
Risky Business #729 -- Why patching faster won't save us
Risky Business
Cybersecurity Vulnerabilities and Response Strategies
The chapter covers a range of cybersecurity issues, including a bug in an open-source file storage cloud solution, recent cyber attacks like the Citrix bleed incident, disruptions in the supply chain, and payment processor challenges from Alpha V group. It emphasizes the importance of incident response, building resilient systems, and modern protections for memory corruption bugs. The discussion also revolves around the need for innovative network security approaches and the tech industry's responsibility in addressing vulnerabilities and improving defense mechanisms against cyber threats.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.