Tag: Policy

Spotlight Podcast: Arctic Wolf on Nurturing Talent for the Evolved SOC

Podcast: Play in new window | Download (Duration: 25:17 — 28.9MB)Subscribe: Android | Email | Google Podcasts | RSSIn this Spotlight Podcast, sponsored by Arctic Wolf Networks: sessions at this month’s Black Hat Briefings on PTSD and substance abuse among security workers are proof that the high pressure, high stakes world of information security can take its toll. So what  does it take to find, train and nurture information security pros? Sam McLane, the Chief Technology Services Officer at the firm Arctic Wolf Networks joins us to talk about how his company holds on to top security talent. 

Podcast Episode 109: What’s The US Freedom Army? Ask Russia.

Podcast: Play in new window | Download (Duration: 37:07 — 42.5MB)Subscribe: Android | Email | Google Podcasts | RSSIn this week’s episode of the Security Ledger Podcast (#109): what lurks in the dark recesses of online information operations? How about a secret “US Freedom Army” linked to Russia? Dave Aitel of Cyxtera joins us to talk about it. Also: hacking critical infrastructure isn’t just for nation states anymore. Cybereason joins us to talk about its recent report on cyber criminals hacking into industrial control systems. 

Parisa Tabriz of Google at Black Hat

Special Black Hat Coverage: Google’s Parisa Tabriz Says Don’t Be A Jerk

Podcast: Play in new window | Download (Duration: 29:46 — 34.1MB)Subscribe: Android | Email | Google Podcasts | RSSIn this special Black Hat edition of the Podcast, sponsored by UL: Parisa Tabriz, Google’s Director of Engineering for the Chrome Web browser, brought some strong medicine to Las Vegas for her Black Hat keynote speech. We talk about why her simple message was so groundbreaking. Also: Ken Modeste of UL joins us from the Black Hat briefings to talk about UL’s efforts to make cyber security as important to consumers in the 21st century as product safety was in the 20th.

Spotlight Podcast: CSS on why Crypto Agility is the Key to Securing Internet of Things Identities

Podcast: Play in new window | Download (Duration: 34:12 — 39.1MB)Subscribe: Android | Email | Google Podcasts | RSSIn this Spotlight Edition of the Security Ledger Podcast: identity is at the root of many of the security problems facing the Internet of Things, from vulnerable and “chatty” endpoints to a lack of robust update and lifecycle management features. To figure out how we might start to build a more secure IoT ecosystem, we invited Judah Aspler, the Vice President of IoT Strategy at Certified Security Solutions, or CSS Security in to talk about how more agile PKI infrastructure is one element in scaling the Internet of Things without creating a giant security mess.