Other News

Laptop with Code on it

Spotlight Podcast: How Machine Learning is revolutionizing Application Fuzzing

In this Spotlight episode of the Podcast, sponsored* by ForAllSecure we speak with CEO David Brumley about application “fuzzing” and how advancements in machine learning technology are allowing security researchers to find more and more serious vulnerabilities faster. The challenge now, Brumley says, is to keep up with the machines.

Working the phones at a campaign

Episode 175: Campaign Security lags. Also: securing Digital Identities in the age of the DeepFake

In this episode of The Security Ledger Podcast (Episode #175), sponsored by Digicert: its been three years since the hacks made famous during the 2016 election, but online campaigns still struggle with basic security. Andrew Peterson of the firm Signal Sciences joins us to talk about why. Also: in part 2 of our podcast we’re joined by Dan Timpson, Chief Technology Officer at Digicert to talk about the fast expanding terrain of securing online identities in an age of ubiquitous computing, deep fakes and connected devices.

artificial intelligence infographic

Opinion: AI and Machine Learning will power both Cyber Offense and Defense in 2020

Artificial intelligence and machine learning hold great promise for both defenders and attackers, making it one of the most important security trends to follow in 2020, says Gerald Beuchelt, the CISO of LogMeIn.*

Episode 174: GE’s Very Bad Day – Unpacking the MDHex Vulnerabilities

The U.S. Department of Homeland Security warned of critical vulnerabilities in a range of products by GE. We speak with Elad Luz, the head of research at CyberMDX, which discovered the holes.

Hawaii Missile Alert

Seven Years Later, Scores of EAS Systems sit Un-patched, Vulnerable

Two years after a false EAS alert about an incoming ICBM sowed terror in Hawaii, and seven years after security researchers warned about insecure, Internet connected Emergency Alert System (EAS) hardware, scores of the devices across the U.S. remain un-patched and vulnerable to cyber attack, according to security experts.