Video

Webinar: Deconstructing the Top IoT Attacks of 2016

Webinar: Deconstructing the Top IoT Attacks of 2016

In-brief: a recording and slides from the Security Ledger and Bastille’s recent webinar “Deconstructing the Top IoT Hacks of 2016” are now available online. 

In our inaugural edition of Security Ledger Live, we speak with Lance James, Chief Scientist at the firm Flashpoint.

Security Ledger Live: Interview with Lance James of Flashpoint

In-brief: in our inaugural Security Ledger Live, we speak with Lance James, the Chief Scientist at the firm Flashpoint about ransomware, the care and feeding of security talent and the news of the week. 

Video from The Security of Things Forum: Hacking the Belkin WEMO with Invincea

Video from The Security of Things Forum: Hacking the Belkin WEMO with Invincea

In-brief: In this video from the Security of Things Forum in September, Scott Tenaglia of Invincea demonstrates vulnerabilities in Belkin’s WeMo family of connected home products. 

The New York Times expose on the hacks of the DNC is a case study in how not to respond to a cyber attack. We talk with Tim Bandos of Digital Guardian about building a cyber threat hunting capability.

Don’t Be The DNC: An Introduction to Enterprise Threat Hunting

In-brief: The New York Times expose on the hack of the Democratic National Committee is a case study in how not to respond to a cyber attack. In this video interview with Tim Bandos of Digital Guardian, we talk about how to do it right. His new ebook on hunting digital threats in the enterprise explains that incident response doesn’t have to cost a fortune. 

The EU's leading information privacy and security group will be issuing a report on smart car security and is soliciting feedback from auto industry suppliers and experts.

Java is My Co-Pilot: Weighing the Security of Connected Cars

In-brief: scandals like the one gripping Volkswagen and the hack of vehicles by Chrysler Fiat have a common thread: a lack of transparency about the software that powers modern cars. A panel at the recent Security of Things Forum took up this issue, and we have the video to share.