
Rick Howard
Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire. Previously the commander of the Army's Computer Emergency Response Team.
Top 10 podcasts with Rick Howard
Ranked by the Snipd community

19 snips
Dec 6, 2023 • 30min
Matching Child Centered Policies to Appropriate Development in Youth Sport
Dr. Rick Howard, an Assistant Professor and Sports Performance Coordinator, discusses the importance of matching child-centered policies to appropriate development in youth sport. He emphasizes prioritizing fun, skill development, and social interaction over winning. The podcast also explores the shift from recreational leagues to travel teams and shares a technique for coaching youth athletes. It concludes with a discussion on creating policies that balance structured and unstructured play in youth sports.

19 snips
Nov 22, 2023 • 35min
The Impact of Adolescent Development on Fitness and Conditioning Age and Stage
Rick Howard, an Assistant Professor and Sports Performance Coordinator, discusses the impact of adolescent development on fitness and conditioning in youth sports. Topics include strength training, variety in conditioning activities, energy systems, tailored training for different age groups, and the benefits of strength and conditioning for children and adolescents.

18 snips
Feb 12, 2024 • 47min
#168 - Cybersecurity First Principles (with Rick Howard)
Rick Howard, Chief Security Officer, Chief Analyst and Senior Fellow at CyberWire, discusses cybersecurity first principles and the importance of understanding materiality and time bound risk assessment. He also highlights the value of Fermi estimates and Bayes algorithm for risk calculation. Rick and the host reflect on their experiences during 9/11 and Rick introduces his book, 'Cybersecurity First Principles'.

7 snips
Apr 24, 2023 • 27min
Supply-chain attack's effects spread. CISA makes new KEV entries. Bumblebee malware loader describes. Decoy Dog toolset discovered. Discord Papers were shared earlier and more widely.
3CX is not the only victim in the recent supply chain attack. The PaperCut critical vulnerability is under active exploitation. The Bumblebee malware loader is buzzing around in the wild. A new unique malware toolkit called Decoy Dog. Rick Howard, CSO from N2K Networks, shares RSA Conference predictions and talks about his new book, "Cybersecurity First Principles." Our guest Theresa Lanowitz from AT&T Cybersecurity shares insights on Securing the Edge. And the alleged Discord Papers leaker shared earlier and more widely than previously known.For links to all of today's stories check out our CyberWire daily news briefing:https://thecyberwire.com/newsletters/daily-briefing/12/78Selected reading.3CX Hackers Also Compromised Critical Infrastructure Firms (Infosecurity Magazine)That 3CX supply chain attack keeps getting worse (Register)Energy sector orgs in US, Europe hit by same supply chain attack as 3CX (Record) Even more victims found in complex 3CX supply chain attack (CybersecurityConnect) X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe (Symantec Enterprise Blogs) URGENT | PaperCut MF/NG vulnerability bulletin (March 2023) (PaperCut)PaperCut CVE-2023-27350 Deep Dive and Indicators of Compromise (Horizon3.ai) Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut Servers (The Hacker News) CISA KEV Breakdown | April 21, 2023 (Nucleus Security)CISA Adds Three Known Exploited Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA)CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug (The Hacker News) CISA adds printer bug, Chrome zero-day and ChatGPT issue to exploited vulnerabilities catalog (Record)Bumblebee Malware Distributed Via Trojanized Installer Downloads (Secureworks).Google ads push BumbleBee malware used by ransomware gangs (BleepingComputer) Bumblebee malware infects victims via fake Zoom, Cisco and ChatGPT software installers (Record) Decoy Dog malware toolkit found after analyzing 70 billion DNS queries (BleepingComputer) Analyzing DNS Traffic for Anomalous Domains and Threat Detection (Infoblox Blog) Airman Shared Sensitive Intelligence More Widely and for Longer Than Previously Known (New York Times) FBI leak investigators home in on members of private Discord server (Washington Post)From Discord to 4chan: The Improbable Journey of a US Intelligence Leak (bellingcat) Europe’s Planes Keep Flying Despite Cyberattack (Wall Street Journal) Learn more about your ad choices. Visit megaphone.fm/adchoices

4 snips
Aug 5, 2024 • 19min
Cybersecurity is radically asymmetrically distributed.
Rick Howard, Chief Analyst and Senior Fellow at N2K CyberWire, dives into the concept of asymmetrical distribution in cybersecurity. He explores how different sectors face unique risks and challenges, which can influence protection strategies. The conversation touches on the dynamics of democracy in relation to the upcoming presidential election, linking these themes to broader societal issues. Additionally, Rick reflects on super spreaders from the COVID-19 pandemic, advocating for targeted responses to both health and cybersecurity threats.

Apr 8, 2025 • 46min
Ex Palo Alto Networks CSO Rick Howard on Cybersecurity from First Principles
Rick Howard, former Chief Security Officer at Palo Alto Networks, shares his extensive insights on cybersecurity. He discusses the shift from corporate to startup perspectives and the essential themes for entrepreneurs and investors. Howard critiques traditional risk assessment methods and advocates for a dual approach in managing cybersecurity risks. He also highlights the transformative role of artificial intelligence and emphasizes the importance of curated cybersecurity literature, including key reads like 'The Phoenix Project,' for professionals in the field.

Jul 2, 2024 • 31min
Operation Endgame: The ultimate troll patrol.
Dave Bittner, a cybersecurity expert, joins Rick Howard, a leading authority on information security, to discuss Operation Endgame. They explore how law enforcement employs psychological tactics to counter Russian cybercriminals by creating distrust within their ranks. The conversation dives into the amusing side of cyber threats, comparing them to pop culture phenomena, while emphasizing the need for global cooperation against cybercrime. The episode blends humor with serious insights, making the complexities of cybersecurity both relatable and engaging.

Oct 10, 2023 • 43min
Cybersecurity First Principles w/Rick Howard
In this episode, Perry sits down with cybersecurity expert Rick Howard to delve into the concept of 'First Principles' in cybersecurity. They discuss the importance of risk decision-making, threat modeling, and tabletop exercises, as well as the use of Bayes algorithm in cybersecurity risk forecasting. The chapter also highlights the Cybersecurity Canon Project and emphasizes the need for organizations to maximize existing technology before considering new investments.

Oct 3, 2024 • 34min
Election Propaganda Part 1: How does election propaganda work? [CSO Perspectives]
Rick Howard, Chief Analyst at N2K CyberWire, dives deep into the intricacies of election propaganda and its implications as the 2024 presidential election nears. He discusses personal defensive measures every citizen can adopt to counter misinformation, emphasizing the importance of evaluating credible sources. Howard also unravels how social media amplifies sensational content and highlights the role of algorithms in shaping public perception. Listeners gain invaluable strategies to navigate the complex landscape of political narratives online.

Oct 2, 2024 • 34min
Election Propaganda Part 1: How does election propaganda work?
Rick Howard, Chief Analyst and Senior Fellow at N2K CyberWire, dives into the mechanics of election propaganda as the 2024 presidential election approaches. He highlights how social media amplifies misinformation and the challenge of distinguishing credible content from sensationalized narratives. The discussion touches on the role of influencers in shaping digital behavior and the profit-driven tactics of media channels. Listeners are equipped with strategies to cultivate skepticism and navigate the tricky landscape of political discourse.