This week's tools, tips and tricks episode goes over an overlooked feature within the Google Stack, Google Alerts. This episode goes into how Google Alerts work and how they can provide value to your security program and personal identity monitoring. ...
Lake Street El
In order to process data and carry out business responsibilities you need to grant access to users. However, because access is granted does not give the user's free reign to use that access anyway they choose. Authorized use based on business need come...
Continuing with the mini-series OWASP Top 10 Proactive Security Controls we are at number 5, Validate All Inputs. This control is a vital component of protecting against injection and cross site scripting attacks. This episode goes through the importan...
The terms junk, spam and phishing are used interchangeably when they are three different categorizations of mail. This episode goes through each one and breaks them down to help clarify security implications of each one. Be aware, be safe. ---------...
Chances are you have a mobile phone, you may listening to this podcast on one right now. What if you set your phone down on the restaurant table for a second and when you look up it's gone. Stolen. This episode goes over the things you should do and no...
This week's tools, tips and tricks episode talks about how to see if your external hard drives have been compromised from the Internet. If you have setup a large hard drive at home to store and share files might be accidentally exposed to the whole Int...
Video games are here to stay and are becoming the new social platforms. Game today you can play with up to 100 people, strangers, and talk with them as you play. This episode is for every parent with video game playing children to help the parents talk...
Threat detection and response is a critical aspect of any security program. You need to know when something malicious has been detected and react to fix it. However, more and more attacks are able to slip passed the detections. This is where Threat Hun...
Employees are reviewed and rated on their job performance from time to time. Do you take into account security performance? Why or why not? Employees are relied upon to maintain some level of security best practices as part of their job. This episode t...
Through your career you should be getting additional training and education. Application developers are no different. This episode talks about developers getting training in Ethical Hacking and why it would be a valuable knowledge set to have that will...
This week's tools, tips and tricks talks about the website IPLeak.net. This website helps you identify if you have a WebRTC leak vulnerability in your browser. This episode explains what WebRTC is and if you use a VPN why you should use IPLeak.net. Chr...
Security programs are often talked about within an organization when something bad happens. This episode talks about why security professionals and programs should start bragging about the successes no one else sees. Be aware, be safe. ---------------...
Security programs rely on all employees to have a base level of security knowledge and awareness to the policies. Why doesn't every job description have a security requirement stated? This episode talks about why you should think about adding them to a...
Identity Management, specifically the lifecycle, is not only about granting access but taking access away. Deprovisioning access and resources is a critical security step if you want to maintain 'need to have access' levels. This episode goes into why....
Firewalls are the first line of defense in a network. They have the rules of what on the network can talk to and what is blocked from being accessed. This episode talks about why those block rules should be monitored closely and what they can tell you ...
This week's tools, tips and tricks episode is about organization. The tool this episode goes over is Any.Do. A robust task organization app that brings your tasks and lists together. Any.Do Website Be aware, be safe. --------------------------------...
A former employee from Apple stole deep trade secrets and tried to flee the country with them. The FBI was contacted and the employee was arrested at the airport. This episode goes into how it happened, how it was detected and why you should not discou...
The latest company to announce a breach was Timehop. This case is another example on why end to end security is so important but Timehop's transparency to the breach is fantastic. This episode talks about the breach, how it happened and why Timehop's o...