Podcast Episodes

Back to Search
Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs
Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older …

7 years, 8 months ago

Short Long
View Episode
Episode 29: Reducing Your Attack Surface: From a Firehose to a Straw
Episode 29: Reducing Your Attack Surface: From a Firehose to a Straw

Following news that a database containing 340 million records has been publicly exposed to the internet, Richard Gold and Simon Hall join Michael Mar…

7 years, 9 months ago

Short Long
View Episode
Episode 28: Diversity in Security and Women’s Network Launch
Episode 28: Diversity in Security and Women’s Network Launch

Libby Fiumara is joined by Rose Bernard and Sophie Burke to discuss the launch of Digital Shadows’ Women’s Network, challenges facing women in securi…

7 years, 9 months ago

Short Long
View Episode
Episode 27: Attribution: The How, The What and The Why
Episode 27: Attribution: The How, The What and The Why

Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables…

7 years, 9 months ago

Short Long
View Episode
Episode 26: Mythbusting Vulnerabilities and Exploits
Episode 26: Mythbusting Vulnerabilities and Exploits

Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execut…

7 years, 9 months ago

Short Long
View Episode
Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach
Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach

In this edition of Shadow Talk, Richard Gold joins us to discuss the issue of security debt, a term used to refer to the accumulation of security ris…

7 years, 9 months ago

Short Long
View Episode
Episode 24: Seize and Desist: Changes in the cybercriminal underground
Episode 24: Seize and Desist: Changes in the cybercriminal underground

Rafael Amado and Michael Marriott discuss how the criminal underground has evolved since the demise of AlphaBay and Hansa. No single marketplace has …

7 years, 9 months ago

Short Long
View Episode
Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics
Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics

In today’s edition of Shadow talk, Dr Richard Gold joins us to discuss the return of the L0pht hackers. In 1998 the L0pht members delivered a cyberse…

7 years, 9 months ago

Short Long
View Episode
Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript & Spectre vulns
Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript & Spectre vulns

In this week’s Shadow Talk, the pod unpacks the reporting on VPN Filter, a malware affecting half a million network devices. Reports have suggested t…

7 years, 10 months ago

Short Long
View Episode
Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks
Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks

In this week’s episode of Shadow Talk, Digital Shadows’ Head of Security Engineering, Dr Richard Gold, joins the pod to explain the EFAIL vulnerabili…

7 years, 10 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us