News
Spotlight: E-Commerce’s Bot and Mouse Game

In this Spotlight podcast we’re joined by Benjamin Fabre of DataDome to discuss the evolving risks to organizations as e-commerce shifts from web pages to mobile applications and APIs. The post Spotlight:...

Read more
News
DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk

A demonstration at DEF CON of glaring flaws in software by agricultural equipment giants John Deere and Case IH raise the specter of remote, software-based attacks that could cripple farms and...

Read more
News
Spotting Hackers at the Pace of XDR – From Alerts to Incidents

Extended Detection and Response (XDR) technology is gaining traction within enterprises. But how can organizations handle the increased volume of alerts XDR systems produce? Samuel Jones, of cyber AI firm Stellar...

Read more
News
Episode 216: Signed, Sealed and Delivered: The Future of Supply Chain Security

In this episode of the podcast (#216) we talk with Brian Trzupek, Digicert’s Vice President of Product, about the growing urgency of securing software supply chains, and how digital code signing can...

Read more
News
What SolarWinds Tells Us About Securing the Software Development Supply Chain

The recent SolarWinds attack highlights an Achilles heel for enterprises: software updates for critical enterprise applications. Digital signing of code is one solution, but organizations need to modernize their code signing...

Read more
News
Want To Prevent Another SolarWinds? Start With Developers

An all-star roundtable of security experts tackles the question of how to prevent another SolarWinds. The post Want To Prevent Another SolarWinds? Start With Developers appeared first on The Security Ledger...

Read more
News
Dispute Over Data Leak Highlights Legal Risks for UK Researchers

An expensive, months-long legal tussle between a UK engineer and a healthcare non-profit is spurring calls for reform to the country’s 30 year-old Computer Misuse Act, which Dyke and others contend...

Read more
News
Critical Flaw Found In Widely Used Netmask Open Source Module

An IP address parsing flaw in the netmask NPM module affects hundreds of thousands of applications that rely on it. But that may be just the tip of the iceberg, researchers...

Read more
News
Exclusive: Flaws in Zoom’s Keybase App Kept Chat Images From Being Deleted

A serious flaw in Zoom’s Keybase secure chat application left copies of images contained in secure communications on Keybase users’ computers after they were supposedly deleted. The post Exclusive: Flaws in Zoom’s...

Read more
News
Episode 201: Bug Hunting with Sick Codes

The work of vulnerability research has changed a lot in the last two decades. In this episode, Security Ledger Podcast host Paul Roberts chats with the independent researcher known as “Sick...

Read more