The Nerd Out! Security Panel Discussion podcast episodes are recurring discussions among our team and our valued guests as we explore the all-hazards…
The terms we use for threats are important as they should help to clearly identify what we’re talking about and…
Following a recent Better Business Bureau (BBB) warning, on 05 Feb, the Federal Trade Commission (FTC) and Federal Bureau of…
By Evan Pounder With barley a moment’s notice, on December 25th, telecommunication, credit card machines, emergency services, and flights in…
In this episode of The Gate 15 Interview, Andy Jabbour enjoys a really fun talk with Runa Sandvik and Brad Barkett, two security veterans both…
By Evan Pounder Over the past year, the world has been grappling with the ever-evolving impacts of the Covid-19 pandemic.…
The Nerd Out! Security Panel Discussion podcast episodes are recurring discussions among our team and our valued guests as we explore the all-hazards…
By Andy Jabbour Part of effective risk management is understanding not only the threats and risks we are facing today…
Covering a security incident in Argentina, on 06 September, Lawrence Abrams (BleepingComputer) wrote, “Argentina’s official immigration agency, Dirección Nacional de…
Security professionals and their organizations, journalists, media organizations, and all those who may have access to security-related privileged information, are acting recklessly and irresponsibly when they publicly post that information, contrary to the designated information handling guidance associated with that information.
In a blog post on 08 Aug, security researchers at SenintelLabs (@LabsSentinel; the Threat Intelligence and Malware Analysis team for…
This month we are airing part two of the inaugural episode of The Cybersecurity Evangelist where Travis Farral and I finish demystifying cybersecurity myth #2 and #1. Listen to find out where the term “hacking” came from, and more about different types of “hackers”…including the good ones. Travis and I also give a quick nod to our inner geek. We wrap up the discussion with how we are ALL targets of opportunity, even if we don’t have an online presence. And why it is important to overcome the “it won’t happen to me mindset.” Finally, Travis leaves us with his final thought: spend a few minutes trying to educate yourself on ways you can protect your family.
the Gate 15 team discusses geopolitics and the impacts they have on organizations around the world. The team touches on security concerns around current issues including U.S.-China tensions and why TikTok is a topic of discussion and the idea that how nations and leaders see each other – as adversaries or competitors – is also an important consideration. Listen to Dave, Jorhena, Jen, and Andy then speak on the importance of partnerships and the need to build and engage in trusted relationships and information sharing. But they couldn’t completely escape the enduring threats of ransomware and COVID, and they weighed in on the continued impact it is having on sports leagues while hearing Andy’s hope for his favorite football team. Andy also shares his current earworm struggles and gets mocked for his choice of attire…
In a blog post on 28 Jul, security researchers at Claroty shared that they have “discovered remote code execution vulnerabilities affecting virtual private network (VPN) implementations primarily used to provide remote access to operational technology (OT) networks. These dedicated remote access solutions are mainly focused on the industrial control system (ICS) industry… Exploiting these vulnerabilities can give an attacker direct access to the field devices and cause some physical damage.”
At Gate 15, we spend a lot of time discussing Blended Threats. A Blended Threat is a natural, accidental, or purposeful physical or cyber danger that has or indicates the potential to have crossover impacts and harm life, information, operations, the environment, and/or property.
Demystifying Cybersecurity Myths By Jennifer Lyn Walker Welcome to the inaugural episode of The Cybersecurity Evangelist – a cybersecurity podcast…
A series of recent reports have highlighted the morphing threats associated with global extremism. Excerpts from some of those follow…
In a post on 9 July 2020, the team at Pen Test Partners wrote “Hacking smart devices to convince dementia sufferers to overdose,” stating, that they had recently discovered a flaw “that was a little different: it was aimed at the elderly, particularly those with dementia or other cognitive impairments.”
The people have spoken! The Gate 15 Pod has now become the Risk Roundtable. In this episode the gang is…
Illustrating how rapidly and dangerously this can play out in our world today, Sarah Coble reported, that the life of Jessica Hatch, a Houston business owner, was “threatened after cyber-criminals hacked into her company’s social media account and posted racist messages.
In this episode Dave Pounder is again joined again by Travis Moran and Andy Jabbour as they welcome Tamara Herold to discuss the latest protests, what some of the notable takeaways, impacts, and considerations for organizations, and some ideas on where protests may be going as we move forward.
Just as the United States began reopening following COVID-19 restrictions, the death of George Floyd rapidly changed the conversation and protests erupted around the country (and with international solidarity). Join Dave Pounder, Gate 15’s Director for Threat and Risk Analysis, Jennifer Lyn Walker, Director for Cyber Services, Jorhena Thomas, Senior Risk Consultant, and Andy Jabbour, Gate 15’s Managing Director, as they discuss this rapidly changing and dynamic environment.
In this episode Andy, Dave and Jen discuss topics including Ramadan and faith-based threats and preparedness, the coronavirus “infodemic,” as well as the impacts of the re-opening / re-entry of businesses across around the world. Then the team wraps things up with some thoughts on hurricanes and National Hurricane Preparedness Week.
To complement our monthly Gate 15 Podcast, we’re happy to introduce our new Security Panel Discussion, now available to listen to wherever you hear your favorite podcasts. This will be the first in a new podcast offering from The Gate 15 Company on The Gate 15 Pod Channel.
In this episode, we welcome security experts Bridget Johnson and Travis Moran, as well as Gate 15 Managing Director Andy Jabbour, to talk about terrorism, extremism, drones and surveillance measures in the COVID world.
Register for our upcoming webinar discussion, “Getting Started Now: Pandemic Preparedness After-Action Reports (AAR)”. Day: 16 April 2020 Time: 1:30pm…
The 4th episode of the Gate 15 Podcast is now available! There is a lot of information “out there” related to the COVID-19 pandemic – some of which is true and useful… Aside from initial reactions, the team looks ahead to what’s next as this pandemic continues and how do we start preparing to handle other incidents – from spring flooding and an upcoming hurricane season to potential hostile events – in a COVID world.
With multiple COVID-19 updates per day from myriad sources, scammers are predictably using every conceivable (and even inconceivable) lure to hide their cyber attacks in plain sight.
As coronavirus has shown, the impacts of a pandemic can wreak havoc worldwide, quickly and severely. At some point, things will start to get back to “normal,” and there will be a big push to catch up and make up for lost time. While it would be easy for many to get through this pandemic and reassure ourselves, “this happens every hundred years,” and to then try to resume “normal” routines and operations, focusing on the next requirement and not the past – that would be a huge mistake, and an even more huge missed opportunity.
So much can change in a month. Last month we touched on COVID-19, and in this episode we dig more into questions about preparedness and the resulting cyber scams associated with it. Then we transition to other cyber issues, specifically Business Email Compromise and phishing.
03 February 2020 Our newest podcast is available now! Dave Pounder, Gate 15’s Director for Threat and Risk Analysis, and…
As 2019 turns into 2020, technologies and threats that impact daily operations and data security persist in blended and complex ways. The convergence of both physical and cyber domains increase the productivity and value of businesses and critical infrastructure at large, but introduce new and evolving risks that can harm assets and individuals when the line between IT and physical risks are no longer crystal clear.