Home
Categories
EXPLORE
True Crime
Comedy
Sports
Society & Culture
Business
News
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts/v4/28/63/32/2863326e-9c81-3340-19cb-d9899165e010/mza_3720814428116798139.jpg/600x600bb.jpg
Adventures in Security
Tom Olzak
20 episodes
3 hours ago
This is a weekly podcast. Each week we present commentary, reviews, and tips relevant to anyone responsible for information security. Additional episodes are available at AdventuresinSecurity.com.
Show more...
Technology
RSS
All content for Adventures in Security is the property of Tom Olzak and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This is a weekly podcast. Each week we present commentary, reviews, and tips relevant to anyone responsible for information security. Additional episodes are available at AdventuresinSecurity.com.
Show more...
Technology
Episodes (20/20)
Adventures in Security
Episode 56 - Suspect Interviewing Techniques
Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.
Show more...
18 years ago
17 minutes 21 seconds

Adventures in Security
Episode 55 - Recipe for Mobile Data Security
SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.
Show more...
18 years ago
23 minutes 50 seconds

Adventures in Security
Episode 54 - IT Security Essential Body of Knowledge
Security enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.
Show more...
18 years ago
18 minutes 41 seconds

Adventures in Security
Episode 53 - Desktop Application Virtualization
Information Security is about protecting the data,desktop application virtualization and application streaming
Show more...
18 years ago
19 minutes 20 seconds

Adventures in Security
Episode 52 - Phishing Undercover
Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.
Show more...
18 years ago
19 minutes 20 seconds

Adventures in Security
Episode 51 - Computer Forensics Part 3
Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.
Show more...
18 years ago
16 minutes 3 seconds

Adventures in Security
Episode 50 - Computer Forensics Part 2
MOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.
Show more...
18 years ago
14 minutes 38 seconds

Adventures in Security
Episode 49 - Computer Forensics Part 1
Cisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.
Show more...
18 years ago
26 minutes 17 seconds

Adventures in Security
Episode 48 - The Problem with NetBIOS
Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.
Show more...
18 years ago
15 minutes 52 seconds

Adventures in Security
Episode 47 - Ad Hoc Wireless Networks
Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.
Show more...
18 years ago
18 minutes 10 seconds

Adventures in Security
Episode 46 - Security Leadership
Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management
Show more...
18 years ago
18 minutes 33 seconds

Adventures in Security
Episode 45 - Keep your eye on the data
Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection
Show more...
18 years ago
18 minutes 46 seconds

Adventures in Security
Episode 44 - Virtual Server Security
Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server security
Show more...
18 years ago
20 minutes 7 seconds

Adventures in Security
Episode 43 - Risk Management
iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and risk management
Show more...
18 years ago
17 minutes 4 seconds

Adventures in Security
Episode 42 - Stepping up to meet security challenges
Commentary on iPods in business, security as a process, and how some programming teams are stepping up to meet security challenges.
Show more...
19 years ago
9 minutes 17 seconds

Adventures in Security
Episode 41 - Cyber-Espionage
Customer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.
Show more...
19 years ago
18 minutes 16 seconds

Adventures in Security
Episode 40 - Keystroke Dynamics (KD)
Examination of biometrics in general. Introduction of Keystroke Dynamics as a low impact biometric alternative.
Show more...
19 years ago
17 minutes 43 seconds

Adventures in Security
Episode 39 - The Home PC Threat
The importance of choosing the right source for audit artifacts, and the growing threat of employee home PCs to the business enterprise.
Show more...
19 years ago
14 minutes 20 seconds

Adventures in Security
Episode 38 - Desperation doesn't justify bad security
The importance of change management, the potential security risks when desperation enters the project lifecycle, how virtual floors can provide secure flexible business-to-business connectivity, and finally, a look at some ways to handle sensitive information once printed, copied, or faxed.
Show more...
19 years ago
14 minutes 49 seconds

Adventures in Security
Episode 37 - Web Application Security, Part 8
The vulnerabilities and safeguards associated with Application Denial of Service and Insecure Configuration Management
Show more...
19 years ago
18 minutes 12 seconds

Adventures in Security
This is a weekly podcast. Each week we present commentary, reviews, and tips relevant to anyone responsible for information security. Additional episodes are available at AdventuresinSecurity.com.