Recent Posts

electronic voting

Spotlight Podcast: Taking a Risk-Based Approach to Election Security

In this Spotlight Podcast, sponsored by RSA, we take on the question of securing the 2020 Presidential election. Given the magnitude of the problem, could taking a more risk-based approach to security pay off? We’re joined by two information security professionals: Rob Carey is the Vice President and General Manager of Global Public Sector Solutions at RSA. Also joining us: Sam Curry, the CSO of Cybereason.

Report: China Rides Cyber Attacks to Superpower Status

China has used offensive cyber capabilities to propel domestic industry and suppress opposition at home and abroad. As China seeks independence from Western interests, the role of cyber is likely to increase, a report from IntSights finds.

Flock Safety Sign

Episode 188: Flock Safety Flies in Surveillance Technology’s Gray Zone

In this episode of the Security Ledger Podcast (#188), sponsored* by LastPass, we take a look at the fast-expanding world of crowdsourced surveillance by doing a deep dive on Flock Safety, a start up that sells inexpensive license plate scanners to homeowners and police departments. Also: users know that password security is important…but they can’t seem to change their insecure behavior. In our second segment, We talk about why with Katie Petrillo of LogMeIn and LastPass.

IAM_Concept_Adobe

The Essential Role of IAM in Remote Work

The sudden shift to 100% remote work has been jarring. How can businesses ensure remote workers are productive, while protecting sensitive data and minimizing cyberthreats? Rachael Stockton of LogMeIn and LastPass provides some tips.

GE Filtergate Image

Episode 187: Filtergate is DRM for Water

In this episode of the podcast (#187), sponsored by Virsec, we talk with journalist and author Cory Doctorow of BoingBoing.net about the recent GE Filtergate incident and how DRM is invading our homes. Also, Satya Gupta the Chief Technology Officer of the firm VirSec joins us to talk about how application runtime monitoring is gaining traction in the age of DevSecOps and left-shifted security.