Wrap-up: Final Episode of Security Voices
Security Voices
by Security Voices
2M ago
After 5 seasons, it’s curtain call for Security Voices. In this final episode, Jack and I reflect on half a decade of podcasting together through times that were both extraordinary for the world and for each of us personally. We discuss some of our favorite moments, most memorable guests, and the lessons learned from roughly 60 episodes of exploring the unique personalities and stories of cybersecurity. At around 40 minutes, our last pod is more short and sweet than long, tearful farewell. The Security Voices website will continue to be up for the foreseeable future so that it can be happily ..read more
Visit website
The Hidden Dangers of Generative AI: Who is Responsible for Protecting our Data?
Security Voices
by Security Voices
2M ago
The breakaway success of ChatGPT is hiding an important fact and an even bigger problem. The next wave of generative AI will not be built by trawling the Internet but by mining hordes of proprietary data that have been piling up for years inside organizations. While Elon Musk and Reddit may breathe a sigh of relief, this ushers in a new set of concerns that go well beyond prompt injections and AI hallucinations. Who is responsible for making sure our private data doesn’t get used as training data? And what happens if it does? Do they even know what’s in the data to begin with? We tagged in da ..read more
Visit website
Threat modeling life: Prepping for the rest of us with Michal Zalewski (lcamtuf)
Security Voices
by Security Voices
2M ago
Hidden bunkers, stacks of canned food and piles of artillery. Disaster preparedness has become an Internet meme and these are some of the “prepper” community’s showcase images. But most of us who have lived through the recent pandemic, the Capital insurrection on January 6th and more no longer take the threat of a major disaster lightly. For those of us not willing or able to dig out a backyard bunker, is there a rational middleground where we can feel well-prepared for whatever comes next? Software security legend Michal Zalewski (lcamtuf) answers this question and many others in his third b ..read more
Visit website
Massive Stakes & Undersized Budgets: Roundtable on Life After the Joe Sullivan Conviction
Security Voices
by Security Voices
2M ago
The winds of change are always blowing in cybersecurity, but there’s moments when they reach a gale force, When the landscape is reshaped dramatically by an event that hits us like a hurricane, changing how we feel about our jobs, our industry, and perhaps even shaking our resolve to continue on in the same career path. When Joe Sullivan, former head of security for Uber, was found guilty of concealing a breach in early October the effect was immediate. No matter how you felt about Joe or the court case itself, the implications for security leaders— and especially those at public companies— we ..read more
Visit website
Hard Knocks: Tomás Maldonado, CISO of the NFL
Security Voices
by Security Voices
2M ago
Imagine you’re walking past the sports book in Las Vegas. People are betting on baseball, horses, and the usual fare. Something catches your eye, you look more closely and you can’t believe your eyes. People are betting on whether or not you're going to fail at doing your job this week! While this may sound far-fetched, this exact scenario played out for Tomas Maldonado, the then freshly minted CISO of the National Football League when the 2020 NFL Draft shifted to a virtual format unexpectedly due to the pandemic. Across Las Vegas, people were betting on the probability of a cybersecurity ev ..read more
Visit website
The Compliance Episode - History, Theater & Industry-Reshaping Impact
Security Voices
by Security Voices
2M ago
First, a confession: this is the last episode we would have envisioned when we started Security Voices. Compliance was as mundane as it is mandatory– where’s the fun in that? Where’s the untold, fascinating story of the person who summited the tallest mountain? Rose from ashes to improbable success? In the short years that have passed since we started in early 2019, the world has changed dramatically. And so has compliance. From driving cyberinsurance premiums to becoming the security baseline for even startups to achieve in their early days, compliance is now an undeniable juggernaut. While ..read more
Visit website
Designing Category Smashing Businesses with Oliver Friedrichs (Phantom, Pangea)
Security Voices
by Security Voices
2M ago
For the second episode in a row, we’ve caught a seasoned entrepreneur at that perfect moment when they’ve started a new company but still have time for a conversation before their new adventure kicks into high gear. Oliver Friedrichs, founder of several security companies including Immunenet and Phantom, joins us to talk product strategy as he embarks on a new journey to disrupt the security industry once again with his new venture Pangea. The most critical, first question for any young company is “what are we making”? And equally important is the follow-on question of what category does the ..read more
Visit website
Pancakes & Machetes: A Dialogue with Lesley Carhart
Security Voices
by Security Voices
2M ago
There are few people, if any, who have given more of themselves to the cybersecurity community than Lesley Carhart. Our conversation with Lesley came immediately after the 3rd annual PancakesCon, a free conference she conceived with a unique “20 on, 20 off” format that celebrates who we are outside of work as much as what we accomplish as security professionals. In the fashion of a person who is both an incident response expert and a community organizer, the conference was pulled together in a frantic 11 days after Omicron wreaked havoc on Winter conference schedules and there was a gap Lesley ..read more
Visit website
Juggling Chainsaws: How Amanda Gorton fought Apple & the DMCA while building Corellium
Security Voices
by Security Voices
2M ago
Your fledgling startup has just been sued by one of the most powerful companies in the world. How do you defend yourself? And keep your company afloat? This was the challenge faced by Amanda Gorton, CEO of Corellium, a company whose virtualization platform enables efficient mobile security research and quality testing across a massive variety of devices. Sued by Apple for both copyright infringement and violation of the Digital Millennium Copyright Act (DMCA), Amanda was thrust into an exhausting balancing act of defending and running her young business at the same time. In this episode of Se ..read more
Visit website
All the Latest Cybersecurity Research, Summarized: Rebooting ThinkstScapes with Jacob Torrey
Security Voices
by Security Voices
2M ago
What if there was someone who could take all of the best security research over recent months and distill it down into the greatest hits? Sort of like a Spotify “Release Radar”, but for the best talks at conferences. There is. It’s not in Blinkist. It’s (back) at ThinkstScapes after a multiyear hiatus. And it’s now gloriously free. This episode of Security Voices covers the return of Thinkstscapes with Jacob Torrey who led the reboot of the now quarterly report. In the interview with Jack and Dave, Jacob explains how he and the team at Thinkst devour and summarize the very best security rese ..read more
Visit website

Follow Security Voices on FeedSpot

Continue with Google
Continue with Apple
OR