Zoom has rolled out new security features and promised a cyber security and privacy makeover after withering reports of the platform’s failings. In the meantime, enterprises are left to wonder ‘to Zoom or not Zoom?’
Hardware
Episode 174: GE’s Very Bad Day – Unpacking the MDHex Vulnerabilities
The U.S. Department of Homeland Security warned of critical vulnerabilities in a range of products by GE. We speak with Elad Luz, the head of research at CyberMDX, which discovered the holes.
IT Asset Disposition (ITAD) is the Slow Motion Data Breach Nobody notices
Efforts to wall off sensitive corporate and government data from foreign adversaries have a gaping hole: IT asset disposition (ITAD), where vendors – many owned by Chinese firms – process discarded hardware and data with little oversight.
Episode 172: Securing the Election Supply Chain
In this episode of the podcast (#172), Jennifer Bisceglie, the founder and CEO of Interos to talk about the links between America’s voting infrastructure and countries with a history of trying to subvert democracy.
Spotlight Podcast: Building Resilience into the IoT with Rob Spiger
In this Spotlight edition of the Security Ledger Podcast, sponsored by Trusted Computing Group*: we’re joined by Rob Spiger, a principal security strategist at Microsoft and co-chair of the cyber resilient technologies working group at Trusted Computing Group. Rob talks to us about efforts to make more resilient connected devices and how the advent of the Internet of Things is changing TCG’s approach to building cyber resilient systems.