Podcast: Play in new window | Download (Duration: 33:08 — 37.9MB)Subscribe: Android | Email | Google Podcasts | RSSThis episode of The Security Ledger Podcast (#93) was sponsored by Keysight Technologies, a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world. Check them out at Keysight.com. In this episode: with the May 25th go-live date of the EU General Data Privacy Regulation (GDPR) just around the corner, we talk with Cisco Chief Privacy Officer Michelle Dennedy about her expectations for the May 25th deadline and what lies beyond it. Also: with the 2018 RSA Conference now in the history books, we invited Steve McGregory, the Senior Director of Application and Threat Intelligence at Ixia in to talk about his big takeaways from the show. Steve also weighs in on one of the big trends this year: machine learning.
Best of times worst of times? Check. Age of wisdom age of foolishness? Check. A look at this year’s RSA Conference and some of the big take-aways from the show.
The RSA Conference kicks off in San Francisco on Monday. Security Ledger will be there checking out the conference and meeting and talking with some of the top minds in the information security industry. Check out our schedule of appearances for the week.
Podcast: Play in new window | Download (Duration: 1:01:53 — 113.3MB)Subscribe: Android | Email | Google Podcasts | RSSIn this week’s Security Ledger Podcast, we talk with Genevieve Southwick, CEO of the B-Sides Las Vegas hacker conference about the information security industry’s #metoo problem and what steps conference organizers are taking to stem sexual assault and harassment at information security events. Also: researcher Alec Muffet talks with us about making a TOR version of Wikipedia (and why it’s not sticking around). Finally, Martin McKeay of Akamai talks about the state of Internet security one year after Mirai. (Spoiler alert: Mirai is still a problem.)
Hundreds of millions of wireless devices may be affected by a flaw in WPA-2, a widely used standard for securing wireless Internet connections. (Updated to add commentary by Bob Rudis of Rapid 7.)