Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


[Podcast] Security Monk vs. Emperor Palpatine

Data Security


Leave a review for our podcast & we'll send you a pack of infosec cards.

This week, we continue our ongoing ransomware discussion with the Inside Out Security Show panel – Kilian Englert, Mike Buckbee, and Mike Thompson.

But before we launched into our conversation, as an icebreaker, I asked the panel what their advice would be to this tired sysadmin who deleted the wrong directory on the wrong server?

Buckbee: Do exactly what they did to fix the problem.

Englert: It happens, just have to recover and move on.

Thompson: Always take a snapshot before touching your production server.

Back to Ransomware

I likened this singular, life-changing malware to Emperor Palpatine. Why? The scammers try to be your friend and provide customer support. Meanwhile, they’re clever about extorting money from you.

There were a few interesting ransomware stories that we covered:

  • An IT pro that tried to fight back by sending the perpetrators a Locky ransomware. We’re not certain if it was a success, but at least he tried
  • One hijacked a hotel from making new hotel keys
  • Police storage devices that record video data were infected
  • The scariest of them all, Google Play hosted a ransomware app that infected a user’s cell phone

Moving away from ransomware, we also discussed these controversial stories:

Tool of the week: Google’s Site Reliability Engineering

Cindy Ng

Cindy Ng

Cindy is the host of the Inside Out Security podcast.

Kilian Englert

Kilian Englert

Kilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cyber security and technology best practices.

Michael Buckbee

Michael Buckbee

Michael has worked as a syadmin and software developer for Silicon Valley startups to the US Navy and everything in between.


Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.