In this episode of the Security Ledger Podcast, Paul speaks with Jill Moné-Corallo, the Director of Product Security Engineering Response at GitHub. Jill talks about her journey from a college stint working at Apple’s Genius bar, to the information security space – first at product security at Apple and now at GitHub, a massive development platform that is increasingly in the crosshairs of sophisticated cyber criminals and nation-state actors.
Spotlight
Spotlight podcasts bring Security Ledger’s audience up close and personal with some of the leading cybersecurity firms in the world: exploring the history, technology and vision that drives innovation in the information security field. Hosted by Security Ledger Editor in Chief Paul Roberts, this premium podcast features interviews with leading executives, security researchers and entrepreneurs as they chart the future of the cybersecurity industry.
Episode 247: Into the AppSec Trenches with Robinhood CSO Caleb Sima
Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks.
Spotlight: SIEMs suck. Panther is out to change that.
I interview Jack Naglieri, CEO of Panther about the failures of the current SIEM technology and the need for what Naglieri terms “detection engineers.”
Episode 246: SOARing out of Lockdown with Revelstoke Security
Getting a start-up off the ground isn’t easy in the best of times. Now imagine doing it just as a global pandemic is shutting down society…and the economy. Our guest this week, Josh McCarthy of Revelstoke Security, did it and lived to tell the tale.
Episode 245: How AI is remaking knowledge-based authentication
Six decades in, password use has tipped into the absurd, while two-factor authentication is showing its limits. We talk with Matt Salisbury of Honeybadger HQ, which is using AI and machine learning to re-imagine knowledge-based authentication.