Report Finds Lack of Talent, Tools Frustrates Cyber Investigations
The Security Ledger
by Farwa Sajjad
17h ago
Firms face challenges in combating sophisticated cyber attacks due to a shortage of skilled workers and complex, costly investigative tools. A report by Command Zero highlights the acute need for cybersecurity talent, especially for cloud platforms. Organizations struggle with tool integration and lack standardized processes, complicating cyber... Read the whole entry... » Related Stories Security Teams Lean Into AI As Cyber Worker Shortage Persists Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape Malicious Python Packages Target Crypto Wallet Recovery Passwords ..read more
Visit website
A Digital Lock Maker Tried To Squash A DEF CON Talk. It Happened Anyway. Here’s Why.
The Security Ledger
by Paul Roberts
1M ago
Keyless lock maker Digilock withdrew a cease and desist order and allowed a DEF CON talk on security flaws in its devices to move forward. Other device makers should take note! The post A Digital Lock Maker Tried To Squash A DEF CON Talk. It Happened Anyway. Here’s Why. appeared first on The Security Ledger with Paul F. Roberts. Related Stories Black Hat: Colin O’Flynn On Hacking An Oven To Make It Stop Lying Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement Security Teams Lean Into AI As Cyber Worker Shortage Persists ..read more
Visit website
Spotlight Podcast: OT Is Under Attack. Now What?
The Security Ledger
by Paul Roberts, Paul F. Roberts
3M ago
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. Now What? appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related Stories Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk Citing Attacks On Small Utilities, Dragos Launches Community Defense Program Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement ..read more
Visit website
Screening Your Supply Chain: How Far Will You Go For Cybersecurity?
The Security Ledger
by Edward Tuorinsky
4M ago
Cybersecurity is crucial in supply chains, where risks can affect all connected parties. U.S. companies must now ensure compliance with evolving standards like the DoD's CMMC, affecting over 200,000 contractors and their suppliers. With significant consequences and substantial government contracts at stake, effective risk management and rigorous... Read the whole entry... » Related Stories Malicious Python Packages Target Crypto Wallet Recovery Passwords Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical ..read more
Visit website
Episode 257: Securing Software on Wheels with Dennis Kengo Oka of Synopsys
The Security Ledger
by Paul Roberts, Paul F. Roberts
5M ago
In this episode of The Security Ledger Podcast (#257) Paul speaks with Dennis Kengo Oka, a senior principal automotive security strategist at the firm Synopsys about the growing cyber risks to automobiles as connected vehicle features proliferate in the absence of strong cybersecurity protections. The post Episode 257: Securing Software on Wheels... Read the whole entry... » Click the icon below to listen. Related Stories Episode 257: Securing Software on Wheels with Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement Episode 256: Recursive Pollution? Data Feudalis ..read more
Visit website
Episode 257: Securing Software on Wheels with
The Security Ledger
by Paul Roberts, Paul F. Roberts
6M ago
In this episode of The Security Ledger Podcast (#257) Paul speaks with Dennis Kengo Oka, a senior principal automotive security strategist at the firm Synopsys about the growing cyber risks to automobiles as connected vehicle features proliferate in the absence of strong cybersecurity protections. The post Episode 257: Securing Software on Wheels... Read the whole entry... » Click the icon below to listen. Related Stories Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity Citing Attack ..read more
Visit website
Malicious Python Packages Target Crypto Wallet Recovery Passwords
The Security Ledger
by Paul Roberts
6M ago
A newly discovered campaign pushing malicious open source software packages is designed to steal mnemonic phrases used to recover lost or destroyed crypto wallets, according to a report by ReversingLabs. The post Malicious Python Packages Target Crypto Wallet Recovery Passwords appeared first on The Security Ledger with Paul F. Roberts. Related Stories BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency Researcher finds malicious packages lurked on npm for months The surveys speak: supply chain threats are freaking people out ..read more
Visit website
Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity
The Security Ledger
by Paul Roberts, Paul F. Roberts
7M ago
Paul speaks with Gary McGraw of the Berryville Institute of Machine Learning (BIML), about the risks facing large language model machine learning and artificial intelligence, and how organizations looking to leverage artificial intelligence and LLMs can insulate themselves from those risks. The post Episode 256: Recursive Pollution? Data... Read the whole entry... » Click the icon below to listen. Related Stories BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency China Calls Out U.S. For Hacking. The Proof? TBD! Episode 254: Dennis Giese’s Revolutionary ..read more
Visit website
China Calls Out U.S. For Hacking. The Proof? TBD!
The Security Ledger
by Paul Roberts
7M ago
The Chinese government is taking an aggressive approach to countering stories of Chinese cyber offensive campaigns: promoting tales of US hacks on Chinese organizations, but without the data to back them up. The post China Calls Out U.S. For Hacking. The Proof? TBD! appeared first on The Security Ledger with Paul F. Roberts. Related Stories BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency Citing Attacks On Small Utilities, Dragos Launches Community Defense Program FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries ..read more
Visit website
Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos
The Security Ledger
by Paul Roberts, Paul F. Roberts
8M ago
In this episode of The Security Ledger Podcast (#255) host Paul Roberts interviews Niels Provos of Lacework about his mission to use EDM to teach people about cybersecurity. The post Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related Stories Citing Attacks On Small Utilities, Dragos Launches Community Defense Program FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency ..read more
Visit website

Follow The Security Ledger on FeedSpot

Continue with Google
Continue with Apple
OR