Adventures in Security
Podcast Archive
You need Java to see this applet.
[ Yahoo! ] options
Episode 36 - Web Application Security (Part 7), August 12, 2006
Episode 35 - Web Application Security (Part 6), August 6, 2006
Episode 34 - Web Application Security (Part 5), July 29, 2006
Episode 33 - Web Application Security (Part 4), July 12, 2006
Episode 32 - Web Application Security (Part 3), July 1, 2006
Episode 31 - Web Application Security (Part 2), June 25, 2006
Episode 30 - Web Application Security (Part 1), June 18, 2006
Episode 29 - Diversity in Design, June 11, 2006
Episode 28 - Media Sanitation (Part 3), June 4 2006
Episode 27 - Media Sanitation (Part 2), May 28, 2006
Episode 26 - Media Sanitation (Part 1), May 21, 2006
Episode 25 - Spreadsheet Assurance, May 7, 2006
Episode 24 - VLANs and Network Access Controls, April 30, 2006
Episode 23 - Integrate Security into IS, April 23, 2006
Episode 22 - Improve Outcomes with After Action Reviews, April
16, 2006
Episode 21 - Build a Security Awareness Program, April 9, 2006
Episode 20 - Vulnerability Management, April 2, 2006
Episode 19 - Portable Storage Device Security, March 26, 2006
Episode 18 - RFID Concerns and DNS Cache Poisoning, March
19, 2006
Episode 17 - Sender ID and Electronic Signatures, March 12,
2006
Episode 16 - IP Surveillance, March 5, 2006
Episode 15 - Security Critical Success Factors, February 26,
2006
Episode 14 - Google Desktop V3, February 19, 2006
Episode 13 - Botnets, February 12, 2006
Episode 12 - Designing Intrusion Defense, February 5, 2006
Episode 11 - VoIP Security, January 29, 2006
Episode 10 - Blended Threats, January 22, 2006
Episode 9 - Securing Stored Data, January 15, 2006
Episode 8 - Securing Instant Messaging, January 8, 2006
Episode 7, Eradication, Recovery, and Control for Incident
Response, January 1, 2006
Episode 6, Analysis, Detection, and Containment for Incident
Response, December 25, 2005
Episode 5, Preparing for Incident Response, December 18, 2005
Episode 4, Outsourcing Due Diligence, December 11, 2005
End User Device Security Series
Part 1 – Layered Security and Building a Security Program,
November 20, 2005

Part 2 - Access Controls and Configuration Management,
November 27, 2005

Part 3 - Wireless Hand Held Device and Wireless Security,
December 4, 2005
Episode 37 - Web Application Security (Part 8), August 19, 2006
Topic: Application Denial of Service and Insecure Configuration Management

Episode 38 - Desperation doesn't justify bad security, September
9, 2006
Topic: The importance of change management, the potential security risks when
desperation enters the project lifecycle, how virtual floors can provide secure
flexible business-to-business connectivity, and finally, a look at some ways to
handle sensitive information once printed, copied, or faxed.

Episode 38 MP3

Segment 1 Notes - Change Management
Segment 2 Notes - Desperation doesn't justify bad security
Segment 3 Notes - Virtual Floors
Segment 4 Notes - But what about the paper
Episode 39 - The Home PC Threat, September 24, 2006
Topic: The importance of choosing the right source for audit artifacts, and the
growing threat of employee home PCs to the business enterprise

Episode 39 MP3    

Segment 1 Notes -
Who Should Provide Audit Artifacts?  
Segment 2 Notes -
The Threat of Home PCs     
Episode 40 - Keystroke Dynamics (KD), October 2, 2006
Topic:  Examination of biometrics in general.  Introduction of Keystroke
Dynamics as a low impact biometric alternative.

Episode 40 MP3    

Episode 40 Notes
Episode 41 - Cyber-Espionage, October 15, 2006
Topic: The balance between customer welfare and vendor public image when
handling security incidents, establishing reasonable and appropriate system
assurance, and a look at our nation's vulnerability to cyber-espionage.

Episode 41 MP3

Segment 1 Notes - Customer Welfare vs. Public Image
Segment 2 Notes - Establishing System Assurance
Segment 3 Notes - Cyber-Espionage
Episode 42 - Stepping up to meet security challenges, October
28, 2006
Topic: Commentary on iPods in business, security as a process, and how some
programming teams are stepping up to meet security challenges

Episode 42 MP3  

Segment 1 Notes - Commentary on iPods in Business
Segment 2 Notes - Security as a process
Segment 3 Notes - Programmers Stepping up
Episode 43 - Risk Management, February 18, 2007
Topic: Commentary on iPods as criminal tools, users are not stupid, AJAX
vulnerability monitoring, dangers of pirated software, and Risk Management

Episode 43 MP3  

Segment 1 Notes - Holy Toledo!  The iPod did it!
       Calling endusers stupid doesn't help  
       Scan AJAX for XSS entry points
     
Segment 2 Notes -
Software Piracy and Malware
       Risk Management
Episode 44 - Virtual Server Security, February 25, 2007
Topic: Key carrying photons, VoIP vulnerabilities, outsourcing security, memory
debugging, Exchange DST woes, and hypervisor-based virtual server security

Episode 44 MP3  

Segment 1 Notes - Using photons for secure key exchange
     As VoIP grows, so do the vulnerabilities
     Techniques for Memory Debugging
     Outsourcing Security
     Be careful when you use the Exchange DST fix
   
Segment 2 Notes -
Secure hypervisor-based virtual servers
Episode 44 - Virtual Server Security, February 25, 2007
Topic: Key carrying photons, VoIP vulnerabilities, outsourcing security, memory
debugging, Exchange DST woes, and hypervisor-based virtual server security

Episode 44 MP3  

Segment 1 Notes - Using photons for secure key exchange
    As VoIP grows, so do the vulnerabilities
    Techniques for Memory Debugging
    Outsourcing Security
    Be careful when you use the Exchange DST fix
  
Segment 2 Notes -
Secure hypervisor-based virtual servers
Episode 45 - Keep your eye on the data, March 4, 2007
Topic: Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel
malware, and data protection

Episode 45 MP3

Segment 1 Notes - SPP raises it's ugly head... Again
  Fuzz your web apps
  Government supported malware...
  Silence is not the answer
  Anti-malware software comparison
                        
Segment 2 Notes -
Defend against kernel malware
           Keep your eye on the data
Return to Adventures in Security Home

Return to main Adventures in Security Podcast Page