Adventures In Security
- Autor: Vários
- Narrador: Vários
- Editora: Podcast
- Duração: 5:56:39
- Mais informações
Informações:
Sinopse
Commentary, reviews, and tips relevant to anyone responsible for information security. Additional episodes are available at AdventuresinSecurity.com
Episódios
-
Episode 56 - Suspect Interviewing Techniques
04/11/2007 Duração: 17minFinding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.
-
Episode 55 - Recipe for Mobile Data Security
28/10/2007 Duração: 23minSOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.
-
Episode 54 - IT Security Essential Body of Knowledge
15/10/2007 Duração: 18minSecurity enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.
-
Episode 53 - Desktop Application Virtualization
08/10/2007 Duração: 19minInformation Security is about protecting the data,desktop application virtualization and application streaming
-
Episode 52 - Phishing Undercover
29/09/2007 Duração: 19minInexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.
-
Episode 51 - Computer Forensics Part 3
27/05/2007 Duração: 16minAnother government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.
-
Episode 50 - Computer Forensics Part 2
14/05/2007 Duração: 14minMOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.
-
Episode 49 - Computer Forensics Part 1
29/04/2007 Duração: 26minCisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.
-
Episode 48 - The Problem with NetBIOS
01/04/2007 Duração: 15minWireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.
-
Episode 47 - Ad Hoc Wireless Networks
25/03/2007 Duração: 18minLosing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.
-
Episode 46 - Security Leadership
18/03/2007 Duração: 18minBot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management
-
Episode 45 - Keep your eye on the data
04/03/2007 Duração: 18minVendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection
-
Episode 44 - Virtual Server Security
25/02/2007 Duração: 20minKey carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server security
-
Episode 43 - Risk Management
18/02/2007 Duração: 17minCommentary on iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and Risk Management
-
Episode 42 - Stepping up to meet security challenges
28/10/2006 Duração: 09minCommentary on iPods in business, security as a process, and how some programming teams are stepping up to meet security challenges.
-
Episode 41 - Cyber-Espionage
15/10/2006 Duração: 18minCustomer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.
-
Episode 40 - Keystroke Dynamics (KD)
02/10/2006 Duração: 17minExamination of biometrics in general. Introduction of Keystroke Dynamics as a low impact biometric alternative.
-
Episode 39 - The Home PC Threat
24/09/2006 Duração: 14minThe importance of choosing the right source for audit artifacts, and the growing threat of employee home PCs to the business enterprise
-
Episode 38 - Desperation doesn't justify bad security
09/09/2006 Duração: 14minThe importance of change management, the potential security risks when desperation enters the project lifecycle, how virtual floors can provide secure flexible business-to-business connectivity, and finally, a look at some ways to handle sensitive information once printed copied or faxed.
-
Episode 37 - Web Application Security, Part 8
20/08/2006 Duração: 18minThe vulnerabilities and safeguards associated with Application Denial of Service and Insecure Configuration Management