Interview

mark stanislav duo security

Prediction: Rough Road Ahead in 2014 For Security and Internet of Things

https://media.blubrry.com/the_security_ledger_podcasts/p/securityledger.com/wp-content/uploads/2013/12/Year-End-Predictions-with-Mark-Stanislav-of-DUO-Security.mp3Podcast: Play in new window | Download ()Subscribe: Apple Podcasts | Android | Email | Google Podcasts | Stitcher | TuneIn | RSS | https://www.securityledger.com/subscribeWith the New Year fast approaching, it’s (unofficially) ‘prediction season,’ when everyone worth their salt stares into the crystal ball and tries to imagine what the world will look like 12 months hence. To sort through our 2014 predictions, we called on Mark Stanislav, the chief Security Evangelist at Duo Security. Mark is a seasoned security researcher who has taken an interest in the security of the Internet of Things. Earlier this year, we wrote about research Mark did on the IZON Camera, an IP-enabled home surveillance camera that is sold by big-box retail stores like Best Buy, as well as by the Apple Store. Beneath the IZON’s polished exterior, the IZON was a mess of sloppy coding and poor security implementation, Stanislav discovered. Like many […]

Two Faces of the IoT: A Conversation With Xively’s Philip DesAutels

Conversations about the Internet of Things often focus on its most visible outposts: consumer devices. Products like the Nest Thermostat, IP-enabled home security cameras or Samsung’s Smart TV are like ambassadors for the IoT: highlighting cool features and capabilities that just hint at the transformative power of the much larger revolution that small, powerful Internet-connected objects will herald. The truth is that although consumers are still warming to the Internet of Things, businesses and industry have already embraced it. Manufacturers of heavy equipment have outfitted their products with an extensive mesh of small sensors that provide close to real-time data on the functioning of critical components. As a measure of this, Virgin Airlines said in March that it will upgrade its network infrastructure to accommodate an “explosion” of data from a new fleet of Boeing 787 Jetliners, which will produce close to half a Terabyte of data per flight. But what is […]

How Connected Consumer Devices Fail The Security Test

Podcast: Play in new window | Download ()Subscribe: Apple Podcasts | Android | Email | Google Podcasts | Stitcher | TuneIn | RSS | https://www.securityledger.com/subscribeThe Internet of Things leverages the same, basic infrastructure as the original Internet – making use of protocols like TCP/IP, HTTP, Telnet and FTP. But the devices look and act very differently from traditional PCs, desktops and servers. Many IoT devices run embedded operating systems or variants of the open source Linux OS. And many are low-power and many are single function: designed to simply listen and observe their environment, then report that data to a central (cloud based repository).   But IoT devices are still susceptible to hacking and other malicious attacks, including brute force attacks to crack user names and passwords, injection attacks, man in the middle attacks and other types of spoofing.  Despite almost 20 years experience dealing with such threats in the […]

Ted Julian - Co3

The Security Week In Review: Same Breach, Different Day

It’s the end of another week and, as has become a pattern, we’re weighing the impact of  another massive data breach: this one at Cupid Media, the owner of a network of dating web sites. According to a report on Krebsonsecurity.com, data on some 40 million Cupid Media customers turned up on the same servers that were found holding data stolen from Adobe Inc., PR Newswire and other victims. To get a handle on the impact of this breach and others like it, I invited Ted Julian, the Chief Marketing Officer of CO3 Systems, to talk about the recent string of embarrassing breaches and how companies go wrong (and sometimes right) in responding to them. Co3 sells a service that helps companies structure their response to data breaches and other adverse incidents. We also took the time to talk about the recent FTC Workshop on security and privacy on The […]

Week In Security: NSA Spies on Yahoo & Google, Adobe Hack and Healthcare.gov

There’s nothing like a Sunday morning for looking back over the week’s events and trying to make sense of at all – or at least what sense there is to be had. This Sunday was no different – especially after a week that saw continued revelations stemming from Edward Snowden’s leak of classified intelligence on NSA spying, the massive hack of software maker Adobe. Then there was the botched rollout of the federal Healthcare.gov marketplace – which morphed into an even bigger, uglier problem as the week progressed. To help me sort it all out, I called on Nick Selby, the CEO of StreetCred Software and an authority on cyber security, law enforcement, government procurement, Russia, Germany, aviation, travel journalism and all manner of other topics. I love talking to Nick because his wealth of life and professional experience make him predictably unpredictable when it comes to interpreting current events. […]