Podcast: Play in new window | Download | Embed
Subscribe: RSS
More advice from Bob; Follow up on Coke’s lost laptops; Honey Encryption to frustrate attackers; What the Target breach shows us about vendor risk; Managing the response to a data breach; More POS malware, this time with TOR goodness.
Subscribe in iTunes | Podcast RSS Feed | Twitter | Email
http://blogs.csoonline.com/security-leadership/2957/interesting-finding-coke-data-breach-and-why-you-need-prevent-it-happening-you
http://www.networkworld.com/news/2014/013014-positioning-your-institution39s-response-in-278292.html