Logo

    Grassroots Security: Cybersecurity for Everyone

    Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
    en24 Episodes

    People also ask

    What is the main theme of the podcast?
    Who are some of the popular guests the podcast?
    Were there any controversial topics discussed in the podcast?
    Were any current trending topics addressed in the podcast?
    What popular books were mentioned in the podcast?

    Episodes (24)

    CISA Guidance on SolarWinds, AD/M365 and Exchange Remediations | Grassroots Security (S2:E8)

    CISA Guidance on SolarWinds, AD/M365 and Exchange Remediations | Grassroots Security (S2:E8)

    It's a busy time for security.  The Cybersecurity & Infrastructure Security Agency has released a number of guidance documents on SolarWinds and ActiveDirectory/M365 compromises as well as the recent Microsoft Exchange vulnerabilities that are being actively exploited.
    Blog Post (including Links):
    https://grassrootsecurity.com/2021/03/10/cisa-guidance-on-solarwinds-ad-m365-and-exchange-remediations/

    Protecting You Through Security Filtered Domain Lookups | Grassroots Security (S2:E6)

    Protecting You Through Security Filtered Domain Lookups | Grassroots Security (S2:E6)

    Protect your computer using a security-filtered Domain Name System (DNS) server configuration.  Also hear about the Center for Internet Security (CIS) offering to protect US hospitals against malware through a similar method of DNS protection.
    Blog Post (including references and site links):
    https://grassrootsecurity.com/2021/02/22/protecting-you-through-security-filtered-domain-lookups/

    We Need More Cyber Women! | Grassroots Security (S2:E5)

    We Need More Cyber Women! | Grassroots Security (S2:E5)

    No, I'm not talking about cyborgs here.  We explore the cybersecurity workforce needs, certifications and the scholarships available especially for women.  We need to improve the number of women who go into cybersecurity careers.
    Blog Post (including References and Links):
    https://grassrootsecurity.com/2021/02/15/we-need-more-cyber-women/

    Data Privacy Day and Update on Solarwinds Hack | Grassroots Security (S2:E3)

    Data Privacy Day and Update on Solarwinds Hack | Grassroots Security (S2:E3)

    January 28 was Data Privacy Day and the 40th anniversary of Convention 108.  Last January 11, we also got the update of the investigation on the Solarwinds Hack.
    Blog Post (including references):
    https://grassrootsecurity.com/2021/02/01/data-privacy-day-and-update-on-solarwinds-hack/
    Data Privacy Logo courtesy of StaySafeOnline (https://staysafeonline.org/)

    EDPB Releases Data Breach Notification Examples | Grassroots Security (S2:E2)

    EDPB Releases Data Breach Notification Examples | Grassroots Security (S2:E2)

     The European Data Protection Board (or EDPB) has released Guidelines 01/2021 on Examples regarding Data Breach Notification. It provides a number of examples across different areas from ransomware to data exfiltration.
    References are linked in the blog post below:
    https://grassrootsecurity.com/2021/01/25/edpb-releases-guidelines-data-breach-notification-examples/

    New Year, Your Memory and Misinformation | Grassroots Security (S2:E1)

    New Year, Your Memory and Misinformation | Grassroots Security (S2:E1)

    Happy New Year! In this episode, we talk about misinformation and disinformation and how your memory may contribute to both misattribution and bias. We also talk about how to deal better with misinformation.
    Blog Post (including references):
    https://grassrootsecurity.com/2021/01/18/new-year-your-memory-and-misinformation/

    Ransomware in CMA CGM, Ring Security Changes and Egypt's Data Protection | Grassroots Security (S1:E16)

    Ransomware in CMA CGM, Ring Security Changes and Egypt's Data Protection | Grassroots Security (S1:E16)

    Ransomware has hit one of the biggest shipping companies CMA CGM. Also, Ring will be updating their devices to support end-to-end encryption. And Egypt has enacted their data protection law.  Brazil's version is also now in effect.
    Published: September 30, 2020
    Blog Post (Links to References):

    Validity of Standard Contractual Clauses and Strontium's Credential Harvesting Methods | Grassroots Security (S1:E15)

    Validity of Standard Contractual Clauses and Strontium's Credential Harvesting Methods | Grassroots Security (S1:E15)

    With Facebook's high court challenge to the Irish Data Protection Commission's suggestion that Standard Contractual Clauses (or SCCs) may not be used, it begs the question what alternatives there are for the transfer of personal data to another country.  Also, with the US Elections near, what type of attacks are we seeing especially with credential harvesting?
    Published: September 14, 2020
    Blog Post (Links to References):


    Governments release cybersecurity principles on space systems and IoT devices | Grassroots Security (S1:E14)

    New Zealand Stock Exchange hit by Distributed Denial of Service | Grassroots Security (S1:E13)

    Tesla and FBI prevents a ransomware hack at the Gigafactory | Grassroots Security (S1:E12)

    Fraudster Tricks Experian Africa causing a Data Security Incident | Grassroots Security (S1:E11)

    Fraudster Tricks Experian Africa causing a Data Security Incident | Grassroots Security (S1:E11)

    Looking into the recent data incident with Experian Africa where a fraudster was successful in impersonating a legitimate customer.
    Created: August 24, 2020
    References:

    Digital Empathy and Zero Trust in the Pandemic | Grassroots Security (S1:E10)

    Digital Empathy and Zero Trust in the Pandemic | Grassroots Security (S1:E10)

    Microsoft's recent security blog entry talked about the acceleration of a number of digital transformation brought about by the pandemic.  We talk about two of these: Digital Empathy and Zero Trust.
    Created: August 21, 2020
    Reference:

    Redirecting Invoices as an Example of Business Email Compromise | Grassroots Security (S1:E9)

    Update on Fake Text in Ireland and TLS 1.3 Blocking in China | Grassroots Security (S1:E8)

    Update on Fake Text in Ireland and TLS 1.3 Blocking in China | Grassroots Security (S1:E8)

    Bank of Ireland has responded and made a U-turn on their policy.  The latest version of TLS 1.3 is also now being blocked in China.
    Created: August 14, 2020
    References:

    Protecting yourself from cases of fake bank text messages | Grassroots Security (S1:E7)

    Protecting yourself from cases of fake bank text messages | Grassroots Security (S1:E7)

    Attacks using fake text messages from banks like Bank of Ireland surfaced recently on LiveLine with Joe Duffy. I also provide some tips to protect yourself when you do receive these text messages.
    Created: August 10, 2020
    Reference:

    Charges on Twitter Hack and Canon Ransomware | Grassroots Security (S1:E6)

    Charges on Twitter Hack and Canon Ransomware | Grassroots Security (S1:E6)

    Charges have been made to three individuals relating to the Twitter hack and also developing news on the Canon Ransomware.  Tips are included in the discussion.
    Created: August 8, 2020
    References: