Defensive Security Podcast

Information Security Podcast

Skip to content
  • About
  • Resources
    • Forensics
      • Security News
    • Penetration Testing
    • Incident Response
    • Useful Sites
    • Malware Analysis
    • Recommended Books
    • Industry Reports
    • Vulnerabilities
    • Essential Reading
    • Malware Tools
    • Security Podcasts
    • Best Practices
  • Podcast Episodes
  • iTunes
  • Stitcher
  • Donate!
  • Store
  • Entering The Infosec Biz

Defensive Security Podcast Episode 53

February 3, 2014PodcastChewbacca, data breach, encryption, malware, POS, Target, Vendor Riskjb
https://media.blubrry.com/1463551/content.blubrry.com/1463551/defensive-security-podcast-episode-53.mp3

Podcast: Play in new window | Download | Embed

Subscribe: RSS

More advice from Bob; Follow up on Coke’s lost laptops; Honey Encryption to frustrate attackers; What the Target breach shows us about vendor risk; Managing the response to a data breach; More POS malware, this time with TOR goodness.

Subscribe in iTunes | Podcast RSS Feed | Twitter | Email
http://blogs.csoonline.com/security-leadership/2957/interesting-finding-coke-data-breach-and-why-you-need-prevent-it-happening-you

http://www.technologyreview.com/news/523746/honey-encryption-will-bamboozle-attackers-with-fake-secrets/

http://www.networkworld.com/news/2014/013114-target-credential-theft-highlights-third-party-278305.html

http://www.networkworld.com/news/2014/013014-positioning-your-institution39s-response-in-278292.html

http://www.networkworld.com/news/2014/013014-tor-enabled-malware-stole-credit-card-278289.html?source=nww_rss

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

Related

Post navigation

← Defensive Security Podcast Episode 52 Defensive Security Podcast Episode 54 →

Leave a Reply Cancel reply

You must be logged in to post a comment.

Defensive Security is a cyber security podcast covering breaches and strategies for defense.
Support The Podcast

Defensive Security Store

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Tags

  • adobe
  • Anthem
  • Anti Virus
  • APT
  • breach
  • Cold Fusion
  • cyber insurance
  • data breach
  • DBIR
  • DDOS
  • dns
  • Equifax
  • exploit
  • FTC
  • hacking
  • Hacking Team
  • heartbleed
  • HIPAA
  • Home Depot
  • information security
  • infosec
  • insider threat
  • Java
  • malvertising
  • malware
  • microsoft
  • NotPetya
  • NSA
  • OPM
  • passwords
  • PCI
  • phishing
  • POS
  • ransomeware
  • Ransomware
  • security
  • Security awareness training
  • social engineering
  • Sony
  • Syrian Electronic Army
  • Target
  • threat intelligence
  • vulnerabilities
  • wannacry
  • Yahoo
Proudly powered by WordPress