Subscribe: Adventures in Security
http://adventuresinsecurity.com/Podcasts/AISSeries/AdventuresinSecurity.xml
Preview: Adventures in Security

Adventures in Security



Commentary, reviews, and tips relevant to anyone responsible for information security. Additional episodes are available at AdventuresinSecurity.com



Last Build Date: Sun, 04 Nov 2007 15:00:00 EST

Copyright: ℗ & © 2006 Erudio Security, LLC
 



Episode 37 - Web Application Security, Part 8

Sat, 19 Aug 2006 21:15:00 EST

The vulnerabilities and safeguards associated with Application Denial of Service and Insecure Configuration Management


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode37_Aug_19_2006.mp3




Episode 38 - Desperation doesn't justify bad security

Sat, 09 Sep 2006 12:30:00 EST

The importance of change management, the potential security risks when desperation enters the project lifecycle, how virtual floors can provide secure flexible business-to-business connectivity, and finally, a look at some ways to handle sensitive information once printed copied or faxed.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode38_Sep_09_2006.mp3




Episode 39 - The Home PC Threat

Sun, 24 Sep 2006 18:25:00 EST

The importance of choosing the right source for audit artifacts, and the growing threat of employee home PCs to the business enterprise


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode39_Sep_24_2006.mp3




Episode 40 - Keystroke Dynamics (KD)

Mon, 02 Oct 2006 18:30:00 EST

Examination of biometrics in general. Introduction of Keystroke Dynamics as a low impact biometric alternative.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode40_Oct_2_2006.mp3




Episode 41 - Cyber-Espionage

Sun, 15 Oct 2006 08:30:00 EST

Customer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode41_Oct_15_2006.mp3




Episode 42 - Stepping up to meet security challenges

Sat, 28 Oct 2006 12:00:00 EST

Commentary on iPods in business, security as a process, and how some programming teams are stepping up to meet security challenges.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode42_Oct_28_2006.mp3




Episode 43 - Risk Management

Sun, 18 Feb 2007 18:00:00 EST

Commentary on iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and Risk Management


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode43_Feb_18_2007.mp3




Episode 44 - Virtual Server Security

Sun, 25 Feb 2007 17:00:00 EST

Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server security


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode44_Feb_25_2007.mp3




Episode 45 - Keep your eye on the data

Sun, 4 Mar 2007 08:55:00 EST

Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_45_Mar_04_2007.mp3




Episode 46 - Security Leadership

Sun, 18 Mar 2007 15:10:00 EST

Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_46_Mar_18_2007.mp3




Episode 47 - Ad Hoc Wireless Networks

Sun, 25 Mar 2007 11:30:00 EST

Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_47_Mar_25_2007.mp3




Episode 48 - The Problem with NetBIOS

Sun, 01 Apr 2007 11:30:00 EST

Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_48_Apr_01_2007.mp3




Episode 49 - Computer Forensics Part 1

Sun, 29 Apr 2007 15:20:00 EST

Cisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_49_Apr_29_2007.mp3




Episode 50 - Computer Forensics Part 2

Sun, 13 May 2007 20:30:00 EST

MOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_50_May_13_2007.mp3




Episode 51 - Computer Forensics Part 3

Sun, 27 May 2007 18:30:00 EST

Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_51_May_27_2007.mp3




Episode 52 - Phishing Undercover

Sat, 29 Sep 2007 15:25:00 EST

Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_52_Sep_30_2007.mp3




Episode 53 - Desktop Application Virtualization

Sun, 07 Oct 2007 20:10:00 EST

Information Security is about protecting the data,desktop application virtualization and application streaming


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_53_Oct_07_2007.mp3




Episode 54 - IT Security Essential Body of Knowledge

Sun, 14 Oct 2007 19:45:00 EST

Security enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_54_Oct_14_2007.mp3




Episode 55 - Recipe for Mobile Data Security

Sun, 28 Oct 2007 17:00:00 EST

SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_55_Oct_28_2007.mp3




Episode 56 - Suspect Interviewing Techniques

Sun, 04 Nov 2007 15:00:00 EST

Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.


Media Files:
http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_56_Nov_04_2007.mp3