Please enjoy our newest podcast, the Weekly Security Sprint, on Spotify for Podcasters, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
Please enjoy our newest podcast, the Weekly Security Sprint, on Spotify for Podcasters, Spotify, Apple, Google, as well as other locations accessible via the…
Please enjoy our newest podcast, the Weekly Security Sprint, on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor link or…
Please enjoy our newest podcast, the Weekly Security Sprint, on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor link or…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
Please enjoy our newest podcast, the Weekly Security Sprint, on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor link or…
Please enjoy our newest podcast, the Weekly Security Sprint, on Anchor, Spotify, Apple, Google, as well as other locations accessible…
Please enjoy our newest podcast, the Weekly Security Sprint, on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor link…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
On 12 Oct 2021, Josh Meyer, @JoshMeyerDC, wrote an article titled, “The next big cyberthreat isn’t ransomware. It’s killware. And it’s…
This month, the National Council of ISACs (NCI) published a new paper, National Council of ISACs Statement of Ransomware, stating,…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
By Jennifer Lyn Walker, The Cybersecurity Evangelist For my final ISAC segment, I had a great discussion with two Steering…
“The most important takeaway from the recent spate of ransomware attacks on U.S., Irish, German and other organizations around the…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
By Evan Pounder Over the past year, the world has been grappling with the ever-evolving impacts of the Covid-19 pandemic.…
Please enjoy this next episode of The Gate 15 Podcast on Anchor, Apple, Spotify, as well as other locations accessible…
In this episode of The Gate 15 Interview, Andy Jabbour talks with Jeremy Kennelly, a manager and principal analyst on…
By Andy Jabbour Part of effective risk management is understanding not only the threats and risks we are facing today…
Covering a security incident in Argentina, on 06 September, Lawrence Abrams (BleepingComputer) wrote, “Argentina’s official immigration agency, Dirección Nacional de…
In a blog post on 08 Aug, security researchers at SenintelLabs (@LabsSentinel; the Threat Intelligence and Malware Analysis team for…
the Gate 15 team discusses geopolitics and the impacts they have on organizations around the world. The team touches on security concerns around current issues including U.S.-China tensions and why TikTok is a topic of discussion and the idea that how nations and leaders see each other – as adversaries or competitors – is also an important consideration. Listen to Dave, Jorhena, Jen, and Andy then speak on the importance of partnerships and the need to build and engage in trusted relationships and information sharing. But they couldn’t completely escape the enduring threats of ransomware and COVID, and they weighed in on the continued impact it is having on sports leagues while hearing Andy’s hope for his favorite football team. Andy also shares his current earworm struggles and gets mocked for his choice of attire…
In a blog post on 28 Jul, security researchers at Claroty shared that they have “discovered remote code execution vulnerabilities affecting virtual private network (VPN) implementations primarily used to provide remote access to operational technology (OT) networks. These dedicated remote access solutions are mainly focused on the industrial control system (ICS) industry… Exploiting these vulnerabilities can give an attacker direct access to the field devices and cause some physical damage.”
At Gate 15, we spend a lot of time discussing Blended Threats. A Blended Threat is a natural, accidental, or purposeful physical or cyber danger that has or indicates the potential to have crossover impacts and harm life, information, operations, the environment, and/or property.
The people have spoken! The Gate 15 Pod has now become the Risk Roundtable. In this episode the gang is…
As 2019 turns into 2020, technologies and threats that impact daily operations and data security persist in blended and complex ways. The convergence of both physical and cyber domains increase the productivity and value of businesses and critical infrastructure at large, but introduce new and evolving risks that can harm assets and individuals when the line between IT and physical risks are no longer crystal clear.
The National Terrorism Advisory System is an inadequate tool to communicate threats and risks to homeland security. From Friday, over…