Spotlight

Spotlight podcasts bring Security Ledger’s audience up close and personal with some of the leading cybersecurity firms in the world: exploring the history, technology and vision that drives innovation in the information security field. Hosted by Security Ledger Editor in Chief Paul Roberts, this premium podcast features interviews with leading executives, security researchers and entrepreneurs as they chart the future of the cybersecurity industry.

Episode 214: Darkside Down: What The Colonial Attack Means For The Future of Ransomware

Intel 471 CISO Brandon Hoffman joins us to to discuss Darkside, the ransomware group that attacked the Colonial Pipeline, why the crew may have bitten off more than it can chew and what the attack says about the state of America’s Critical Infrastructure.

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production.

Episode 212: China’s Stolen Data Economy (And Why We Should Care)

In this episode of the podcast (#212), Brandon Hoffman, the CISO of Intel 471 joins us to discuss that company’s latest report that looks at China’s diversified marketplace for stolen data and stolen identities.

Episode 211: Scrapin’ ain’t Hackin’. Or is it?

Is scraping the same as hacking or just an example of “zealous” use of a social media platform? And if it isn’t considered hacking…should it be? As more and more online platforms open their doors to API-based access, do we need more rules and oversight of how APIs are used to prevent wanton abuse?

Episode 210: Moving The Goal Posts On Vendor Transparency: A Conversation With Intel’s Suzy Greenberg

In this episode of the podcast, Paul speaks with Intel Vice President Suzy Greenberg about a new survey by the Poneman Institute that shows how customers’ expectations are changing when it comes to vendor transparency about software vulnerabilities.