By Alec Davison, Gate 15 Junior Risk Analyst Just as businesses depend on email to conduct their day-to-day operations, threat…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
By David Pounder The latest active shooter report from the FBI provides data to support what may have been easily…
Enjoy our newest podcast accessible on Anchor, Spotify, Apple, Google, and wherever you enjoy your favorite podcasts! See more links on the Anchor page. In…
by Gate 15’s Managing Director, Andy Jabbour I had the opportunity to participate in a call this morning led by…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
Enjoy our newest podcast accessible on Anchor, Spotify, Apple, Google, and wherever you enjoy your favorite podcasts! See more links on the Anchor page.…
On 12 Oct 2021, Josh Meyer, @JoshMeyerDC, wrote an article titled, “The next big cyberthreat isn’t ransomware. It’s killware. And it’s…
In the latest edition of Nerd Out, Dave is joined by nerdette Bridget Johnson, and nerd Joe Levy to take…
This month, the National Council of ISACs (NCI) published a new paper, National Council of ISACs Statement of Ransomware, stating,…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
After a a busy couple of weeks, the merry band of Nerdies gathered to discuss the latest news on the…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
The Nerd Out! Security Panel Discussion podcast episodes are recurring discussions among our team and our valued guests as we explore the all-hazards…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
By Evan Pounder As we continue to develop more advanced and effective approaches to combat attacks made by threat actors,…
By Ben Taylor Incident Overview On 05 Feb, unidentified cyber actors accessed the supervisory control and data acquisition (SCADA) system…
The Nerd Out! Security Panel Discussion podcast episodes are recurring discussions among our team and our valued guests as we explore the all-hazards…
The terms we use for threats are important as they should help to clearly identify what we’re talking about and…
Following a recent Better Business Bureau (BBB) warning, on 05 Feb, the Federal Trade Commission (FTC) and Federal Bureau of…
By Evan Pounder With barley a moment’s notice, on December 25th, telecommunication, credit card machines, emergency services, and flights in…
In this episode of The Gate 15 Interview, Andy Jabbour enjoys a really fun talk with Runa Sandvik and Brad Barkett, two security veterans both…
By Evan Pounder Over the past year, the world has been grappling with the ever-evolving impacts of the Covid-19 pandemic.…
The Nerd Out! Security Panel Discussion podcast episodes are recurring discussions among our team and our valued guests as we explore the all-hazards…
By Andy Jabbour Part of effective risk management is understanding not only the threats and risks we are facing today…
Covering a security incident in Argentina, on 06 September, Lawrence Abrams (BleepingComputer) wrote, “Argentina’s official immigration agency, Dirección Nacional de…
Security professionals and their organizations, journalists, media organizations, and all those who may have access to security-related privileged information, are acting recklessly and irresponsibly when they publicly post that information, contrary to the designated information handling guidance associated with that information.
In a blog post on 08 Aug, security researchers at SenintelLabs (@LabsSentinel; the Threat Intelligence and Malware Analysis team for…
This month we are airing part two of the inaugural episode of The Cybersecurity Evangelist where Travis Farral and I finish demystifying cybersecurity myth #2 and #1. Listen to find out where the term “hacking” came from, and more about different types of “hackers”…including the good ones. Travis and I also give a quick nod to our inner geek. We wrap up the discussion with how we are ALL targets of opportunity, even if we don’t have an online presence. And why it is important to overcome the “it won’t happen to me mindset.” Finally, Travis leaves us with his final thought: spend a few minutes trying to educate yourself on ways you can protect your family.
the Gate 15 team discusses geopolitics and the impacts they have on organizations around the world. The team touches on security concerns around current issues including U.S.-China tensions and why TikTok is a topic of discussion and the idea that how nations and leaders see each other – as adversaries or competitors – is also an important consideration. Listen to Dave, Jorhena, Jen, and Andy then speak on the importance of partnerships and the need to build and engage in trusted relationships and information sharing. But they couldn’t completely escape the enduring threats of ransomware and COVID, and they weighed in on the continued impact it is having on sports leagues while hearing Andy’s hope for his favorite football team. Andy also shares his current earworm struggles and gets mocked for his choice of attire…