Artwork

محتوای ارائه شده توسط Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

Cybercriminals and Nation-States Look to IoT as the New Frontline

52:58
 
اشتراک گذاری
 

Manage episode 348342018 series 3418676
محتوای ارائه شده توسط Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?

Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s discovered from the tool.

The cybersecurity space, he’s found, has focused and refocused and reframed and refocused again. Now, it’s apparent globally that cybercriminals and nation-states are looking at IoT as the new frontline. When new technologies come up, they’re developed with no thought to security, says Richard. Now we’re reaping what was sown.

Let’s get into Things on the IoT Security Podcast!

Follow Richard Stiennon on all his platforms:
https://www.linkedin.com/in/stiennon
https://stiennon.substack.com
https://twitter.com/stiennon
https://www.it-harvest.com

Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos/.

And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi/.

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast/.


Let’s get into Things on the IoT Security Podcast!

Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos
And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

30 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 348342018 series 3418676
محتوای ارائه شده توسط Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?

Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s discovered from the tool.

The cybersecurity space, he’s found, has focused and refocused and reframed and refocused again. Now, it’s apparent globally that cybercriminals and nation-states are looking at IoT as the new frontline. When new technologies come up, they’re developed with no thought to security, says Richard. Now we’re reaping what was sown.

Let’s get into Things on the IoT Security Podcast!

Follow Richard Stiennon on all his platforms:
https://www.linkedin.com/in/stiennon
https://stiennon.substack.com
https://twitter.com/stiennon
https://www.it-harvest.com

Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos/.

And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi/.

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast/.


Let’s get into Things on the IoT Security Podcast!

Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos
And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

30 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع