CISO Tradecraft®

#180 - There's Room For Everybody In Your Router (with Giorgio Perticone)


Listen Later

In this joint episode of the Security Break podcast and CISO Tradecraft podcast, hosts from both platforms come together to discuss a variety of current cybersecurity topics. They delve into the challenge of filtering relevant information in the cybersecurity sphere, elaborate on different interpretations of the same news based on the reader's background, and share a detailed analysis on specific cybersecurity news stories. The discussion covers topics such as the implications of data sharing without user consent by major wireless providers and the fines imposed by the FCC, the significance of increasing bug bounty payouts by tech companies like Google, and a comprehensive look at how edge devices are exploited by hackers to create botnets for various cyberattacks. The conversation addresses the complexity of the cybersecurity landscape, including how different actors with varied objectives can simultaneously compromise the same devices, making it difficult to attribute attacks and protect networks effectively.

Transcripts: https://docs.google.com/document/d/1GtFIWtDf_DSIIgs_7CizcnAHGnFTTrs5

Chapters

  • 00:00 Welcome to a Special Joint Episode: Security Break & CISO Tradecraft
  • 01:27 The Challenge of Filtering Cybersecurity Information
  • 04:23 Exploring the FCC's Fine on Wireless Providers for Privacy Breaches
  • 06:41 The Complex Landscape of Data Privacy Regulations
  • 16:00 The Economics of Data Breaches and Regulatory Fines
  • 24:23 Bug Bounties and the Value of Security Research
  • 33:21 Exploring the Economics of Cybersecurity
  • 33:50 The Lucrative World of Bug Bounties
  • 34:38 The Impact of Security Vulnerabilities on Businesses
  • 35:50 Navigating the Complex Landscape of Cybersecurity
  • 36:22 The Ethical Dilemma of Selling Exploit Information
  • 37:32 Understanding the Market Dynamics of Cybersecurity
  • 38:00 Focusing on Android Application Security
  • 38:34 The Importance of Targeting in Cybersecurity Efforts
  • 42:33 Exploring the Threat Landscape of Edge Devices
  • 46:37 The Challenge of Securing Outdated Technology
  • 49:28 The Role of Cybersecurity in Modern Warfare
  • 53:15 Strategies for Enhancing Cybersecurity Defenses
  • 01:05:25 Concluding Thoughts on Cybersecurity Challenges
  • ...more
    View all episodesView all episodes
    Download on the App Store

    CISO Tradecraft®By CISO Tradecraft®

    • 4.8
    • 4.8
    • 4.8
    • 4.8
    • 4.8

    4.8

    48 ratings


    More shows like CISO Tradecraft®

    View all
    Risky Business by Patrick Gray

    Risky Business

    363 Listeners

    SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

    SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

    634 Listeners

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

    369 Listeners

    Hacked by Hacked

    Hacked

    176 Listeners

    CyberWire Daily by N2K Networks

    CyberWire Daily

    1,011 Listeners

    Smashing Security by Graham Cluley & Carole Theriault

    Smashing Security

    312 Listeners

    Click Here by Recorded Future News

    Click Here

    387 Listeners

    Malicious Life by Malicious Life

    Malicious Life

    923 Listeners

    Darknet Diaries by Jack Rhysider

    Darknet Diaries

    7,847 Listeners

    Cybersecurity Today by Jim Love

    Cybersecurity Today

    143 Listeners

    CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

    CISO Series Podcast

    182 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    308 Listeners

    Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

    Defense in Depth

    71 Listeners

    Cyber Security Headlines by CISO Series

    Cyber Security Headlines

    118 Listeners

    Risky Bulletin by risky.biz

    Risky Bulletin

    33 Listeners