Archive for Verizon

June 11th 2013, Episode 304, Show Notes

Posted in Conference Coverage, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on June 10, 2013 by datasecurityblog

Episode 304 of The CyberJungle is a break from our usual format and is about 48 minutes long.  The interview with Susan Landau about CALEA II  begins at about the 11:15min mark. The interview with Martha Hampel from StopBigBrother.org. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 304 via the flash player: http://dataclonelabs.com/security_talkworksfollowingTalesfromTheDarkWebhop/thecyberjungle_304.mp38

Interviews

Susan Landau works in the areas of cybersecurity, privacy, and public policy. CALEA II: Risks of Wiretap Modifications to Endpoints

Martha Hampel, grass roots organizer with stopbigbrother.org

Our Take On This Week’s News

Christopher Soghoian: Analyzing Yahoo’s PRISM non-denial;  And from 2009: 8 Million Reasons for Real Surveillance Oversight

Whistleblower’s NSA warning: ‘Just the tip of the iceberg

Wrap

Rules on Privacy Could Be Revisited

Please support our sponsors, as they support The CyberJungle

HTCIA International Conference and Training Expo 2013

HTCIA International Conference and Training Expo 2013

The High Technology Crime Investigation Association (HTCIA) Annual conference is committed to bringing its participants – members or non-members — the best training, tools and networking the industry has to offer.

We rely on the generosity of our sponsors, who take a vested interest in working with us to develop a conference that exemplifies what the HTCIA organizations stands for. By fostering the exchange of investigation-related information and ideas, we bring together a community of professionals who help one another understand and adapt to our rapidly evolving industry–to everyone’s benefit.

The 2013 conference is being held from September 8-11, 2013 in Las Vegas, NV [Summerlin is the western side of Las Vegas, 15min from Downtown via freeway].

Paraben's Forensic Innovations Conference

The Paraben Forensic Innovations Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!  PFIC 2013 will be held November 13-15th, 2013 in Salt Lake City Utah. Space for this conference is limited, and with tickets starting at $199, the show will almost surely sell out. The CyberJungle will be there, because it is one of the best bang for the buck forensic conferences of the year.

 

May 31, 2011 – Episode 215

Posted in Breach, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on May 30, 2011 by datasecurityblog

Episode 215 of  The CyberJungle is about 30 minutes long.  You can hear it by clicking on the flash player below. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show. The interviews start at about the 17:30 mark.

To listen to Episode 215 via the flash player:

Interview

Checklist Compliance vs. Security, with Lila Kee of GlobalSign. A new study reveals that up that some healthcare providers spend 100% of their data security efforts on compliance, rather than actual risk reduction.

Our Take on The Week’s News

Privacy: Users aren’t turning on Do Not Track browser featuresAs reported by Consumer Reports

Become a “Hacker” in 15 Minutes or Less: In a controlled experiment a small group of volunteers with limited technological knowledge followed a online tutorial to hack into a computer network

Tales from the Dark Web

Lockheed and PBS Join the Roster of Recent Victims as Motives Expand; Almost Anyone Is a Target

Verizon 2011 Data Breach Investigations Report: Cyber Criminals Shifting to Smaller, More Opportunistic Attacks; External Attacks, Especially Hacking, on Rise . Read the important security essentials near the bottom of the news release.

Wrap

Dualboot MeeGoLinux or WIN7 On New Asus ultraslim portable computer

Follow

Get every new post delivered to your Inbox.

Join 1,139 other followers