News
Episode 241: If Its Smart, Its Vulnerable a Conversation with Mikko Hyppönen

We speak with Mikko Hyppönen on the sidelines of the DEF CON Conference in Las Vegas to talk about his new book, “If its Smart it Vulnerable."
The post Episode 241: If...

Read more
News
The Concerning Statistics About Mental Health in Cybersecurity

Are cyber professionals as good at protecting their mental health as their IT environments? Thomas Kinsella, COO of Tines, talks about the worrying mental health statistics in cyber and how to...

Read more
News
Episode 230: Are Vaccine Passports Cyber Secure?

In this episode of the podcast (#230) Siddarth Adukia, a regional Director at NCC Group, joins host Paul Roberts to talk about the (cyber) risks and (public health) rewards of vaccine...

Read more
News
Exclusive: Flaws in Zoom’s Keybase App Kept Chat Images From Being Deleted

A serious flaw in Zoom’s Keybase secure chat application left copies of images contained in secure communications on Keybase users’ computers after they were supposedly deleted.
The post Exclusive: Flaws in Zoom’s...

Read more
News
Episode 201: Bug Hunting with Sick Codes

The work of vulnerability research has changed a lot in the last two decades. In this episode, Security Ledger Podcast host Paul Roberts chats with the independent researcher known as “Sick...

Read more
News
DHS Looking Into Cyber Risk from TCL Smart TVs

The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports that...

Read more
News
Episode 195: Cyber Monday Super Deals Carry Cyber Risk

While many organizations think the notion of keyboards, monitors and other hardware "spying" on them as the stuff of "James Bond" movies, Yossi Appleboum of Sepio Systems says that the threat...

Read more
News
TV Maker TCL Denies Back Door, Promises Better Process

Chinese electronics giant TCL has acknowledged security holes in some models of its smart television sets, but denies that it maintains a secret "back door" that gives it control over deployed...

Read more