Katie Moussouris

Katie Moussouris on the Latest Wassenaar Arrangement Rules

Threatpost editor Mike Mimoso talks to HackerOne chief policy officer Katie Moussouris about the U.S. implementation of the Wassenaar Arrangement rules and where things stand close to seven months after the initial draft was pulled off the table for a rewrite.

Steve Adegbite

Steve Adegbite on Data Integrity

Mike Mimoso talks with Steve Adegbite, Chief Information Security Officer at ETRADE, about data integrity and some of the challenges he encounters when it comes to encrypting data and dealing with third-party access to data.

At last week’s Security Analyst Summit Kris McConkey, part of PricewaterhouseCoopers’ UK Cyber Threat Operations team, discusses OpSec failures: How attackers are still humans and make mistakes like sometimes using personal email addresses and real names in their campaigns.

Trey Ford from Project Sonar describes the group’s initiative at Kaspersky’s Security Analyst Summit. The Rapid 7 service scans public-facing networks for apps, software, and hardware, then analyzes that cache of information to gain insight to trends and common vulnerabilities.

As 2013 comes to a close, security experts are looking back at the major stories and developments of the year, including the Edward Snowden NSA leaks and major malware attacks. In this video, Vitaly Kamluk of Kaspersky Lab examines the biggest security news of 2013 and talks about the lasting effects they may have.

When news of the Android master-key vulnerability began leaking out in early July, details were hard to come by, and that was done intentionally. The researchers at Blue Box Security, a mobile-security start-up, had discovered the vulnerability and were planning to disclose the details of the bug in a presentation at the Black Hat USA 2013 conference.

When Gen. Keith Alexander, the director of the National Security Agency and chief of U.S. Cyber Command, agreed to deliver the opening keynote at Black Hat USA 2013, he had no idea that by the time he took the stage many of the NSA’s most secret information-collection programs would be public knowledge, thanks to Edward Snowden.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.