Defending The Edge
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your cyber domain.
For podcast information, please contact: podcast@defendedge.com
Episodes
27 episodes
25. Elections and Electronics
Today's episode of the Defending The Edge Podcast with DefendEdge, Lyndon, Katey, and Andrea discuss topics such as the U.S. presidential election, touching on post-election cyberattacks and polling threats. Additionally, topics such as the Mid...
•
Season 2
•
Episode 25
•
38:59
24. Ballots and Bad Intentions
This month’s podcast we dive into some of the latest updates from the cybersecurity field. With expectations and sights set on developments from the ongoing Middle East conflict and potential implications to election day coming soon. The team d...
•
Season 2
•
Episode 24
•
41:59
023. Extort it or Report it
In this month's episode of the Defending the Edge Podcast with DefendEdge, join us as we discuss the cyber events of the past month, including a deep dive into recent Pegasus spyware sextortion scams that send unsuspected victims pictures of th...
•
Season 2
•
Episode 23
•
35:28
022. Iranian Actors Strike Again and the Trough of Disillusionment
In this month's episode of Defending the Edge Podcast with DefendEdge, join us as we discuss the cyber events of the past month, including cyber attacks against the U.S. election, and dive into the National Public Data Breach affecting almost 3...
•
Season 2
•
Episode 22
•
46:18
021.Unveiling the Mask, The Many Faces of Hacking
Red hat, blue hat, grey hat, black hat; follow along as we dive into the world of hackers on episode 21 of the Defending the Edge Podcast with DefendEdge set to be released on August 6th. Uncover the different veils that make up ethical hackers...
•
Season 2
•
Episode 21
•
53:24
020. Patching, Passwords, Phishing, Oh My!
In this episode, we dive deep into the three pillars of cybersecurity: Patching, Passwords, and Phishing, exploring best practices, common pitfalls, and real-world examples to help fortify your defenses. Additionally, we'll bring you the latest...
•
Season 2
•
Episode 3
•
53:54
019. Is It Plausible Once The AI Attacks?
In this episode, we sit down with DefendEdge's Security Operations Center (SOC) Director, Aaron Bozek, to explore the frontline defenses and best practices that keep organizations safe in the ever-evolving cybersecurity landscape. Our guest sha...
•
Season 2
•
Episode 2
•
54:20
018. We're Back and with a Recap
Welcome back to Defending the Edge, your monthly podcast destination! Our Cyber Threat Intelligence team is here to guide you through the latest happenings since our last episode in 2022. Let's dive into the world of cybersecurity and unpack th...
•
Season 2
•
Episode 1
•
37:10
017. We Didn't Start the Cyber Fire
Ransomware has become more advanced, we see troubling cyber threat trends in the wake of COVID-19, we discuss Black Basta with W/TH Secure, and we have a CEO and Director's round table discussion. Special guest "Not Billy Joel."
•
Season 1
•
Episode 17
•
1:21:45
DefendEdge Cyber Threat Intelligence
No usual show this week. Instead, we have a big announcement about expanding Cyber Threat Intelligence capabilities at DefendEdge and changing up content on the podcast. Check out our newly launched
•
Season 1
•
7:11
016. Is Nation-State Brother Watching You?
Maui ransomware details emerge, Greece spies on journalists, more deep-fake concerns come out, and threat actors are selling some interesting malicious services on the open web. We take a look at multiple events happening with Russia and ...
•
Season 1
•
Episode 16
•
33:10
015. Revisiting Pegasus and Phantom
The U.S. Court PACER system was breached two years ago and we just found out, more software programs are being impersonated and laced with malware, Robotext scams are on the rise, and we take a deeper look at Pegasus and NSO Group. Is com...
•
Season 1
•
Episode 15
•
32:17
014. Cyber Money Trail and Brute Badgers
Economic frustrations may be increasing inside threat activity, Brute Ratel’s badgers have been co-opted by threat actors, Ducktail malware is designated as a full-fledged campaign, and we talk about the reality of risk reduction and mitigation...
•
Season 1
•
Episode 14
•
33:03
013. Exploiting the Internet of Things
Exploitation expands on the Internet of Things, Quantum Computing gets closer and might just destroy our current understanding of security encryption, and I walk you through China’s cyber-psyop with TikTok.
•
Season 1
•
Episode 13
•
34:02
012. Maui Ransomware Surfing with North Korea
Killnet continues its pro-Russia hacktivism DDoS campaign, Microsoft announced a massive adversary in the middle campaign in progress, threat actors attempt to impersonate Crowdstrike, and we go vacationing in Maui with North Korea and Dear Lea...
•
Season 1
•
Episode 12
•
32:56
011. The Raspberry Robin Gets the Worm
Raspberry Robin infects an untold number of computers but is it a threat? Maybe. Probably? RedAlert ransomware targets VMware, the cyber-proxy war in the Russia-Ukraine conflict ramps up, and we take a look at police spyware. This week I ...
•
Season 1
•
Episode 11
•
52:26
010. Deepfake Tech Workers in Your Network
The FBI warns of deepfake tech workers, another crypto heist makes headlines, a study shows which type of phishing scams employees are likely to fall victim to, and we take a look at a cyber threat group taking up domestic terrorism under the g...
•
Season 1
•
Episode 10
•
51:27
009. Retired Internet Explorer Yells at Cloud
RSOCKS botnet goes down, Flagstar Bank suffers a massive breach, Internet Explorer finally, finally, retires but is it still a security concern? The answer won’t surprise you. Those headlines and more. This week we sit down with Col...
•
Season 1
•
Episode 9
•
50:49
008. Portland Heist and PingPull Dragons
Portland Oregon is exploited for $1.4 million, cyber hacks can open physical security doors, more information breaks on Chinese-backed threat groups, and ransomware exploitation gets even craftier. We talk about indicators of compromise a...
•
Season 1
•
Episode 8
•
31:13
007. On Her Majesty's Cyber Security Service
Elasticsearch gets hit by ransomware, Apple confirms large-scale app-store fraud, and China’s cyber-espionage continues to expand but do we have our own heroes, a cyber double-O, on her Majesty’s Cyber Security Service? We’ll find out tod...
•
Season 1
•
Episode 7
•
36:30
006. Nigerian Princes and Artificial Intelligence
Nigerian Princes go 2.0, ransomware is faster than ever, malware hides its command and control servers, and is there such a thing as charitable ransomware? We take a look. This week we sat down with Ryan Phelan, an intellectual prop...
•
Season 1
•
Episode 6
•
50:33
005. Nation-State Malware on the Dark Web
Account pre-hijacking is your newest concern, Interpol warns that nation-state malware will be available for use on the dark web, China threatens Starlink, and we say goodbye to Conti. In our weekly interview, we sit down for a long discu...
•
Season 1
•
Episode 5
•
59:15
004. Zero-Trust IT Workers
Pyongyang plants skilled IT workers into companies, thus making an extremely strong case for zero-trust architecture, Five Eyes and CISA sounds the alarm on MSP exploitation, and penetration testers show us how the good guys can stay ahead of t...
•
Season 1
•
Episode 4
•
42:50
003. 9.8 Vulnerability Rocks F5 Inc.
A severe vulnerability rocks F5 Inc., SilentBreak threat group launches new malware attacks, vanity URLs are exploited by social engineers, and China takes advantage of the Russia-Ukraine war. We sit down for an in-depth interview with Aa...
•
Season 1
•
Episode 3
•
47:58