Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Cyber Security Sauna

Technology Business

Activity Overview

Episode publication activity over the past year

Episodes

086| Why showing value is more important for CISOs than ever

03 Jan 2024

Contributed by Lukas

CISOs find themselves at the forefront of safeguarding sensitive information, ensuring regulatory compliance, and protecting their organizations from ...

085| NIST Cyber Security Framework V.2 – Help or Hindrance?

22 Nov 2023

Contributed by Lukas

The NIST Cyber Security Framework has helped secure organizations for nearly a decade and while it's proven to be an invaluable tool, it's gotten a bi...

084| Let's Talk About Threats Baby

01 Nov 2023

Contributed by Lukas

A successful cyber defense should protect an organization's critical assets from today's threats, not yesterday's. For this episode, we sat down with ...

083| Security by design for CISOs

09 Oct 2023

Contributed by Lukas

The term Shifting Left has not been traditionally associated with cyber security. In this episode, WithSecure CISO Christine Bejerasco lays out the ca...

082| Hyped and Hacked - AI in Cyber Security

20 Sep 2023

Contributed by Lukas

As Mikko Hyppönen said recently, we are indeed in the midst of the hottest AI summer ever, and the hype level is off the charts. Yes, AI presents ama...

081| Mudge - the man, the myth, the mythbusting

28 Aug 2023

Contributed by Lukas

We have the pleasure of being joined by the one and only Peiter "Mudge" Zatko, network security expert, open-source programmer, writer, and hacker, wi...

080| The Power Of Putting Security Outcomes First

07 Aug 2023

Contributed by Lukas

As security is primarily about stopping bad things from happening, victories are often silent. At the same time, failures are often very public, s...

079|(Mind the) Detection and Response Gap

17 Jul 2023

Contributed by Lukas

The time that an attacker spends on a network before attempting to achieve their objective is decreasing rapidly, making many organizations' typical d...

078| John Grant on the relationship between sustainability and cyber security

26 Jun 2023

Contributed by Lukas

The development of new sustainable technologies undoubtedly benefits society, but it also opens the door to new cyber security challenges. For this ep...

077| Jessica Berlin and Stephen Robinson on the cyber front

06 Jun 2023

Contributed by Lukas

Russia's invasion of Ukraine changed the entire geopolitical landscape. For this episode, we were on-site at SPHERE23 with security and foreign policy...

076| What we get wrong (and right) about APTs

08 May 2023

Contributed by Lukas

Advanced persistent threats, or APTs, are generally seen as a sort of apex predator in the cyber threat landscape. And while they're certainly notewor...

075| Winning with outcome-based security

04 Apr 2023

Contributed by Lukas

Security protects organizations from cyber attacks. However, studies show that limiting your understanding of security to this basic premise can hinde...

074| Do you even patch bro?

07 Mar 2023

Contributed by Lukas

Vulnerabilities and security gaps are increasingly being identified in software and applications daily. Attackers are often quick to act when any vuln...

073| 2023 - Looking Forward

01 Feb 2023

Contributed by Lukas

In our last episode, we were joined by cyber security advisor Paul Brucciani and WithSecure Intelligence Researcher Andy Patel to discuss some notable...

072| 2022 Wrap-Up

01 Jan 2023

Contributed by Lukas

As the year draws to a close, it's time for us to review and reflect on notable infosec events and trends from 2022, and also what might happen in 202...

071| Deepfakin it: AI content in cyber attacks

05 Dec 2022

Contributed by Lukas

Until recently, AI-generated synthetic content has been more commonly used for gaming and art creation, where the tech is still relatively new, and pi...

Cyber Security Sauna: Breaking Views – The Vastaamo case

09 Nov 2022

Contributed by Lukas

In this Cyber Security Sauna special edition podcast, we cover new developments in the data breach of Finnish Psychotherapy provider Vastaamo in 2020....

070| Crowdsourcing Security with Bug Bounties

02 Nov 2022

Contributed by Lukas

Bug bounties (also known as vulnerability reward programs) crowdsource security expertise to address vulnerabilities in products or services before at...

069| Cyber conflicts, Corporations and Collateral damage

03 Oct 2022

Contributed by Lukas

Geo-political conflicts are increasingly being played out in cyberspace, and organizations, whether they are aware or not, are often caught in the cro...

SPHERE SESSION | Johanna Småros on winning the algorithmic retail

26 Sep 2022

Contributed by Lukas

Co-founder & CMO at RELEX Solutions, Johanna Småros, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconfe...

SPHERE SESSION | Matthew Rosenquist on why value is the cybersecurity blindspot

13 Sep 2022

Contributed by Lukas

CISO and cybersecurity Strategist, Matthew Rosenquist, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconf...

068|The other TTPs: Tools, technologies, and people

07 Sep 2022

Contributed by Lukas

In this episode, we're joined by Frank Fransen, Senior Scientist in Cyber Security at TNO, and Technical Coordinator of the EU's SOCCRATES project, wh...

SPHERE SESSION | Sari Stenfors on AI, humanness and positive futures

19 Aug 2022

Contributed by Lukas

Serial entrepreneur, scientist and futurist, Sari Stenfors, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security un...

SPHERE SESSION | Risto Siilasmaa on trust as the building block for businesses

09 Aug 2022

Contributed by Lukas

Chairman and Founder of F-Secure & WithSecure, Risto Siilasmaa, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-securit...

SPHERE SESSION | Christine Bejerasco on the development of ransomware

29 Jul 2022

Contributed by Lukas

WithSecure CTO, Christine Bejerasco, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconference, for a discu...

067| How Mikko Hypponen learned to stop worrying and love the internet

14 Jul 2022

Contributed by Lukas

Mikko Hyppönen is one of the world's most renowned cyber security experts and has investigated cybercrime for over 25 years. From the days of naughty...

SPHERE SESSION | Simone Giertz on building useless things

11 Jul 2022

Contributed by Lukas

Swedish inventor and world-famous YouTuber, Simone Giertz joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unco...

SPHERE SESSION | Carole Cadwalladr on threats to democracy

30 Jun 2022

Contributed by Lukas

TED speaker and Pulitzer-nominated journalist Carole Cadwalladr joined us in our cyber sauna recording booth at SPHERE22, the world's first co-securit...

SPHERE SESSION | Philip Ingram on nation-state threats

13 Jun 2022

Contributed by Lukas

Spymaster-turned-journalist Philip Ingram joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconference, for a ...

066| Co-security: collaboration, cooperation and cyber security

05 Apr 2022

Contributed by Lukas

There's many different ways to collaborate on infosec problems. There's no shortage of associations, conferences, and other frameworks that organizati...

065| Security for non-profit organizations

28 Feb 2022

Contributed by Lukas

Non-profit organizations play a crucial role in our well-being. In many parts of the world, they're a major source of education, health care, social s...

064| 2021, 2022 and beyond - Part 2

24 Jan 2022

Contributed by Lukas

With 2021 now behind us, it's time to revisit the highs and lows of the past 12 months, and look ahead to what we can expect in the months ahead. To m...

063| 2021, 2022 and beyond - Part 1

29 Dec 2021

Contributed by Lukas

2021 is drawing to a close, and it's time to look back on the events of the past year. At the same time we look ahead to the brand new year to come. W...

062| Log4j Zero Day: What It Means for Your Org

14 Dec 2021

Contributed by Lukas

The remotely exploitable Log4j zero day vulnerability disclosed just a few days ago has been called one of the most serious vulnerabilities to date. S...

061| AppSec, According to Two Guys Named Antti

24 Nov 2021

Contributed by Lukas

The topic of application security has never been more important. So how are companies approaching appsec? What should companies do to ensure appsec ge...

060| Biometrics: Privacy, Problems and Possibilities

02 Nov 2021

Contributed by Lukas

Biometrics have gotten a lot of attention in recent years. Biometric authentication systems have the potential to take the place of passwords, streaml...

059| Keeping Your Latest Tech from Becoming the Latest Threat

11 Oct 2021

Contributed by Lukas

Cyber crime is a constantly evolving game. As soon as new technology is introduced, attackers start figuring out how to exploit it for malicious purpo...

058| Paths to Infosec: From ER to IR

20 Sep 2021

Contributed by Lukas

Data breaches and other security incidents have become a frequent, severe problem for organizations. But with incident responders in short supply, the...

057| Dark Web: The Good, the Bad, and the Ugly

17 Aug 2021

Contributed by Lukas

After data breaches and ransomware attacks, we often hear that customer information was leaked to the dark web. This obviously can have serious implic...

056| To Ban or Not to Ban? Ransomware Payment Regulation

15 Jul 2021

Contributed by Lukas

Ransomware payment amounts have skyrocketed over the past year. As threat actors keep getting richer, they have more resources to fuel their operation...

055| When AI Goes Awry

23 Jun 2021

Contributed by Lukas

AI and machine learning are shaping our online experience, from product recommendations, to customer support chatbots, to virtual assistants like Siri...

054| Ransomware Incident Response and the Role of Readiness

27 May 2021

Contributed by Lukas

The fallout from a ransomware attack is every organization's worst nightmare. But it doesn't necessarily have to be, if you can respond to an attack e...

053| How to Secure Networks and Influence People

28 Apr 2021

Contributed by Lukas

The role of a chief information security officer demands technical knowledge, but it also requires soft skills of leading and influencing - especially...

052| Challenges in Cloud Security

06 Apr 2021

Contributed by Lukas

Cloud computing was one of the last decade's most transformative technologies. It helped organizations launch exciting new applications and services, ...

051| Looking at Phishing Through the Intrusion Kill Chain

11 Mar 2021

Contributed by Lukas

Phishing is the number one vector leading to data breaches. It's an easy, effective way for attackers to trick users into giving up credentials or run...

050| Getting the Most out of Infosec Conferences

18 Feb 2021

Contributed by Lukas

Infosec conferences give cybersecurity professionals a chance to network, hear the latest research, exchange ideas, and demo hacks and new tools. But ...

049| Ransomware 2.0, with Mikko Hypponen

19 Jan 2021

Contributed by Lukas

We thought locking up data and demanding a ransom to decrypt it was bad. But ransomware criminals have stooped even lower and now, threats of public d...

048| The Year in Cyber: 2020

30 Dec 2020

Contributed by Lukas

2020 has been a year no one predicted. COVID-19 made remote work the norm and shook up the attack landscape. Through it all, breaches and ransomware a...

047| The Tangled Web of ID Theft

09 Dec 2020

Contributed by Lukas

With the holiday season upon us, the already accelerated pace of online shopping is picking up even more. And more online transactions means more reas...

046| 10 Burning Mobile Security Questions, Answered

12 Nov 2020

Contributed by Lukas

Is iOS really more secure than Android, and why? What are the pros and cons of biometric authentication? How can you know which apps are safe to use, ...

045| The Most Frightening Thing About Stalkerware, with Eva Galperin

05 Oct 2020

Contributed by Lukas

You know about malware, ransomware, spyware. But there's an increasing concern about stalkerware, a creepy breed of apps that allow someone else to di...

044| 2020 in Cyber Threats, So Far: COVID-19's Effects, Ransomware's Latest Tricks

17 Sep 2020

Contributed by Lukas

It's a year like none we've ever experienced. COVID-19's effects have reverberated around the world, and around cyberspace. What's been happening in t...

043| Paths to Infosec: Military Vs. Psychology

24 Aug 2020

Contributed by Lukas

There is no one set path to a cybersecurity career, and today's guests have arrived in the field in very different ways. Logan Whitmire comes from a m...

042| The Encryption Debate Rages On

30 Jul 2020

Contributed by Lukas

Encryption plays a critical role in protecting our data from hackers and theft. But at the same time, it presents a challenge for law enforcement when...

041| The Ethics of Red Teaming

29 Jun 2020

Contributed by Lukas

Red team testing is somewhat intrusive by nature, as it involves breaking into companies - albeit at their request - to help them improve their securi...

040| Can Contact Tracing Apps Preserve Your Privacy?

27 May 2020

Contributed by Lukas

Contact tracing is a key strategy for preventing the spread of COVID-19, and smartphone-assisted contract tracing automates a laborious process. But c...

039| Deconstructing the Dukes: A Researcher's Retrospective of APT29

06 May 2020

Contributed by Lukas

APT29, aka Cozy Bear or the Dukes, is a cyber espionage group whose misdeeds include famously hacking into the DNC servers in the run-up to the 2016 U...

038| Mikko Hypponen on Zoom, COVID-19 Threats, and Working During a Pandemic

16 Apr 2020

Contributed by Lukas

It's the topic on everyone's minds: The new state of our world amid and after a global pandemic. Mikko Hypponen, F-Secure's Chief Research Officer, j...

037| COVID-19 and Your Company's Security: The CISO Speaks

24 Mar 2020

Contributed by Lukas

In infosec we're used to news about digital virus infections and outbreaks. But the new coronavirus is turning the real world upside down. In many ...

036| From Stuxnet to WannaCry to Coinhive, The Past Decade Was All Over The Place

16 Mar 2020

Contributed by Lukas

2020 marks the start of a new decade. But it's also worth taking a look back at where we've come from and what has changed in infosec. F-Secure's Chri...

035| Threat Hunting & Why It's All About People

19 Feb 2020

Contributed by Lukas

Threat hunting has become a buzzword in the industry of late. But what is it all about? Why should companies consider using threat hunting as a part o...

034| Balancing AI: Privacy, Misuse, Ethics and the Future

29 Jan 2020

Contributed by Lukas

While AI and machine learning are enabling definite advances in the digital world, these technologies are also raising privacy and ethical concerns. W...

033| Cyber Security Education from Student and Teacher Perspectives

08 Jan 2020

Contributed by Lukas

Cyber security has never been a hotter field to get into, but how do you gain the skills needed for landing a job? There are various paths to a cyber ...

032| How California's New Privacy Law Strikes Where the Pain Is

04 Dec 2019

Contributed by Lukas

Following in the footsteps of GDPR, the US is seeing more progressive data privacy laws coming down, with the new California Consumer Privacy Act lead...

031| Filtered & Fragmented: Is True Internet Freedom a Thing of the Past?

12 Nov 2019

Contributed by Lukas

The internet seems to be changing from being a relatively unrestricted space into something more regulated. More countries are implementing policies t...

030| Talking Infosec to Non-Infosec Folks

22 Oct 2019

Contributed by Lukas

Cyber security is relevant for everyone. Not everyone realizes it though, and not everyone understands what those in the infosec industry take for gra...

029| Ask a Hacker: Red Teamer Answers Listener Questions

25 Sep 2019

Contributed by Lukas

In this episode, veteran hacker and red teamer Tom Van de Wiele answers questions from our listeners. Tom covers the ethics of ethical hacking, how to...

028| When the Well is Poisoned: The Devastation of Supply Chain Attacks

29 Aug 2019

Contributed by Lukas

Supply chain attacks are on the increase, with attackers abusing the trust we place in vendors and software. Why are these attacks growing, and what c...

027| The Connected Home Meets the IoT Tire Fire

03 Aug 2019

Contributed by Lukas

The modern home is continually getting more connected. But as much as we love our virtual assistants, smart thermostats and cloud-enabled security cam...

026| Safe Browsing & Secure Web Development

04 Jul 2019

Contributed by Lukas

"Don't go to shady websites" was the advice people were given back in the day. But now it's not always possible to tell when you're in danger, as even...

025| The Psychology of Phishing

12 Jun 2019

Contributed by Lukas

Phishing is one of today's biggest cyber security issues, a go-to tactic for threat actors. It's simple and effective, and perhaps that's why it has b...

024| GDPR, One Year Later

15 May 2019

Contributed by Lukas

One year ago, the EU General Data Protection Regulation (GDPR) came into effect, fundamentally changing the way businesses handle data. The GDPR force...

023| Electronic Voting & Why it's So Hard to Get Right

23 Apr 2019

Contributed by Lukas

Cyber security is always a hot topic during election seasons, and various elections are being held in Europe and around the world this spring. As digi...

022| Pro-Brexit Twitter Views Amplified by the Global Far Right

02 Apr 2019

Contributed by Lukas

The pro-leave side of the Brexit debate is getting support from far-right Twitter users based outside the UK. After investigating 24 million Brexit-re...

021| The Cloud: Security Benefits, Risks & Why You Should Use It

14 Mar 2019

Contributed by Lukas

The cloud has changed the way we do business and the way we develop and deploy software and infrastructure. What are the security benefits of moving t...

020| Defining Cyber Warfare, with Mikko Hypponen

11 Feb 2019

Contributed by Lukas

Cyber war is a term we often hear tossed about, but is it just science fiction, or is it really happening? How worried should we be about the potentia...

019| The Best Defense is Good Offensive Security

23 Jan 2019

Contributed by Lukas

They say that the best defense is a good offense, as football fans or anyone that's played a game of Risk might agree. But how does this idea look whe...

018| Online Dating and Trading Data for Love (It's Complicated)

26 Dec 2018

Contributed by Lukas

If you're looking for love nowadays, you'll likely turn to an online dating app. But what do these apps mean for your security? What privacy concessio...

017| Year in Cyber: Forecasting 2019, Recapping 2018

10 Dec 2018

Contributed by Lukas

2018 is winding to a close and the new year is just around the corner. What's in store for 2019 in cyber security? In this episode, five experts talk ...

016| Endpoint Protection & Beyond

19 Nov 2018

Contributed by Lukas

Endpoint protection has been the trusted backbone of many companies' security. But with stories about data breaches and successful cyber attacks con...

015| Election Security, US Midterm Edition: The Big Picture

29 Oct 2018

Contributed by Lukas

Democracy in the digital age is a wonderful yet wild beast. When it comes to electing our leaders nowadays, we're faced with questions about how to es...

014| Reinventing the Cold Boot Attack: Modern Laptop Version

08 Oct 2018

Contributed by Lukas

Should your laptop ever get stolen and fall into the wrong hands, you would probably be comfortable in the knowledge that the data on it is protected ...

013| Passwords: A Hacker's Take on Cracking & Protecting Your Creds

14 Sep 2018

Contributed by Lukas

Passwords. You plug them into your accounts and the services you use at work, you try little tricks to make them more unique, but have you ever wonder...

012| Adventures in Red Teaming

23 Aug 2018

Contributed by Lukas

How can companies know if their security investments are actually working? Getting attacked is the ultimate test, but hiring a red team is a less disr...

011| The Rise of AI and Deliberate Deception

02 Aug 2018

Contributed by Lukas

Disinformation. Fake news. Social media manipulation. Lately another dark side of the internet has come into focus - its use as a tool for deception. ...

010| Ransomware Out, Cryptojacking In? Latest Cybercrime Trends

09 Jul 2018

Contributed by Lukas

Over the past few years, ransomware stole headlines as the biggest malware threat to worry about. Consumers and businesses alike were being hit and fo...

009| Top OpSec Tips for Vacation Travel

21 Jun 2018

Contributed by Lukas

The summer holiday season is upon us, and people are looking forward to trading their daily workplace grind for a new adventure. Traveling is always e...

008| GDPR is Live. What Now?

31 May 2018

Contributed by Lukas

After months and months of anticipation, the May 25 deadline has passed and the GDPR is finally in effect. Companies around the world are being held ...

007| Popping Hotel Locks: The Hard Truth About Hacking

09 May 2018

Contributed by Lukas

When people look for logos or symbols that emanate security, they often choose a lock. Sure, we know locks can be picked. But what would the world loo...

006| Spring Cleaning for Opsec

26 Apr 2018

Contributed by Lukas

Operational security is about turning the tables, looking at things from an attacker's point of view, and identifying how your own actions are making...

005| Demystifying Hardware Security, with Andrea Barisani

29 Mar 2018

Contributed by Lukas

With the disclosure of Meltdown and Spectre early this year, hardware security has come into focus. What are the special challenges of securing hardwa...

004| Security, Privacy and the IoT, with Steve Lord

08 Mar 2018

Contributed by Lukas

The Internet of Things promises futuristic smart homes, energy savings and efficiencies, and improvements to health and well-being. But the IoT still ...

003| Data Breaches: Bridging the Gap

13 Feb 2018

Contributed by Lukas

Data breaches. They're every organization's worst fear. Why are companies so ill-prepared, and what are companies missing in their approach to data br...

002| Breaking Into Infosec: Advice from an Ethical Hacker

21 Dec 2017

Contributed by Lukas

Between zero day news flashes and stunt hacking reports, there are a lot of false conceptions about what it's like to be an infosec professional. So w...

001| Antivirus in the Hot Seat, with Mikko Hypponen

30 Nov 2017

Contributed by Lukas

The recent allegations against Russian antivirus vendor Kaspersky have prompted wider questions about antivirus in general - how it operates and what ...