Info

Bill Murphy's RedZone 10X Podcast

The 10X Podcast explores the latest in technology, innovation, creativity, leadership, psychology, health/wellness, and more. Host Bill Murphy is joined by top CIOs, authors, and other leaders at the forefronts of business and innovation. A great listen for business IT leaders guiding their organizations through disruption and exponential change.
RSS Feed Subscribe in Apple Podcasts
Bill Murphy's RedZone 10X Podcast
2023
May
April
March
February
January


2022
December
November
October
September
August
July
May


2021
October
July
June
May
April
March
February
January


2020
December
November
October
August
May
April
February
January


2019
December
November
October
September
August
July
June
January


2018
December
October
September
August
July
May
April
March
February
January


2017
August
July
June
February
January


2016
December
November
October
September
August
July
June
May
April
March
February
January


2015
December
November
October
September
August
July
June
May
April
March
February
January


Categories

All Episodes
Archives
Categories
Now displaying: December, 2022
Dec 1, 2022

Hello everyone and welcome back. In this episode, we are here with Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, cybersecurity architect, and Author.  

Roger first made his debut on the podcast in 2020, when he unlocked the truth and disproved assumptions about multifactor authentication. We are excited to welcome Roger back to discuss his new book, "Ransomware Protection Playbook," in which he outlines a practical roadmap to protect your networks against one of the most insidious and damaging cyber threats, ransomware! 

In today’s episode, learn why the Zero Trust method is the future of computer security and how ransomware attacks better equip companies for future attacks. Be a part of our discussion as we uncover the secrets behind cryptocurrencies, Web 3.0, NFTs, cybercriminal safe havens, dynamic DNS services, network access brokers, and AI bots. 

Are you ready to explore the uncharted territories of the dark web? We sure are. Listen in today.

 

As a CIO and Business IT Leader here are some wins you will get by listening:

  • Roger (6:11): Technological advancements exist that make the internet more secure. Why do people need to agree to and utilize them to prevent cyber-attacks we should’ve seen coming? 
  • Roger (8:03): Who is Kevin Mitnick and why is he the most infamous hacker of our time? 
  • Roger (11:07): The benefit of offensive penetration and how this provides better advice to keep cyber-attacks away. 
  • Roger (13:10): The truth about cryptocurrencies, Web 3.0, and NFTs. 
  • Roger (14:00): Secrets behind cryptocurrency transactions and money laundering. 
  • Roger (18:00): Cybercriminal safe havens do exist! What measures can users take to protect themselves against cybercrime? 
  • Roger (21:30): How nuclear programs are funded with stolen ransomware and cryptocurrency. 
  • Roger (22:00): Ransomware on Windows machines checks for coded languages in Russian, Cyrillic, Ukrainian, and other deviations. Learn why setting as a second language on your Windows machines can protect against ransomware. 
  • Roger (24:00): The ransomware industry is considered the malware industry. Ransomware is a subclass of malware.  
  • Roger (26:00): The dangers that network access brokers create through secret deals that are happening behind the scenes. 
  • Roger (33:00): What is dynamic DNS services and why is it a solution for fixing the internet's malicious attacks? 
  • Roger (35:00): What is Zero Trust and is this method the future of computer security? 
  • Roger (35:30): "Zero Trust" is a mentality that says we are not going to trust you simply because you authenticated correctly. 
  • Roger (38:30): Cyber threats are increasing due to the automation of artificial intelligence bots. 
  • Roger (51:00): The majority of attacks are client-side attacks that get past the firewall, past the antivirus, and past the VPN. Zero Trust says you don't trust anybody, even those claiming to be Zero Trust. 
  • Roger (52:00): Zero trust is about evaluating a user’s behavior and other characteristics. From those behaviors, a rating takes place. If the rating is above the risk threshold, the system aims to block you or will ask for additional information. 
  • Roger (56:30): How ransomware forced companies to be better by revealing to organizations what they needed to be protected from or by showing the great secure backups they had in place. 

 

Resources 

Ransomware Protection (Book) 

Kevin Mitnick 

Hacking Multifactor Authentication 

Whitepapers called Fix the Internet. To receive and read email: rogerg@knowbe4.com 

 

1