The Security Ledger Podcasts-logo

The Security Ledger Podcasts

Technology Podcasts >

More Information

Location:

United States

Language:

English

Contact:

6178170198


Episodes

Episode 97: On eve of GDPR frightening lack of data privacy, security in US

5/21/2018
More
In this episode, #97: we talk with Robert Xiao, the Carnegie Mellon researcher who investigated Location Smart, a free web application that allowed anyone track the location of a mobile phone using just the phone’s number. Also: we welcome University of Washington Researcher Kate Starbird back into the SL studio to talk about her latest research: examining the web of bloggers, news web sites, conspiracy theorists and government actors targeting human rights workers in Syria. Data security in...

Duration:00:43:26

Episode 96: State Elections Officials on Front Line against Russian Hackers

5/14/2018
More
In this episode of The Security Ledger Podcast (#96): with primary elections taking place in states across the United States in the coming weeks, we talk to John Dickson about how state elections offices have become the front line in a pitched battle with state-sponsored hackers – with the fate of a 240 year democracy hanging in the balance. Also: we talk about the looming threat posed by so-called “deep fake” videos that use computer manipulation to make famous celebrities appear to say...

Duration:00:41:18

Episode 95: Copyright Insanity sends E-Waste Recycler to Prison and IoT Inspector finds Insecure Things

5/7/2018
More
In this episode of The Security Ledger podcast (#95): has the Digital Millennium Copyright Act taken us over a bridge too far? We talk with two experts about the case of Eric Lundgren, a celebrated e-waste recycler who has been sentenced to 15 months in prison and fined $50,000 for DMCA violations. Also: we speak with one of the Ivy League students who designed IoT Inspector, software that can analyze your home network for vulnerable devices. Is Eric Lundgren’s Case the Bridge Too Far for...

Duration:00:34:37

Spotlight: Deepika Chauhan of Digicert on the Challenges of Securing the Internet of Things

5/2/2018
More
There’s an epidemic of insecure Internet of Things devices. But why? And what is the shortest path to ending that epidemic? In this Spotlight Edition of The Security Ledger Podcast, we speak with Deepika Chauhan, the Executive Vice President of Emerging Markets at DigiCert. Her job: forging new paths for the use of public key encryption to secure Internet of Things ecosystems. The Internet of Things is poised for massive growth in the years ahead, as billions of new, connected devices come...

Duration:00:25:57

Podcast Episode 94: Black Report takes Hacker View and Securing the Open Source Supply Chain

4/30/2018
More
In this episode of the Security Ledger Podcast we do a deep dive into the recent Black Report by NUIX – which flips the script by asking hackers and pen testers their opinions about how they hack firms and what defensive strategies and technologies work best at stopping them. Also: Rami Sass the CEO and co-founder of this week’s sponsor, WhiteSource Software, joins us in the Security Ledger studios to talk about how a white knuckle audit of his company’s open source dependencies eight...

Duration:00:35:55

Spotlight: Philippe Courtot, CEO of Qualys: We Need to Change How We Do Security

4/26/2018
More
In this Spotlight Podcast*, Philippe Courtot of the firm Qualys discusses being an early innovator in the software as a service space and how the market for cloud based security services has evolved since he launched his firm, Qualys, almost two decades ago. If you walked the trade show floor at last week’s RSA Conference as I did, it is easy to forget that cloud-based security used to be considered so far out as to occupy the realm of science fiction. As recently as 10 years ago, many...

Duration:00:24:58

Podcast Episode 93: Talking GDPR with Cisco’s Chief Privacy Officer and RSA 2018 Recap

4/23/2018
More
This episode of The Security Ledger Podcast (#93) was sponsored by Keysight Technologies, a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world. Check them out at Keysight.com. In this episode: with the May 25th go-live date of the EU General Data Privacy Regulation (GDPR) just around the corner, we talk with Cisco Chief Privacy Officer Michelle Dennedy about her expectations for the May 25th deadline...

Duration:00:33:07

Podcast Episode 92: Uncle Sam Ices Tech Acquisitions and RSA Conference 2018

4/16/2018
More
In this episode of The Security Ledger Podcast (#92): Adam Isles of The Chertoff Group joins us to talk about the growing specter of software supply chain risk the recent trend of the US Government shooting down major tech acquisitions by Chinese firms. Also: with the RSA Conference * kicking off in San Francisco, we hear from two experts from LookingGlass, this week’s podcast sponsor, about how to make sense of the hot threat intelligence space. Uncle Sam is icing Tech M&A. Why? What do...

Duration:00:31:44

Podcast Episode 91: Fighting Fake News with or without Facebook and whats with all the Cryptojacking?

4/9/2018
More
In this episode of The Security Ledger Podcast (#91): with Facebook CEO Mark Zuckerberg saying he will testify before Congress, we ask Harvard’s Matthew Baum about what Congressmen and women should ask him and how to best fight fake news. Also: Adam Kujawa of Malwarebytes updates us on that company’s latest quarterly threat report and helps us answer the question “what’s with all the cryptomining”? Shadowboxing fake news Facebook CEO Mark Zuckerberg has promised to testify before the US...

Duration:00:24:05

Podcast Episode 90: WannaCry zombie haunts Boeing, UL tests for cyber security and Harvard war games election hacking

4/2/2018
More
In this week’s podcast, Episode #90: has the WannaCry ransomware returned from the dead? We talk with an expert from Juniper Networks about what might be behind the outbreak at Boeing. Also: Underwriters Lab and Johnson Controls join us on the podcast to talk about a recent milestone: UL’s award of the first ever Level 3 certificate for cyber security. And we speak with one of the organizers of one of an election security table top exercise last week at Harvard’s Kennedy School. WannaCry:...

Duration:00:48:32

Podcast Beta Deaths: are we driving too fast towards Autonomous Vehicles?

3/26/2018
More
In this week’s Security Ledger Podcast (Episode #89) we talk with Beau Woods of The Atlantic Council and the advocacy group I Am The Cavalry about the death of 49-year-old Elaine Herzberg, who was struck and killed by an autonomous vehicle operated by Uber. Also: following Facebook’s privacy meltdown with Cambridge Analytica, we’re joined by Konstantinos Komaitis, the Director of Policy Development at the Internet Society about what real social media privacy reforms should look like. And a...

Duration:00:46:05

Podcast Episode 88: Inside Russia’s DragonFly Group and How Cyber Crooks Launder Money

3/19/2018
More
In this week’s Security Ledger Podcast (#88) we do a deep dive with researcher Vikram Thakur of the firm Symantec on “Dragonfly,” the Russian hacking group whose actions prompted the U.S. Department of Homeland Security and the FBI to issue a joint statement last week warning of intrusions into critical infrastructure in the US. Also: how do cyber criminals cash out all the loot they make from online scams? In our second segment we’ll talk to researcher Mike McGuire of the University of...

Duration:00:34:29

Podcast Episode 87: Vulnerability Reports Down the Memory Hole in China and the Groups Hacking ICS

3/12/2018
More
In this week’s Security Ledger Podcast (#87) we speak with Patricia Moriuchi of the firm Recorded Future about China’s efforts to cover up delays in publishing information on serious and exploitable software security holes. Joe Slowick of the firm Dragos Security joins us to talk about the hacking groups targeting industrial control systems and Ken Munro of the firm Pen Test Partners tells us why the UK’s new report on securing the Internet of Things isn’t worth the paper it’s written on....

Duration:00:42:23

Podcast Episode 86: Unraveling the Cuban Embassy’s Acoustic Mystery

3/5/2018
More
In this week’s episode of The Security Ledger Podcast (#86) we speak with Dr. Kevin Fu of the University of Michigan about research he conducted that casts doubts on reports of mysterious acoustic attacks on US embassy employees in Havana, Cuba. Also: Chip Block of Evolver talks about the Securities and Exchange Commission’s expanded cyber security guidance. And finally: thousands of radiologic sensors were deployed in the U.S. following the attacks of September 11 2001. We’ll look at new...

Duration:00:42:11

Episode 85: Supply Chain Attacks and Hacking Diversity with Leon Johnson

2/26/2018
More
In this week’s Podcast (#85), we’re joined by Adam Meyers of the firm CrowdStrike to talk about that company’s Global Threat Report for 2018. Also: we continue our observation of Black History Month in the US by talking to prominent information security professionals from the black community. This week, our guest is Leon Johnson, a principal pen tester at the firm Rapid 7 about becoming the first person in his family to go to college and then finding his way to information security. Supply...

Duration:00:32:25

Episode 84: Free Alexa! Cory Doctorow on jailbreaking Voice Assistants and hacking diversity with Rapid7’s Corey Thomas

2/19/2018
More
In this week’s Security Ledger Podcast (#84): The 1990s era Digital Millennium Copyright Act made it a crime to subvert copy protections in software and hardware. We speak with Cory Doctorow of the Electronic Frontier Foundation about his group’s efforts to win an exemption from that law for voice assistants like the Amazon Echo and Google Home. Also: February is Black History Month in the United States. We interview Corey Thomas, the Chief Executive Officer of the firm Rapid 7 about what...

Duration:00:42:12

Episode 83: Who is hacking the Olympics? Octoly’s Influencer Breach and Google plays HTTPS Hardball

2/12/2018
More
In this week’s Security Ledger Podcast (#83): McAfee Chief Scientist Raj Samani talks to us about that company’s research into a string of targeted attacks on the organizers of the 2018 Winter Olympics in PyeongChang, South Korea. Also: information on 12,000 YouTube stars, Instagram power users and other online influencers was leaked online by the French firm Octoly. We interview Chris Vickery of UpGuard, who found the data trove. And: Google says it will start playing tough with web sites...

Duration:00:34:53

Episode 82: the skinny on the Autosploit IoT hacking tool and a GDPR update from the front lines

2/5/2018
More
In this week’s episode of The Security Ledger Podcast (#82), we take a look at Autosploit, the new Internet of Things attack tool that was published on the open source code repository Github last week. Brian Knopf of the firm Neustar joins us to talk about what the new tool might mean for attacks on Internet of Things endpoints in 2018. Also: the go-live date for the EU General Data Protection Regulation is just months away, but many firms are still unaware that the regulation even exists....

Duration:00:43:23

Episode 81: Hacking IoT with Physics, Poor Grades for Safety Wearables and Peak Ransomware

1/29/2018
More
In this week’s podcast: researcher Kevin Fu of University of Michigan discusses his work on attacks that use physics to manipulate connected devices. Also: Mark Loveless of DUO discusses his research into how poor implementation of wireless protocols make personal security trackers a privacy risk. And have we seen peak ransomware? Adam Kujawa of the firm Malwarebytes joins us to talk about the findings of that company’s State of Malware Report. To date, billions of dollars have been...

Duration:00:39:56

Episode 80: APT Three Ways

1/22/2018
More
In this week’s Security Ledger Podcast, Episode – number 80 – we look at Advanced Persistent Threat (or APT) actors three ways with three different experts offering their take on the world’s most sophisticated hacking groups in Russia, North Korea and the Middle East. Advanced Persistent Threats (APTs) are the most dreaded of online threats. They’re determined and well resourced. Rather than carry out ‘smash and grab’ operations, they lurk quietly for days, weeks, months or years:...

Duration:00:36:27

Try Premium for 30 days

Live games for all NFL, MLB, NBA, & NHL teams
Commercial-Free Music
No Display Ads