In this Spotlight podcast we’re joined by Benjamin Fabre of DataDome to discuss the evolving risks to organizations as e-commerce shifts from web pages to mobile applications and APIs.
Search Results for "DDoS"
Episode 222: US Rep. Himes on Congress’s About-face on Cybersecurity
In this week’s podcast, we speak with Congressman Jim Himes (D-CT) about Congress’s sudden focus on cybersecurity – an about face that Rep. Himes says was encouraged by the devastating Colonial Pipeline hack.
Episode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoT
In this episode of the podcast, sponsored by Trusted Computing Group we dig deep on this week’s ransomware attack on the Kaseya IT management software with Adam Meyers of CrowdStrike and Frank Breedijk of the Dutch Institute of Vulnerability Disclosure. Also: Tom Laffey, a product security strategist at Aruba, a Hewlett Packard Enterprise firm, and co-chair of the Network Equipment working group at TCG about how that group is adapting its technology to make it easier for new generations of connected devices to attest to their integrity.
Spotlight Podcast: Intel’s Matt Areno – Supply Chain is the New Security Battlefield
In this Spotlight Podcast, sponsored by The Trusted Computing Group, we speak with Matthew Areno, a Principal Engineer in the Intel Product Assurance and Security (IPAS) group about the fast-changing landscape of cyber threats including attacks on hardware and software supply chains.
Warning: Trump Terrorist Designation May Prompt Iranian Cyber Attacks
The Trump Administration’s designation of Iran’s Islamic Revolutionary Guard Corps as a foreign terrorist organization could prompt retaliatory cyber attacks from state-sponsored actors from the Islamic Republic, security researchers from Recorded Future warn.