Salted Hash Ep 24: Defending against mobile threats

We're back from hiatus! In this week's post, Salted Hash heads to the RSA Conference in San Francisco

Welcome back! After shooting several episodes during the RSA Conference in San Francisco, this week Salted Hash talks mobile threats with VASCO's Will LaSala. In addition to this week's episode, we've also got some additional footage from the conference.

Mobile threats are something you hear about from time to time, but when you're at a show like the RSA Conference (one of the largest vendor-driven shows in the U.S.), do you really think about mobile security? No one will blame you if you assumed the affirmative, but the reality is, most people don't.

Keeping the problems with the RSA Conference mobile application out of the limelight for now, mobile threats include lost or stolen devices, as well as poorly defended devices. At one point while walking the North Hall, there were mobile phones and tablets left laying around all over the place. While some them might have had passcodes, or other protections, most likely didn't – but does it matter? If someone has physical access to your device, it isn't yours anymore.

This week Salted Hash visited Will LaSala, the director of Security Solutions and security evangelist at VASCO Data Security, to talk about the various mobile threats travelers have to contend with on a regular basis.

Once you've heard Will's take on the topic, watch the videos below for more from the show.

Episode 22: It's time to kill the pen test….

No seriously, give him a chance to explain. We spoke to Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping companies improve their defenses.

Episode 23: Having fun with honeypots and botnets…

We visited with Israel Barak, CISO at Cybereason, to talk about his company's recent honeypot research, which yielded some interesting attack observations, especially once the human attacker got involved.

Copyright © 2018 IDG Communications, Inc.

Subscribe today! Get the best in cybersecurity, delivered to your inbox.