The Security Ledger Podcast
Latest Episodes
Spotlight Podcast: Synopsys’ Dan Lyon on the Challenge of Securing Connected Medical Devices
In this Spotlight Podcast, sponsored by Synopsys: In the wake of a presentation at Black Hat about security flaws in implantable pace maker devices, Synopsys Principal Consultant Dan Lyon joins us to talk about why medical device makers struggle to mak...
Episode 108: DEF CON’s Car Hacking Village and is the Open Source Model Failing on Security
In this week’s podcast (#108), sponsored by CA Veracode: hacker summer camp wrapped up on Sunday, as the 26th annual DEF CON conference concluded at Caesar’s Palace in Las Vegas. Hacks of connected and smart vehicles were a big theme again this year.
Special Black Hat Coverage: Google’s Parisa Tabriz Says Don’t Be A Jerk
In this special Black Hat edition of the Podcast, sponsored by UL: Parisa Tabriz, Google’s Director of Engineering for the Chrome Web browser, brought some strong medicine to Las Vegas for her Black Hat keynote speech.
Episode 107: What’s Hot at Black Hat & does DHS need its new Risk Management Center?
In this episode of The Security Ledger Podcast (#107): Hacker Summer Camp takes place in Las Vegas this week as the Black Hat, DEFCON and B-Sides conferences take place. We’re joined by DigiCert Chief Technology Officer Dan Timpson to talk about the pr...
Spotlight Podcast: CSS on why Crypto Agility is the Key to Securing Internet of Things Identities
In this Spotlight Edition of the Security Ledger Podcast: identity is at the root of many of the security problems facing the Internet of Things, from vulnerable and “chatty” endpoints to a lack of robust update and lifecycle management features.
Episode 106: Election Trolls Are Afoot. We Talk To The Guy Who Watches Them
In this episode of The Security Ledger Podcast (#106): with the November midterm elections in the U.S. fast approaching, election related shenanigans have already cropped up in connection with contested races in swing states,
Breaking the Ice on DICE: scaling secure Internet of Things Identities
In this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of solving a range of security and ide...
Episode 105: Is Trolling a Human Rights Abuse? Also: the Do’s and Dont’s of Ransomware Negotiation
In this week’s podcast: a report out last week from The Institute for the Future makes clear that state sponsored trolling has gone global and is now a go-to tool for repressive regimes worldwide, constituting a new form of human rights abuse.
Episode 104: Mueller’s Cyber Eye on the Russian Guys also Reaper Drone Docs Stolen
In this week’s episode of the podcast (#104): the Mueller indictment of 12 Russian GRU operatives for hacking the 2016 presidential election was a bombshell. It was also 30 pages long. We read it so you don’t have to and we’ll talk about the big take a...
Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?
Voice based interfaces are growing in popularity, complexity and influence. But securing these interfaces has, thus far, been an afterthought. If we are destined to interact with the smart systems around us using our voice,