AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Rethinking Access Control in Vulnerable Technologies
This chapter explores the common misconception that authentication is sufficient for access control, particularly in the realm of vulnerable technologies. It highlights innovative tools and strategies for implementing robust access control measures, especially for overlooked systems like IP cameras and firewalls.
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
This week’s episode is sponsored by Greynoise. The always excitable Andrew Morris joins to remind us that the edge-device vulnerabilities Pat and Adam complain about on the show are in fact actually even worse than we make them out to be. Andrew also tells us about a zero-day Greynoise’ AI system truffle-pigged out of their data set.
This episode is also available on Youtube.
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode