What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
Blog.png 2019-03-21 16:03:01 Opinion: my Grandfather\'s John Deere would support our Right to Repair (lien direct)

Willie Cade\'s grandfather, Theo, an engineer at John Deere, helped invent the manure spreader. His grandson thinks John Deere\'s efforts to kill right to repair legislation is what stinks.

The post Opinion: my Grandfather\'s John Deere would support our Right to Repair appeared first on The Security Ledger.

-->
Blog.png 2019-03-21 12:40:04 Report: with most exploited vuln of 2018, it\'s really Really REALLY time to ditch IE! (lien direct)

Microsoft\'s products are still a leading source of exploitable security vulnerabilities used by hackers, according to a report by the firm Recorded Future.

The post Report: with most exploited vuln of 2018, it’s really Really REALLY time to ditch IE! appeared first on The Security Ledger.

-->
Blog.png 2019-03-19 20:25:02 Norsk Hydro Hit with \'Severe\' LockerGoga Ransomware Attack (lien direct)

Global aluminum manufacturer Norsk Hydro was hit with an alleged ransomware attack Tuesday. The attack is having a major impact on the company\'s global business and production.

The post Norsk Hydro Hit with ‘Severe’ LockerGoga Ransomware Attack appeared first on The Security Ledger.

-->
Blog.png 2019-03-19 17:09:04 Podcast Episode 138: Hacker President? Joseph Menn of Reuters talks Beto and Cult of the Dead Cow (lien direct)

In this exclusive podcast interview with Security Ledger, Reuters investigative technology journalist Joseph Menn talks about his upcoming book on the iconic hacking group Cult of the Dead Cow and his discovery that U.S. presidential candidate Beto O\'Rourke of Texas was an early member.

The post Podcast Episode 138: Hacker President? Joseph Menn...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599802276/0/thesecurityledger -->»

Blog.png 2019-03-18 20:43:05 RSA Recap: CTO Zulfikar Ramzan talks about Trust, Zero Trust and the Debate over Going Dark (lien direct)

I talk with Zulfikar Ramzan, Chief Technology Officer (CTO) at RSA Security* about the major trends at this year\'s RSA Conference including the growing focus on digital risk and trust, the debate around encryption, law enforcement and "going dark" and what people mean when they talk about "zero trust" networks.

The post RSA Recap: CTO Zulfikar...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599762676/0/thesecurityledger -->»

Blog.png 2019-03-14 12:23:03 Whack-a-Fraud: EU\'s Crackdown Could Increase U.S. Payments Scams (lien direct)

U.S. providers should be "on alert" for an increase in payments fraud experts warn. The European Union\'s (EU\'s) new Payment Services Directive (PSD2) raises the bar for security and may cause cybercriminals to focus on targets in this country.

The post Whack-a-Fraud: EU’s Crackdown Could Increase U.S. Payments Scams appeared first on ...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599552010/0/thesecurityledger -->»

Blog.png 2019-03-13 17:21:03 Spotlight: CTIA\'s IoT Cybersecurity Certification is a Big Deal. Here\'s why. (lien direct)

Forget about Congress\'s latest attempt to regulate IoT security. CTIAs new certification is the toothiest standard going. In this Spotlight Podcast, we talk with Sameer Dixit of Spirent * on the sidelines of RSA about why. 

The post Spotlight: CTIA’s IoT Cybersecurity Certification is a Big Deal. Here’s why. appeared first on ...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599509670/0/thesecurityledger -->»

Blog.png 2019-03-13 12:19:05 Pro-Brexit Camp Wages Active \'Fake News\' Twitter Campaign (lien direct)

Suspicious activity on Twitter is trying to sway public opinion in favor of Brexit as the United Kingdom continues its struggle to reach a deal to withdraw from the European Union, according to a new report.

The post Pro-Brexit Camp Wages Active ‘Fake News’ Twitter Campaign appeared first on The Security Ledger.

-->
Blog.png 2019-03-12 21:40:00 Podcast Episode 137 Sponsored by Code42: GirlScouts to the Rescue and Rethinking Enterprise DLP (lien direct)

In this week\'s episode (#137): Hewlett Packard Enterprise (HPE) Chief Information Security Officer Elizabeth Joyce joins us to talk about HPE\'s collaboration with Girl Scouts of America to bolster teenagers cyber security chops and encourage more young women to explore cyber security as a profession. Also: we talk with Vijay Ramanathan about the...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599456842/0/thesecurityledger -->»

Blog.png 2019-03-08 15:54:04 Report: China, Like Russia, Uses Social Media to Sway U.S. Public Opinion (lien direct)

Russia isn’t the only nation using social media sites like Facebook, Twitter and Instagram to spread its political message across in the United States; China also is using social media–albeit in different ways–to sway public opinion and make the Communist country look favorable to the American public, research has found....

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599310304/0/thesecurityledger -->»

Blog.png 2019-03-06 22:04:02 For Customers, Backstory\'s Lure is Data, Economics (lien direct)

Google spin-out Chronicle\'s new security intelligence service, Backstory, appeals to companies drowning in operational data and desperate for security insights, according to the companies who are using the platform.

The post For Customers, Backstory’s Lure is Data, Economics appeared first on The Security Ledger.

-->
Blog.png 2019-03-06 18:01:05 Devices\' UPnP Service Emerges as Key Threat to Home IoT Networks (lien direct)

Home connected device users are putting their IoT networks at risk by leaving exposed a common service devices use to seamlessly connect and communicate with each other, according to cybersecurity firm Trend Micro. Hackers recently have been found to exploit the Universal Plug and Play (UPnP) service of poorly configured routers and home...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599247230/0/thesecurityledger -->»

Blog.png 2019-03-04 22:52:04 Podcast Episode 136: The Geopolitics of Cyber Attacks with LookingGlass and Bruce Schneier on Public Interest Cyber (lien direct)

How will the collapse of the North Korean summit affect that country’s malicious activity online? LookingGlass* joins us to discuss. Also: how to attract more technologists to public interest work. Note: this week\'s podcast episode (#136) is sponsored by the firm LookingGlass Cyber Solutions. President Trump has been courting North Korea,...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599194714/0/thesecurityledger -->»

Blog.png 2019-03-04 22:52:04 Podcast Episode 136: Cyber in the Public Interest at RSA and the Geopolitics of Cyber Attacks with LookingGlass (lien direct)

How will the collapse of the North Korean summit affect that country’s malicious activity online? LookingGlass* joins us to discuss. Also: how to attract more technologists to public interest work. Note: this week\'s podcast episode (#136) is sponsored by the firm LookingGlass Cyber Solutions. President Trump has been courting North Korea,...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599194714/0/thesecurityledger -->»

Blog.png 2019-03-04 03:34:04 At RSA: Focus on Cyber in the Public Interest (lien direct)

Congress, non profits and government agencies could all use technology and cyber security expertise. The RSA Conference is pondering what it will take to foster cyber security pros to work in the public interest.

The post At RSA: Focus on Cyber in the Public Interest appeared first on The Security Ledger.

-->
Blog.png 2019-03-03 16:38:03 Following Security Ledger at RSA Conference: Monday (lien direct)

The Security Ledger will be in San Francisco for the 28th RSA Security Conference this week. Check us out if you\'re at the show or follow us on social media @securityledger or via the #SLRSA hash tag. I\'ll be tweeting and sharing images (and video?) from the show floor.

The post Following Security Ledger at RSA Conference: Monday appeared first on...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599144068/0/thesecurityledger -->»

Blog.png 2019-02-28 17:41:03 Research: Sextortion Scams more frequent, sophisticated (lien direct)

So-called "sextortion" attacks are a growing threat, replacing other e-mail borne threats like spam, ransomware and business e-mail compromise attacks as they increase in sophistication and scope, a new report finds.

The post Research: Sextortion Scams more frequent, sophisticated appeared first on The Security Ledger.

-->
Blog.png 2019-02-27 18:40:03 Spotlight: Synopsys on democratizing Secure Software Development (lien direct)

We speak with Ravi Iyer, the Head of Product Management talks to us about the "democratization" of software development, as more and more companies become software publishers. Ravi and I talk about Polaris, a new software integrity platform that integrates a wide range of software testing and analysis tools into a common platform.

The post ...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599007924/0/thesecurityledger -->»

Blog.png 2019-02-26 18:35:05 Podcast Episode 135: The Future of Passwords with Google Account Security Chief Guemmy Kim (lien direct)

In this week\'s episode (#135): we continue our series on the future of Passwords as we are joined by Guemmy Kim, a group product manager at Google in charge of that company\'s account security initiatives. 

The post Podcast Episode 135: The Future of Passwords with Google Account Security Chief Guemmy Kim appeared first on The Security...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/598964956/0/thesecurityledger -->»

Blog.png 2019-02-22 20:46:04 EU calls for End to Default Passwords on Internet of Things (lien direct)

A group representing European telecommunications firms last week published technical specifications for securing a wide range of consumer Internet of Things devices including toys, smart cameras and wearable health trackers.

The post EU calls for End to Default Passwords on Internet of Things appeared first on The Security Ledger.

-->
Blog.png 2019-02-19 13:23:05 Podcast Episode 134: The Deep Fake Threat to Authentication and analyzing the PEAR Compromise (lien direct)

Vijay Balasubramaniyan of Pindrop joins us to talk about it. And, in our second segment, Sam Bisbee the CSO of the firm ThreatStack joins us to talk about last month\'s hack of the PEAR open source package manager and why data deserialization attacks are a growing threat to projects that use open source components.

The post Podcast Episode 134:...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/598068876/0/thesecurityledger -->»

Blog.png 2019-02-14 15:44:03 Waiting for Federal Data Privacy Reform? Don\'t Hold Your Breath. (lien direct)

Despite a litany of high-profile data breaches, federal action on data privacy is unlikely to go anywhere in 2019 as partisanship and lack of technology literacy complicate Congressional action.

The post Waiting for Federal Data Privacy Reform? Don’t Hold Your Breath. appeared first on The Security Ledger.

-->
Blog.png 2019-02-13 03:41:01 Podcast Episode 133: Quantum Computing\'s Security Challenge and Life After Passwords (lien direct)

The arrival of functional quantum computers may be closer than you think. I\'m joined by Avesta Hojjati, Head of DigiCert Labs and Brian LaMacchia, Distinguished Engineer and Head of the Security and Cryptography Group at Microsoft Research to talk about coming quantum revolution and what it means for security.

The post Podcast Episode 133:...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/596898040/0/thesecurityledger -->»

Blog.png 2019-02-11 13:28:04 In Granite State: Industry Groups Paint Dark Picture of Right to Repair (lien direct)

The battle lines were drawn at a hearing in New Hampshire last week for a proposed right to repair law, with supporters calling for economic justice for consumers and opponents warning of crime and injury should the law pass.

The post In Granite State: Industry Groups Paint Dark Picture of Right to Repair appeared first on The Security Ledger...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/596573590/0/thesecurityledger -->»

Blog.png 2019-02-08 15:17:01 Four Signs You\'re Ready for a Virtual CISO (lien direct)

A virtual Chief Information Security Officer (or vCISO) can be a great resource to a company. But how do you know when your company is ready for one? Rob Black of Fractional CISO shares four telltale signs to watch for.

The post Four Signs You’re Ready for a Virtual CISO appeared first on The Security Ledger.

-->
Blog.png 2019-02-07 14:25:02 Government, Private Sector Unprepared for 21st Century Cyber Warfare (lien direct)

U.S. government agencies and businesses are largely unprepared for a major cyber attack from state-sponsored actors, and must prepare now, according to a report by key governmental-focused think tanks.

The post Government, Private Sector Unprepared for 21st Century Cyber Warfare appeared first on The Security Ledger.

-->
Blog.png 2019-02-06 14:26:00 ExileRAT Malware Targets Tibetan Exile Government (lien direct)

Researchers have discovered a new cyber-espionage campaign targeting the organization representing the exiled Tibetan government.

The post ExileRAT Malware Targets Tibetan Exile Government appeared first on The Security Ledger.

-->
Blog.png 2019-02-06 04:24:01 Podcast Episode 132: NERC issues a Big Fine – does it matter? (lien direct)

In this week\'s episode of the podcast (#132): in the wake of news of the biggest fine yet for violations of the NERC Critical Infrastructure Protection (CIP) standard, we talk with Willy Leichter and Saurabh Sharma of the firm Virsec about whether the industry’s main security standard even matters in an age of sophisticated, nation-backed...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/595814213/0/thesecurityledger -->»

Blog.png 2019-02-05 14:35:00 Testimony: There\'s No Internet of Things Risk in Repair (lien direct)

A proposed right to repair law in New Hampshire won\'t make the Internet of Things one iota less secure. It will benefit consumers and the planet by extending the useful life of a wide range of connected devices, while making it easier to keep them secure throughout their useful life.

The post Testimony: There’s No Internet of Things Risk in...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/596570864/0/thesecurityledger -->»

Blog.png 2019-02-04 14:25:02 Russian Cyber Criminal Named as Source of Massive Collection 1 Data Dump (lien direct)

A Russian cyber criminal going by the name of "C0rpz" is believed to be the source of a massive trove of over one billion online credentials known as "Collection 1," the firm Recorded Future reports.

The post Russian Cyber Criminal Named as Source of Massive Collection 1 Data Dump appeared first on The Security Ledger.

-->
Blog.png 2019-02-01 19:36:02 Updated: Secrecy Reigns as NERC Fines Utilities $10M citing Serious Cyber Risks (lien direct)

The North American Electric Reliability Corp. (NERC) imposed its stiffest fine to date for violations of Critical Infrastructure Protection (CIP) regulations, citing scores of violations. But who violated the standards and much of what the agency found remains secret. 

The post Updated: Secrecy Reigns as NERC Fines Utilities $10M citing Serious...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/595177218/0/thesecurityledger -->»

Blog.png 2019-02-01 19:36:02 Secrecy Reigns as NERC Fines Utilities $10M citing Serious Cyber Risks (lien direct)

The North American Electric Reliability Corp. (NERC) imposed its stiffest fine to date for violations of Critical Infrastructure Protection (CIP) regulations, citing scores of violations. But who violated the standards and much of what the agency found remains secret. 

The post Secrecy Reigns as NERC Fines Utilities $10M citing Serious Cyber...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/595177218/0/thesecurityledger -->»

Blog.png 2019-01-31 17:59:01 Four More Collections, 700 Million Stolen Passwords Discovered (lien direct)

Researchers say that four more collections of stolen passwords contain more than 2 billion records and hundreds of millions of unique passwords, according to reports.

The post Four More Collections, 700 Million Stolen Passwords Discovered appeared first on The Security Ledger.

-->
Blog.png 2019-01-29 23:26:03 Podcast Episode 131: suing Yahoo! Executives…and winning (lien direct)

In this week\'s episode (#131): a shareholder lawsuit targeting Yahoo! executives was settled quietly. But it could have big implications for the C-Suite at breached firms. Also: as the US pursues criminal charges against Huawei for corporate espionage, we look at one of the federal government\'s most potent tools to stop the transfer of...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/594686064/0/thesecurityledger -->»

Blog.png 2019-01-29 13:08:01 DoJ Charges Huawei Execs in Broad Indictment Spanning 10 Years of Criminal Activity (lien direct)

The Department of Justice (DoJ) filed broad charges against Chinese telecom giant Huawei Technologies Co. Ltd. and its CFO Wanzhou Meng for allegedly stealing trade secrets from U.S. mobile firm T-Mobile and deceiving U.S. stakeholders about its business activity in Iran, among a number of other fraud and conspiracy activities over a 10-year...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/594764824/0/thesecurityledger -->»

Blog.png 2019-01-28 11:00:04 Tread Lightly with Threat Intel Add-Ons (lien direct)

Like leather upholstery for your new car, add-ons to your threat intelligence service are hard to resist. But Chris Camacho of Flashpoint* says “buyer beware:” threat intel add-ons may be more trouble than they’re worth. If you\'ve ever shopped for a new car, you\'re likely familiar with the dizzying number of add-on...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/594410666/0/thesecurityledger -->»

Blog.png 2019-01-28 11:00:04 Buyer Beware: Not All Threat Intel Add-Ons are Equal (lien direct)

Like leather upholstery for your new car, add-ons to your threat intelligence service are hard to resist. But Chris Camacho of Flashpoint* says “buyer beware:” threat intel add-ons may be more trouble than they’re worth. If you\'ve ever shopped for a new car, you\'re likely familiar with the dizzying number of add-on...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/594410666/0/thesecurityledger -->»

Blog.png 2019-01-25 22:09:02 Facebook opens up on System that \'protects Billions\' (lien direct)

Facebook used a blog post on Friday to describe, in detail, the systems that it uses to secure its vast social network, including custom designed tools and so-called "red team" hacks.

The post Facebook opens up on System that ‘protects Billions’ appeared first on The Security Ledger.

-->
Blog.png 2019-01-24 08:00:01 Report: IoT Still Wildly Insecure as New \'Credential Compromise\' Threat Emerges (lien direct)

The new year isn\'t bringing good news about Internet of Things security, as a new report sheds light on a flaw that allows bad actors to take unauthorized control of applications used by the IoT devices.

The post Report: IoT Still Wildly Insecure as New ‘Credential Compromise’ Threat Emerges appeared first on The Security Ledger.

...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/593866212/0/thesecurityledger -->»

Blog.png 2019-01-22 18:18:05 Podcast Episode 130: Troy Hunt on Collection 1 and Tailit\'s Tale of IoT Security Redemption (lien direct)

In this week\'s episode (#130): we speak with security researcher Troy Hunt, founder of HaveIBeenPwned.com about his latest disclosure: a trove of more than 700 million online account credentials he’s calling “Collection #1.” Also we speak to Martin Hagen of the Norwegian device firm Tailit about how failing a security audit of...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/593528532/0/thesecurityledger -->»

Blog.png 2019-01-22 13:52:02 LinkedIn Says Glitch, Not FSB, to Blame for Russian Job Postings (lien direct)

LinkedIn Wednesday blamed an issue with its job ingestion tool–not Russian hackers or an online scam–as the reason the business social network was erroneously posting jobs located in Russia for a number of U.S.-based companies. The custom software tool that pulls in jobs from third-party websites onto LinkedIn’s site failed to...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/593867780/0/thesecurityledger -->»

Blog.png 2019-01-16 20:41:01 Report: Iranian APT Actors Regroup After Main Security Forum Shuts Down (lien direct)

Iranian state-sponsored hackers are regrouping after the shutdown last year of their main security forum, migrating to other forums and making new connections for potential cyber-response against mounting political pressures from the United States and Europe, according to a new report.

The post Report: Iranian APT Actors Regroup After Main...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/592439062/0/thesecurityledger -->»

Blog.png 2019-01-16 01:32:03 Podcast Episode 129: Repair Eye on the CES Guy and Sensor Insecurity (lien direct)

In this week\'s podcast: For all the great new gadgets unveiled in Las Vegas, how many can be repaired? Kyle Wiens of iFixit joins us to report from the CES show. Also: more and more our physical surroundings are populated by small, wireless sensors. How secure are they from hacking and manipulation? Not very says our second guest, Roi Mit of...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/592283864/0/thesecurityledger -->»

Blog.png 2019-01-11 16:14:02 That Other Moscow: Sketchy LinkedIn Job Posts Mix US, Russian Locales (lien direct)

Bogus LinkedIn job postings for leading US organizations, including the US Army, the State of Florida and defense contractor General Dynamics, are popping up for Russian locales like St. Petersburg and Moscow, the firm Evolver has found. Is it AI-Gone-Wild, or is something more nefarious afoot?  Moscow, on the border between Idaho and Washington...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/591659398/0/thesecurityledger -->»

Blog.png 2019-01-08 13:54:04 Podcast Episode 128: Do Security and Privacy have a Booth at CES? (lien direct)

In this episode of The Security Ledger podcast (#128): you\'re going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure? And do security and privacy have a seat at the table at the world\'s largest electronics event? We sit down with IoT luminary and...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/591108026/0/thesecurityledger -->»

Blog.png 2019-01-08 13:54:04 Podcast Episode 128: CES is cool but is it secure? (lien direct)

In this episode of The Security Ledger podcast (#128): you\'re going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure? And do security and privacy have a seat at the table at the world\'s largest electronics event? We sit down with IoT luminary and...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/591108026/0/thesecurityledger -->»

Blog.png 2019-01-07 17:47:00 More Questions as Expert Recreates Chinese Super Micro Hardware Hack (lien direct)

Though the companies named in a blockbuster Bloomberg story have denied that China hacked into Supermicro hardware that shipped to Amazon, Apple and nearly 30 other firms, a recent demonstration at hacking conference in Germany proves the plausibility of the alleged hack.  

The post More Questions as Expert Recreates Chinese Super Micro Hardware...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/590964640/0/thesecurityledger -->»

Blog.png 2019-01-04 03:09:00 Sensor-y Overload: Cyber Risk and the Merrimack Valley Gas Explosions (lien direct)

Let\'s be clear: the natural gas explosions that rocked the Merrimack Valley north of Boston in September weren\'t the result of a cyber attack. Unfortunately: well known vulnerabilities affecting the security of remote sensors and industrial control system software mean they easily could have been. 

The post Sensor-y Overload: Cyber Risk and the...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/590454606/0/thesecurityledger -->»

Blog.png 2019-01-02 14:47:05 Abine says Blur Password Manager User Information Exposed (lien direct)

Customers who use the Blur secure password manager by Abine may have had sensitive information leaked, according to a statement by Abine, the company that makes the product. 

The post Abine says Blur Password Manager User Information Exposed appeared first on The Security Ledger.

-->
Blog.png 2018-12-31 14:08:02 Podcast Episode 127: Donnie, Talk to China and Other Lessons from 2018 (lien direct)

In this week\'s podcast: as 2018 winds down, we invited David Aitel, the Chief Security Technical Officer at Cyxtera Technologies, to talk about the biggest stories of the year, including the supply chain attack on Super Micro, China\'s continued attacks on western firms, U.S. indictments of Russian and Chinese hackers and what 2019 may have in...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/589920892/0/thesecurityledger -->»

1 2 3 4 5 6 7 8 9

Information mise à jours le: 2019-03-23 12:01:42
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter