
Lucian Constantin
Special guest
Lucian is a freelance writer for The New Stack. He has been covering cybersecurity and the hacker culture for over a decade, his work appearing in many online technology publications including PCWorld, Computerworld, Network World, The Inquirer and Softpedia.com. Lucian has a bachelor's degree in political science, but his passion for computers and security came at an early age leading to his involvement in various technical support forums and IRC channels. While in college he worked part-time as a systems and network administrator for several small businesses.
Lucian Constantin has been a guest on 2 episodes.
-
Episode 39: The New Stack Context: Black Hat 2018 and New ML Workflow Tools
August 17th, 2018 | Season 2 | 39 mins 37 secs
authentication, aws, black hat, cloudtrail, def con, netflix, security, security b-sides, server-side software
This week on The New Stack Context, we speak with our security correspondent Lucian Constantin about what he saw at the recent trio of security conferences held in Las Vegas last week, BlackHat, DEF CON, and Security B-Sides. Turns out, industrial control systems — such as medical devices and in-car computation systems — are still quite vulnerable to malicious attacks, Constantin told our host this week, TNS founder Alex Williams.
-
Episode 17: This Week in News: Vulnerability Disclosure, Software Architecture
March 2nd, 2018 | Season 2 | 32 mins 58 secs
bug bounties, camunda, hackerone, iot, microservices, news, o'reilly software architecture conference, security, vulnerability disclosure
On this week's episode, TNS security correspondent Lucian Constantin joins us to talk about how companies can and should handle security reports. His latest story on this subject is based on a recent survey of 1,700 bug bounty participants on HackerOne. The survey revealed that one in four ethical hackers have had cases where they eventually gave up on reporting vulnerabilities because the affected vendors didn't respond to the issues. And this wasn't because of a lack of trying to contact those organizations. Constantin explained how your company sets up a good vulnerability reporting policy so you’ll learn about vulnerabilities from ethical hackers first, before customer data end up for sale on the underground market.