loader from loading.io

Securing OT Environments - Dr. Ed Harris - BTS #33

Below the Surface (Audio) - The Supply Chain Security Podcast

Release Date: 07/03/2024

Network Appliances: A Growing Concern - BTS #44 show art Network Appliances: A Growing Concern - BTS #44

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, Paul Asadorian and Chase Snyder discuss the latest security threats and vulnerabilities affecting network appliances, particularly focusing on Avanti and Fortinet platforms. They explore the increasing risks associated with these devices, the need for improved security standards, and the challenges of risk management and visibility in network security. The conversation emphasizes the importance of accountability among vendors and the necessity for customers to demand better security practices. In this conversation, Chase Snyder and Paul discuss the challenges and...

info_outline
CVE Turns 25 - BTS #43 show art CVE Turns 25 - BTS #43

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, Paul Asidorian, Alec Summers, and Lisa Olson discuss the 25th anniversary of the CVE program, its evolution, and the importance of transparency in vulnerability management. They explore the history of CVE, the process of creating CVE records, and the role of CNAs in ensuring accountability. The conversation also addresses challenges related to end-of-life software vulnerabilities and the need for maintaining the integrity of CVE records in an ever-evolving cybersecurity landscape. In this conversation, the speakers discuss the complexities of managing and analyzing...

info_outline
The China Threat - BTS #42 show art The China Threat - BTS #42

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, Paul Asadoorian, Allan Alford, and Josh Corman discuss the growing threat posed by China, particularly in the context of cyber operations and geopolitical ambitions. They explore the implications of China's strategies, the vulnerabilities in critical infrastructure, and the need for transparency and trust in digital systems. The conversation highlights the urgency of addressing these threats as they relate to Taiwan and the broader global landscape. In this conversation, the speakers discuss the critical issues surrounding digital infrastructure, emphasizing the...

info_outline
Pacific Rim - BTS #41 show art Pacific Rim - BTS #41

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, Paul Asadorian, Larry Pesce, and Evan Dornbusch delve into the recent Sophos reports on threat actors, particularly focusing on the Pacific Rim case. They discuss the implications of the findings, including the tactics used by attackers, the vulnerabilities in network devices, and the challenges of securing appliances. The conversation also highlights the importance of network detection solutions, the impact of zero-day exploits, and the need for a shift in how appliance security is approached, especially concerning firmware backdoors and UEFI threats. In this conversation,...

info_outline
Backdoors in Backdoors show art Backdoors in Backdoors

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, Paul Ascidorian and Matt Johansen discuss the recent targeted attacks by Chinese threat actors, particularly focusing on the Volt Typhoon group. They explore the implications of back doors in cybersecurity, the role of ISPs, and the ongoing tension between privacy and security. The conversation delves into historical contexts, the evolution of threat actor tactics, and the shared responsibility model in cybersecurity. They also highlight the challenges of supply chain security and the visibility issues that make network devices vulnerable to attacks. In this conversation, Paul...

info_outline
The Art of Firmware Scraping - BTS #39 show art The Art of Firmware Scraping - BTS #39

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, Edwin Shuttleworth from Finite State discusses firmware security, insights from the GRRCON Security Conference, and the challenges of firmware analysis. The conversation covers various topics, including firmware scraping techniques, the IoT landscape, types of firmware, the importance of Software Bill of Materials (SBOMs), and emulation in firmware analysis. Edwin shares his experiences and offers advice for those looking to get started in firmware reverse engineering.  

info_outline
Vulnerability Tracking & Scoring - Patrick Garrity - BTS #38 show art Vulnerability Tracking & Scoring - Patrick Garrity - BTS #38

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode of Below the Surface, host Paul Ascadorian and guest Patrick Garrity discuss the complexities of vulnerability tracking and prioritization. They explore various sources of vulnerability data, the significance of known exploited vulnerabilities, and the concept of weaponization in cybersecurity. The conversation delves into the challenges posed by supply chain vulnerabilities, the importance of Software Bill of Materials (SBOM), and the impact of user behavior on security. The episode concludes with thoughts on the future of vulnerability management and the need for a more...

info_outline
Firmware Reverse Engineering - Matt Brown - BTS #37 show art Firmware Reverse Engineering - Matt Brown - BTS #37

Below the Surface (Audio) - The Supply Chain Security Podcast

In this episode, Matt Brown joins the podcast to talk about firmware reverse engineering and supply chains. They discuss Matt's start in information security, his journey into hardware security, and the creation of his YouTube channel. They also explore the vulnerabilities and weaknesses in the supply chain of IoT devices and the challenges of extracting firmware from embedded Linux systems. Matt shares his favorite tools for firmware extraction and the complexities of creating an SBOM in the embedded Linux ecosystem. In this conversation, Paul and Allan discuss the challenges and...

info_outline
Supply Chain Policies - Trey Herr, Stewart Scott - BTS #36 show art Supply Chain Policies - Trey Herr, Stewart Scott - BTS #36

Below the Surface (Audio) - The Supply Chain Security Podcast

Stewart and Trey join us to talk about driving cybersecurity policies for the nation, what makes a good policy, what makes a bad policy, supply chain research and policies, and overall how we shape policies that benefit cybersecurity. Segment Resources: This segment is sponsored by Eclypsium. Visit to learn more about them! Show Notes:

info_outline
The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35 show art The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35

Below the Surface (Audio) - The Supply Chain Security Podcast

Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment. This segment is sponsored by Eclypsium. Visit to learn more about them! Resource: Show Notes:

info_outline
 
More Episodes

Ed Harris joins us to discuss how to secure OT environments, implement effective air gaps, and more!

This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!

Show Notes: https://securityweekly.com/bts-33