Recent Posts

Episode 224: Engineering Trust In The Cyber Executive Order

In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Thomas Hardjono and Henk Birkholz join us to talk about President Biden’s Cyber Executive Order and how the EO’s call for increasing trust in federal IT systems is creating demand for TCG technologies

Episode 223: CISA Looks To Erase The Security Poverty Line

In this week’s episode of the podcast (#223), we are joined by Josh Corman and Lisa Young of the COVID task force at CISA to talk about the agency’s work to improve the security of critical sectors of the U.S. economy. Job #1: erase the so-called security “poverty line” that keeps small, poorly resourced firms from obtaining the skills and talents they need to protect their networks, data and IT assets.

Connecting The Dots: The Kremlin’s Links to Cyber Crime

The question of whether or not Russia has been involved in ongoing cybercrime is on the minds of many. A new report by Analyst1 offers new intelligence on the matter.

Episode 222: US Rep. Himes on Congress’s About-face on Cybersecurity

In this week’s podcast, we speak with Congressman Jim Himes (D-CT) about Congress’s sudden focus on cybersecurity – an about face that Rep. Himes says was encouraged by the devastating Colonial Pipeline hack.

DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk

A demonstration at DEF CON of glaring flaws in software by agricultural equipment giants John Deere and Case IH raise the specter of remote, software-based attacks that could cripple farms and impact US food production.