Category Archives: Podcast

DSP itunes logo 300x300

Defensive Security Podcast Episode 113

http://arstechnica.com/tech-policy/2015/04/police-chief-paying-the-bitcoin-ransom-was-the-last-resort/
http://www.computerworld.com/article/2907088/russian-hackers-accessed-white-house-email.html
http://www.darkreading.com/endpoint/so-you-dont-believe-in-security-education-/a/d-id/1319793?
– my post regarding this: https://www.maliciouslink.com/applying-science-to-cyber-security/
http://www.reuters.com/article/2015/04/07/us-cybersecurity-americas-idUSKBN0MY06Z20150407

DSP itunes logo 300x300

Defensive Security Podcast Episode 112

 HTCIA conference: http://www.htciaconference.org
DSP itunes logo 300x300

Defensive Security Podcast Episode 111

High Tech Crime Investigation Association Conference: http://www.htciaconference.org

http://www.databreachtoday.com/pci-issues-penetration-test-guidance-a-8056

http://arstechnica.com/security/2015/03/github-battles-largest-ddos-in-sites-history-targeted-at-anti-censorship-tools/

DSP itunes logo 300x300

Defensive Security Podcast Episode 110

DSP itunes logo 300x300

Defensive Security Podcast Episode 109

http://www.firstcoastnews.com/story/news/local/2015/03/09/cyber-thieves-target-orange-park-bank/24682713/

https://blogs.mcafee.com/mcafee-labs/targeted-attack-campaign-indian-organizations-continues-exploits-focused-national-events

http://mobile.esecurityplanet.com/network-security/pci-compliance-still-a-challenge-verizon.html

http://www.zdnet.com/article/feds-hot-on-the-trail-of-jpmorgan-hackers/

http://www.pnj.com/story/news/2015/03/16/sacred-heart-health-system-billing-information-hacked/24859975/

DSP itunes logo 300x300

Defensive Security Podcast Episode 108

DSP itunes logo 300x300

Defensive Security Podcast Episode 107

DSP itunes logo 300x300

Defensive Security Podcast Episode 106

DSP itunes logo 300x300

Defensive Security Podcast Episode 105

DSP itunes logo 300x300

Defensive Security Podcast Episode 104

http://www.scmagazine.com/travelers-accuses-web-firm-of-shoddy-practices/article/394588/
https://www.htbridge.com/blog/ransomweb_emerging_website_threat.html
http://blogs.gartner.com/anton-chuvakin/2015/01/28/defeat-the-casual-attacker-first/
http://www.csoonline.com/article/2876310/security-leadership/7-ideas-for-security-leaders.html
http://blog.erratasec.com/2015/01/some-notes-on-ghost.html