18 Burst results for "Dave bittner"

"dave bittner" Discussed on Recorded Future - Inside Threat Intelligence for Cyber Security

Recorded Future - Inside Threat Intelligence for Cyber Security

01:33 min | 7 months ago

"dave bittner" Discussed on Recorded Future - Inside Threat Intelligence for Cyber Security

"Where do you think we're headed when when you look towards the horizon? ? In terms of thinking of the continued professionalization of cybersecurity. . Becomes more and more essential, , less exotic a part of every business. . What do you think the future holds for us well I hope we don't ever lose the art and make it into a complete science <hes> would be my number one <hes> comment on that <hes> it's it's not like other industries and we try and graft our thought processes and how we define our industry on. . Other. Industries, . , we call you know people in technology architects or engineers. . Maybe we need our own vocabulary to describe what we do, , <hes> I and I. . Think we need to <hes>. . You've really step back in see where we want to take our industry and those of us that have been in while and have been around have had the benefit of lots of great mentors and lots. . Of folks that helped us up the ladder and it's incumbent on us to really do that for the next generation, , help them up the ladder and a lot of times <hes> they feel like they can't reach out to someone with a big title like mine or whatnot. . One of the greatest joys of my day is spending some time with a student or someone who is passionate. . About our industry in in helping, , guide them or introducing some <unk> a new book that they should read or not to them <hes> to enable them on their career and I. . think There's a lot of folks like me out there that would love to have those discussions. . Have those <hes> have those interactions and pay it forward because someone helped them get to where they are as well.

Kevin Magee Microsoft Dave bittner Canada officer professor Ted
"dave bittner" Discussed on The CyberWire

The CyberWire

01:42 min | 1 year ago

"dave bittner" Discussed on The CyberWire

"University of Maryland Center for Health and Homeland Security will have a new episode each week and we're going to be dropping the first few episodes into this feed in hopes that you will Hello and welcome to caveat the cyber wires law and policy podcast I'm Dave Bittner and joining me is my co host Ben Yellen from the University of Maryland Center for Health and Homeland Security I ben how're you doing Dave we've got some good headlines to share and later in the show we've got my interview with am fan she's a data security lawyer who discussing the effects of Nevada's new cybersecurity legislation that recently went into effect WanNa remind you that while this show covers legal topics and Ben is a lawyer the views expressed to not constitute legal advice for official legal advice on any of the topics we cover these contact your attorney we got a lot to share this week but first a word from our sponsors go before and now a few thoughts from our sponsors at no before what do you do with risk we hear that you can basically do three things you can accept it you can transfer it or you can reduce it and of course you might wind up doing some mix of the three but consider risk comes in many forms and it comes from many places including places you don't necessarily control how many an organization has been clobbered by something they wished they'd seen coming so what can you do to see it coming later in the show we'll hear some of no before's ideas on seeing into third party risk.

Dave Bittner Ben Yellen Nevada attorney University of Maryland Center official
"dave bittner" Discussed on Grumpy Old Geeks

Grumpy Old Geeks

01:53 min | 3 years ago

"dave bittner" Discussed on Grumpy Old Geeks

"And you got in your mouth well that's what i did and then i'm just like oh shit he was right so i've been jim jeffries fan since that but he's also talking ridiculously funny no he is i agree i is ridiculously funny i he's one of my favorite comedians the thing is jim jefferies is really encroaching on john oliver for quality of comedy for the week this week he did a bit on emotional support animals that was one of the funniest things i've ever seen in the actually registered it emotional support camel the they can legally take on the plane well feet tall but stuff that in the in the luggage compartment united exactly no they're they're killing it over the gym jeffrey shows and they have a podcast that follows it so every week they do the show and then the next day they have a podcast that they record right after the show yeah i talked about the podcast on our show we both have yeah i think for me it was like i don't watch the show so it's quite is not fun watch the fucking show it is all right if you like if you like last week tonight you're gonna fucking dig jim jefferies because he he's like john oliver who says count that's pretty right got you security ladies and gentlemen boys and girls guess what today is gdp our day and we are back with dave bittner from the cyber wire podcast this is a free community driven cyber security news service based in maryland hello dave hi guys do you feel different feel different i feel feel so much more secure do you hold on a second i have another thirty five emails that just came in.

jim jefferies john oliver dave bittner maryland jim jeffries
"dave bittner" Discussed on The CyberWire

The CyberWire

01:59 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Out and sitting next to your outer right just in case yeah all right well i mean it's an interesting story it's it's it's one of those ones that i guess is to be continued because it's happening it's hard to defend against so we'll just one of those ones we'll have to see how it plays out it it's it's i guess for you frustratingly unresolved it's frustrating then resolved and it's one of those topics where i feel like we need people looking at it we need people to know it exists but we also risk stoking the fire of adoption by even mentioning it you know i think it's important for forensic investigators and law enforcement stuff to know that this capability exists and to know to look for it when they're dealing with their investigations but from the dido's perspective and from the the black hat crocs perspective from the carding perspective in the account takeover perspective it also presents a serious threat that i don't we've actually seen it really leverage jet our thanks to chad seaman from my for joining us the white paper is titled upn proxy black hat proxies via net injections and you can find it on the website thanks to the hewlett foundation cyber initiative for sponsoring our show you can learn more about them at hewlett dot org slash cyber and thanks to unveil for their sponsorship you can find out how they're closing the last gap and data security at n vail dot com the cyber wire research saturday is proudly produced in maryland out of the startup studios of data tribe where they're co building the next generation of cyber security teams and technology it's produced by print street media the coordinating producer is jennifer ivan editor john patrick technical editors chris russell executive editor is peter kilby and i'm dave bittner thanks for listening.

maryland producer peter kilby chad seaman hewlett foundation chris russell executive editor dave bittner
"dave bittner" Discussed on The CyberWire

The CyberWire

02:38 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Hello everyone and welcome to the cyber wires research saturday presented by the hewlett foundation cyber initiative i'm dave bittner and this is our weekly conversation with researchers and analysts tracking down threats and vulnerabilities and solving some of the heart problems of protecting ourselves in a rapidly evolving cyberspace thanks for joining us and now a moment to tell you about our sponsor the hewlett foundation cyber initiative while government and industry focus on the latest cyber threats we still need more institutions and individuals who take a longer view they're the people who are helping to create the norms and policies that will keep us all safe in cyberspace the cyber initiative supports cyber policy field that offers thoughtful solutions to complex challenges for the benefit of societies around the world learn more at hewlett dot org slash cyber and thanks also to our sponsor and vale whose revolutionaries zero reveal solution closes the last gap in data security protecting data in use it's the industry's first and only scalable commercial solution enabling data to remain encrypted throughout the entire processing life cycle imagine being able to analyze search and perform calculations on sensitive data all without ever decrypted anything all without the risks of theft or inadvertent exposure what was once only theoretical is now possible within bail learn more at n vail dot com universal plug and play was rolled out by microsoft and it was intended to make networking in consumer environment user friendly and automatic that's chad seaman he's a senior cert engineer at our conversation centers on their recently published white paper upn proxy lack hat proxies via net injections if your xbox if you're loading up a game and and it needs ports sixty through sixty one thousand with udp it may send traffic to you on requests that you did not necessarily initiate your net will block that so if if something is attempting to come into your network but the net has not seen you communicate out on those ports it will not know that that traffic is destined for you won't really know what to do with it so it will just throw it away so what net was made for was your machine behind your router could inter.

dave bittner theft engineer hewlett foundation microsoft chad seaman
"dave bittner" Discussed on The CyberWire

The CyberWire

02:18 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Major funding for the cyber wire podcast is provided by silence from the cyber wire studios data tribe i'm dave bittner with your cyber wire summary for friday may twenty fifth twenty eighteen the us f b i is generally being credited with having placed a significant impediment in front of a vpn filter attack widely regarded as the work of fancy bear russia's military intelligence service gru which goes by other names as well including safi and ab t twenty eight vpn filter appeared poised for a major campaign against ukraine the two suspected triggering events tomorrow's football champions league match in kiev real madrid versus liverpool and ukraine's constitution day june twenty eighth remained in the future so we'll see how well the bureau did but so far bravo fbi should such an attack materialized it's likely to be easily contained within ukraine the country has been patient zero for other attacks that have gone global notably not pecchia also widely regarded as made in russia vpn filter is regarded as capable of accomplishing the usual things about net can do so the case will bear watching security firm vast warns that it's found a number of discount android phones that shipped from factory to customer with malware already installed in their firmware it's adware and it's called co saloon it's the work of a criminal group that was uncovered in two thousand sixteen by researchers at the security company dr web they're back in or still in business it's the same co saloon code on changed since it first appeared according to a vast this time around the affected phones are from manufacturers including z t r coasts and my phone the majority of the infected devices aren't according to a vast certified by google which is pursuing various mitigations and talking to the firm where vendors most of the problematic phones are in russia italy germany and the uk with some in the us as well this case is interesting because the infection point seem so far to be unidentified someone however has clearly managed to compromise.

dave bittner russia kiev liverpool ukraine uk football google germany twenty fifth
"dave bittner" Discussed on The CyberWire

The CyberWire

01:58 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Major funding for the cyber wire podcast is provided by silence from the cyber wire studios at data tribe i'm dave bittner with your cyber wire summary for thursday twentyfourth when he eighteen cisco's talos research unit yesterday reported its discovery of vpn filter a modular and stealthy attack that's assembled about net of some five hundred thousand devices mostly routers located in ukraine there's considerable code overlap with the black energy malware previously deployed and attacks against ukrainian targets and the us government has attributed the vpn filter campaign to the sophist threat group also known as fancy bear or russia's gru military intelligence service it's believed that vpn filter has been quietly out there for nearly two years it's precise infection mechanisms aren't entirely clear but consensus holds that it established itself by exploiting known vulnerabilities left unpacked and by gaining it's entree into devices by taking advantage of weak or default passwords the malware is regarded as sophisticated it can use any one of three redundant means of communicating with its command and control servers through the photo bucket photo sharing site through a hard coded domain no to all dot com and finally if all else fails a fallback direct connection from the attackers to the compromise device itself cisco notes that the malware moves through a three stage process in stage one vpn filter installs itself in such a fashion as to survive device reboots and to discover the ip address of the stage to deployment server in stage two it downloads malware to the effected device that malware can collect an exfiltrated files and data as well as manage the device in execute code on it stage three involves installation.

dave bittner cisco ukraine us two years
"dave bittner" Discussed on The CyberWire

The CyberWire

02:00 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Major funding for the cyber wire podcast is provided by silence from the cyber wire studios at data tribe i'm dave bittner with your cyber wire summary for tuesday may twenty second twenty eighteen another speculative execution flaw similar to specter meltdown has been discovered by google's project zero the vulnerability is explainable by speculative store bypass which could expose user data across a broad range of devices intel is calling it variant four and classifying it as medium risk microsoft is even more optimistic characterizing the risk to users as low but variant four which has been designated cv twenty eighteen thirty six thirty nine is being taken seriously the issue isn't confined to intel chips it affects both intel and amd x86 chipsets power eight power nine systems e and some arm processors as well exploitation of the side channel 'vulnerability could allow unauthorized read access to memory on afflicted systems speculative execution is an optimization technique chip designers used to speed tasks by performing some of them before strictly speaking there needed it uses a history of branch executions to predict tasks before they've been called for this makes more efficient use of processing resources employing them as they're available to accomplish tasks that will probably be wanted the disclosure has been coordinated among intel amd arm ibm microsoft and other tech firms some vendors have already issued mitigations those who face a more challenging patching problem including intel intend to make fixes available within the next few weeks analysts tell users to expect some performance decline after applying patches intel says tests of the coming fixes have shown a to eight percent decline in performance.

dave bittner google microsoft intel amd ibm eight percent twenty second
"dave bittner" Discussed on Grumpy Old Geeks

Grumpy Old Geeks

01:41 min | 3 years ago

"dave bittner" Discussed on Grumpy Old Geeks

"Because you know schools are starting to assign kids ipads and everybody likes to use the pads and religiously instead students overwhelmingly prefer to read digitally but reading was significantly faster online that in print and students judge their comprehension is better online than in print but that is not what is actually happening branch in is way better for print versus digital reading the medium doesn't matter for general questions like understanding the main idea of the text but when it comes to specific questions comprehension is significantly better when participants read printed texts as opposed to digital text so there is something to that paper wonder what's going on there yeah me too i don't know but it's it's definitely interesting this is the kind of stuff that got me super interested in psychology i kind of wish born too soon kind of thing i would love to be in school right now studying this yeah really security we're back this week with dave bittner from the cyber wire podcast in the cyber is a free community driven cybersecurity new service based in maryland welcome back dave hello gentlemen welcome back for me and brian i want to say welcome back to brian actually missed you last week yes sorry i could not be here but i did enjoy the segment as usual good good glad you're back so before we get going jason i noticed a last episode you touched on the new cobra kai show on youtube and yes and i watched the first two episodes yesterday and i have to say midway through the first episode i caught myself going i really enjoying this.

dave bittner maryland youtube brian
"dave bittner" Discussed on The CyberWire

The CyberWire

02:38 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Hello everyone and welcome to the cyber wires research saturday presented by the hewlett foundation cyber initiative i'm dave bittner and this is our weekly conversation with researchers and analysts tracking down threats and vulnerabilities and solving some of the heart problems of protecting ourselves in a rapidly evolving cyberspace thanks for joining us and now a moment to tell you about our sponsor the hewlett foundation cyber initiative while government and industry focus on the latest cyber threats we still need more institutions and individuals who take a longer view they're the people who are helping to create the norms and policies that will keep us all safe in cyberspace the cyber initiative supports cyber policy field that offers thoughtful solutions to complex challenges for the benefit of societies around the world learn more at hewlett dot org slash cyber and thanks also to our sponsor and vale whose revolutionaries zero reveal solution closes the last gap in data security protecting data in use it's the industry's first and only scalable commercial solution enabling data to remain encrypted throughout the entire processing life cycle imagine being able to analyze search and perform calculations on sensitive data all without ever decrypted anything all without the risks of theft or inadvertent exposure what was once only theoretical is now possible within bail learn more at n vail dot com researchers have a lot of interpersonal relationship with various researchers across the field that's richard hummel he's manager of the acer threaten telling team at arbor networks the security division of net scout the research were discussing today is titled low jack becomes a double agent this particular one came as a temp to one of those researchers initially when received it it was hey here's a malicious binary there's something you know off about it we didn't really have a whole lot to go on i'm so it's kind of a kickoff our research into this particular finding described to me what's going on with low jack i remember years ago i think low started out as a brand that would protect your cars from being stolen and then somewhere over the years that brand pivoted and became known for protecting computers kinda what letter to the whole low jack research if you will back in two thousand fourteen with a black hat presentation that's researchers dead on what was then known as computrac.

dave bittner theft richard hummel acer hewlett foundation
"dave bittner" Discussed on The CyberWire

The CyberWire

02:04 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Quoted future for sponsoring our show major funding for the cyber wire podcast is provided by silence from the cyber wire studios that data tribe i'm dave bittner with your cyber wires summary for friday may eighteenth twenty eighteen researchers at security company fortinet have found a new variant of the mirai internet of things but net in the wild they call it wicked and say that it uses three modules scanner attack and killer unlike the original mirai which brute force its way into vulnerable connected devices wicked makes use of known exploits to establish access it scans ports to establish a connection with its targets and uses an exploit appropriate to that connection wicked seems to be the work of the same coder who produced the seora owari and omni botnets security firm risk iq has a report out on mute kit and the russian mob behind it mu kid is an ethereal fishing tool that makes novel use of automation in its attacks mu kit is interesting in the way it uses automation in the service of theft it begins with a phishing email that's designed to induce the victims to go to a phony my ether wallet the landing page harvests credentials in the old familiar way where mute kit represents an advance comes next it has a module that automatically uses the credentials to drain the victims real ether wallets into the hoods accounts as risk iq explains mucus combines traditional fishing with an automated transfer service to take advantage of what risk iq caused the relatively loose security of my ether wallet the specific gang behind mute kid is still unknown but the ip addresses and use and certain linguistic quirks in the scam.

dave bittner fortinet theft
"dave bittner" Discussed on The CyberWire

The CyberWire

01:53 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Major funding for the cyber wire podcast is provided by silence from the cyber wider studios data tribe i'm dave bittner with your cyber wire summary for wednesday may sixteenth eighteen researchers at lookout described to extensive pakistani cyber espionage campaigns stealth mango which targets android devices and tange alot which works against s the targets were diplomatic military and governmental personnel in india the uae and afghan stan with strong interest shown in collecting against pakistani dissidents as well some australian u s and german officials were apparently swept up in the campaigns thought to be run by pakistan's military and using convincing spoof sites including bogus apps stores in conjunction with fishing to net the victims a vietnamese state directed group has compromised cambodia's panam pen post website to infect vietnamese dissidents and cambodian human rights activists with spyware the watering hole was established shortly after ownership of the paper changed signal the secure messaging app gets high marks for quick response to responsible disclosure last thursday researchers told the aps developers about the cross site scripting issue they'd found signal had a patch ready within about four hours of notification the us department of homeland security has released its long end ticipant strategy the plan has these major goals better risk identification improved reduction of both threats and vulnerabilities better attack mitigation reduction of threats and vulnerabilities mitigating the consequences of cyber attacks developing infrastructure resilience and improving management of the departments cyberport folio.

dave bittner uae pakistan cambodia india us four hours
"dave bittner" Discussed on The CyberWire

The CyberWire

01:58 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Major funding for the cyber wire podcast is provided by silence from the cyber wires studios that data tribe i'm dave bittner with your cyber wire summary for monday may fourteenth two thousand eighteen at the end of last month there was an attempted raid on mexico's banking transfer system mexico's central bank now says that it appears there may have indeed been successful unauthorized transfers through the country's interbank s p e i system three banks were initially said to have been affected banco del beheco essay bancomex and grupo financiero by norte those three and two other financial institutions where asked to move to a backup connection to the central bank after experiencing difficulties connecting through spic the country's interbank electronic transfer system the attack seemed at the time of the initial announcement to have been contained as the bank shifted their connections to an alternative contingency system since then however more than twenty five financial institutions have also moved to backup systems and mexico's central bank says that it appears there may have indeed been unauthorized transfers through the countries interbank sp system at least one bank experienced an incident last week the story continues to develop in a surprising development over the weekend us president trump seems willing to toss his e t e some sort of unspecified lifeline to keep them in business z t e has been subject to us sanctions that effectively barred it from using us software and components in its products the company last week announced it had stopped its major operations the us beef with z t e centered on the company's flouting of sanctions imposed on iran and then lying about it that's the offense that prompted the commerce department to impose sanctions there have.

dave bittner mexico trump iran president us
Mexico's banking system misplaces $18M to $20M in transfers

The CyberWire

01:58 min | 3 years ago

Mexico's banking system misplaces $18M to $20M in transfers

"Major funding for the cyber wire podcast is provided by silence from the cyber wires studios that data tribe i'm dave bittner with your cyber wire summary for monday may fourteenth two thousand eighteen at the end of last month there was an attempted raid on mexico's banking transfer system mexico's central bank now says that it appears there may have indeed been successful unauthorized transfers through the country's interbank s p e i system three banks were initially said to have been affected banco del beheco essay bancomex and grupo financiero by norte those three and two other financial institutions where asked to move to a backup connection to the central bank after experiencing difficulties connecting through spic the country's interbank electronic transfer system the attack seemed at the time of the initial announcement to have been contained as the bank shifted their connections to an alternative contingency system since then however more than twenty five financial institutions have also moved to backup systems and mexico's central bank says that it appears there may have indeed been unauthorized transfers through the countries interbank sp system at least one bank experienced an incident last week the story continues to develop in a surprising development over the weekend us president trump seems willing to toss his e t e some sort of unspecified lifeline to keep them in business z t e has been subject to us sanctions that effectively barred it from using us software and components in its products the company last week announced it had stopped its major operations the us beef with z t e centered on the company's flouting of sanctions imposed on iran and then lying about it that's the offense that prompted the commerce department to impose sanctions there have.

Dave Bittner Mexico Donald Trump Iran President Trump United States
"dave bittner" Discussed on The CyberWire

The CyberWire

02:38 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Hello everyone and welcome to the cyber wires research saturday presented by the hewlett foundation cyber initiative i'm dave bittner and this is our weekly conversation with researchers and analysts tracking down threats and vulnerabilities and solving some of the heart problems of protecting ourselves in a rapidly evolving cyberspace thanks for joining us and now a moment to tell you about our sponsor the hewlett foundation cyber initiative while government and industry focus on the latest cyber threats we still need more institutions and individuals who take a longer view they're the people who are helping to create the norms and policies that will keep us all safe in cyberspace the cyber initiative supports cyber policy field that offers thoughtful solutions to complex challenges for the benefit of societies around the world learn more at hewlett dot org slash cyber and thanks also to our sponsor and vale whose revolutionaries zero reveal solution closes the last gap and data security protecting data in use it's the industry's first and only scalable commercial solution enabling data to remain encrypted throughout the entire processing life cycle imagine being able to analyze search and perform calculations on sensitive data all without ever decrypted anything all without the risks of theft or inadvertent exposure what was once only theoretical is now possible within bail learn more at n vail dot com i think the bulk of the researchers were brought together after a conference that occurred december twenty sixteen that's bobby filer he's a principal data scientist at endgame the research were discussing today is titled the malicious use of artificial intelligence forecasting prevention and mitigation there was kind of a formal panel some of the conversation was laid out about the the needs or requirements to establish a little bit more rigor within the research community to establish norms kind of garner some sort of aspects of safety and ethics over the next six months i believe they laid the groundwork coming together with the three pillars kind of the political digital and physical security aspects myself and hiram anderson another data scientist here at endgame were brought in to specifically contribute to the site.

dave bittner theft bobby filer hewlett foundation principal hiram anderson scientist six months
"dave bittner" Discussed on The CyberWire

The CyberWire

01:56 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Major funding for the cyber wire podcast is provided by silence from the cyber wire studios data tribe i'm dave bittner with your cyber wire summary for friday may eleventh eighteen we begin with some notes on hacktivists and vigilantes to take up the vigilantes i one such enging neten has decided to take on the zoo park surveillance group conspiracy discovered operating in the middle east the vigilante has released a good tron of what he or she discovered sending it onto motherboard in the expectation of striking a blow against zoo parks continuing ability to operate quietly against its victims the vigilante also tempts fate with a lot of coldly disparaging remarks about the folly of code reuse any attacker who would reuse code so freely vigilante suggests is a skid without skills the other group we might mention is the crew of activists who oppose the us state of georgia's proposed computer security bill by facing various sites in the peach state the proposed law state bill three fifteen was vetoed tuesday by governor nathan deal the hacktivists have said in effect mission accomplished and they will no longer do anymore digital strong arming it's good they're stopping but they've set an unfortunate example the proposed bill was sufficiently illconceived that widespread rational argument from the security industry and elsewhere would probably have been all the opposition the governor needed there's no indication that governor deal was moved by fear of the hacktivists he was probably moved by concerns about criminalizing legitimate white hat work and by the possible difficulty of voiding widespread unintended consequences should enterprises to vigorously avail themselves of the bills hack back provision as the governor said in the statement.

dave bittner us georgia zoo park nathan
"dave bittner" Discussed on The CyberWire

The CyberWire

02:14 min | 3 years ago

"dave bittner" Discussed on The CyberWire

"Major funding for the cyber wire podcast is provided by silence from the cyber wire studios at data tribe i'm dave bittner with your cyber wire summary for thursday may tenth twenty eighteen as the us announced its intention to withdraw from the iranian nuclear deal agreement concerns have risen over the prospects of renewed iranian cyber offenses iran had been active against a number of targets in cyberspace but it state directed cyberattacks went into partial eclipse in twenty fifteen that lull is generally attributed to iran's response to relaxation of sanctions but followed conclusion of the joint comprehensive plan of action popularly known as the iran nuclear deal in july of twenty fifteen under the joint comprehensive plan of action iran undertook to limit or delay certain aspects of its nuclear weapons program on april thirtieth of this year u s n israeli authorities stated that iran had failed to disclose a past covert nuclear program to international atomic energy agency inspectors and this tuesday president trump announced that the us would withdraw from the joint comprehensive plan of action the us decision to withdraw from the agreement is expected to reverberate in cyberspace with concerns about critical infrastructure becoming sharper we heard from drago's ceo robert m lee who reminded us that when tension rises between states so does the targeting of industrial control systems lee said quote in this case activity moves beyond conducting early reconnaissance to gaining access to infrastructure companies and stealing information that could be used at a later date however simply having access to the information does not mean an attack is easy or imminent avoiding such tension while also defending against such aggressive efforts is the goal and quote thus cyber risk can be reliably forecast to follow geopolitical tension feel near a vice president of industrial cybersecurity at cyberattacks a company specializing in ics skater and industrial iot security reminded us that quote iran has along.

dave bittner us cyberattacks iran trump drago ceo robert m lee vice president president
"dave bittner" Discussed on Grumpy Old Geeks

Grumpy Old Geeks

01:32 min | 3 years ago

"dave bittner" Discussed on Grumpy Old Geeks

"Very funny so facebook tv or facebook watch or whatever the hell they're calling it i could see it being a thing someday but it's just very funny right now and it was quite the interesting experience i it sounds like it now one of the things that we had back in chicago it was you could everybody hates the tv commentary for the most part so we love the radio commentary so what you could do is you just turn off your tv and then you buy a little cubs radio the cubs radio has a genius feature it's basically like a tv show so depending on where you're at and where your signal is and how like how to sink it it has a little knob that you can offset the timing who so it will absolutely match the what's you're seeing on tv is that not the coolest thing ever that is very cool i liked i wish the dodgers get on that yeah it was like twenty bucks i'm sure there's probably a generic radio that you can get to find that but yeah it was just a little little portable radio with an antenna that you put some you know double as in and you put it by your tv and you literally can just turn the knob to sink it right up with your tv i thought it was amazing very cool security we're back this week with dave bittner from the cyber wire has going dave pretty good gentlemen glad to be back hope everybody's doing well though of course we are.

chicago dodgers dave bittner facebook cubs