Tag: Policy

Eric Lundgren was sentenced to 15 months in prison for distributed Microsoft Windows restore discs.

Episode 95: Copyright Insanity sends E-Waste Recycler to Prison and IoT Inspector finds Insecure Things

Podcast: Play in new window | Download (Duration: 34:38 — 39.6MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of The Security Ledger podcast (#95): has the Digital Millennium Copyright Act taken us over a bridge too far? We talk with two experts about the case of Eric Lundgren, a celebrated e-waste recycler who has been sentenced to 15 months in prison and fined $50,000 for DMCA violations. Also: we speak with one of the Ivy League students who designed IoT Inspector, software that can analyze your home network for vulnerable devices.

China's government appears to be suppressing information on serious, exploitable security vulnerabilities in software, a study by Recorded Future found.

Podcast Episode 92: Uncle Sam Ices Tech Acquisitions and RSA Conference 2018

Podcast: Play in new window | Download (Duration: 31:45 — 36.3MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of The Security Ledger Podcast (#92): Adam Isles of The Chertoff Group joins us to talk about the growing specter of software supply chain risk the recent trend of the US Government shooting down major tech acquisitions by Chinese firms.  Also: with the RSA Conference * kicking off in San Francisco, we hear from two experts from LookingGlass, this week’s podcast sponsor, about how to make sense of the hot threat intelligence space. 

Data stolen in a breach can surface months or years after the victimized firm has returned to "business as usual," warns Thomas Hofmann of the firm Flashpoint.

Taking the Long View of Breach Fallout

In this industry perspective, Thomas Hofmann, the Vice President of Intelligence at the firm Flashpoint* warns that the effects of data breaches can often be felt months or years after the actual incident, as stolen data bubbles up in underground marketplaces. He has three pieces of advice for companies that want to develop an incident response plan that mitigates the damage of breaches in the short term and over the long term.