Cybersecurity Journo Requests

Connect with journalists covering cybersecurity. From breaking news to in-depth features, discover relevant media opportunities from top publications in this category.

Never Miss a Cybersecurity Journo Request

Get instant alerts when Cybersecurity journalists post new journo requests. Join the community of sources landing media opportunities daily.

Smart Grid Experts for Biweekly Knowledge Sharing Series

šŸ’” Exciting Idea: Smart Energy Knowledge Sharing - Seeking Your Input! šŸ’” Hey network! Close friend of mine is preparing of launching a free, biweekly online series (podcast or webinar) focused on the dynamic world of Smart Metering and Smart Grid technologies. The goal is to create a platform for practical knowledge sharing, emerging trends, and deep dives into the challenges and opportunities shaping the future of energy. šŸ¤” What I Need From You: I want this to be driven by the expertise in our community. I'm looking to feature industry professionals, technical experts, and thought leaders—that's you! If you have knowledge, insights, case studies, or perspectives on topics like: AMI/AMR deployment challenges Grid modernization and resilience Data analytics and leveraging smart meter data Utility customer engagement Cybersecurity for smart infrastructure Renewable integration and DER management ...or any other hot topic in the smart energy space, I'd love to hear from you. šŸ“£ How to Get Involved: Give me your opinion: Would you attend/listen to a free, biweekly series on these topics? Hit 'Like' or comment 'Yes'! Share your expertise: Are you interested in being a guest speaker or contributor on a topic you're passionate about? Comment 'Speaker' or DM me with a topic you could cover. Suggest a topic: Is there a burning question or niche area in smart metering/grid you want to see covered? Comment below! Let's build a leading knowledge hub together and shine a light on the incredible work being done in this field. Your expertise is invaluable! #SmartGrid #SmartMetering #EnergyTransition #Webinar #Podcast #Utilities #KnowledgeSharing #Innovation

Cyber Insurance Profile Interview Subjects for Assured Intelligence

I’ve been very quiet on LinkedIn since Christmas (JLR cyber insurance post aside…that was a reinitiation by fire!šŸ˜¬šŸ”„). The šŸ“ø of the gorgeous little feet should explain why.ā™„ļø I returned to Assured HQ in September, and didn’t plan on doing an ā€œI’m back!ā€ post because, well, it’s just not very me. But I’ve got a few updates and #JournoRequests so here it is! ā–Ŗļø Phil Muncaster did such a great job in my absence that I couldn’t let him go…so we’ve appointed him as Deputy Editor and he will continue to be instrumental for Assured Intelligence. If you’re interested in joining our team of writers, you can contact him on [email redacted]. And if you’re looking to contribute a blog or thought leadership article, those pitches can also go to Phil.Ā  ā–Ŗļø It turns out that our readers absolutely love the profile interviews we publish. Which makes me happy because they are my favourite, too. If you would like to put yourself, or someone you know, forward as my next muse, then please DM me.Ā  ā–ŖļøWe have spokespeople who will give an insanely candid and refreshing view on all things cyber insurance. You may have noted from our posts that we’re not afraid to call things out or give a refreshingly unfiltered take on hot topics - even if it's to our own detriment. Contact me if you ever need a frank and authentic viewpoint.Ā  ā–ŖļøAssured is pretty extraordinary. So much so that we’ve tried to keep it on the down-low. But I think the time has come to lift the veil (ever so slightly) on the magic we’ve been creating. In other words, we’re thinking about PR, so if this is something you can help with, please get in touch. Word of warning: we do things differently at Assured, and PR will be no exception. Finally, to all the working parents out there and those who have recently returned from mat/pat leave. The ā€˜juggle struggle’ is so very real…it’s a rollercoaster. When I keynoted at BSides Belfast in my first week back, I was contacted after my talk by so many people who felt overwhelmed. It is chaos, but maybe that’s just a sign you’re doing big things in more than one world…I wouldn’t have it any other way. But please, send coffee... ā˜•ļø #JournoRequest #PRRequest #Cyberinsurance #CybersecurityPR #MatLeave #BSidesBelfast

assured.co.uk logoassured.co.uk

CISO Insights on Staff Blackmail Risks for The Stack Feature

4 key things I just learned about #cybercrime *** I enjoyed speaking to Clement Domingo at Kaspersky Horizons in Madrid. Clement is a self-taught hacker, turned consultant and incident response leader. We got into what he was seeing in incident response (for example when responding to ransomware attacks) and a few things really stood out for me. 1) Cybercrime is getting easier to do. He recently responded to an attack that had been conducted by a 15-year-old and an 18-year-old (both French) who had dropped some commodity ransomware on a QNAP NAS (storage system.) Their ransom demand? Just $8,000 – and they got it. 2) Per a story I ran yesterday (link in comments) larger cybercriminal organisations are explicitly looking to encourage this kind of ā€œdemocratisation.ā€ The FunkSec ransomware brings customisable ransom notes, encryption, local exfiltration and evasion in a single Rust binary: ā€œplug-and-playā€ for script kiddies. 3) Meatspace risk/cyberspace risk are converging fast. In one incident the attacker found the details of someone at a company they decided to target in a credentials dump; got the password to his socials (he reused his password widely). In his Instagram DMs, enough nudes and other stuff to blackmail him. They threatened to release these publicly unless he shared his VPN password and voila, they were in the system. From there living-off-the-land techniques or Windows escalation-of-privileges vulnerabilities are usually enough to get an attacker what they need. (Windows EOP 0days fly about the broker marketplace, a Kaspersky researcher told me; ransomware groups love to use them.) Blackmailing someone over their Instagram DMs is not nationstate attack chain sophistication. But it works and it is getting an increasingly eclectic range of groups including teenagers hard cash (crypto) and data to sell on. I also learned: 4) These groups have exited Telegram at pace. Most communication now is over the Session messenger or one called Potato Chat. (Really). #journorequest time (#cybersecurity): I do think the risk of blackmail/threats against staff resulting in willing/unwilling insider threat is one of the areas of cybersecurity that’s not talked about enough. And (from what I can see) genuinely good guidance is a little thin on the ground. Being prepared for that is a joined up effort between HR, security and legal among other teams. For example is HR primed to respond in the right way if a staff member came to them and said they were being blackmailed for a password/access to systems? Would they know what to do and to involve security? Is there communication around this across the company? I’d like to go deeper into this for an upcoming feature in The Stack, so if you are a #CISO or someone with thoughts/experience working at this sensitive interconnection of spaces,Ā  please do get in touch or tag a friend. Signal @Targett.11 or email ed at thestack dot technology

Ransomware Attack Insights from UK Retail Infosec Experts for The Stack

Lots of posts on the retail ransomware attacks. We haven't added anything on The Stack as right now I don't feel we have anything to add and we don't want to just chase a "bad things happened" story without novel insight on attack paths, etc. (Incident response professionals with meaningful stuff to share, I'm Signal at @Targett.11.) I'm told VMware vulnerabilities from March are involved... https://lnkd.in/eqWrJ5hZ It goes without saying that "do tabletop exercises" and "have segmented and up-to-date back-ups and the ability to restore from them if you lose your Active Directory" etc, are all sound advice and probably deserve repeating, but really? I'm a bit past making a story out of that. If anyone has meaningful insight beyond "buy our shiny widgets" or "fail to prepare, prepare to fail"-type nonsense, I am all-ears. Here's one thing I would say. I went to probably the only good talk at UK Cyber Week the other week. It was by the Information Security Officer at retailer River Island. His security "team", if I remember correctly, was him and two analysts. It didn't sound like they had a CISO. If there's 25 priorities, he can probably actually pick and fix 5, he said. "UK retail is on its knees" was the quote. And that was reflected in budgets and resource. (Retail probably has a very soft underbelly on the "cyber" side and infosec is still a cost centre to a lot of margin-militant retailers.) There's a lot of organisations out there making do with threadbare teams. Not everyone is a $600m-cybersecurity-budget-big-bank. Anyhow, if you *do* think you have something meaningful and un-hackneyed to add, aren't just ambulance-chasing, and possibly have inside intel on the TTPs used in this set of campaigns that aren't just regurgitating previous blogs on the apparent group's social engineering techniques, I AM interested. [email redacted] #journorequest #infosec #ransomware

Never Miss a Cybersecurity Journo Request

Get instant alerts when Cybersecurity journalists post new journo requests. Join the community of sources landing media opportunities daily.