline
 
More Episodes

Contact tracing is a key strategy for preventing the spread of COVID-19, and smartphone-assisted contract tracing automates a laborious process. But contact tracing technologies face criticism from privacy advocates concerned about the potential for abuse. F-Secure privacy expert and global technical director Tomi Tuominen argues that the issue is a process problem, not a technology problem. Janne speaks with Tomi about contact tracing, how apps should fit into a bigger healthcare picture, and how privacy-preserving contact tracing technology should work.  

Links:

Episode 40 transcript

Tracking COVID tracing apps in different countries, MIT Technology Review

Principles for Technology-Assisted Contact Tracing, ACLU