News
Binary Check Ad Blocker Security News
Spotlight: ShardSecure on Protecting Data At Rest Without EncryptionNew!!

Host Paul Roberts speaks with Mark Blackmer of ShardSecure about that company’s new approach to protecting data at rest, which relies on fragmenting and scattering data to make it impossible to...

Read more
News
Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson

Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security...

Read more
News
DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk

A demonstration at DEF CON of glaring flaws in software by agricultural equipment giants John Deere and Case IH raise the specter of remote, software-based attacks that could cripple farms and...

Read more
News
Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee

With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee. The post Encore Podcast: Chris...

Read more
News
Encore Podcast: Is Autonomous Driving Heading for a Crash?

Elon Musk is a big fan of his company’s Fully Self Driving software. But is it safe? In this encore edition of the podcast from 2018, we speak with Beau Woods...

Read more
News
Dispute Over Data Leak Highlights Legal Risks for UK Researchers

An expensive, months-long legal tussle between a UK engineer and a healthcare non-profit is spurring calls for reform to the country’s 30 year-old Computer Misuse Act, which Dyke and others contend...

Read more
News
Episode 212: China’s Stolen Data Economy (And Why We Should Care)

In this episode of the podcast (#212), Brandon Hoffman, the CISO of Intel 471 joins us to discuss that company’s latest report that looks at China’s diversified marketplace for stolen data...

Read more
News
Episode 211: Scrapin’ ain’t Hackin’. Or is it?

Is scraping the same as hacking or just an example of “zealous” use of a social media platform? And if it isn’t considered hacking…should it be? As more and more online...

Read more
News
Exclusive: Flaws in Zoom’s Keybase App Kept Chat Images From Being Deleted

A serious flaw in Zoom’s Keybase secure chat application left copies of images contained in secure communications on Keybase users’ computers after they were supposedly deleted. The post Exclusive: Flaws in Zoom’s...

Read more
News
Episode 200: Sakura Samurai Wants To Make Hacking Groups Cool Again. And: Automating Our Way Out of PKI Chaos

In this episode of the podcast (#200), sponsored by Digicert: John Jackson, founder of the group Sakura Samurai talks to us about his quest to make hacking groups cool again. Also:...

Read more