Other News

Autosploit simply combines two, existing hacking tools. But it does make hacking the IoT easier for low skill "script kiddies" says Brian Knopf of the firm Neustar.

Episode 82: the skinny on the Autosploit IoT hacking tool and a GDPR update from the front lines

Podcast: Play in new window | DownloadSubscribe: Android | RSSIn this week’s episode of The Security Ledger Podcast (#82), we take a look at Autosploit, the new Internet of Things attack tool that was published on the open source code repository Github last week. Brian Knopf of the firm Neustar joins us to talk about what the new tool might mean for attacks on Internet of Things endpoints in 2018. Also: the go-live date for the EU General Data Protection Regulation is just months away, but many firms are still unaware that the regulation even exists. We’ll hear two reports from the front lines of GDPR, first from Sam Peifle of the International Association of Privacy Professionals and then by Shane Nolan of IDA, the Irish Development Authority.

Modern table boardroom with chair in morning / meeting associate concept.

How To Make Your Intelligence Program Ready for Executive Consumption

In this Industry Perspective, Thomas Hofmann of the firm Flashpoint writes that cyber threat intelligence professionals from the government don’t just bring their skills when they migrate to the private sector – they bring their jargon, also. Communicating effectively with the C-suite, however, demands making threat intelligence ready for executive consumption.  Spread the word!105shares09690