Podcasts
-
Risk & Repeat: Does the Amazon S3 outage raise security flags?
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the recent Amazon Simple Storage Service outage and why the incident may have security implications.
-
Risk & Repeat: Cloudflare bug poses incident response challenges
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the recent Cloudflare bug that leaked an undetermined amount of customer data over several months.
-
Risk & Repeat: RSA Conference 2017 highlights and trends
In this episode of SearchSecurity's Risk & Repeat podcast, editors recap RSA Conference 2017 and discuss how the show addressed many security problems, but had very few answers.
-
Top three steps to ensure security in big data environments
Ensuring security in big data implementations remains a problem for most enterprises. Learn about the reasons why this is, and how your company can protect sensitive data.
-
Risk & Repeat: Pentagon cybersecurity under fire
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss Pentagon cybersecurity amid reports of misconfigured servers at the U.S. Department of Defense.
-
Risk & Repeat: Bad Symantec certificates strike again
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the discovery of more bad Symantec certificates and what it means for the antivirus software maker.
-
Risk & Repeat: Windows SMB warning raises questions, concerns
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the Shadow Brokers' alleged exploit for Windows SMB and what it means for both enterprises and Microsoft.
-
Risk & Repeat: Doxware emerges as a new threat to data privacy
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the emergence of doxware and extortionware and what that means for enterprises and their employees.
-
Risk & Repeat: CES Cybersecurity Forum tackles passwords, IoT
In this episode of SearchSecurity's Risk & Repeat podcast, editors highlight the topics discussed at the CES Cybersecurity Forum, as well as new technologies showcased at the event.
-
Risk & Repeat: Corero on DDoS defense in the IoT era
In this episode of SearchSecurity's Risk & Repeat podcast, Dave Larson of Corero Network Security discusses how DDoS defense has shifted to deal with IoT threats.
-
Ransomware worm raises concerns for enterprise security
In this Risk & Repeat podcast, SearchSecurity editors break down the discovery of the ZCryptor ransomware worm and what it means for future ransomware threats.
-
SSC's Russo, Leach on changes in PCI DSS 3.0
Podcast: Bob Russo and Troy Leach of the PCI Security Standards Council discuss the changes in PCI DSS 3.0.
-
Podcast: Trey Ford on Black Hat 2012 security conference
Security expert Trey Ford talks about the upcoming the Black Hat security conference. Ford is general manager of Black Hat 2012.
-
Top 5 mistakes to avoid during log management implementations
In this podcast, learn about five key issues to avoid in log management implementations so you can make the most of security event logs to augment your organization’s security posture.
-
Verizon DBIR 2012 overview, attack mitigation strategies
Christopher Porter of Verizon explains some of the findings from the Verizon 2012 Data Breach Investigations Report. This year, hacktivists had a big impact on the numbers.
-
Countdown: Top five ways to prevent a security lapse from becoming a security breach
In this podcast, learn five information security mistakes organizations often make that lead to data breaches, and how to bring resources to bear quickly to mitigate mistakes and avoid a breach.
-
Top Five Ways to Detect Unwanted Data in the Enterprise
Our file servers, workstations, flash drives and cloud services all contain massive amounts of data, driven by the fact that storage has quickly become an inexpensive commodity. It’s often cheaper to just keep everything than to expend time and energy sorting through outdated, irrelevant or inapplicable data. However, this practice can dramatically increase risk to the enterprise by increasing the amount of data vulnerable to an attack. In this podcast, we look at five ways that you can detect the presence of unwanted data in your environment.
-
Business model risk is a key part of your risk management strategy
Management consultants Amit Sen and John Vaughan discuss business model risk, a way to apply risk management policies to new or changed business processes.