Below the Surface (Audio) - The Supply Chain Security Podcast

Patching, Evil AI, Supply Chain Breaches - BTS #64


Listen Later

Summary

In this episode, the hosts discuss various cybersecurity topics, including recent vulnerabilities in Fortinet products, the implications of supply chain breaches, the evolving role of AI in cybersecurity, and updates to the OWASP Top 10 list. They emphasize the importance of firmware security and the need for better visibility and standards in the industry. The conversation highlights the challenges faced by defenders in a rapidly changing threat landscape and the necessity for proactive measures to secure systems.

Takeaways

Fortinet vulnerabilities are critical and require immediate attention. Silent patches can lead to significant security risks. AI is being used by both attackers and defenders in cybersecurity. The OWASP Top 10 has been updated to include software supply chain failures. Firmware security is often overlooked but is essential for device safety. Supply chain breaches can have far-reaching implications for organizations. Visibility into firmware and device security is lacking in the industry. Standards for software security are necessary to protect against vulnerabilities. Defenders need better tools to combat evolving threats. The cybersecurity landscape is becoming increasingly complex and interconnected.

Chapters

00:00 Introduction and Technical Setup 03:08 Fortinet Vulnerabilities and Exploits 06:05 Public Exploits and Path Traversal Vulnerabilities 09:00 Chaining Vulnerabilities and Risk Assessment 11:50 Authentication and Vulnerability Scoring 15:04 Operational Complexity in Patch Management 17:55 Silent Patches and Their Implications 20:58 Challenges with Network Device Security 24:55 Cyber Insurance and Vulnerability Trends 27:58 The Impact of Silent Patches 30:46 End of Life Devices and Legacy Systems 34:58 Supply Chain Security and Source Code Theft 39:44 AI in Cybersecurity: Opportunities and Threats 47:17 Navigating AI's Guardrails and Malicious Use Cases 49:24 The Dilemma of AI and Harmful Intentions 52:44 The Need for Researcher Access to AI Tools 58:36 OWASP Top 10 Updates and Supply Chain Security 01:05:12 The Challenges of Firmware and Device Security

...more
View all episodesView all episodes
Download on the App Store

Below the Surface (Audio) - The Supply Chain Security PodcastBy Eclypsium

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings


More shows like Below the Surface (Audio) - The Supply Chain Security Podcast

View all
The Joe Rogan Experience by Joe Rogan

The Joe Rogan Experience

229,305 Listeners

The Ben Shapiro Show by The Daily Wire

The Ben Shapiro Show

153,606 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,010 Listeners

Security Weekly Podcast Network (Audio) by Security Weekly Productions

Security Weekly Podcast Network (Audio)

209 Listeners

LINUX Unplugged by Jupiter Broadcasting

LINUX Unplugged

268 Listeners

Risky Business by Patrick Gray

Risky Business

374 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

654 Listeners

Paul's Security Weekly (Audio) by Security Weekly Productions

Paul's Security Weekly (Audio)

16 Listeners

Destination Linux by TuxDigital Network

Destination Linux

89 Listeners

Smashing Security by Graham Cluley

Smashing Security

318 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,043 Listeners

Talkin' Bout [Infosec] News by Black Hills Information Security

Talkin' Bout [Infosec] News

92 Listeners

Three Buddy Problem by Security Conversations

Three Buddy Problem

61 Listeners

The AI Daily Brief: Artificial Intelligence News and Analysis by Nathaniel Whittemore

The AI Daily Brief: Artificial Intelligence News and Analysis

607 Listeners

Untitled Linux Show (Audio) by TWiT

Untitled Linux Show (Audio)

1 Listeners