A closer look at the notable stories inside
Information Security and why they matter.
One year ago in May 2017, the WannaCry ransomware event hit hospitals, schools, banks, government organizations, put lives at risk and caused billions of dollars in damages.
In this episode, host Mike Storm and the team look back on the WannaCry ransomware worm, its global impact, and the more dangerous and effective malware known as Nyetya.
Quantum computers, networks, and encryption are poised to change the world in ways we don’t even understand yet. In this episode of Root Access, Mike and the team speak to two experts in the field about how quantum technologies promise to advance our society, while also threatening even the most advanced encryption models available.View Related Material
Bitcoin has entered its own atmosphere. At the time the Root Access producers recorded this episode, the popular cryptocurrency’s price was $7,200. At the time this episode was uploaded, it was nearly $12,000.
The surge in price has brought out investors, fund managers, speculators, and, of course, hackers and thieves.
In this episode of Root Access, host Mike Storm and the team look at the trends in the booming cryptocurrency world, including how thieves are using clever tricks to empty the wallets of unwitting investors.
Guests include Coinbase director of security Philip Martin and Metacert CEO Paul Walsh.View Related Material
The GDAX Digital Asset Framework from Coinbase
Karla Burnett’s talk on the psychology and methodologies of phishing.
In March 2017 Congress voted to roll back FCC privacy protections for Internet users passed during the Obama administration. The change comes just as data collection is hitting pervasive levels never seen before.
In this episode of Root Access, host Mike Storm and the team talk to Trevor Hughes, president and CEO of the International Association of Privacy Professionals, about the future of privacy in an age of mass data collection.View Related Material
Massachusetts State Representative Mike Capuano’s rant against tracking of his underwear purchases.
Stanford Assistant Professor Michal Kosinski’s presentation on ‘The End of Privacy’:
IAPP President and CEO J. Trevor Hughes’ presentation on ‘The Future of Privacy’ at RSA:
In Autumn of 2016, two security researchers were tracking something big. Really big. Hundreds of thousands of Internet-connected devices were being scanned for open vulnerabilities and herded into a massive botnet. But why?
In this episode of Root Access, host Mike Storm and the team dig into the Mirai botnet, its lasting impact on the security industry, and the work of two researchers to find its target before it launched the largest DDoS event in history.View Related Material
S2:E1 Active Measures
Just before New Year’s Eve 2016, staff at the Burlington Electric company in Vermont received a call. It was the Department of Homeland Security. The electrical grid was under siege by Russian hackers. Or was it?
On a new season of Root Access, host Mike Storm and the Root Access team dive into misinformation online, how fake news has become an industry, the security risks at play, and how social media bot armies play a huge role in its spread. Guests include Professor Fil Menzcer from Indiana University and Mark Pesce, honorary associate with the University of Sydney.View Related Material
About R00T ACCESS
Root Access is a podcast focused on privacy and security. We take an in-depth look at the topics and events that are determining the course of the internet and its effect on people’s daily lives.
Cisco principal engineer Mike Storm is your host. Root Access is brought to you by Cisco.
Josh is a security researcher with Cisco. Previously, he worked as a threat analyst with NASA, where he was part of the team that initially built out the Security Operations Center. He has also done some time at Mandiant. His professional interests involve network, computer, and data security with a goal of maintaining and improving the security of as many systems and networks as possible.
Past speaking engagements include:
2015: Derbycon, DeepSec (Vienna, Austria)
2015: NASA, Source (Boston, Seattle)
2015: BSides (Los Angeles, San Francisco, Chicago, Austin)
2010: Defcon (Las Vegas)
Mike Storm is a Cisco principal engineer and 10-year CCIE with more than 25 years in the networking and cybersecurity industry. He has an affinity for educating others on how to correctly build security solutions that successfully protect their business, data and themselves from modern threats.
R00T ACCESS is sponsored by Cisco
Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go. By learning from internet activity patterns, Umbrella automatically uncovers current and emerging threats. And because it’s built into the foundation of the internet and delivered from the cloud, Umbrella is the simplest security product to deploy and delivers powerful, effective protection.