Tag Archive for: Ken

Ken Bennett stepping down as audit liaison after Cyber Ninjas ban


The recount’s lead contractor banned Bennett from the building after Bennett shared data with outside critics of the audit.

ARIZONA, USA — Editor’s note: The above video aired during a previous broadcast.

The man selected as the liaison between Arizona Senate Republicans and the lead contractor of the Senate’s partisan recount of the 2020 election is stepping down from the position after the lead contractor banned him from entering the recount building.

Former Arizona Secretary of State and candidate for state governor Ken Bennett made the announcement on Wednesday that he will be resigning from the position during an interview with James Harris on KFYI.

The announcement comes just a few days after the recount’s lead contractor, Flordia-based internet security company Cyber Ninjas, banned Bennett from the building where the recount is taking place.

“Being locked out makes it impossible for me to be a true liaison,” Bennett said on KFYI.

Bennett also told Harris that he still supports the audit and the new subpoenas issued by the Arizona Senate GOP. He said his main issue is with Cyber Ninjas’ lack of transparency.

Source…

PODCAST: Ken Munro Talks Ethical Hacking, Cybersecurity Research and Electronic Flight Bags


Ken Munro is the founder of Pen Test Partners.

On this episode of the Connected Aircraft Podcast, Ken Munro, founder of U.K.-based ethical hacking consulting and security services firm Pen Test Partners joins to discuss some of the latest research he’s been doing around connected electronic flight bags (EFB) and aircraft systems.

Munro is a well-known public speaker who has performed live demonstrations of vulnerabilities that have been exposed on Internet of Things (IoT) devices and systems. He is a security entrepreneur and industry maverick that has worked in infosec for over 15 years. He is a regular speaker at events held by industry bodies and associations and has spoken at the ISSA Dragon’s Den, (ISC)2 Chapter events and CREST (Council of Registered Ethical Security Testers) events, where he sits on the board, helping to establish standards in both member organizations and among individual penetration testers.

We discuss some of the potential consequences of the manipulation of data used by pilots by a malicious hacker, as outlined in his recent blog post, and just how important the testing and assessment of EFB security is.

Have suggestions or topics we should focus on in the next episode? Email the host, Woodrow Bellamy at [email protected], or drop him a line on Twitter @WbellamyIIIAC.

Listen to this episode below, or check it out on iTunes or Google Play If you like the show, subscribe on your favorite podcast app to get new episodes as soon as they’re released.

Source…