Podcast
-
Episode 43 – Buy Your Devices From Trusted Sources
We are trained to search for the best deals when we purchase items. When it comes to computers and gadgets this could be a risk to your security and privacy. […]
-
Episode 42 – Breached Data Sells Quickly, Really Quickly
The FTC conducted an experiment to see how PII is used in the Dark Web. The results are eye opening and shocking. Listen to hear how long stolen PII sits […]
-
Episode 41 – CIS 7 Email and Browsers
Next up in the Critical Security Controls is number seven, email and browsers. This control talks about closing the ability of easy access through email and web browsers. The control […]
-
Security In Five Podcast, Two Months In
Just do it. A popular phrase from Nike that is 100% true. Just do it. For a while I tossed the idea around on what more I could do to contribute […]
-
Episode 40 – IoT Strikes Again, Roomba Is Selling You Out
IoT Devices are everywhere and with little to no security and privacy control. Roomba, the little robot vacuum, maps your home to work properly. Now, they will be selling your […]
-
Episode 39 – CIS 6 Audit Logs
The next item in the Critical Security Controls is number 6, Audit Log. Logs are only as good as the data recorded and how often you look at them. Outside […]
-
Episode 38 – 6 BILLION records… in the first six months of 2017
In the first six months of 2017 a report showed there has been 6 BILLION records breached. This episode breaks down where these came from, how, and what you can […]
-
Episode 37 – Refresh Your Security Policies More Often
Every security program has a set of policies. How often are you actually reviewing them for their effectiveness and accuracy? The world is changing around us everyday and your policies […]
-
Episode 36 – CIS 5 Controlling Administrative Accounts
Continuing the breakdown of the CIS Top 20 Critical Security Controls the next one on the list is number 5, Controlling Administrative Accounts. The admin accounts have all the access […]
-
Episode 35 – Risk Management Is Not Your Excuse Maker
Risk Management has a purpose within a security program. One of those is not to be used as your excuse to not do something. Accepting risk because lack of funds […]

Follow me on Twitter
My Tweets- 3 Best Tools to Convert Binary into Text
- WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability
- US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes
- Less Than Half of Organizations Have Open Source Security Policy
- How to Start Your Business and Earn Money From Home