Category Archives: Podcast

DSP itunes logo 300x300

Defensive Security Podcast Episode 121

http://www.databreaches.net/fbi-cyber-division-bulletin-on-tools-reportedly-used-by-opm-hackers/
https://fortune.com/sony-hack-part-1/
http://www.csoonline.com/article/2938310/data-protection/lieberman-mandiant-and-verizon-wrong-on-unstoppable-threats.html
http://www.itworld.com/article/2939255/windows/the-us-navys-warfare-systems-command-just-paid-millions-to-stay-on-windows-xp.html

DSP itunes logo 300x300

Defensive Security Podcast Episode 120

http://www.bankinfosecurity.com/blogs/did-fisma-facilitate-opm-hack-p-1879/op-1

http://www.csoonline.com/article/2936723/data-breach/user-error-is-an-expected-business-problem.html

http://www.databreachtoday.com/blogs/post-malware-outbreak-rip-replace-p-1877

http://www.csoonline.com/article/2936615/data-breach/6-breaches-lessons-reminders-and-potential-ways-to-prevent-them.html

http://www.nytimes.com/2015/06/17/sports/baseball/st-louis-cardinals-hack-astros-fbi.html

DSP itunes logo 300x300

Defensive Security Podcast Episode 119

http://www.theregister.co.uk/2015/05/28/cottage_healthcare_system_sued/
http://arstechnica.com/security/2015/06/report-hack-of-government-employee-records-discovered-by-product-demo/
http://www.reddit.com/r/netsec/comments/36obxt/what_i_know_about_us_export_controls_and_hacking/
http://www.bis.doc.gov/index.php/policy-guidance/faqs
http://www.wired.com/2015/06/kaspersky-finds-new-nation-state-attack-network/

DSP itunes logo 300x300

Defensive Security Podcast Episode 118

http://www.symantec.com/connect/fr/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information

https://nakedsecurity.sophos.com/2015/05/21/anatomy-of-a-logjam-another-tls-vulnerability-and-what-to-do-about-it/

http://krebsonsecurity.com/2015/05/carefirst-blue-cross-breach-hits-1-1m/

http://www.forbes.com/sites/thomasbrewster/2015/05/20/guns-bombs-hacking-cars-and-planes-dangerous-tweets-for-a-security-researcher/

Defensive Security Podcast Episode 117

http://www.computerworld.com/article/2918406/cybercrime-hacking/cybercriminals-borrow-from-apt-playbook-in-attacking-pos-vendors.html

http://www.welivesecurity.com/2015/05/12/5-practical-tips-avoid-ransomware-email/

http://www.zdnet.com/article/what-causes-enterprise-data-breaches-the-terrible-complexity-and-fragility-of-our-it-systems/

http://www.computing.co.uk/ctg/news/2408602/venom-security-vulnerability-allows-hackers-to-infiltrate-networks-via-the-cloud

http://arstechnica.com/security/2015/05/penn-state-severs-engineering-network-after-incredibly-serious-intrusion/

DSP itunes logo 300x300

Defensive Security Podcast Episode 115

http://www.wsj.com/articles/five-simple-steps-to-protect-corporate-data-1429499477
http://www.politico.com/story/2015/04/sony-hackers-fake-emails-117200.html
http://www.japantimes.co.jp/news/2015/04/21/national/tepcos-frugality-rapped-after-48000-pcs-found-running-windows-xp/
http://www.darkreading.com/attacks-breaches/zero-day-malvertising-attack-went-undetected-for-two-months/d/d-id/1320092
http://www.csoonline.com/article/2913884/access-control/credit-card-terminals-have-used-same-password-since-1990s-claim-researchers.html#tk.rss_all

DSP itunes logo 300x300

Defensive Security Podcast Episode 113

http://arstechnica.com/tech-policy/2015/04/police-chief-paying-the-bitcoin-ransom-was-the-last-resort/
http://www.computerworld.com/article/2907088/russian-hackers-accessed-white-house-email.html
http://www.darkreading.com/endpoint/so-you-dont-believe-in-security-education-/a/d-id/1319793?
– my post regarding this: https://www.maliciouslink.com/applying-science-to-cyber-security/
http://www.reuters.com/article/2015/04/07/us-cybersecurity-americas-idUSKBN0MY06Z20150407

DSP itunes logo 300x300

Defensive Security Podcast Episode 112

 HTCIA conference: http://www.htciaconference.org