BTS #15 - Reverse Engineering BMCs and Other Firmware - Vladyslav Babkin

BTS #15 – Reverse Engineering BMCs and Other Firmware – Vladyslav Babkin

| | Podcasts
Show Notes The post BTS #15 - Reverse Engineering BMCs and Other Firmware - Vladyslav Babkin appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...

Crowdsourced Security-as-a-Service

TechSpective Podcast Episode 119   If you want to prevent threat actors from infiltrating or compromising your environment, it helps to see things from the threat actor perspective. This concept has been ...
How 'clean code' reinforces DevOps, CI/CD by Byron Acohido

Black Hat Fireside Chat: Why using ‘Clean Code’ is paramount in speedy software development

Clean Code’ is a simple concept rooted in common sense. This software writing principle cropped up some 50 years ago and might seem quaint in today’s era of speedy software development. Related: ...
Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again

Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again

In this episode, we discuss the Mozilla Foundation’s alarming report that reveals why cars are the top privacy concern. Modern vehicles, equipped with data-collecting tech, pose significant risks to consumers’ privacy, with ...
BTS #14 - Protecting The Federal Supply Chain - John Loucaides

BTS #14 – Protecting The Federal Supply Chain – John Loucaides

| | Podcasts
Show Notes: https://securityweekly.com/bts-14 Watch Subscribe The post BTS #14 - Protecting The Federal Supply Chain - John Loucaides appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...

Visibility Without Context Is Just Noise

TechSpective Podcast Episode 117   “You can’t protect what you can’t see.” The first time someone said that, I am sure it was very profound. It is an obvious statement, but also ...
Is My Boss Going to Replace Me with AI, Instagram Painting Scam, Kia and Hyundai TikTok Challenge

Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge

In this episode, we explore the growing trend of AI surveillance in corporations, where cutting-edge technology is used to monitor employees, optimize productivity, and raise ethical concerns. Next, we uncover a disturbing ...
The inevitable rise of robust API security by Byron Acohido

Black Hat Fireside Chat: In a hyper-connected world, effectively securing APIs is paramount

APIs. The glue of hyper connectivity; yet also the wellspring of risk. Related: The true scale of API breaches I had an enlightening discussion at Black Hat USA 2023 with Traceable.ai Chief ...

Driving Security Culture and Best Practices

TechSpective Podcast Episode 117   Cybersecurity used to be more of a mystical dark art, but over time, businesses and individuals have come to understand just how critical cybersecurity is, and cybersecurity ...