Podcast – Page 2 – Security Catalyst

Archive

Category Archives for "Podcast"

DtR Security Newscast: reconsidering the game of security, new identity theft trends, and implications of self-driving cars

Listen to the latest episode of the Down the Rabbithole (DtR) Security Newscast for May 19th, 2014 — with Raf Los (@Wh1t3Rabbit)  and Phillip Beyer (@pjbeyer) sitting in for James Jardine (@JardineSoftware). We record the DtR Newscast every other Monday to engage in spirited discussion about security topics in the news. More than a run-down of the […]

Continue reading

DtR Security Newscast: Patching XP, Security of Open Source, Target’s CEO, and Fingerprints

Listen to the latest episode of the Down the Rabbithole (DtR) Security Newscast with Raf Los (@Wh1t3Rabbit)  and James Jardine (@JardineSoftware). We record the DtR Newscast every other Monday to engage in spirited discussion about security topics in the news. More than a run-down of the news, it’s our unfiltered (but safe for work) discussion of top […]

Continue reading

DtR Security Newscast: Heartbleed, hackers, passwords, and more

Listen to the latest episode of the Down the Rabbithole (DtR) Security Newscast with Raf Los (@Wh1t3Rabbit)  and James Jardine (@JardineSoftware). We record the DtR Newscast every other Monday to engage in spirited discussion about security topics in the news. More than a run-down of the news, it’s our unfiltered (but safe for work) discussion of top […]

Continue reading

DtR Security Newscast – the *real* end of XP, the google nest dance, and more breach

What started as a guest spot to share some insights on the Target breach has turned into a regular appearance on the Down the Rabbithole (DtR) Security Newscast with Raf Los (@Wh1t3Rabbit)  and James Jardine (@JardineSoftware). We record the DtR Newscast every other Monday to engage in spirited discussion about security topics in the news. […]

Continue reading

Effective Communication and the Value of Cloud Security (Presentation)

Perplexed by the challenge of cloud security, let alone how to use effective communication to demonstrate the business value of taking an approach that secures information? The rapid growth and adoption of cloud computing leads to sometimes confusing situations where security remains an afterthought. At a time when everyone is expected to do more with […]

Continue reading