Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/80/12/9a/80129a22-1569-15a5-f9f2-481d3dcd6e66/mza_541581342092235567.jpg/600x600bb.jpg
Into the Breach by IBM
IBM
14 episodes
9 months ago
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…
Show more...
Technology
Education
RSS
All content for Into the Breach by IBM is the property of IBM and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…
Show more...
Technology
Education
https://files.casted.us/73521bc6-ab5c-499b-a61c-0e8e3a5399a4.jpg
Now You See Me, Now You Don't: How Cryptocurrency Regulation Can Make it Harder For Cybercriminals to Escape
Into the Breach by IBM
28 minutes
3 years ago
Now You See Me, Now You Don't: How Cryptocurrency Regulation Can Make it Harder For Cybercriminals to Escape

Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law enforcement to trace criminals who demand cryptocurrency payments. But is there a way to regulate cryptocurrency in a way that provides fewer hiding places for criminals—but doesn’t disrupt the market? We speak with Megan Stifel, Policy Officer at the Global Cyber Alliance, who as part of the Ransomware Task Force, issued the recommendation to closely regulate cryptocurrency—but still preserve the market.


Key Takeaways:

00:08 - 01:15 Intro to the episode

01:37 - 03:00 How easy is it for threat actors to hide funds and cover their trail?

05:28 - 08:14 The scale and scope of ransomware

12:00 - 14:25 Regulation that allows the market for investors to remain but also helps locate criminal actors

15:04 - 17:06 Blacklisting: Target known accounts or try to regulate the entire market?

17:33 - 19:16 Are sanctions effective, and why is it being used? How will it work?

19:57 - 24:48 Cryptocurrency mixing services

Into the Breach by IBM
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really? On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…