Category Archives: Podcasts

Contrarisk Security Podcast #0036: Securing the Internet of Things

» Listen or download now on the podcasts page » Connected devices – or the Internet of Things (IoT) if you prefer – is a reality now. As Cesare Garlati of the prpl Foundation explains in this interview, we’ve been through a “major wave of evolution”, heading towards a situation in which all electronic devices are likely to have some sort… Read more »

Contrarisk Security Podcast #0035: Security guarantees

» Listen or download now on the podcasts page » Security products and services never seem to come with guarantees. You have to take it on trust that they will do the job they claim to do. And if not? Well, try the next one. WhiteHat Security is following the example of vendors in other business areas and offering a guarantee… Read more »

Contrarisk Security Podcast #0033: DDoS and information security

» Listen or download on the podcasts page » For a long time, the trends in DDoS have been towards a higher frequency of attacks and larger aggregate attacks. But more recently, there has been a significant trend towards the use of DDoS as part of multi-vector attacks, as a masking agent or enabling vector, where the intent has not been… Read more »

Contrarisk Security Podcast #0032: Smart buildings

» Listen or download on the podcasts page » The Internet of Things is truly upon us and all manner of devices are being Internet-enabled. Among these developments is the appearance of the so-called ‘smart building’, with web-based interfaces being used to control heating, lighting, safety and security systems and more. Adding Internet interfaces allows for remote management and reporting, and… Read more »

Contrarisk Security Podcast #0031: smarter alerts

» Listen or download now on the podcasts page » Attacks keep coming, and the number  of data breach stories we read in the media shows how often they are successful. We have to assume that any organisation of a reasonable size has monitoring and defence systems, in place so what’s going wrong? Of course, organisations invariably claim that the attack… Read more »

Contrarisk Security Podcast #0030: Identity and privacy

» Listen or download now on the podcasts page » With the Internet now playing such as intrinsic part of our lives, identity management (IM) has entered a new world. As Daniel Raskin, VP of marketing at ForgeRock, explains in this interview, what was once a simple matter of allowing employees to authenticate themselves on a local network has moved out… Read more »

Contrarisk Security Podcast #0029: Vulnerability monitoring

» Listen or download now on the podcasts page » Is the real threat to our security APTs or apathy? We all know that the software on our systems contains vulnerabilities and needs constant patching. And malware generally attacks well-known vulnerabilities that we have the ability to fix. So why isn’t it done? “If you can implement a good vulnerability management programme,… Read more »

Contrarisk Security Podcast #0028: The mobile menace

» Listen or download now on the podcasts page » Judging by the warnings issued by security vendors, you’d be forgiven for thinking that there’s a malware epidemic on the Android platform. The truth, according to Sean Newman, security evangelist at Sourcefire (now part of Cisco), is somewhat more nuanced. In this interview he explains how the number of published vulnerabilities… Read more »

Contrarisk Security Podcast #0027: Masking sensitive data

» Listen or download now on the podcast page » There’s lots of talk about putting security close to the data. One way of doing this is data masking, which obscures or modifies data as it is used according to a set of rules. In this interview, Amit Walia of Informatica explains how data masking means that people see only the data… Read more »

Contrarisk Security Podcast #0026: Evolving DDoS

» Listen or download now on the podcasts page » Distributed Denial of Service (DDoS) attacks have been with us for a long time. But is the nature of the attacks evolving, and how is this presenting new threats? We’re all too familiar with DDoS being exploited for hacktivism, political purposes and for extortion. But, in this interview, Dave Larson, CTO of… Read more »