Kendall McKay, a Senior Intelligence Analyst at Cisco Talos and former US intelligence expert, joins Kirsty Paine, Field CTO at Splunk with a background in mathematics and UK cybersecurity. They discuss the evolving landscape of cyber threats, including the rise of ransomware and identity theft tactics like Business Email Compromise. The duo highlights the dual role of AI, addressing both its challenges and opportunities in cybersecurity. Additionally, they explore the future risks posed by quantum computing, emphasizing proactive measures needed to stay secure.
Adversary-in-the-middle attacks exploit subtle URL differences to trick users into providing credentials, highlighting the need for vigilant online practices.
Ransomware and identity-based attacks are on the rise, emphasizing the critical importance of robust security measures to protect user identities.
Implementing multi-factor authentication is essential for organizations to significantly reduce risks of unauthorized access and cyber attacks.
Deep dives
Adversary-in-the-Middle Attacks
Adversary-in-the-middle attacks involve redirecting users to malicious sites designed to look like legitimate login pages, often with subtle differences in the URL that go unnoticed. For example, fraudulent sites might substitute similar characters that users overlook, leading them to unknowingly enter their credentials. This highlights the sophistication of increasingly prevalent phishing techniques that threaten cyber security. It's crucial for users to be educated on recognizing these attacks and practicing caution when entering sensitive information online.
Current Cyber Threat Landscape
Ransomware remains a leading threat in the cyber landscape, persisting as a favored tactic for cybercriminals to extract money from victims. Newer trends indicate an uptick in identity-based attacks, where hackers steal legitimate credentials to carry out malicious activities unnoticed. Statistics reveal that a significant percentage of initial access in cyber incidents stems from compromised valid accounts, underscoring the importance of protecting user identities. Organizations that fail to adopt robust security measures are at higher risk of falling victim to these evolving threats.
The Role of Multi-Factor Authentication
Multi-factor authentication (MFA) is highlighted as a critical defense mechanism that can significantly thwart unauthorized access and cyber attacks. Many organizations still neglect to implement MFA fully, leaving themselves exposed to identity theft and account compromise. Using MFA throughout an organization, particularly on network-facing devices, can prevent many breaches that occur through compromised credentials. Moreover, it is essential for organizations to regularly check and update their MFA settings to ensure maximum protection.
User Awareness and Education
Enhancing user awareness and education regarding cybersecurity practices is crucial for mitigating risks associated with social engineering attacks. Companies should foster a culture where employees feel encouraged to report suspicious activities without fear of reprimand, thus acting as the first line of defense against potential breaches. This cultural shift can be supported by rewarding users who identify and report phishing attempts, promoting an engaged community aware of cybersecurity threats. Prioritizing user education will not only benefit individual organizations but also contribute to creating a more secure digital ecosystem overall.
Challenges and Innovations in Cybersecurity
As new technologies like artificial intelligence and quantum computing emerge, the cybersecurity landscape is rapidly evolving, presenting both challenges and opportunities. There is an ongoing race between attackers and defenders, with both sides seeking the upper hand through innovation. Organizations must recognize the need for adaptability and encourage their teams to develop skills that will withstand the demands of future threats. Investing in awareness, technical capabilities, and strategic thinking will be essential for maintaining robust cybersecurity as the threat landscape continues to change.
A big shoutout to Cisco for sponsoring this video.
// Kendall McKay //
LinkedIn: / kendallmckay1
X: https://x.com/kkmckay22
// Kirsty Paine //
LinkedIn: / kirstykirsty
// Links mentioned by Kirsty //
PQUIP: https://datatracker.ietf.org/wg/pquip...
list of protocols on Github: https://github.com/ietf-wg-pquip/stat...
Quantum Splunk blogs (CRQC):
Emperor’s New Clothes: https://www.splunk.com/en_us/blog/lea...
https://www.splunk.com/en_us/blog/lea...
Goldilock’s porridge: https://www.splunk.com/en_us/blog/lea...
// YouTube video REFERENCES //
Watch a CNN Reporter get hacked: • Watch a CNN reporter get hacked
Coffee Talk with SURGe: The Interview Series featuring Kirsty Paine: • Coffee Talk with SURGe: The Interview...
Hacking ARP with Python and Kali Linux: • Hacking ARP with Python and Kali Linu...
They Took his computer: • They took his computer. That didn't s...
// Talos Blogs and Reports //
https://blog.talosintelligence.com/ir...
https://blog.talosintelligence.com/ca...
https://blog.talosintelligence.com/20...
// Kirsty’s Blogposts //
https://www.splunk.com/en_us/blog/aut...
// Splunk Reports //
https://www.splunk.com/en_us/form/sta...
https://www.splunk.com/en_us/form/the...
// Splunk Research //
https://www.splunk.com/en_us/blog/sec...
https://www.splunk.com/en_us/blog/sec...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cisco #splunk #ai
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode