Tag Archives: threat intelligence

Defensive Security Podcast Episode 182

http://www.securityweek.com/cyber-threat-intelligence-shows-majority-cybercrime-not-sophisticated

http://www.databreachtoday.com/new-in-depth-analysis-anthem-breach-a-9627

http://www.databreachtoday.com/475000-hipaa-penalty-for-tardy-breach-notification-a-9624

http://www.databreachtoday.com/insurer-slapped-22-million-hipaa-settlement-a-9643

https://krebsonsecurity.com/2017/01/extortionists-wipe-thousands-of-databases-victims-who-pay-up-get-stiffed/

https://securosis.com/mobile/tidal-forces-endpoints-are-different-more-secure-and-less-open/full

Defensive Security Podcast Episode 108

Defensive Security Podcast Episode 87

Derbycon Videos: http://www.irongeek.com/i.php?page=videos/derbycon4/mainlist

http://www.tripwire.com/state-of-security/top-security-stories/att-discovers-second-insider-breach-this-year/
http://www.zdnet.com/yahoo-confirms-servers-infected-but-not-by-shellshock-7000034411/
http://www.futuresouth.us/wordpress/?p=32
http://www.theregister.co.uk/2014/10/05/report_says_russians_behind_jpmorgan_chase_cyber_attack/
http://nakedsecurity.sophos.com/2014/10/06/badusb-now-with-do-it-yourself-instructions/
http://hackaday.com/2014/10/05/badusb-means-were-all-screwed/
http://www.csoonline.com/article/2689609/network-security/threat-intelligence-firm-mistakes-research-for-nation-state-attack.html#tk.rss_all

 

Lacie the security dog:

lacie

Defensive Security Podcast Episode 65

Cisco’s annual security report for 2014; the Verizon Data Breach Investigations Report; 7 deadly cyber risks from Zurich Insurance; Alien Vault  urges opening up threat  intelligence; Stanford’s new password policy; New social engineering alert from Trusted Sec; New Internet Explorer 0day

Subscribe in iTunes | Podcast RSS Feed | Twitter Email
https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf

http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf

http://www.ibtimes.co.uk/zurich-insurance-unveils-7-deadly-cyber-risks-1445607

http://www.infosecurity-magazine.com/view/38136/alienvault-ceo-throws-down-the-gauntlet-on-threat-sharing/?utm_source=twitterfeed&utm_medium=twitter

http://arstechnica.com/security/2014/04/stanfords-password-policy-shuns-one-size-fits-all-security/

https://www.trustedsec.com/april-2014/red-alert-massive-cyber-wire-fraud-attacks-us-companies/

https://community.qualys.com/blogs/laws-of-vulnerabilities/2014/04/26/new-internet-explorer-0-day

Defensive Security Podcast Episode 59

Advice for the criminals from Bob; Pwn2Own results are in; Target ignored it’s FireEye alerts; Integrating threat intelligence into your operations; The problem with threat intelligence; Advanced endpoint protection advice; Workers are apathetic about lost mobile devices and company data; Lessons to learn from the hack of some Navy servers; How the Syrian Electronic Army compromised Forbes; a discussion about what to do when you see criminal activity.

Subscribe in iTunes | Podcast RSS Feed | Twitter Email
http://threatpost.com/three-things-to-take-away-from-cansecwest-pwn2own/104835

http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data#p1

https://securosis.com/assets/library/reports/Securosis_ThreatIntelSecurityMonitoring_FINAL.pdf

http://krypt3ia.wordpress.com/2014/03/09/assessment-corporate-threat-intelligence-versus-actual-intelligence-products/

https://securosis.com/mobile/advanced-endpoint-and-server-protection-quick-wins/full

http://www.networkworld.com/news/2014/030514-cios-battle-worker-apathy-towards-279420.html

http://www.csoonline.com/article/749450/navy-network-hack-has-valuable-lessons-for-companies

http://www.forbes.com/sites/andygreenberg/2014/02/20/how-the-syrian-electronic-army-hacked-us-a-detailed-timeline/