Defensive Security Podcast

Information Security Podcast

Skip to content
  • About
  • Resources
    • Forensics
      • Security News
    • Penetration Testing
    • Incident Response
    • Useful Sites
    • Malware Analysis
    • Recommended Books
    • Industry Reports
    • Vulnerabilities
    • Essential Reading
    • Malware Tools
    • Security Podcasts
    • Best Practices
  • Podcast Episodes
  • iTunes
  • Stitcher
  • Donate!
  • Store
  • Entering The Infosec Biz

Tag Archives: Cybervor

Defensive Security Podcast Episode 79

August 11, 2014PodcastCybervor, data breach, Google, hacking, information security, infosec, Java, malwarejb
https://media.blubrry.com/1463551/content.blubrry.com/1463551/defensive-security-podcast-episode-79.mp3

Podcast: Play in new window | Download | Embed

Subscribe: RSS

[1] Cisco’s mid-year report
[2] Poorly trained IT workers pose a risk to organizations
[3] Cyber security should be professionalized
[4] How hackers are using Google to steal data’
[5] PCI creates a check-box mentality
[6] Gamma’s ownage detailed on pastebin
[7] 1.2 Billion passwords, Russians and controversy
Web Site | Subscribe in iTunes | Podcast RSS Feed | Twitter | Email

[1] https://blogs.cisco.com/security/cisco-2014-midyear-security-report-exposing-weak-links-to-strengthen-the-security-chain/
[2] http://www.telegraph.co.uk/technology/internet-security/11011249/Poorly-trained-IT-workers-are-gateway-for-hackers.html
[3] http://www.csoonline.com/article/2461669/security-leadership/cybersecurity-should-be-professionalized.html
[4] http://www.csoonline.com/article/2462409/data-protection/how-hackers-used-google-in-stealing-corporate-data.html
[5] http://www.csoonline.com/article/2460607/security/pci-regime-has-bred-complacent-tick-box-security-among-retailers-tripwire-survey-finds.html
[6] http://pastebin.com/cRYvK4jb
[7] http://www.youarenotpayingattention.com/2014/08/08/the-lie-behind-1-2-billion-stolen-passwords/

Leave a comment
Defensive Security is a cyber security podcast covering breaches and strategies for defense.
Support The Podcast

Defensive Security Store

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Tags

  • adobe
  • Anthem
  • Anti Virus
  • APT
  • breach
  • Cold Fusion
  • cyber insurance
  • data breach
  • DBIR
  • DDOS
  • dns
  • Equifax
  • exploit
  • FTC
  • hacking
  • Hacking Team
  • heartbleed
  • HIPAA
  • Home Depot
  • information security
  • infosec
  • insider threat
  • Java
  • malvertising
  • malware
  • microsoft
  • NotPetya
  • NSA
  • OPM
  • passwords
  • PCI
  • phishing
  • POS
  • ransomeware
  • Ransomware
  • security
  • Security awareness training
  • social engineering
  • Sony
  • Syrian Electronic Army
  • Target
  • threat intelligence
  • vulnerabilities
  • wannacry
  • Yahoo
Proudly powered by WordPress