In this Spotlight Podcast, Lyndon Brown, the Chief Strategy Officer at Pondurance joins host Paul Roberts to talk about how changes in both the threat landscape and the workplace are driving demand for managed detection and response (MDR) services, in which companies hire outside security talent to help keep sophisticated cyber adversaries at bay.
Search Results for ""third party" and code"
DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk
A demonstration at DEF CON of glaring flaws in software by agricultural equipment giants John Deere and Case IH raise the specter of remote, software-based attacks that could cripple farms and impact US food production.
Want To Prevent Another SolarWinds? Start With Developers
An all-star roundtable of security experts tackles the question of how to prevent another SolarWinds.
Exploitable Flaw in NPM Private IP App Lurks Everywhere, Anywhere
A serious security flaw in a commonly used npm security module, private-ip, may affect hundreds of thousands of private and public applications.
TV Maker TCL Denies Back Door, Promises Better Process
Chinese electronics giant TCL has acknowledged security holes in some models of its smart television sets, but denies that it maintains a secret “back door” that gives it control over deployed TVs.