undefined

Rick Howard

Host of the podcast, known for his expertise in cybersecurity.

Top 10 podcasts with Rick Howard

Ranked by the Snipd community
undefined
19 snips
Dec 6, 2023 • 30min

Matching Child Centered Policies to Appropriate Development in Youth Sport

Dr. Rick Howard, an Assistant Professor and Sports Performance Coordinator, discusses the importance of matching child-centered policies to appropriate development in youth sport. He emphasizes prioritizing fun, skill development, and social interaction over winning. The podcast also explores the shift from recreational leagues to travel teams and shares a technique for coaching youth athletes. It concludes with a discussion on creating policies that balance structured and unstructured play in youth sports.
undefined
19 snips
Nov 22, 2023 • 35min

The Impact of Adolescent Development on Fitness and Conditioning Age and Stage

Rick Howard, an Assistant Professor and Sports Performance Coordinator, discusses the impact of adolescent development on fitness and conditioning in youth sports. Topics include strength training, variety in conditioning activities, energy systems, tailored training for different age groups, and the benefits of strength and conditioning for children and adolescents.
undefined
18 snips
Feb 12, 2024 • 47min

#168 - Cybersecurity First Principles (with Rick Howard)

Rick Howard, Chief Security Officer, Chief Analyst and Senior Fellow at CyberWire, discusses cybersecurity first principles and the importance of understanding materiality and time bound risk assessment. He also highlights the value of Fermi estimates and Bayes algorithm for risk calculation. Rick and the host reflect on their experiences during 9/11 and Rick introduces his book, 'Cybersecurity First Principles'.
undefined
7 snips
Apr 24, 2023 • 27min

Supply-chain attack's effects spread. CISA makes new KEV entries. Bumblebee malware loader describes. Decoy Dog toolset discovered. Discord Papers were shared earlier and more widely.

3CX is not the only victim in the recent supply chain attack. The PaperCut critical vulnerability is under active exploitation. The Bumblebee malware loader is buzzing around in the wild. A new unique malware toolkit called Decoy Dog. Rick Howard, CSO from N2K Networks, shares RSA Conference predictions and talks about his new book, "Cybersecurity First Principles." Our guest Theresa Lanowitz from AT&T Cybersecurity shares insights on Securing the Edge. And the alleged Discord Papers leaker shared earlier and more widely than previously known.For links to all of today's stories check out our CyberWire daily news briefing:https://thecyberwire.com/newsletters/daily-briefing/12/78Selected reading.3CX Hackers Also Compromised Critical Infrastructure Firms (Infosecurity Magazine)That 3CX supply chain attack keeps getting worse (Register)Energy sector orgs in US, Europe hit by same supply chain attack as 3CX (Record) Even more victims found in complex 3CX supply chain attack (CybersecurityConnect) X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe (Symantec Enterprise Blogs) URGENT | PaperCut MF/NG vulnerability bulletin (March 2023) (PaperCut)PaperCut CVE-2023-27350 Deep Dive and Indicators of Compromise (Horizon3.ai) Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut Servers (The Hacker News) CISA KEV Breakdown | April 21, 2023 (Nucleus Security)CISA Adds Three Known Exploited Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA)CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug (The Hacker News) CISA adds printer bug, Chrome zero-day and ChatGPT issue to exploited vulnerabilities catalog (Record)Bumblebee Malware Distributed Via Trojanized Installer Downloads (Secureworks).Google ads push BumbleBee malware used by ransomware gangs (BleepingComputer) Bumblebee malware infects victims via fake Zoom, Cisco and ChatGPT software installers (Record) Decoy Dog malware toolkit found after analyzing 70 billion DNS queries (BleepingComputer) Analyzing DNS Traffic for Anomalous Domains and Threat Detection (Infoblox Blog) Airman Shared Sensitive Intelligence More Widely and for Longer Than Previously Known (New York Times) FBI leak investigators home in on members of private Discord server (Washington Post)From Discord to 4chan: The Improbable Journey of a US Intelligence Leak (bellingcat) Europe’s Planes Keep Flying Despite Cyberattack (Wall Street Journal) Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
4 snips
Aug 5, 2024 • 19min

Cybersecurity is radically asymmetrically distributed.

Rick Howard, Chief Analyst and Senior Fellow at N2K CyberWire, dives into the concept of asymmetrical distribution in cybersecurity. He explores how different sectors face unique risks and challenges, which can influence protection strategies. The conversation touches on the dynamics of democracy in relation to the upcoming presidential election, linking these themes to broader societal issues. Additionally, Rick reflects on super spreaders from the COVID-19 pandemic, advocating for targeted responses to both health and cybersecurity threats.
undefined
Jul 2, 2024 • 31min

Operation Endgame: The ultimate troll patrol.

Dave Bittner, a cybersecurity expert, joins Rick Howard, a leading authority on information security, to discuss Operation Endgame. They explore how law enforcement employs psychological tactics to counter Russian cybercriminals by creating distrust within their ranks. The conversation dives into the amusing side of cyber threats, comparing them to pop culture phenomena, while emphasizing the need for global cooperation against cybercrime. The episode blends humor with serious insights, making the complexities of cybersecurity both relatable and engaging.
undefined
Oct 10, 2023 • 43min

Cybersecurity First Principles w/Rick Howard

In this episode, Perry sits down with cybersecurity expert Rick Howard to delve into the concept of 'First Principles' in cybersecurity. They discuss the importance of risk decision-making, threat modeling, and tabletop exercises, as well as the use of Bayes algorithm in cybersecurity risk forecasting. The chapter also highlights the Cybersecurity Canon Project and emphasizes the need for organizations to maximize existing technology before considering new investments.
undefined
Oct 3, 2024 • 34min

Election Propaganda Part 1: How does election propaganda work? [CSO Perspectives]

Rick Howard, Chief Analyst at N2K CyberWire, dives deep into the intricacies of election propaganda and its implications as the 2024 presidential election nears. He discusses personal defensive measures every citizen can adopt to counter misinformation, emphasizing the importance of evaluating credible sources. Howard also unravels how social media amplifies sensational content and highlights the role of algorithms in shaping public perception. Listeners gain invaluable strategies to navigate the complex landscape of political narratives online.
undefined
Oct 2, 2024 • 34min

Election Propaganda Part 1: How does election propaganda work?

Rick Howard, Chief Analyst and Senior Fellow at N2K CyberWire, dives into the mechanics of election propaganda as the 2024 presidential election approaches. He highlights how social media amplifies misinformation and the challenge of distinguishing credible content from sensationalized narratives. The discussion touches on the role of influencers in shaping digital behavior and the profit-driven tactics of media channels. Listeners are equipped with strategies to cultivate skepticism and navigate the tricky landscape of political discourse.
undefined
Oct 1, 2024 • 33min

The Dark Arts of cyber. [Only Malware in the Building]

Join cybersecurity experts Dave Bittner, a tech thought leader, and Rick Howard, a seasoned industry professional, as they dive into the shadowy realm of malware. They discuss the dark arts of a newly uncovered cyber espionage campaign involving the cleverly named 'Voldemort' malware, revealing how cybercriminals disguise themselves as tax authorities and exploit platforms like Google Sheets. With a mix of humor and insightful analysis, they explore advanced tactics that threat actors use to collect sensitive data and the ongoing challenges of identifying unknown malware.