Archive for March, 2015

March 28, 2015, Episode 362, Show Notes

Posted in Breach, Exclusive, Vulnerabilities with tags , , , on March 28, 2015 by datasecurityblog

Episode 362 of The CyberJungle is about 27 minutes long. The interview with Daniel Stein, on health info use and privacy begins at about 13:40. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 362 via the flash player:

Interview

Daniel Stein, President Stewards of Change. Read more here: How Open Data Can Shape Public Policy

Our Take on This Week’s News

Cyberthreats heavy on the minds of health provider, insurer technology execs

Security Community Slams Blue Coat Claiming It ‘Pressured Security Researcher Into Cancelling Talk On Its Tech

Tales from The Dark Web

RansomWeb: emerging website threat that may outshine DDoS, data theft and defacements?

Wrap

The authorized information available the NSA HQ could be published in a single tweet

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

March 14, 2015, Episode 361, Show Notes

Posted in Breach, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on March 14, 2015 by datasecurityblog

Episode 361 of The CyberJungle is about 27 minutes long.  The interview with Frank Ohlhorst, IT Journalist begins at about 14:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 361 via the flash player:

Interview

Frank Ohlhorst is an IT Journalist, Author, Analyst, and Consultant. Mentioned in the segment: 2015 Shaping up to be the Year of Massive Cyber Attacks

More articles by Frank Ohlhorst:

Free identity protection from breached companies falls short

Review: Vectra X-Series Prevents Data Breaches with AI

WatchGuard Security Appliance Keeps Close Watch on Network Activity

Our Take on This Week’s News

Ad bidding network caught slinging ransomware

Digital Certificate Forensics: What Venafi TrustNet Tells Us about the Clinton Email Server

Hackers, probing Clinton server, cite security lapses

Tales from The Dark Web

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Wrap

Privacy advocates try to keep ‘creepy,’ ‘eavesdropping’ Hello Barbie from hitting shelves

 

Please support our sponsors, as they help make The CyberJungle possible:

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com