Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

Cybersecurity and Geopolitical video podcast – March 2021 episode

March 2021 episode two of Cybersecurity and Geopolitical podcast Cyjax
March 17, 2021

Security brings this monthly Cybersecurity and Geopolitical vodcast to our readers as a discussion on the latest news and issues affecting countries, industries, security and risk professionals, and their enterprises around the globe. Listen now!

The boundary between cybersecurity and geopolitics has never been as porous as it is now, with both having a significant influence on the other. The enmeshing of cybersecurity and geopolitics brings new challenges and intriguing flashpoints. In this month’s March 2021 podcast, Ian Thornton-Trump (Cyjax CISO) is joined by Tristan de Souza (Editor and Head of Communications at Cyjax) to look at the exploitation of Microsoft Exchange Server vulnerabilities by Chinese threat actors, explore the SolarWinds debacle, analyze cybercrime’s effect on the American recovery, and talk about the need for continued education against fake news.

Microsoft Exchange vulnerabilities

This month saw reports that Chinese computer network operatives exploiting multiple 0day vulnerabilities to access on-premises Exchange Servers. The threat group, dubbed HAFNIUM, forced Microsoft to distribute an out-of-band patch because of the breadth of the attacks: primarily US-based entities across several industry sectors, including infectious disease research, law, higher education, defense, and policy (think tanks and NGOs). As noted by Ian, this is a serious issue: email is both incredibly vulnerable and incredibly valuable, from a threat actor’s perspective. If access is gained to a company inbox, all manner of sensitive data can be exposed. In many ways, this was just a ticking time bomb. What’s the best way forward? And how do we create a secure environment for business communication?

SolarWinds keep blowing

This story, which initially broke at the beginning of December 2020, has yet to run its course. There are now a little under ten individual malware variants tied to the supply-chain attack, and the SolarWinds executives have been hauled in front of US government committees. Intriguingly, there appears to be no appetite for similar action in the UK, even though this attack will almost certainly have compromised ongoing espionage activity across the Five Eyes countries – of which the UK is one. Ian compares SolarWinds’ reaction – to blame an intern – with the way in which Zoom tackled innumerable bug reports that were laid bare in the media and pored over by people across the globe, after its product was catapulted to the forefront of everyone’s consciousness by the onset of the coronavirus pandemic. One of these companies got it right. Tristan points out that corporate responsibility needs to play a far bigger role in the protection of data.

Cybercrime and the American recovery

We have yet to see what the fallout from the SolarWinds and Microsoft issues – as well as those affecting Accellion – will have on the cyber-insurance sector. Will premiums be raised? Will there be more stringent penalties imposed on the victims by their insurers down the line? And is legislation necessary? Certainly, the theft of intellectual property and the potential exposure of data in mailboxes could be disastrous for the victims. But it is hard to see any benefit for either Russia or China (the alleged state sponsors of the groups responsible for the attacks on SolarWinds and Microsoft) to slow down the recovery in the US. Rather than state-sponsored cyber-attack groups, Tristan sees ransomware groups like Cl0p as being the main threat to the US and global economic recovery. The operators of Cl0p have been distributing their ransomware through an Accellion file transfer product, infecting both public and private sector organizations around the world, causing untold disruption and a heavy financial cost on victims.

Cyber Education

Rounding off the podcast, Ian ropes in Meghan and Harry (and the way in which social media has been used to both help and hinder them) to make a broader point about Russian disinformation, and political discourse more generally: he wonders whether have we reached a point where our politics is so divided that we cannot hope to establish consensus around things such as climate change and internet governance? And what should the long-term strategies be for addressing misinformation? That last question will be the over-arching theme of next month’s podcast, but for now, listen in for Ian and Tristan’s insights on all of the topics outlined above – here.

KEYWORDS: cyber security cybersecurity cybersecurity policy disinformation enterprise cyber security enterprise physical security enterprise resilience geopolitical risk misinformation campaigns risk and resilience risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Episode 4 of the Cybersecurity and Geopolitical podcast

    Cybersecurity and Geopolitical podcast: Episode 4, Misinformation & Outright Conspiracy Theories

    See More
  • Cybersecurity and Geopolitical Podcast Episode 8

    Check out Episode 8 of The Cybersecurity and Geopolitical Podcast — China’s Role in Cybersecurity: Opportunity, Manufacturer or Threat?

    See More
  • Cybersecurity and Geopolitical podast

    The Cybersecurity and Geopolitical podcast - Cyber warfare, cyber mischief and the cost to nation-states, Episode 6

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing