loader from loading.io

040| Can Contact Tracing Apps Preserve Your Privacy?

Cyber Security Sauna

Release Date: 05/27/2020

054| Ransomware Incident Response and the Role of Readiness show art 054| Ransomware Incident Response and the Role of Readiness

Cyber Security Sauna

The fallout from a ransomware attack is every organization's worst nightmare. But it doesn't necessarily have to be, if you can respond to an attack effectively. As our guests explain, there are things companies can be doing in advance to ensure a proactive response to ransomware, and to reduce the impact to the company. Incident response experts Jordan LaRose and Matt Lawrence of F-Secure join the show to discuss.

info_outline
053| How to Secure Networks and Influence People show art 053| How to Secure Networks and Influence People

Cyber Security Sauna

The role of a chief information security officer demands technical knowledge, but it also requires soft skills of leading and influencing. So how can CISOs get their security message across to boards, the business, employees and the security team? Joining Janne are two CISOs, Erka Koivunen of F-Secure and Chani Simms, co-founder of Meta Defence Labs and founder of SHe CISO Exec community, to discuss communication and the role of emotional intelligence in promoting a culture of security at every level.

info_outline
052| Challenges in Cloud Security show art 052| Challenges in Cloud Security

Cyber Security Sauna

Cloud computing was one of the last decade's most transformative technologies. It helped organizations launch exciting new applications and services, as well as innovate the way they operate. But moving critical parts of IT infrastructure and operations outside of organizations' perimeters has significant security implications. The cloud is definitely here to stay, so security consultants Laura Kankaala and Nick Jones join Janne to talk about the cloud security challenges organizations face.  

info_outline
051| Looking at Phishing Through the Intrusion Kill Chain show art 051| Looking at Phishing Through the Intrusion Kill Chain

Cyber Security Sauna

Phishing is the number one vector leading to data breaches. It's an easy, effective way for attackers to trick users into giving up credentials or running malicious code. While organizations cannot stop motivated attackers from trying to phish their employees, they can make it harder to succeed. F-Secure's director of consulting, Riaan Naudé, joins the show to talk about how companies can combat phishing by addressing the earlier stages of the intrusion kill chain.

info_outline
050| Getting the Most out of Infosec Conferences show art 050| Getting the Most out of Infosec Conferences

Cyber Security Sauna

Infosec conferences give cybersecurity professionals a chance to network, hear the latest research, exchange ideas, and demo hacks and new tools. But how do you decide which ones to attend? How can you get the most out of your experience? Are they worth your time and money? What's it like to be a presenter, or even an organizer? Janne speaks to Noora Hammar of the Nordic security event Disobey and the HelSec Association; and F-Secure's Tomi Tuominen, founder of the T2 infosec conference.

info_outline
049| Ransomware 2.0, with Mikko Hypponen show art 049| Ransomware 2.0, with Mikko Hypponen

Cyber Security Sauna

We thought locking up data and demanding a fee to decrypt it was bad. But ransomware criminals have stooped even lower and now, threats of public data exposure on top of ransom demands are routine. What's next? Where's ransomware 2.0 going in 2021? F-Secure's chief research officer Mikko Hypponen joins us to give his take. Also in this episode: Ransomware's evolution, why it's mainly a Windows problem, the impact of remote work, how ransomware's industrialization affects the threat landscape, and more.

info_outline
048| The Year in Cyber: 2020 show art 048| The Year in Cyber: 2020

Cyber Security Sauna

2020 has been a year no one predicted. COVID-19 made remote work the norm and shook up the attack landscape. Through it all, breaches and ransomware attacks continued to plague organizations. In this episode we're looking back at some of the trends that defined the cyber world in 2020 with F-Secure's Tom Van de Wiele and Nick Jones. Also in this episode: The supply chain attack on SolarWinds; update on the cyber skills shortage; 2020's effect on VPN, Zero Trust, and cloud; the 2020 US elections and more.

info_outline
047| The Tangled Web of ID Theft show art 047| The Tangled Web of ID Theft

Cyber Security Sauna

With the holidays accelerating online shopping, more online transactions means more reasons to be careful about fraud like identity theft and account takeover. ID theft claims millions of victims per year, but how does it happen and how can you avoid being a victim? Olli Bliss of F-Secure joins the show with answers. Also in this episode: How attackers get your data, how they crack passwords and break into accounts, what's happening to your data on the dark web, the new trend in credit card fraud, and more.

info_outline
046| 10 Burning Mobile Security Questions, Answered show art 046| 10 Burning Mobile Security Questions, Answered

Cyber Security Sauna

Is iOS really more secure than Android? What are the pros and cons of biometric authentication? How can you know which apps are safe? In this episode we dive into a range of mobile security issues. Who better to answer our questions than a couple of mobile experts? F-Secure's Ken Gannon and Ben Knutson join the show to discuss app permissions, company mobile device management, mobile hygiene tips, signs your phone's been hacked and more. Plus, is your Facebook app listening in on you, or not?

info_outline
045| The Most Frightening Thing About Stalkerware, with Eva Galperin show art 045| The Most Frightening Thing About Stalkerware, with Eva Galperin

Cyber Security Sauna

You know about malware, ransomware, spyware. But there's an increasing concern about stalkerware, a creepy breed of apps that allow someone else to digitally monitor you. What is stalkerware all about and how can you recognize it? Who plants it and why, and who are its victims? Joining the show are Eva Galperin, director of cyber security at the Electronic Frontier Foundation who also helped found the Coalition Against Stalkerware, and Anthony Melgarejo, threat researcher at F-Secure.

info_outline
 
More Episodes

Contact tracing is a key strategy for preventing the spread of COVID-19, and smartphone-assisted contract tracing automates a laborious process. But contact tracing technologies face criticism from privacy advocates concerned about the potential for abuse. F-Secure privacy expert and global technical director Tomi Tuominen argues that the issue is a process problem, not a technology problem. Janne speaks with Tomi about contact tracing, how apps should fit into a bigger healthcare picture, and how privacy-preserving contact tracing technology should work.  

Links:

Episode 40 transcript

Tracking COVID tracing apps in different countries, MIT Technology Review

Principles for Technology-Assisted Contact Tracing, ACLU