Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Chinese APT Group Exploits SOHO Routers
|
Apr 03, 2024 |
Securing Medical Devices with SBOMs
|
Mar 27, 2024 |
The LockBit Takedown: What We Know
|
Mar 15, 2024 |
The State of Software Supply Chain Security 2024
|
Feb 28, 2024 |
The State of Open Source Software Security
|
Oct 05, 2023 |
Apple Devices as a Growing Attack Vector
|
Sep 27, 2023 |
The Art of Security Chaos Engineering
|
Sep 20, 2023 |
Modern Risks to the Internet of Things and Software Supply Chains
|
Sep 13, 2023 |
Lemons & Liability: What it Means for Software Applications
|
Sep 06, 2023 |
Creating the Standard for Supply Chain Risk
|
Jun 21, 2023 |
How Do You Trust Open Source Software?
|
Jun 14, 2023 |
The State of Application Security
|
Jun 01, 2023 |
Red Teaming the Indian Government
|
May 23, 2023 |
SBOM skeptics and talks about the importance of software supply chain transparency
|
May 10, 2023 |
Malware & Software Supply Chain Security
|
Apr 27, 2023 |
Contextualizing the National Cybersecurity Strategy
|
Apr 26, 2023 |
The Future of Bug Bounties
|
Apr 19, 2023 |
The Road to Software Supply Chain Security Compliance
|
Mar 29, 2023 |
A Closer Look at the Enduring Security Framework’s Guidance
|
Jan 02, 2023 |
ZetaNile - Open Source Software Trojans
|
Jan 02, 2023 |
The Silent Epidemic of Business Email Compromise (BEC) Attacks
|
Jan 02, 2023 |
Don’t Sleep on SBOMs
|
Jan 02, 2023 |
Firmware Supply Chain Risks
|
Jan 02, 2023 |
Hunting Follina
|
Oct 03, 2022 |
Leveraging YARA
|
Oct 03, 2022 |
Lessons Learned from CI/CD Compromises
|
Oct 03, 2022 |
Déjà Vu: Uncovering Stolen Algorithms in Commercial Products
|
Oct 03, 2022 |
Not All Developers Can Be Security Jedis
|
Oct 03, 2022 |
IconBurst - The Newest Software Supply Chain Attack
|
Oct 03, 2022 |
Smash and Grab - AstraLocker Breach
|
Oct 03, 2022 |
Bryson Bort of Scythe.io talks Colonial Pipeline: Lessons Learned
|
Sep 08, 2022 |
Steve Lipner of SAFECODE on Supply Chain Security - Is It Even Possible?
|
Sep 08, 2022 |
Robert Martin of MITRE on Supply Chain System of Trust
|
Sep 08, 2022 |
Dependency Confusion As A Tool For Targeted NPM Hacks
|
Sep 08, 2022 |
Local Threat Intel - You're Soaking In It!
|
Sep 08, 2022 |
Emotet Unbound: Understanding the Risk
|
Sep 08, 2022 |
Putting Conti in Context
|
Sep 01, 2022 |
Cyberwar in Europe: Unpacking the Ukrainian Wipers
|
Sep 01, 2022 |