Cyber Security Engineering
The Rising Cyber
by Chadi Saliby
3M ago
Cybersecurity engineering is the tool used to create this futuristic better state, in a scientific and most important measurable way. Security architects set the vision for security systems so to speak, and Security engineers figure out how to put this vision into practice, while Collaborating with other IT professionals to ensure that security solutions are integrated with other systems. They are responsible for identifying and mitigating security threats, Monitoring systems for security breaches, and responding to incidents when they occur. Security cannot be an add-on, it has to be integrat ..read more
Visit website
Cyber Security Strategy
The Rising Cyber
by Chadi Saliby
3M ago
Cyber security strategy is the plan to achieve an objective. This objective is the desired future state for the organisation security posture and level of risk. This strategy guides the blend of people, process and technology employed to protect organisations, computers and data from theft and/or destruction. According to The European Union Agency for Cybersecurity (ENISA), cyber security strategy is a plan of actions designed to improve the security and resilience. Its main objectives is to reduce business risks from cyber-attacks by maintaining confidentiality, availability and integrity ..read more
Visit website
Cybercriminals 2024 Modus Operandi
The Rising Cyber
by Chadi Saliby
3M ago
2024 will be the year of major transitions on so many levels, economics, social, culture and political and cyber security is not immune. Ransomware groups are all competing on the same portion of the same market, and you can already observe what would that means. Don’t be the lowest hanging fruit in any kill chain, get your basic cyber hygiene in order and keep an eye on the fast moving threat landscape ..read more
Visit website
Cyberterrorism
The Rising Cyber
by Chadi Saliby
3M ago
According to the FBI terrorism is defined as Violent, criminal acts committed by individuals and/or groups who are inspired by, or associated with foreign terrorist organizations or nations (state-sponsored), or motivated by ideological goals stemming from domestic influences, such as those of a political, religious, social, racial, or environmental nature. Cyberterrorism is a premeditated, politically motivated cyberattack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents. It is ..read more
Visit website
Corporate Cyber Espionage
The Rising Cyber
by Chadi Saliby
4M ago
Espionage is the practice of spying to obtain information about the plans and activities especially of a foreign government or a competing company. Corporate or industrial espionage is spying and exfiltrating of key information that has economical values. Details of a competitor’s new project, a detailed list of clients, research and development (R&D) data or any information with potential economic value. While the rational for corporate espionage is different of that of military espionage, it often involves the same techniques. Such as monitoring, copying of files, and compromising member ..read more
Visit website
Kevin Mangano on Leadership in Cyber Security & Building Strong Security Culture
The Rising Cyber
by Chadi Saliby
5M ago
For the season finale our guest is an executive with exceptional experience leading in cyber security, technology, risk, and digital transformation. Leading in the financial and banking industry, a leader who is people centric, empowering and encouraging individuals for better and secure outcomes. Kevin Mangano - Chief Digital & Risk Officer at Yellow Brick Road. Our discussion was around leadership in cyber security. Building secure and resilient strategies for organisations, and exceptional practical advice for individuals to be safe and secure online. I would like to thank all listeners ..read more
Visit website
Principal Security Research Lead - Ahmed Kasmani
The Rising Cyber
by Chadi Saliby
5M ago
A lengthy interview with one of Australia’s best cyber security researchers, Mr. Ahmed Kasmani a Principal Research Lead at Microsoft where he reverse engineer malwares and analysis adversaries behaviour. Mr. Kasmani worked at CrowdStrike leading the Asia Pacific Detection and Response team. With more than 15 years now working in the Cyber Security industry. Ahmed has investigated and lead on many serious breaches in Australia and overseas. We discussed Australian cyber security workplace, interview processes and advice for hiring managers and discussed some incidents and malwares on the way ..read more
Visit website
Critical Infrastructure Cyber Security Nightmares
The Rising Cyber
by Chadi Saliby
6M ago
The release of ASD ACSC Cyber Threat Report 2022-2023, great timing for such an excellent report. Adding more troubles with all the worldwide demonstrations against Dubai Ports Authorities aka DP World. Australia's largest port operator was hit by a major cyberattack last week. The Canadian bank Moneris calms of preventing a major ransomware attack attributed to Medusa group. Link to the full ASD ACSC Cyber Threat Report 22-23: https://www.cyber.gov.au/about-us/reports-and-statistics/asd-cyber-threat-report-july-2022-june-2023 ..read more
Visit website
Secure Cybersecurity Architecture for Industrial Internet of Things (IIoT)
The Rising Cyber
by Chadi Saliby
6M ago
Securing Industrial IoT deployment against cyber threats remains a major challenge. The consequences of an Industrial IoT security breach are much more severe than compromises of a traditional IT deployment. The Internet Engineering Task Force defined IoT as “a network that connects uniquely identifiable "things" to the internet. The "things" maybe sensing/actuation, with potential programmability interchanging capabilities ..read more
Visit website
Electric Vehicles Security - Automotive Architecture Cybersecurity
The Rising Cyber
by Chadi Saliby
6M ago
Understanding the Electrical/Electronic Architecture and getting insight on how such systems are vulnerable to cyber-attacks, vulnerabilities. Electronic Control Units and how they are grouped into Domains, which are interconnected by sets of in-vehicle network communication channels, with further connection to sensors and actuators making up a full function vehicle with all its software and API’s. Australian National Electric Vehicle Strategy: https://www.dcceew.gov.au/sites/default/files/documents/national-electric-vehicle-strategy.pdf ..read more
Visit website

Follow The Rising Cyber on FeedSpot

Continue with Google
Continue with Apple
OR