Thursday, October 1, 2020
The Security Ledger

Podcast Episode 189: AppSec for Pandemic Times, A Conversation with GitLab Security VP Jonathan Hunt

The pandemic isn't the only thing shaking up development organizations. Application security is a top concern and security work is "shifting left" and becoming more intertwined with development. In this podcast, Security Ledger Editor in Chief Paul Roberts talks...
The Security Ledger

Public Sector Mega-Vendor Tyler Technologies Says It Was Hacked

Tyler Technologies, the U.S.’s largest provider of software and services to the public sector said on Wednesday that it was hacked by unknown assailants, who gained “unauthorized access” to the company’s IT and phone systems. Tyler, which sells software...
The Security Ledger

Spotlight Podcast: Intel’s Matt Areno – Supply Chain is the New Security Battlefield

In this Spotlight Podcast, sponsored by The Trusted Computing Group, we speak with Matthew Areno, a Principal Engineer in the Intel Product Assurance and Security (IPAS) group about the fast-changing landscape of cyber threats including attacks on hardware and...
The Security Ledger

As Election Day Nears, Kremlin Leans on Hackers-for-Hire

The DOJ indicted a Russian national for his role in a campaign to undermine the U.S. election...and mine some cryptocurrency along the way. It is the latest evidence of Russia's willingness to use cyber criminals to conduct state-sponsored espionage....
The Security Ledger

PKI Points the Way for Identity and Authentication in IoT

Modern enterprise networks are populated by both people and, increasingly, "things." But securing the growing population of Internet of Things devices presents unique challenges. In this thought leadership article, Brian Trzupek, the Senior Vice President of Emerging Markets at...
The Security Ledger

Spotlight Podcast: CTO Zulfikar Ramzan on RSA’s Next Act: Security Start-Up

Thirty eight years after it was founded, RSA Security is embarking on what may be its most challenging journey yet: cybersecurity startup. In this Spotlight podcast we're joined by RSA CTO Zulfikar Ramzan about the company's path forward as...
The Security Ledger

Spotlight Podcast: Dr. Zulfikar Ramzan on RSA’s Next Act: Security Start-Up

Thirty eight years after it was founded, RSA Security is embarking on what may be its most challenging journey yet: cybersecurity startup. In this Spotlight podcast we're joined by RSA CTO Zulfikar Ramzan about the company's path forward as...
The Security Ledger

Spotlight Podcast: Dr. Zulfikar Ramzan on RSA’s Next Act: Security Start-Up

Thirty eight years after it was founded, RSA Security is embarking on what may be its most challenging journey yet: cybersecurity startup. In this Spotlight podcast we're joined by RSA CTO Zulfikar Ramzan about the company's path forward as...
The Security Ledger

Spotlight Podcast: Taking a Risk-Based Approach to Election Security

In this Spotlight Podcast, sponsored by RSA, we take on the question of securing the 2020 Presidential election. Given the magnitude of the problem, could taking a more risk-based approach to security pay off? We're joined by two information...
The Security Ledger

Spotlight Podcast: Taking a Risk-Based Approach to Election Security

In this Spotlight Podcast, sponsored by RSA, we take on the question of securing the 2020 Presidential election. Given the magnitude of the problem, could taking a more risk-based approach to security pay off? We're joined by two information...
The Security Ledger

Report: China Rides Cyber Attacks to Superpower Status

China has used offensive cyber capabilities to propel domestic industry and suppress opposition at home and abroad. As China seeks independence from Western interests, the role of cyber is likely to increase, a report from IntSights finds. The post...
The Security Ledger

Report: China Rides Cyber Attacks to Superpower Status

China has used offensive cyber capabilities to propel domestic industry and suppress opposition at home and abroad. As China seeks independence from Western interests, the role of cyber is likely to increase, a report from IntSights finds. The post...
The Security Ledger

Episode 188: Crowdsourcing Surveillance with Flock Safety

In this episode of the Security Ledger Podcast (#188), sponsored* by LastPass, we take a look at the fast-expanding world of crowdsourced surveillance by doing a deep dive on Flock Safety, a start up that sells inexpensive license plate...
The Security Ledger

Episode 188: Flock Safety Flies in Surveillance Technology’s Gray Zone Episode 188: Crowdsourcing Surveillance with Flock Safety

In this episode of the Security Ledger Podcast (#188), sponsored* by LastPass, we take a look at the fast-expanding world of crowdsourced surveillance by doing a deep dive on Flock Safety, a start up that sells inexpensive license plate...
The Security Ledger

The Essential Role of IAM in Remote Work

The sudden shift to 100% remote work has been jarring. How can businesses ensure remote workers are productive, while protecting sensitive data and minimizing cyberthreats? Rachael Stockton of LogMeIn and LastPass provides some tips. The post The Essential Role of...

When Coffee Machines Demand Ransom, You Know IoT Is Screwed

A researcher reverse engineered an internet-connected coffee maker to see what kinds of hacks he could do with it. The answer: quite a lot.
Tripwire

Russian Gets 7 Years in Prison for Linkedin, Dropbox & Formspring Hacks

A Russian man received a seven-year prison sentence for having hacked into computers belonging to LinkedIn, Dropbox and Formspring. On September 30, Honorable William H. Alsup, U.S. District Judge for the Northern District of California, sentenced Yevgeniy Alexandrovich Nikulin,...
Bruce Schneier

Detecting Deep Fakes with a Heartbeat

Researchers can detect deep fakes because they don’t convincingly mimic human blood circulation in the face: In particular, video of a person’s face contains subtle shifts in color that result from pulses in blood circulation. You might imagine that these...
SecurityWeek

Anthem to Pay Nearly $40M Settlement Over 2015 Cyberattack

Health insurer Anthem has agreed to another multimillion-dollar settlement over a cyberattack on its technology that exposed the personal information of nearly 79 million people. read more

#BeCyberSmart – why friends don’t let friends get scammed

Friends don't let friends get scammed. Because cybercrime hurts us all.