Now that the EU General Data Protection Regulation (GDPR) is upon us…what happens now? In this industry perspective, Steve Schlarman of RSA writes that GDPR compliance isn’t a one time affair – the requirements of the law are likely to be woven into the fabric of how businesses operate inside and outside the EU.
Podcast: Play in new window | Download (Duration: 43:26 — 49.7MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode, #97: we talk with Robert Xiao, the Carnegie Mellon researcher who investigated Location Smart, a free web application that allowed anyone track the location of a mobile phone using just the phone’s number. Also: we welcome University of Washington Researcher Kate Starbird back into the SL studio to talk about her latest research: examining the web of bloggers, news web sites, conspiracy theorists and government actors targeting human rights workers in Syria.
Podcast: Play in new window | Download (Duration: 41:18 — 47.3MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of The Security Ledger Podcast (#96): with primary elections taking place in states across the United States in the coming weeks, we talk to John Dickson about how state elections offices have become the front line in a pitched battle with state-sponsored hackers – with the fate of a 240 year democracy hanging in the balance. Also: we talk about the looming threat posed by so-called “deep fake” videos that use computer manipulation to make famous celebrities appear to say nearly anything.
President Trump’s decision to exit from the Iran nuclear deal doesn’t bode well for U.S. cybersecurity and likely will spur cyber attacks on a number of U.S. industries from the Islamic State, a new report from Recorded Future has found.
In this industry perspective, Thomas Hofmann of Flashpoint says that sensational coverage of advanced persistent threat (APT) actors does little to help small and mid sized firms defend their IT environments from more common threats like cyber criminals. The key to getting cyber defense right is understanding the risks to your firm and prioritizing investments to protect critical IT assets.