- CISO Series Newsletter
- Posts
- 08/02/22--When Does an Exaggeration Become a Lie?
08/02/22--When Does an Exaggeration Become a Lie?
When Does an Exaggeration Become a Lie?
On this week's episode of CISO Series Podcast we ask when does exaggeration cross the line into being a flat out lie?
Cyber Security Headlines you need to know include Samsung offering a Repair Mode to hide your data, a researcher discovers apps leaking Twitter keys, and Akamai disrupts Europes largest DDoS.
And please join us for this week's Super Cyber Friday "Hacking Open Source Security."
CISO Series Podcast
When Does an Exaggeration Become a Lie?
Mike Johnson and I welcome sponsored guest Anna Belak, director of thought leadership, Sysdig to discuss:
What are the questions a CISO should be able to answer?
How much dishonesty do you find in cybersecurity?
How does one LEAD a cloud migration?
What are some lies about machine learning that everyone needs to be aware of?
Thanks to our podcast sponsor, Sysdig
Best advice for a CISO
"Pick vendors that are great partners in addition to selling you a good product, especially when you're dealing with emerging technologies and new operating models." --Anna Belak, director of thought leadership, Sysdig
Listen to full episode of
Searching for what you heard?
We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.
Check out:
on
CISO Series Podcast
on
Defense in Depth
Overheard on Defense in Depth
"In our business, only the paranoid survive, and we have to have a mindset. The mindset of zero trust is really a philosophical journey on the continued application of least privilege, multifactor authentication, identity, and access management. The mindset of attack surface management is continuously at machine speed validating that you’re defending what you should be defending." -- Nick Shevelyov, former CSO, Silicon Valley Bank
Listen to full episode of
Play Pinball with Dave before Black Hat
This is just a
at the Pinball Hall of Fame in Las Vegas on Monday, August 8th, 2022, just before Black Hat begins. Host David Spark will try to get there early, so feel free to show up early. Come find Dave winning free games, beating a high score, or depressed he just drained three balls during a multi-ball.
Cyber Security Headlines
Top headlines for Tuesday, August 2, 2022:
Samsung offers Repair Mode to hide your data
Researcher discoveres apps leaking Twitter keys
Akamai disrupts Europes largest DDoS
to this episode.
or subscribe to the daily newsletter.
Join the LIVE "Week In Review" for
Cyber Security Headlines
this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering
.
or subscribe to the daily newsletter.
Thanks to our Cyber Security Headlines sponsor, HYAS
Super Cyber Fridays!
Half of Companies Don’t Have a Security Policy for Open Source Software
You don’t need to touch or use open source software directly for it to be a concern to your organization. Your proprietary applications are using open source software. As much as 90 percent of the code is open source.
Open source software is just like any software, it can have vulnerabilities that need to be patched. But what makes open source so unique and problematic is its ubiquity. If a universal open source tool, has a critical vulnerability, it can have a ripple effect, like log4j did, across many applications.
In addition, realizing that open source programs are so widely used, malicious attackers will often taint open source software and let its common use take care of the distribution.
In this video, Mic McCully, field strategist, Snyk and I discuss these issues and more with regard to open source software. It’s all just a preview for our event happening this Friday August 5th, 2022 for Super Cyber Friday. Our topic of discussion will be
Thanks to our Super Cyber Friday sponsor, Snyk