Podcasts

Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries.

We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about the world of cyber threat intelligence.

itunes app store google app store stitcher app store

Title: Inside Threat Intelligence
Category: Tech News
Language: English

Podcast Episode 147

Security That Fits the Needs of the Organization

Podcast Episode 146

Security Wisdom From the FS-ISAC

Podcast Episode 145

Understanding Russia’s Global Online Influence

Podcast Episode 144

A Journalist’s Perspective on Global Cyber Threats

Podcast Episode 143

Teachers, Trainers, and Educators

Podcast Episode 142

The Physical and the Digital of Open Source Intelligence

Podcast Episode 141

Threat Intelligence Is the Centerfold

Podcast Episode 140

Protecting the Financial Sector Never Goes out of Style

Podcast Episode 139

The Value in Sharing Your Experience With the World

Insights From a Distinguished Law Enforcement Veteran

Traveling the Globe With Threat Intelligence

Threat Hunting, Mentoring, and Having a Presence

From Infamous Myspace Wormer to Open Source Advocate

Solving the Business Challenges of Governance, Risk, and Compliance

Security Intelligence in the Digital Transformation

Municipalities Face Unique Cybersecurity Challenges

Never Underestimate Threat Actors’ Persistence

Strategy and Focus Protect New York City

Cybersecurity Is National Security

Understanding Social Engineering and Maintaining Healthy Paranoia

Disinformation for Sale

Intelligence From Internet Background Noise

Coming to a City or Town Near You: Ransomware

The Intersection of Political Science, Risk Management, and Cybersecurity

Crowdsourcing Phishing Defenses for Herd Immunity

Hong Kong Protests and the Rise of Online Influence Operations

The Art and Science of SOAR

Pioneering Threat Intelligence Before It Had a Name

The Inevitable Evolution of SIEMs

Public Safety, Digital Forensics, and SOAR

A Passion for Pen Testing

Darknet DDoSer Does Damage to Dread

Intelligence for the OSINT Curious

Unwrapping Fishwrap, a New Social Media Misinformation Methodology

Being Courageous, Curious, and Thoughtful in Cybersecurity

Making the Most of the NIST Cybersecurity Framework

The Threat Intelligence Value Proposition

Advocating OWASP, Securing Elections, and Standing Your Ground

Applying Threat Intelligence Throughout Your Organization

Investing in Technology, Innovative Leaders, and Yourself

A Risk-Based Approach From Spammers to Nation-States

A Fresh Take on Defining Threat Intelligence

StubHub Leverages Empathy and Emotional Intelligence for Threat Hunting

Information Security Is Not an IT Risk, It’s a Business Risk

Business Outcomes and the CISO’s Success

Approaching Privacy as a Business Plan for Data

Questions to Ask When Shopping for Threat Intelligence

The grugq Illuminates Influence Operations

Chinese Charm Attempts to Alter American Political Opinion

Tools, Training, and Threat Intelligence Empower Phishing Defense

Security Needs to Be Easy to Use and Easy to Explain

Ransomware Trends to Watch in 2019

The Challenges of Authentication at Scale and Quantifying Risk

The Value Proposition of Finished Intelligence

Active Threat Hunting Within Your Organization

Managing Third-Party Risk in Real Time

NopSec Analyzes the NVD for Their Annual Risk and Vulnerability Report

Chinese Espionage, Russia’s NVD, and More: Our Top 5 Podcasts From 2018

Secure Identity and Access Management

Putting Artificial Intelligence to Work

Pioneering Proactive Approaches to Power Protection

Leadership and Buy-In Help Protect BT’s Global Networks

Bringing Collaboration to Real-Time Data Feeds

Controlling Online Access in Yemen’s War Zone

Bringing Intelligence Community Experience to the Private Sector

The What? So What? And the Why? Why? Why?

Bringing Government Experience to Financial Services Security

Thwarting Organized Crime and Protecting Major Telecoms

Blending Threat Intelligence With Cyber Risk Frameworks

Advanced Security Tactics From Down Under

Intelligence Sharing to Protect Ourselves and Each Other

Threat Intelligence by the Book

Infect Others With Your Security Passion

Dr. Johannes Ullrich and the SANS Internet Storm Center

Fears of GDPR-Triggered Spam So Far Unfounded

Protecting the Brand, Products, and People at Perdue Farms

Russia’s Vulnerability Database Focuses Inward

A European View of Cybersecurity

Chinese Espionage Activity Tracks Economic Development Efforts

A CISO’s Journey From the City to the Private Sector

Protecting Missiles From Malware

Quantifying Cyber Risk

Securing Your Firmware

Enabling Deeper Board-Level Understanding

How to Keep Finished Intelligence Fresh

Protecting Critical Infrastructure

Securing the C-Suite

How to Empower Teams With Threat Intelligence

Optimizing the Intelligence Cycle at Optum

Keeping Verizon’s DBIR Trusted and Relevant

McAfee’s Steve Povolny Leads Threat Research

ICS Security Concerns Explained

Iran Retaliation Likely After Nuclear Deal Dropped

Former GCHQ Andy France Targets Big Cyber Problems

NYC CISO Geoff Brown on Public Privacy and Security

The Importance of Adversarial Focus

7 of the Top 10 Vulnerabilities Target Microsoft

Graham Cluley on Privacy, IoT Risks, and Ransomware

CSO Jim Routh Leads Aetna’s Pioneering Security Team

Optiv’s Stu Solomon on Threat Intelligence in a Changing Industry

Resiliency in the Face of High-Profile Breaches and Trendy Threats

Chinese Government Alters Threat Database Records

False Flags From Olympic Destroyer

McAfee’s Michael Rea on Managing Formal Intelligence Requirements

Takeaways From the Gartner Threat Intelligence Market Guide

Litecoin Set to Leapfrog Leading Cryptocurrencies

Understanding Your Environment and Communicating the Threat

Where Does a SIEM Fit In?

North Korea Targets South Korean Cryptocurrency

Protecting Philips Healthcare From Cyber Threats

The 5 Most Relevant Questions for a SOC Analyst

2017 Cybersecurity in Review and Predictions for the New Year

Dispelling Cybersecurity Myths

Predicting Future Threats With Machine Learning

ICS Is Serious Business (But There’s No Need to Panic)

AI, Robots, and Cyborgs — Inside IoT With Chris Poulin

The Practical in Practice — Use Cases for Threat Intelligence

No Phishing Allowed

A Look Into the Thriving Dark Web Criminal Market

Why Does the U.S. Lag Behind China in Vulnerability Reporting?

Know the Threat to Beat the Threat

The Facts on Equifax

NYC CISO Geoff Brown Protects the Greatest City in the World

TTPs From A Through Z With Levi Gundert

Protecting a Global Telecommunications Company

Speaking With Analyst and Fantasy Author Myke Cole

Follow the Money: Threat Intelligence for Financial Institutions

Chasing Risky Internet Business

Russia Revisited: How Did We Get Here?

Women in Intelligence: Navigating a Male-Dominated Field

North Korea’s Not So Crazy After All

Black Hat and DEF CON 2017 Recap

Making Sense of Artificial Intelligence and Machine Learning

Becoming an Analyst Part 2: Educational Foundations

WannaCry About NotPetya?

Be Vewy Vewy Quiet: We’re Hunting Threats

Best Practices in Threat Intelligence

Building a Threat Intelligence Company

Becoming an Analyst Part 1: Insights From Former Government Analysts

From Russia With Lulz

Military Meets Commercial Threat Intelligence

Analyzing the Insider Threat

Insikt: Insights to Intelligence

Ransomware by the Book

Going Dark: Fact vs. Fiction on the Dark Web

It’s Cheap, It’s Easy, It’s Dangerous: Karmen Ransomware Hits the Criminal Black Market

Feeding Frenzy: The Inside Scoop on Threat Intelligence Feeds

What Exactly Is Threat Intelligence?