On the latest episode of the Safe Mode podcast, Cynthia Kaiser discusses the scope of the Salt Typhoon breach, which the FBI has attributed to actors affiliated with the Chinese government. Her remarks, originally delivered at CyberScoop’s Zero Trust Summit, detail how this cyber espionage campaign involved the compromise of telecom networks and the collection of call records, IP addresses, and other sensitive data.
Kaiser also highlights broader cybersecurity challenges, including the importance of Zero Trust security strategies, cyber hygiene, and collaboration with the FBI to strengthen defenses.
Additionally, CyberScoop’s newest cybercrime reporter, Matt Kapko, joins Greg Otto for a reporter chat on Russian nation-state cyber activity, providing insights into emerging cyber threats and trends.
📺 Watch the full episode of Safe Mode: https://youtu.be/OX5nkAHThx8?si=N6XDaRoAZVdSOmSB
Don’t forget to subscribe and follow us
🍏 Apple Podcasts: https://podcasts.apple.com/us/podcast/fbis-cynthia-kaiser-on-salt-typhoons-indiscriminate/id1691749366?i=1000694474019
🟢 Spotify: https://open.spotify.com/episode/5WFtwW2ZT3Gs4xFmfOYjZt?si=0820d814d9c74c2f
📺 YouTube: https://www.youtube.com/playlist?list=PLV27Q86qVNoCpa9eVq17enW1gMgZBm0aW
#cybersecurity #ZeroTrust #SaltTyphoon #FBI #cyberthreats #infosec
Behavior-based detection and dynamic threat intelligence are essential to enhancing cybersecurity operations and reducing response times, says ThreatLocker, Inc CEO Danny Jenkins. https://cyberscoop.com/radio/levera
Behavior-based detection and dynamic threat intelligence are essential to enhancing cybersecurity operations and reducing response times, says ThreatLocker, Inc CEO Danny Jenkins. https://hubs.li/Q034z5f-0
Limiting user permissions and adopting practical strategies for managing privilege access for local administrators are essential for achieving a robust zero-trust framework, says ThreatLocker, Inc CEO Danny Jenkins.
Limiting user permissions and adopting practical strategies for managing privilege access for local administrators are essential for achieving a robust zero-trust framework, says ThreatLocker, Inc CEO Danny Jenkins. https://scoopmedia.co/4hlqgQB
It’s crucial to review and restrict application access to sensitive data. ThreatLocker, Inc CEO Danny Jenkins outlines a three-step process for handling these permissions to better secure systems. https://cyberscoop
It’s crucial to review and restrict application access to sensitive data. ThreatLocker, Inc CEO Danny Jenkins outlines a three-step process for handling these permissions to better secure systems. https://scoopmedia.co/3D9kKS4
ThreatLocker, Inc CEO Danny Jenkins discusses why a ‘block by default’ access strategy is foundational to how enterprises should secure their operations today. https://cyberscoop.com/radio/tackling-ai-powered-threat
ThreatLocker, Inc CEO Danny Jenkins discusses why a ‘block by default’ access strategy is foundational to how enterprises should secure their operations today. https://scoopmedia.co/4i7RrPM