Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:10)
We need to start thinking about, especially with the like, onset of A.I. now, it's really easy to go and scale and create 30 fake accounts at once. You need to start thinking about who's this user account, right? How long have they been around? What's their history with open source, Are they a legitimate contributor or are they just here to, you know, cause some ruckus? And you need to start inspecting those starting today.
A (0:39)
Hello and welcome to another episode of Data Security Decoded. I'm your host, Caleb Tolan, and if this is your first time joining us, welcome to the show. Make sure you hit that subscribe button so you're notified when new episodes go live. And if you're already a subscriber, thanks for coming back. Give us a rating. Drop a comment below. It really helps us reach listeners like you who are eager to learn more about reducing risk across their business. Now, a couple years ago, I read a book by Randy Zuckerberg. Yes, Mark Zuckerberg's sister. It's called Pick three, and it's all about being, well, lopsided in your life. Without giving away too much of the book, there are five core areas that she identifies and typically most people highly index on one of those five areas. And that is where your Passionista lives. I, for example, am a sleep passionista. Now, I don't know if our guests would self describe themselves as a passionista in any way, but I'm going to bestow this title upon them. And so today I sat down with our third party risk passionist, Hayden Smith. Hayden is the CEO of Hunted Labs and we did a deep dive into supply chain attacks. I know we've covered this topic at a high level before, but we really wanted to deep dive into how they operate, where they come from, and what organizations can do to get a grip on this issue. Hayden has a lot of deep expertise in this space and we had a fascinating conversation about it. Let's dive into it. Thank you, Hayden, for joining us. I'm really excited for you to join us on the Data Security Decoded podcast. Before we dive into the meat of the conversation, what is something not related to cyber that you are completely obsessed with lately? For me, I'm going to go with crystals and rare minerals. You can see my amethyst here in the background. I have a little, a little fluorite here that I like to keep on my desk too. I'm a, I'm a crystal fanatic to some extent. Maybe not a fanatic. I've seen some people who are but much bigger fans of myself but or have better collections. But what are you obsessed with that's not related to cyber lately?
B (2:23)
Yeah, so I think what I'm obsessed with right now, I mean I'm really obsessed with college football. So right now my USC Trojans are on the up and up, so I follow that pretty closely. So definitely consider myself a fanatic. And then fueling that fire, I just got done coaching my son's flag football team for the first time, which I got really into and was a whole lot of fun. When I took the volunteer position, I didn't understand how into it I would I would get and it was very, very exciting and very fun to do so. Those are definitely the two things I think that consume me outside of my day to day job.
