Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/05/32/c8/0532c82e-6454-d6d5-3886-af8065172bf4/mza_15369545806345330647.jpg/600x600bb.jpg
Security Soapbox | Privacy, Security and Everything in Between
Lookout
44 episodes
5 days ago
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
Show more...
Tech News
News
RSS
All content for Security Soapbox | Privacy, Security and Everything in Between is the property of Lookout and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
Show more...
Tech News
News
Episodes (20/44)
Security Soapbox | Privacy, Security and Everything in Between
Q1 2025 Mobile Threat Landscape Overview

The Q1 2025 Lookout Mobile Threat Landscape Report highlights emerging human risk and AI as the primary drivers of security threats. This most recent report emphasizes that attackers are targeting individuals through their mobile devices early in their attacks – exploiting the native trust we have in these devices and our natural tendencies to engage with communications that drive curiosity.

Show more...
4 months ago
5 minutes 57 seconds

Security Soapbox | Privacy, Security and Everything in Between
Cybersecurity Predictions: A Look into 2025's Security Landscape

2024 saw a surge in cyberattacks alongside rapid tech advancements, making it clear that staying ahead in the digital world is more important than ever.

In this week's session, we’ll explore the top cybersecurity predictions for 2025 — highlighting emerging threats, key trends, and the latest strategies for fortifying your defenses.

Listen as our expert panel shares valuable insights and predictions on:

  • New ransomware tactics and data breach methods

  • How AI is shaping both security solutions and cyberattacks

  • Growing threats from nation-states

  • The latest security regulations and compliance frameworks

Show more...
9 months ago
41 minutes 17 seconds

Security Soapbox | Privacy, Security and Everything in Between
Securing Democracy: Election Integrity, Threats and Solutions with Jim Coyle

On this week’s episode of Security Soapbox, we are joined by Jim Coyle, US Public Sector Field CTO at Lookout. We’re diving into the hot topic of election security; unpacking various threats, like disinformation campaigns, cyber espionage, and weaknesses in our election infrastructure — and who’s behind them. We’ll also chat about current protective measures and some innovative ideas, like using blockchain to fight misinformation.

Watch the Billington Cybersecurity Summit session on Election Security here.


Follow Hank on LinkedIn

Follow Jim on LinkedIn


Show more...
1 year ago
32 minutes 46 seconds

Security Soapbox | Privacy, Security and Everything in Between
Why is my CEO Texting me? What to do About Executive Impersonation Attacks

We’ve all received that urgent text message from our “CEO” asking us to take care of an urgent task. This form of social engineering has become a preferred tactic by threat actors who want to create a high-pressure situation in order to convince employees to send money or share sensitive data. 

This week’s episode will cover the why and how behind these attacks. We will also cover the critical role they play in the modern kill chain and how to protect against them. 

To see how Lookout protects against advanced smishing and executive impersonation attacks, read our release blog or watch the short overview video below. 

Blog: https://www.lookout.com/blog/smishing-prevention-executive-impersonation

Video: https://vimeo.com/1009294652  


Show more...
1 year ago
5 minutes 12 seconds

Security Soapbox | Privacy, Security and Everything in Between
Advanced Web Threats: Data Leaks, Shadow IT, and AI

On this week’s episode of Security Soapbox, we are joined by Charity Spiri, who oversees the Security Service Edge (SSE) product portfolio at Lookout. Were challenging the common perception of web-based threats being solely network attacks. Web threats encompass a wider range of risks, including data leakage, shadow IT, and security concerns from AI platforms. While not entirely new issues, these pose significant challenges within the ever-evolving web-based threat landscape.

For a deeper dive into advanced web threats and how to protect your organization, check out Charity’s recent session, Defending Against Advanced Threats with a Modern Secure Web Gateway.


Follow Hank Schless on LinkedIn

Follow Charity Spiri on LinkedIn


Show more...
1 year ago
13 minutes 48 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | A New EU Mandate Makes iOS Less Secure

In this week's episode of 5 Minute Friday, we discuss the new Digital Markets Act (DMA) in the EU and its potential impact on iOS security. We talk through the possible security risks and malware threats that could come from opening iOS devices to third-party app stores.

To keep up to date on current threats: ⁠www.lookout.com/threat-intelligence

Show more...
1 year ago
6 minutes 32 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | BadBazaar: iOS and Android Used to Target Tibetans and Uyghurs

In this week's episode of 5 Minute Friday, we discuss BadBazaar, an iOS & Android surveillanceware by China's APT-15, designed to target Uyghur Muslims. We take a dive into the invasive nature of Chinese "pre-criminal" surveillance and BadBazaar's recent expansion to iOS devices, providing insights into its early development and the evolving landscape of mobile threats.


To keep up to date on current threats: www.lookout.com/threat-intelligence

Show more...
1 year ago
4 minutes 38 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | Critical Vulnerabilities in iOS & Android

In this week's episode of 5 Minute Friday, we discuss three critical vulnerabilities affecting both iOS and Android devices. We also discuss the importance of patching these vulnerabilities, and the modern phishing attack tactics used to exploit them.


To keep up to date on current threats: www.lookout.com/threat-intelligence

Show more...
1 year ago
5 minutes 2 seconds

Security Soapbox | Privacy, Security and Everything in Between
Unveiling the Impact of Cyber Poverty with Ramy Houssaini

In this episode, host Hank Schless welcomes back Ramy Houssaini, Chief Cyber & Technology Risk Officer at BNP Paribas and Founding Chair of The Cyber Poverty Line Institute. They explore the concept of 'cyber poverty,' and shed light on the global disparity in cybersecurity resources, highlighting the critical need for inclusive cyber capability building to safeguard individuals and societies worldwide.


For more information on the Cyber Poverty Line Institute, visit: www.cyberpovertyline.org


For more information on Lookout, visit: www.lookout.com


Connect with Ramy Houssaini on LinkedIn here: www.linkedin.com/in/strategicleadership

Connect with Hank Schless on LinkedIn here: www.linkedin.com/in/hank-schless

Show more...
1 year ago
28 minutes 52 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | Robin Banks: A Poster Child for MFA Bypass

In this week's episode of 5 Minute Friday, we discuss the resurgence of the Robin Banks, a phishing-as-a-service kit, and its tactics like MFA bypass. We also discuss related threats such as 0ktapus, showcasing evolving cyber threats and the replication of successful attack methods among different groups.

To stay up to date on recent threat intelligence, ⁠⁠click here⁠.

Show more...
1 year ago
3 minutes 32 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | Dropper as a Service

In this episode of 5 Minute Friday, we discuss droppers, a type of mobile malware that serves as a middleman between a target device and the threat actor's command and control server. Droppers are now being offered as a service, which could enable more advanced malware to get on more devices. 

To stay up to date on recent threat intelligence, ⁠click here⁠.


Show more...
1 year ago
4 minutes 36 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | Arid Viper: The Mobile Malware Threat

In this episode of 5 Minute Friday, we discuss recent research related to the advanced persistent threat (APT) group Arid Viper. Learn about how their tactics for targeting mobile users are exemplary of an attack chain that many cybercriminals use and why it's so effective


To stay up to date on recent threat intelligence, click here.

Show more...
2 years ago
4 minutes 29 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | Unveiling Infamous Chisel, Sandworm, and Deblind

In this episode of Five Minute Friday, we delve into the shadowy world of cyber espionage as we explore Infamous Chisel, Sandworm, and Deblind. Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel. Learn about Deblind, a system-level Android app that operates with unprecedented privileges, collecting user activity and suppressing security warnings.


For more information, visit: www.lookout.com/threat-intelligence/article/russian-sandworm-apt-infamous-chisel-deblind-spyware

Show more...
2 years ago
4 minutes 29 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | Red Alert-Rocket Alerts: A Malicious Threat Exploiting Societal Disruption

In this episode of Five Minute Friday, we discuss how societal disruption creates opportunities for malicious actors to exploit people's uncertainties. In this case, we examine a recent case where a malicious version of the legitimate mobile app, RedAlert - Rocket Alerts, was distributed, targeting individuals in Israel.


To stay protected against these types of mobile threats, click here.

Show more...
2 years ago
5 minutes 3 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | iLeakage: The Hidden Threat to Your iOS Device

On this week’s episode of 5 Minute Friday, we are discussing a recent iOS vulnerability, iLeakage, that exploits your web browser including opened tabs and login credentials. Learn more about iLeakage and the importance of protecting your mobile device —  the device that goes everywhere you do.


For additional resources on protecting your mobile device, visit: www.lookout.com/products/endpoint-security/mobile-endpoint-security

Show more...
2 years ago
3 minutes 46 seconds

Security Soapbox | Privacy, Security and Everything in Between
5 Minute Friday | Scattered Spider, MGM, and Caesars

Caesars Entertainment and MGM resorts were recently breached by a well-known cybercrime group, Scattered Spider. Listen to this week’s 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target.


For a deeper dive, visit: www.lookout.com/documents/threat-reports/us/lookout_tg_scatteredspider.pdf

Show more...
2 years ago
4 minutes 53 seconds

Security Soapbox | Privacy, Security and Everything in Between
Soap Suds: Protect Your Data From Risky Apps Like TikTok

Recent hype around Chinese apps TikTok and Pinduoduo has put a spotlight on the risk surrounding mobile apps. In this quick-fire Soap Suds episode, host Hank Schless discusses the concerns behind these Chinese apps and highlights the reasons why organizations need to keep tabs on mobile apps in general to minimize the risk to their data.


For more information on data collection related security threats and how to ban risky apps like TikTok, check out our blog: https://bit.ly/tiktok-podcast

Show more...
2 years ago
6 minutes 23 seconds

Security Soapbox | Privacy, Security and Everything in Between
Data Overload: Edge Computing Augmenting Our Cloud-first World (ft. Said Ouissal/ZEDEDA)

With more devices than humans in our world today, the amount of data being generated is higher than ever, with no sign of slowing down. Enter: edge computing.

In this episode, host Hank Schless is joined by Said Ouissal, Founder and CEO at ZEDEDA, to discuss edge computing — from its business applications to the challenges of securing the technology and everything in between.

Show more...
2 years ago
22 minutes 30 seconds

Security Soapbox | Privacy, Security and Everything in Between
Don’t Think Twice, Modern IT is Alright: Top Ways to Modernize Your IT Today (ft. Faz Sadikali, Cloud Insights)

Organizations are making big decisions to implement cloud solutions to boost collaboration and gain competitive advantage. But many aren’t prepared to handle the risks that cloud services introduce. In this episode of Security Soapbox, host Hank Schless talks shop with Faz Sadikali, Founder of Cloud Insights, on how to build secure workstreams and level up IT to reap the benefits of the cloud while ensuring data remains secure.

Read Faz's blog about IT modernization here: https://bit.ly/3h3qqlW

Show more...
2 years ago
20 minutes 48 seconds

Security Soapbox | Privacy, Security and Everything in Between
The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware

With the rapid adoption of BYOD and the growing remote workforce, IT and security teams are just catching on to the need for mobile security to protect corporate data and assets. In this episode, host Hank Schless is joined by Cile Montgomery, Product Line Marketing Manager at VMware, to discuss the new risks mobile devices present to organizations and what trends to expect in the next year for mobile security.

Show more...
2 years ago
17 minutes 8 seconds

Security Soapbox | Privacy, Security and Everything in Between
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.