ПодборкаThe Security Ledger Podcasts
The Security Ledger Podcasts
Claim Ownership

The Security Ledger Podcasts

Автор: The Security Ledger

Подписка оформлена: 177Воспроизведенные: 3,250
поделиться

Описание

Named one of the world's top information security podcasts, The Security Ledger Podcast offers in-depth interviews with the top minds in information (cyber) security. Hosted by Paul Roberts, Editor in Chief of The Security Ledger, each podcast is a conversation about the cyber security stories making headlines and about the most important trends in the information security space including security and the Internet of Things, the latest cyber threats facing organizations and new paradigms for securing data and devices. A must listen if "cyber" is your thing!
203 Episodes
Reverse
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. The post Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesCiting Attacks On Small Utilities, Dragos Launches Community Defense ProgramFBI: Iranian APT Targets Israeli-Made PLCs Used In Critical IndustriesChina Calls Out U.S. For Hacking. The Proof? TBD!
Host Paul Roberts speaks with Jim Broome, the CTO and President of DirectDefense about the evolution of cybersecurity threats and how technologies like AI are reshaping the cybersecurity landscape and the work of defenders and Managed Security Service Providers (MSSPs). The post Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesEpisode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM InsecurityEpisode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation MovementMalicious Python Packages Target Crypto Wallet Recovery Passwords
In this episode of The Security Ledger Podcast (#257) Paul speaks with Dennis Kengo Oka, a senior principal automotive security strategist at the firm Synopsys about the growing cyber risks to automobiles as connected vehicle features proliferate in the absence of strong cybersecurity protections. The post Episode 257: Securing Software on Wheels with Dennis Kengo Oka of Synopsys appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesEpisode 257: Securing Software on Wheels withEpisode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation MovementEpisode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity
Paul speaks with Gary McGraw of the Berryville Institute of Machine Learning (BIML), about the risks facing large language model machine learning and artificial intelligence, and how organizations looking to leverage artificial intelligence and LLMs can insulate themselves from those risks. The post Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesSpotlight Podcast: How AI Is Reshaping The Cyber Threat LandscapeBitCoins To Bombs: North Korea Funds Military With Billions In Stolen CryptocurrencyEpisode 257: Securing Software on Wheels with Dennis Kengo Oka of Synopsys
In this episode of The Security Ledger Podcast (#255) host Paul Roberts interviews Niels Provos of Lacework about his mission to use EDM to teach people about cybersecurity. The post Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesChina Calls Out U.S. For Hacking. The Proof? TBD!Citing Attacks On Small Utilities, Dragos Launches Community Defense ProgramFBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries
Security researcher and IoT hacker Dennis Giese talks about his mission to liberate robot vacuums from the control of their manufacturers, letting owners tinker with their own devices and - importantly - control the data they collect about our most intimate surroundings. The post Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesBlack Hat: Colin O’Flynn On Hacking An Oven To Make It Stop LyingEpisode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoTEpisode 257: Securing Software on Wheels with Dennis Kengo Oka of Synopsys
In this Spotlight Security Ledger podcast, Chris Petersen, the CEO and founder of RADICL, talks about his company's mission to protect small and midsized businesses serving the defense industrial base, which are increasingly in the cross-hairs of sophisticated, nation-state actors. The post Spotlight Podcast: RADICL Is Coming To The Rescue Of Defense SMBs appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesChina Calls Out U.S. For Hacking. The Proof? TBD!Spotlight Podcast: How AI Is Reshaping The Cyber Threat LandscapeCiting Attacks On Small Utilities, Dragos Launches Community Defense Program
Tanya Janca of the group We Hack Purple, talks with Security Ledger host Paul Roberts about the biggest security mistakes that DevSecOps teams make, and application development’s “tragedy of the commons,” as more and more development teams lean on open source code. The post Episode 253: DevSecOps Worst Practices With Tanya Janca of We Hack Purple appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesSickened by Software? Changing The Way We Talk About 0DaysGitGuardian’s HasMySecretLeaked Is HaveIBeenPwned for DevOpsEpisode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement
In this episode of the podcast, host Paul Roberts speaks with Colin O'Flynn, CTO and founder of the firm NewAE about his work to patch shoddy software on his home's electric oven - and the bigger questions about owners rights to fix, tinker with or replace the software that powers their connected stuff. The post Episode 252: Colin O’Flynn On Hacking An Oven To Make It Stop Lying appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesEpisode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation MovementMalicious Python Packages Target Crypto Wallet Recovery PasswordsSpotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape
In this Spotlight podcast interview, David Monnier of Team Cymru talks about the evolution of the threat intelligence into actionable and target specific “threat reconnaissance.” The post Spotlight Podcast: Are you ready for Threat Reconnaissance? appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesEpisode 255: EDM, Meet CDM – Cyber Dance Music with Niels ProvosEpisode 257: Securing Software on Wheels with Dennis Kengo Oka of SynopsysEpisode 257: Securing Software on Wheels with
Host Paul Roberts speaks with Boyd Multerer, the CEO and founder of Kry10, which has made a secure OS for the Internet of Things. The post Episode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesEpisode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation MovementBlack Hat: Colin O’Flynn On Hacking An Oven To Make It Stop LyingScreening Your Supply Chain: How Far Will You Go For Cybersecurity?
In this episode of the podcast, I speak with Window Snyder, the founder and CEO of Thistle Technologies about the (many) security challenges facing Internet of Things (IoT) devices and her idea for making things better: Thistle’s platform for secure development and deployment of IoT devices. The post Episode 250: Window Snyder of Thistle on Making IoT Security Easy appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesEpisode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation MovementEpisode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM InsecurityBlack Hat: Colin O’Flynn On Hacking An Oven To Make It Stop Lying
In this Spotlight episode of the Security Ledger podcast, I interview Richard Bird, the CSO of the firm Traceable AI about the challenge of securing application programming interfaces (APIs), which are increasingly being abused to steal sensitive data. The post Spotlight: Traceable CSO Richard Bird on Securing the API Economy appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesEpisode 250: Window Snyder of Thistle on Making IoT Security EasyEpisode 247: Into the AppSec Trenches with Robinhood CSO Caleb SimaEpisode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT
Paul speaks with Steve Orrin, the Federal CTO at Intel Corp about representing Intel and its technologies to Uncle Sam and the impact of the CHIPS Act a massive new federal investment in semiconductors. The post Episode 249: Intel Federal CTO Steve Orrin on the CHIPS Act and Supply Chain Security appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesThe surveys speak: supply chain threats are freaking people outEpisode 250: Window Snyder of Thistle on Making IoT Security EasyForget the IoT. Meet the IoZ: our Internet of Zombie things
In this Spotlight episode of the Security Ledger podcast, I interview Itsik Kesler, the CTO of the threat intelligence firm Kela about the evolution of threat intelligence and findings from the company’s latest State of Cybercrime Threat Intelligence report. The post Spotlight: Making the Most of Cyber Threat Intelligence with Itsik Kesler of KELA appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesCyberattacks on Industrial Control Systems Jumped in 2022Forget the IoT. Meet the IoZ: our Internet of Zombie thingsIoCs vs. EoCs: What’s the difference and why should you care?
In this episode of the Security Ledger Podcast, Paul speaks with Jill Moné-Corallo, the Director of Product Security Engineering Response at GitHub. Jill talks about her journey from a college stint working at Apple’s Genius bar, to the information security space - first at product security at Apple and now at GitHub, a massive development platform that is increasingly in the crosshairs of sophisticated cyber criminals and nation-state actors. The post Episode 248: GitHub’s Jill Moné-Corallo on Product Security And Supply Chain Threats appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesThe surveys speak: supply chain threats are freaking people outEpisode 250: Window Snyder of Thistle on Making IoT Security EasyResearcher finds malicious packages lurked on npm for months
Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. The post Episode 247: Into the AppSec Trenches with Robinhood CSO Caleb Sima appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesSpotlight: Traceable CSO Richard Bird on Securing the API EconomyEpisode 250: Window Snyder of Thistle on Making IoT Security EasyEpisode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT
I interview Jack Naglieri, CEO of Panther about the failures of the current SIEM technology and the need for what Naglieri terms “detection engineers." The post Spotlight: SIEMs suck. Panther is out to change that.  appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesWhat’s the Future of Detection Teams? Five Predictions for What Lies Ahead Cyberattacks on Industrial Control Systems Jumped in 2022Episode 248: GitHub’s Jill Moné-Corallo on Product Security And Supply Chain Threats
Getting a start-up off the ground isn’t easy in the best of times. Now imagine doing it just as a global pandemic is shutting down society...and the economy. Our guest this week, Josh McCarthy of Revelstoke Security, did it and lived to tell the tale. The post Episode 246: SOARing out of Lockdown with Revelstoke Security appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesEpisode 250: Window Snyder of Thistle on Making IoT Security EasySpotlight: Traceable CSO Richard Bird on Securing the API EconomyEpisode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT
Six decades in, password use has tipped into the absurd, while two-factor authentication is showing its limits. We talk with Matt Salisbury of Honeybadger HQ, which is using AI and machine learning to re-imagine knowledge-based authentication. The post Episode 245: How AI is remaking knowledge-based authentication appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesSpotlight: Traceable CSO Richard Bird on Securing the API EconomyEpisode 250: Window Snyder of Thistle on Making IoT Security EasyEpisode 247: Into the AppSec Trenches with Robinhood CSO Caleb Sima
loading
Комментарии 
Загрузить из Google Play
Загрузить из App Store