Also in this playlist...
This transcript is automatically generated
Cyber -- some major corporations like apple just highlighting serious gaps in outside the security so.
How should we protect ourselves when -- firewalls defensive technologies clearly no longer enough.
When no one knows better than Chris and who heads up researcher -- code as a software security company focusing on application risk.
Management Chris thank you so much for joining us I mean this is just simply just -- to a new phase.
-- -- hacking when it comes to corporations being hit like this under these cyber attacks.
-- I think yesterday's report for -- and talking about Chinese hacking operations.
Really broad cyber security to the forefront yet again.
The specifically as it relates to corporate espionage.
And some of the data that can be stolen from companies.
Intellectual property and so on but usually when that -- that's gonna go after a company.
They're they're gonna target either the people are -- or they're gonna current target the technology and yesterday's report was talking about people to spear Phishing attacks trying to get people to click on malicious attachments.
As a way of getting into the organization but the other side of the coin is attacking the software that those businesses use to carry out their daily business.
And those others and that the those software.
Applications -- the things that are protecting the important data intellectual property.
While -- you know our reporter Shibani Joshi just saying that good job a program has been particularly vulnerable if we -- take care of that does the threat.
Lessened considerably or is that many other ways of these -- can get into our systems.
Well there -- a lot of ways that hackers can get into systems and and certainly vulnerability is and software applications like job.
I'm but if he's that look at a typical business a typical large enterprise.
Most of those applications -- -- those enterprises are using hundreds of applications to conduct their daily business.
And that some of those.
Applications they write themselves some of them they purchased from other companies.
And there are a lot of security holes bill -- to those.
Software applications that can be exploited.
And so companies need to start paying more attention to the security posture of the software that they're using.
It seems to me how could companies not take this threat seriously and event not visit a matter of cost is -- expensive to have the very latest in.
Anti cyber attack -- software.
Right that in the state of the world today is that they're companies are spending a lot of money on network defenses -- spending -- -- to their spending on people's defenses like.
You know every business runs on software and there is.
Not enough -- the focus spent on.
Securing that software and understanding the risks that are inherent in and those piece of software every time you read about -- in the news.
-- huge database being breached like.
Ten million credit charge premiums and company.
Well those are all related to software attacks that's usually an -- called sql injection.
That -- results of a coating of a -- weakness in the program.
That was able to be exploited -- so they're all these points of attack that most enterprises have out there are based on.
The large number of software applications that they're using it seems -- it up ten seconds history is that anyway we can actually stop this so they always gonna find a way through the defense's.
You know a colleague of mine said recently -- never gonna stop people from getting and you need to stop them from getting the data out and I think there's some some to think about there.
Yeah that's a good way to predict Chris saying Chris thank you so much for joining us appreciate it.
Filter by section