The Security Ledger Podcast
Latest Episodes
Episode 224: Engineering Trust In The Cyber Executive Order
In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Thomas Hardjono and Henk Birkholz join us to talk about President Biden’s Cyber Executive Order and how the EO’s call fo
Episode 223: CISA Looks To Erase The Security Poverty Line
In this week’s episode of the podcast (#223), we are joined by Josh Corman and Lisa Young of the COVID task force at CISA to talk about the agency’s work to improve the security of critical sectors of
Episode 222: US Rep. Himes on Congress’s About-face on Cybersecurity
In this week’s podcast, we speak with Congressman Jim Himes (D-CT) about Congress’s sudden focus on cybersecurity - an about face that Rep. Himes says was encouraged by the devastating Colonial Pipeli
Spotlight: Securing the Great Resignation with Code 42
Mark Wojtasiak, the Vice President of Security Industry research at Code42 joins us to talk about how companies can handle the security risks that accompany the COVID-inspired “great resignation” in c
Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee
With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee.
Encore Podcast: Is Autonomous Driving Heading for a Crash?
Elon Musk is a big fan of his company’s Fully Self Driving software. But is it safe? In this encore edition of the podcast from 2018, we speak with Beau Woods of The Atlantic Council about the risks o
Episode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoT
In this episode of the podcast, sponsored by Trusted Computing Group we dig deep on this week’s ransomware attack on the Kaseya IT management software with Adam Meyers of CrowdStrike and Frank Breedij
Episode 219: LGBTQ+Cyber – A Pride Month Conversation On Being Queer In Infosec
In this week’s episode of the podcast (#219) we speak with four cybersecurity professionals about what it means to be Queer in the industry: their various paths to the information security community,
Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture
Forget about Colonial Pipeline and JBS. A coordinated cyber attack on U.S. agriculture could, in short order, lead to foot shortages and hunger in the U.S. and abroad. And history has shown us that wh
Episode 217: What Fighting Pirates Teaches Us About Ransomware
Criminal gangs swoop in on unsuspecting merchants to seize their goods. Behind the scenes, rival nations turn a blind eye or offer them safe harbor, in exchange for cooperation. Sound familiar? It sho