Archive for the Conference Coverage Category

June 23rd 2015, Episode 367, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities, Zero Day Project with tags , , , , , , on June 22, 2015 by datasecurityblog

Episode 367 of The CyberJungle is about 38 minutes long.  The interview with Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS) begins at about 23:20.  You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 367 via the flash player:

Interview

Exclusive: Jim Elste, on the Americas Conference on Information Systems 2015 (AMCIS)

Related links mentioned on segment:

Association for Information Systems (AIS)

Kennesaw State University, Michael J. Coles College of Business Center for Information Security Education (CISE)

James Elste on Peerlyst

Our Take on This Week’s News

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

OPM attackers had valid user credentials and run of network, bypassing security

If you can’t keep hackers out, find and remove them faster

Looking for help after the federal employee hack? Prepare to spend a few hours on hold.

Your mobile device is as un-safe as you think (scroll down to see the details of the Samsung and iOS 0days)

Jindal vetoes license plate scanner legislation over privacy and security concerns

Tales from The Dark Web

Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

June 04 2015, Episode 366, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on June 3, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 25 minutes long.  The interview with Yuri Gubanov, CEO of Belkasoft begins at about 16:10.   You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 366 via the flash player:

Interview

Exclusive: Yuri Gubanov, CEO of Belkasoft

Our Take on This Week’s News

VA fails cybersecurity audit for 16th straight year

Essential controls help Aust Govt fight off EVERY cyber attack since 2013

Cyber insurance won’t pay when breach due to poor security process

Tales from The Dark Web

Nasty Mac vulnerability allows remote attack, survives OS X reinstallation and even drive format

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

May 20 2015, Episode 365, Show Notes

Posted in Breach, Conference Coverage, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on May 20, 2015 by datasecurityblog

Episode 365 of The CyberJungle is about 30 minutes long.  The interview with Ashish Laravie from Cyber Reason begins at about 13:30.  The interview with WolfGang Kandis, CTO of Qualys begins at about 21:00. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 365 via the flash player:

Interview

Exclusive: Ashish Laravie from Cyberreason

WolfGang Kandis, CTO of Qualys

Our Take on This Week’s News

Feds Say That Banned Researcher Commandeered a Plane

NHTSA Aims To Speed Implementation Of Vehicle-To-Vehicle Communication

Tales from The Dark Web

Tales from The Dark Web is out on a fact finding mission

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

May 4, 2015, Episode 364, Show Notes

Posted in Breach, Conference Coverage, ediscovery, Exclusive, Podcast, Show Notes, The CyberJungle with tags , , , , on May 4, 2015 by datasecurityblog

Episode 364 of The CyberJungle is about 23 minutes long.  The interview with digital forensic researcher Dr. Fred Cohen begins at about 10:00. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 364 via the flash player:

Interview

Exclusive: Digital forensic researcher Dr. Fred Cohen . Mentioned in the segment: All.net, and the link to the digital book mentioned in the segment

Our Take on This Week’s News

Testing bodies AV‐Comparatives, AV‐TEST and Virus Bulletin comment on allegations AV company tried to rig test

Ford scraps plan to build car seat that detects heart attack

Tales from The Dark Web

Tales from The Dark Web is out on a fact finding mission

Wrap

Privacy advocates try to keep ‘creepy,’ ‘eavesdropping’ Hello Barbie from hitting shelves

Major London rail station reveals system passwords during TV documentary

Please support our sponsors, as they help make The CyberJungle possible:

peerlyst

Peerlyst is a network of security professionals. Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions—and learn from their peers’ real‐world experiences. Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise, and discover new career opportunities.

PLEASE VISIT THEIR SITE Peerlyst.com

 

Dec 3, 2014, Episode 355, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , on December 3, 2014 by datasecurityblog

Episode 355 of The CyberJungle is about 27 minutes long.  The interview with Sean Morrissey, CEO Katana Forensics begins at about 17:30. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 355 via the flash player:

Interview

Sean Morrissey, CEO Katana Forensics

Our Take on This Week’s News


Details Emerge on Malware Used in Sony Breach

Is Uber’s rider database a sitting duck for data breaches?

 

Tales from The Dark Web

Cheapest Tablets Pose Biggest Security Risks

Wrap

The wrap is out Christmas shopping

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Nov 17, 2014, Episode 354, Show Notes

Posted in Breach, Conference Coverage, criminal forensics, darkweb, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on November 17, 2014 by datasecurityblog

Episode 354 of The CyberJungle is about 29 minutes long.  The interview with James Wiebe of CRU on remote digital forensics starts at about 21min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 354 via the flash player:

Interview

Interview with James Wiebe of CRU on remote digital forensics. Here is the Ditto box he talked about.

Our Take on This Week’s News

Cyphort Report: TargetDepot attacks NOT sophisticated

Privacy backlash cracking GoogleGlass

Tales from The Dark Web

ATM attackers hit kiosks

Wrap

BlueLounge Soba

 

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

Aug 30, 2014, Episode 348, Show Notes

Posted in Conference Coverage, criminal forensics, darkweb, eMail Security, Exclusive, Podcast, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on August 29, 2014 by datasecurityblog

Episode 348 of The CyberJungle is about 36 minutes long.  Blackphone CEO John Calais on open-source based securephones starts at 15:45min. From BlackBerry’s Security Program Management Office, Susan Riedel,  starts at about 24min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 348 via the flash player:

Interview

Blackphone CTO John Callas on open-source based securephones

From BlackBerry’s Security Program Management Office, Susan Riedel. Blackberry’s Career Page

Our Take on This Week’s News

Belkasoft’s take on SSDForensics, 2014 Edition, 2012 Edition

Elcomsoft’s phone password breaker

Tales from The Dark Web

Our take on the JPMorgan news coverage

Please support our sponsors, as they help make The CyberJungle possible:

Basis Technology is helping investigators perform faster, more efficient, cost-effective, and complete investigations in cybersecurity and incident response.

BASIS TECHNOLOGY……PLEASE VISIT THEIR SITE BASISTECH.COM

logo-BasisTech_green_150

Basis Technology

 

 

 

 

————————————

PFIC Forensic Conference

Come back to the mountains of Snowbird Utah with us Nov 12-14, 2014. We are returning to beautiful Snowbird, Utah with a full agenda, larger exhibit hall, and more offerings for everyone. There will be two enrollment categories, each with 8 Hours of Labs, 8 Hours of Lectures, and 8 Hours of Training.

Paraben's Forensic Innovations Conference

Follow

Get every new post delivered to your Inbox.

Join 1,259 other followers