Remove sponsor
article thumbnail

Spotlight Podcast: How Machine Learning is revolutionizing Application Fuzzing

The Security Ledger

In this Spotlight episode of the Podcast, sponsored* by ForAllSecure we speak with CEO David Brumley about application "fuzzing" and how advancements in machine learning technology are allowing security researchers to find more and more serious vulnerabilities faster. The challenge now, Brumley says, is to keep up with the machines.

article thumbnail

Episode 168: Application Security Debt is growing. Also: Web App Security in the Age of IoT

The Security Ledger

In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt. ZestAI’s Quest to make Artificial Intelligence Explainable Episode 164: Who owns the Data Smart Cars collect?

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 168: Application Security Debt is growing and Securing Web Apps in the Age of IoT

The Security Ledger

In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt. ZestAI’s Quest to make Artificial Intelligence Explainable Episode 164: Who owns the Data Smart Cars collect?

IoT 40
article thumbnail

Podcast Episode 137 Sponsored by Code42: GirlScouts to the Rescue and Rethinking Enterprise DLP

The Security Ledger

» Related Stories Podcast Episode 130: Troy Hunt on Collection 1 and Tailit’s Tale of IoT Security Redemption Days After Massive Breach, Marriott Customers Await Details Massive Marriott Breach Underscores Risk of overlooking Data Liability. This week’s episode of the podcast is sponsored by Code42. Read the whole entry. »

article thumbnail

Cybersecurity threats: what awaits us in 2023?

SecureList

Supply-chain will become more of a sweet spot for targeted ransomware and state-sponsored espionage campaigns. State-sponsored attacks will remain high in the threat landscape however, with no ease of geopolitical tensions with Russia, China, North Korea, and Iran in sight. IoT Vulnerabilities.

article thumbnail

Cybersecurity in 2022, Predictions for digital ecosystem facing more challenges and sophisticated threats

CyberSecurity Insiders

Also, that threat actors, especially state-sponsored, and criminal enterprises would take advantage of the expanding cyber-attack surface by using their resources to employ more sophisticated means for discovering target vulnerabilities, automating phishing, and finding new deceptive paths for infiltrating malware. OT/IT and IoT convergence.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Byron: Since I started, the cyber threat landscape has grown exponentially, with more sophisticated attacks and diverse attackers ranging from individual hackers to professional criminal rings to state-sponsored entities. Erin: What role should governments play in combating cybercrime?