התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


1 LIVE: Before the Chorus & Open Folk Present: In These Lines feat. Gaby Moreno, Lily Kershaw & James Spaite 33:58
EP 66: Secure only the OT code that actually runs
Manage episode 493404694 series 3469998
Many organizations spend valuable security resources fixing vulnerabilities in code that never actually runs—an inefficient and often unnecessary effort. Jeff Williams, CTO and founder at Contrast Security, says that 62% of open source libraries included in software are never even loaded into memory, let alone executed. This means only 38% of libraries are typically active and worth prioritizing.
68 פרקים
Manage episode 493404694 series 3469998
Many organizations spend valuable security resources fixing vulnerabilities in code that never actually runs—an inefficient and often unnecessary effort. Jeff Williams, CTO and founder at Contrast Security, says that 62% of open source libraries included in software are never even loaded into memory, let alone executed. This means only 38% of libraries are typically active and worth prioritizing.
68 פרקים
כל הפרקים
×

1 EP 66: Secure only the OT code that actually runs 23:11

1 EP 65: Hacking Critical Infrastructure Through Supply Chains 30:22


1 EP 62: Defending the Unknown in OT Security 31:38

1 EP 61: Applying Zero Trust to OT systems 36:07

1 EP 60: Hacking Solar Power Inverters 39:21

1 EP 59: Automotive Hacking In Your Own Garage 36:15


1 EP 57: Strengthening Embedded Device Security with Cloud-Based SCADA 33:36

1 EP 56: Hacking OT and ICS in the Era of Cloud and Automation 42:19

1 EP 55: Building Secure Storage for Autonomous Vehicles 28:48

1 EP 54: From Cyber Chaos to Control: Lessons from a Kansas Water District 34:01

1 EP 53: Securing Smart OT Systems Already In The Field 31:17

1 EP 52: Hacking Cellular-Enabled IoT Devices 37:59

1 EP 51: Hacking High-Performance Race Cars 43:39

1 EP 50: Keeping The Lights On In Ukraine 44:07

1 EP 49: Hacking Android-Based ICS Devices 39:27

1 EP 48: The New Insider Threat: Hacking Corporate Office Devices 40:51


1 EP 46: Hacking Israeli-made Water Treatment Devices In Pennsylvania 33:34

1 EP 45: Laser Fault Injections on a Shoestring Budget 32:35

1 EP 44: Performing Security Assessments on ICS systems 34:16

1 EP 43: Hacking Large-Scale Off-Grid Solar Systems and Other Consumer IoT Devices 50:45

1 EP 41: Firmware SBOMs, Zero Trust, And IoT Truth Bombs 41:26

1 EP 40: Hacking IoT Surveillance Cameras For Espionage Operations 28:27

1 EP 39: Hacking Water Systems and the OT Skills Gap 40:20

1 EP 38: Regulating OT Data Breaches And Ransomware Reporting 42:50
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.