News about the so-called VOHO “watering hole” attacks have faded from the headlines, but the hard work for hundreds of organizations who were victims of the attacks has just begun. The first step for many firms is figuring out if they were victims.
ReversingLabs' 2025 Software Supply Chain Security Report finds that security flaws in commercial and open source code are epidemic as hackers target supply chains including those for cryptocurrency and AI in a play for access to sensitive data and IT assets.
Spotlight podcasts bring Security Ledger's audience up close and personal with some of the leading cybersecurity firms in the world: exploring the history, technology and vision that drives innovation in the information security field. Hosted by Security Ledger Editor in Chief Paul Roberts, this premium podcast features interviews with leading executives, security researchers and entrepreneurs as they chart the future of the cybersecurity industry.
How do we keep the Internet of Things from maturing into the Internet of Broken, Vulnerable and Unsupported Things? A right to repair is key. In this series of interviews we explore the issues complicating repair on connected devices and how an important consumer and property right is threatened by the headlong growth of the IOT.
Cloud. Internet of Things. DEVOPS. The job of Chief Information Security Officer has never been more challenging. How are world's leading CISOs taking on the challenges that a fast-evolving technology and risk landscape throw at them? In CISO Close Up, Security Ledger Editor in Chief Paul Roberts talks shop with some of the best CISOs in the private and public sectors to get their thoughts on the job.
News about the so-called VOHO “watering hole” attacks have faded from the headlines, but the hard work for hundreds of organizations who were victims of the attacks has just begun. The first step for many firms is figuring out if they were victims.
I'm the founder and Editor in Chief of The Security Ledger (securityledger.com), an independent security news and analysis publication that explores the intersection of cyber security with the Internet of Things.