4.9 • 696 Ratings
🗓️ 19 February 2019
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, February 19th, 2019 edition of the Sandcent Storm Center's Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:14.4 | A good reminder today from Didi about knowing what you log. Didi take the example of a little bit an odd log format created by an Arduino application. |
0:28.6 | Now, of course, not a lot of people do run Arduino and sort of in enterprise networks and I like, |
0:34.5 | but it's really sort of just an example for that you sometimes end up with |
0:39.4 | logs that are really difficult to read and where you first need to spend a little bit of time |
0:46.3 | to actually research the log format. This is of course in particular difficult if you run into |
0:53.4 | this log after a possible incident. So always |
0:57.1 | best practice to take a look at your logs before there is an incident in order to figure |
1:03.8 | out, am I able to read them? What do these logs actually mean? Or in some cases, just who do I |
1:09.4 | ask for help to actually explain to me what |
1:13.0 | this log means. |
1:14.0 | That's in particular important for custom application, where often it's just the developer |
1:20.1 | that actually created the application that can really explain the context for these logs. |
1:36.3 | And a group of researchers with Google took a step back and sort of took a high-level view at the various specter vulnerabilities and different mitigation techniques. |
1:42.5 | Now, one thing they sort of came up with was that really all the |
1:47.3 | software mitigation techniques are insufficient to really prevent Spectre, that it |
1:53.7 | really takes hardware mitigation in order to protect the system. Without sufficient |
1:59.2 | hardware protection there is always a chance that different |
2:02.7 | threats are able to read each other's data, which is really sort of at the core of the specter |
2:09.4 | vulnerability. Now, the researchers that contributed to this paper, they distinguished themselves by being |
2:15.4 | the team behind the Google Chrome JavaScript |
2:19.3 | engine. And one thing they're pointing out is that in particular the ability of browsers, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.