Adventures in Security Tom Olzak
-
- 科技
This is a weekly podcast. Each week we present commentary, reviews, and tips relevant to anyone responsible for information security. Additional episodes are available at AdventuresinSecurity.com.
-
Episode 56 - Suspect Interviewing Techniques
Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.
-
Episode 55 - Recipe for Mobile Data Security
SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.
-
Episode 54 - IT Security Essential Body of Knowledge
Security enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.
-
Episode 53 - Desktop Application Virtualization
Information Security is about protecting the data,desktop application virtualization and application streaming
-
Episode 52 - Phishing Undercover
Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.
-
Episode 51 - Computer Forensics Part 3
Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.