stitcherLogoCreated with Sketch.
Get Premium Download App
Listen
Discover
Premium
Shows
Likes

Listen Now

Discover Premium Shows Likes

Speakeasy Security

46 Episodes

25 minutes | Apr 1, 2022
Predictions on the cybersecurity sector from one of Wall Street's top tech analysts
The Cybersecurity sector will continue to see plenty more spending. That’s the prediction from Wall Street’s top tech analyst Dan Ives of Wedbush Securities. He read the tea leaves for the industry – with thoughts on M&A; cybersecurity around cryptocurrency; and why private cybersecurity research firms like ESET are so important.  https://www.wedbush.com/ https://www.linkedin.com/in/daniel-ives-542321a8/
28 minutes | Jan 8, 2022
Highlights from CES: A security researcher's perspective
The Consumer Electronics Show (CES) is one of the world's largest technology events,  bringing together manufacturers, developers and suppliers of consumer technology.  We catch-up with Cameron Camp, an ESET security researcher, who has been pounding the exhibition floor, to get his view on the new innovative technology on show,  the possible benefits it may deliver to society, and to talk through a few of the potential cybersecurity risks the new tech may need to address. https://www.ces.tech/https://www.welivesecurity.com/2022/01/06/ces-2022-more-sensors-than-people/https://www.welivesecurity.com/2022/01/07/ces-2022-space-security-no-more-flying-blind/
33 minutes | Nov 19, 2021
How to avoid online scams and fraud on Black Friday and Cyber Monday
With the holiday season upon us inboxes are filling up with the must have bargains as online retailers try to tempt us into securing a bargain, unfortunately cyber scammers also recognize this as an opportunity to make money.  Keir Humble, an ESET sales engineer, joins Speakeasy's host, Tony Anscombe, to discuss how to stay cyber-safe, avoiding the pitfalls of phishing emails through to the best practices when landing in the online checkout. Links:https://www.eset.com/us/about/newsroom/corporate-blog/9-tips-for-safe-online-shopping-on-black-friday-and-beyond/
27 minutes | Oct 8, 2021
The NFT market is evolving - what's happening and where next?
The topic of NFT’s, that’s Non-fungible token’s, if frequently in the media, and is a subject the Speakeasy team have discussed before. We revisit the topic to discuss what drives a buyer to purchase, for example, the popular ‘side-eyeing Chloe’ image that recently sold for $75,000. And how a purchaser was duped out of £244,000 buying, what they thought was, the very first NFT Banksy artwork. If you're considering entering the NFT market then it's important to know what to be on lookout for and my guest on this episode, Cameron Camp, from the ESET research team, provides some sound advice.   Links:https://www.siliconvalley.com/2021/09/29/disneyland-meme-of-viral-side-eyeing-chloe-sells-for-75000/ https://www.bbc.com/news/technology-58585342 https://www.bbc.com/news/technology-58343062 https://www.bbc.com/news/technology-58399338
26 minutes | Sep 21, 2021
The password-less future
Microsoft's recently announcement that users can delete passwords and adopt a password-less environment using alternative authentication such as an authenticator app. Does this signal the beginning of the end for password based authentication. Keir Humble, an ESET sales engineer, joins Speakeasy's host, Tony Anscombe, to discuss what this means for users and whether the proposed new password-less world is more or less secure. Episode links: https://www.microsoft.com/security/blog/2021/09/15/the-passwordless-future-is-here-for-your-microsoft-account/
41 minutes | Aug 19, 2021
Cybersecurity insurance explained
Businesses have been clamoring to understand how cybersecurity insurance works and we explain everything this week with our special guest. Rehana Moosa is the founder of a forensic accounting firm and joins us to clarify what cybersecurity insurance is. Are ransom payments for ransomware attacks covered by cyber insurance? What factors contribute to how much a cyber insurance premium will cost? Don’t miss this episode as cover the ins and outs of cybersecurity insurance and forensic accounting. Links Rehana Moosa Forensics: www.RMForensics.ca Cybersecurity insurance overview: https://www.cisa.gov/cybersecurity-insurance  
22 minutes | Aug 16, 2021
Apple to begin reporting Child Sexual Abuse Material (CSAM)
Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called hashing, which turns images into numbers. On this episode, we discuss how Apple’s new system will work and how this bold step in combating Child Sexual Abuse is being received by privacy-sensitive users around the world. Links: Apple to combat Child Sexual Abuse Material:  https://www.cnbc.com/2021/08/05/apple-will-report-child-sexual-abuse-images-on-icloud-to-law.html   National Center for Missing Exploited Children (NCMEC): Home (missingkids.org)   Internet Watch Foundation (IWF): Homepage | Internet Watch Foundation (iwf.org.uk) 
26 minutes | Jul 29, 2021
What is an Advanced Persistent Threat?
APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and governments alike. APT stands for Advanced Persistent Threats and this week we dive deep into the nature of these threats for our audience.  From exploiting vulnerabilities to exfiltrating data, we explore how these threats, and the teams of attackers behind them, can gain access to corporate and government secrets. Buckle up for this one!     Links:  What is an APT - https://www.cioinsight.com/security/apt-attack/   
27 minutes | Jul 26, 2021
The sinister nature of Stalkerware
Stalkerware is monitoring software which enables a remote user to track the activities of another user’s device. With stalkerware appearing in news headlines around the world, this week we discuss what this dangerous software is, how it spies on its victims, and how you can detect it on your device. We also discuss the privacy implications of stalkerware and share helpful resources for victims seeking help.  Links  What is spyware? https://www.bbc.com/news/av/technology-57894917  Stalkerware surges in 2021 https://www.zdnet.com/article/stalkerware-adoption-rates-surge-over-2020-hundreds-of-vulnerabilities-found/  NCSA Stalkerware tip sheet  https://staysafeonline.org/resource/stalkerware-tip-sheet/   National Domestic Violence Hotline https://www.thehotline.org/  
29 minutes | Jun 25, 2021
The crypto crackdown
With Bitcoin leading the downward spiral of crypto currency values, Ranson and Tony take a look at the factors which have contributed to the rollercoaster ride in the crypto market. In recent weeks, crypto mining has come under increasing scrutiny amidst revelations of its massive energy consumption and negative impact on the environment and China is taking significant measures to curb crypto mining and have already shutdown a number mining regions within the country. Our hosts also examine the role Tesla played in the valuation of bitcoin and look to one country in seeking to make bitcoin legal tender. Links:   China’s focus on cryptocurrency:  https://www.cnbc.com/2021/06/22/china-crypto-crackdown-wipes-nearly-300-billion-off-market-btc-slides.html  El Salvador wants bitcoin to become legal tender: https://www.bbc.com/news/business-57507386 
29 minutes | Jun 17, 2021
Hacking McDonald’s and EA? What’s the world come to?
Last week McDonald’s and Electronic Arts revealed they were the latest victims of cyberattacks and they likely won’t be the last. Especially after a massive leak of 8.4 billion passwords on the Dark Web. With a whopping $350 million in ransomware payments in 2019, this year is already poised to surpass that.  What does hacking a video game maker and the largest fast-food burger chain have in common? What are the criminals after? What can businesses do now so they don’t end up in the headlines. Find out on this week’s episode of Speakeasy Security.  Links:Colonial Hack/Passwords and Old VPN account: https://www.cpomagazine.com/cyber-security/colonial-pipeline-hack-connected-to-password-leak-of-8-4-billion-accounts-attackers-got-in-via-an-old-vpn-account/  McDonalds: https://www.reuters.com/technology/mcdonalds-hit-by-data-breach-south-korea-taiwan-wsj-2021-06-11/   EA: https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code  ESET Cybersecurity Awareness Training: https://www.eset.com/us/cybertraining/ 
41 minutes | Jun 10, 2021
Cyberespionage and ransomware are wreaking havoc on governments
The attacks on government entities and critical infrastructure, including the recent Colonial Pipeline attack, are increasing in scope and sophistication. Cybercriminals are becoming more brazen in their approach to disrupting economies and continue to conduct supply chain attacks, causing massive amounts of damage. This week our hosts talk to Andy Garth, ESET’s Government Affairs lead, and Robert Lipovský, senior malware researcher at ESET, join the podcast to discuss the latest attacks on Governments and the newly release ESET Government Threat Report. From cyberespionage to ransomware, you don’t want to miss what our guests have to say about the recent wave of attacks.Links:  ESET Government Threat Report: https://www.welivesecurity.com/wp-content/uploads/2021/04/ESET_Industry_Report_Government.pdf  Kr00k: Billions of Wi-Fi devices affected: https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/ 
22 minutes | May 20, 2021
Why end-to-end encryption is needed
Thinking about end-to-end encryption can give the average person a headache. Our hosts Tony and Ranson break down how it works and why this technology is critical to protecting your information. However, with this level of secrecy, criminals are leveraging end-to-end encryption to hide from law enforcement. What is being done to protect your privacy while not weakening encryption? Tune in to this episode to find out. Links:  What is encryption and how does it work? - https://www.welivesecurity.com/videos/what-is-encryption-and-how-does-it-work/   Should encryption be curbed to combat child abuse? -  https://www.bbc.com/news/business-57050689  End-to-end encryption explained - https://www.businessinsider.com/end-to-end-encryption 
36 minutes | Apr 29, 2021
Bitcoin is here to stay, but is it environmentally friendly?
This week on Speakeasy Security, Tony and Ranson dive headfirst into the Bitcoin craze. Our hosts explain what Bitcoin is, how they are made, and why crypto currencies provide an unprecedented level of anonymity.  With one Bitcoin transaction consuming more energy than the average home, our hosts also explore the massive carbon footprint left from Bitcoin mining. Whether you’re interested in learning the differences between Bitcoin and physical (fiat) currency or if you would simply like to know how to protect your crypto currency wallet, join us for another exciting episode of Speakeasy Security.    Links:  BBC – Crypto firm Coinbase valued at more than oil giant BP - https://www.bbc.com/news/business-56750102  Bitcoin Energy consumption index https://digiconomist.net/bitcoin-energy-consumption/  
21 minutes | Apr 22, 2021
Home listing ‘realtor’ photos could expose personal data
This week on Speakeasy Security, Tony and Ranson discuss how a cybercriminal can take advantage of the personal information contained in real estate listing photos. All too often, home sellers do not depersonalize their home before listing which can lead to a headache later on. From visible account details and personally identifiable information to pictures of family members and pet names, anyone selling a property should take inventory of not only what photos will be posted but what is contained within them.  Join us for this exciting episode as we explain how to keep this information private and secure.Links:  BBC – House tour exposes owners personal data - https://www.bbc.com/news/technology-56718046   The American Genius – Privacy issues and real estate listing photos – https://theamericangenius.com/housing/editorials/privacy-issues-and-real-estate-listing-photos-how-to-get-yours-removed/   
27 minutes | Apr 8, 2021
What is a vaccination passport?
Join us as we kick off season 4 of Speakeasy Security! This week, our hosts take on the hot topic of vaccination passports. As travel begins to pick up and restrictions begin to ease, Tony and Ranson explain what vaccination passports are, the privacy implications and how they are being managed. Without realizing it many people may already be declaring openly that they have had certain vaccinations to comply with state and federal requirements.Links: BBC News – Vaccination passports: https://www.bbc.com/news/technology-56489574   Kaiser Family Foundation – Vaccinations by States and Race: https://www.kff.org/coronavirus-covid-19/issue-brief/latest-data-on-covid-19-vaccinations-race-ethnicity/     
29 minutes | Apr 1, 2021
Thinking of hacking a connected car? Think again.
How likely is it for a cybercriminal to hack your vehicle? Why is the UN involved and what are car manufacturers doing to help protect connected vehicles? This week on Speakeasy Security, Tony and Ranson take a look at how connected cars can be attacked and what the industry is doing to help. If you’re a gear head, a connected car owner, or simply interested in learning more, you won’t want to miss this episode of Speakeasy security. Links: The Department of Transportation Cybersecurity – Cybersecurity Best practices for connected vehicles: https://www.nhtsa.gov/press-releases/cybersecurity-best-practices-comments The United Nations Regulation on Cybersecurity and Software Updates:https://unece.org/press/un-regulations-cybersecurity-and-software-updates-pave-way-mass-roll-out-connected-vehicles   
23 minutes | Mar 25, 2021
Non-fungible tokens - disrupting the art industry one NFT at a time!
What is a non-fungible token, or NFT? Are these digital tokens the future of the art industry? This week our hosts dive into the world of NFTs and explain what the blockchain-based technology is all about. There’s a lot to unpack in this episode of Speakeasy Security so pour a cold beer and join us for this look into the interesting world of NFTs. LinksTime - https://time.com/5947720/nft-art/
19 minutes | Mar 11, 2021
Say goodbye to 'some' ad tracking
Google has recently announced it will stop selling ads based on an individuals’ browsing history across sites and it has serious implication for the public. What does this change mean for the average person? How will this affect ads on social media? Ranson and Tony discuss this major development and more on this week’s episode of Speakeasy Security.Links:https://blog.google/products/ads-commerce/a-more-privacy-first-web/
29 minutes | Feb 26, 2021
Clubhouse, is anything really private anymore?
Everyone’s talking about Clubhouse, the invite-only, audio app du jour is creating a lot buzz. However, are the members of this service trading in their privacy for access to the exclusive app? What happens to your contact list when you sign up for the service? Tony and Ranson tackle this trending topic on the latest episode of Speakeasy Security and explain what you need to know about Clubhouse.LinksClubhouse audio streamed to a third-party site: https://www.welivesecurity.com/2021/02/23/clubhouse-chats-streamed-third-party-website/ Clubhouse privacy policy: https://www.clubhouse-app.com/privacy_policy  
COMPANY
About us Careers Stitcher Blog Help
AFFILIATES
Partner Portal Advertisers Podswag
Privacy Policy Terms of Service Do Not Sell My Personal Information
© Stitcher 2022