Episode Artwork
1.0x
0% played 00:00 00:00
Feb 03 2014 37 mins   176
More advice from Bob; Follow up on Coke’s lost laptops; Honey Encryption to frustrate attackers; What the Target breach shows us about vendor risk; Managing the response to a data breach; More POS malware, this time with TOR goodness. Subscribe in iTunes Podcast RSS Feed Twitter Email http://blogs.csoonline.com/security-leadership/2957/interesting-finding-coke-data-breach-and-why-you-need-prevent-it-happening-you http://www.technologyreview.com/news/523746/honey-encryption-will-bamboozle-attackers-with-fake-secrets/ http://www.networkworld.com/news/2014/013114-target-credential-theft-highlights-third-party-278305.html http://www.networkworld.com/news/2014/013014-positioning-your-institution39s-response-in-278292.html http://www.networkworld.com/news/2014/013014-tor-enabled-malware-stole-credit-card-278289.html?source=nww_rss