Episode Artwork
1.0x
0% played 00:00 00:00
Mar 17 2014 57 mins   122
Advice for the criminals from Bob; Pwn2Own results are in; Target ignored it’s FireEye alerts; Integrating threat intelligence into your operations; The problem with threat intelligence; Advanced endpoint protection advice; Workers are apathetic about lost mobile devices and company data; Lessons to learn from the hack of some Navy servers; How the Syrian Electronic Army compromised Forbes; a discussion about what to do when you see criminal activity. Subscribe in iTunes Podcast RSS Feed Twitter Email http://threatpost.com/three-things-to-take-away-from-cansecwest-pwn2own/104835 http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data#p1 https://securosis.com/assets/library/reports/Securosis_ThreatIntelSecurityMonitoring_FINAL.pdf http://krypt3ia.wordpress.com/2014/03/09/assessment-corporate-threat-intelligence-versus-actual-intelligence-products/ https://securosis.com/mobile/advanced-endpoint-and-server-protection-quick-wins/full http://www.networkworld.com/news/2014/030514-cios-battle-worker-apathy-towards-279420.html http://www.csoonline.com/article/749450/navy-network-hack-has-valuable-lessons-for-companies http://www.forbes.com/sites/andygreenberg/2014/02/20/how-the-syrian-electronic-army-hacked-us-a-detailed-timeline/