Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...

Reducing Risk and Building Trust with Data Privacy

TechSpective Podcast Episode 113   Do you have a right to privacy? Should you–as a consumer or individual–have control over your personal data, which companies are allowed to collect or access it, ...
How SMS toll fraudsters plunder businesses by Byron Acohido

FIRESIDE CHAT: Outrageous phone bills stun businesses targeted for ‘SMS toll fraud’

SMS toll fraud is spiking. I learned all about the nuances of deploying – and defending – these insidious attacks in a recent visit with Arkose Labs CEO, Kevin Gosschalk, who explained ...

Granting the Right Access at the Right Time to Get the Job Done Securely

TechSpective Podcast Episode 111   Identity plays a pivotal role for cybersecurity. Threat actors have a variety of tools and methods to crack and compromise credentials, which is why many attacks are–from ...
FTC's Complaint Against Ring, Detecting Malware Infected Apps, America's Most Cybersecure Companies

The FTC’s Complaint Against Ring, Detecting Malware Infected Apps, America’s Most Cybersecure Companies

The FTC charged Ring, the Amazon-owned home security camera company, for compromising customer privacy and having inadequate security measures. Employees accessed private videos, while hackers exploited vulnerabilities and now Ring needs to ...
How to trust open source software: A conversation with OpenSSF's Naveen Srinivasan

How to trust open source software: A conversation with OpenSSF’s Naveen Srinivasan

For software engineers to keep up with the pace of software delivery in the world of continuous delivery/continuous integration (CI/CD), they rely on open source codebases to meet deadlines and create a ...