Category Archives: Podcast

Defensive Security Podcast Episode 135

tp://www.databreachtoday.com/report-usps-workers-vulnerable-to-phishing-scams-a-8579

http://krebsonsecurity.com/2015/10/at-experian-security-attrition-amid-acquisitions/#more-32501

http://www.databreachtoday.com/etrade-dow-jones-issue-breach-alerts-a-8586

http://www.bankinfosecurity.asia/blogs/cyber-insurance-primer-for-insurers-insured-p-1946

http://www.csoonline.com/article/2990471/social-engineering/near-flawless-social-engineering-attack-spoiled-by-single-flaw.html#tk.rss_all

Defensive Security Podcast Episode 132

http://www.thenationaltriallawyers.org/2015/09/standing-neiman-marcus-data-breach/

http://krebsonsecurity.com/2015/09/bidding-for-breaches-redefining-targeted-attacks/

http://www.miltonstart.com/blog/2015/09/22/morgan-stanley-employee-pleads-guilty-in-data-breach-case/

Defensive Security Podcast Episode 131

http://www.bizjournals.com/atlanta/blog/atlantech/2015/09/atlantas-bitpay-got-hacked-for-1-8-million-in.html

http://www.securityweek.com/excellus-data-breach-impacts-10-million

http://www.databreachtoday.com/attacks-on-insurers-lessons-learned-a-8530

http://federalnewsradio.com/cybersecurity/2015/09/us-certs-dos-and-donts-for-after-the-cyber-hack/

http://www.theguardian.com/technology/2015/sep/10/cyber-threat-data-manipulation-us-intelligence-chief

http://www.csoonline.com/article/2984543/vulnerabilities/as-containers-take-off-so-do-security-concerns.html

Defensive Security Podcast Episode 130

http://www.theregister.co.uk/2015/09/04/mozilla_firefox_bugzilla_leak/

http://darkmatters.norsecorp.com/2015/09/03/four-non-technical-measures-for-mitigating-insidious-insiders/

http://arstechnica.com/tech-policy/2015/08/ftc-can-sue-companies-with-poor-information-security-appeals-court-says/

https://nakedsecurity.sophos.com/2015/09/02/microsoft-word-intruder-revealed-inside-a-malware-construction-kit/

http://www.securityweek.com/executive-it-security-problem-lessons-learned-hillary-clinton

Defensive Security Podcast Episode 129

http://www.tripwire.com/state-of-security/risk-based-security-for-executives/connecting-security-to-the-business/security-reverse-engineering-and-eulas/

http://arstechnica.com/security/2015/08/my-browser-visited-drudgereport-and-all-i-got-was-this-lousy-malware/

http://arstechnica.com/security/2015/08/attackers-actively-exploit-windows-bug-that-uses-usb-sticks-to-infect-pcs/

http://arstechnica.com/information-technology/2015/08/lenovo-used-windows-anti-theft-feature-to-install-persistent-crapware/

http://socialmedia.umich.edu/blog/hacked/

Defensive Security Podcast Episode 126

http://fortune.com/2015/07/29/crowdstrike-cybersecurity-george-kurtz/

http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/phishing-up-74-in-q2-2015-reveals-infoblox-dns-threat-index/

http://blog.trendmicro.com/trendlabs-security-intelligence/angler-exploit-kit-used-to-find-and-infect-pos-systems/

http://www.welivesecurity.com/2015/07/28/new-report-explains-gulf-security-experts-non-experts/

Defensive Security Podcast Episode 125

http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/

http://www.mcafee.com/us/resources/reports/rp-aspen-holding-line-cyberthreats.pdf

http://arstechnica.com/tech-policy/2015/07/obama-administration-decides-not-to-blame-china-publicly-for-opm-hack/

http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/