The Security Ledger

Episode 149: How Real is the Huawei Risk?

The Security Ledger - Thu, 06/13/2019 - 4:47pm

In this episode of the podcast we're joined by Priscilla Moriuchi of the firm Recorded Future, which released a report this week analyzing the security risks posed by Huawei, the Chinese telecommunications and technology giant.

The post Episode 149: How Real is the Huawei Risk? appeared first on The Security Ledger.

Related Stories
Categories: The Security Ledger

Dark Web Looms Large as Enterprise Threat

The Security Ledger - Thu, 06/06/2019 - 8:00am

New research from the firm Bromium finds dark web listings are booming as operators offer tailored access to enterprise networks.

The post Dark Web Looms Large as Enterprise Threat appeared first on The Security Ledger.

Related Stories
Categories: The Security Ledger

Episode 148: Joseph Menn on Cult of the Dead Cow also Veracode CEO Sam King on InfoSec’s Leaky Talent Pipeline

The Security Ledger - Wed, 06/05/2019 - 10:48am

In this week's episode of the podcast: Joseph Menn's new book Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World hit store shelves this week. We reprise our March interview with Joe and talk about the origins of CDC. Also: is the talent pipeline for information security empty, or has it sprung a leak? We're joined...

Read the whole entry... »

Related Stories
Categories: The Security Ledger

DHS Warns That Drones Made in China Could Steal U.S. Data

The Security Ledger - Wed, 05/22/2019 - 4:49pm

The Department of Homeland Security is warning U.S. firms that drones made in China may be spying on them and sending sensitive data to the Chinese government.

The post DHS Warns That Drones Made in China Could Steal U.S. Data appeared first on The Security Ledger.

Related Stories
Categories: The Security Ledger

Episode 146: Elections Loom, Political Parties struggle with Cyber Security and Securing Cloud with Aporeto CEO Amir Sharif

The Security Ledger - Wed, 05/22/2019 - 9:41am

his week’s episode, #146: we speak with the researchers behind a new analysis of more than 40 political parties in the US and Europe showing that many suffer from poor cyber security. Also: DEV-OPS methodologies are transforming the way organizations are creating and consuming software. But security technology is stuck in the past. In our second...

Read the whole entry... »

Related Stories
Categories: The Security Ledger