Episodios

  • 4: Mandiant’s CTO: A Bad Year for Ransomware and Extortion
    Apr 14 2026

    Listen to Mandiant's year review on ransomware and extortion and see how it impacts organizations and victims.

    Mandiant, which is now owned by Google Cloud, is one of the top-tier incident response and forensics firms. It has visibility into some of the most prominent intrusions, data breaches and ransomware attacks. In this edition of Studio 471, Mandiant CTO Charles Carmakal says half of all ransomware or extortion victims are paying ransoms. Sometimes that is to prevent the release of sensitive data, while others pay to speed up recovery – even if the organizations have backups. Carmakal says the Scattered Spider threat group is posing risks to organizations through its persistence and honed social engineering skills. But it’s not all gloom, and Carmakal says that organizations can discover their weaknesses by emulating real-world adversaries in attack simulations.

    Participants:
    Charles Carmakal, CTO, Mandiant, Google Cloud
    Jeremy Kirk, Executive Editor, Cyber Threat Intelligence, Intel 471
    ----------

    Stay in Touch!

    Twitter: https://twitter.com/Intel471Inc

    LinkedIn: https://www.linkedin.com/company/intel-471/

    YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg

    Discord: https://discord.gg/DR4mcW4zBr

    Facebook: https://www.facebook.com/Intel471Inc/

    Más Menos
    31 m
  • 3: Ransomware Task Force: Progress, Challenges, & the Future
    Apr 7 2026

    Learn about the Ransomware Task Force’s progress in combating cyber extortion, as Megan Stifel shares insights on strategies, ransom policies, and security improvements.

    The Ransomware Task Force was created in 2021 to bring together government, private industry and civil society to create strategies to fight cybercriminal gangs extorting organizations. This year has been challenging with rising attacks, but Megan Stifel of the Institute for Security and Technology says progress is being made. In this edition of Studio 471, Megan discusses the future of the Ransomware Task Force, whether ransom payments should be banned and how organizations are strengthening baseline security.

    Participants:
    Megan Stifel, Chief Strategy Officer, Institute for Security and Technology
    Jeremy Kirk, Executive Editor, Cyber Threat Intelligence, Intel 471
    ----------

    Stay in Touch!

    Twitter: https://twitter.com/Intel471Inc

    LinkedIn: https://www.linkedin.com/company/intel-471/

    YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg

    Discord: https://discord.gg/DR4mcW4zBr

    Facebook: https://www.facebook.com/Intel471Inc/

    Más Menos
    27 m
  • 2: Evolution of Ransomware: New Challenges & Persistent Threats for Cyber Defenders
    Mar 31 2026

    In this video, learn about the evolution of ransomware attacks.

    Ransomware attacks have sharply increased in 2023, and payments to ransomware gangs and affiliates are nearing all-time highs. With law enforcement and governments sharply focused on disrupting and imposing costs on ransomware groups, why is ransomware stubbornly sticking around? In this edition of Studio 471, Jacqueline Burns Koven of Chainalysis discusses how ransomware is evolving and what challenges it poses for defenders.

    Participants:

    Jacqueline Burns Koven, Head of Cyber Threat Intelligence, Chainalysis
    Jeremy Kirk, Executive Editor, Cyber Threat Intelligence, Intel 471
    ----------

    Stay in Touch!

    Twitter: https://twitter.com/Intel471Inc

    LinkedIn: https://www.linkedin.com/company/intel-471/

    YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg

    Discord: https://discord.gg/DR4mcW4zBr

    Facebook: https://www.facebook.com/Intel471Inc/

    Más Menos
    26 m
  • 1: Strong Authentication Methods: Stopping the Reuse of Credentials & Session Tokens
    Mar 26 2026

    Discover how strong authentication methods, such as biometric and device-based verification, can prevent credential reuse and significantly improve security against cybercriminal threats.

    Access credentials and session tokens are among the most popular illicit digital products in underground digital marketplaces. The reuse of credentials is often the starting point that leads to a data breach and ransomware. But tying authentication to unspoofable factors – a person’s fingerprint, a device footprint – provides a much higher level of assurance that only legitimate users are accessing systems. This strong authentication provides higher security and a better user experience.

    In this video, Brett Winterford of Okta and Intel 471’s Jeremy Kirk discuss strong authentication, paths to strengthening authentication, and what Intel 471 analysts observe around credential theft in the underground cybercriminal.

    Participants:
    Brett Winterford, Regional Chief Security Officer, APJ, Okta
    Jeremy Kirk, Executive Editor, Cyber Threat Intelligence, Intel 471
    ----------

    Stay in Touch!

    Twitter: https://twitter.com/Intel471Inc

    LinkedIn: https://www.linkedin.com/company/intel-471/

    YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg

    Discord: https://discord.gg/DR4mcW4zBr

    Facebook: https://www.facebook.com/Intel471Inc/

    Más Menos
    38 m