InSecurity Podcast: Jeff Tang is Beggin’ You… Stop Trying to Make “Weaponized” Cyber Happen
The Missing Persons tried to tell usin the 1980s…
“Media overload bombarding you with action
It's getting near impossible to cause distraction
Someone answer me before I pull out the plug
What are words for when no one listens anymore”
When it comes to cybersecurity, who is telling you the right things? And we don’t mean who is telling you the truth. We mean who is using the right words to describe the things and the actions that are affecting you and your ability to protect your data.
Everywhere Jeff Tang looks, he is besieged with news stories using terms like “weapons-grade exploits” to describe the latest malware outbreak. The narrative constructed that results from this colorful language is detrimental to the progress of securing our computer networks, because it seeks to categorically apply the metaphor of military conflict to cybersecurity - and not every incident in cyber conflict qualifies as a military-style “attack.”
In today’s episode of InSecurity, Matt Stephenson chats with Cylance Executive Mischief Consultant Jeff Tang about the value of words in cybersecurity. Jeff explains why it is mind boggling to compare the inconvenience of not being able to access your social media or online banking to a real-world kinetic attack that causes mass human causalities. Join us and understand that, while computers work in a world of binaries, that doesn’t mean our thinking about them has to be binary as well. It’s time we transition away from these military terms when discussing cybersecurity – or face the real-world consequences.
About Jeff Tang
Jeff Tang(@mrjefftang) is a Senior Security Researcher at Cylance focused on operating systems and vulnerability research. He started his career as a Global Network Exploitation & Vulnerability Analyst at the National Security Agency, where he conducted computer network exploitation operations in support of national security requirements. Prior to Cylance, Jeff served as the Chief Scientist at VAHNA to develop a security platform for identifying targeted network intrusions, and also worked as a CNO Developer at ManTech where he researched tools, techniques and countermeasures in computer network vulnerabilities.
Jeff completed his Bachelor of Science (BSc) in Electrical Engineering and Computer Science at the University of California, Berkeley and a Master of Science (MSc) in Offensive Computer Security at Eastern Michigan University.
About Matt Stephenson
Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV
Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come
Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as
ThreatVector InSecurity Podcasts:
iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2
GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste
Make sure you Subscribe, Rate and Review!