Information security podcasts: 2006 archive

Listen to past editions of our information security podcasts.

This Content Component encountered an error

Podcasts for the week of Dec. 25, 2006

--> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> --> -->

-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
-->
Security Wire Weekly -- Dec. 27, 2006
In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006. Highlights include Oracle's Darius Wiles, SPI Dynamic's Billy Hoffman, Dan Geer, vice president and chief scientist for security firm Verdasys and Randy Abrams of the Zero-Day Emergency Response Team (ZERT).


powered by ODEO

Download MP3 | Subscribe to Security Wire Weekly

Podcasts for the week of Dec. 18, 2006

--> --> --> --> --> --> --> --> -->

-->
-->
-->
-->
-->
-->
-->
-->
-->
Threat Monitor -- Dec. 21, 2006
Steganography is a useful technique for securely storing sensitive data, but the difficulty in detecting its usage can create an opportunity for digital miscreants. Michael Cobb explains how to ensure the practice isn't used maliciously.


powered by ODEO

Download MP3 | Threat Monitor

@21786Security Wire Weekly -- Dec. 20, 2006
This week, Dan Blum, senior vice president and research director at the Burton Group, discusses the state of malware threats moving into 2007. Blum provides steps companies can take to protect against more sophisticated attacks.


powered by ODEO

Download MP3 | Subscribe to Security Wire Weekly

Compliance Counselor--Dec. 20, 2006
This week's featured podcast is from our Compliance Counselor tip.
As security professionals grapple with both federal mandates and industry-specific guidance, many wonder how best to approach these issues in terms of data protection and security. In this tip, James C. Foster looks at specific regulations such as SOX, PCI, GLBA and HIPAA and not only outlines steps to meet these requirements, but also how to monitor, track and report on database activity to meet auditor demands.
Listen to Database compliance demystified

Podcasts for the week of Dec. 11, 2006

@21786Security Wire Weekly -- Dec. 13, 2006
In this edition of Security Wire Weekly, Burton Group analyst Diana Kelley explains how to lock down messaging programs as part of our three-day special report on the subject. Also, a summary of the top news headlines.


powered by ODEO

Download MP3 | Subscribe to Security Wire Weekly

Podcasts for the week of Dec. 4, 2006

@21786Security Wire Weekly -- Dec. 6, 2006
This week, Mark Loveless, a white-hat hacker also known as "Simple Nomad," talks about increasing mobile security threats. Loveless is a senior security researcher for Vernier Networks. Also, a summary of the week's top news stories, including a new zero-day threat to Microsoft Word.


powered by ODEO

Download MP3 | Subscribe to Security Wire Weekly

@21787Threat Monitor December 7, 2006
What to consider when it comes to securing databases
Enterprises are now faced with the challenge of supporting multiple database versions on differing platforms, including SQL Server, Oracle Database, IBM DB2 and MySQL. While securing a diverse database architecture is crucial, the dollars needed to make changes may be hard to find. James C. Foster offers up a few hints for cutting costs while maintaining security on an enterprise's most critical systems.
Listen to What to consider when it comes to securing databases
Subscribe to Threat Monitor

Podcasts for the week of Nov. 27, 2006

@21786Security Wire Weekly -- Nov. 29, 2006
This week, News Editor Robert Westervelt interviews David Foote of Foote Research about the state of the security job market. Also, Apple releases 22 fixes for Mac OS X and a Russian spam group is suspected behind a recent email surge.


powered by ODEO

Download MP3 | Subscribe to Security Wire Weekly

Podcasts for the week of Nov. 13, 2006

@21786Security Wire Weekly -- Nov. 15, 2006
This week, Senior News Writer Bill Brenner talks to Chris Andrew from Patchlink about Microsoft's November batch of patches. Also, the SANS Institute released its list of the top 20 attack targets.


powered by ODEO

Download MP3 | Subscribe to Security Wire Weekly


@21787 Threat Monitor November 16, 2006
How simple steps ensure database security
An enterprise database stores an organization's most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate them.
Listen to How simple steps ensure database security
Subscribe to Threat Monitor

Podcasts for the week of Nov. 6, 2006

--> --> --> -->

Security School
-->
Security School
-->
Security School
-->
Security School
-->
Security School
Top 5 quick tips for safer instant messaging
This week's featured podcast is from Messaging Security School.
Guest instructor Michael Cobb provides tips that can keep instant messaging users in your organization safe, including rules for naming conventions, away messages, acceptable usage and more.
Listen to Top 5 quick tips for safer instant messaging

@21786Security Wire Weekly -- Nov. 8, 2006
This week, Andrew Christensen, a researcher with FortConsult, explains how the Tor peer-to-peer network of routers, which keeps IP addresses private, can be hacked to reveal user data. Also, Microsoft deals with zero-day threats and Symantec will revamp its technical support forums.


powered by ODEO

Download MP3 | Subscribe to Security Wire Weekly

Podcasts for the week of Oct. 30, 2006

@26651 Platform protection: Security issues for mobile devices
This week's featured podcast is from Messaging Security School.
Guest instructor Lisa Phifer examines the security issues facing today's popular mobile device platforms, from Windows Mobile PDAs to BlackBerry smartphones and reveals security measures practitioners can use to secure these devices.
Listen to Platform protection: Security issues for mobile devices

@21786Security Wire Weekly -- Nov. 1, 2006
This week, Senior News Writer Bill Brenner chats with DBA Jon Emmons about the state of Oracle security and summarizes this week's news, including new threats targeting Windows and Firefox 2.0.


Download MP3 | Subscribe to Security Wire Weekly

Podcasts for the week of Oct. 23, 2006

@21786 Security Wire Weekly -- Oct. 25, 2006
This week, News Editor Robert Westervelt interviews Andreas Wiegenstein, chief technology officer of Virtual Forge, about the top application security threats. Also, a recap of the week's news, including Microsoft's plan to open up Sender ID and infected iPods threatening corporate networks. Listen on your PC or download to your favorite mobile device.


Subscribe to Security Wire Weekly

Podcasts for the week of Oct. 16, 2006

@21787 Threat Monitor October 19, 2006
Defensive measures for evolving phishing tactics
From image spam to cross-site scripting, hackers certainly have a large arsenal of weapons to choose from. But as AT&T recently learned, hackers are putting a new twist on ever-dependable phishing schemes to gain access to confidential and sensitive information. In this tip, Ed Skoudis examines how phishing tactics have evolved and what enterprises can do to defend themselves.


Subscribe to Threat Monitor

@21786 Security Wire Weekly -- Oct. 18, 2006
This week, Senior News Writer Bill Brenner talks to the SANS Institute's Stephen Northcutt about Microsoft's tussle with security vendors over Windows Vista. Also, a recap of the week's news, including Oracle's latest patches, a threat to Toshiba Bluetooth wireless device drivers and a discouraging report on data security in the federal government.


Subscribe to Security Wire Weekly

Podcasts for the week of October 9, 2006

-->
-->
Secure Reads October 12, 2006
How employees affect information security
In this installment of Secure Reads, Jeffrey M. Stanton reads from Chapter 2: How employees affect information security from the book, The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets -- Without Compromising Employee Privacy or Trust, which he co-authored with Kathryn R. Stam. He reviews the security implications of employee information technology usage, as it pertains to access to shared data and use of communication tools.

Learn more about The Visible Employee

@21786 Security Wire Weekly -- October 11, 2006
This week, Senior News Writer Bill Brenner talks to Forrester Research analyst Jonathan Penn about the challenges mid-market IT pros face in developing a strong ID and access management program. Also: The latest news, including Microsoft's monthly patch release and a new phishing threat.

Subscribe to Security Wire Weekly

Podcasts for the week of Oct. 2, 2006

@21787 Threat Monitor October 5, 2006
Malware: The changing landscape
Malware is arguably growing faster than ever before, but not in ways the industry has come to expect. Even though the days of the superworm might be numbered, contributor Mike Chapple says it's time for organizations to adapt their defense postures because the next generation of threats won't be as easy to detect.

Subscribe to Threat Monitor

@21786 Security Wire Weekly -- Oct. 4, 2006
This week, Yankee Group's Chris Liebert joins us to talk about intrusion defense challenges and strategies for midmarket companies. Plus all the week's top news and why secure electronic voting may be the big loser in next month's elections. Listen now on your computer or download to your favorite music device. .
Subscribe to Security Wire Weekly

Podcasts for the week of September 25, 2006

@21786 Security Wire Weekly -- September 27, 2006
This week, Senior News Writer Bill Brenner interviews Randy Abrams of the Zero-Day Emergency Response Team (ZERT) about third-party patching. Also, Microsoft releases an early patch for IE, Symantec releases a new threat report and a new worm targets Windows.

Subscribe to Security Wire Weekly

Podcasts for the week of September 18, 2006

@21787Threat Monitor September 21, 2006
Does blogging pose enterprise information security risks?
While blogging can be a useful marketing and communications tool, if not controlled it can pose significant risks to corporate information security. In this tip, SearchSecurity.com expert Mike Chapple examines these risks and how they can be reduced by creating and implementing blogging policies.

Subscribe to Threat Monitor

@21786 Security Wire Weekly -- September 20, 2006
This week, Site Editor Eric Parizo interviews Current Analysis Senior Analyst Andrew Braunberg about the network access control interoperability plans for Cisco's NAC and Microsoft's NAP architectures and what the partnership will mean for enterprise security pros. Plus all the week's top news and the reason why Hewlett-Packard's alleged pretexters might never be punished.

Subscribe to Security Wire Weekly

Podcasts for the week of September 11, 2006

@25893Secure Reads September 14, 2006
Taking Care of Physical Security
In this installment of Secure Reads, author Joel Dubin reads Chapter 5: Taking Care of Physical Security from his book, The Little Black Book of Computer Security. He explains how a hacker can break into a computer that is physically accessible and provides a checklist that security administrators can follow to protect their computer systems.

Read an excerpt and download Chapter 5: Taking Care of Physical Security
Learn more about The Little Black Book of Computer Security

@21786 Security Wire Weekly -- September 13, 2006
This week, Senior News Writer Bill Brenner interviews SPI Dynamics' Michael Sutton about this month's Microsoft security patches. Also the latest news about flaws in Apple QuickTime and Adobe Flash Player, the limits of NAC-NAP interoperability and jail time for two of the men behind last year's Zotob attack.

Subscribe to Security Wire Weekly

Podcasts for the week of September 4, 2006

@21787Threat Monitor September 7, 2006
Laptop crypto: Do it, but realize it's not a panacea
With headlines declaring data thefts becoming more prevalent and increasingly scarier, the need for enterprises to enforce laptop security is as crucial as ever. In this tip, Ed Skoudis reviews the pros and cons of laptop encryption and explains how, while it is the not the final solution, it can keep your data secure -- even if it falls in the hands of the enemy.

Subscribe to Threat Monitor

@21786 Security Wire Weekly -- September 6, 2006
This week, Senior News Writer Bill Brenner interviews the Ponemon Institute's Larry Ponemon about a new survey that suggests stopping data breaches is even harder than it seems. Plus all the top news and why AT&T has some explaining to do. Listen now at your computer or subscribe below and download to your favorite mobile device..

Subscribe to Security Wire Weekly

Podcasts for the week of August 28, 2006

@21786 Security Wire Weekly -- August 30, 2006
This week, News Editor Eric Parizo leads a roundtable discussion with IT security pros about the latest Wi-Fi dangers, Microsoft's patching efforts and the ramifications of the IBM/ISS merger. Plus all the week's top news and details on how long one recently convicted hacker will be behind bars. Listen now at your computer or subscribe below and download to your favorite mobile device.

Subscribe to Security Wire Weekly

Podcasts for the week of August 21, 2006

@21786 Security Wire Weekly -- August 23, 2006
This week, Senior News Writer Bill Brenner recaps news of IBM's acquisition of ISS, Microsoft's latest security woes and chats with Forrester Research analyst Natalie Lambert about challenges to Apple's security reputation. Listen now on your computer or download to your favorite mobile audio device.

Subscribe to Security Wire Weekly

@26651 Insider's guide to Web server security
This week's featured podcast is from Web Security School.
Guest instructor Michael Cobb lays the groundwork for locking down a Web server before it goes live. This tutorial begins with a look at Web server hardening procedures, followed by access control and security policies.
Listen to Insider's guide to Web server security

Podcasts for the week of August 14, 2006

@21787Threat Monitor August 17, 2006
Battling image spam
In the ever-changing world of threats, spammers have once again discovered a new way to bypass spam filters using a new technique called "image spam." In this tip, Mike Chapple provides an example of image spam and explains how the threat can hurt your organization, and what you can do to protect against these attacks.

Subscribe to Threat Monitor

@21786 Security Wire Weekly -- August 16, 2006
This week, News Editor Eric Parizo interviews Rob Ayoub, industry analyst for network security with Frost & Sullivan, about whether the MS06-040 patch should be implemented immediately. Plus all the top security news and a new playground for cyberthieves -- in more ways than one.Listen now at your computer or subscribe below and download to your favorite mobile device.

Subscribe to Security Wire Weekly

Dan Geer
Dan Geer
Newsmaker podcast: Dan Geer
In this edition, luminary Dan Geer, vice president and chief scientist for security firm Verdasys, discusses the infamous 2003 research paper that caused him to lose his job, plus how Microsoft threatens IT security, the fatal flaw of client-based computing and the real reason behind so many publicized data breaches. Listen now on your computer or download to your favorite digital audio device. Runtime: 24:16.
HIGHLIGHTS:
6:30 -- Why antivirus is doomed
13:15 -- The next bad virus
22:00 -- Rapid-fire Q&A

Podcasts for the week of August 7, 2006

@21786 Security Wire Weekly -- August 9, 2006
This week, Senior News Writer Bill Brenner interviews SPI Dynamic's Billy Hoffman about the mood at this year's Black Hat conference and why Ajax Web applications are more dangerous than it seems. Plus Microsoft's August patches and all the week's other top information security news. Listen now at your computer or subscribe below and download to your favorite mobile device.

Subscribe to Security Wire Weekly

@26651 Who goes there: Securing wireless access
This week's featured podcast is from SearchSecurity.com's Wireless Security Lunchtime Learning
This podcast describes readily-available WLAN access controls, from MAC ACLs to Preshared Secret Keys to help you choose the best method to control, authenticate and authorize access to your own WLAN.
Listen to Who goes there: Securing wireless access

Podcasts for the week of July 31, 2006

@21787Threat Monitor -- August 3, 2006
Avoiding the scourge of DNS amplification attacks
DNS amplification attacks can generate enough bogus traffic to blow almost anyone off the Internet. Learn how these packet flood attacks work and how to defend your organization.



@21786 Security Wire Weekly -- August 2, 2006
This week, News Editor Eric Parizo interviews Fortify Software Chief Scientist Brian Chess about the growing danger of cross-site scripting attacks. Plus details on all the latest critical software patches and why Google may be the ultimate security tool. Listen now at your computer or subscribe below and download to your favorite mobile device.

Subscribe to Security Wire Weekly

Podcasts for the week of July 24, 2006

@21786 Security Wire Weekly -- July 26, 2006
This week News Editor Eric Parizo interviews author and expert infosec strategist Ron Moritz on the disconnect between security pros and the corporate boardroom. Plus information on Netscape's cross-site scripting woes and the latest exploits targeting Microsoft software.
Download this podcast
Subscribe to Security Wire Weekly

@26651 This week's featured podcasts are from SearchSecurity.com's Identity and Access Managment Security School.

Endpoint enforcement: Smart policies to control the endpoint explosion
This podcast with Ben Rothke, Director of Security Technology Implementation, will provide managers with a thorough understanding of the security policies they need to control the myriad endpoints trying to access their corporate networks.
Listen to Endpoint enforcement: Smart policies to control the endpoint explosion

The road ahead: Emerging VPN trends
New network technologies and expanding mobile workforces have changed the virtual private network landscape. This podcast, with guest instructor Lisa Phifer, Vice President, Core Competence Inc., will explore emerging techniques intended to reduce cost of operation, strengthen security and deliver secure access to additional users. Learn about the latest innovations, from clientless VPNs to managed VPN services, and what you can expect to see in the future.
Listen to The road ahead: Emerging VPN trends

Analysis of the automated provisioning market place
Provisioning has been a manual operation for years. This podcast, with guest instructor Laura E. Hunter, Senior IT Specialist, will discuss how vendors are just starting to see provisioning automation as a potential market sector.
Listen to Analysis of the automated provisioning market place

Podcasts for the week of July 17, 2006

@21787 Threat Monitor -- July 20, 2006
Secure IM in the enterprise
Instant messaging can be a conduit through which viruses come in to and sensitive data goes out of the corporate network. Enterprises need a thorough IM policy and the technical measures to back it up, regardless of whether IM is allowed or strictly prohibited. This tip outlines the factors you should consider when writing an IM policy and the technical measures for enforcing it.
Listen to Secure IM in the enterprise
Subscribe to Threat Monitor


@21786 Security Wire Weekly -- July 19, 2006
This week, Senior News Writer Bill Brenner interviews Oracle's Darius Wiles on the database giant's vulnerability patching process and the criticisms levied against it. Plus the latest on Microsoft's plans to patch a PowerPoint problem and why Vonage may be driving spyware. Listen now at your computer or subscribe below and download to your favorite mobile device.
Download this podcast
Subscribe to Security Wire Weekly


July 2006

@21786 Security Wire Weekly -- July 12, 2006
This week, Senior News Writer Bill Brenner interviews Qualys' Jonathan Bitle on the ramifications of the newly released Microsoft security patches involving Internet Explorer and IIS; plus all the top information security news.
Download this podcast




--> --> --> -->

-->
-->
-->
-->
Threat Monitor -- July 6, 2006
Application logging is critical in detecting hack attacks
Now that networks are fairly well-protected, attackers are targeting application servers. In this tip, security expert Mike Chapple explains how implementing application layer logging is becoming a crucial addition to every organization's security strategy.
Listen to Application logging is critical in detecting hack attacks


Subscribe to our Threat Monitor podcast feed

@21786 Security Wire Weekly -- July 5, 2006
This week, News Editor Eric Parizo is joined by Current Analysis Senior Analyst Andrew Braunberg to break down EMC's acquisition of RSA Security and what it may mean for customers. Plus all the rest of the top information security news.
Download this podcast

June 2006

@21786 Security Wire Weekly -- June 28, 2006
This week, Senior News Writer Bill Brenner leads a roundtable discussion on the month's biggest news stories -- including Microsoft security after Bill Gates, AV SLAs and the latest data breaches -- plus details on new IE and instant messaging flaws.
Download this podcast



@21786 Security Wire Weekly -- June 21, 2006
This week, News Editor Eric Parizo chats with Burton Group Senior Vice President and Research Director Dan Blum about the impact Bill Gates has had on Microsoft's security strategy and how it may change as he lessens his role with the company. Plus the latest data breaches, new Bagle worm variants and why an infamous adware firm may be giving up the game for good.
Download this podcast

@22627 Threat Monitor -- June 15, 2006
Phone phishing: The role of VoIP in phishing attacks
Attackers are taking advantage of the emerging widespread deployment of low-cost Voice over IP telephony to launch a new type of attack -- phone phishing. SearchSecurity expert Ed Skoudis says it's a matter of time before phone phishing further evolves into phone spear phishing, putting enterprises at an increased risk. In this tip, Skoudis explains how phone phishing works and how to defend your organization.
Listen to Phone phishing: The role of VoIP in phishing attacks


Subscribe to our Threat Monitor podcast feed

@21786 Security Wire Weekly -- June 14, 2006
This week, News Editor Eric Parizo has all the details on Microsoft's mammoth June patch release, and SANS Internet Storm Center Chief Research Officer Johannes Ullrich explains why the state of information security is as frightening as ever. Plus a new threat to Yahoo Mail users and why one researcher says cheap computers could cause more malware attacks.
Download this podcast

@21786 Security Wire Weekly -- June 7, 2006
This week, Senior News Writer Bill Brenner reports on McAfee's acquisition of Preventsys; a Snort security flaw gets patched, but not how you might think; and a spammer's change of heart. Also: An interview with privacy expert Mike Spinney on the long-term impact of the latest data thefts.
Download this podcast



@22627 Threat Monitor -- June 1, 2006
Preventing blind SQL injection attacks
By now, you probably know how to prevent SQL injection attacks, but your defense measures may be leaving a door open for attackers to launch blind SQL injections. In this tip, Web application security expert Michael Cobb explains how these SQL injection attacks occur, and offers tactics for protecting your Web applications.
Listen to Preventing blind SQL injection attacks


Subscribe to our Threat Monitor podcast feed

May 2006

@21786 Security Wire Weekly -- May 31, 2006
This week, Senior News Writer Bill Brenner leads a roundtable discussion with readers about the recent Veterans Affairs data theft, vigilante antispam efforts and the future of the CISSP; plus the top infosec news.
Download this podcast

Security Wire Weekly -- May 24, 2006
This week, News Editor Eric Parizo chats with The 451 Group's Nick Selby about the recent spate of security industry acquisitions, plus all the top infosec news and why criminals may not want to show their faces in Britain.
    Download this podcast

@22627 Threat Monitor -- May 18, 2006
Skype: Its dangers and how to protect against them
Skype may be free, but it could cost your enterprise its security. This tip outlines the free VoIP solution's security risks and offers tips for keeping Skype off of the network.
Listen to Skype: Its dangers and how to protect against them
Subscribe to our Threat Monitor podcast feed

@21786 Security Wire Weekly -- May 17, 2006
This week, Senior News Writer, Bill Brenner leads a roundtable discussion with author Sean Walberg, ISECOM's Pete Herzog and CISSP Frank Kenisky, about the (ISC)²'s controversial program to bring CISSP coursework to colleges and universities; plus all the week's top infosec news.
    Download this podcast



@21786 Security Wire Weekly -- May 10, 2006
This week, News Editor Eric Parizo interviews Security Incite's Mike Rothman about who's to blame for the controversial DOS attack against Blue Security and Six Apart, plus all the top news and the worm that just won't die. Listen on your computer or download to your favorite mobile device.
Download this podcast



@22627 Threat Monitor -- May 4, 2006
How to protect your company against cybercrime
Thanks to the Internet's inherent anonymity, widespread reach and disjointed law enforcement status, cybercriminals have a lot to gain -- and enterprises have a lot to lose. In this tip, SearchSecurity expert and malware guru Ed Skoudis describes how organized cybercriminals use extortion and botnets to further their illicit activities, and how enterprises can protect themselves.
Listen to How to protect your company against cybercrime
Subscribe to our Threat Monitor podcast feed

@21786 Security Wire Weekly -- May 3, 2006
This week, Senior News Writer Bill Brenner interviews Siemens security chief Dave Bixler about his organization's intrusion defense strategy, plus all the top news and why combatants in the browser battle are turning to guerilla warfare.
Download this podcast

April 2006

@21786 Security Wire Weekly -- April 26, 2006
This week Senior News Writer Bill Brenner interviews Gartner Vice President Jay Heiser about his controversial column asserting that the defense community is no longer a viable information security role model, plus all the top news and why spam blocking is an art and a science. Listen on your PC or download to your favorite mobile device.
Download this podcast here

@21786 Security Wire Weekly -- April 19, 2006
This week News Editor Eric Parizo interviews Opus One Senior Partner and Information Security magazine Contributing Editor Joel Snyder on the complexities of product testing, plus all the top information security news and why data theft may not cause pain and suffering after all. Listen on your PC or download to your favorite mobile device.
Download this podcast here

@21786 Security Wire Weekly -- April 12, 2006
This week News Editor Eric Parizo interviews SANS Internet Storm Center Chief Research Officer Johannus Ullrich regarding Microsoft's latest set of software patches, plus all the top information security news and why Wi-Fi might get you stabbed. Listen on your PC or download to your favorite mobile device.
Download this podcast here



@21786 Security Wire Weekly -- April 5, 2006
This week, Senior News Writer Bill Brenner talks to Determina Inc.'s Nand Mulchandani about third-party patching for the latest Internet Explorer flaw; plus news on a new Symantec report on smartphone security, a look at how IT security played out at the 2006 Winter Olympics and a legal battle over Verizon's spam-blocking efforts. Listen on your PC or download to your favorite mobile device.
Download this podcast here

March 2006

@21786 Security Wire Weekly -- March 29, 2006
This week News Editor Eric Parizo talks with Kansas City Snort User Group Founder Russ Starr on the future of Snort amid the recent collapse of the Check Point-Sourcefire deal, plus details on an upcoming Microsoft fix, Google's recent court victory and looking for love in all the wrong places. Listen on your PC or download to your favorite mobile device.
Download this podcast here

@21786 Security Wire Weekly -- March 22, 2006
This week Senior News Writer Bill Brenner talks with Cyber Security Industry Alliance Executive Director Paul Kurtz abut the troubled state of government security and what it means to enterprises, plus details on a pair of new IE flaws, and are AV firms addressing threats fast enough? Listen on your PC or download to your favorite mobile device.
Download this podcast here

@21786 Security Wire Weekly -- March 15, 2006
This week News Editor Eric Parizo talks with Yankee Group's Jennifer Simpson about Google's fight to keep its search records private, plus details on Microsoft's latest patches, Apple's continuing headaches and why the CIA is cursing the Web. Listen on your PC or download to your favorite mobile device.
Download this podcast here



@21786 Security Wire Weekly -- March 8, 2006
This week Senior News Writer Bill Brenner interviews Forrester's Paul Stamp on Check Point's beleaguered Sourcefire acquisition, plus details on a new Symantec report, Apple's latest black eye and why BlackBerry never squeezed security pros. Listen on your PC or download to your favorite mobile device.
Download this podcast here



@21786 Security Wire Weekly -- March 1, 2006
This week News Editor Eric Parizo has an interview with security guru Winn Schwartau about Mac OS security in the enterprise, plus details on the new 'Crossover' mobile malcode, the out-of-cycle Oracle patch and how a $50 million Internet scam got busted. Listen on your PC or download to your favorite mobile device.
Download this podcast here

February 2006

@21786 Security Wire Weekly -- February 22, 2006
This week Senior News Writer Bill Brenner details exploits targeting the latest Microsoft flaws, an hacking challenge that's raising eyebrows and a warning from Gartner that shouldn't be ignored. Listen on your PC or download to your favorite mobile device.
Download this podcast here



@21786 Security Wire Weekly -- February 16, 2006
In this third and final special edition of Security Wire Weekly from the 2006 RSA Conference, News Editor Eric Parizo covers what experts and attendees say about the merits of a proposed national ID card system, the most significant product announcements of the week from Information Security magazine, Sourcefire's Martin Rosche's answers to his critics and more. Listen on your PC or download to your favorite mobile device.
Download this podcast here

@21786 Security Wire Weekly -- February 15, 2006
In today's special edition of Security Wire Weekly from the 2006 RSA Conference, News Editor Eric Parizo has coverage of Wednesday's John Chambers keynote, reaction from attendees and details on the new security features in Microsoft's upcoming Vista OS. Listen on your PC or download to your favorite mobile device.
Download this podcast here



@21786 Security Wire Weekly -- February 14, 2006
In this special edition of Security Wire Weekly recorded on location in San Jose, Calif., at the 2006 RSA Conference, News Editor Eric Parizo offers detailed coverage of Tuesday's Bill Gates keynote address, analysis from Gartner's John Pescatore, and reactions from conference attendees, plus coverage of the day's other big speeches. It's as close as you can get to the show without getting on a plane. Listen on your PC or download to your favorite mobile device.
Download this podcast here

@21786 Security Wire Weekly -- February 8, 2006
In this week's edition of Security Wire Weekly, Editorial Director Jon Panker details why Microsoft's tool for creating help documentation needs help of its own, how Mozilla addressed a recent spate of browser flaws and why the corporate landscape is shifting beneath the feet of CISOs. Listen on your PC or download to your favorite mobile device.
Download this podcast here

@21786 Security Wire Weekly -- February 1, 2006
In this week's edition of Security Wire Weekly from SearchSecurity.com, Senior News Writer Bill Brenner prepares listeners for Friday's expected Nyxem strike, AV firms promise better testing for their antispyware products and Oracle swallows another round of criticism. Listen on your PC or download to your favorite mobile device.
Download this podcast here

January 2006

@21786 Security Wire Weekly -- January 25, 2006
In this week's edition of Security Wire Weekly, News Editor Eric Parizo brings us the latest on the fast-moving Nyxem worm and what it may do on Feb. 3, the latest flaws and fixes from the top vendors and why security pros aren't paying attention to what their tools tell them.
Download this podcast here



@21786 Security Wire Weekly -- January 18, 2006
In this week's edition of Security Wire Weekly, Editorial Director Jon Panker brings us news of a Windows Wi-Fi flaw, the details behind two new customer data leaks and the results of an FBI study into how businesses are coping with attacks.
Download this podcast here




@21786 Security Wire Weekly -- January 11, 2006
This week, Senior News Writer Bill Brenner details Microsoft's Patch Tuesday update, which the software giant hopes will thwart what could be an incredibly dangerous exploit, why security investments aren't doing enough to stop attacks and an expected Sober strike turns out to be a dud.
Download this podcast here



@21786 Security Wire Weekly -- January 4, 2006
In our first edition of 2006, News Editor Eric Parizo details Microsoft's plans for patching the Windows Meta File flaw, Symantec's latest acquisition and how an anti-hacking firm got hacked.
Download this podcast here





INFORMATION SECURITY PODCAST ARCHIVES
2008 podcasts
2007 podcasts
2006 podcasts
2005 podcasts
This was first published in June 2006

Dig deeper on Application Firewall Security

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close