Cybersecurity Today Podcast Por Jim Love arte de portada

Cybersecurity Today

Cybersecurity Today

De: Jim Love
Escúchala gratis

Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time. Política y Gobierno
Episodios
  • The Godfather of Zero Trust - A Discussion with John Kindervag
    Sep 13 2025

    Inside Zero Trust: John Kindervag and the Evolution of Cybersecurity

    In this episode of Cybersecurity Today: Weekend Edition, host Jim Love speaks with John Kindervag, the pioneer behind the Zero Trust model of cybersecurity. With over 25 years of industry experience, John delves into how the concept originated from his early work with firewalls, advocating for a system where no packet is trusted by default. He discusses the fundamental principles of Zero Trust, including defining protect surfaces, mapping transaction flows, and implementing microsegmentation. The conversation also touches on overcoming cultural and organizational challenges in cybersecurity, the inadequacies of traditional risk models, and adapting Zero Trust methodologies in the evolving landscape, including AI. Through thoughtful discourse and practical insights, John underscores the importance of strategic and tactical implementations in building resilient and secure systems.

    00:00 Introduction to Cybersecurity Today
    00:25 Meet John Kindervag: The Godfather of Zero Trust
    01:50 The Birth of Zero Trust
    04:08 Challenges and Evolution of Zero Trust
    06:03 From Forrester to Practical Implementations
    11:40 The Concept of Protect Surfaces
    17:30 Risk vs. Danger in Cybersecurity
    30:54 Farmers and Technology
    31:48 The Importance of IT in Business
    32:26 Introduction to Zero Trust
    32:41 Five Steps to Zero Trust
    33:14 Mapping Transaction Flows
    34:25 Custom Architecture for Zero Trust
    34:55 Defining Policies with the Kipling Method
    36:04 Monitoring and Maintaining Zero Trust
    36:28 The Concept of Anti-Fragile Systems
    38:47 Challenges and Success Stories in Zero Trust
    42:02 Microsegmentation and Protect Surfaces
    45:39 AI and Zero Trust
    49:22 Advice for Implementing Zero Trust
    50:37 Military Insights and Decision Making
    57:19 The Future of Zero Trust
    59:07 Conclusion and Final Thoughts

    Más Menos
    1 h
  • Microsoft Patches Zero Day And More
    Sep 12 2025

    Cybersecurity Today: Microsoft Patches, Canadian Data Breach, NVIDIA's New Tool, and a Senator's Call for Investigation

    In this episode of Cybersecurity Today, host Jim Love discusses Microsoft's September patch update addressing 81 security flaws, including two zero-day vulnerabilities. Highlights include a data breach in Canada affecting email and phone numbers, NVIDIA's release of an open-source LLM vulnerability scanner, and US Senator Ron Wyden's call for the FTC to investigate Microsoft's security practices. The episode also clears up the mystery behind the bricked SSDs after a Windows 11 update.

    00:00 Microsoft Patches 81 Flaws
    02:29 Canadian Government Data Breach
    03:38 NVIDIA's Garrick: AI Vulnerability Scanner
    05:01 Senator Urges FTC to Probe Microsoft
    06:52 Mystery of Bricked SSDs Solved
    08:24 Conclusion and Upcoming Interview

    Más Menos
    9 m
  • iCloud Calendar Invites Disguise New Phishing Campaigns
    Sep 10 2025

    Phishing Scams, Leaked Stream Keys, Zero-Day Android Vulnerabilities, and Bounties on Russian Hackers

    In this episode of Cybersecurity Today, host Jim Love discusses several critical cybersecurity issues. Attackers are using iCloud calendar invites for phishing scams, leveraging Apple's system to bypass security checks. The US Department of Defense has exposed livestream credentials, risking hijack and fake content insertion. Billions of Android phones are vulnerable due to unpatched critical zero days, and Google has only fixed issues for Pixel devices so far. Additionally, the US State Department has placed a $10 million bounty on three Russian FSB hackers responsible for attacks on energy companies. Jim emphasizes the importance of securing digital assets and maintaining strong cybersecurity practices.

    00:00 Introduction and Headlines
    00:24 Phishing Scam via iCloud Calendar Invites
    03:18 US Department of Defense Livestream Vulnerabilities
    05:53 Critical Android Zero-Day Vulnerabilities
    07:38 US Bounty on Russian FSB Hackers
    09:42 Conclusion and Contact Information

    Más Menos
    10 m
Todas las estrellas
Más relevante
It is obvious that the person reporting has worked in this field. As he is reporting, the way the story is delivered is told in the exact manner that someone who as seen the ridiculous Cyber hygiene of some of these companies that should know better it perfect. You can often hear the smile on his face. I cannot tell you how much this resonates with me as a person that has screamed the importance of some of these routine and minor prevention methods that could stop these attacks.

Love your delivery!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

This is a great podcast for those looking to stay up to date with recent developments in cyber security.

Awesome!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.