Security Wire WeeklyThe cybersecurity industry’s premier podcasts featuring the latest information security news, interviews and information.2013-05-16T17:33:41Zhttp://itknowledgeexchange.techtarget.com/security-wire-weekly/feed/atom/http://media.techtarget.com/digitalguide/images/podcast/sSec_sww.jpg2005-2012Robert Westervelthttp://searchsecurity.techtarget.com/http://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=11272012-12-26T15:15:03Z2012-12-26T15:15:03ZA spate of high profile data breaches throughout 2012 hold important lessons. Lapses in basic security measures and stolen account credentials played a significant role in most of the breaches. The SearchSecurity editorial team discusses what can be done to bolster the security of corporate systems.
]]>0Robert Westervelthttp://searchsecurity.techtarget.com/http://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=11212012-11-08T16:12:06Z2012-11-08T16:12:06ZSoftware security expert Gary McGraw explains that investing in destructive cyberweapons could have dangerous consequences. He is advocating for a proactive defense approach to cybersecurity.
]]>0Robert Westervelthttp://searchsecurity.techtarget.com/http://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=11152012-09-25T20:34:47Z2012-09-25T20:34:47ZAli Mesdaq a security researcher at FireEye Inc. explains why malicious file attachments are still a highly successful attack vector for cybercriminals. Automated attack toolkits, spambots and targeted attackers typically use the old standby technique because it works. FireEye has found a spike in malicious email attachments in 2012. Social engineering is at the heart of most attacks.
]]>0Eric Parizohttp://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=11102012-09-20T18:42:32Z2012-09-20T18:42:04ZSecurity expert Nick Lewis analyzes Flame malware, plus gives tips for dealing with Flame’s most unique function: its use of fraudulent certificates.
]]>1Eric Parizohttp://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=11072012-09-19T12:54:10Z2012-09-19T12:54:10ZIn this Hot Type podcast, author Neal McCarthy offers real-world examples that enterprises can use to form an information security incident response plan.
]]>0Robert Westervelthttp://searchsecurity.techtarget.com/http://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=11032012-09-13T17:02:26Z2012-09-12T16:54:25ZEllen Giblin an attorney at Ashcroft Law and Gant Redmon, the general counsel for Co3 Systems discuss the litigator’s role in incident response. The legal team should be contacted as soon as a security or privacy incident is detected because it shifts the burden and liability over to the attorney, according to Giblin. Learn where the company’s legal team fits into your incident response plan.
]]>0Robert Westervelthttp://searchsecurity.techtarget.com/http://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=11012012-09-07T19:10:35Z2012-09-07T19:10:35ZThe Aurora attackers, which surfaced in 2009 targeting Google and dozens of other firms are improving their techniques and showing impressive skills, according to new research from Symantec. The group is a threat to U.S. defense contractors and their partners, including manufacturers and parts suppliers. Eric Chien, senior technical director for Symantec Security Response explains that the group behind the campaign are using a number of zero-day exploits and a new drive-by attack technique.
]]>0Eric Parizohttp://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=10942012-09-05T19:51:13Z2012-09-05T19:51:13ZIn light of recent failures by the signature-based model, expert Char Sample discusses anomaly-based monitoring technology and the potential it holds for enterprise security.
]]>0Eric Parizohttp://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=10782012-08-17T14:09:11Z2012-08-16T14:59:46ZThe recent CloudFlare hack showed how poor user account security and password recovery can be compromised. Learn how to avoid a similar incident.
]]>0Robert Westervelthttp://searchsecurity.techtarget.com/http://itknowledgeexchange.techtarget.com/security-wire-weekly/?p=10742012-08-08T14:45:30Z2012-08-08T14:38:16ZAdam O’Donnell of Sourcefire talks about the future of antimalware. Malware analysis tools are improving, but enterprises need to invest in forensics teams to better understand emerging threats. Antivirus vendors face the daunting challenge of adapting mobile platforms, O’Donnell says. Mobile will draw more cybercrime when attackers find it a worthwhile investment, he said.