Adventures in Security

podcast

Suscribirse

Adventures in Security

Episode 56 - Suspect Interviewing Techniques

Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM...

Añadir a ... 

Episode 55 - Recipe for Mobile Data Security

SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active...

Añadir a ... 

Episode 54 - IT Security Essential Body of Knowledge

Security enhancements in XP SP3, review of native data encryption, properly classifying security...

Añadir a ... 

Episode 53 - Desktop Application Virtualization

Information Security is about protecting the data,desktop application virtualization and...

Añadir a ... 

Episode 52 - Phishing Undercover

Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication...

Añadir a ... 

Episode 51 - Computer Forensics Part 3

Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist,...

Añadir a ... 

Episode 50 - Computer Forensics Part 2

MOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable...

Añadir a ... 

Episode 49 - Computer Forensics Part 1

Cisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and...

Añadir a ... 

Episode 48 - The Problem with NetBIOS

Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption,...

Añadir a ... 

Episode 47 - Ad Hoc Wireless Networks

Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide...

Añadir a ... 

Episode 46 - Security Leadership

Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective...

Añadir a ... 

Episode 45 - Keep your eye on the data

Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection

Añadir a ... 

Episode 44 - Virtual Server Security

Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST...

Añadir a ... 

Episode 43 - Risk Management

Commentary on iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring,...

Añadir a ... 

Episode 42 - Stepping up to meet security challenges

Commentary on iPods in business, security as a process, and how some programming teams are...

Añadir a ... 

Episode 41 - Cyber-Espionage

Customer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.

Añadir a ... 

Episode 40 - Keystroke Dynamics (KD)

Examination of biometrics in general. Introduction of Keystroke Dynamics as a low impact...

Añadir a ... 

Episode 39 - The Home PC Threat

The importance of choosing the right source for audit artifacts, and the growing threat of...

Añadir a ... 

Episode 38 - Desperation doesn't justify bad security

The importance of change management, the potential security risks when desperation enters the...

Añadir a ... 

Episode 37 - Web Application Security, Part 8

The vulnerabilities and safeguards associated with Application Denial of Service and Insecure...

Añadir a ...