Security in the SDLC, password reuse, who’s more susceptible to security issues executives or staff, and ransomware. Continue reading PVCSEC69: Security in the SDLC and password reuse
Tracy Maleeff’s unorthodox path to information security Continue reading PVCSEC 68: Tracy Maleeff
Ransomware and chess. Continue reading PVCSEC 67: Ransomware and chess
Sadly Paul’s talk was not recorded nor is his slide deck available to the public. He did take some time to white up some thoughts here: http://bit.ly/1WPyHaK
Give it a read. Our next thrilling episode was recorded just hours before Paul’s talk. Our time line is all wibbly wobbly anyway, so order doesn’t matter.
Share & Enjoy!
p.s. – are you a cool frood who knows where his towel is?
Network segmentation. Continue reading PVCSEC 66: Network segmentation
Excuses into action part four: I’m too busy. Third party risks.
Not burning bridges when leaving an organization for another opportunity. Excuses into action part three. 60 minutes and the mobile phone hack. Orphaned hardware and software and security
A friend from the healthcare industry joins the show to give us a view into how he views information security and some of the issues surrounding it.
On the next thrilling episode of the PVC Security podcast (maybe):
thanks to the ability of anyone — Hollywood star or not — bring their
on a plane. For free.
It is just a matter of time before our own Edgar Rojas saddles up his emotional support miniature horse for a tiny, knee scraping ride through #BNA.
What animals would you, Dear Friends, assign to Chris, Paul, and Tim? Let us know in the comments.
Frank Catucci from Qualys joins the show to discuss application security and Badlock.