Cybersecurity's BIG Problem. Why it needs to change.

Поділитися
Вставка
  • Опубліковано 1 жов 2024

КОМЕНТАРІ • 101

  • @davidbombal
    @davidbombal  Рік тому +19

    Why are hackers winning the ransomware war?
    A very big thank you to Cisco for sponsoring my Cisco Live trip and this video.
    In this video I interview Tom Gillis about why hackers are winning and how to protect ourselves against the attacks.
    Go here for more information about the announcements: newsroom.cisco.com
    Cisco Talos Video: ua-cam.com/video/SyaP9GDNIug/v-deo.html
    // Tom's Socials//
    Twitter: twitter.com/_tomgillis
    LinkedIn: www.linkedin.com/in/tomgillis1
    Cisco Newsroom: newsroom.cisco.com/c/r/newsroom/en/us/executives/tom-gillis.html
    // David's Social //
    Discord: discord.gg/davidbombal
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // MENU //
    00:00 - Coming Up
    00:39 - Intro
    01:03 - How to Win Against Attackers
    04:00 - Ransomware Attacks
    07:09 - Zero Trust Network Access
    15:35 - Cisco Multi-Cloud Defense
    19:29 - The Role of A.I
    22:10 - Summary
    23:20 - Outro
    cisco
    cisco firewall
    cybersecurity
    networking
    ai
    artificial intelligence
    hacker
    hacking
    hack
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    Disclaimer: This video is for educational purposes only.

  • @Leroy0070
    @Leroy0070 Рік тому +36

    I think we need one episode where the talks about Open Source security tools. Possibly with examples.

    • @TheBlackmanIsGod
      @TheBlackmanIsGod Рік тому +1

      Yes a walk through step by step dont skip anything and explain everything especially the think behind the decision making!!!

  • @i_am_dumb1070
    @i_am_dumb1070 Рік тому +23

    Hey david can you bring someone who can do a workshop or atleast guide us on using machine learning to prevent cyberattacks or analyse malware and show that with practical example or even better give us a code sample to code along with , what i am saying is we need a AIML tutorial project video specifically for cyberscurity. It would look good on resume and also we newbies will gain some skills .

    • @davidbombal
      @davidbombal  Рік тому +17

      Great suggestion! I'll see what I can do.

  • @novianindy887
    @novianindy887 Рік тому +9

    keep it up. this kind of deep talk interviews from experts is just gold. we like it 😊

  • @jus4027
    @jus4027 Рік тому +9

    Biggest problem is greed, security has like everything else been moniterised. Licensing training etc are cash cows for the big security players.

  • @i_am_your_king
    @i_am_your_king Рік тому +3

    Hi thank you for this video can you make a video about the AMD( Platform Security Processor ) and Intel ( intel management engine)

  • @lamaktanyak
    @lamaktanyak Рік тому +5

    I'm glad to have you as mentor I have been following you for almost a year the more you dropped video I picked challenges to learn. Thank you Mr. David right here in Nigeria

  • @juliosantana1646
    @juliosantana1646 Рік тому +1

    At 13:16 he’s wrong that you can’t run a zero trust with a VPN together with Palo Alto. Not sure what he’s talking about.

  • @makedredd299
    @makedredd299 Рік тому +1

    How can one upload virus to alien space ships? I’m asking for a Nigerian friend.
    🛸 🦠 🇳🇬 👑

  • @luckyadeloye3452
    @luckyadeloye3452 Рік тому +1

    David Bombal, Nigerian Prince again? That is an attack. Lol!!!

  • @alisenjary
    @alisenjary Рік тому +3

    This video really I like it Coz its increase the information thank u David i wish some day meet you .

    • @davidbombal
      @davidbombal  Рік тому

      Thank you Ali! Glad to hear that you enjoyed the video!

  • @Slavey
    @Slavey Рік тому +8

    This guy describes what Cisco just announced, however top leading security vendors have all of this for years, the first one for more than 4 years.
    Unfortunately Cisco lost its security leadership with old good ASA a decade ago and now is even struggling to go in top 5 or 10.
    This is what happen when you create an Academy to support your hardware.

    • @davesabra4320
      @davesabra4320 Рік тому

      was said in 1990s complexity is insecure

  • @creatorofimages7925
    @creatorofimages7925 Рік тому +1

    The reality is: Companies do not want to invest into their security. I worked in such a company a while ago. So naturally, they more often than not face the consequences in the form of phishing and ransomware as well as a buttload of (government) backdoors. Not having to look at a problem doesn't make it go away. Sadly, in Germany many small and medium businesses have this exact attitude. I would even call it "expectation". They expect the problem to go away if they ignore it.

  • @tanker7757
    @tanker7757 Рік тому +1

    You can’t make a solution that’s the problem you implement a cert system it will result in device robbery’s

  • @jordanrox007
    @jordanrox007 Рік тому +3

    Ah yes. Let's get AI to control the network and firewalls

  • @acollins319
    @acollins319 Рік тому +1

    I don't like how PS or CMD run in the background for like 2 seconds and never stays open long enough for me to see what commands were run!

  • @carsonjamesiv2512
    @carsonjamesiv2512 Рік тому +4

    This is what us going on in the world today!

  • @immortal0833
    @immortal0833 Рік тому +8

    Hello sir, I'm following you from 6 months. I'm glad that i found your channel at the beginning of my cybersecurity coureer. LOVE FROM INDIA❤❤❤

    • @davidbombal
      @davidbombal  Рік тому +1

      Very happy to hear that! All the best for your journey :)

  • @MotivationCity221
    @MotivationCity221 Рік тому +1

    Top tips for cyber security
    Back up your data. ...
    Keep your devices and your apps up-to-date. ...
    Choose unique passwords. ...
    Turn on two-factor authentication. ...
    Be creative with the answers to your account recovery questions. ...
    Avoid sensitive transactions on free wifi. ...
    Install an antivirus and scan for viruses regularly.

  • @rami.0092
    @rami.0092 Рік тому +5

    As good as it always.👍🏻

  • @dohyea6093
    @dohyea6093 Рік тому +1

    So then only "identity approved" processes will be allowed to run? Similar to DRM? Thereby enabling the lockdown of computing to only government-corporate licensing approved functions? Is there a bigger picture here?

  • @marshallstanley4123
    @marshallstanley4123 Рік тому +1

    Your comment about our guest today is 100 percent real. I dont know much about security by I easily would follow his explanations. I am not intrested. CISCO is going big

  • @Luminasonique
    @Luminasonique Рік тому +1

    Hello ! Because you are a very good teatcher ! by the way can you make some vids about ssh injection and things like that since i"m learnig web dev it will be good to know how to protect a site web tank you !

  • @TimoTalksTech
    @TimoTalksTech Рік тому +4

    Another interesting topic. 🤟

  • @Zombicorn731
    @Zombicorn731 Рік тому +2

    People will always be the biggest threat to security.

  • @silentwindstudio
    @silentwindstudio Рік тому +1

    So... the solution is a centralized application with full access to what people do on their devices? LUL

  • @ilozeet
    @ilozeet Рік тому

    @davidbombai I'm super interested. In being specifically a sock designer, can you give me any advice or Direction please?

  • @bayarkyaw9593
    @bayarkyaw9593 Рік тому +2

    Hello I am from Myanmar ❤ I love your video❤

  • @majiddehbi9186
    @majiddehbi9186 Рік тому +5

    Yes Hacking is moving fast and so knowledge that you have to get, in ordet to be at the level and MR BOMBAL is providing us with a great contents as usual thx for all your efforts sir God bless u

  • @MRA_muhammadrafiq
    @MRA_muhammadrafiq Рік тому +2

    hello i'm from indonesia ❤ i like you ❤

  • @cheesium238
    @cheesium238 10 місяців тому

    So AI is taking over SOCs? I bet attackers are training their own custom models on what worked in the past too. I'm grabbing the popcorn

  • @Jupiterxice
    @Jupiterxice Рік тому

    Humans will always be first vulnerability everything after that is machine and software.

  • @mubarekabdi
    @mubarekabdi Рік тому +1

    Very clear presentation of what's going around networking today and yesterday. Thank you guys.

  • @adilsabri6036
    @adilsabri6036 Рік тому +2

    Hello

  • @apricotcomputers3943
    @apricotcomputers3943 Рік тому

    Wanna fight cyber security? Disconnect your computer from the internet😅

  • @imjustu6891
    @imjustu6891 Рік тому +1

    any job offers in field?

  • @Arrian_YT
    @Arrian_YT Рік тому +1

    I love taking David's courses. I love his voice and the way he talks.

  • @Traumatree
    @Traumatree Рік тому +3

    The Windows operating system is the #1 root of all hacking evil, not Powershell. Of all the issues cies suffer from getting hacked, the common thing among all them and that cyber security experts keep their heads in the sand and not seeing it is (willingly): things happens when someone clicked on "something bad", then that "something bad" could exectute because Windows is behind.
    Security Experts are all still using Windows themselves and are afraid of *nix style operating systems. I was at a Cybersecurity conference last week and what I get from it is that the secyrity experts themselves are also a problem by avoiding to say "stop using Windows" in the enterprise.

    • @vram1974
      @vram1974 Рік тому

      Bad guys are going to target whatever is used. Everyone could switch to Linux tomorrow and the intrusions/attacks would keep coming. IT is a damn security failure for the same reason the US tax code is unintelligible... It's all overcomplicated.

    • @Traumatree
      @Traumatree Рік тому +1

      @@vram1974They will keep ciming, but will not succeed. That’s the main difference.

    • @vram1974
      @vram1974 Рік тому

      @@Traumatree I read more everyday about Linux malware. It's not the impenetrable fortress it's made out to be.

  • @FFWrench
    @FFWrench 4 місяці тому

    Thanks David and Tom for this interview!

  • @makaer1
    @makaer1 Рік тому

    David bombal firearms 👍 looks like military veteran

  • @ASCYBERCLUB
    @ASCYBERCLUB Рік тому +1

    Sir I have failed in 12th I want to build a career in Cybersecurity what I can do sir please help me

    • @jellycr1946
      @jellycr1946 Рік тому +2

      Get security+ cert to start and that will teach you a path to go on

  • @timothymiddleton6651
    @timothymiddleton6651 Рік тому

    “Have you ever been inside a firewall?”
    Is water wet? :)

  • @adventuresinmymind2038
    @adventuresinmymind2038 Рік тому +1

    Great video. Learnt way more than I expected.

  • @CallousCoder
    @CallousCoder Рік тому

    My customer is one of the 3 big Dutch banks. And although I loathe it, every month we need to have a certain percentage on a ongoing course that you need to do questions on that teaches you awareness. And there are some nice situational and technical awareness questions on there.
    That actually recently made me think twice. I got a letter from the “IRS” telling them my payment had not arrived. And if I didn’t pay in 2 days the legal fine would be added.
    And one of the important ones is recognizing phishing attacks and reporting them. That way they can do active prevention (like blocking that domain) or let the cops start an investigation.
    And the default way of working is, it’s better to delete an email or hang up on a call. And to never ever share colleagues or customer’s details. That’s not to us as most employees. Those who can know what and to whom the can let go that information. Because it can be used for “Speer phishing” attacks.
    The funny thing was the new CEO send an email to everyone telling to make an appointment to meet with him. The overwhelming majority deleted that email thinking it was some sort of phishing attack - and they do actually make entrapment calls to see who doesn’t follow producer to see who needs extra lessons on security. Which is good.

  • @AudioExplorer
    @AudioExplorer Рік тому +1

    If you’re siem aggregates logs and correlates disparate activity properly, good alerting and follow up analysis do find the bad. An experienced analyst could have told you that years ago. But management just buys the “best of breed” in individual domains expecting a silver bullet. When the decision makers understand, the tools will be implemented correctly. We’re all waiting… nice talk.

    • @davidbombal
      @davidbombal  Рік тому +1

      It's going to be interesting to see what happens. At the moment, so many companies are getting hacked and so many data breaches are occurring that it looks like something needs to change.

    • @AudioExplorer
      @AudioExplorer Рік тому

      @@davidbombal 100% It would interesting to see the correlation between improvements and the rise of the CSO who doesn’t sit under the CIO.

  • @traumaa4real247
    @traumaa4real247 Рік тому +2

    Love from India❤❤

  • @cjramseyer
    @cjramseyer Рік тому

    Great video. Part of the problem is that users are by default admins on their machines. Your default access should NOT be running as admin. Microsoft UAC is not an answer, just click OK. Admin access needs to be an actual separate account, require user, password AND MFA. Take away the ability to admin anything without another flow being kicked off by default. fix default permissions. Pay attention to login patterns. What SHOULD you being logging into, versus what you SHOULDN"T be logging into.

  • @thierry-lab
    @thierry-lab Рік тому

    Well explained .. a good one !!

  • @DreamlandDuo
    @DreamlandDuo Рік тому +1

    I am from India , love 💕 from India 🙏🏻❤️🥰

  • @creepy3858
    @creepy3858 Рік тому +1

    Will pentesters be replaced by ai one day?

  • @Manavetri
    @Manavetri Рік тому

    Brilliant, I love this kind of content !!! You make an excellent job, thank you for your time and effort to make it real.

  • @mitchiethe
    @mitchiethe Рік тому

    Sending thanks from the Gold Coast in Aus giving me motivation to keep going with the start of my cyber security career

  • @thefrub
    @thefrub Рік тому

    The persistence of threat actors is good for our job security at least. Every college is churning out cyber workers now

  • @nerajjha2875
    @nerajjha2875 Рік тому

    First

  • @zeljkoklepac3180
    @zeljkoklepac3180 Рік тому

    Then lock down power Shell with layers of securety

  • @davesabra4320
    @davesabra4320 Рік тому

    The evil trinity : complexity, scalability, connectivity

  • @barneyross8083
    @barneyross8083 Рік тому

    Is this video about powershell and its evil nature?

  • @protectouraus
    @protectouraus Рік тому

    Still using the Why Files jingle, can't get used to it dude :)

  • @mblackonline1059
    @mblackonline1059 Рік тому

    Great video. Exciting stuff!

  • @Darkweb-s8e
    @Darkweb-s8e Рік тому

    Hey Sir My kali linux problem for osintgram tool error Error parsing error response: Expecting value: line 1 column 1 (char 0)

    • @anon9577
      @anon9577 Рік тому

      Wrong place script kiddie

  • @dipanjan_roy
    @dipanjan_roy Рік тому

    Such an amazing video.

  • @cadeathtv
    @cadeathtv Рік тому

    cat and mouse. that's all

  • @dennisantwiboasiako5384
    @dennisantwiboasiako5384 Рік тому

    Hello Mr. Bombal,
    What should you do when Powershell is running on your machine?

    • @Leroy0070
      @Leroy0070 Рік тому

      It really depends on many factors. Did you recently install something new or click on some link, are there programs that requires Power Shell to run then... Many factors really.

  • @ourdazakaria4182
    @ourdazakaria4182 Рік тому

    Best man in the field 💓💎

  • @ep1kone
    @ep1kone Рік тому +3

    That. Now that was a great talk. Thank you very much for this.

  • @LabGecko
    @LabGecko Рік тому +3

    Good to see Cisco becoming relevant again

  • @LordCybz0
    @LordCybz0 Рік тому +1

    To whoever gets into hacking they should focus their efforts on the IRS, CIA, NATO, IMF, World Bank, random corporations killing the world, etc etc, you know. Why defend the networks of governments? Why defend the networks of corporations?

  • @DreamlandDuo
    @DreamlandDuo Рік тому +1

    Bcoz of you today i am doing hacking ..thank tou for your support, you are Godfather for me in this hacking world .❤ Great respect 🙏🏻💕for you in my heart.

    • @Okwach_Kich
      @Okwach_Kich Рік тому +1

      How did you do it? Is IT a basic background? I have a background in mathematics and statistics but I'd love to switch over to cyber security

    • @DreamlandDuo
      @DreamlandDuo Рік тому

      @@Okwach_Kich bro , it's not hard as you think , it a game of logic . Aslo need intrest and way of building logic ..

  • @Thenileshpatil
    @Thenileshpatil Рік тому

    Big fan from India sir❤❤❤❤❤

  • @greob
    @greob Рік тому

    Nice interview!