Preview Mode Links will not work in preview mode

Real-world conversations with top security execs. Prepare to be enlightened, engaged, perhaps challenged & definitely informed while getting to know the pros responsible for it all.

Sep 26, 2014

It is often law enforcement that finds evidence of a security breach first. Being able to respond effectively to breaches can reflect on an organization's reputation. 

There is always malware running somewhere. Some enterprises have Security Response Teams, but many do not. If it is a one-man shop should they be a...

Sep 17, 2014

Malware in its various forms has been around since the start of the computing age, but one platform remains more susceptible to evil code than others with more than 1 million new unique virus  signatures discovered each and every day, according to F-Secure.

Also according to F-Secure's Threat Strategist David Perry,...

Sep 12, 2014

Honeypots, used to detect cyber attacks, have been around information security for a long time.

The non-profit Honeynet Project is dedicated to investigating the latest attacks and working to improve the utility of honeypots in today's changing network environment.

In this podcast Vic Wheatman speaks with Gartner VP of...