Cyber Security Sauna
Activity Overview
Episode publication activity over the past year
Episodes
086| Why showing value is more important for CISOs than ever
03 Jan 2024
Contributed by Lukas
CISOs find themselves at the forefront of safeguarding sensitive information, ensuring regulatory compliance, and protecting their organizations from ...
085| NIST Cyber Security Framework V.2 – Help or Hindrance?
22 Nov 2023
Contributed by Lukas
The NIST Cyber Security Framework has helped secure organizations for nearly a decade and while it's proven to be an invaluable tool, it's gotten a bi...
084| Let's Talk About Threats Baby
01 Nov 2023
Contributed by Lukas
A successful cyber defense should protect an organization's critical assets from today's threats, not yesterday's. For this episode, we sat down with ...
083| Security by design for CISOs
09 Oct 2023
Contributed by Lukas
The term Shifting Left has not been traditionally associated with cyber security. In this episode, WithSecure CISO Christine Bejerasco lays out the ca...
082| Hyped and Hacked - AI in Cyber Security
20 Sep 2023
Contributed by Lukas
As Mikko Hyppönen said recently, we are indeed in the midst of the hottest AI summer ever, and the hype level is off the charts. Yes, AI presents ama...
081| Mudge - the man, the myth, the mythbusting
28 Aug 2023
Contributed by Lukas
We have the pleasure of being joined by the one and only Peiter "Mudge" Zatko, network security expert, open-source programmer, writer, and hacker, wi...
080| The Power Of Putting Security Outcomes First
07 Aug 2023
Contributed by Lukas
As security is primarily about stopping bad things from happening, victories are often silent. At the same time, failures are often very public, s...
079|(Mind the) Detection and Response Gap
17 Jul 2023
Contributed by Lukas
The time that an attacker spends on a network before attempting to achieve their objective is decreasing rapidly, making many organizations' typical d...
078| John Grant on the relationship between sustainability and cyber security
26 Jun 2023
Contributed by Lukas
The development of new sustainable technologies undoubtedly benefits society, but it also opens the door to new cyber security challenges. For this ep...
077| Jessica Berlin and Stephen Robinson on the cyber front
06 Jun 2023
Contributed by Lukas
Russia's invasion of Ukraine changed the entire geopolitical landscape. For this episode, we were on-site at SPHERE23 with security and foreign policy...
076| What we get wrong (and right) about APTs
08 May 2023
Contributed by Lukas
Advanced persistent threats, or APTs, are generally seen as a sort of apex predator in the cyber threat landscape. And while they're certainly notewor...
075| Winning with outcome-based security
04 Apr 2023
Contributed by Lukas
Security protects organizations from cyber attacks. However, studies show that limiting your understanding of security to this basic premise can hinde...
074| Do you even patch bro?
07 Mar 2023
Contributed by Lukas
Vulnerabilities and security gaps are increasingly being identified in software and applications daily. Attackers are often quick to act when any vuln...
073| 2023 - Looking Forward
01 Feb 2023
Contributed by Lukas
In our last episode, we were joined by cyber security advisor Paul Brucciani and WithSecure Intelligence Researcher Andy Patel to discuss some notable...
072| 2022 Wrap-Up
01 Jan 2023
Contributed by Lukas
As the year draws to a close, it's time for us to review and reflect on notable infosec events and trends from 2022, and also what might happen in 202...
071| Deepfakin it: AI content in cyber attacks
05 Dec 2022
Contributed by Lukas
Until recently, AI-generated synthetic content has been more commonly used for gaming and art creation, where the tech is still relatively new, and pi...
Cyber Security Sauna: Breaking Views – The Vastaamo case
09 Nov 2022
Contributed by Lukas
In this Cyber Security Sauna special edition podcast, we cover new developments in the data breach of Finnish Psychotherapy provider Vastaamo in 2020....
070| Crowdsourcing Security with Bug Bounties
02 Nov 2022
Contributed by Lukas
Bug bounties (also known as vulnerability reward programs) crowdsource security expertise to address vulnerabilities in products or services before at...
069| Cyber conflicts, Corporations and Collateral damage
03 Oct 2022
Contributed by Lukas
Geo-political conflicts are increasingly being played out in cyberspace, and organizations, whether they are aware or not, are often caught in the cro...
SPHERE SESSION | Johanna Småros on winning the algorithmic retail
26 Sep 2022
Contributed by Lukas
Co-founder & CMO at RELEX Solutions, Johanna Småros, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconfe...
SPHERE SESSION | Matthew Rosenquist on why value is the cybersecurity blindspot
13 Sep 2022
Contributed by Lukas
CISO and cybersecurity Strategist, Matthew Rosenquist, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconf...
068|The other TTPs: Tools, technologies, and people
07 Sep 2022
Contributed by Lukas
In this episode, we're joined by Frank Fransen, Senior Scientist in Cyber Security at TNO, and Technical Coordinator of the EU's SOCCRATES project, wh...
SPHERE SESSION | Sari Stenfors on AI, humanness and positive futures
19 Aug 2022
Contributed by Lukas
Serial entrepreneur, scientist and futurist, Sari Stenfors, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security un...
SPHERE SESSION | Risto Siilasmaa on trust as the building block for businesses
09 Aug 2022
Contributed by Lukas
Chairman and Founder of F-Secure & WithSecure, Risto Siilasmaa, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-securit...
SPHERE SESSION | Christine Bejerasco on the development of ransomware
29 Jul 2022
Contributed by Lukas
WithSecure CTO, Christine Bejerasco, joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconference, for a discu...
067| How Mikko Hypponen learned to stop worrying and love the internet
14 Jul 2022
Contributed by Lukas
Mikko Hyppönen is one of the world's most renowned cyber security experts and has investigated cybercrime for over 25 years. From the days of naughty...
SPHERE SESSION | Simone Giertz on building useless things
11 Jul 2022
Contributed by Lukas
Swedish inventor and world-famous YouTuber, Simone Giertz joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unco...
SPHERE SESSION | Carole Cadwalladr on threats to democracy
30 Jun 2022
Contributed by Lukas
TED speaker and Pulitzer-nominated journalist Carole Cadwalladr joined us in our cyber sauna recording booth at SPHERE22, the world's first co-securit...
SPHERE SESSION | Philip Ingram on nation-state threats
13 Jun 2022
Contributed by Lukas
Spymaster-turned-journalist Philip Ingram joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconference, for a ...
066| Co-security: collaboration, cooperation and cyber security
05 Apr 2022
Contributed by Lukas
There's many different ways to collaborate on infosec problems. There's no shortage of associations, conferences, and other frameworks that organizati...
065| Security for non-profit organizations
28 Feb 2022
Contributed by Lukas
Non-profit organizations play a crucial role in our well-being. In many parts of the world, they're a major source of education, health care, social s...
064| 2021, 2022 and beyond - Part 2
24 Jan 2022
Contributed by Lukas
With 2021 now behind us, it's time to revisit the highs and lows of the past 12 months, and look ahead to what we can expect in the months ahead. To m...
063| 2021, 2022 and beyond - Part 1
29 Dec 2021
Contributed by Lukas
2021 is drawing to a close, and it's time to look back on the events of the past year. At the same time we look ahead to the brand new year to come. W...
062| Log4j Zero Day: What It Means for Your Org
14 Dec 2021
Contributed by Lukas
The remotely exploitable Log4j zero day vulnerability disclosed just a few days ago has been called one of the most serious vulnerabilities to date. S...
061| AppSec, According to Two Guys Named Antti
24 Nov 2021
Contributed by Lukas
The topic of application security has never been more important. So how are companies approaching appsec? What should companies do to ensure appsec ge...
060| Biometrics: Privacy, Problems and Possibilities
02 Nov 2021
Contributed by Lukas
Biometrics have gotten a lot of attention in recent years. Biometric authentication systems have the potential to take the place of passwords, streaml...
059| Keeping Your Latest Tech from Becoming the Latest Threat
11 Oct 2021
Contributed by Lukas
Cyber crime is a constantly evolving game. As soon as new technology is introduced, attackers start figuring out how to exploit it for malicious purpo...
058| Paths to Infosec: From ER to IR
20 Sep 2021
Contributed by Lukas
Data breaches and other security incidents have become a frequent, severe problem for organizations. But with incident responders in short supply, the...
057| Dark Web: The Good, the Bad, and the Ugly
17 Aug 2021
Contributed by Lukas
After data breaches and ransomware attacks, we often hear that customer information was leaked to the dark web. This obviously can have serious implic...
056| To Ban or Not to Ban? Ransomware Payment Regulation
15 Jul 2021
Contributed by Lukas
Ransomware payment amounts have skyrocketed over the past year. As threat actors keep getting richer, they have more resources to fuel their operation...
055| When AI Goes Awry
23 Jun 2021
Contributed by Lukas
AI and machine learning are shaping our online experience, from product recommendations, to customer support chatbots, to virtual assistants like Siri...
054| Ransomware Incident Response and the Role of Readiness
27 May 2021
Contributed by Lukas
The fallout from a ransomware attack is every organization's worst nightmare. But it doesn't necessarily have to be, if you can respond to an attack e...
053| How to Secure Networks and Influence People
28 Apr 2021
Contributed by Lukas
The role of a chief information security officer demands technical knowledge, but it also requires soft skills of leading and influencing - especially...
052| Challenges in Cloud Security
06 Apr 2021
Contributed by Lukas
Cloud computing was one of the last decade's most transformative technologies. It helped organizations launch exciting new applications and services, ...
051| Looking at Phishing Through the Intrusion Kill Chain
11 Mar 2021
Contributed by Lukas
Phishing is the number one vector leading to data breaches. It's an easy, effective way for attackers to trick users into giving up credentials or run...
050| Getting the Most out of Infosec Conferences
18 Feb 2021
Contributed by Lukas
Infosec conferences give cybersecurity professionals a chance to network, hear the latest research, exchange ideas, and demo hacks and new tools. But ...
049| Ransomware 2.0, with Mikko Hypponen
19 Jan 2021
Contributed by Lukas
We thought locking up data and demanding a ransom to decrypt it was bad. But ransomware criminals have stooped even lower and now, threats of public d...
048| The Year in Cyber: 2020
30 Dec 2020
Contributed by Lukas
2020 has been a year no one predicted. COVID-19 made remote work the norm and shook up the attack landscape. Through it all, breaches and ransomware a...
047| The Tangled Web of ID Theft
09 Dec 2020
Contributed by Lukas
With the holiday season upon us, the already accelerated pace of online shopping is picking up even more. And more online transactions means more reas...
046| 10 Burning Mobile Security Questions, Answered
12 Nov 2020
Contributed by Lukas
Is iOS really more secure than Android, and why? What are the pros and cons of biometric authentication? How can you know which apps are safe to use, ...
045| The Most Frightening Thing About Stalkerware, with Eva Galperin
05 Oct 2020
Contributed by Lukas
You know about malware, ransomware, spyware. But there's an increasing concern about stalkerware, a creepy breed of apps that allow someone else to di...
044| 2020 in Cyber Threats, So Far: COVID-19's Effects, Ransomware's Latest Tricks
17 Sep 2020
Contributed by Lukas
It's a year like none we've ever experienced. COVID-19's effects have reverberated around the world, and around cyberspace. What's been happening in t...
043| Paths to Infosec: Military Vs. Psychology
24 Aug 2020
Contributed by Lukas
There is no one set path to a cybersecurity career, and today's guests have arrived in the field in very different ways. Logan Whitmire comes from a m...
042| The Encryption Debate Rages On
30 Jul 2020
Contributed by Lukas
Encryption plays a critical role in protecting our data from hackers and theft. But at the same time, it presents a challenge for law enforcement when...
041| The Ethics of Red Teaming
29 Jun 2020
Contributed by Lukas
Red team testing is somewhat intrusive by nature, as it involves breaking into companies - albeit at their request - to help them improve their securi...
040| Can Contact Tracing Apps Preserve Your Privacy?
27 May 2020
Contributed by Lukas
Contact tracing is a key strategy for preventing the spread of COVID-19, and smartphone-assisted contract tracing automates a laborious process. But c...
039| Deconstructing the Dukes: A Researcher's Retrospective of APT29
06 May 2020
Contributed by Lukas
APT29, aka Cozy Bear or the Dukes, is a cyber espionage group whose misdeeds include famously hacking into the DNC servers in the run-up to the 2016 U...
038| Mikko Hypponen on Zoom, COVID-19 Threats, and Working During a Pandemic
16 Apr 2020
Contributed by Lukas
It's the topic on everyone's minds: The new state of our world amid and after a global pandemic. Mikko Hypponen, F-Secure's Chief Research Officer, j...
037| COVID-19 and Your Company's Security: The CISO Speaks
24 Mar 2020
Contributed by Lukas
In infosec we're used to news about digital virus infections and outbreaks. But the new coronavirus is turning the real world upside down. In many ...
036| From Stuxnet to WannaCry to Coinhive, The Past Decade Was All Over The Place
16 Mar 2020
Contributed by Lukas
2020 marks the start of a new decade. But it's also worth taking a look back at where we've come from and what has changed in infosec. F-Secure's Chri...
035| Threat Hunting & Why It's All About People
19 Feb 2020
Contributed by Lukas
Threat hunting has become a buzzword in the industry of late. But what is it all about? Why should companies consider using threat hunting as a part o...
034| Balancing AI: Privacy, Misuse, Ethics and the Future
29 Jan 2020
Contributed by Lukas
While AI and machine learning are enabling definite advances in the digital world, these technologies are also raising privacy and ethical concerns. W...
033| Cyber Security Education from Student and Teacher Perspectives
08 Jan 2020
Contributed by Lukas
Cyber security has never been a hotter field to get into, but how do you gain the skills needed for landing a job? There are various paths to a cyber ...
032| How California's New Privacy Law Strikes Where the Pain Is
04 Dec 2019
Contributed by Lukas
Following in the footsteps of GDPR, the US is seeing more progressive data privacy laws coming down, with the new California Consumer Privacy Act lead...
031| Filtered & Fragmented: Is True Internet Freedom a Thing of the Past?
12 Nov 2019
Contributed by Lukas
The internet seems to be changing from being a relatively unrestricted space into something more regulated. More countries are implementing policies t...
030| Talking Infosec to Non-Infosec Folks
22 Oct 2019
Contributed by Lukas
Cyber security is relevant for everyone. Not everyone realizes it though, and not everyone understands what those in the infosec industry take for gra...
029| Ask a Hacker: Red Teamer Answers Listener Questions
25 Sep 2019
Contributed by Lukas
In this episode, veteran hacker and red teamer Tom Van de Wiele answers questions from our listeners. Tom covers the ethics of ethical hacking, how to...
028| When the Well is Poisoned: The Devastation of Supply Chain Attacks
29 Aug 2019
Contributed by Lukas
Supply chain attacks are on the increase, with attackers abusing the trust we place in vendors and software. Why are these attacks growing, and what c...
027| The Connected Home Meets the IoT Tire Fire
03 Aug 2019
Contributed by Lukas
The modern home is continually getting more connected. But as much as we love our virtual assistants, smart thermostats and cloud-enabled security cam...
026| Safe Browsing & Secure Web Development
04 Jul 2019
Contributed by Lukas
"Don't go to shady websites" was the advice people were given back in the day. But now it's not always possible to tell when you're in danger, as even...
025| The Psychology of Phishing
12 Jun 2019
Contributed by Lukas
Phishing is one of today's biggest cyber security issues, a go-to tactic for threat actors. It's simple and effective, and perhaps that's why it has b...
024| GDPR, One Year Later
15 May 2019
Contributed by Lukas
One year ago, the EU General Data Protection Regulation (GDPR) came into effect, fundamentally changing the way businesses handle data. The GDPR force...
023| Electronic Voting & Why it's So Hard to Get Right
23 Apr 2019
Contributed by Lukas
Cyber security is always a hot topic during election seasons, and various elections are being held in Europe and around the world this spring. As digi...
022| Pro-Brexit Twitter Views Amplified by the Global Far Right
02 Apr 2019
Contributed by Lukas
The pro-leave side of the Brexit debate is getting support from far-right Twitter users based outside the UK. After investigating 24 million Brexit-re...
021| The Cloud: Security Benefits, Risks & Why You Should Use It
14 Mar 2019
Contributed by Lukas
The cloud has changed the way we do business and the way we develop and deploy software and infrastructure. What are the security benefits of moving t...
020| Defining Cyber Warfare, with Mikko Hypponen
11 Feb 2019
Contributed by Lukas
Cyber war is a term we often hear tossed about, but is it just science fiction, or is it really happening? How worried should we be about the potentia...
019| The Best Defense is Good Offensive Security
23 Jan 2019
Contributed by Lukas
They say that the best defense is a good offense, as football fans or anyone that's played a game of Risk might agree. But how does this idea look whe...
018| Online Dating and Trading Data for Love (It's Complicated)
26 Dec 2018
Contributed by Lukas
If you're looking for love nowadays, you'll likely turn to an online dating app. But what do these apps mean for your security? What privacy concessio...
017| Year in Cyber: Forecasting 2019, Recapping 2018
10 Dec 2018
Contributed by Lukas
2018 is winding to a close and the new year is just around the corner. What's in store for 2019 in cyber security? In this episode, five experts talk ...
016| Endpoint Protection & Beyond
19 Nov 2018
Contributed by Lukas
Endpoint protection has been the trusted backbone of many companies' security. But with stories about data breaches and successful cyber attacks con...
015| Election Security, US Midterm Edition: The Big Picture
29 Oct 2018
Contributed by Lukas
Democracy in the digital age is a wonderful yet wild beast. When it comes to electing our leaders nowadays, we're faced with questions about how to es...
014| Reinventing the Cold Boot Attack: Modern Laptop Version
08 Oct 2018
Contributed by Lukas
Should your laptop ever get stolen and fall into the wrong hands, you would probably be comfortable in the knowledge that the data on it is protected ...
013| Passwords: A Hacker's Take on Cracking & Protecting Your Creds
14 Sep 2018
Contributed by Lukas
Passwords. You plug them into your accounts and the services you use at work, you try little tricks to make them more unique, but have you ever wonder...
012| Adventures in Red Teaming
23 Aug 2018
Contributed by Lukas
How can companies know if their security investments are actually working? Getting attacked is the ultimate test, but hiring a red team is a less disr...
011| The Rise of AI and Deliberate Deception
02 Aug 2018
Contributed by Lukas
Disinformation. Fake news. Social media manipulation. Lately another dark side of the internet has come into focus - its use as a tool for deception. ...
010| Ransomware Out, Cryptojacking In? Latest Cybercrime Trends
09 Jul 2018
Contributed by Lukas
Over the past few years, ransomware stole headlines as the biggest malware threat to worry about. Consumers and businesses alike were being hit and fo...
009| Top OpSec Tips for Vacation Travel
21 Jun 2018
Contributed by Lukas
The summer holiday season is upon us, and people are looking forward to trading their daily workplace grind for a new adventure. Traveling is always e...
008| GDPR is Live. What Now?
31 May 2018
Contributed by Lukas
After months and months of anticipation, the May 25 deadline has passed and the GDPR is finally in effect. Companies around the world are being held ...
007| Popping Hotel Locks: The Hard Truth About Hacking
09 May 2018
Contributed by Lukas
When people look for logos or symbols that emanate security, they often choose a lock. Sure, we know locks can be picked. But what would the world loo...
006| Spring Cleaning for Opsec
26 Apr 2018
Contributed by Lukas
Operational security is about turning the tables, looking at things from an attacker's point of view, and identifying how your own actions are making...
005| Demystifying Hardware Security, with Andrea Barisani
29 Mar 2018
Contributed by Lukas
With the disclosure of Meltdown and Spectre early this year, hardware security has come into focus. What are the special challenges of securing hardwa...
004| Security, Privacy and the IoT, with Steve Lord
08 Mar 2018
Contributed by Lukas
The Internet of Things promises futuristic smart homes, energy savings and efficiencies, and improvements to health and well-being. But the IoT still ...
003| Data Breaches: Bridging the Gap
13 Feb 2018
Contributed by Lukas
Data breaches. They're every organization's worst fear. Why are companies so ill-prepared, and what are companies missing in their approach to data br...
002| Breaking Into Infosec: Advice from an Ethical Hacker
21 Dec 2017
Contributed by Lukas
Between zero day news flashes and stunt hacking reports, there are a lot of false conceptions about what it's like to be an infosec professional. So w...
001| Antivirus in the Hot Seat, with Mikko Hypponen
30 Nov 2017
Contributed by Lukas
The recent allegations against Russian antivirus vendor Kaspersky have prompted wider questions about antivirus in general - how it operates and what ...