Cybersecurity's BIG Problem. Why it needs to change.
Why are hackers winning the ransomware war?
A very big thank you to Cisco for sponsoring my Cisco Live trip and this video.
In this video I interview Tom Gillis about why hackers are winning and how to protect ourselves against the attacks.
Go here for more information about the announcements: newsroom.cisco.com
Cisco Talos Video: • Is AI the biggest Cybe...
// Tom's Socials//
Twitter: / _tomgillis
LinkedIn: / tomgillis1
Cisco Newsroom: newsroom.cisco.com/c/r/newsro...
// David's Social //
Discord: / discord
Twitter: / davidbombal
Instagram: / davidbombal
LinkedIn: / davidbombal
Facebook: / davidbombal.co
TikTok: / davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// MENU //
00:00 - Coming Up
00:39 - Intro
01:03 - How to Win Against Attackers
04:00 - Ransomware Attacks
07:09 - Zero Trust Network Access
15:35 - Cisco Multi-Cloud Defense
19:29 - The Role of A.I
22:10 - Summary
23:20 - Outro
cisco
cisco firewall
cybersecurity
networking
ai
artificial intelligence
hacker
hacking
hack
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#ransomware #cybersecurity #ai
Пікірлер: 105
Why are hackers winning the ransomware war? A very big thank you to Cisco for sponsoring my Cisco Live trip and this video. In this video I interview Tom Gillis about why hackers are winning and how to protect ourselves against the attacks. Go here for more information about the announcements: newsroom.cisco.com Cisco Talos Video: kzread.info/dash/bejne/ha2VspuAdLGvpco.html // Tom's Socials// Twitter: twitter.com/_tomgillis LinkedIn: www.linkedin.com/in/tomgillis1 Cisco Newsroom: newsroom.cisco.com/c/r/newsroom/en/us/executives/tom-gillis.html // David's Social // Discord: discord.gg/davidbombal Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // MENU // 00:00 - Coming Up 00:39 - Intro 01:03 - How to Win Against Attackers 04:00 - Ransomware Attacks 07:09 - Zero Trust Network Access 15:35 - Cisco Multi-Cloud Defense 19:29 - The Role of A.I 22:10 - Summary 23:20 - Outro cisco cisco firewall cybersecurity networking ai artificial intelligence hacker hacking hack Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
@marklampo8164
11 ай бұрын
Law enforcement would rather use the opportunity to inform Congress of an insider trading shot. That's Aristocracy for ya!
I think we need one episode where the talks about Open Source security tools. Possibly with examples.
@TheBlackmanIsGod
8 ай бұрын
Yes a walk through step by step dont skip anything and explain everything especially the think behind the decision making!!!
Biggest problem is greed, security has like everything else been moniterised. Licensing training etc are cash cows for the big security players.
@TheAutumnNetwork
11 ай бұрын
Massive facts there.
@timothymiddleton6651
9 ай бұрын
This
I'm glad to have you as mentor I have been following you for almost a year the more you dropped video I picked challenges to learn. Thank you Mr. David right here in Nigeria
@joshita7297
11 ай бұрын
Let connect bro
keep it up. this kind of deep talk interviews from experts is just gold. we like it 😊
Very clear presentation of what's going around networking today and yesterday. Thank you guys.
Thanks David and Tom for this interview!
Hey david can you bring someone who can do a workshop or atleast guide us on using machine learning to prevent cyberattacks or analyse malware and show that with practical example or even better give us a code sample to code along with , what i am saying is we need a AIML tutorial project video specifically for cyberscurity. It would look good on resume and also we newbies will gain some skills .
@davidbombal
11 ай бұрын
Great suggestion! I'll see what I can do.
The reality is: Companies do not want to invest into their security. I worked in such a company a while ago. So naturally, they more often than not face the consequences in the form of phishing and ransomware as well as a buttload of (government) backdoors. Not having to look at a problem doesn't make it go away. Sadly, in Germany many small and medium businesses have this exact attitude. I would even call it "expectation". They expect the problem to go away if they ignore it.
I love taking David's courses. I love his voice and the way he talks.
Sending thanks from the Gold Coast in Aus giving me motivation to keep going with the start of my cyber security career
Great video. Learnt way more than I expected.
Well explained .. a good one !!
I don't like how PS or CMD run in the background for like 2 seconds and never stays open long enough for me to see what commands were run!
Brilliant, I love this kind of content !!! You make an excellent job, thank you for your time and effort to make it real.
My customer is one of the 3 big Dutch banks. And although I loathe it, every month we need to have a certain percentage on a ongoing course that you need to do questions on that teaches you awareness. And there are some nice situational and technical awareness questions on there. That actually recently made me think twice. I got a letter from the “IRS” telling them my payment had not arrived. And if I didn’t pay in 2 days the legal fine would be added. And one of the important ones is recognizing phishing attacks and reporting them. That way they can do active prevention (like blocking that domain) or let the cops start an investigation. And the default way of working is, it’s better to delete an email or hang up on a call. And to never ever share colleagues or customer’s details. That’s not to us as most employees. Those who can know what and to whom the can let go that information. Because it can be used for “Speer phishing” attacks. The funny thing was the new CEO send an email to everyone telling to make an appointment to meet with him. The overwhelming majority deleted that email thinking it was some sort of phishing attack - and they do actually make entrapment calls to see who doesn’t follow producer to see who needs extra lessons on security. Which is good.
Great video. Exciting stuff!
Hello sir, I'm following you from 6 months. I'm glad that i found your channel at the beginning of my cybersecurity coureer. LOVE FROM INDIA❤❤❤
@davidbombal
11 ай бұрын
Very happy to hear that! All the best for your journey :)
Nice interview!
Great video. Part of the problem is that users are by default admins on their machines. Your default access should NOT be running as admin. Microsoft UAC is not an answer, just click OK. Admin access needs to be an actual separate account, require user, password AND MFA. Take away the ability to admin anything without another flow being kicked off by default. fix default permissions. Pay attention to login patterns. What SHOULD you being logging into, versus what you SHOULDN"T be logging into.
People will always be the biggest threat to security.
What I find interesting about most Cyber 'events' is that you can ALMOST ALWAYS trace it back to a single user, or usergroup getting Phished
@timothymiddleton6651
9 ай бұрын
But make sure you spend 100hrs patching for Heartbleed instead of segmenting, performing backups, and enforcing least privilege…..
@WACtheRaven
9 ай бұрын
@@timothymiddleton6651 I can feel your pain. Share it with me!! Lol (not many will catch reference)
That. Now that was a great talk. Thank you very much for this.
@davidbombal
11 ай бұрын
Glad you enjoyed it Nathan!
Such an amazing video.
Another interesting topic. 🤟
@davidbombal
11 ай бұрын
Glad you think so!
Your comment about our guest today is 100 percent real. I dont know much about security by I easily would follow his explanations. I am not intrested. CISCO is going big
This video really I like it Coz its increase the information thank u David i wish some day meet you .
@davidbombal
11 ай бұрын
Thank you Ali! Glad to hear that you enjoyed the video!
Yes Hacking is moving fast and so knowledge that you have to get, in ordet to be at the level and MR BOMBAL is providing us with a great contents as usual thx for all your efforts sir God bless u
@davidbombal
11 ай бұрын
Thank you so much Majid!
Good to see Cisco becoming relevant again
This guy describes what Cisco just announced, however top leading security vendors have all of this for years, the first one for more than 4 years. Unfortunately Cisco lost its security leadership with old good ASA a decade ago and now is even struggling to go in top 5 or 10. This is what happen when you create an Academy to support your hardware.
@davesabra4320
11 ай бұрын
was said in 1990s complexity is insecure
As good as it always.👍🏻
@davidbombal
11 ай бұрын
Thank you!
So then only "identity approved" processes will be allowed to run? Similar to DRM? Thereby enabling the lockdown of computing to only government-corporate licensing approved functions? Is there a bigger picture here?
Hi thank you for this video can you make a video about the AMD( Platform Security Processor ) and Intel ( intel management engine)
Hello I am from Myanmar ❤ I love your video❤
@davidbombal
11 ай бұрын
Awesome! Thank you!
Best man in the field 💓💎
Still using the Why Files jingle, can't get used to it dude :)
any job offers in field?
This is what us going on in the world today!
@davidbombal
11 ай бұрын
It's a huge problem!
The persistence of threat actors is good for our job security at least. Every college is churning out cyber workers now
Hello ! Because you are a very good teatcher ! by the way can you make some vids about ssh injection and things like that since i"m learnig web dev it will be good to know how to protect a site web tank you !
Hello Mr. Bombal, What should you do when Powershell is running on your machine?
@Leroy0070
11 ай бұрын
It really depends on many factors. Did you recently install something new or click on some link, are there programs that requires Power Shell to run then... Many factors really.
If you’re siem aggregates logs and correlates disparate activity properly, good alerting and follow up analysis do find the bad. An experienced analyst could have told you that years ago. But management just buys the “best of breed” in individual domains expecting a silver bullet. When the decision makers understand, the tools will be implemented correctly. We’re all waiting… nice talk.
@davidbombal
11 ай бұрын
It's going to be interesting to see what happens. At the moment, so many companies are getting hacked and so many data breaches are occurring that it looks like something needs to change.
@AudioExplorer
11 ай бұрын
@@davidbombal 100% It would interesting to see the correlation between improvements and the rise of the CSO who doesn’t sit under the CIO.
Top tips for cyber security Back up your data. ... Keep your devices and your apps up-to-date. ... Choose unique passwords. ... Turn on two-factor authentication. ... Be creative with the answers to your account recovery questions. ... Avoid sensitive transactions on free wifi. ... Install an antivirus and scan for viruses regularly.
Then lock down power Shell with layers of securety
Love from India❤❤
@davidbombal
11 ай бұрын
Thank you!
“Have you ever been inside a firewall?” Is water wet? :)
@davidbombai I'm super interested. In being specifically a sock designer, can you give me any advice or Direction please?
At 13:16 he’s wrong that you can’t run a zero trust with a VPN together with Palo Alto. Not sure what he’s talking about.
I am from India , love 💕 from India 🙏🏻❤️🥰
@davidbombal
11 ай бұрын
Welcome India!!
The evil trinity : complexity, scalability, connectivity
Wanna fight cyber security? Disconnect your computer from the internet😅
Hey Sir My kali linux problem for osintgram tool error Error parsing error response: Expecting value: line 1 column 1 (char 0)
@anon9577
11 ай бұрын
Wrong place script kiddie
David Bombal, Nigerian Prince again? That is an attack. Lol!!!
David bombal firearms 👍 looks like military veteran
Sir I have failed in 12th I want to build a career in Cybersecurity what I can do sir please help me
@jellycr1946
11 ай бұрын
Get security+ cert to start and that will teach you a path to go on
Ah yes. Let's get AI to control the network and firewalls
So AI is taking over SOCs? I bet attackers are training their own custom models on what worked in the past too. I'm grabbing the popcorn
You can’t make a solution that’s the problem you implement a cert system it will result in device robbery’s
Humans will always be first vulnerability everything after that is machine and software.
Is this video about powershell and its evil nature?
Will pentesters be replaced by ai one day?
@marongayo3217
11 ай бұрын
In the worst case scenario
hello i'm from indonesia ❤ i like you ❤
@davidbombal
11 ай бұрын
Thank you!
Big fan from India sir❤❤❤❤❤
How can one upload virus to alien space ships? I’m asking for a Nigerian friend. 🛸 🦠 🇳🇬 👑
So... the solution is a centralized application with full access to what people do on their devices? LUL
Hello
@davidbombal
11 ай бұрын
Hello Adil!
Bcoz of you today i am doing hacking ..thank tou for your support, you are Godfather for me in this hacking world .❤ Great respect 🙏🏻💕for you in my heart.
@marongayo3217
11 ай бұрын
How did you do it? Is IT a basic background? I have a background in mathematics and statistics but I'd love to switch over to cyber security
@DreamlandDuo
11 ай бұрын
@@marongayo3217 bro , it's not hard as you think , it a game of logic . Aslo need intrest and way of building logic ..
cat and mouse. that's all
The Windows operating system is the #1 root of all hacking evil, not Powershell. Of all the issues cies suffer from getting hacked, the common thing among all them and that cyber security experts keep their heads in the sand and not seeing it is (willingly): things happens when someone clicked on "something bad", then that "something bad" could exectute because Windows is behind. Security Experts are all still using Windows themselves and are afraid of *nix style operating systems. I was at a Cybersecurity conference last week and what I get from it is that the secyrity experts themselves are also a problem by avoiding to say "stop using Windows" in the enterprise.
@vram1974
11 ай бұрын
Bad guys are going to target whatever is used. Everyone could switch to Linux tomorrow and the intrusions/attacks would keep coming. IT is a damn security failure for the same reason the US tax code is unintelligible... It's all overcomplicated.
@Traumatree
11 ай бұрын
@@vram1974They will keep ciming, but will not succeed. That’s the main difference.
@vram1974
11 ай бұрын
@@Traumatree I read more everyday about Linux malware. It's not the impenetrable fortress it's made out to be.
To whoever gets into hacking they should focus their efforts on the IRS, CIA, NATO, IMF, World Bank, random corporations killing the world, etc etc, you know. Why defend the networks of governments? Why defend the networks of corporations?
First