Tag: vulnerabilities

Ransomware Concept

Spotlight: When Ransomware Comes Calling

With the attention given to the threats posed by ransomware, why do organizations still fall victim to these attacks? Max Henderson, the Manager of Incident Response at Pondurance joins us to talk about what companies get wrong in responding to ransomware and other threats.

electronic-waste

Episode 226: The Cyber Consequences Of Our Throw Away Culture

We speak with John Shegerian of ERI about his new book: “The Insecurity of Everything” and how our e-waste may be exposing sensitive data to other nations.

Storm on the Farm

DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk

A demonstration at DEF CON of glaring flaws in software by agricultural equipment giants John Deere and Case IH raise the specter of remote, software-based attacks that could cripple farms and impact US food production.

Quit_Job

Spotlight: Securing the Great Resignation with Code 42

Mark Wojtasiak, the Vice President of Security Industry research at Code42 joins us to talk about how companies can handle the security risks that accompany the COVID-inspired “great resignation” in corporate America.

Cartoon of Man Staring at Monitor

Episode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoT

In this episode of the podcast, sponsored by Trusted Computing Group we dig deep on this week’s ransomware attack on the Kaseya IT management software with Adam Meyers of CrowdStrike and Frank Breedijk of the Dutch Institute of Vulnerability Disclosure. Also: Tom Laffey, a product security strategist at Aruba, a Hewlett Packard Enterprise firm, and co-chair of the Network Equipment working group at TCG about how that group is adapting its technology to make it easier for new generations of connected devices to attest to their integrity.