Thanks!

You are now subscribed to our monthly blog digest. Happy reading!

Click anywhere to dismiss ...

Cyber Forensics and Threat Intelligence with Coherent Cyber - Week 32 of Cyber Talk Radio

Cyber Forensics and Threat Intelligence - Week 32 of Cyber Talk Radio

Show Summary

This past Saturday, May 6, episode 32 of Cyber Talk Radio hit the air on 1200 WOAI and iHeartRadio streaming. I was joined by Nicolas Hollis and Jacob Stauffer at Coherent Cyber, to discuss cyber forensics and threat intelligence.

In the first half of the show, we kick off by having Nicolas and Jacob give us background on their experience in cybersecurity, cyber forensics and threat intelligence. What should you be doing to keep your business safe from cyberattacks? One of the biggest things companies can do is focus on training employees on security best practices. For example, don’t pick up a USB drive at a conference and plug it into your computer. Social engineering of employees is the easiest way for an attacker to get into a company’s network. On average, intruders are inside your network for at least 180 days - that is a frightening stat. It is not uncommon for a company to be under attack for a long period of time before finding out. In the first half, learn why companies need to harden the border. The people in front of the work stations are the threat and most vulnerable to the attackers.

In the second half of the show, we go over log management strategies for forensics. When it comes to cybersecurity, why do physical risks get more attention than digital risks? Cyber crime has now surpassed physical crime in the amount of dollars stolen. The biggest challenge is that there are not enough cybersecurity professionals being trained. What should SMBs be thinking about to keep their business safe? Quick tips include configure your servers with security in mind, maintain password management, implement employee training, have some form of anti-virus, run backups and have a consultant come in to do a scan of your security posture. Many businesses are stockpiling bitcoins to pay off ransomware instead of taking the measures to block it in the first place or pay for backups to fall back on should your computer get infected. What’s the next big thing? The Internet of Things landscape has opened us up to more potential exploits.

To hear more about Coherent Cyber, cyber forensics and threat intelligence, watch the replay here!

Upcoming episode – Saturday nights from 11:00 p.m. to Midnight -

Listen to a replay of this episode or past episodes on a Cyber Talk Radio Podcast stream. Replays are available via the below podcast services:

Recent episodes – available to stream from our YouTube channel -

Have an idea for a topic or want to be a guest?

Contact Cyber Talk Radio via our request a topic or be a guest form.

Protect Your Business Data

We are passionate about helping our customers protect their data. We want you to use Jungle Disk to protect yours. Click on Sign Up to get started. It takes less than 5 minutes!

Sign Up