Diving Deep Into Vulnerability Risk Modeling w/ Empirical Security
Recorded from Hacker Summer Camp in Las Vegas, Dan dives deep into the history and current state of measuring cybersecurity vulnerability risk at scale with the team from Empirical Security. Ed, Michael, and Wade discuss some of the history of vulnerability measurement through the last decade and how they thin the time is now for organizations to start applying highly-specific local vulnerability modeling to their security strategies. There is a ton of amazing information you won't find anywhere else on the Empirical Security Blog: https://www.empiricalsecurity.com
Revolutionizing Authentication: Arcot's Smart Ruleset
Arcot’s August podcast explores how Smart Ruleset is revolutionizing authentication. Powered by 20+ years of transaction data, advanced machine learning, and real-time network signals, this innovation makes smarter authentication decisions in milliseconds – helping issuers block more fraud, approve more legitimate transactions, and cut down false declines. The episode also highlights how 3DS Data-Only flows are gaining traction, giving issuers the richer context they need to improve fraud detection and transaction approval rates.
Cybersecurity Tips For Seniors and Parents w/ Alex East
Dan sits down with author Alex East to discuss cybersecurity tips for Seniors and Parents. You can find Alex's books on Amazon: https://www.amazon.com/stores/Alex-East/author/B0D9VCFVPX Sorry about the video quality, the main SSDs on the external recorder was a potato.
Preventing a Nuclear Apocalypse with Threat Intel
Paul Miller recounts a critical incident involving threat intelligence that potentially prevented a nuclear disaster. They explore the geopolitical context surrounding the incident, the challenges of incident response, and the complexities of attributing cyber attacks to specific threat actors. The conversation highlights the importance of threat intelligence in understanding and mitigating risks, as well as best practices for incident response in the face of evolving cyber threats. Takeaways - Threat intelligence is crucial for understanding cyber threats. - Geopolitical events can significantly impact cybersecurity. - Incident response requires quick decision-making and analysis. - Attribution of cyber attacks is complex and fraught with challenges. - Cybersecurity incidents can have far-reaching consequences. - Effective communication with government agencies is essential. - Historical data analysis is key to threat hunting. - Most cybersecurity work involves routine tasks, with occasional high-stakes incidents. - The evolution of cyber threats necessitates constant vigilance and adaptation. - Collaboration within the cybersecurity community enhances overall defense strategies.
3DS Hits the Mainstream While Arcot Powers the Next Phase of 3DS with Smart Rulesets
In Arcot's July podcast, hosts James Jenkins, Head of Customer Development, and Matt Cooke, General Manager, explore how 3-D Secure is evolving from a regulatory obligation to a performance driver across global markets. They unpack how merchants and issuers are moving beyond compliance and using 3DS to reduce false declines and improve approval rates. Arcot's Smart Ruleset, which uses machine learning to optimize authentication decisions, is delivering stronger fraud prevention with minimal friction. This episode shows how 3DS is becoming a smarter, more strategic part of the payments experience.