All Media

Defensive Security Podcast Episode 72 - June 17, 2014
http://www.defensivesecurity.org/?powerpress_pinw=1196-podcast

 



Scanning DNS with Nmap - Episode 376, Part 2 of 3 - June 5, 2014
http://wiki.pauldotcom.com/wiki/index.php/Episode376#Tech_Segment:_Dale_Luke

 



The Key to Anticipating Cyber-Attacks
http://e9c55d11e1d2fac561bb-193e28812cee85d6e20ea22afb83e185.r9.cf1.rackcdn.com/greg-garcia-directLink-4-i-2348.mp3

 



Symantec - How safe is your quantified self?
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/how-safe-is-your-quantified-self.pdf

Each day, millions of people worldwide are actively recording every aspect of their lives, thoughts, experiences, and achievements in an activity known as self-tracking (aka quantified self or life logging). People who engage in self-tracking do so for various reasons. Given the amount of personal data being generated, transmitted, and stored at various locations, privacy and security are important considerations for users of these devices and applications. Symantec has found security risks in a large number of self-tracking devices and applications. One of the most significant findings was that all of the wearable activity-tracking devices examined, including those from leading brands, are vulnerable to location tracking.

Industry Failed to Keep Pace With Innovation: Yoran
http://www.bloomberg.com/video/industry-failed-to-keep-pace-with-innovation-yoran-~pum7ohEQgmtbV_JvcYNzg.html

 



Cybersecurity Challenges
http://www.roberthalf.co.uk/Cybersecurity-Infographic

 



Verizon 2014 Data Breach Investigations Report
http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf

Gain fresh insight into cyber espionage and denial-of-service attacks in the 2014 Data Breach Investigations Report (DBIR).

The Expert (Short Comedy Sketch)
http://www.youtube.com/watch?v=BKorP55Aqvg

 



How Infected Are We?
http://anti-virus-software-review.toptenreviews.com/how-infected-are-we.html

 



Stephen Colbert Keynote RSA Conference
http://www.youtube.com/watch?v=XrZYBNtZW4o

 



How to Create the Perfect Password
http://www.whoishostingthis.com/blog/2014/02/27/how-to-create-the-perfect-password/

 



Watch CryptoLocker in action
https://www.youtube.com/watch?v=Gz2kmmsMpMI

 



Exploring the Information Security and Compliance Fabric of Office 365
http://www.youtube.com/watch?v=gsT-nTYmf20

 



Everything You Need to Know on TOR & the Deep Web
http://www.whoishostingthis.com/blog/2013/12/17/tor-deep-web/

 



What's Using All the Bandwidth?
http://www.whoishostingthis.com/blog/2013/12/09/whats-using-all-the-bandwidth/

 



Defensive Security Podcast Episode 71 - June 10, 2014
http://www.defensivesecurity.org/?powerpress_pinw=1181-podcast

 



Heartbleed, Running the Code - Computerphile
https://www.youtube.com/watch?v=1dOCHwf8zVQ