July 27th 2015, Episode 369 Show Notes

Posted in Vulnerabilities, Podcast, darkweb, Breach, web server security, criminal forensics, Exclusive, The CyberJungle, Show Notes with tags , , , , on July 27, 2015 by datasecurityblog

Episode 369 of The CyberJungle is about 32 minutes long. The interview with Richard Stiennon, author of “There Will Be Cyberwar,” begins at about 17:00.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 369 via the flash player:

Interview

Exclusive: Richard Stiennon, author of “There Will Be Cyberwar

Our Take on This Week’s News

John McAfee: The Ashley Madison hack is the death knell of secrets

Is He Cheating on You?

Fiat Chrysler in consent degree for recall process failures

Progressive Insurance Snapshot Manufacturer Breached

Tales from The Dark Web

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware

Wrap

Black hat coffee hacker

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

July 6th 2015, Episode 368, su root edition, Show Notes

Posted in Breach, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , on July 4, 2015 by datasecurityblog

Episode 368 of The CyberJungle is about 35 minutes long.  It’s an su root edition, where we go in-depth on a topic. The interview with Dr. Mansur Hasib, on why CEOs need to be fired for poor information security, begins at about 6:30.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 368 via the flash player:

Interview

Exclusive: Dr. Mansur Hasib : To Improve Cybersecurity, Fire Some CEOs

More from Dr. Hasib:

Fire CEOs who don’t see cyberattacks as a business risk

Technology not a fix-all for cybersecurity

Dr. Hasib’s book, Cybersecurity Leadership, which will benefit leaders as they try to understand these issues

The book is also available in audio format narrated by Dr. Hasib

Our Take on This Week’s News

Cardinals fire scouting director as hacking investigations continue

Baseball club boots out director as details on database compromise surface

Tales from The Dark Web

No Dark Web so that we can bring you an extended segment with Dr. Hasib

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

June 23rd 2015, Episode 367, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, Zero Day Project with tags , , , , , , on June 22, 2015 by datasecurityblog

Episode 367 of The CyberJungle is about 38 minutes long.  The interview with Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS) begins at about 23:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 367 via the flash player:

Interview

Exclusive: Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS)

Related links mentioned on segment:

Association for Information Systems (AIS)

Kennesaw State University, Michael J. Coles College of Business Center for Information Security Education (CISE)

James Elste on Peerlyst

Our Take on This Week’s News

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

OPM attackers had valid user credentials and run of network, bypassing security

If you can’t keep hackers out, find and remove them faster

Looking for help after the federal employee hack? Prepare to spend a few hours on hold.

Your mobile device is as un-safe as you think (scroll down to see the details of the Samsung and iOS 0days)

Jindal vetoes license plate scanner legislation over privacy and security concerns

Tales from The Dark Web

Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

June 04 2015, Episode 366, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on June 3, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 25 minutes long.  The interview with Yuri Gubanov, CEO of Belkasoft begins at about 16:10.   You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 366 via the flash player:

Interview

Exclusive: Yuri Gubanov, CEO of Belkasoft

Our Take on This Week’s News

VA fails cybersecurity audit for 16th straight year

Essential controls help Aust Govt fight off EVERY cyber attack since 2013

Cyber insurance won’t pay when breach due to poor security process

Tales from The Dark Web

Nasty Mac vulnerability allows remote attack, survives OS X reinstallation and even drive format

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

May 20 2015, Episode 365, Show Notes

Posted in Breach, Conference Coverage, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on May 20, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 30 minutes long.  The interview with Ashish Laravie from Cyber Reason begins at about 13:30.  The interview with WolfGang Kandis, CTO of Qualys begins at about 21:00. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 365 via the flash player:

Interview

Exclusive: Ashish Laravie from Cyberreason

WolfGang Kandis, CTO of Qualys

Our Take on This Week’s News

Feds Say That Banned Researcher Commandeered a Plane

NHTSA Aims To Speed Implementation Of Vehicle-To-Vehicle Communication

Tales from The Dark Web

Tales from The Dark Web is out on a fact finding mission

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

May 4, 2015, Episode 364, Show Notes

Posted in Breach, Conference Coverage, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on May 4, 2015 by datasecurityblog

Episode 364 of The CyberJungle is about 23 minutes long.  The interview with digital forensic researcher Dr. Fred Cohen begins at about 10:00. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 364 via the flash player:

Interview

Exclusive: Digital forensic researcher Dr. Fred Cohen . Mentioned in the segment: All.net, and the link to the digital book mentioned in the segment

Our Take on This Week’s News

Testing bodies AV‐Comparatives, AV‐TEST and Virus Bulletin comment on allegations AV company tried to rig test

Ford scraps plan to build car seat that detects heart attack

Tales from The Dark Web

Tales from The Dark Web is out on a fact finding mission

Wrap

Privacy advocates try to keep ‘creepy,’ ‘eavesdropping’ Hello Barbie from hitting shelves

Major London rail station reveals system passwords during TV documentary

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

RSA Conference 2015: Opening Keynotes, Tuesday April 21st 2015

Posted in Uncategorized on April 22, 2015 by datasecurityblog

The Opening Keynotes for RSA Conference 2015 seemed like a safe bet, if judged by the lines to get into the Keynote auditorium at Moscone Center in San Francisco. The CyberJungle showed up early, and encountered a massive line, of people, grabbing a “brown bag” breakfast of a ham and egg sandwich. So, we skipped that line, grabbed a bite nearby and came back to just see the keynotes.

Just at the moment it was our turn in line to enter, the security people said the room just hit capacity, and The CyberJungle had to view the keynotes in an overflow room filled with a massive video display.

While the technology in that room was great, the keynotes were a snore. Jane Lynch from Glee was doing a sing and dance number that was more appropriate for a G-rated MTV Music award performance, backup singers included.  Snore.

The opening Keynote by RSA Head Honcho Amit Yoran had some good nuggets about the transformation of security into everything around us (think Internet of Things, Smart Cars, etc), there was still a lot of marketing fluff over computer science substance.

‘Whit’ Diffie, one of the Godfather’s of crypto was in a panel, and didn’t dissapoint with his insights into the future of crypto.

Overall, The CyberJungle wishes for more substance and less sizzle in next year’s opening keynotes.

Follow

Get every new post delivered to your Inbox.

Join 1,259 other followers