The Ideal Outcome: The Gift of a Well-Crafted Threat Hunt
In this episode, "The Ideal Outcome: The Gift of a Well-Crafted Threat Hunt," our expert team dives into what it means to reach the “ideal outcome” as a threat hunter, offering actionable insights to help you build an effective and enduring approach.
Will Processing CTI Become Legally Risky?
In this Studio 471, Peter Swire discusses the regulatory environment, how it could impact the use of cyber threat intelligence and what could be done to ensure attackers don’t leverage these changes to their advantage.
Why Russia is a Hotbed of Cybercrime
In this Studio 471, Alec Jackson discusses how deep, institutional corruption ties Russian IT professionals, organized criminal groups and the state together and how Russia leverages this to its advantage.
Blood, Sweat, and Threats: Carving the Perfect Threat Hunter
In this LIVE episode, “Blood, Sweat, and Threats: Carving the Perfect Threat Hunter,” we’ll explore the full journey of a threat hunter, from their first steps into the field to mastering the tools of the trade.
How to Comfortably Share Threat Intel with ISACs
In this Studio 471, Sydney Jones, Head of Threat Intelligence at CLS Group, discusses how she has set up several productive programs to share threat intelligence with Information Sharing and Analysis Centers (ISACs), helping the community reduce risk.
Cybercrime Exposed Podcast: Tank
In 2006, a new type of malware appeared on the scene. Its name was Zeus. It was enormously profitable for its cybercriminal developers, who used it to steal tens of millions of dollars from businesses and organizations of all sizes.
How Cyber Insurance is Reducing Risk
In this Studio 471, Sezaneh Seymour, a vice president and head of regulatory risk and policy at Coalition, discusses how this approach is helping to reduce risk and incidents.
What Can We Learn from Ransomware Attacks
In this Studio 471, Jamie MacColl, a research fellow with the Royal United Services Institute, discusses a recent study, “The Scourge of Ransomware Victim Insights on Harms to Individuals, Organisations and Society.” The study sought to understand the impacts of ransomware on multiple levels, from the IT people on the front line through to civil society.
MITRE ATT&CK Looks at Cybercrime Techniques
In this Studio 471, Patrick Howell O’Neill, who is a Lead Cyber Operations Analyst at MITRE, discusses cybercrime techniques and why ATT&CK is useful to security professionals.
Countering Cyber Extortion and Hacktivism
In this episode of Studio 471, we discuss two areas where Orange Cyberdefense has produced unique research in its Security Navigator 2024 report: cyber extortion and hacktivism. We tackle whether cyber extortion can be deterred and also the deeper effects of hacktivism, which can eclipse technical disruptions.