Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Best Practices: Teaching Your Kids to Use Technology Safely

December 2nd, 2020

Kids start using technology at a very early age these days, so how do you make sure they are using technology safely? How do you stay involved and set appropriate boundaries to protect their privacy when it comes to photos, apps, and passwords? Mike and Joe share the nitty-gritty of how they are protecting their…

AI, ML, and Quantum Computing: Hope or Hype?

November 18th, 2020

Today’s hot topics are machine learning, AI, and quantum computing. Mike, Joe and guest speaker Josh Lospinoso from Shift5 discuss the benefits and risks. Are the dangers closer than we think? Shift5 experts protect OT platforms like planes, trains and tanks against cyberattack.

OT Security: Scientific Sensors

November 4th, 2020

Special guest Steve Jacobs from a large-scale ecological science program joins Joseph Carson and Mike Gruen at the 401 Access Denied table. Information security and data integrity are essential topics for a program that brings in more than 5 billion ecological sensor readings per day from remote locations to fuel climate change science.

OT Security: Transportation with Shift5

October 21st, 2020

Today, we dive headfirst into the challenges of OT Security specifically surrounding transportation. Josh Lospinoso, CEO and co-founder of Shift5 and former US Army cyber officer, joins us to share his expertise on protecting planes, trains and tanks against cyber-attacks.

OT Security: Intro to OT with Chris Kubecka

October 7th, 2020

Chris Kubecka, American computer security researcher and cyberwarfare specialist, joins us today to discuss all things OT Security. Learn what OT Security is and how it could have prevented famous cyber-attacks throughout the world. Are nation-states prepared for the next cyber-attack and what steps do the experts warn are needed to future-proof OT Security strategies?…

Favorite Hacker Movies with David Scott Lewis

September 23rd, 2020

Join us today for a fun discussion with David Scott Lewis, the hacker who inspired the iconic film “War Games.” We’ll hear the back story of the movie and what got David interested in joining the industry. Plus, from cult favorites and B-movies to Hollywood blockbusters, we’ll cover the other hacker movies we think are…

Election Security – Can a Hacker Really Pick the Next U.S. President?

September 9th, 2020

Join Thycotic, Cybrary, and special guest Dan Lohrmann from Security Mentor and former advisor to senior White House officials, Homeland Security, and more as we talk election security. There are people, processes, and technologies involved to keep the upcoming U.S. presidential elections secure, but should we be confident in them? Hear what worries the experts…

Password Rules You *Have* to Break

August 26th, 2020

Passwords, passwords, passwords! They are annoying but increasingly necessary for everything we do. Today Joe Carson and Mike Gruen cover the worst password habits out there, plus how to balance usability vs. security for our wifi and email passwords, and more. And do we really have to start worrying about our kid’s passwords?!

International Cyber Warfare: How Real is the Threat? Pt. 2

August 12th, 2020

Josh Lospinoso joins us again for part 2 of our international cyber warfare conversation with Joseph Carson and Mike Gruen. This time we focus on zero-day vulnerabilities and the moral complexities that need to be considered. How do you train personnel to know where the line should be drawn and when they should hold back…

International Cyber Warfare: How Real is the Threat? Pt. 1

July 29th, 2020

Joseph Carson and Mike Gruen are joined today by special guest Josh Lospinoso, former Cyber Officer of the US Army as they discuss definitions and methods of international cyber warfare. Is there accountability for governments who use private companies and contractors to handle their dirty work? How often do attackers get caught and how long…