Podchaser Logo
Home
7 Layers: Sumo Logic CSO Urges Regulation to Curb Social Media Security Threats

7 Layers: Sumo Logic CSO Urges Regulation to Curb Social Media Security Threats

Released Thursday, 6th October 2022
Good episode? Give it some love!
7 Layers: Sumo Logic CSO Urges Regulation to Curb Social Media Security Threats

7 Layers: Sumo Logic CSO Urges Regulation to Curb Social Media Security Threats

7 Layers: Sumo Logic CSO Urges Regulation to Curb Social Media Security Threats

7 Layers: Sumo Logic CSO Urges Regulation to Curb Social Media Security Threats

Thursday, 6th October 2022
Good episode? Give it some love!
Rate Episode

Sumo Logic Chief Security Officer George Gerchow joined SDxCentral Editor Nancy Liu to dive into social media security on this episode of 7 Layers.The heat has turned up recently for popular social media platforms’ security problems. SDxCentral reported in August that a former Twitter security chief filed a whistleblower complaint alleging the company has major security issues, while Tesla CEO Elon Musk publicly accused Twitter of concealing serious data security flaws.Meanwhile, Tik Tok and Facebook’s data security and privacy concerns also made headlines. Despite almost all age groups being on those platforms, “they really don't establish any kind of real security when it comes down to it for their users,” Gerchow argues. “It just leaves their platform wide open for folks to impersonate accounts, create fake accounts, to fish out of different organizations. So they're not doing the basic foundations when it comes to security and it's a shame.”He added that we need a third-party validation or regulatory requirement that can be audited for those platforms. “They've really got to be regulated.”During the podcast, Gerchow listed measures that users can do to protect themselves, including password tips and mutli-factor authentication. All organizations have employees on social media or take advantage of it for marketing and other business purposes. “Start putting your own security measures around it,” Gerchow suggested.He noted that zero-trust principles apply directly here. “Most of it in my mind starts with identity. So when you can prove your identity and then have someone else prove who they are, that starts establishing that trust and tooling like single sign-on, multi-factor authentication are a big part of that.”“Logging is a big piece of it as well … if you're able to log what's actually going on in the enterprise. You can then even have further validation,” Gerchow said. Learn more about your ad choices. Visit megaphone.fm/adchoices

Show More

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features