Podcasts

Podcast Episode 94: Black Report takes Hacker View and Securing the Open Source Supply Chain

Podcast Episode 94: Black Report takes Hacker View and Securing the Open Source Supply Chain

Podcast: Play in new window | Download (Duration: 35:55 — 41.1MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of the Security Ledger Podcast we do a deep dive into the recent Black Report by NUIX – which flips the script by asking hackers and pen testers their opinions about how they hack firms and what defensive strategies and technologies work best at stopping them. Also: Rami Sass the CEO and co-founder of this week’s sponsor, WhiteSource Software, joins us in the Security Ledger studios to talk about how a white knuckle audit of his company’s open source dependencies eight years ago prompted him to start WhiteSource, which makes a tool for managing the open source software supply chains. 

Spotlight: Philippe Courtot, CEO of Qualys: We Need to Change How We Do Security

Spotlight: Philippe Courtot, CEO of Qualys: We Need to Change How We Do Security

Podcast: Play in new window | Download (Duration: 24:58 — 28.6MB)Subscribe: Android | Email | Google Podcasts | RSSIn this Spotlight Podcast*, Philippe Courtot of the firm Qualys discusses being an early innovator in the software as a service space and how the market for cloud based security services has evolved since he launched his firm, Qualys, almost two decades ago. 

The 2018 RSA Conference took place last week in San Francisco. Machine learning and AI were big themes. (Image courtesy of RSA Conference.)

Podcast Episode 93: Talking GDPR with Cisco’s Chief Privacy Officer and RSA 2018 Recap

Podcast: Play in new window | Download (Duration: 33:08 — 37.9MB)Subscribe: Android | Email | Google Podcasts | RSSThis episode of The Security Ledger Podcast (#93) was sponsored by Keysight Technologies, a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world. Check them out at Keysight.com. In this episode: with the May 25th go-live date of the EU General Data Privacy Regulation (GDPR) just around the corner, we talk with Cisco Chief Privacy Officer Michelle Dennedy about her expectations for the May 25th deadline and what lies beyond it. Also: with the 2018 RSA Conference now in the history books, we invited Steve McGregory, the Senior Director of Application and Threat Intelligence at Ixia in to talk about his big takeaways from the show. Steve also weighs in on one of the big trends this year: machine learning. 

China's government appears to be suppressing information on serious, exploitable security vulnerabilities in software, a study by Recorded Future found.

Podcast Episode 92: Uncle Sam Ices Tech Acquisitions and RSA Conference 2018

Podcast: Play in new window | Download (Duration: 31:45 — 36.3MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of The Security Ledger Podcast (#92): Adam Isles of The Chertoff Group joins us to talk about the growing specter of software supply chain risk the recent trend of the US Government shooting down major tech acquisitions by Chinese firms.  Also: with the RSA Conference * kicking off in San Francisco, we hear from two experts from LookingGlass, this week’s podcast sponsor, about how to make sense of the hot threat intelligence space. 

Facebook CEO Mark Zuckerberg addresses an audience. He is willing to speak to Congress about Facebook's role in spreading propaganda. (Image courtesy of Facebook.)

Podcast Episode 91: Fighting Fake News with or without Facebook and whats with all the Cryptojacking?

Podcast: Play in new window | Download (Duration: 24:05 — 27.6MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of The Security Ledger Podcast (#91): with Facebook CEO Mark Zuckerberg saying he will testify before Congress, we ask Harvard’s Matthew Baum about what Congressmen and women should ask him and how to best fight fake news. Also: Adam Kujawa of Malwarebytes updates us on that company’s latest quarterly threat report and helps us answer the question “what’s with all the cryptomining”?