Tag: patching

Podcast Episode 112: what it takes to be a top bug hunter

Podcast Episode 112: what it takes to be a top bug hunter

Podcast: Play in new window | Download (Duration: 39:54 — 45.7MB)Subscribe: Android | Email | Google Podcasts | RSS In this week’s episode (#112): top bug hunters can earn more than $1 million a year from “bounties” paid for information on exploitable software holes in common platforms and applications. What does it take to be among the best? We talk with Jason Haddix of the firm Bug Crowd to find out. Also: The Internet Society’s Jeff Wilbur talks about the new #GetIoTSmart campaign to educate device makers and the public about Internet of Things security. 

Blue chip manager is unlocking a virtual locking mechanism to access shared cloud resources. Internet concept for identity & access management, cloud storage, cybersecurity and managed services.

Collection Management: a Crash-Course

Effective collection management is integral to the success of an intelligence operation. What is it and how does it work? Thomas Hofmann, the Vice President of Intelligence at Flashpoint offers a crash-course in creating an effective collection management program.

Spotlight Podcast: CSS on why Crypto Agility is the Key to Securing Internet of Things Identities

Spotlight Podcast: CSS on why Crypto Agility is the Key to Securing Internet of Things Identities

Podcast: Play in new window | Download (Duration: 34:12 — 39.1MB)Subscribe: Android | Email | Google Podcasts | RSSIn this Spotlight Edition of the Security Ledger Podcast: identity is at the root of many of the security problems facing the Internet of Things, from vulnerable and “chatty” endpoints to a lack of robust update and lifecycle management features. To figure out how we might start to build a more secure IoT ecosystem, we invited Judah Aspler, the Vice President of IoT Strategy at Certified Security Solutions, or CSS Security in to talk about how more agile PKI infrastructure is one element in scaling the Internet of Things without creating a giant security mess. 

Breaking the Ice on DICE: scaling secure Internet of Things Identities

Breaking the Ice on DICE: scaling secure Internet of Things Identities

Podcast: Play in new window | Download (Duration: 33:20 — 38.2MB)Subscribe: Android | Email | Google Podcasts | RSSIn this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of  solving a range of security and identity problems on low cost, low power IoT endpoints. Among them: establishing strong device identity, doing device attestation and safe deployment at scale and verifying software updates.