Adventures in Security show

Adventures in Security

Summary: A weekly information security podcast exploring challenges common to business managers. Additional podcast episodes are available at AdventuresinSecurity.com.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Tom Olzak
  • Copyright: ℗ & © 2006 Erudio Security, LLC

Podcasts:

 Episode 56 - Suspect Interviewing Techniques | File Type: audio/x-m4a | Duration: 17:21

Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.

 Episode 55 - Recipe for Mobile Data Security | File Type: audio/x-m4a | Duration: 23:50

SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.

 Episode 54 - IT Security Essential Body of Knowledge | File Type: audio/x-m4a | Duration: 18:41

Security enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.

 Episode 53 - Desktop Application Virtualization | File Type: audio/x-m4a | Duration: 19:20

Information Security is about protecting the data,desktop application virtualization and application streaming

 Episode 52 - Phishing Undercover | File Type: audio/x-m4a | Duration: 19:20

Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.

 Episode 51 - Computer Forensics Part 3 | File Type: audio/x-m4a | Duration: 16:03

Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.

 Episode 50 - Computer Forensics Part 2 | File Type: audio/x-m4a | Duration: 14:38

MOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.

 Episode 49 - Computer Forensics Part 1 | File Type: audio/x-m4a | Duration: 26:17

Cisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.

 Episode 48 - The Problem with NetBIOS | File Type: audio/x-m4a | Duration: 15:52

Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.

 Episode 47 - Ad Hoc Wireless Networks | File Type: audio/x-m4a | Duration: 18:10

Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.

 Episode 46 - Security Leadership | File Type: audio/x-m4a | Duration: 18:33

Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management

 Episode 45 - Keep your eye on the data | File Type: audio/x-m4a | Duration: 18:46

Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection

 Episode 44 - Virtual Server Security | File Type: audio/x-m4a | Duration: 20:07

Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server security

 Episode 43 - Risk Management | File Type: audio/x-m4a | Duration: 17:04

iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and risk management

 Episode 42 - Stepping up to meet security challenges | File Type: audio/x-m4a | Duration: 09:17

Commentary on iPods in business, security as a process, and how some programming teams are stepping up to meet security challenges.

Comments

Login or signup comment.