Tag Archives: insider threat

Defensive Security Podcast Episode 148

http://www.theregister.co.uk/2016/02/04/norse_corp_ceo_fired/

http://www.secureworks.com/resources/blog/ransomware-used-as-a-distraction/

http://www.zdnet.com/article/most-windows-flaws-mitigated-by-removing-admin-rights-says-report/

http://mobile.reuters.com/article/idUSKCN0VD14X

http://www.csoonline.com/article/3025787/security/defending-against-insider-security-threats-hangs-on-trust.html

http://www.securityforrealpeople.com/2016/02/poor-ux-leads-to-poorly-secured-soho.html

Defensive Security Podcast Episode 130

http://www.theregister.co.uk/2015/09/04/mozilla_firefox_bugzilla_leak/

http://darkmatters.norsecorp.com/2015/09/03/four-non-technical-measures-for-mitigating-insidious-insiders/

http://arstechnica.com/tech-policy/2015/08/ftc-can-sue-companies-with-poor-information-security-appeals-court-says/

https://nakedsecurity.sophos.com/2015/09/02/microsoft-word-intruder-revealed-inside-a-malware-construction-kit/

http://www.securityweek.com/executive-it-security-problem-lessons-learned-hillary-clinton

Defensive Security Podcast Episode 87

Derbycon Videos: http://www.irongeek.com/i.php?page=videos/derbycon4/mainlist

http://www.tripwire.com/state-of-security/top-security-stories/att-discovers-second-insider-breach-this-year/
http://www.zdnet.com/yahoo-confirms-servers-infected-but-not-by-shellshock-7000034411/
http://www.futuresouth.us/wordpress/?p=32
http://www.theregister.co.uk/2014/10/05/report_says_russians_behind_jpmorgan_chase_cyber_attack/
http://nakedsecurity.sophos.com/2014/10/06/badusb-now-with-do-it-yourself-instructions/
http://hackaday.com/2014/10/05/badusb-means-were-all-screwed/
http://www.csoonline.com/article/2689609/network-security/threat-intelligence-firm-mistakes-research-for-nation-state-attack.html#tk.rss_all

 

Lacie the security dog:

lacie

Defensive Security Podcast Episode 85

http://arstechnica.com/tech-policy/2014/09/senior-it-worker-at-top-tech-law-firm-arrested-for-insider-trading/

Defensive Security Podcast Episode 76

A question from Bob on Active Directory; 67 percent of critical infrastructure providers were breached last year; Malware coming from shipping scanners; It’s the end of the road for Windows Server 2003; Details emerge on the Boeing hack; Testing your APT response plan; Revamping your insider threat program; Beware of computers in hotel business centers.

Subscribe in iTunes | Podcast RSS Feed | Twitter Email
http://www.esecurityplanet.com/network-security/67-percent-of-critical-infrastructure-providers-were-breached-last-year.html
http://www.securityweek.com/hackers-attack-shipping-and-logistics-firms-using-malware-laden-handheld-scanners
http://blogs.technet.com/b/canitpro/archive/2014/06/10/migrating-from-windows-server-2003-to-windows-server-2012-r2.aspx
http://www.databreachtoday.com/details-emerge-boeing-hack-a-7053
http://www.databreachtoday.com/interviews/testing-your-apt-response-plan-i-2382
http://www.csoonline.com/article/2453392/security/revamping-your-insider-threat-program.html?nsdr=true
http://krebsonsecurity.com/2014/07/beware-keyloggers-at-hotel-business-centers/

Defensive Security Podcast Episode 57

Security recommendations from Bob; Meetup.com rides out a DDOS attack rather than pay a ransom; How to test the security savvy of your employees; Why companies need to think about this insider threat; 6 lessons learned from advanced attacks; How IT can establish better cloud control; Council on Cyber Security releases version 5 of critical security controls.

Subscribe in iTunes | Podcast RSS Feed | Twitter Email

http://meetupblog.meetup.com/post/78413031007/no-doubt-this-has-been-a-tough-weekend-for
http://www.networkworld.com/research/2014/022414-how-to-test-the-security-279049.html
http://www.networkworld.com/news/2014/022014-why-companies-need-to-check-278927.html
http://www.networkworld.com/news/2014/022414-6-lessons-learned-about-the-279082.html
http://www.networkworld.com/news/2014/022414-how-it-can-establish-better-279048.html
http://www.counciloncybersecurity.org/attachments/article/12/CSC-MASTER-VER50-2-27-2014.pdf