The Security Ledger
6,056 FOLLOWERS
The Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
The Security Ledger
3w ago
Keyless lock maker Digilock withdrew a cease and desist order and allowed a DEF CON talk on security flaws in its devices to move forward. Other device makers should take note!
The post A Digital Lock Maker Tried To Squash A DEF CON Talk. It Happened Anyway. Here’s Why. appeared first on The Security Ledger with Paul F. Roberts.
Related Stories
Black Hat: Colin O’Flynn On Hacking An Oven To Make It Stop Lying
Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement
Security Teams Lean Into AI As Cyber Worker Shortage Persists ..read more
The Security Ledger
3M ago
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks.
The post Spotlight Podcast: OT Is Under Attack. Now What? appeared first on The Security Ledger with Paul F. Roberts.
Click the icon below to listen.
Related Stories
Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk
Citing Attacks On Small Utilities, Dragos Launches Community Defense Program
Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement ..read more
The Security Ledger
4M ago
Cybersecurity is crucial in supply chains, where risks can affect all connected parties. U.S. companies must now ensure compliance with evolving standards like the DoD's CMMC, affecting over 200,000 contractors and their suppliers. With significant consequences and substantial government contracts at stake, effective risk management and rigorous...
Read the whole entry... »
Related Stories
Malicious Python Packages Target Crypto Wallet Recovery Passwords
Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement
FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical ..read more
The Security Ledger
5M ago
In this episode of The Security Ledger Podcast (#257) Paul speaks with Dennis Kengo Oka, a senior principal automotive security strategist at the firm Synopsys about the growing cyber risks to automobiles as connected vehicle features proliferate in the absence of strong cybersecurity protections.
The post Episode 257: Securing Software on Wheels...
Read the whole entry... »
Click the icon below to listen.
Related Stories
Episode 257: Securing Software on Wheels with
Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement
Episode 256: Recursive Pollution? Data Feudalis ..read more
The Security Ledger
6M ago
In this episode of The Security Ledger Podcast (#257) Paul speaks with Dennis Kengo Oka, a senior principal automotive security strategist at the firm Synopsys about the growing cyber risks to automobiles as connected vehicle features proliferate in the absence of strong cybersecurity protections.
The post Episode 257: Securing Software on Wheels...
Read the whole entry... »
Click the icon below to listen.
Related Stories
Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement
Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity
Citing Attack ..read more
The Security Ledger
6M ago
A newly discovered campaign pushing malicious open source software packages is designed to steal mnemonic phrases used to recover lost or destroyed crypto wallets, according to a report by ReversingLabs.
The post Malicious Python Packages Target Crypto Wallet Recovery Passwords appeared first on The Security Ledger with Paul F. Roberts.
Related Stories
BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency
Researcher finds malicious packages lurked on npm for months
The surveys speak: supply chain threats are freaking people out ..read more
The Security Ledger
7M ago
Paul speaks with Gary McGraw of the Berryville Institute of Machine Learning (BIML), about the risks facing large language model machine learning and artificial intelligence, and how organizations looking to leverage artificial intelligence and LLMs can insulate themselves from those risks.
The post Episode 256: Recursive Pollution? Data...
Read the whole entry... »
Click the icon below to listen.
Related Stories
BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency
China Calls Out U.S. For Hacking. The Proof? TBD!
Episode 254: Dennis Giese’s Revolutionary ..read more
The Security Ledger
7M ago
The Chinese government is taking an aggressive approach to countering stories of Chinese cyber offensive campaigns: promoting tales of US hacks on Chinese organizations, but without the data to back them up.
The post China Calls Out U.S. For Hacking. The Proof? TBD! appeared first on The Security Ledger with Paul F. Roberts.
Related Stories
BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency
Citing Attacks On Small Utilities, Dragos Launches Community Defense Program
FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries ..read more
The Security Ledger
8M ago
In this episode of The Security Ledger Podcast (#255) host Paul Roberts interviews Niels Provos of Lacework about his mission to use EDM to teach people about cybersecurity.
The post Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos appeared first on The Security Ledger with Paul F. Roberts.
Click the icon below to listen.
Related Stories
Citing Attacks On Small Utilities, Dragos Launches Community Defense Program
FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries
BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency ..read more
The Security Ledger
9M ago
Security researcher and IoT hacker Dennis Giese talks about his mission to liberate robot vacuums from the control of their manufacturers, letting owners tinker with their own devices and - importantly - control the data they collect about our most intimate surroundings.
The post Episode 254: Dennis Giese’s Revolutionary Robot Vacuum...
Read the whole entry... »
Click the icon below to listen.
Related Stories
Black Hat: Colin O’Flynn On Hacking An Oven To Make It Stop Lying
Episode 250: Window Snyder of Thistle on Making IoT Security Easy
Episode 251: Kry10 CEO Boyd Multerer on building ..read more