Cybercast 公开
[search 0]
更多
Download the App!
show episodes
 
Artwork
 
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
  continue reading
 
The Castlerea Cybercast, hosted by Austin Farrell and Josh Hawk, brings you the latest news and information from the world of cybersecurity. From ways to protect yourself and your business to news about upcoming changes in the world of cyber, and interviews with industry leaders we have it all right here.
  continue reading
 
The #NowClimbing Cybercast follows 2x Olympian and Run Gum CEO Nick Symmonds up and down the tallest mountains in the world. As a youth, Nick had two goals; become an Olympian and climb to the top of Mt. Everest. After a 10+ year career as a professional runner, he how now shifted his focus as he looks to become the first human to break the 4-minute mile barrier and reach earth's tallest peak. Follow along with daily updates from the mountain. Learn more at rungum.com/nowclimbing
  continue reading
 
Loading …
show series
 
The Department of Education is kicking off the second phase of its zero trust strategy by focusing on security orchestration and automation response to stay ahead of the evolving threat landscape. Education CISO Steven Hernandez discusses how the agency is tailoring its cyber tools and technologies by automating manual processes and leveraging iden…
  continue reading
 
Federal agencies are modernizing their cybersecurity strategies as threats continue to evolve. Faced with the National Cybersecurity Strategy, zero-trust implementation and recruiting a cyber workforce, agencies are primed for a busy 2024 in cyber and IT. Managing Editor Ross Gianfortune and Staff Writer/Researchers Nikki Henderson Whitfield and Jo…
  continue reading
 
The White House released its National Cybersecurity Strategy in March and is ending the year with the first permanent National Cyber Director in nearly a year. On CyberCast, we covered it all. Take a listen back to some of the highlighted interviews with federal IT leaders, officials and experts this year as CyberCast traveled to Hawaii, California…
  continue reading
 
This episode we're diving into zero trust at the Defense Department. Specifically, how that is playing out for the Indo-Pacific region. We recently had the opportunity to connect with several leaders at the AFCEA TechNet Indo-Pacific conference in Honolulu where they shared with us how they're thinking about this quickly changing landscape and what…
  continue reading
 
FEMA is developing prototypes for AI use cases in cybersecurity implementation amid a White House artificial intelligence executive order that directs agencies to establish and maintain standards for safety and security of the technology. FEMA CISO Gregory Edwards discusses how the rapid pace of AI innovation is spurring partnerships across federal…
  continue reading
 
The Environmental Protection Agency is honing in on multiple pillars from the National Cybersecurity Strategy to secure critical infrastructure at its water and waste-water operations. The agency deems water security to be national security and is an area that needs critical attention. Efforts are underway to increase cyber awareness in the water s…
  continue reading
 
🔐 In the latest episode of the Castlerea Cybercast, Austin and Josh dive deep into the notorious CapitalOne breach from 2019. Unravelling the chilling details of how insider threats can send shockwaves through a business, emphasizing the importance of cybersecurity measures. 💼 Sit back as we dissect the intricacies of this cybersecurity incident, s…
  continue reading
 
The U.S. Digital Corps is bringing innovation to government by placing early-career technologists at agencies. Operated by the General Services Administration (GSA) Technology Transformation Services (TTS), the Corps’ fellowship program gives individuals the chance to work on critical issues at the intersection of technology and public service. Dig…
  continue reading
 
In 2014, the world witnessed a cybersecurity incident that shook the entertainment industry to its core. Join Austin and me as we delve into the tumultuous year that was 2014, leading up to the dramatic Sony Pictures Hack. From major global events to the release of groundbreaking technology, we'll paint a vivid picture of the backdrop against which…
  continue reading
 
Bad actors accessing sensitive government data through vulnerable weak points is an ongoing concern for federal IT officials, who are making securing data a top priority amid digital modernization. Challenges in data security arise when you need to balance it with efficient data access while keeping threat actors out. In this episode, we break down…
  continue reading
 
In this episode of the Castlerea Cybercast, we dive deep into the notorious Equifax data breach, unearthing how one overlooked software update spiraled into a cybersecurity catastrophe affecting millions. As data breaches become increasingly common, understanding the Equifax debacle offers crucial insights into the importance of regular software ma…
  continue reading
 
The U.S. Digital Corps is bringing innovation to agencies through early-career technologists. Operated by the General Services Administration (GSA) Technology Transformation Services (TTS), the Corps’ fellowship program gives individuals the ability to find themselves working on critical issues at the intersection of technology and public service. …
  continue reading
 
Ever find yourself wondering how ransomware can infiltrate even the most secure systems? Join Austin and Josh as they decrypt the mystery of ransomware attacks and offer insights on building your own digital Fort Knox. Learn the tactics cybercriminals use and the foolproof strategies to defend against them. Plus, don't miss our Cybersecurity Tip of…
  continue reading
 
In the latest episode of Castlerea Security Cybercast, Austin and I dive deep into the world of cyber warfare with a detailed look at the Stuxnet worm - a malicious piece of code that nearly led to a nuclear catastrophe! From its inception, stealthy spread, to the global fallout, we unravel the mystery behind this infamous digital weapon. Was it a …
  continue reading
 
JCDC Partnerships International, which sits within CISA’s cybersecurity division, works with 150 partners worldwide with the goal of sharing and exchanging critical information allowing the U.S. to respond to cyber threats faster, protect the country’s critical infrastructure more effectively and relay that information to its international counterp…
  continue reading
 
The Department of Veterans Affairs is amid a cybersecurity modernization plan to put identity management and zero trust at the forefront of the biggest security threats facing technology teams. Jeff Spaeth, deputy CISO and executive director of information security operations at VA, is a bit of a boomerang. A veteran himself and longstanding cybers…
  continue reading
 
🔒 Welcome to the First Episode of the Castlerea Security Podcast 🔒 Greetings to all cybersecurity enthusiasts and aspiring professionals. I am your host Josh, joined by Austin, and we are honored to launch the Castlerea Security Podcast. This initial episode serves as an insightful overview of our credentials and professional journeys within the re…
  continue reading
 
In its recently released National Intelligence Strategy, the Office of the Director of National Intelligence outlines the strategic direction for the Intelligence Community (IC) over the next four years. In it, Director of National Intelligence Avril Haines notes the dramatically changing environment in which the IC operates, including the IT envir…
  continue reading
 
The White House recently released it National Cyber Workforce and Education Strategy to enhance and unleash America's cyber talent. The plan addresses the workforce needs in the public and private sectors by introducing cybersecurity concepts throughout all levels of education. The document proposes making advanced occupational training in cyber mo…
  continue reading
 
Military cyber leaders repeatedly say zero trust is critical, essential and integral to the Defense Department's Joint All-Domain Command-and-Control (JADC2) concept. A zero trust approach to cybersecurity helps organizations improve data security, manage users on the network and facilitate data interoperability, all key components of JADC2. Enjoy …
  continue reading
 
Penetration testing is something that more companies and organizations should be considering a necessary expense. Pen Testing is an important aspect of discovery and identifying potential critical vulnerabilities within your organizations external network, internal network, applications, or systems. They provide a valuable insight on how your digit…
  continue reading
 
The Office of Management and Budget along with the Office of the National Cyber Director released a memo laying out cybersecurity investment areas that agencies will have to include as they make their budgetary decisions for the next fiscal year. We break down those investment areas, how it ties to the recently released National Cybersecurity Strat…
  continue reading
 
Emerging technologies are proving to be very beneficial to the National Oceanic Atmospheric Administration when it comes to climate modeling, behavior analytics and its overall mission. Not only has automation technologies played a key role in NOAA's weather forecasting and environmental monitoring, but also machine learning has been a huge help in…
  continue reading
 
Since 2018, the Department of Veterans Affairs has been on a journey to the cloud to streamline operations, drive down expenses, better protect data and improve business operations. The agency’s Deputy Director of Infrastructure Operations Kendall Krebs explains how VA is looking to not only use cloud to improve the speed and quality of its applica…
  continue reading
 
The biggest takeaway from CIS Control 17 is that planning and communication are critical when responding to an incident. The longer an intruder has access to your network, the more time they’ve had to embed themselves into your systems. Communicating with everyone involved can help limit the duration between attack and clean-up. Establish a program…
  continue reading
 
The Marine Corps is on track to being one of the most distributed forces ever with significant command, control, communications, intelligence and cyber capabilities. A unified network with modernized network equipment is critical to operating in this environment. Cyber Technology Officer Shery Thomas discusses the Marine Crops’ efforts to combine n…
  continue reading
 
The ultimate goal of the Army’s recently established Zero Trust Functional Management Office is to have a secure unified network that is defended by a fully implemented zero trust framework that will enable multi-domain operations and accomplish the Army’s missions. Col. Michael Smith, director of this office, details next steps for zero trust impl…
  continue reading
 
The Pentagon has a cyber workforce problem: 30,000 cyber positions remain unfilled, but malicious cyber activity isn’t slowing down. Defense cyber leaders warn future conflicts will combine kinetic and information warfare, elevating the importance of a robust cyber workforce. DOD Principal Director for Resources & Analysis Mark Gorak joins us live …
  continue reading
 
Loading …

快速参考指南