The Digital Underground Podcast-logo

The Digital Underground Podcast

Technology News >

More Information

Location:

United States

Twitter:

@threatpost

Language:

English


Episodes

The Threatpost Podcast: Bugcrowd Founder on Profitable Bounty Programs

8/15/2018
More
Bugcrowd has had a busy summer. Recently, the bug bounty company partnered with HP to launch the first-ever bug bounty program for printers, with rewards of up to $10,000 for discovered vulnerabilities. Bugcrowd also recently announced Disclose.io, an open-sourced project to standardize best practices for providing a safe harbor for security researchers within bug bounty and vulnerability disclosure programs (VDPs). Threatpost talked to Casey Ellis, Bugcrowd founder and CTO, about big...

Duration:00:25:31

The Threatpost Podcast: Black Hat USA and DEF CON Wrap

8/13/2018
More
Las Vegas was filled with researchers, executives, and hackers last week for the Black Hat USA and DEF CON 2018 conferences. Among the most interesting topics at the shows included IoTand connected cars, election votinghacks, and a flurry of other news topics and sessions outlining the newest threats, vulnerabilities, and cybersecurity best practices. Threatpost's Lindsey O'Donnell and Tara Seals talk about their favorite parts of the show.

Duration:00:15:59

The Threatpost Podcast: enSilo CEO Talks Biggest Black Hat Trends

8/8/2018
More
Threatpost's Lindsey O'Donnell talks to enSilo CEO Roy Katmor about Black Hat trends to watch out for - from firmware attacks to connected car security.

Duration:00:20:19

The Threatpost Podcast: Black Hat USA 2018 Preview

8/6/2018
More
Threatpost editors Tom Spring, Lindsey O'Donnell and Tara Seals preview Black Hat USA and DEF CON 2018, which both kick off in Las Vegas this week.

Duration:00:15:19

The Threatpost Podcast: Breaking Down the COSCO Ransomware Attack

8/2/2018
More
Threatpost talks to Matt Tyrer with Commvault about the recent COSCO ransomware attack. Tyrer discusses the biggest lessons learned from the incident, COSCO's response, and best practices in preventing ransomware attacks.

Duration:00:19:23

The Threatpost Podcast: Bitcoin Mining on OT Networks

7/31/2018
More
On this week's Threatpost Podcast show, we sit down with Ronen Rabinovich from Cyberbit to discuss bitcoin mining on operational technology and critical infrastructure networks.

Duration:00:18:58

Threatpost News Wrap for July 27

7/27/2018
More
Threatpost's Tom Spring and Lindsey O'Donnell sit down to discuss the biggest news of the week - including COSCO being hit by a ransomware attack, Adobe Flash being discussed by the U.S. government, and more Facebook drama.

Duration:00:19:02

The Threatpost Podcast: How to Secure Industrial Control Systems

7/25/2018
More
Threatpost's Lindsey O'Donnell talks to PAS CEO Eddie Habibi about the cybersecurity risks that large manufacturing companies face today - especially with the emergence of industrial IoT.

Duration:00:21:58

The Threatpost Podcast: The Future of Bug Bounty Programs

6/27/2018
More
On this week's episode of The Threatpost Podcast, editor Lindsey O'Donnell sits down with Marten Mickos, the CEO of popular bug bounty program platform HackerOne. Mickos sounds off on the opportunities - and growing pains - of bug bounty programs.

Duration:00:19:46

Podcast: The Growing Social Media Threat Landscape

6/13/2018
More
Threatpost's Lindsey O'Donnell talks with Zack Allen, ZeroFOX’s manager of threat operations, about the broader social media threats landscape and the growing issue of malicious content being spread across networks like Twitter, Facebook and LinkedIn.

Duration:00:17:39

Threatpost News Wrap Podcast for June 8

6/8/2018
More
Threatpost editors Tom Spring, Tara Seals and Lindsey O’Donnell discuss the week’s information security news, including a slew of IoT device privacy incidents, a critical Adobe Flash vulnerability, and scary new data on the breadth and impact of the VPNFilter malware.

Duration:00:22:03

Podcast: How Cities Can Be Security Smart

5/31/2018
More
The smart city industry is projected to be a 400 billion dollar market by 2020, as municipals look at applications for transportation, waste management, and law enforcement. But with that growth comes privacy issues and security risks, Tenable CTO Renaud Deraison told Threatpost’s Lindsey O’Donnell. Deraison outlines some of the biggest security problems that smart cities face right now – and how city developers can adopt better security hygiene.

Duration:00:20:13

Threatpost News Wrap Podcast for May 18

5/18/2018
More
Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell discuss the week’s information security news, including some interesting new malware, a Linux patch that made waves, social engineering gambits and a major banking theft from the second-largest economy in Latin America.

Duration:00:26:51

Podcast: The Evolution of Deception Technology

5/17/2018
More
Once only seen in the market through the form of honeypots, deception technology is a quickly emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices. Threatpost talks to Tony Cole, CTO of Attivo Networks, about how deception technology has evolved, the challenges behind adoption of this method of cyber defense, and how attackers are learning to adapt.

Duration:00:17:41

A Look Inside: Bug Bounties and Pen Testing

5/3/2018
More
Threatpost's Lindsey O'Donnell talks with Christie Terrill, partner at Bishop Fox, about what kind of companies are looking at bug bounty programs versus conducting penetration testing, what these methods mean for vulnerability disclosures, and the legal nuances and complexities behind bug bounty programs.

Duration:00:20:54

Internet of Threats: Why Manufacturers Struggle To Secure IoT

4/24/2018
More
Threatpost's Lindsey O'Donnell talks to Jeff Wilbur, Director of the Online Trust Alliance, about the challenges that manufacturers face when securing IoT devices.

Duration:00:19:28

Roman Unuchek on Apps Leaking Private Data

4/20/2018
More
Threatpost's Tom Spring talks to Roman Unuchek, senior malware analyst at Kaspersky Lab. Unuchek released his discovery at the RSA Conference this week that millions of apps leak personal identifiable information such as name, age, income and possibly even phone numbers and email addresses.

Duration:00:18:39

Threatpost RSA Conference 2018 Preview

4/16/2018
More
The 2018 RSA Conference kicks off this week in San Francisco. The massive security conference draws more than 50,000 attendees from around the world eager to learn more about the latest threats, vulnerabilities, and security products and tools. This year's conference has more than 650 exhibitors and 550 sessions covering everything from cryptocurrency to the Internet of Things. Threatpost's Tom Spring and Lindsey O'Donnell, who will be covering the conference, talk about what they are most...

Duration:00:13:49

A Mirai Botnet Postscript: Lessons Learned

3/19/2018
More
The fall 2016 Mirai botnet compromised more than 300,000 IoT devices to take down several websites in a massive DDoS attack. After the crippling attack, Flashpoint and Akamai worked together with law enforcement to help unravel the crime scene behind the botnet attack. Threatpost's Tom Spring sits down with Flashpoint's director of security research Allison Nixon, and Akamai's senior engineer Chad Seaman, to discuss how the two worked together and what the industry has learned in the wake...

Duration:00:24:25

FireEye's Marina Krotofil On Triton and ICS Threats

3/12/2018
More
At the Security Analyst Summit this year in Cancun, FireEye's Marina Krotofil talks about the Triton malware, first disclosed in December 2017, that targets industrial control systems. Krotofil discusses with Threatpost's Lindsey O'Donnell about the implications of this malware for the manufacturing market as a whole.

Duration:00:16:55