Transatlantic Cable Podcast, Episode 1

Each week, David Buxton and I will break down some useful cybersecurity stories and offer tips in 20 minutes or less. In this week’s podcast, we discuss scams related to Hurricane Harvey relief, why you should change your Instagram password, and the fact that there are no free tickets to paradise on WhatsApp.

Fighting attackers in the era of data jacking

What we saw in the last few months is a rise in reports on database systems, new database technologies that are essentially being compromised; and where attackers will hack into a database, encrypt the data or sometimes delete or do something to the data, and essentially leave a message where they ask you for not…

Fighting sophisticated phishing threats during the digital revolution

Today attacks come across multiple channels such as mobile, web, social network, and email as well. And those cybercriminals are using a combination of social engineering techniques such as email spoofing, phishing, malware, attachment, URLs, and all the tricks to have the end user employees giving out personal or sensitive information. Once a cybercriminal gets…

Not all threat intelligence is created equal

Threat intelligence provides you a lot of information and intelligence about what the threats are to your network, and what you need to focus in on from a security perspective. But threat intelligence platforms are, really, that next step in the operational chain. It’s how you actually use, consume and utilize the threat intelligence that’s…

Why Unidirectional Security Gateways can replace firewalls in industrial network environments

Unidirectional Gateway solutions come in pairs: the TX appliance contains a laser, and the RX appliance contains an optical receiver. The Gateway pair can transmit information out of an operations network, but is incapable of propagating any virus, DoS attack, human error or any information at all back into the protected network. Waterfall agent software…

The difference between IT security and ICS security

In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about the difference between IT security and ICS security. On IT networks, the focus of a security program is generally preventing the theft of information. The primary focus on control system networks is safety…