Logo

    031422_Russian-SSL-and-TLS-Codes (Part 2)

    en-usMarch 17, 2022
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    In this episode, we discuss how Putin is using SSL and TLS codes in an attempt to circumvent sanctions.
    Host: Craig
    Guests: BJ, Blake & Erin

    Please like, subscribe and visit all of our properties at:

    YouTube: https://www.youtube.com/channel/UC8Hgyv0SzIqLfKqQ03ch0Bg
    YouTube: https://www.youtube.com/channel/UCa9l3tgOOHMJ6dClNn8BiqQ 
    Podcasts: https://petronellatech.com/podcasts/ 
    https://compliancearmor.com
    https://blockchainsecurity.com

    Please be sure to Call 877-468-2721 or visit https://petronellatech.com for a FREE Consultation to ensure you are safe from the latest cybersecurity threats!

    Please like, subscribe and visit all of our properties at:

    YouTube: https://www.youtube.com/channel/UC8Hgyv0SzIqLfKqQ03ch0Bg
    YouTube: https://www.youtube.com/channel/UCa9l3tgOOHMJ6dClNn8BiqQ 
    Podcasts: https://petronellatech.com/podcasts/ 
    https://compliancearmor.com
    https://blockchainsecurity.com

    Please be sure to Call 877-468-2721 or visit https://petronellatech.com for a FREE Consultation to ensure you are safe from the latest cybersecurity threats!

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    Recent Episodes from Cybersecurity with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001

    Navigating the Perils of Crypto: Breaches, Security, and Safeguarding Your Digital Assets

    Navigating the Perils of Crypto: Breaches, Security, and Safeguarding Your Digital Assets

    Imagine discovering that the very foundations of your financial security have been compromised by one of the most infamous crypto-heists in history. That's the chilling tale we unravel from the 2016 Bitfinex breach, with a staggering $4.5 billion at stake. We join forces with cybersecurity experts and dive into the cutting-edge blockchain forensics that led to the recent arrests, providing a glimmer of hope in the dark abyss of stolen digital assets. As your guide, I share invaluable strategies for fortifying your cryptocurrency investments—think cold wallets and micro-transactions—not just to protect your wealth, but to ensure its rightful transfer to your heirs.

    But the perils lurking in the crypto-verse don't end with exchange hacks. Have you ever had the feeling that something's too good to be true? We dissect the 'pig butchering' scams that prey on investors through sophisticated social engineering, and I'll recount a personal brush with these cunning con artists. The episode becomes a stark warning about the craftiness of digital predators, while also equipping you with the armory of knowledge needed to build a fortress around your digital assets—multi-signature wallets, encrypted physical backups, and all.

    As we round off our journey, we scrutinize the influence that glitters from the world of crypto influencers, where not all that shines is gold. We question the hype, dissect the endorsements, and underline the importance of due diligence. I emphasize the unique strengths of Bitcoin and the trustless technologies that underpin it, urging listeners to embrace self-reliance in the wake of rampant cyber threats. So, if you're ready to navigate the complex currents of cryptocurrency and cybersecurity, this episode is your beacon in the storm, illuminating the path to safeguarding your digital treasure.

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    Clashing Titans of Tech and the Rising Tide of Hacking

    Clashing Titans of Tech and the Rising Tide of Hacking

    Join Blake Rea and Craig Petronella as we unwrap the latest tech and cybersecurity developments faster than you can tear through holiday gift wrapping. From the FBI's tactical strike against the Black Cat ransomware group to the Xfinity data breach leaving millions on edge, we cover it all. We also weigh the consequences of vengeful IT maneuvers in educational institutions and the David versus Goliath battle in intellectual property that saw Apple Watches being pulled off shelves. It's a conversation that's as enlightening as it is essential, with a dash of holiday spirit.

    We then switch scenes to the cinematic world, contrasting a technology-deprived dystopia with Julia Roberts' triumphant return to the silver screen. The ebb and flow of Netflix's pricing model and its effect on our watch lists come under scrutiny. Meanwhile, the narrative takes a turn into the real-world plot of escalating living expenses versus stagnant wages, setting the stage for a critique of media trustworthiness as elections loom. It's a candid discussion on the intersection of culture, entertainment, and economic realities that's as gripping as any thriller.

    Our final act takes a deep look into the exploits of teenage hackers and the tech industry's scramble to keep up. With Apple on their toes, we explore the Corporate Transparency Act's impact on business privacy, the cutting-edge strides in biometrics, and Elon Musk's bold Neuralink venturing into human trials. We wrap up by championing the indispensability of cybersecurity training, discussing compliance responsibilities, and advocating for a proactive, trustless approach to our ever-connected lives. Prepare to emerge more informed and vigilant in the digital age after tuning in to this compelling discourse.

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    Navigating Cryptocurrency Security: Sim Swaps, Vendor Risks and Assertive Measures

    Navigating Cryptocurrency Security: Sim Swaps, Vendor Risks and Assertive Measures

    What if you could protect your cryptocurrency from hackers with just a few simple security measures? That's what we're diving into today in our exploration of the fascinating yet terrifying world of SIM Swaps and cryptocurrency security. We'll shed light on a real-life cautionary tale of a victim who lost his cryptocurrency to these cunning cyber con artists and the ingenious way they laundered the stolen funds. Discover why you should never use your phone numbers for authentication and what you can do to protect yourself. 

    As we journey further, we'll unravel the complex web of crypto regulations and vendor risk management. With the SEC guidelines causing confusion, we'll debate the need for a more regulated crypto environment. Learn about the critical process of vendor vetting in industries dealing with confidential data. We'll also reveal the SPRS scoring system for assessing vendor security and why you must be assertive with vendors that don't prioritize security. Remember, when it comes to securing your crypto assets, the mantra should be "don't trust, verify." So, gear up for an enlightening episode that will help you navigate the murky waters of cryptocurrency security.

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    Unraveling The Complexities Of Cybersecurity, Compliance And Bitcoin Wallet Security

    Unraveling The Complexities Of Cybersecurity, Compliance And Bitcoin Wallet Security

    Do you think you're up-to-date with cybersecurity and compliance? This episode will uncover some surprising facts that you may not be aware of. Firstly, we'll be unravelling the complex challenges that healthcare organizations face, especially when dealing with outdated medical equipment. We'll look at a real-life case where a hospital was hacked, and we'll discuss the importance of third-party security testing.

    Next, we're shifting gears to discuss the intriguing world of Bitcoin wallet security. We'll explain why wallets prior to 2012 are particularly vulnerable and why moving them to cold storage is a strategic move. We'll also be exploring the regulatory landscape and the importance of self-assessment. We'll introduce you to resources such as NIST and CMMC and emphasize the value of antivirus software, disk encryption, and firewalls.

    Finally, we'll be discussing the crucial role of compliance within companies. Compliance isn't just a box to tick - it's about taking responsibility and making sure your company has tailored its own path to compliance. We'll explore the potential impact of personnel changes on compliance scores and delve into a recent case involving a CISO charged with fraud. This episode is for everyone – business owners, cybersecurity enthusiasts, or anyone interested in staying safe in the digital world. Tune in for an eye-opening discussion that will help you navigate the complex world of cybersecurity and compliance.

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    Cybersecurity Threats, AI Impacts on Jobs and its Role in the Future of Electric Vehicles

    Cybersecurity Threats, AI Impacts on Jobs and its Role in the Future of Electric Vehicles

    Are you prepared for the digital dangers lurking in your computer, or the profound impacts of artificial intelligence on our lives? This episode arms you with knowledge of the latest cybersecurity threats, from North Korean state-linked nation group hacking Mac computers, to phishing scams and vulnerabilities in class action lawsuits. We also delve into the importance of staying up-to-date with software and using malware removal tools. Plus, we explore the potential ramifications of a government-created website or portal for class action lawsuits.

    You won't want to miss our engaging discussion on the future of AI, including its potential to replace jobs, and even the possibility of an AI taking over as the CEO of a company. As we trust more of our lives to digital intelligence, understanding these potential scenarios is more important than ever. Furthermore, we reveal how AI is shaping the future of electric vehicles and the safety considerations that come with self-driving cars. Stay ahead of the curve and join us on this enlightening journey into the future of technology and cybersecurity.

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    Guarding Against the Inevitable: Strategies for Cybersecurity and Prevention

    Guarding Against the Inevitable: Strategies for Cybersecurity and Prevention

    Hold onto your security blankets folks! Are we ever secure enough in this digital age? Get a grip on the pulse-raising lawsuit from the SEC against SolarWinds and the unexpected ban from the Canadian government on WeChat and Kaspersky. We harness the power of hindsight, looking back at how this enormous breach happened and what could have been done to prevent it. We delve into the harrowing reality of the threat lurking in every unvetted third-party vendor and the possibility of any app from adversarial countries spying on us. 

    Brace yourselves as we discuss the dark underbelly of cybersecurity, shedding light on social engineering, smishing, and phishing. The safety net of multiple layers of security measures and the crucial role of backups, are the shields you didn't know you needed. We bring to you the wake-up call to constant self-questioning and understanding the vital steps to secure your business. We take you through the process of identifying business vulnerabilities, discussing proactive security measures, and preparing for disasters. You can't afford to miss this candid conversation about the essence of a data-driven business model and the absolute necessity of being prepared for the worst.

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    Navigating the Stormy Seas of Cybersecurity and Social Media Evolution

    Navigating the Stormy Seas of Cybersecurity and Social Media Evolution

    Are you prepared to navigate the rocky terrain of today's cybersecurity landscape? This episode is your compass, guiding you through the treacherous twists and turns of tech threats, from the OKTA breach to the leaking of NSA classified data to Russia and the sneaky Microsoft bug within Active Directory and Azure. We don't tiptoe around the controversy, diving headfirst into the lawsuit by 41 states against Meta - accused of crafting addictive features harmful to young users - and scrutinizing the unsettling reality that we, the users, often become mere data points in the world of free platforms and products.

    Switching gears, we'll ferry you across the vast ocean of global supply chains, revealing the uncharted security risks lurking beneath the surface. As we set sail, we'll explore trustless manufacturing and vendor relationships, and how sourcing parts for a single iPhone from multiple countries can be a security siren's call. Equip yourself with our insights on the importance of third-party testing, vendor risk and the layers of security critical for survival in our increasingly interconnected world. This episode is more than a discussion - it's a lifeline in the stormy seas of cybersecurity and social media evolution. Tune in and join the conversation.

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    Unraveling BlackTech: A Deep Dive into Advanced Persistent Threats and Network Security

    Unraveling BlackTech: A Deep Dive into Advanced Persistent Threats and Network Security

    What if you had a front-row seat to one of the most riveting stories in cybersecurity today? Join us as we unravel the story of the Chinese state-sponsored Advanced Persistent Threat, BlackTech, and their exploitation of the Cisco Zero Day CVE 2023-20109. We dissect their strategy of modifying router firmware on Cisco routers, maintaining a stealthy persistence, and pivoting from international subsidiaries to headquarters in Japan and the U.S. We also shed light on their target: branch routers and the abuse of trusted relationships within corporate networks. In addition, we touch on the recent ransomware attack that Johnson Controls faced and the FBI's warning about dual attacks with diverse ransomware variants.

    As we navigate the dense terrain of cybersecurity, we promise to enlighten you on network segmentation, a crucial measure for enhanced security and cost savings. We will guide you on creating network enclaves to handle sensitive information securely and discuss the benefits of firewall and switch segmentation for absolute separation of network communications. Furthermore, we emphasize the importance of adhering to the latest security standards like CMMC for better compliance. This episode is a goldmine of practical solutions for network security, making it essential for anyone who lives in the digital world. Stay tuned for this enlightening experience on the pressing issues in cybersecurity today.

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    Unmasking the Xenomorph: An In-Depth Discussion on Android Security and Cybersecurity

    Unmasking the Xenomorph: An In-Depth Discussion on Android Security and Cybersecurity

    Do you know how to protect your device from the Xenomorph Banking Trojan? Join us as we dive into the murky waters of Android security threats with our enlightening guest, Blake Rea. We unmask the frightening reality of this new Trojan, aimed solely at Android users. With a chilling focus on over 35 financial institutions and some crypto wallets, the need to understand and shield ourselves from this threat is apparent. As we unravel the differences between Android and Apple devices' security, we investigate a compelling conversation around trust and privacy, scrutinizing the potential for hardware chips that spy on us.

    With the advent of the Xenomorph Banking Trojan looming, we guide you through the labyrinth of secure banking and device protection. How safe is it to download apps from the Google Play Store? Can a password manager protect you from threats? We answer these questions and more, offering pearls of wisdom on everything from encrypted drives and strong passwords to limiting app permissions. We also dissect the critical role of reading the Terms & Conditions of software applications - an often neglected, yet vital protective measure.

    Switching gears, we delve into the intriguing world of social engineering and its dramatic impact on businesses. We unravel how trust is manipulated and the crucial need for verifying information in online banking. We share indispensable tips on SIM swap attacks and much more!

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

    MGM Cyber Attack, Personal and Business Cybersecurity Tips and Tricks

    MGM Cyber Attack, Personal and Business Cybersecurity Tips and Tricks

    MGM Cyber Attack, Personal and Business Cybersecurity Tips and Tricks. According to Okta, Hackers who breached MGM and Caesars also hit 3 other firms. Learn cybersecurity tips and tricks you can use to security harden yourselves and your business.

    Support the showCall 877-468-2721 or visit https://petronellatech.com

    Please visit YouTube and LinkedIn and be sure to like and subscribe!

    Support the show

    NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

    Support the Show

    Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at: