[img_assist|nid=5559|title=|desc=|link=none|align=right|width=100|height=100]Dennis Fisher talks with Eddie Schwartz, CSO of NetWitness, about a new study the company did on the level of awareness of advanced threats in the enterprise and what organizations are doing to respond to the latest targeted attacks.
Browsing Category: Podcasts
[img_assist|nid=4779|title=|desc=|link=none|align=right|width=100|height=100]In this episode, Ryan Naraine and Dennis Fisher discuss the relative value of the never-ending disclosure debate, the value of zero-days and whether users should be worried about the ability of Google to remotely install apps on Android phones.[swf
[img_assist|nid=5442|title=|desc=|link=none|align=right|width=100|height=100]Dennis Fisher talks with Alex Horan of Core Security about penetration testing, the place of security within a business and Core’s new push to make security more accessible and understandable for business leaders.
[img_assist|nid=5382|title=|desc=|link=none|align=right|width=100|height=100]Dennis Fisher talks with Mike Mimoso of SearchSecurity.com and Information Security magazine about the current spate of highly targeted attacks, the silliness of the term cyberwar and the controversy surrounding the disclosure of the Windows Help Center flaw.
[img_assist|nid=8327|title=|desc=|link=none|align=left|width=100|height=100]Dennis Fisher talks with security researcher Moxie Marlinspike about his new startup, Whisper Systems, his RedPhone and TextSecure voice and data encryption software and the challenges of maintaining privacy in the Google Age.
[img_assist|nid=4814|title=|desc=|link=none|align=right|width=100|height=100]Dennis Fisher talks with Gary McGraw of Cigital about the release of the BSIMM2 model, the continued maturing of software security programs and the similarities between computer security and cargo cult science.
[img_assist|nid=4728|title=|desc=|link=none|align=right|width=100|height=100]Dennis Fisher talks with analyst Rich Mogull of Securosis about his new report on database encryption, the value and danger of storing credit-card data and why more companies don’t get rid of sensitive data more quickly.
[img_assist|nid=4678|title=|desc=|link=none|align=right|width=100|height=100]Dennis Fisher talks with Didier Stevens, the security researcher who developed the innovative method for using the /launch command in PDF readers to execute code on remote machines. Stevens discusses the ramifications of the discovery, the security of PDFs in general and the user behavior that makes these attacks more effective.
[img_assist|nid=4639|title=|desc=|link=none|align=right|width=100|height=100]Dennis Fisher talks with Chris Hoff of Cisco Systems about the state of cloud security and privacy, as well as Hoff’s plan for a series of hacking and technology conferences aimed at kids: HacKid.
Dennis Fisher talks with Don Bailey of iSec Partners and Nick DePetrillo, an independent security researcher, about their recent work on geolocation and tracking of GSM mobile handsets and the privacy and security implications for users.