{"id":41586,"date":"2021-09-04T16:04:36","date_gmt":"2021-09-04T20:04:36","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=41586"},"modified":"2021-09-17T07:23:45","modified_gmt":"2021-09-17T11:23:45","slug":"ethics-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ethics-in-cybersecurity\/41586\/","title":{"rendered":"Podcast: Ethics in cybersecurity"},"content":{"rendered":"<p>You\u2019ve probably read a lot about state-sponsored APT attacks, ransomware, bug-bounty programs, disclosure of zero-day vulnerabilities and exploits, even what color hat a hacker wears (figuratively). I could go on and on with the attention-grabbing topics, but I think I\u2019ve made my point.<\/p>\n<p>One thing we don\u2019t often talk about, however, is what is and is not ethical. Subscribers to the <a href=\"https:\/\/www.kaspersky.com\/blog\/?s=podcast\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky <em>Transatlantic Cable<\/em> podcast<\/a> may remember David and me chatting with <a href=\"https:\/\/twitter.com\/justicerage\" target=\"_blank\" rel=\"noopener nofollow\">Ivan Kwiatkowski<\/a> on the topic a few weeks ago. Well, Ivan and I have been discussing ethics in cybersecurity quite a bit over the past few months, and we decided to dig in more deeply.<\/p>\n<p>Our guests included my usual cohost David Buxton as well as <a href=\"https:\/\/twitter.com\/justicerage\" target=\"_blank\" rel=\"noopener nofollow\">Aseel Kayal<\/a> and <a href=\"https:\/\/twitter.com\/runasand\" target=\"_blank\" rel=\"noopener nofollow\">Runa Sandvik<\/a> \u2014 make sure to follow them on Twitter. We were lucky enough to spend nearly 2 hours in conversation, discussing a wide range of topics including:<\/p>\n<ul>\n<li>Competitive collaboration,<\/li>\n<li>Disclosure,<\/li>\n<li>The roles of government and private companies in user security,<\/li>\n<li>Attribution,<\/li>\n<li>Whether threat intelligence helps adversaries,<\/li>\n<li>Governments hoarding zero-day information.<\/li>\n<\/ul>\n<p>That\u2019s just a taste \u2014 there\u2019s loads more to pique the interest of anyone working within the space.<\/p>\n<p><iframe src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/20358764\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/00a88e\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"https:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>The ethics of cybersecurity, from ethical disclosure to the hoarding of zero-day exploits, and more.<\/p>\n","protected":false},"author":636,"featured_media":41589,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[485],"class_list":{"0":"post-41586","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-podcast"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ethics-in-cybersecurity\/41586\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ethics-in-cybersecurity\/23250\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ethics-in-cybersecurity\/18737\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ethics-in-cybersecurity\/25302\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ethics-in-cybersecurity\/23372\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ethics-in-cybersecurity\/29636\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ethics-in-cybersecurity\/29429\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=41586"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41586\/revisions"}],"predecessor-version":[{"id":41783,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41586\/revisions\/41783"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/41589"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=41586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=41586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=41586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}