It appears everyone has tips on how to work remotely. And after the deluge the past two weeks, most people have hit their wall. We don’t care. We’re pushing through with even more advice, just for security professionals.
Thanks to this week’s podcast sponsor, AppOmni
Got feedback? Join the conversation on LinkedIn.
On this week’s episode
Why is everyone talking about this now?
Adapting a line from Wendy Nather of Duo Security, what’s the security poverty line for remote work? Gabriel Friedlander of Wizer started a thread of best advice for employees working at home. And then he compiled a list of the best tips. We talk about our favorite tips and add a few of our own.
There’s got to be a better way to handle this
Mike and our sponsored guest, Brendan, are both security leaders who have been thrust into managing their entire team virtually for an extended period of time. On top of that, their teams are going to have new pressures on them (e.g., kids at home) that are going to conflict with their ability to be efficient employees. We talk about what they’re doing to adapt and their greatest concerns.
How are you dealing with patch management when you’ve got an all-remote workforce?
Please, Enough. No, More.
Our topic security cloud or specifically SaaS apps. What have we heard enough about on this topic and what would we like to hear a lot more?
A serious confounding feature of public activities like elections and climate change discussions is the proliferation of actual fake news – stories created by bad actors and distributed by bots and which include deepfaked video and propaganda that lead audiences into a state of not knowing who to believe anymore. Security experts including the International Security Forum categorize this as a cyberthreat called Distortion, the loss of trust in the integrity of information.
As threat actors continue to hammer away at the cyber defenses however they can, it is extremely likely that Distortion attacks will be yet one more way of bringing organizations to a point of extreme vulnerability, just like ransomware and siegeware.
Though the Distortion content may be generated externally, it has the potential to be implanted in a company’s environment through phishing, MFA fraud and hacking, leading to media crises, drops in market valuation, destruction of public credibility and of internal stability.
More from our sponsor, ExtraHop.
Um… maybe you shouldn’t have done that
Some really well-intentioned people are responsible for some really bad data practices. When I was in Tel Aviv I ran into a number of companies offering discovery solutions to show you where your data is, identify the sensitive data, the PII, and who has access. We learn a lot about sensitive data after it’s breached, but there are also plenty of bad data practices happening internally which lend themselves to misuse or greater damage when there is a breach.