<p><em>Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research.<br></em><br></p><p><em>Senior Intelligence Analysts Chris Morgan and Kim Bromley bring together over 30 years of experience in threat intelligence across government, military, and telecommunications. Along with their guests, they provide practical perspectives on the week’s top cybersecurity news and share knowledge and best practices to help businesses mitigate the most pertinent cyber threats. </em></p><p> </p><p><em>With over 1,000 customers worldwide and 1,200 teammates across six global operating centers, ReliaQuest delivers security outcomes for the most trusted enterprise brands in the world. Learn more at </em><a href="http://www.reliaquest.com/"><em>www.reliaquest.com</em></a><em>.</em></p>
Subscribe
Title
|
Date published
|
|
|
Episode 41: Magecart Payment Card Thefts
|
2018-09-14
|
|
|
Episode 40: DoJ Complaint Charges North Korean Actor For Sony Attacks, WannaCry, and More
|
2018-09-07
|
|
|
Episode 39: Credential Hygiene
|
2018-08-31
|
|
|
Episode 38: Midterm meddling and threat modeling
|
2018-08-24
|
|
|
Episode 37: ATM Fraud and Cashout Operations
|
2018-08-17
|
|
|
Episode 36: FIN7 Arrests and Phishing Threats
|
2018-08-10
|
|
|
Episode 35: Cyber threats to ERP Applications
|
2018-08-03
|
|
|
Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign
|
2018-07-27
|
|
|
Episode 33: Digital Risk Protection
|
2018-07-23
|
|
|
Episode 32: MITRE ATT&CK™ Framework and the Mueller GRU Indictment
|
2018-07-20
|
|
|
Episode 31: Carbanak Files and Source Code Leaked?
|
2018-07-13
|
|
|
Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs
|
2018-07-06
|
|
|
Episode 29: Reducing Your Attack Surface: From a Firehose to a Straw
|
2018-06-29
|
|
|
Episode 28: Diversity in Security and Women’s Network Launch
|
2018-06-26
|
|
|
Episode 27: Attribution: The How, The What and The Why
|
2018-06-22
|
|
|
Episode 26: Mythbusting Vulnerabilities and Exploits
|
2018-06-15
|
|
|
Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach
|
2018-06-11
|
|
|
Episode 24: Seize and Desist: Changes in the cybercriminal underground
|
2018-06-06
|
|
|
Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics
|
2018-06-04
|
|
|
Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript & Spectre vulns
|
2018-05-29
|
|
|
123456789101112131415161718192021