Click Here artwork

Click Here

413 episodes - English - Latest episode: 6 days ago - ★★★★★ - 92 ratings

The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon.
Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.

Tech News News cyber cybersecurity intel security threatintelligence
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

013 Be Vewy Vewy Quiet: We’re Hunting Threats

July 03, 2017 16:00 - 14 minutes

Sharing insights on the tools, technologies, and processes that underpin threat intelligence is one of the primary aims of this podcast. One of the processes that’s getting a lot of attention these days is threat hunting. In this episode, we’ll talk about what exactly threat hunting is, how it’s done, and its value to organizations looking to strengthen their security posture, gain situational awareness, and of course, enhance their threat intelligence. To get past the buzzwords and down to b...

012 Best Practices in Threat Intelligence

June 26, 2017 16:00 - 17 minutes

It’s fair to say that the term “threat intelligence” has achieved buzzword status in the cyber security world. Confusion over the term’s meaning, not to mention the tidal wave of related products, services, and solutions overwhelming the industry, makes it hard to know where to start when threat intelligence becomes a priority in your organization. To help cut through some of that noise, Recorded Future published a white paper, “Best Practices for Applying Threat Intelligence.” The paper is o...

011 Building a Threat Intelligence Company

June 19, 2017 16:00 - 27 minutes

In the first 10 episodes of the Recorded Future Podcast, we’ve taken some deep dives into many important threat intelligence topics. Of course, there are many more topics to cover in the weeks ahead, but we thought it might be helpful to share a little bit of Recorded Future’s backstory. In this episode, we’ll talk about how the company made its transition from the virtual garage to an international company with offices around the world. Along the way, we’ll touch on issues important to any g...

010 Becoming an Analyst Part 1: Insights From Former Government Analysts

June 12, 2017 16:00 - 18 minutes

In this episode of the Recorded Future podcast, we introduce you to two threat intelligence analysts, Lauren Zabierek and Alex Walker. They both have previous experience with threat analysis for the U.S. government – Lauren was formerly in the Air Force, and, inspired to serve after 9/11, took part in missions in Afghanistan. Alex came out of college and joined NSA, where he worked as an intelligence analyst. They share their insights on their day-to-day challenges as analysts at Recorded Fut...

009 From Russia With Lulz

June 05, 2017 16:00 - 10 minutes

While certainly not new to the world of international espionage or hacking, you will find the Russians at the intersection of global politics and cyber security today. With recent events like the hacking of the Democratic National Committee in the run up to last year’s US presidential election, the ongoing investigations into Russian interference in that election, and even questions about the Russian relationships with key players in the new US administration, the Russians are often top of mi...

008 Military Meets Commercial Threat Intelligence

May 29, 2017 16:00 - 15 minutes

Throughout the history of conflict, threat intelligence has played a vital role in the military. Its arts, tradecraft, and organizing principles have been honed for millennia and have adapted to emerging threats, like those we face in cyberspace today. As commercial organizations confront the mounting challenges of cyber security, they too have begun to create their own threat intelligence teams. So how do these new commercial teams compare to their military counterparts? In this episode, we ...

007 Analyzing the Insider Threat

May 22, 2017 16:00 - 18 minutes

What exactly is an insider threat? It’s a term we hear a lot in cyber security circles, and of course, the world of threat intelligence. While its meaning seems self-evident, we’ve found that it often brings to mind different things to different people. In this episode, we talk to a real expert on the subject of insider threats, John Wetzel, a Threat Intelligence Analyst at Recorded Future. Before he joined the team, John was a Counterintelligence Special Agent with the Department of Defense....

006 Insikt: Insights to Intelligence

May 15, 2017 16:00 - 13 minutes

Turning information into actionable intelligence is a critical activity for organizations of all types and sizes. The challenge remains sifting through the enormous amount of data coming at us from all angles and at ever-increasing rates. In this episode, we give the scoop on Recorded Future’s new team dedicated to helping organizations overcome these challenges. Insikt Group is a team of veteran threat researchers that back up the intelligence analysts, engineers, and data scientists that ...

005 Ransomware by the Book

May 08, 2017 16:00 - 17 minutes

Looking back at predictions about what to expect in cyber security in 2017, one thing on just about everyone’s list was ransomware. It’s quickly risen to one of today’s top cyber threats and shows no signs of slowing down. In this episode, we speak with someone who quite literally wrote the book on ransomware. Allan Liska is a Senior Solutions Architect at Recorded Future, and coauthor of the book, “Ransomware – Defending Against Digital Extortion,” published by O'Reilly. In our conversation,...

004 Going Dark: Fact vs. Fiction on the Dark Web

May 01, 2017 16:00 - 13 minutes

Mention the dark web and many people summon imagery of a massive, mysterious online criminal underground, where all manner of products and information are bought, sold and traded, hidden away from the prying eyes of the public and law enforcement. But, is that really what it’s like, or is that just cyber security marketing hype? In this episode, we take a tour of the dark halls and back alleys of the dark web with the aim of separating fact from fiction. We’ll learn the truth about the people...

003 It’s Cheap, It’s Easy, It’s Dangerous: Karmen Ransomware Hits the Criminal Black Market

April 24, 2017 16:00 - 16 minutes

Over the last two years, Ransomware has become the hottest commodity in the criminal black market. And we do mean commodity—it's getting cheaper and more accessible to crooks, even the unskilled ones. On March 4th of this year, a leading cybercriminal, who goes by the name “Dereck1,” mentioned that there was a new ransomware variant out called “Karmen.” But Dereck1 wasn't the one hawking this in the criminal market. Instead, it's a Russian speaker who goes by the name of “DevBitox.” The first...

002 Feeding Frenzy: The Inside Scoop on Threat Intelligence Feeds.

April 17, 2017 14:46 - 15 minutes

Threat intelligence feeds have become a staple in the diet of analysts and security professionals at organizations large and small. Some feeds are free, others are offered for sale from security vendors. They can also come in a dizzying array of formats, varying sizes, and include threat information that may or may not add value to your organization. In this episode, we give you the inside scoop on threat intelligence feeds. We’ll tell you what they are, how to select the right ones for your ...

001 What Exactly Is Threat Intelligence?

April 10, 2017 01:43 - 16 minutes

In our first episode, we start with the basics of threat intelligence. We talk about its emergence in cyber security and offer some relevant definitions. We describe where threat intelligence comes from, its purpose, and the context in which it's used. In an age of information overload, we also look at the path from data, to information, to actionable intelligence. These are important distinctions when organizations requiring threat intelligence faced the prospect of sorting through competing...