Security Intelligence Podcast

Development Agility and Open Source Vulnerability Prioritization

Play
Play
Share!

Share this Podcast

MyCast

MyCast

MyCast Subscription

Security Intelligence Podcast

IBM Security

Description: Welcome to the Security Intelligence Podcast, whe…

Most Recent Post

Development Agility and Open Source Vulnerability Prioritization

Play Download media
"Open source is increasingly being acknowledged as an indispensable means for promoting and driving innovation," says Rami Elron, Senior Director of Product Management at WhiteSource. But at the same time, there's been a proliferation in open source security vulnerabilities.  Elron attributes the phenomenon to both increased adoption of open source and increased attention following publicized data breaches. He joins David to discuss the challenges in prioritizing open source vulnerabilities, the importance of agile DevSecOps practices, and approaches to dealing effectively with the growing number of open source security vulnerabilities. For more security stories, visit SecurityIntelligence.com or follow IBM Security on Twitter and LinkedIn.

Last 5 Posts

Lateral Movement: Combating High-Risk, Low-Noise Threats

Play Download media
"What I like to tell people is that when you have one computer that's infected, that's annoying," says Charles DeBeck, a member of IBM Security's Threat Intelligence Production team. "When you have 1,000 computers that's infected, that's a problem."...

Travel Security: Why Data Safety Doesn't Get a Day Off

Play Download media
Sunscreen? Check. Boarding pass? Got it. The resolve not to connect to the airport WiFi? Getting there.  

This summer, add cyber hygiene best practices to your travel checklist. Caleb Barlow, Vice President of X-Force Threat Intelligence for IBM Security, shares insights on travel and transportati...

Lessons from a Gray Beard: Transitioning from the Military to Cybersecurity

Play Download media
With thirty years of experience in the military, JC Vega now shares his experiences as a "gray beard" in the role of a cyber range coach. When asked about transitioning from the military to cybersecurity, JC offers advice that applies across fields: consider a path that lets you prioritize quality o...

Foundations for a Winning Operational Technology (OT) Security Strategy

Play Download media
Conversations about operational technology (OT) security have been bubbling up more and more, and justifiably so. The term may not be as well known as it should be " or even entirely settled upon yet " but the consequences of risk in operational technology environments impact our daily lives...

"You Can Never Have Too Much Encryption"

Play Download media
Data encryption can feel like the enterprise version of a kid's least favorite chore: cleaning their room. "One of the biggest challenges," says Stephanie Balaouras, "is just the inertia against getting started."...

Guest Book

Subscribe & Follow