In a new podcast series, Risk Recordings with RSA, we dig into the many ways that digital transformation is changing and magnifying digital risk. We also go into the trenches: speaking with IT executives and experts at the forefront of securing digital transformation initiatives.
Second Pod Channel
Duis mollis, est non commodo luctus, nisi erat porttitor ligula, eget lacinia odio sem nec elit. Sed posuere consectetur est at lobortis. Maecenas faucibus mollis interdum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros.
Spotlight Podcast: The Demise of the Password may be closer than you think!
In this Spotlight* podcast, Yaser Masoudnia of LogMeIn and LastPass talks about the continued persistence of the password in enterprise IT environments and how its inevitable demise (and replacement) may be closer than you would think.
Episode 176: Security Alarms in Census II Open Source Audit. Also: The New Face of Insider Threats with Code42
Joe Payne the CEO of Code42 joins us to talk about how the challenge of data breach prevention is changing. And: we do a deep dive on the recent Census II audit of open source.
Spotlight Podcast: How Machine Learning is revolutionizing Application Fuzzing
In this Spotlight episode of the Podcast, sponsored* by ForAllSecure we speak with CEO David Brumley about application “fuzzing” and how advancements in machine learning technology are allowing security researchers to find more and more serious vulnerabilities faster. The challenge now, Brumley says, is to keep up with the machines.
Episode 175: Campaign Security lags. Also: securing Digital Identities in the age of the DeepFake
In this episode of The Security Ledger Podcast (Episode #175), sponsored by Digicert: its been three years since the hacks made famous during the 2016 election, but online campaigns still struggle with basic security. Andrew Peterson of the firm Signal Sciences joins us to talk about why. Also: in part 2 of our podcast we’re joined by Dan Timpson, Chief Technology Officer at Digicert to talk about the fast expanding terrain of securing online identities in an age of ubiquitous computing, deep fakes and connected devices.