podcast cover

Recorded Future - Inside Threat Intelligence for Cyber Security

Recorded Future

2 FANS
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical...Show More
Best
Newest
116 Darknet DDoSer Does Damage to Dread

22:00 | Jul 15th

Criminal markets on dark web forums are the online version of a bad neighborhood, complete with sellers, buyers, and people who make their living connecting those groups. They tend to be self-policing, and so when an individual discovers a fundamenta...Show More
115 Intelligence for the OSINT Curious

24:52 | Jul 8th

Our guest today is Micah Hoffman. He’s principal consultant at Spotlight Infosec, and one of the founders of the OSINT Curious web site, an online destination for enthusiasts and students of open source intelligence gathering and analysis techniques....Show More
114 Unwrapping Fishwrap, a New Social Media Misinformation Methodology

19:31 | Jul 1st

Researchers at Recorded Future have recently detected and described a new kind of influence operation that they’ve named “Fishwrap.” The technique involves recycling previously published news accounts of terrorist activities and amplifying their expo...Show More
113 Being Courageous, Curious, and Thoughtful in Cybersecurity

31:39 | Jun 24th

Our guest today is Tracy Maleeff. Before earning a position as a cyber analyst at a Fortune 500 company, she ran her own firm, providing information security and competitive intelligence research. Prior to that she worked as a Library Resources Manag...Show More
112 Making the Most of the NIST Cybersecurity Framework

29:28 | Jun 17th

The NIST Cybersecurity Framework has become a valuable tool for evaluating security across a variety of business sectors. Originally published in 2014 and targeting critical infrastructure, the framework continues to evolve to meet the changing needs...Show More
111 The Threat Intelligence Value Proposition

16:49 | Jun 10th

Joining us today is John TerBush, senior threat intelligence researcher at Recorded Future. John is an instructor with the SANS Institute, currently teaching a course on open source intelligence that he helped develop. Before joining Recorded Future,...Show More
110 Advocating OWASP, Securing Elections, and Standing Your Ground

35:41 | Jun 3rd

Our guest today is Tanya Janca. She’s a senior cloud advocate at Microsoft, where she specializes in application security. She’s a popular speaker at security conferences around the world, evangelizing software security and advocating for developers....Show More
109 Applying Threat Intelligence Throughout Your Organization

20:45 | May 28th

Threat Intelligence is a wide ranging term, and it can mean different things to different people as they consider the variety of ways to best integrate it into their organization’s cyber defense strategies. In today’s show, we’re exploring the possib...Show More
108 Investing in Technology, Innovative Leaders, and Yourself

22:49 | May 20th

Our guest today is Niloofar Razi Howe. She’s a respected technology executive, entrepreneur, board member and investor, having served as Chief Strategy officer for Endgame and, later, RSA Security. She’s a life member of the Council on Foreign relati...Show More
107 A Risk-Based Approach From Spammers to Nation-States

22:52 | May 13th

Our guest today is Martijn Grooten. He’s editor at Virus Bulletin, an online forum for sharing the latest cybersecurity research and intelligence, which dates back to 1989. They’re also an independent testing and certification body, and they hold a p...Show More
106 A Fresh Take on Defining Threat Intelligence

26:00 | May 6th

In this episode, we check in with Recorded Future’s Levi Gundert and Allan Liska for a refresher on threat intelligence, including how they have come to describe it and why some people have a hard time wrapping their heads around what, exactly, it is...Show More
105 StubHub Leverages Empathy and Emotional Intelligence for Threat Hunting

21:59 | Apr 29th

StubHub is the world’s largest ticket marketplace, where buyers and sellers of tickets for sports, concerts, theater, and other live entertainment events connect and do business. They partner with over a hundred entertainment venues and sports teams,...Show More
104 Information Security Is Not an IT Risk, It's a Business Risk

28:50 | Apr 22nd

Our guest today is Brian Haugli. He’s a partner at Side Channel Security, a consulting firm in the Boston area. Prior to forming Side Channel Security, he was chief security officer for The Hanover Insurance Group. Earlier in his career, he held civi...Show More
103 Business Outcomes and the CISO's Success

28:11 | Apr 15th

Joining us today is Dana Pickett. He’s CISO for Edwards Performance Solutions, as well as a principal for the cybersecurity services they offer. With over three decades in the industry, Dana has witnessed the inception and evolution of cybersecurity,...Show More
102 Approaching Privacy as a Business Plan for Data

31:50 | Apr 8th

Our guest today is Michelle Dennedy. She’s vice president and chief privacy officer for Cisco. An outspoken advocate for building technologies that not only enhance our lives but also promote integrity and respect for people regardless of their level...Show More
101 Questions to Ask When Shopping for Threat Intelligence

25:45 | Apr 1st

Our guest today is Brian Martin, vice president of vulnerability intelligence at Risk Based Security, a company that provides risk identification and security management tools leveraging their data-breach and vulnerability intelligence. Brian shares ...Show More
100 The grugq Illuminates Influence Operations

34:12 | Mar 25th

To celebrate one hundred episodes of our show, we’ve got a special guest this week. The grugq is well-known in hacker and information security circles around the world, and a respected voice at conferences and on social media. He’s a bit mysterious, ...Show More
099 Chinese Charm Attempts to Alter American Political Opinion

27:07 | Mar 18th

There’s an increasing awareness of foreign influence on American institutions through social media. U.S. intelligence agencies have asserted that Russians made a concerted effort to disrupt and influence the 2016 presidential election, and there’s wi...Show More
098 Tools, Training, and Threat Intelligence Empower Phishing Defense description

23:09 | Mar 11th

Our guest today is Mollie MacDougall, threat intelligence manager at Cofense, a company that specializes in phishing defense, threat intelligence, and cyber incident response. She shares the story of her unconventional professional journey and the ro...Show More
097 Security Needs to Be Easy to Use and Easy to Explain

21:50 | Mar 4th

Our guest today is Chris Betz, senior vice president and chief security officer at CenturyLink. His career journey has led him through a variety of well-known organizations, including the U.S. Air Force, NSA, CBS, Microsoft, Apple, and now CenturyLin...Show More
096 Ransomware Trends to Watch in 2019

26:43 | Feb 25th

2018 was an interesting year for ransomware — there were more documented ransomware campaigns than the year before, but there was also a feeling that the focus had shifted to other forms of cybercrime, like cryptojacking. Our guest today is Allan Lis...Show More
095 The Challenges of Authentication at Scale and Quantifying Risk

22:52 | Feb 18th

This week, we welcome back Levi Gundert, Recorded Future’s vice president of intelligence and risk. In a wide-ranging conversation, we discuss Insikt Group’s research into APT10, the challenges of authentication at scale, the importance of framing co...Show More
094 The Value Proposition of Finished Intelligence

16:31 | Feb 11th

On today’s show, we take a closer look at finished intelligence. What are the best ways to define it, who’s the best audience for it, and how can you be sure you’re getting the best bang for your buck when you request it? And what’s the best plan for...Show More
093 Active Threat Hunting Within Your Organization

21:28 | Feb 4th

Our guest today is Mike Morris, chief technology officer at root9B, where he’s chief architect behind the design and integration of their Active Adversary Pursuit threat hunting platform. Mike began his career in the U.S. Air Force and was an integra...Show More
092 Managing Third-Party Risk in Real Time

17:24 | Jan 28th

Many organizations find themselves faced with the challenge of managing third-party risk, working with business partners, vendors, and suppliers to ensure that they are handling security and managing vulnerabilities at an acceptable level. Traditiona...Show More
091 NopSec Analyzes the NVD for Their Annual Risk and Vulnerability Report

26:14 | Jan 21st

Each year, security firm NopSec publishes their annual State of Vulnerability Risk Management Report, analyzing all of the vulnerabilities listed in the National Vulnerability Database, the NVD, along with those uploaded to their own platform by thei...Show More
090 Secure Identity and Access Management

25:58 | Jan 14th

Our guest today is Robb Reck, chief information security officer at Ping Identity. With nearly 20 years of experience in IT security, compliance, and systems and networking, Robb has witnessed the evolution of the space. He shares his professional jo...Show More
089 Putting Artificial Intelligence to Work

29:40 | Jan 7th

Our guest this week is Thomas H. Davenport. He’s a world-renowned thought leader and author, and is the president’s distinguished professor of information technology and management at Babson College, a fellow of the MIT Center for Digital Business, a...Show More
088 Pioneering Proactive Approaches to Power Protection

23:54 | Dec 31st, 2018

Schneider Electric is a global energy management and automation company headquartered in France, employing over 144,000 people around the world. With a history dating back to the 1830s, these days Schneider Electric enjoys success in industrial contr...Show More
087 Leadership and Buy-In Help Protect BT's Global Networks

24:02 | Dec 17th, 2018

BT is a global telecommunications giant, headquartered in London with over 100,000 employees all over the world. In addition to telephone services in Great Britain, BT provides broadband internet, fiber-optic communications, digital television, and e...Show More
086 Bringing Collaboration to Real-Time Data Feeds

23:34 | Dec 10th, 2018

Our guest today is Aaron Gee-Clough. He’s chief technology officer for King & Union, a company that aims to bring increased collaboration to threat intelligence analysts, allowing them to more easily visualize and manage threat data in real time. We ...Show More
085 Controlling Online Access in Yemen's War Zone

22:56 | Dec 3rd, 2018

Recorded Future’s Insikt Group recently published research titled “Underlying Dimensions of Yemen’s Civil War: Control of the Internet.” It’s a detailed analysis of the role the internet has played in this ongoing bloody conflict, as rival factions f...Show More
084 Bringing Intelligence Community Experience to the Private Sector

23:54 | Nov 26th, 2018

Our guest today is Jason Kichen. He’s director of cybersecurity services at Versive, a cybersecurity company that delivers advanced threat detection and automation. Prior to Versive, Jason spent nearly 15 years in the U.S. Intelligence Community as a...Show More
083 The What? So What? and the Why? Why? Why?

19:16 | Nov 19th, 2018

Today we welcome Maggie McDaniel, senior director of Insikt Group at Recorded Future. She’s had leadership positions in the U.S. government intelligence community, as well as the financial services sector. We’ll be discussing her recent blog post, “C...Show More
082 Bringing Government Experience to Financial Services Security

20:23 | Nov 12th, 2018

Joining us today is Derrick Pendleton. He’s a senior digital forensic incident response analyst at Legg Mason in Baltimore. He shares his experience cutting his teeth on security within the federal government, the specific benefits he believes that e...Show More
081 Thwarting Organized Crime and Protecting Major Telecoms

25:47 | Nov 5th, 2018

Our guest today is Dale Drew. He’s chief security officer at Zayo Group, a global provider of communications, colocation, and cloud infrastructure. Previously, he’s held leadership positions at some of the largest and most influential telecommunicati...Show More
080 Blending Threat Intelligence With Cyber Risk Frameworks

23:34 | Oct 29th, 2018

Our guest today is Rick Tracy. He’s chief security officer at Telos, a cybersecurity, IT risk management and compliance, secure mobility, and identity management company. In addition to his duties as CSO, Rick is co-inventor of Xacta, a cyber risk ma...Show More
079 Advanced Security Tactics From Down Under

24:14 | Oct 22nd, 2018

Joining us today is Nicolas Cairns, director of Aegis 9 Security Intelligence, a cybersecurity firm located in Canberra, Australia. In his career, Nicolas has worked in both offensive and defensive cybersecurity operations, threat intelligence, malwa...Show More
078 Intelligence Sharing to Protect Ourselves and Each Other

29:02 | Oct 15th, 2018

Our guest today is Paul Kurtz. He’s the co-founder and CEO of TruSTAR Technology, a company that develops collaborative intelligence-sharing platforms with the goal of streamlining the distribution of actionable information for cybersecurity professi...Show More
077 Threat Intelligence by the Book

21:10 | Oct 8th, 2018

The Recorded Future team is proud to have recently published its first book, “The Threat Intelligence Handbook — A Practical Guide for Security Teams to Unlocking the Power of Intelligence.” The book aims to provide readers with the information they’...Show More
076 Infect Others With Your Security Passion

24:13 | Oct 1st, 2018

Our guest today is Tod Beardsley. He’s director of research at Rapid7, a cybersecurity company providing technology, services, and research to organizations around the world. Tod manages software vulnerability research efforts at Rapid7, handles vuln...Show More
075 Dr. Johannes Ullrich and the SANS Internet Storm Center

21:12 | Sep 24th, 2018

The SANS Institute is a well-known and respected cooperative research and education organization. Since its founding in 1989, it’s worked with over 165,000 security professionals around the world, providing training and certification. It also provide...Show More
074 Fears of GDPR-Triggered Spam So Far Unfounded

16:56 | Sep 17th, 2018

Chances are you’re familiar with GDPR, the European Union’s General Data Protection Regulation. It went into full effect back in May of this year, with the goal of improving the privacy and security of European citizens in particular, but the global ...Show More
073 Protecting the Brand, Products and People at Perdue Farms

18:27 | Sep 10th, 2018

Perdue Farms is a major U.S. agricultural business, best known for its processing of chicken, turkey, and pork, and is one the nation’s top providers of grain. Founded nearly a century ago as a “mom-and-pop” business with a small flock of chickens, t...Show More
072 Russia's Vulnerability Database Focuses Inward

24:58 | Sep 4th, 2018

Researchers from Recorded Future’s Insikt Group have previously analyzed both the U.S. and Chinese national vulnerability databases, examining the speed of publication of cybersecurity vulnerabilities, and how each respective country considers its NV...Show More
071 A European View of Cyber Security

22:19 | Aug 27th, 2018

We’ve got a special episode of the Recorded Future podcast for this week. Staffan Truvé, Recorded Future’s CTO and co-founder, returns to the show to lead a conversation with our guest Rolf Rosenvinge. Rolf is CEO of RCG – CyberInsights, a Stockholm-...Show More
070 Chinese Espionage Activity Tracks Economic Development Efforts

25:15 | Aug 20th, 2018

Researchers from Recorded Future’s Insikt Group have been tracking new malware targeting the Tibetan community, continuing an ongoing effort by the Chinese state to use cyberespionage to keep tabs on perceived domestic threats. They’ve uncovered a so...Show More
069 A CISO's Journey From City to the Private Sector

25:29 | Aug 13th, 2018

Our guest is Gary Hayslip. He’s vice president and chief information security officer at Webroot, a cybersecurity and threat intelligence company. Prior to joining Webroot he was the CISO for the city of San Diego, and before that served active duty ...Show More
068 Protecting Missiles From Malware

21:13 | Aug 6th, 2018

Raytheon is one of the largest defense contractors in the world, with over 60 thousand employees and annual revenues near $25 billion. They’ve been in business for nearly a hundred years, with humble beginnings in vacuum tube manufacturing, RADAR sys...Show More
067 Quantifying Cyber Risk

25:44 | Jul 30th, 2018

This week we’re joined by Alexander Schlager, executive director of security services at Verizon. He has experience in both the technical and sales sides of the communications and security worlds, having gained experience in a variety of positions ar...Show More
066 Securing Your Firmware

42:28 | Jul 23rd, 2018

These days, most of us have a pretty good handle on protecting the software our computers run from viruses and other types of malware. We’re careful about downloading and installing software from unknown, insecure sources, and run antivirus applicati...Show More
065 Enabling Deeper Board-Level Understanding

21:13 | Jul 16th, 2018

Our guest today is Bryan Littlefair. He’s CEO at Cambridge Cyber Advisers, and previously held the Global CISO position at Aviva and Vodafone Group. His current focus is working with board-level executives to enable a deeper understanding of cybersec...Show More
064 How to Keep Finished Intelligence Fresh

24:54 | Jul 9th, 2018

Our guest today is Storm Swendsboe. He’s an analyst services manager at Recorded Future, leading a team of intelligence analysts providing on-demand reports for their customers. In our conversation he explains the different types of reports his team ...Show More
063 Protecting Critical Infrastructure

20:50 | Jul 2nd, 2018

Our guest today is Joe Slowik. He works in adversary hunting and threat intelligence at Dragos, a company specializing in securing industrial control systems and critical infrastructure. He shares the story of his unconventional path to a career in s...Show More
062 Securing the C-Suite

20:24 | Jun 25th, 2018

In this episode of the Recorded Future podcast, we explore the unique challenges associated with securing your C-Suite executives. Not only are they attractive targets for scammers and fraudsters, when it comes to security, they’re often afforded a l...Show More
061 How to Empower Teams With Threat Intelligence

26:19 | Jun 18th, 2018

In this episode of the Recorded Future podcast, we examine how threat intelligence applies to a variety of roles within an organization, and how security professionals can integrate it to empower their team to operate with greater speed and efficienc...Show More
060 Optimizing the Intelligence Cycle at Optum

32:01 | Jun 11th, 2018

Our guest today is Vince Peeler. He’s the manager of cyber intelligence services at Optum, one of the largest healthcare and services providers in the world. He shares his unlikely journey from a career as a naval aviator to cybersecurity, and how le...Show More
059 Keeping Verizon's DBIR Trusted and Relevant

25:38 | Jun 4th, 2018

Each year Verizon publishes its Data Breach Investigation Report, or DBIR, the annual survey of the state of cybersecurity using data gathered from tens of thousands of incidents from around the world. It’s earned a reputation as a must-read report, ...Show More
058 McAfee's Steve Povolny Leads Threat Research

22:28 | May 29th, 2018

Our guest today is Steve Povolny, head of advanced threat research at McAfee. We’ll learn how he came to lead his team of researchers at the well-known security company, his philosophy on leadership, and why investing in research makes sense for McAf...Show More
057 ICS Security Concerns Explained

25:09 | May 21st, 2018

Our guest today is Joe Weiss. He’s the managing partner of Applied Control Solutions, a firm that provides consulting services to optimize and secure industrial control systems. He’s been in the industry for over 40 years and has earned a reputation ...Show More
056 Iran Retaliation Likely After Nuclear Deal Dropped

18:01 | May 14th, 2018

For the past six month or so, researchers in Recorded Future’s Insikt Group have been dissecting the structure of cyber operations groups within the Islamic Republic of Iran. In recent years that nation has regularly used offensive cyber campaigns in...Show More
055 Former GCHQ Andy France Targets Big Cyber Problems

28:46 | May 7th, 2018

We welcome cybersecurity leader and entrepreneur Andy France, in a conversation led by Recorded Future Co-Founder and CEO Christopher Ahlberg. Andy France’s career in cybersecurity spans over four decades, including positions as the deputy director o...Show More
054 NYC CISO Geoff Brown on Public Privacy and Security

20:07 | Apr 30th, 2018

This week we welcome back to our show Geoff Brown, chief information security officer for the City of New York. In a city with 8 million citizens that’s also a global center of commerce, innovation, and tourism, protecting the public when they use pu...Show More
053 The Importance of Adversarial Focus

22:53 | Apr 23rd, 2018

Our guest today is Greg Reith. Greg began his career with U.S. Army Special Forces with a specialty in operations and intelligence. His experience includes counter intelligence, analysis, and collection at both tactical and strategic levels. At the e...Show More
052 7 of the Top 10 Vulnerabilities Target Microsoft

21:07 | Apr 16th, 2018

Researchers at Recorded Future recently published a report titled, “The Top 10 Vulnerabilities Used by Cybercriminals.” The report reveals that seven out of the top 10 most exploited vulnerabilities in 2017 targeted Microsoft products. We’ve got pair...Show More
051 Graham Cluley on Privacy, IoT Risks, and Ransomware

25:36 | Apr 9th, 2018

Graham Cluley is well known in the cybersecurity industry as a popular speaker, writer, independent security analyst, and cohost of the Smashing Security podcast. He’s had senior roles at Sophos and McAfee, and is a member of the Infosecurity Europe ...Show More
050 CSO Jim Routh Leads Aetna’s Pioneering Security Team

29:06 | Apr 2nd, 2018

Jim Routh is chief security officer of Aetna, a Fortune 500 company offering health care, dental, pharmacy, group life, disability, and long-term care insurance and employee benefits. With annual revenue exceeding 60 billion dollars and nearly 50 tho...Show More
049 Optiv’s Stu Solomon on Threat Intelligence in a Changing Industry

30:59 | Mar 25th, 2018

Christopher Ahlberg is CEO of Recorded Future, and this week he leads a conversation with Stu Solomon, chief technology and strategy officer at Optiv, a leading provider of end-to-end cybersecurity solutions. It’s a wide-ranging discussion, exploring...Show More
048 Resiliency in the Face of High-Profile Breaches and Trendy Threats

28:22 | Mar 19th, 2018

There’s a natural tendency, not just in cyber security, to be drawn to bright, shiny objects. If you’re a security professional, you’ve likely had to respond to questions from management and your coworkers about the latest high-profile breach or rans...Show More
047 Chinese Government Alters Threat Database Records

22:37 | Mar 9th, 2018

In episode 29 of this podcast we heard from Bill Ladd, Chief Data Scientist at Recorded Future, about the differences between the US and Chinese cyber threat vulnerability reporting systems. He pointed out the difference in speed-of-publishing betwee...Show More
046 False Flags From Olympic Destroyer

17:24 | Mar 5th, 2018

The 2018 Olympic Games in PyeongChang recently concluded, but not without attempts at disruption from cyberattackers. A major telecom and IT provider was targeted with a multi-pronged campaign to gather credentials, move laterally within networks, an...Show More
045 McAfee's Michael Rea on Managing Formal Intelligence Requirements

15:33 | Feb 26th, 2018

Our guest today is Michael Rea. He’s a threat intelligence professional currently working at McAfee. He’s got prior experience in the US Navy, serving at sea and at shore, including positions at Cyber Command and NSA. We’ll discuss his career, how th...Show More
044 Takeaways From the Gartner Threat Intelligence Market Guide

27:07 | Feb 19th, 2018

The research and advisory firm Gartner recently took a closer look at security threat intelligence, and published a comprehensive report with their findings, the Gartner Market Guide for Security Threat Intelligence Products and Services. The report ...Show More
043 Litecoin Set to Leapfrog Leading Cryptocurrencies

16:44 | Feb 12th, 2018

You’d have to be living under a virtual rock to not have noticed that virtual currencies like Bitcoin have taken off, attracting investors, speculators, and, of course, criminals, all looking to profit from the enthusiasm surrounding these cryptocurr...Show More
042 Understanding Your Environment and Communicating the Threat

28:42 | Feb 5th, 2018

Building a successful threat intelligence operation and team involves many important considerations. What are your organizations critical assets, who are your potential adversaries, and how do you best communicate with the rest of your organization t...Show More
041 Where Does a SIEM Fit In?

18:41 | Jan 29th, 2018

In today’s episode, we’re talking SIEMs. That’s short for security information and event management, and it typically describes software or services that provide real-time logging and analysis of security alerts. A SIEM gathers information from a var...Show More
040 North Korea Targets South Korean Cryptocurrency

22:43 | Jan 22nd, 2018

Facing sanctions from much of the rest of the world, North Korea has turned to cybercrime to help finance their operations. The Lazarus Group is well known as a state-sponsored team of criminal hackers serving North Korean interests, and in 2017 they...Show More
039 Protecting Philips Healthcare From Cyber Threats

21:56 | Jan 15th, 2018

Philips is a company with a long, storied history, going back over 120 years, and many technological achievements to brag about. From light bulbs to radios, consumer devices like electric shavers, the compact cassette, and the co-invention of the com...Show More
038 The 5 Most Relevant Questions for a SOC Analyst

18:23 | Jan 8th, 2018

Our guest today is Denver Durham. He’s a threat intelligence consultant at Recorded Future, with a background in the U.S. Army as an intelligence analyst, working in signals intel and all-source intel supporting counterterrorism,and later in the priv...Show More
037 2017 Cybersecurity in Review and Predictions for the New Year

33:02 | Jan 2nd, 2018

Whether you felt 2017 flew by or you just couldn’t wait for it to be over, from a cybersecurity point of view there’s no question it was an interesting year. There was something for everyone, including ransomware, botnets, major data breaches, IoT is...Show More
036 Dispelling Cybersecurity Myths

19:13 | Dec 18th, 2017

In this episode, we have a conversation with Gavin Reid, chief security architect at Recorded Future. Before joining Recorded Future, he helped design the systems that protect organizations like NASA, Cisco, and Fidelity. We’ll get his take on the st...Show More
035 Predicting Future Threats With Machine Learning

16:54 | Dec 11th, 2017

In this episode, we take a closer look at some of the specifics of artificial intelligence and machine learning, and how cybersecurity professionals can benefit from including these tools in their threat intelligence arsenals. We’ll discuss clusterin...Show More
034 ICS is Serious Business, But There's No Need to Panic

20:16 | Dec 4th, 2017

There’s been a good bit of attention aimed at Industrial Control Systems (ICS), lately, the systems that monitor and help keep our critical infrastructure running. The electrical grid tends to get the most attention, but ICS includes water, dams, com...Show More
033 AI, Robots, and Cyborgs — Inside IoT with Chris Poulin

36:02 | Nov 27th, 2017

In this episode of the Recorded Future podcast we take a closer look at the Internet of Things (IoT). It’s a wide-ranging category, spanning everything from connected thermostats, refrigerators, and security cameras to industrial control systems, sel...Show More
032 The Practical in Practice — Use Cases for Threat Intelligence

26:12 | Nov 20th, 2017

In this episode of the Recorded Future podcast, we take a closer look at the practical application of threat intelligence. Some security teams still meet threat intelligence with a skeptical eye, wondering how adding even more information to the flow...Show More
031 No Phishing Allowed

18:30 | Nov 13th, 2017

This episode focuses on phishing, where a bad actor pretends to be someone they’re not in order to get a user to reveal information, like a login or password, or to get them to perform a task, like transferring money.  Phishing has been around for qu...Show More
030 A Look Into the Thriving Dark Web Criminal Market

25:23 | Nov 6th, 2017

The recent Equifax breach highlights the vulnerability of our personal data online, and serves as a reminder that there’s an active, thriving, global criminal market for that sort of information. In this episode of the Recorded Future podcast we retu...Show More
029 Why Does the U.S. Lag Behind China in Vulnerability Reporting?

20:22 | Oct 30th, 2017

The U.S. National Vulnerability Database, or NVD, is, in part, a collection of security-related reports. Software vulnerabilities are assigned CVE numbers, which stands for common vulnerabilities and exposures, which help track the issues and provide...Show More
028 Know the Threat to Beat the Threat

20:19 | Oct 23rd, 2017

Our guest today is Bob Gourley, author of the book “The Cyber Threat: Know the Threat to Beat the Threat.” Earlier in his career, Bob spent 20 years as a U.S. Navy intelligence officer. One of his last assignments with the military was as director of...Show More
027 The Facts on Equifax With John Wetzel

22:38 | Oct 9th, 2017

By now, you’ve surely heard that Equifax, one of the largest credit reporting companies in the U.S., suffered a huge data breach. How bad was it? Reports say over 143 million sets of personal information may have been lost on U.S. residents alone, in...Show More
026 NYC CISO Geoff Brown Protects the Greatest City in the World

29:52 | Oct 2nd, 2017

When someone mentions New York City, there are a variety of images that may come to mind. The Statue of Liberty, the Empire State Building, Times Square, or maybe Wall Street or Central Park. And, of course, 9/11. It’s no wonder the city of New York ...Show More
025 TTPs From A Through Z With Levi Gundert

17:18 | Sep 25th, 2017

You’re likely familiar with the phrase, “know your enemy.” The idea being, the more you know about your adversary, their motivations, methods, and capabilities, the better advantage you’ll have when it’s time to defend yourself. In cybersecurity thre...Show More
024 Protecting a Global Telecommunications Company

20:40 | Sep 18th, 2017

Our guest today is BT’s Vice President, Security UK and Continental Europe, Luke Beeson. Located in London, he leads teams who deliver cybersecurity services to customers, while simultaneously protecting BT’s own systems. We discuss the challenges a ...Show More
023 Analyst and Fantasy Author Myke Cole

30:16 | Sep 11th, 2017

Our guest today is Myke Cole. He’s a cyber threat intelligence analyst with a large metropolitan police department, and a member of the United States Coast Guard reserve, supporting maritime search and rescue and law enforcement around New York City....Show More
022 Follow the Money: Threat Intelligence for Financial Institutions

23:26 | Sep 5th, 2017

When you’re responsible for safeguarding the money, not to mention the personal financial information of your clients, what are your specific needs when it comes to threat intelligence? Where do you begin, and how do you get the best bang for your bu...Show More
021 Chasing Risky Internet Business

19:28 | Aug 28th, 2017

As security professionals, we’re relied upon to protect our networks from malicious traffic. But what’s the best strategy for determining the most likely sources of risky traffic? Is it safe to assume that traffic from certain countries is more suspi...Show More
020 Russia Revisited: How Did We Get Here?

30:00 | Aug 21st, 2017

In this episode we take a closer look at Russia. Here in the United States, there’s been no shortage of news about Russia, its alleged interference in our presidential election, and its greater role in the global cybersecurity ecosystem. But how did ...Show More
019 Women in Intelligence: Navigating a Male-Dominated Field

25:03 | Aug 14th, 2017

In today’s episode we hear from three women working in cybersecurity intelligence. We’ll learn about their sometimes indirect journeys toward tech, challenges they faced along the way, and we’ll get their advice for navigating what is still a male-do...Show More
018 North Korea's Not So Crazy After All

16:35 | Aug 7th, 2017

When it comes to North Korea, there are a variety of images that may come to mind. Eccentric, erratic leadership, suffering citizens, isolation from the rest of the global community, and lately, of course, the testing of nuclear weapons and long-rang...Show More
017 Black Hat and DEF CON 2017 Recap

17:11 | Jul 31st, 2017

The Black Hat 2017 conference just wrapped up in Las Vegas, followed immediately by the DEF CON hacker convention. Between the two shows, it’s one of the largest annual gatherings of cybersecurity professionals and enthusiasts in the world. Black Hat...Show More
016 Making Sense of Artificial Intelligence and Machine Learning

24:29 | Jul 24th, 2017

Artificial intelligence (AI) and machine learning (ML) are hot topics in cybersecurity, threat intelligence, and beyond. We hear the terms casually tossed around in conversation, we’re bombarded with AI/ML marketing, and of course, there is no end to...Show More
015 Becoming an Analyst Part 2: Educational Foundations

19:35 | Jul 17th, 2017

Ever thought of becoming a threat intelligence analyst? This is the second in our occasional series of behind-the-scenes looks at Recorded Future, where we drop in from time to time on team members, to find out what it is they do, how they do it, wha...Show More
014 WannaCry About NotPetya?

17:37 | Jul 10th, 2017

As we pass the midpoint of 2017, we’ve had more than a few high-profile malware attacks. Two of the biggest have been WannaCry, the ransomware attack that went worldwide in May, and NotPetya, the destructive campaign that targeted Ukraine in June, bu...Show More
013 Be Vewy Vewy Quiet: We’re Hunting Threats

13:44 | Jul 3rd, 2017

Sharing insights on the tools, technologies, and processes that underpin threat intelligence is one of the primary aims of this podcast. One of the processes that’s getting a lot of attention these days is threat hunting. In this episode, we’ll talk ...Show More
012 Best Practices in Threat Intelligence

16:29 | Jun 26th, 2017

It’s fair to say that the term “threat intelligence” has achieved buzzword status in the cyber security world. Confusion over the term’s meaning, not to mention the tidal wave of related products, services, and solutions overwhelming the industry, ma...Show More
011 Building a Threat Intelligence Company

26:55 | Jun 19th, 2017

In the first 10 episodes of the Recorded Future Podcast, we’ve taken some deep dives into many important threat intelligence topics. Of course, there are many more topics to cover in the weeks ahead, but we thought it might be helpful to share a litt...Show More
010 Becoming an Analyst Part 1: Insights From Former Government Analysts

17:19 | Jun 12th, 2017

In this episode of the Recorded Future podcast, we introduce you to two threat intelligence analysts, Lauren Zabierek and Alex Walker. They both have previous experience with threat analysis for the U.S. government – Lauren was formerly in the Air Fo...Show More
009 From Russia With Lulz

09:25 | Jun 5th, 2017

While certainly not new to the world of international espionage or hacking, you will find the Russians at the intersection of global politics and cyber security today. With recent events like the hacking of the Democratic National Committee in the ru...Show More
008 Military Meets Commercial Threat Intelligence

15:09 | May 29th, 2017

Throughout the history of conflict, threat intelligence has played a vital role in the military. Its arts, tradecraft, and organizing principles have been honed for millennia and have adapted to emerging threats, like those we face in cyberspace toda...Show More
007 Analyzing the Insider Threat

17:47 | May 22nd, 2017

What exactly is an insider threat? It’s a term we hear a lot in cyber security circles, and of course, the world of threat intelligence. While its meaning seems self-evident, we’ve found that it often brings to mind different things to different peop...Show More
006 Insikt: Insights to Intelligence

12:34 | May 15th, 2017

Turning information into actionable intelligence is a critical activity for organizations of all types and sizes. The challenge remains sifting through the enormous amount of data coming at us from all angles and at ever-increasing rates. In this epi...Show More
005 Ransomware by the Book

17:15 | May 8th, 2017

Looking back at predictions about what to expect in cyber security in 2017, one thing on just about everyone’s list was ransomware. It’s quickly risen to one of today’s top cyber threats and shows no signs of slowing down. In this episode, we speak w...Show More
004 Going Dark: Fact vs. Fiction on the Dark Web

12:29 | May 1st, 2017

Mention the dark web and many people summon imagery of a massive, mysterious online criminal underground, where all manner of products and information are bought, sold and traded, hidden away from the prying eyes of the public and law enforcement. Bu...Show More
003 It’s Cheap, It’s Easy, It’s Dangerous: Karmen Ransomware Hits the Criminal Black Market

15:52 | Apr 24th, 2017

Over the last two years, Ransomware has become the hottest commodity in the criminal black market. And we do mean commodity—it's getting cheaper and more accessible to crooks, even the unskilled ones. On March 4th of this year, a leading cybercrimina...Show More
002 Feeding Frenzy: The Inside Scoop on Threat Intelligence Feeds.

14:38 | Apr 17th, 2017

Threat intelligence feeds have become a staple in the diet of analysts and security professionals at organizations large and small. Some feeds are free, others are offered for sale from security vendors. They can also come in a dizzying array of form...Show More
001 What Exactly Is Threat Intelligence?

15:16 | Apr 10th, 2017

In our first episode, we start with the basics of threat intelligence. We talk about its emergence in cyber security and offer some relevant definitions. We describe where threat intelligence comes from, its purpose, and the context in which it's use...Show More