Podcast: Play in new window | Download | Embed
Subscribe: RSS
http://www.securityweek.com/nature-vs-nurture-bad-cybersecurity-our-dna
http://gizmodo.com/top-defense-contractor-left-sensitive-pentagon-files-on-1795669632
Information Security Podcast
Podcast: Play in new window | Download | Embed
Subscribe: RSS
http://www.publictechnology.net/articles/news/nhs-cyber-attack-forces-week-long-council-email-block
https://www.grahamcluley.com/companies-keeping-bitcoin-hand-case-ransomware-attacks/
http://www.eweek.com/security/zomato-docusign-breaches-reveal-common-security-risks
Podcast: Play in new window | Download | Embed
Subscribe: RSS
https://hotforsecurity.bitdefender.com/blog/95-of-enterprise-risk-assessments-find-employees-using-tor-private-vpns-to-bypass-security-report-says-17902.html
Podcast: Play in new window | Download | Embed
Subscribe: RSS
https://arstechnica.com/security/2017/04/purported-shadow-brokers-0days-were-in-fact-killed-by-mysterious-patch/
https://www.bleepingcomputer.com/news/security/former-sysadmin-accused-of-planting-time-bomb-in-companys-database/
http://www.computerworld.com/article/3189059/security/what-prevents-breaches-process-technology-or-people-one-answer-is-pc-and-one-is-right.html
http://www.csoonline.com/article/3187422/network-security/report-30-of-malware-is-zero-day-missed-by-legacy-antivirus.amp.html
https://www.wired.com/2017/04/hackers-hijacked-banks-entire-online-operation/
http://news.softpedia.com/news/two-laptops-with-hong-kong-s-3-7-million-voters-data-stolen-514346.shtml
http://researchcenter.paloaltonetworks.com/2017/03/unit42-threat-brief-credential-theft-keystone-shamoon-2-attacks/
Podcast: Play in new window | Download | Embed
Subscribe: RSS
Podcast: Play in new window | Download | Embed
Subscribe: RSS
http://www.bankinfosecurity.com/emory-healthcare-database-breach-what-happened-a-9745
http://www.networkworld.com/article/3175030/security/trend-micro-report-ransomware-booming.html
https://www.helpnetsecurity.com/2017/03/02/yahoo-cookie-forging-incident/
http://www.pcworld.com/article/3179348/security/after-cia-leak-intel-security-releases-detection-tool-for-efi-rootkits.html
https://arstechnica.com/security/2017/03/wikileaks-publishes-what-it-says-is-trove-of-cia-hacking-tools/
http://www.csoonline.com/article/3177994/security/cia-false-flag-team-repurposed-shamoon-data-wiper-other-malware.html
Podcast: Play in new window | Download | Embed
Subscribe: RSS
http://www.securityweek.com/what-hackers-think-your-defenses
Podcast: Play in new window | Download | Embed
Subscribe: RSS
https://gallery.technet.microsoft.com/ATA-Playbook-ef0a8e38/file/169827/1/ATA%20Playbook.pdf
http://www.securityweek.com/google-shares-data-corporate-email-attacks
http://www.databreachtoday.com/reworked-ny-cybersecurity-regulation-takes-effect-in-march-a-9733
Podcast: Play in new window | Download | Embed
Subscribe: RSS
https://arstechnica.com/information-technology/2017/01/antivirus-is-bad/?amp=1
http://www.darkreading.com/risk/7-tips-for-getting-your-security-budget-approved/d/d-id/1328004
https://www.asd.gov.au/publications/protect/essential-eight-explained.htm
http://www.csoonline.com/article/3163068/application-development/how-to-secure-active-directory.html
https://securosis.com/mobile/tidal-forces-software-as-a-service-is-the-new-back-office/full