Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Cyber Security News, Analysis and Opinion
…
continue reading

1
How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty’s Noam Moshe
26:38
26:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:38Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at this year's Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networks—and what organizations can do to defend against these (and other) IoT t…
…
continue reading

1
How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty’s Noam Moshe
26:38
26:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:38Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at this year's Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networks—and what organizations can do to defend against these (and other) IoT t…
…
continue reading

1
Episode 260: The Art of Teaching Secure Coding with Tanya Janca
36:32
36:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:32In this episode of the podcast, host Paul Roberts welcomes Tanya Janca of She Hacks Purple back into the studio. Tanya talks about her newly released book: Alice and Bob Learn Secure Coding, published by Wiley and the larger problem of how to promote the teaching of secure coding practices to developers. The post Episode 260: The Art of Teaching Se…
…
continue reading

1
Security Validation: A Deep Dive with Cymulate’s David Kellerman
30:49
30:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:49In this Spotlight episode, host Paul Roberts speaks with David Kellerman, the Field CTO at Cymulate, about the growing demand for security validation technology, like Cymulate's, as organizations struggle to assess the utility and effectiveness of their security investments. The post Security Validation: A Deep Dive with Cymulate’s David Kellerman …
…
continue reading

1
Pacific Rim: Sophos’ 6 Year Battle To Beat Back China State Hackers
33:43
33:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:43Host Paul Roberts interviews Sophos CISO Ross McKerchar about the company's recent report, Pacific Rim, detailing its multi-year battle to beat back a sophisticated Chinese hacking campaign. The post Pacific Rim: Sophos’ 6 Year Battle To Beat Back China State Hackers appeared first on The Security Ledger with Paul F. Roberts.…
…
continue reading