Adventures in Security

Follow Adventures in Security
Share on
Copy link to clipboard

This is a weekly podcast. Each week we present commentary, reviews, and tips relevant to anyone responsible for information security. Additional episodes are available at AdventuresinSecurity.com.

Tom Olzak


    • Nov 4, 2007 LATEST EPISODE
    • infrequent NEW EPISODES
    • 17m AVG DURATION
    • 40 EPISODES


    Search for episodes from Adventures in Security with a specific topic:

    Latest episodes from Adventures in Security

    Episode 56 - Suspect Interviewing Techniques

    Play Episode Listen Later Nov 4, 2007 17:21


    Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.

    Episode 56 - Suspect Interviewing Techniques

    Play Episode Listen Later Nov 4, 2007 17:21


    Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.

    Episode 55 - Recipe for Mobile Data Security

    Play Episode Listen Later Oct 28, 2007 23:50


    SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.

    Episode 55 - Recipe for Mobile Data Security

    Play Episode Listen Later Oct 28, 2007 23:50


    SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.

    Episode 54 - IT Security Essential Body of Knowledge

    Play Episode Listen Later Oct 15, 2007 18:41


    Security enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.

    Episode 54 - IT Security Essential Body of Knowledge

    Play Episode Listen Later Oct 14, 2007 18:41


    Security enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.

    Episode 53 - Desktop Application Virtualization

    Play Episode Listen Later Oct 8, 2007 19:20


    Information Security is about protecting the data,desktop application virtualization and application streaming

    Episode 53 - Desktop Application Virtualization

    Play Episode Listen Later Oct 7, 2007 19:20


    Information Security is about protecting the data,desktop application virtualization and application streaming

    Episode 52 - Phishing Undercover

    Play Episode Listen Later Sep 29, 2007 19:20


    Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.

    Episode 52 - Phishing Undercover

    Play Episode Listen Later Sep 29, 2007 19:20


    Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.

    Episode 51 - Computer Forensics Part 3

    Play Episode Listen Later May 27, 2007 16:03


    Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.

    Episode 51 - Computer Forensics Part 3

    Play Episode Listen Later May 27, 2007 16:03


    Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.

    Episode 50 - Computer Forensics Part 2

    Play Episode Listen Later May 14, 2007 14:38


    MOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.

    Episode 50 - Computer Forensics Part 2

    Play Episode Listen Later May 13, 2007 14:38


    MOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.

    Episode 49 - Computer Forensics Part 1

    Play Episode Listen Later Apr 29, 2007 26:17


    Cisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.

    Episode 49 - Computer Forensics Part 1

    Play Episode Listen Later Apr 29, 2007 26:17


    Cisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.

    Episode 48 - The Problem with NetBIOS

    Play Episode Listen Later Apr 1, 2007 15:52


    Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.

    Episode 48 - The Problem with NetBIOS

    Play Episode Listen Later Apr 1, 2007 15:52


    Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.

    Episode 47 - Ad Hoc Wireless Networks

    Play Episode Listen Later Mar 25, 2007 18:10


    Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.

    Episode 47 - Ad Hoc Wireless Networks

    Play Episode Listen Later Mar 25, 2007 18:10


    Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.

    Episode 46 - Security Leadership

    Play Episode Listen Later Mar 18, 2007 18:33


    Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management

    Episode 46 - Security Leadership

    Play Episode Listen Later Mar 18, 2007 18:33


    Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management

    Episode 45 - Keep your eye on the data

    Play Episode Listen Later Mar 4, 2007 18:46


    Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection

    Episode 45 - Keep your eye on the data

    Play Episode Listen Later Mar 4, 2007 18:46


    Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection

    Episode 44 - Virtual Server Security

    Play Episode Listen Later Feb 25, 2007 20:07


    Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server security

    Episode 44 - Virtual Server Security

    Play Episode Listen Later Feb 25, 2007 20:07


    Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server security

    Episode 43 - Risk Management

    Play Episode Listen Later Feb 18, 2007 17:04


    Commentary on iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and Risk Management

    Episode 43 - Risk Management

    Play Episode Listen Later Feb 18, 2007 17:04


    Commentary on iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and Risk Management

    Episode 42 - Stepping up to meet security challenges

    Play Episode Listen Later Oct 28, 2006 9:17


    Commentary on iPods in business, security as a process, and how some programming teams are stepping up to meet security challenges.

    Episode 42 - Stepping up to meet security challenges

    Play Episode Listen Later Oct 28, 2006 9:17


    Commentary on iPods in business, security as a process, and how some programming teams are stepping up to meet security challenges.

    Episode 41 - Cyber-Espionage

    Play Episode Listen Later Oct 15, 2006 18:16


    Customer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.

    Episode 41 - Cyber-Espionage

    Play Episode Listen Later Oct 15, 2006 18:16


    Customer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.

    Episode 40 - Keystroke Dynamics (KD)

    Play Episode Listen Later Oct 2, 2006 17:43


    Examination of biometrics in general. Introduction of Keystroke Dynamics as a low impact biometric alternative.

    Episode 40 - Keystroke Dynamics (KD)

    Play Episode Listen Later Oct 2, 2006 17:43


    Examination of biometrics in general. Introduction of Keystroke Dynamics as a low impact biometric alternative.

    Episode 39 - The Home PC Threat

    Play Episode Listen Later Sep 24, 2006 14:20


    The importance of choosing the right source for audit artifacts, and the growing threat of employee home PCs to the business enterprise

    Episode 39 - The Home PC Threat

    Play Episode Listen Later Sep 24, 2006 14:20


    The importance of choosing the right source for audit artifacts, and the growing threat of employee home PCs to the business enterprise

    Episode 38 - Desperation doesn't justify bad security

    Play Episode Listen Later Sep 9, 2006 14:49


    The importance of change management, the potential security risks when desperation enters the project lifecycle, how virtual floors can provide secure flexible business-to-business connectivity, and finally, a look at some ways to handle sensitive information once printed copied or faxed.

    Episode 38 - Desperation doesn't justify bad security

    Play Episode Listen Later Sep 9, 2006 14:49


    The importance of change management, the potential security risks when desperation enters the project lifecycle, how virtual floors can provide secure flexible business-to-business connectivity, and finally, a look at some ways to handle sensitive information once printed copied or faxed.

    Episode 37 - Web Application Security, Part 8

    Play Episode Listen Later Aug 20, 2006 18:12


    The vulnerabilities and safeguards associated with Application Denial of Service and Insecure Configuration Management

    Episode 37 - Web Application Security, Part 8

    Play Episode Listen Later Aug 19, 2006 18:12


    The vulnerabilities and safeguards associated with Application Denial of Service and Insecure Configuration Management

    Claim Adventures in Security

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel