4.6 • 1K Ratings
🗓️ 22 February 2025
⏱️ 25 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:10.4 | Cyber threats are evolving every second, and staying ahead is more than just a challenge. |
0:17.8 | It's a necessity. |
0:19.1 | That's why we're thrilled to partner with Threat Locker, |
0:21.6 | a cybersecurity solution trusted by businesses worldwide. Threat Locker is a full suite of solutions |
0:27.8 | designed to give you total control, stopping unauthorized applications, securing sensitive data, |
0:34.1 | and ensuring your organization runs smoothly and securely. |
0:39.0 | Visit Threatlocker.com today to see how a default-deny approach can keep your company safe and compliant. |
0:46.3 | Thank you. Hello everyone and welcome to the CyberWires Research Saturday. |
1:02.8 | I'm Dave Bittner, and this is our weekly conversation with researchers and analysts |
1:07.4 | tracking down the threats and vulnerabilities, solving some of the hard problems |
1:11.9 | and protecting ourselves in a rapidly evolving cyberspace. |
1:16.0 | Thanks for joining us. |
1:22.7 | In my opinion, the impact to real life individuals, the disruption to their work, to their |
1:30.2 | health care, to their schools, cities, libraries, homes is very, very significant by threat actors, |
1:37.9 | especially ransomware threat actors. |
1:40.7 | And I just think that historically, it has been underappreciated and under-resourced in terms of defense against these threats. |
1:49.7 | That's Selena Larson, threat researcher and lead for intelligence analysis and strategy at ProofPoint. |
1:56.4 | The research we're discussing today is titled, |
1:58.9 | Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk. |
2:10.6 | Well, let's walk through some of the history here together. I mean, how did we coin the term advanced persistent threat and what led us to where we are today? |
2:20.3 | Yeah, so it's funny because the APT moniker, which is of course advanced persistent threat and is essentially only used for threat actors that are operating on behalf of states, right? |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.