AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
SISA issued an emergency directive for US government agencies to disconnect their YoVanti appliances due to pervasive targeting of the network edge by adversaries to gain access to credentials. Agencies are required to disconnect, upgrade, deploy patches, reset and rotate credentials, and perform persistent hunting to assess compromise, as assuming targeting and compromise is crucial.
SISA emphasized moving beyond reactive responses towards vulnerable edge devices, acknowledging the unsustainable nature of chasing vulnerabilities perpetually. There is a call to wipe out classes of known vulnerabilities pre-production, such as SQL injection, path traversal, and memory safety issues, to enhance trust and safety in technology products.
While recognizing the challenge in shifting accountability to product vendors, SISA believes that organizations hurt by insecure technology, as customers, can influence vendors to prioritize secure products. Shifting focus from blaming victims for patching failures to holding vendors accountable for addressing prevalent vulnerability classes aims to drive scalable security solutions.
SISA acknowledges the ambitious nature of the goal to encourage vendors to prioritize secure products. The focus on medium to long-term solutions aims to foster a dialogue that pushes vendors to address common vulnerability classes to reduce intrusions and enhance product security.
The scenario of a multinational company experiencing a $25 million fraud attributed to deep fake video calls raises skepticism due to the advanced technology required for real-time interactive video deep fakes. The case prompts questions about the credibility of the employee's claim and underscores the evolving challenges posed by sophisticated fraud tactics.
Efforts towards improving cybersecurity involve various strategies, including the implementation of the zero trust executive order. While transitioning to a zero trust architecture may take time, immediate actions like tagging vulnerabilities with Common Weakness Enumeration (CWE) codes can enhance risk decisions. Federal agencies are investing in zero trust controls, such as enforcing least privilege, securing administrator accounts, and utilizing multi-factor authentication to strengthen security measures.
Developing sustainable public-private partnerships in cybersecurity presents challenges, such as staffing issues and external scrutiny. Despite complexities, progress has been made in establishing continuous collaboration channels between government and private sectors. Enhanced communication and joint planning are key to anticipating and mitigating cyber risks more effectively. Emphasizing reciprocal value and building trust are crucial aspects for sustaining collaborative efforts in the evolving threat landscape.
In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They talk about:
This week’s feature guest is Eric Goldstein, the executive assistant director for cybersecurity at CISA. He’s joining the show to talk about CISA’s demand that US government agencies unplug their Ivanti appliances. He also chimes in on why the US government is so rattled by Volt Typhoon and addresses a recent report from Politico that claims CISA’s Joint Cyber Defense Collaborative is a bit of a shambles.
This week’s sponsor guest is Dan Guido from Trail of Bits. He joins us to talk about their new Testing Handbook. Trail of Bits does a bunch of audit work and they’ve committed to trying to make bug discovery a one time thing – if you find that bug once, you shouldn’t have to manually find it on another client engagement. Semgrep for the win!
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode