What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2021-05-04 12:30:00 Seeds of Destruction: Cyber Risk Is Growing in Agriculture (lien direct) In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. The post Seeds of Destruction: Cyber Risk Is Growing in...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/650804680/0/thesecurityledger -->»
Blog.webp 2021-04-27 22:24:46 Episode 212: China\'s Stolen Data Economy (And Why We Should Care) (lien direct) In this episode of the podcast (#212), Brandon Hoffman, the CISO of Intel 471 joins us to discuss that company's latest report that looks at China's diversified marketplace for stolen data and stolen identities.
Blog.webp 2021-04-22 15:27:57 Deere John: Researcher Warns Ag Giant\'s Site Provides a Map to Customers, Equipment (lien direct) Software vulnerabilities in web sites operated by John Deere could allow a remote attacker to harvest information on the company's customers including their names, physical addresses and the equipment they own. The revelation suggests the U.S. agriculture sector is woefully unprepared for disruptive cyber attacks, experts warn. The post Deere...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/649793790/0/thesecurityledger -->»
Blog.webp 2021-04-22 14:21:46 Can Blockchain Solve Data\'s Integrity Problem? (lien direct) The rapid digitalization and automation of business processes makes data integrity critical, as low-quality data risks infecting automated business decision process. Authors Dan Geer and T. Mark Morley suggest that blockchain may offer one solution to the data integrity problem. The post Can Blockchain Solve Data's Integrity Problem? appeared...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/649789288/0/thesecurityledger -->»
Blog.webp 2021-04-16 16:36:32 Episode 211: Scrapin\' ain\'t Hackin\'. Or is it? (lien direct) Is scraping the same as hacking or just an example of “zealous” use of a social media platform? And if it isn't considered hacking…should it be? As more and more online platforms open their doors to API-based access, do we need more rules and oversight of how APIs are used to prevent wanton abuse? The post Episode 211: Scrapin' ain't...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/649254528/0/thesecurityledger -->»
Blog.webp 2021-04-08 21:36:32 Episode 210: Moving The Goal Posts On Vendor Transparency: A Conversation With Intel\'s Suzy Greenberg (lien direct) In this episode of the podcast, Paul speaks with Intel Vice President Suzy Greenberg about a new survey by the Poneman Institute that shows how customers' expectations are changing when it comes to vendor transparency about software vulnerabilities. The post Episode 210: Moving The Goal Posts On Vendor Transparency: A Conversation With...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/648714610/0/thesecurityledger -->»
Blog.webp 2021-04-02 16:39:01 Episode 209: Fortinet\'s Renee Tarun on Scaling InfoSec To Meet Tomorrow\'s Challenges (lien direct) The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast's Paul Roberts.
Blog.webp 2021-03-30 13:17:49 Critical Flaw Found In Widely Used Netmask Open Source Module (lien direct) An IP address parsing flaw in the netmask NPM module affects hundreds of thousands of applications that rely on it. But that may be just the tip of the iceberg, researchers warn. ★★
Blog.webp 2021-03-26 16:58:44 Episode 208: Getting Serious about Hardware Supply Chains with Goldman Sachs\' Michael Mattioli (lien direct) In this week's Security Ledger Podcast, sponsored by Trusted Computing Group, we're talking about securing the hardware supply chain. We're joined by Michael Mattioli, a Vice President at Goldman Sachs who heads up that organization's hardware supply chain security program. When we think about cyber threats to the hardware supply chain, we...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/647662832/0/thesecurityledger -->»
Blog.webp 2021-03-19 13:54:54 (Déjà vu) Episode 207: Sarah Tatsis of BlackBerry on finding and Keeping Women in Cyber (lien direct) In this week's episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the information security field. The post Episode 207: Sarah Tatsis of BlackBerry on finding and Keeping Women in Cyber...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/647113126/0/thesecurityledger -->»
Blog.webp 2021-03-19 13:54:54 Episode 207: Sara Tatsis of Blackberry on finding and Keeping Women in Cyber (lien direct) In this week's episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the information security field. The post Episode 207: Sara Tatsis of Blackberry on finding and Keeping Women in Cyber...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/647113126/0/thesecurityledger -->»
Blog.webp 2021-03-12 16:58:39 Encore Edition: Veracode CEO Sam King on Infosec\'s Leaky Talent Pipeline (lien direct) Women are more than 50% of the population, but barely 20% of the information security workforce. Why? In this encore podcast in honor of Women's History Month, we revisit a 2019 interview with Veracode CEO Sam King to talk about cybersecurity's leaky talent pipeline. The post Encore Edition: Veracode CEO Sam King on Infosec's Leaky Talent...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/646418110/0/thesecurityledger -->»
Blog.webp 2021-03-11 14:00:00 Futility or Fruition?Rethinking Common Approaches To Cybersecurity (lien direct) The current approaches most organizations take towards security are not good enough, writes Albert Zhichun Li, the Chief Security Scientist at Stellar Cyber. Something has to change.
Blog.webp 2021-03-07 17:26:09 Episode 206: What Might A Federal Data Privacy Law Mean In the US? (lien direct) In this episode of the podcast (#206): with movement towards passage of a federal data privacy law stronger than ever, we invite two experts in to the Security Ledger studio to talk about what that might mean for U.S. residents and businesses. Data theft and misuse has been an acute problem in the United States for years. And, despite the passage...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/645899254/0/thesecurityledger -->»
Blog.webp 2021-02-26 19:44:55 Episode 205 – Google\'s Camille Stewart: InfoSec\'s Lack of Diversity is a Cyber Risk (lien direct) In this interview, Camille Stewart, Google's Head of Security Policy for Google Play and Android explains how understanding how systemic racism influences cyber security is integral to protecting the American people and defending the country from cyber adversaries. The post Episode 205 – Google's Camille Stewart: InfoSec's Lack of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/645206322/0/thesecurityledger -->»
Blog.webp 2021-02-22 14:06:44 Exclusive: Flaws in Zoom\'s Keybase App Kept Chat Images From Being Deleted (lien direct) A serious flaw in Zoom's Keybase secure chat application left copies of images contained in secure communications on Keybase users' computers after they were supposedly deleted.
Blog.webp 2021-02-18 17:21:06 Episode 204: Josh Corman of CISA on securing the Vaccine Supply Chain (lien direct) Joshua Corman, the Chief Strategist for Healthcare and COVID on CISA's COVID Task Force, joins us to talk about the myriad of cyber threats facing healthcare and the vaccine distribution system and how the federal government is working to counter them. The post Episode 204: Josh Corman of CISA on securing the Vaccine Supply Chain appeared first...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/644621222/0/thesecurityledger -->»
Blog.webp 2021-02-15 17:33:34 Episode 203: Don\'t Hack The Water and Black Girls Hack Founder Tennisha Martin (lien direct) In this episode of the Security Ledger Podcast (#203) we talk about the apparent hack of a water treatment plant in Oldsmar Florida with Frank Downs of the firm BlueVoyant. In our second segment: is infosec's lack of diversity a bug or a feature? Tennisha Martin of Black Girls Hack joins us to talk about the many obstacles that black women face...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/644380242/0/thesecurityledger -->» Hack
Blog.webp 2021-02-05 19:32:27 Episode 202: The Byte Stops Here – Biden\'s Cyber Agenda (lien direct) Even before Solar Storm, Joe Biden had made it clear that a cyber security reset was needed. But what will that reset look like? To understand a bit better what might be in store in the months ahead we devoted this episode of the podcast to interviewing three experts on federal IT security and cyber defense. The post Episode 202: The Byte Stops...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/643530810/0/thesecurityledger -->»
Blog.webp 2021-01-29 16:46:52 Episode 201: Bug Hunting with Sick Codes (lien direct) The work of vulnerability research has changed a lot in the last two decades. In this episode, Security Ledger Podcast host Paul Roberts chats with the independent researcher known as “Sick Codes” about the growing risk of open source supply chain hacks, his method for bug hunting and what projects are in the pipeline for 2021. The post ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/643019766/0/thesecurityledger -->» Vulnerability
Blog.webp 2021-01-22 18:03:33 Episode 200: Sakura Samurai Wants To Make Hacking Groups Cool Again. And: Automating Our Way Out of PKI Chaos (lien direct) In this episode of the podcast (#200), sponsored by Digicert: John Jackson, founder of the group Sakura Samurai talks to us about his quest to make hacking groups cool again. Also: we talk with Avesta Hojjati of the firm Digicert about the challenge of managing a growing population of digital certificates and how automation may be an answer. The...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/642266781/0/thesecurityledger -->»
Blog.webp 2021-01-11 18:38:23 Researchers Test UN\'s Cybersecurity, Find Data on 100k (lien direct) Independent security researchers testing the security of the United Nations were able to compromise public-facing servers and a cloud-based development account for the U.N. and lift data on more than 100,000 staff and employees, according to a report released Monday. The post Researchers Test UN's Cybersecurity, Find Data on 100k appeared first...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/641403822/0/thesecurityledger -->»
Blog.webp 2021-01-08 17:13:04 Episode 199 COVID\'s Other Legacy: Data Theft and Enterprise Insecurity (lien direct) In this episode of the podcast (#199), sponsored by LastPass, we talk with Sareth Ben of Securonix about how massive layoffs that have resulted from the COVID pandemic put organizations at far greater risk of data theft. In our second segment, we're joined by Barry McMahon, a Senior Global Product Marketing Manager at LogMeIn, to talk about data...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/641211904/0/thesecurityledger -->» LastPass
Blog.webp 2020-12-31 16:07:00 Episode 198: Must Hear Interviews from 2020 (lien direct) Trying times have a way of peeling back the curtains and seeing our world with new eyes. We The post Episode 198: Must Hear Interviews from 2020
Blog.webp 2020-12-28 12:59:42 (Déjà vu) Update: Neopets Is Still A Thing And Its Exposing Sensitive Data (lien direct) Neopets, the virtual pets website has exposed a wide range of sensitive data online including information that might be used to identify site users, security researchers report. The post Update: Neopets Is Still A Thing And Its Exposing Sensitive Data
Blog.webp 2020-12-28 12:59:42 (Déjà vu) Neopets Is Still A Thing And Its Exposing Sensitive Data (lien direct) Neopets, the virtual pets website has exposed a wide range of sensitive data online including information that might be used to identify site users, security researchers report. The post Neopets Is Still A Thing And Its Exposing Sensitive Data
Blog.webp 2020-12-22 20:30:35 (Déjà vu) Update: DHS Looking Into Cyber Risk from TCL Smart TVs (lien direct) The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The post Update: DHS Looking Into Cyber Risk from TCL Smart TVs
Blog.webp 2020-12-22 20:30:35 (Déjà vu) DHS Looking Into Cyber Risk from TCL Smart TVs (lien direct) The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that the devices may give the company "back door" access to deployed sets. The post DHS Looking Into Cyber Risk from TCL Smart TVs
Blog.webp 2020-12-18 17:55:57 Episode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware! (lien direct) In this podcast, sponsored by LastPass, former U.S. CISO Greg Touhill joins us to talk about news of a vast hack of U.S. government networks, which he calls a "five alarm fire" reportedly set by Russia. The post Episode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware! Hack LastPass
Blog.webp 2020-12-10 02:03:00 Episode 196: Building the Case Against Sandworm with Cisco Talos (lien direct) isco's Matt Olney, the Director of Talos Threat Intelligence and Interdiction and Craig Williams, the Talos Director of Outreach about the case against The post Episode 196: Building the Case Against Sandworm with Cisco Talos Threat
Blog.webp 2020-12-03 03:52:50 Episode 195: Cyber Monday Super Deals Carry Cyber Risk (lien direct) While many organizations think the notion of keyboards, monitors and other hardware "spying" on them as the stuff of "James Bond" movies, Yossi Appleboum of Sepio Systems says that the threat is real - and much more common that either companies or consumers are aware. The post Episode 195: Cyber Monday Super Deals Carry Cyber Risk appeared first...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/639525626/0/thesecurityledger -->» Threat
Blog.webp 2020-11-30 18:56:00 Containers Complicate Compliance (And What To Do About It) (lien direct) If you work within the security industry, compliance is seen almost as a dirty word. You have likely run into situations like that which @Nemesis09 describes below. Here, we see it's all too common for organizations to treat testing compliance as a checkbox exercise and to thereby view compliance in a way that goes against its entire purpose....Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/639430269/0/thesecurityledger -->»
Blog.webp 2020-11-25 03:31:03 Exploitable Flaw in NPM Private IP App Lurks Everywhere, Anywhere (lien direct) A serious security flaw in a commonly used npm security module, private-ip, may affect hundreds of thousands of private and public applications. The post Exploitable Flaw in NPM Private IP App Lurks Everywhere, Anywhere
Blog.webp 2020-11-20 17:09:29 TV Maker TCL Denies Back Door, Promises Better Process (lien direct) Chinese electronics giant TCL has acknowledged security holes in some models of its smart television sets, but denies that it maintains a secret "back door" that gives it control over deployed TVs. The post TV Maker TCL Denies Back Door, Promises Better Process
Blog.webp 2020-11-17 22:34:59 Episode 194: What Happened To All The Election Hacks? (lien direct) Cyber attacks meant to disrupt the 2020 presidential election in the US were a foregone conclusion. But two weeks and more than 140 million votes later, predictions of cyber attacks on the U.S. presidential election have fallen flat. What happened? The post Episode 194: What Happened To All The Election Hacks?
Blog.webp 2020-11-12 14:20:03 Security Holes Opened Back Door To TCL Android Smart TVs (lien direct) A report by independent researchers warns that TCL brand Android smart TVs contained serious and exploitable security holes. It also raises questions about the China-based electronics firm's ability to remotely access control deployed devices. The post Security Holes Opened Back Door To TCL Android Smart TVs
Blog.webp 2020-11-05 03:12:38 Episode 193: Repair, Cyber and Your Car with Assaf Harel of Karamba Security (lien direct) Assaf Harel of the firm Karamba Security joins us in the Security Ledger studio to discuss connected car security and the right to repair. The post Episode 193: Repair, Cyber and Your Car with Assaf Harel of Karamba Security
Blog.webp 2020-10-28 15:23:35 Episode 192: It\'s Showtime! Are Local Governments Ready To Turn Back Election Hacks? (lien direct) Election day is almost here. After years of warnings, are state and local governments ready for what Russia, Iran or any number of ransomware gangs have in store for them? The post Episode 192: It’s Showtime! Are Local Governments Ready To Turn Back Election Hacks? Ransomware
Blog.webp 2020-10-22 01:20:24 Episode 191: Shifting Compliance Left with Galen Emery of Chef (lien direct) Galen Emery of Chef comes into the Security Ledger studios to talk about how security and compliance are "shifting left" with DEVSECOPS. The post Episode 191: Shifting Compliance Left with Galen Emery of Chef
Blog.webp 2020-10-11 18:30:06 Episode 190: 20 Years, 300 CVEs. Also: COVID\'s Lasting Security Lessons (lien direct) In this episode of the podcast (#190), sponsored by LastPass, Larry Cashdollar of Akamai joins us to talk about how finding his first CVE vulnerability, more than 20 years ago, nearly got him fired. Also: Katie Petrillo of LastPass joins us to talk about how some of the security adjustments we've made for COVID might not go away any time soon. ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/636683234/0/thesecurityledger -->» LastPass
Blog.webp 2020-10-08 02:04:17 Opinion: Staying Secure Through 5G Migration (lien direct) Communications service providers (CSPs) are on the cusp of a new era of opportunity. After several years of hype, 5G is growing fast-and introducing a need for new solutions to maintain security and compliance. The global 5G services market is expected to grow at a compound annual growth rate of 43.9% from 2021 to 2027 to reach USD 414.5 billion...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/636539087/0/thesecurityledger -->»
Blog.webp 2020-10-07 20:56:56 Report: Critical Infrastructure Cyber Attacks A Global Crisis (lien direct) The systems we rely on to keep the lights on, heat our homes, make our medicines and move our goods are increasingly connecting to the Internet, and increasingly vulnerable to devastating cyber attacks in what a new report calls a looming "global crisis." The post Report: Critical Infrastructure Cyber Attacks A Global Crisis
Blog.webp 2020-10-02 18:44:48 Security Ledger Turns 8! (lien direct) Today marks eight years since the first Security Ledger post went live back on October 2, 2012. We're celebrating with a new look and exciting plans for 2021! The post Security Ledger Turns 8!
Blog.webp 2020-09-30 17:30:22 Podcast Episode 189: AppSec for Pandemic Times, A Conversation with GitLab Security VP Jonathan Hunt (lien direct) The pandemic isn't the only thing shaking up development organizations. Application security is a top concern and security work is "shifting left" and becoming more intertwined with development. In this podcast, Security Ledger Editor in Chief Paul Roberts talks about it with Jonathan Hunt, Vice President of Security at the firm GitLab. The post ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/636155572/0/thesecurityledger -->»
Blog.webp 2020-09-24 01:29:43 Public Sector Mega-Vendor Tyler Technologies Says It Was Hacked (lien direct) Tyler Technologies, the U.S.’s largest provider of software and services to the public sector said on Wednesday that it was hacked by unknown assailants, who gained “unauthorized access” to the company’s IT and phone systems. Tyler, which sells software that supports a wide range of public sector functions such as...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/635904228/0/thesecurityledger -->»
Blog.webp 2020-09-18 16:45:00 Spotlight Podcast: Intel\'s Matt Areno – Supply Chain is the New Security Battlefield (lien direct) In this Spotlight Podcast, sponsored by The Trusted Computing Group, we speak with Matthew Areno, a Principal Engineer in the Intel Product Assurance and Security (IPAS) group about the fast-changing landscape of cyber threats including attacks on hardware and software supply chains. The post Spotlight Podcast: Intel’s Matt Areno –...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/635710923/0/thesecurityledger -->»
Blog.webp 2020-09-14 01:33:04 As Election Day Nears, Kremlin Leans on Hackers-for-Hire (lien direct) The DOJ indicted a Russian national for his role in a campaign to undermine the U.S. election...and mine some cryptocurrency along the way. It is the latest evidence of Russia's willingness to use cyber criminals to conduct state-sponsored espionage. The post As Election Day Nears, Kremlin Leans on Hackers-for-Hire
Blog.webp 2020-09-10 17:30:29 PKI Points the Way for Identity and Authentication in IoT (lien direct) Modern enterprise networks are populated by both people and, increasingly, "things." But securing the growing population of Internet of Things devices presents unique challenges. In this thought leadership article, Brian Trzupek, the Senior Vice President of Emerging Markets at DigiCert discusses what is needed for effective IoT security. The post ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/635363348/0/thesecurityledger -->» Guideline
Blog.webp 2020-09-02 17:28:17 (Déjà vu) Spotlight Podcast: Dr. Zulfikar Ramzan on RSA\'s Next Act: Security Start-Up (lien direct) Thirty eight years after it was founded, RSA Security is embarking on what may be its most challenging journey yet: cybersecurity startup. In this Spotlight podcast we're joined by RSA CTO Zulfikar Ramzan about the company's path forward as an independent company. The post Spotlight Podcast: Dr. Zulfikar Ramzan on RSA’s Next Act: Security...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/634956950/0/thesecurityledger -->»
Blog.webp 2020-09-02 17:28:17 Spotlight Podcast: CTO Zulfikar Ramzan on RSA\'s Next Act: Security Start-Up (lien direct) Thirty eight years after it was founded, RSA Security is embarking on what may be its most challenging journey yet: cybersecurity startup. In this Spotlight podcast we're joined by RSA CTO Zulfikar Ramzan about the company's path forward as an independent company. The post Spotlight Podcast: CTO Zulfikar Ramzan on RSA’s Next Act: Security...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/634956950/0/thesecurityledger -->»
Last update at: 2024-03-28 10:11:44
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter