Podcasts

News, analysis and commentary

All roads lead to CISA to secure .gov

Presented by

Brett Winterford
Brett Winterford

The US Government has spent a decade and tens of billions trying to centralise cybersecurity capability across civilian agencies, without much success. So why now are policymakers so buzzed about CISA?

Risky Biz Soap Box: ExtraHop CTO Jesse Rothstein talks network monitoring

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

This isn’t the normal, weekly Risky Business podcast, Soap Box is the wholly sponsored podcast series we do here at Risky.Biz where vendors pay us money to come on to the show and talk about topics that interest them.

Today we’re speaking with Jesse Rothstein, the co-founder and CTO of ExtraHop Networks. ExtraHop is a network security play, but they started off more in the application monitoring and performance space before gradually moving into security over time.

In this interview Jesse talks about network security monitoring, ExtraHop’s history, and what people are using the ExtraHop tech to do during the COVID-19 crisis.

Risky Biz Soap Box: ExtraHop CTO Jesse Rothstein talks network monitoring
0:00 / 42:28

Risky Business #583 -- COVID-19 collection intensifies, tensions mount

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week’s show Patrick and Adam discuss the week’s security news, including:

  • US takes aim at China over vaccine hax
  • ??? takes aim at Iranian port infrastructure over ???
  • Iran attacks Gilead pharma
  • Zoom acquires Keybase
  • Thunderbolt research discussed
  • US to drop more DPRK malware
  • Ransomware targets European hospital group
  • Australian flu vaccine distribution disrupted by ransomware
  • More!
Risky Business #583 -- COVID-19 collection intensifies, tensions mount
0:00 / 58:03

Attacks on healthcare are crossing all the red lines

Presented by

Brett Winterford
Brett Winterford

The ongoing march of destructive attacks on medical organisations and a frenzy of espionage interest in COVID-19 vaccine and treatment research is testing the restraint of several governments. This week’s Seriously Risky Biz newsletter and our livestream discuss the ethical and policy dilemmas this race poses.

Risky Business #582 -- Germans indict APT28 operator

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week’s show Patrick and Adam discuss the week’s security news, including:

  • Salt framework 1Day wreaks havoc
  • Toll Group hit with ransomware attack. Again.
  • Germans indict APT28 operator
  • Ransomware a key word in SEC filings
  • Much, much more!
Risky Business #582 -- Germans indict APT28 operator
0:00 / 50:48

Ransomware is now officially on the board agenda

Presented by

Brett Winterford
Brett Winterford

How’s this for a cogent data point: Catalin Cimpanu at ZDNet had the curiosity and foresight to search for the word ‘ransomware’ in recent SEC filings. Cimpanu found that over 1000 public US companies now list ransomware attacks as a forward-looking risk.

It wasn’t long ago that a company getting popped in a ransomware attack would rate a mention on the Risky Business podcast. Today, it takes a novel attack to raise an eyebrow. 

Australia’s COVID-19 app is buggy, not yet operational

Presented by

Patrick Gray and Brett Winterford
Patrick Gray and Brett Winterford

The Australian Government has placed uptake of its COVID-19 contact tracing app front and centre of its strategy to walk back lockdown measures, despite mounting evidence it isn’t fit for purpose.

On Friday, Australia’s Prime Minister Scott Morrison framed uptake of the government’s contact tracing app as one of a few remaining pre-conditions before lockdown measures would be lifted.

However, according to multiple reports, the government’s COVIDSafe app is barely functional on iOS devices, state health authorities don’t yet have access to the contact tracing data it was designed to collect and the app is interfering with some Bluetooth-based medical devices.

Snake Oilers 11 part 2: Go passwordless with Okta, why Crowdstrike customers need Airlock

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Snake Oilers isn’t the regular Risky Business podcast, if you’re looking for that just scroll back to one of the numbered episodes in our podcast feed. Snake Oilers is the wholly sponsored podcast series we do here at Risky.Biz where vendors give us money so they can come on to the show and pitch you their sweet, sweet Snake Oil.

In this edition of snake oilers we’ll hear from:

  • David Cottingham of Airlock Digital pitches the Crowdstrike/Airlock two piece combo meal deal
  • Marc Rogers of Okta talks passwordless authentication and pitches modern SSO generally
  • John Emmitt of Kaseya pops in to pitch the VSA endpoint management agent
Snake Oilers 11 part 2: Go passwordless with Okta, why Crowdstrike customers need Airlock
0:00 / 39:13

Risky Business #581 -- Chinese telcos under fire in USA, spy firms pitch COVID-19 surveillance

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week’s show Patrick and Adam discuss the week’s security news, including:

  • Spy companies pitch ridiculously invasive approaches to contact tracing
  • NSO Group busted running c2 boxes in USA according to WhatsApp lawsuit
  • Australian government releases contact tracing app, no idea if it works
  • Chinese telcos to get boot from USA
  • Much, much more
Risky Business #581 -- Chinese telcos under fire in USA, spy firms pitch COVID-19 surveillance
0:00 / 55:46

Chinese telcos have 30 days to prevent US expulsion

Presented by

Brett Winterford
Brett Winterford

The US Federal Communications Commission has ordered three Chinese State-owned telcos to ‘show cause’ for why it shouldn’t expunge their license to operate in the United States.

China Telecom Americas, China Unicom Americas and Pacific Networks each have 30 days to prove their operations and subsidiaries are “not subject to the influence and control of the Chinese government.” Among other demands, each must detail affiliations between directors/employees and the CCP/Chinese Government, provide network diagrams, list interconnections with other service providers, provide inventories of network equipment and hand over US subscriber information to avoid license revocation.