Podcast: Play in new window | Download (Duration: 25:57 — 29.7MB)Subscribe: Android | Email | Google Podcasts | RSSThere’s an epidemic of insecure Internet of Things devices. But why? And what is the shortest path to ending that epidemic? In this Spotlight Edition* of The Security Ledger Podcast, we speak with Deepika Chauhan, the Executive Vice President of Emerging Markets at DigiCert. Her job: forging new paths for the use of public key encryption to secure Internet of Things ecosystems.
Tag: critical infrastructure
In light of increased and more sophisticated threats in the cybersecurity landscape, tech giants have vowed to get more serious about protecting their customers by working together through a new Cybersecurity Tech Accord. Thirty-four companies—including Microsoft, Oracle, HP, Facebook, Cisco, Nokia TrendMicro and others—have signed on to the accord, which was unveiled Tuesday at the RSA Conference taking place in San Francisco this week. Those signing on said it’s the largest-ever group to agree to band together in the fight against malicious attacks from cybercriminals and nation-states. Speaking at the conference at the unveiling of the accord, Microsoft’s President and Chief Legal Officer Brad Smith told attendees that the recent WannaCry and NotPetya malware attacks were a sign that cybersecurity events were taking a turn for the worse. “We need to get the governments of the world to stop targeting tech companies, stop targeting the electrical grid, the private sector, hospitals,” […]
Podcast: Play in new window | Download (Duration: 31:45 — 36.3MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of The Security Ledger Podcast (#92): Adam Isles of The Chertoff Group joins us to talk about the growing specter of software supply chain risk the recent trend of the US Government shooting down major tech acquisitions by Chinese firms. Also: with the RSA Conference * kicking off in San Francisco, we hear from two experts from LookingGlass, this week’s podcast sponsor, about how to make sense of the hot threat intelligence space.
Researchers have found a vulnerability in emergency-alert systems provided by ATI Systems that could put millions at risk by allowing hackers to sound false alarms or otherwise mislead the public in regards to warning of natural and man-made disasters in the United States.
Recent attacks on the third-party data system of several U.S. pipeline companies highlight the persistent need for better ways to secure industrial control systems (ICSs), particularly when third-party software is in use, security experts said.