Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY!
Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today.
If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and help bring to light the very real dangers of our increasingly digitally dependent society.
Zero Trust may be one of many important layers to keeping your data and money safe!
All content for Ransomware Battleground is the property of Syya Yasotornrat and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY!
Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today.
If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and help bring to light the very real dangers of our increasingly digitally dependent society.
Zero Trust may be one of many important layers to keeping your data and money safe!
Big Game Hunting, the targeted large-scale ransomware campaign, is now regarded as the primary cyber threat to organizations across all sectors including financial, healthcare, and government in 2021.
In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer. What is really happening here? What tactics and measures should you consider in the ransomware battleground for attacks like this? It is an honor to welcome Information Security Evangelist, Mr. Jeff Man, to join for a timely topic.
In this ransomware battleground, we are looking into double-extortion attacks. What are they? And how do they get triggered? How do you defend against this type of attack? Join this podcast with Syya and our elite cybersecurity guest to spot the IOCs and know-how Zero Trust Isolation can help in your defense.
This episode discusses recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.
Ransomware has evolved beyond the commodity, widespread attacks intended to infect a single endpoint to include more advanced techniques, such as fileless malware and data exfiltration. One of the biggest drivers behind ransomware’s continued success is the adoption of the Ransomware as a Service (RaaS) distribution model.
Sensational SolarWinds breach brought our attention to supply chain management and network management service (nms). Now, in 2021, what do we know now that we did not? In this episode, Adam Pennington, Principal Cybersecurity Engineer at MITRE, will give us the technical contexts on why Zero Trust Security is the critical piece in the puzzle and reviews how MITRE ATT&CK Framework can be applied in Solarwinds Supply Chain software breach.
CISO experts in public sector - Mike Davis and Simon Mijolovic. Ritesh Agrawal, CEO of Airgap Networks, join Syya Yasotornrat on the intial thoughts on the SolarWinds Supply Chain Attack.
Ransomware cyberattacks are a big business. With so many ransomware attack incidents happening, let's hear Syya and Ritesh Agrawal, CEO of Airgap, chat on this very timely topic.
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY!
Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today.
If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and help bring to light the very real dangers of our increasingly digitally dependent society.
Zero Trust may be one of many important layers to keeping your data and money safe!