{"href":"https://api.simplecast.com/oembed?url=https%3A%2F%2Fsecuritytools.simplecast.com%2Fepisodes%2Fad3c04d7-ad3c04d7","width":444,"version":"1.0","type":"rich","title":"Security Poverty Line","thumbnail_width":300,"thumbnail_url":"https://image.simplecastcdn.com/images/5128d4/5128d4b9-97a3-46af-af2a-d5ffe821f6e2/0a58e52e-e73c-4af8-93b6-9775eb701d53/1533231749artwork.jpg","thumbnail_height":300,"provider_url":"https://simplecast.com","provider_name":"Simplecast","html":"<iframe src=\"https://player.simplecast.com/0a58e52e-e73c-4af8-93b6-9775eb701d53\" height=\"200\" width=\"100%\" title=\"Security Poverty Line\" frameborder=\"0\" scrolling=\"no\"></iframe>","height":200,"description":"This week’s podcast was inspired by chief information security officer Wendy Nather’s article, The Security Povery Line and Junk Food. It’s 2018 and we’re still struggling to get a proper security budget. Is it a mindset? Is that why when we hire pen testers to identify vulnerabilities, they’re usually able to gain admin access? On the bright side, a company with a bigger budget, Google recently declared victory with a USB key that prevented phishing for an entire year."}