Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Security Weekly NewsSubscribe
DevOps, Cloud

SWN #77

October 27, 2020
Section 0

Sponsored By

sponsor
Visit https://securityweekly.com/bigid for more information!

This week, Dr. Doug talks IoT, Southern Comfort, Winston Privacy, backdoor wars, KashmirBlack, healthcare keeps getting hit, and Roger Hale from BigID joins us for Expert Commentary! This segment is sponsored by BigID. Visit https://securityweekly.com/bigid to learn more about them! Visit https://www.securityweekly.com/swn for all the latest episodes! Visit https://www.securityweekly.com/swn for all the latest episodes!

Full Episode Show Notes

‘KashmirBlack’ Botnet, Winston Privacy Vulns, IoT, & Roger Hale

None

Hosts

Doug White

Doug White – Professor

Guests

Roger Hale

Roger Hale – CSO

http://traffic.libsyn.com/sw-all/SWN_77_-_Roger_Hale-0_converted.mp3

Related

Encryption
OpenSSL vulnerability can ‘definitely be weaponized,’ NSA cyber director says

Derek B. JohnsonMarch 21, 2022

The flaw affects OpenSSL versions 1.02, 1.1.1, and 3.0, all of which have been patched. OpenSSL is a core component of Unix and Linux-based systems, and is also bundled into software applications that run on Windows.

Encryption
Here’s why EMV alone isn’t enough to protect fuel pump transactions

Ruston Miles February 15, 2022

Gas stations and convenience stores must adopt a layered approach based on EMV chips and point-to-point encryption.

Encryption
NSA gains new cybersecurity authorities over national security systems

Derek B. JohnsonJanuary 19, 2022

The White House memo places the NSA in a role similar to the one the Cybersecurity and Infrastructure Security Agency (CISA) plays among federal civilian agencies.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.