The CyberWire Daily Podcast is our look at what's happening in cyberspace. It provides a clear and concise summary of the news and offers commentary from industry experts as well as our Academic and Research Partners. We publish each weekday afternoon (in time for US East Coast drive-time.)

You can subscribe to the CyberWire podcast RSS feed here and it's also available on iTunes.

The CyberWire podcasts are made possible by the generous support of our sponsors. For information on supporting the CyberWire or becoming a partner, please fill out the Contact Us form.

Subscribe to RSS
Available on iTunes
Listen to Stitcher
Google Play Music

The CyberWire Daily Podcast for 06.23.17

A Brutal Kangaroo hops out of Vault 7—don't let it poke your device with a thumb drive. Big data leaks wind up being traded on the black market. The dangers of careless configuration of an S3 bucket. Ransomware remains pricey. It can also serve as misdirection. Software companies receive and respond to code audit requirements as a condition of doing business in Russia.

In today's podcast we hear about how Brutal Kangaroo has hopped out of Vault 7—don't let it poke your device with a thumb drive. Big data leaks wind up being traded on the black market. The dangers of careless configuration of an S3 bucket. Ransomware remains pricey. It can also serve as misdirection. Dale Drew from Level 3 Communications shares lessons from WannaCry. Darron Gibbard from Qaulys offer his take on the EU's GDPR. Software companies receive and respond to code audit requirements as a condition of doing business in Russia.

E8 Security Logo

E8 Security

Artificial Intelligence & Machine Learning. This technology is popping up in everywhere in cybersecurity. Aside from sounding cutting-edge, what does it mean? What value does it add? Find out exactly how cool AI and machine learning are, and how small nuances in how each is used can make a big difference from E8, at e8security.com

Threat Connect logo

ThreatConnect

As malware becomes more advanced and harder to detect, cyber analysts are increasingly inundated with more work. The more menial tasks a security team performs, the less likely they are to have the time to properly analyze or defend against malware. Join ThreatConnect, Cisco Umbrella, and Cisco Threat Grid as they discuss how to defend your organization and utilize orchestration to enhance malware analysis capabilities.

Cylance logo

Cylance

Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware.  Learn more at cylance.com.

Women in Cybersecurity 2017: A CyberWire Special Edition

The 2017 Women in Cybersecurity conference was held in Tucson Arizona, and the CyberWire was on hand to cover the event. We spoke with a variety of cyber security professionals, at different stages of their careers. We covered some of their career journeys and professional insights on our daily podcast, and in this special edition learn why a women in cybersecurity conference is more important than ever, what they wish they knew when they were starting out, as well as some advice for the men in the industry.

Cylance Logo

Cylance

Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at cylance.com

Recent podcasts:

Here are some of our more recent podcasts. For a complete list of our episodes visit our archives, subscribe to the CyberWire podcast RSS feed, or find us on iTunes.

Date Title
Download