Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

Defensive Security is a weekly information security podcast which reviews recent high profile cyber

Episodes

Total: 217

http://www.symantec.com/connect/fr/blogs/check-your-sources-trojanized-open-source-ssh-software-used

http://www.computerworld.com/article/2918406/cybercrime-hacking/cybercriminals-borrow-from-apt-playb

John’s book: http://www.amazon.com/Offensive-Countermeasures-Art-Active-Defense/dp/1491065966/

http://www.wsj.com/articles/five-simple-steps-to-protect-corporate-data-1429499477 http://www.politi

http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigation-report-2015_en_xg.pd

http://arstechnica.com/tech-policy/2015/04/police-chief-paying-the-bitcoin-ransom-was-the-last-resor

 HTCIA conference: http://www.htciaconference.org http://www.databreachtoday.com/new-malware-attack

High Tech Crime Investigation Association Conference: http://www.htciaconference.org http://www.data

http://www.infoworld.com/article/2898658/security/premera-anthem-data-breaches-linked-by-similar-hac

http://www.firstcoastnews.com/story/news/local/2015/03/09/cyber-thieves-target-orange-park-bank/2468

http://arstechnica.com/security/2015/03/ubers-epic-db-blunder-is-hardly-an-exception-github-is-awash

http://www.bloomberg.com/news/articles/2015-02-19/morgan-stanley-probe-said-to-examine-whether-advis

http://training.pcisecuritystandards.org/pci-ssc-bulletin-on-impending-revisions-to-pci-dss-pa-dss-a

http://www.techworld.com/news/security/dating-site-topface-pays-hacker-who-stole-20-million-credenti

http://www.scmagazine.com/travelers-accuses-web-firm-of-shoddy-practices/article/394588/ https://www

http://www.abc.net.au/pm/content/2015/s4164603.htm http://breakingbits.net/2015/01/18/taking-over-g

http://www.darkreading.com/a-lot-of-security-purchases-remain-shelfware/d/d-id/1318648 http://arstec

http://www.wsj.com/articles/puzzle-forms-in-morgan-stanley-data-breach-1420590326 http://www.economi

 http://www.darkreading.com/attacks-breaches/long-running-cyberattacks-become-the-norm/d/d-id/131839

https://securityledger.com/2014/12/new-clues-in-sony-hack-point-to-insiders-away-from-dprk/http://ww