Behind the scenes of cybersecurity media and reporting
Adopting Zero Trust21 Marras 2024

Behind the scenes of cybersecurity media and reporting

Season 3, Episode 15: We gather a panel of journalists, communications, and a researcher to discuss how cybersecurity news and incidents are reported.

You can read the show notes here.

In the world of cybersecurity journalism, you can broadly divide it into four competing forces: reporters, communications teams, researchers, and readers. Each requires the other to accomplish its goals, but they all have very different priorities and goals.

  • Journalists have a duty to inform the public about security-related events.
  • Communication teams have a duty to inform the public about related incidents and research, but in a controlled setting.
  • Researchers help provide answers to communication teams and journalists.
  • Readers want to be informed of information that impact them, and their habits shape what kind of reporting is invested in the most.

This week we explore some of these dynamics by bringing together a panel representing comms, journalism, and research to discuss the game of tug-of-war during incident response and incident reporting.

Danny Palmer was a long-standing cybersecurity reporter at ZDNet prior to recently joining DarkTrace, Josh Swarz is the Senior Communications Manager at Microsoft focusing on threat intelligence, our host Neal Dennis is former NSA and has lived many lives around either keeping secrets or uncovering them, and producer Elliot Volkman has been a reporter for two decades and works with Josh on elevating research at Microsoft Threat Intelligence.

Hosted on Acast. See acast.com/privacy for more information.

Jaksot(58)

AZT: Quit Bugging the CISO + CIO

AZT: Quit Bugging the CISO + CIO

Season 3, Episode 2: In our conversation with Energy Solution’s CIO David Weisong we chat about how new processes, technology, and budgets are formed. Catch this episode on YouTube, Apple, Spotify, Am...

8 Helmi 202446min

Hacker Valley Dishes on Breaking Into Cybersecurity

Hacker Valley Dishes on Breaking Into Cybersecurity

To start the new season, we are joined by Hacker Valley Media’s Ron Eddings and Chris Cochran, who discuss breaking into cybersecurity and the role storytelling plays. A new year, a new season, and pl...

18 Tammi 202449min

From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.

From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. PS, we're giving away a Flipper Zero on our site as a little season finale gift. Check out details o...

30 Marras 202356min

The Market For Enterprise (Secure) Browsers

The Market For Enterprise (Secure) Browsers

Season two, episode 18: Evgeniy Kharam, a founder, CISO, architect, and podcast producer discusses the rise of Enterprise (Secure) browsers.You can read the show notes here and subscribe to updates.In...

16 Marras 202346min

Beyond the Buzzword: Applicable use of AI in Cybersecurity

Beyond the Buzzword: Applicable use of AI in Cybersecurity

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. The word AI, much like Zero Trust, has come with a lot of baggage in the past few years. It’s a term...

2 Marras 202356min

AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices. Catch this episode on YouTub...

19 Loka 202354min

AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird

AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird

Season two, episode 15: We talk ZT History and API security with the godfather of Zero Trust, Dr Zero Trust, and Richard Bird.Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can ...

31 Elo 202338min

Adopting Zero Trust: The Illusion of Passwordless

Adopting Zero Trust: The Illusion of Passwordless

The illusion of going passwordless with Derek Hanson, Vice President Solutions Architecture and Alliances at Yubico. You can read the show notes here. True or False: The concept of passwordless is new...

10 Elo 202351min