What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2022-02-06 16:02:00 Episode 234: Rep. Jim Langevin on Cyber Policy in an Age of Political Polarization (lien direct) In this episode of the podcast (#234) US Representative Jim Langevin (D-RI), joins Paul to talk about the flurry of legislation passed on Capitol Hill in recent months to boost the U.S.'s cyber defenses.
Blog.webp 2022-01-26 13:30:00 Tapping into the Power of the Security Community (lien direct) Massive growth in Zoom's customer base as a result of the COVID 19 pandemic brought new business - but also new challenges and security requirements. Establishing a CISO Council gave those customers a voice and a seat at the table, writes CISO Jason Lee.
Blog.webp 2022-01-19 14:00:00 Spotlight: COVID, Cloud Sovereignty and Other 2022 Trends with DigiCert (lien direct) What does 2022 have in store? Dean Coclin of DigiCert speaks with host Paul Roberts about the trends that will shape the New Year, from cloud sovereignty to the growing reliance on PKI to secure digital identities, DEVOPs and more.
Blog.webp 2022-01-14 13:30:57 Spotlight: ShardSecure on Protecting Data At Rest Without Encryption (lien direct) Host Paul Roberts speaks with Marc Blackmer of ShardSecure about that company's new approach to protecting data at rest, which relies on fragmenting and scattering data to make it impossible to steal.
Blog.webp 2021-12-29 17:52:27 Episode 233: Unpacking Log4Shell\'s Un-coordinated Disclosure Chaos (lien direct) In this episode of the podcast (#233) Mark Stanislav, a Vice President at the firm Gemini, joins Paul to talk about what went wrong with disclosure of Log4Shell, the critical, remote code execution flaw in the Log4j open source library. Mark talks about how the Internet community can come together ahead of the next vulnerability to make sure the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/676472216/0/thesecurityledger -->»Click the icon below to listen. Vulnerability
Blog.webp 2021-12-23 19:19:50 Leonardo DRZ wins first ever TCG CodeGen Developer Challenge (lien direct) President and Chairman of Trusted Computing Group (TCG), Dr. Joerg Borchert, shares the news regarding TCG's first ever CodeGen Developer Challenge.
Blog.webp 2021-12-17 00:02:00 Episode 232: Log4j Won\'t Go Away (And What To Do About It.) (lien direct) In this episode of the podcast (#232), Tomislav Peričin of the firm ReversingLabs joins us to talk about Log4Shell, the vulnerability in the ubiquitous Log4j Apache library. Tomislav tells us why issues related to Log4j won't be going away anytime soon and how organizations must adapt to deal with the risk it poses. The post Episode 232: Log4j...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/675372840/0/thesecurityledger -->»Click the icon below to listen. Vulnerability
Blog.webp 2021-12-10 19:30:07 Episode 231: Solving the US\'s Endemic Cybersecurity Worker Shortage (lien direct) Rodney Petersen, the director of the National Initiative for Cybersecurity Education (NICE) talks about the massive shortage of information security workers at the United States - estimated at more than 400,000 workers.
Blog.webp 2021-12-08 17:50:44 How to Overcome Threat Detection and Response Challenges (lien direct) In this Expert Insight, Jack Naglieri, the founder and CEO of Panther Labs, talks about the many challenges of enterprise-scale threat detection and response. Jack provides some steps organizations can take to prepare themselves for the future. Threat
Blog.webp 2021-12-01 20:40:36 Spotlight: How Secrets Sprawl Undermines Software Supply Chain Security (lien direct) Mackenzie Jackson, the Developer Advocate at GitGuardian joins Paul to discuss how “secrets sprawl” on sites like GitHub threatens software supply chains.
Blog.webp 2021-11-11 17:37:37 Episode 230: Are Vaccine Passports Cyber Secure? (lien direct) In this episode of the podcast (#230) Siddarth Adukia, a regional Director at NCC Group, joins host Paul Roberts to talk about the (cyber) risks and (public health) rewards of vaccine passport systems: how they work, how they can be compromised and what to do about it.
Blog.webp 2021-11-03 13:59:41 Episode 229: BugCrowd\'s Casey Ellis On What\'s Hot In Bug Hunting (lien direct) We talk with Casey Ellis, founder and CTO of BugCrowd about how the market for software bugs has changed since the first bug bounty programs emerged nearly 20 years ago, and what's hot in bug hunting in 2021.
Blog.webp 2021-10-28 21:38:33 Spotlight: Your IoT Risk Is Bigger Than You Think. (And What To Do About It.) (lien direct) In this Spotlight edition of the podcast, we're joined by Curtis Simpson, the Chief Information Security Officer at Armis. Curtis and I discuss the growing cyber risks posed by Internet of Things devices within enterprise networks. IoT and OT (operation technology) deployments are growing and pose challenges to organizations that are still...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/671351780/0/thesecurityledger -->»Click the icon below to listen.
Blog.webp 2021-10-21 13:57:53 Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion (lien direct) Brian Trzupek of DigiCert joins Paul to talk about the findings of a recent State of PKI Automation survey and the challenges of managing fast-growing population of tens of thousands of PKI certificates.
Blog.webp 2021-10-18 20:01:19 (Déjà vu) Episode 228: CISA\'s Eric Goldstein on being Everyone\'s Friend in Cyber (lien direct) Eric Goldstein, Executive Assistant Director for Cybersecurity for the Cybersecurity and Infrastructure Security Agency (CISA), says the agency is all about helping companies and local government to keep hackers at bay. But are organizations ready to ask for help? The post Episode 228: CISA's Eric Goldstein on being Everyone's Friend in Cyber...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/670200030/0/thesecurityledger -->»Click the icon below to listen.
Blog.webp 2021-10-18 20:01:19 Episode 228: CISA\'s Eric Goldstein and the Challenge of Being Everyone\'s Friend in Cyber (lien direct) Eric Goldstein, Executive Assistant Director for Cybersecurity for the Cybersecurity and Infrastructure Security Agency (CISA), says the agency is all about helping companies and local government to keep hackers at bay. But are organizations ready to ask for help? The post Episode 228: CISA's Eric Goldstein and the Challenge of Being...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/670200030/0/thesecurityledger -->»Click the icon below to listen.
Blog.webp 2021-10-13 21:32:23 Spotlight: COVID Broke Security. Can We Fix It In 2022? (lien direct) In this Spotlight Podcast, Pondurance Founder and Chief Customer Officer Ron Pelletier gives us his predictions about the security trends that will shape 2022.
Blog.webp 2021-10-10 14:32:54 Episode 227: What\'s Fueling Cyber Attacks on Agriculture ? (lien direct) In this episode of the podcast (#227) we speak with Allan Liska, the head of the CSIRT at the firm Recorded Future. about the spate of attacks in recent months targeting food processing plants, grain cooperatives and other agriculture sector targets. Allan and I talk about the how these attacks are playing out and why, all of a sudden, the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/669370502/0/thesecurityledger -->»Click the icon below to listen.
Blog.webp 2021-10-07 17:03:08 (Déjà vu) Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison (lien direct) Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment.
Blog.webp 2021-10-07 17:03:08 Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson (lien direct) Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment.
Blog.webp 2021-09-30 20:48:00 Spotlight: When Ransomware Comes Calling (lien direct) With the attention given to the threats posed by ransomware, why do organizations still fall victim to these attacks? Max Henderson, the Manager of Incident Response at Pondurance joins us to talk about what companies get wrong in responding to ransomware and other threats. Ransomware
Blog.webp 2021-09-22 22:28:51 Spotlight: Is There A Cure For InfoSec\'s Headcount Headache? (lien direct) In this Spotlight Podcast, Lyndon Brown, the Chief Strategy Officer at Pondurance joins host Paul Roberts to talk about how changes in both the threat landscape and the workplace are driving demand for managed detection and response (MDR) services, in which companies hire outside security talent to help keep sophisticated cyber adversaries at bay. ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/667329084/0/thesecurityledger -->» Threat
Blog.webp 2021-09-17 16:17:51 Episode 226: The Cyber Consequences Of Our Throw Away Culture (lien direct) We speak with John Shegerian of ERI about his new book: “The Insecurity of Everything” and how our e-waste may be exposing sensitive data to other nations.
Blog.webp 2021-09-08 20:32:50 Spotlight: Securing COVID\'s New Normal with Cathy Spence of Intel (lien direct) What will it mean to secure the “new normal” after the COVID pandemic has receded? In this spotlight edition of the podcast, Cathy Spence, a Senior Principal Engineer at Intel, joins us in The Security Ledger Podcast studios to talk about what that new normal wt ill look like. For Cathy, the future looks a lot like the COVID-influenced...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/665437938/0/thesecurityledger -->»
Blog.webp 2021-09-06 17:31:57 (Déjà vu) Episode 225: Unpacking the Azure CHAOS DB Flaw with Nir Ohfeld of Wiz (lien direct) We're joined by Nir Ohfeld of Wiz. Nir helped discover the recent CHAOS DB flaw in Azure COSMOS DB, the flagship database for Microsoft's Azure cloud platform.
Blog.webp 2021-09-06 17:31:57 Episode 225: Unpacking the Azure CHAOS DB Flaw with Nir Ohrfeld of Wiz (lien direct) We're joined by Nir Ohfeld of Wiz. Nir helped discover the recent CHAOS DB flaw in Azure COSMOS DB, the flagship database for Microsoft's Azure cloud platform.
Blog.webp 2021-09-02 14:04:20 Spotlight: E-Commerce\'s Bot and Mouse Game (lien direct) In this Spotlight podcast we're joined by Benjamin Fabre of DataDome to discuss the evolving risks to organizations as e-commerce shifts from web pages to mobile applications and APIs.
Blog.webp 2021-08-26 02:08:55 Episode 224: Engineering Trust In The Cyber Executive Order (lien direct) In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Thomas Hardjono and Henk Birkholz join us to talk about President Biden's Cyber Executive Order and how the EO's call for increasing trust in federal IT systems is creating demand for TCG technologies The post Episode 224: Engineering Trust In The Cyber Executive...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/663862126/0/thesecurityledger -->»
Blog.webp 2021-08-21 02:51:00 Episode 223: CISA Looks To Erase The Security Poverty Line (lien direct) In this week's episode of the podcast (#223), we are joined by Josh Corman and Lisa Young of the COVID task force at CISA to talk about the agency's work to improve the security of critical sectors of the U.S. economy. Job #1: erase the so-called security “poverty line” that keeps small, poorly resourced firms from obtaining the skills and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/663245032/0/thesecurityledger -->»
Blog.webp 2021-08-17 14:43:44 Connecting The Dots: The Kremlin\'s Links to Cyber Crime (lien direct) The question of whether or not Russia has been involved in ongoing cybercrime is on the minds of many. A new report by Analyst1 offers new intelligence on the matter.
Blog.webp 2021-08-12 18:17:10 Episode 222: US Rep. Himes on Congress\'s About-face on Cybersecurity (lien direct) In this week's podcast, we speak with Congressman Jim Himes (D-CT) about Congress's sudden focus on cybersecurity - an about face that Rep. Himes says was encouraged by the devastating Colonial Pipeline hack. ★★★★
Blog.webp 2021-08-08 20:26:12 DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk (lien direct) A demonstration at DEF CON of glaring flaws in software by agricultural equipment giants John Deere and Case IH raise the specter of remote, software-based attacks that could cripple farms and impact US food production.
Blog.webp 2021-08-05 01:50:05 Spotlight: Securing the Great Resignation with Code 42 (lien direct) Mark Wojtasiak, the Vice President of Security Industry research at Code42 joins us to talk about how companies can handle the security risks that accompany the COVID-inspired “great resignation” in corporate America.
Blog.webp 2021-07-30 17:30:41 Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee (lien direct) With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee. Hack
Blog.webp 2021-07-29 17:55:16 As Mobile Fraud Rises, The Password Persists (lien direct) A new study released by Incognia that measures user friction in mobile financial apps yields important results about the fate of the password.
Blog.webp 2021-07-27 13:21:23 Spotting Hackers at the Pace of XDR – From Alerts to Incidents (lien direct) Extended Detection and Response (XDR) technology is gaining traction within enterprises. But how can organizations handle the increased volume of alerts XDR systems produce? Samuel Jones, of cyber AI firm Stellar Cyber, discusses how embracing incident-based systems can reduce the analyst burden of XDR technology, enabling companies to spot and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/659870274/0/thesecurityledger -->»
Blog.webp 2021-07-23 22:03:21 Episode 221: Biden Unmasked APT 40. But Does It Matter? (lien direct) Andrew Sellers, the Chief Technology Officer at QOMPLX joins us to unpack the revelations this week about APT 40, the Chinese group that the US has accused of a string of attacks aimed at stealing sensitive trade secrets. Also: is Salesforce the next SolarWinds Industrial APT 40
Blog.webp 2021-07-15 17:22:24 Encore Podcast: Is Autonomous Driving Heading for a Crash? (lien direct) Elon Musk is a big fan of his company's Fully Self Driving software. But is it safe? In this encore edition of the podcast from 2018, we speak with Beau Woods of The Atlantic Council about the risks of embracing autonomous driving technology too quickly.
Blog.webp 2021-07-11 19:19:00 At Pride Summit: A Warning On Cyber Literacy (lien direct) Poor cyber literacy is at the root of many of the cybersecurity problems plaguing the U.S. economy, according to Dr. Alissa Abdullah, Deputy CSO at MasterCard.
Blog.webp 2021-07-08 22:00:04 Episode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoT (lien direct) In this episode of the podcast, sponsored by Trusted Computing Group we dig deep on this week's ransomware attack on the Kaseya IT management software with Adam Meyers of CrowdStrike and Frank Breedijk of the Dutch Institute of Vulnerability Disclosure. Also: Tom Laffey, a product security strategist at Aruba, a Hewlett Packard Enterprise firm,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/657001370/0/thesecurityledger -->» Ransomware Vulnerability
Blog.webp 2021-06-30 13:20:00 Episode 219: LGBTQ+Cyber – A Pride Month Conversation On Being Queer In Infosec (lien direct) In this week's episode of the podcast (#219) we speak with four cybersecurity professionals about what it means to be Queer in the industry: their various paths to the information security community, finding support among their peers and the work still left to do to make information security inclusive. All in honor of Pride Month, 2021. The post ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/656115286/0/thesecurityledger -->»
Blog.webp 2021-06-24 20:45:19 Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture (lien direct) Forget about Colonial Pipeline and JBS. A coordinated cyber attack on U.S. agriculture could, in short order, lead to foot shortages and hunger in the U.S. and abroad. And history has shown us that when food gets scarce, things get ugly - fast. How likely is such an attack? More likely than you might think, says Rob Wood of NCC Group, our guest on...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/655486438/0/thesecurityledger -->» Guideline
Blog.webp 2021-06-17 17:44:03 Episode 217: What Fighting Pirates Teaches Us About Ransomware (lien direct) Criminal gangs swoop in on unsuspecting merchants to seize their goods. Behind the scenes, rival nations turn a blind eye or offer them safe harbor, in exchange for cooperation. Sound familiar? It should. Ransomware ★★★
Blog.webp 2021-06-10 14:26:25 Episode 216: Signed, Sealed and Delivered: The Future of Supply Chain Security (lien direct) In this episode of the podcast (#216) we talk with Brian Trzupek, Digicert's Vice President of Product, about the growing urgency of securing software supply chains, and how digital code signing can help prevent compromises like the recent hack of the firm SolarWinds. The post Episode 216: Signed, Sealed and Delivered: The Future of Supply Chain...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/654400338/0/thesecurityledger -->» Hack
Blog.webp 2021-06-07 15:01:20 What SolarWinds Tells Us About Securing the Software Development Supply Chain (lien direct) The recent SolarWinds attack highlights an Achilles heel for enterprises: software updates for critical enterprise applications. Digital signing of code is one solution, but organizations need to modernize their code signing processes to prioritize security and integrity and align with DevOps best practices, writes Brian Trzupek the Senior Vice...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/654147256/0/thesecurityledger -->»
Blog.webp 2021-06-01 20:57:46 Episode 215-2: Leave the Gun, Take the McFlurry (lien direct) In part II of our interview with Jeremy O'Sullivan of the IoT startup Kytch. We hear about how what Kytch revealed about Taylor's soft ice cream hardware put him at odds with the company and its long-time partner: McDonald's.
Blog.webp 2021-05-27 21:47:08 The SOC Hop Needs to be a Relic of the Past (lien direct) Overworked, understaffed teams constantly jumping from one fire to the next - exhausted and reactive to events and alerts. The “SOC hop” is not sustainable.
Blog.webp 2021-05-25 21:47:05 Episode 215-1: Jeremy O\'Sullivan of Kytch On The Tech Serving McDonald\'s Ice Cream Monopoly (lien direct) Jeremy O'Sullivan, co-founder of the IoT analytics company, Kytch brings us the cautionary tale of his company's travails with the commercial ice cream machine manufacturer, Taylor, whose equipment is used by the likes of Burger King and McDonalds. The post Episode 215-1: Jeremy O'Sullivan of Kytch On The Tech Serving McDonald's Ice Cream...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/653240058/0/thesecurityledger -->»
Blog.webp 2021-05-15 20:33:28 Episode 214: Darkside Down: What The Colonial Attack Means For The Future of Ransomware (lien direct) Intel 471 CISO Brandon Hoffman joins us to to discuss Darkside, the ransomware group that attacked the Colonial Pipeline, why the crew may have bitten off more than it can chew and what the attack says about the state of America's Critical Infrastructure. The post Episode 214: Darkside Down: What The Colonial Attack Means For The Future of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/652414106/0/thesecurityledger -->» Ransomware
Blog.webp 2021-05-14 01:52:21 Want To Prevent Another SolarWinds? Start With Developers (lien direct) An all-star roundtable of security experts tackles the question of how to prevent another SolarWinds.
Last update at: 2024-03-29 06:09:41
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter