• Formulate a more effective information security incident response plan

    In this Hot Type podcast, author Neal McCarthy discusses how enterprises should create and maintain an information security incident response plan.

  • Podcast: Trey Ford on Black Hat 2012 security conference

    Security expert Trey Ford talks about the upcoming the Black Hat security conference. Ford is general manager of Black Hat 2012.

  • DNSSEC deployments: The top 5 concerns and how to avoid them

    A DNSSEC deployment is possibly the best mitigation for cache poisoning attacks. Learn how to avoid the top five concerns in DNSSEC deployments.

  • Top 5 mistakes to avoid during log management implementations

    In this podcast, learn about five key issues to avoid in log management implementations so you can make the most of security event logs to augment your organization’s security posture.

  • Verizon DBIR 2012 overview, attack mitigation strategies

    Christopher Porter of Verizon explains some of the findings from the Verizon 2012 Data Breach Investigations Report. This year, hacktivists had a big impact on the numbers.

  • Countdown: Top five ways to prevent a security lapse from becoming a security breach

    In this podcast, learn five information security mistakes organizations often make that lead to data breaches, and how to bring resources to bear quickly to mitigate mistakes and avoid a breach.

  • Top Five Ways to Detect Unwanted Data in the Enterprise

    Our file servers, workstations, flash drives and cloud services all contain massive amounts of data, driven by the fact that storage has quickly become an inexpensive commodity. It’s often cheaper to just keep everything than to expend time and energy sorting through outdated, irrelevant or inapplicable data. However, this practice can dramatically increase risk to the enterprise by increasing the amount of data vulnerable to an attack. In this podcast, we look at five ways that you can detect the presence of unwanted data in your environment.

  • Information security podcasts: 2010 and 2011 archive

    Download information security podcasts from SearchSecurity's 2010 and 2011 podcast archive.

  • Countdown: Top 5 must-haves for your SDL security strategy

    In this podcast, expert Cory Scott details the five most important elements to ensure enterprise SDL security for Web applications.

  • SearchSecurity.com Blogs

  • Information security podcasts

    Download these weekly information security podcasts covering the top news and issues enterprise infosec pros care about to your PC or favorite mp3 player.

  • Countdown: Top 5 ways to tune IDS/IPS to meet business needs

    In this podcast, we'll count down the top five ways to tune an IDS/IPS to make sure it's meeting the business requirements you purchased it to meet.

  • Information security podcasts: 2009 archive

    Listen to all of SearchSecurity.com's security podcasts from 2009: a collection of the year's best IT news and Q&A with infosec experts.

  • Fact or fiction: Inside extrusion detection and prevention technology

    According to our latest survey of more than 608 enterprise security pros, 80% of enterprises say protecting data is more important in 2007 than last year, and 72% admit they need a better strategy. SearchSecurity.com is responding to this growing need with a multi-lesson Data Protection Security School to help you formulate a comprehensive strategy to secure sensitive info throughout your network. With a new data breach headline in the news almost daily, plenty of infosec pros are looking for new ways to proactively spot potential data disclosure problems before they happen. Extrusion detection and prevention tools can help, but to be effective, practitioners must know what they can and can't do. This podcast will use the popular "fact or fiction" format to help sort out what is and isn't true about today's extrusion detection and prevention technology.

  • Curveball: Endpoint encryption strategies

    When a laptop turns up stolen, it's reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use of encryption to secure data stored on endpoint computers.

  • Managing third-party compliance

    In this podcast, special guest expert Richard Mackey offers tips on managing third-party compliance and risk.

  • Countdown: Top 5 issues involving data loss and the virtualized cloud

    In this podcast, learn the issues to consider when moving data into the cloud and how to work with your provider on security.

  • Countdown: The top 5 things you can do to lock down your database right now

    Implementing security measures to secure database installations is an important, but overwhelming task. This expert podcast will provide you with a practical guide of immediate steps that you can take to eliminate common vulnerabilities found in database deployments.

  • Countdown: Top 5 most important questions to ask endpoint security vendors

    After the endpoint security assessment is over and it's time to go talk to vendors, how can you tell between a song and a dance, and what you can truly expect out of a product?

  • Information security podcasts: 2008 archive

    Listen to all of SearchSecurity.com's 2008 security podcasts, which include the year's best IT news and interviews.

  • Countdown: Tips for effective end-user security education programs

    Get tips for creating an effective end-user security education program to help safeguard your organization's critical resources and increase overall business performance.

  • How to choose the right SIM

    There are dozens of security information management (SIM) tools on the market and they each have their own strengths and weaknesses. Choosing the wrong solution, however, is not just an issue of wasting your investment, but also potentially failing to accomplish critical business goals. Listen to this expert podcast and learn more about important differences between SIM appliances and software-based tools, leveraging SIMs for collecting and utilizing the right types of data for compliance and other security policies, and tips for evaluating SIM solutions and deciding which option is best for your organization.