Podcast
-
Security In Five Podcast Weekly Roundup 8/18/17
The Security In Five podcast has reached 50 episodes. Wow. I never thought I’d get this far with it. Starting out as a faint idea is now a daily posting […]
-
Episode 50 – IoT Strikes Again, Vulnerable Solar Panels
The Internet of Things strikes again! The unregulated, unchecked security practices with putting internet access capability on a device will continue to cause the world problems. This times it’s getting […]
-
Episode 49 – Breached Passwords Should Never Be Used Again, By Anyone
A new search tool has come out that allows you to search your password to see if it’s part of a breach. Why? Because NIST has stated that breached passwords […]
-
Episode 48 – CIS 9 Network Limits
Next up in the Critical Security Controls is number nine, Network Limits. Much like your users and computers the network should be in a Least Privilege mode. Listen to hear […]
-
Episode 47 – Why Healthcare Data Is Top Target For Cybercriminals
Note, this episode is over the five minutes but it’s an important topic. Healthcare data is the most sought after recored on the dark markets. Why? What can be done […]
-
Episode 46 – IoT Security Legislation Is Coming
IoT manufacturers have shown that they are not the best security practitioners. The US government has taken notice and new legislation is being moved through to put those device manufacturers […]
-
Episode 45 – CSC 8 Malware Defense
Next item in the CSC Top 20 series is control number eight, Malware Defense. Why is it so important and how can you use it to protect yourself? Listen in […]
-
Episode 44 – Don’t Skip The Security Basics
With all the technology at our disposal breaches are still occurring at an unprecedented rate. Why? It may be that our programs are focusing on complexity and overlooking the basics […]
-
Episode 43 – Buy Your Devices From Trusted Sources
We are trained to search for the best deals when we purchase items. When it comes to computers and gadgets this could be a risk to your security and privacy. […]
-
Episode 42 – Breached Data Sells Quickly, Really Quickly
The FTC conducted an experiment to see how PII is used in the Dark Web. The results are eye opening and shocking. Listen to hear how long stolen PII sits […]