Podcast: Play in new window | DownloadSubscribe: Android | RSSIn this episode of The Security Ledger Podcast (#91): with Facebook CEO Mark Zuckerberg saying he will testify before Congress, we ask Harvard’s Matthew Baum about what Congressmen and women should ask him and how to best fight fake news. Also: Adam Kujawa of Malwarebytes updates us on that company’s latest quarterly threat report and helps us answer the question “what’s with all the cryptomining”?
Podcast Episode 90: WannaCry zombie haunts Boeing, UL tests for cyber security and Harvard war games election hacking
Podcast: Play in new window | DownloadSubscribe: Android | RSSIn this week’s podcast, Episode #90: has the WannaCry ransomware returned from the dead? We talk with an expert from Juniper Networks about what might be behind the outbreak at Boeing. Also: Underwriters Lab and Johnson Controls join us on the podcast to talk about a recent milestone: UL’s award of the first ever Level 3 certificate for cyber security. And we speak with one of the organizers of one of an election security table top exercise last week at Harvard’s Kennedy School.
In this industry perspective, Thomas Hofmann, the Vice President of Intelligence at the firm Flashpoint* warns that the effects of data breaches can often be felt months or years after the actual incident, as stolen data bubbles up in underground marketplaces. He has three pieces of advice for companies that want to develop an incident response plan that mitigates the damage of breaches in the short term and over the long term.
The majority of corporations fear that a “catastrophic” security incident stemming from the Internet of Things (IoT) is an imminent risk. However, those same organizations still lack simple knowledge of how many IoT devices they have in their organization and how they are being used, let alone have oversight for how to protect them, according to new findings.
Podcast: Play in new window | DownloadSubscribe: Android | RSSIn this week’s Security Ledger Podcast (#88) we do a deep dive with researcher Vikram Thakur of the firm Symantec on “Dragonfly,” the Russian hacking group whose actions prompted the U.S. Department of Homeland Security and the FBI to issue a joint statement last week warning of intrusions into critical infrastructure in the US. Also: how do cyber criminals cash out all the loot they make from online scams? In our second segment we’ll talk to researcher Mike McGuire of the University of Surrey, who has been studying that question.