Tue, 12 January 2016
We open up our 2016 year interviewing Shawn Tuma on the show. Shawn is our legal eagle, and a regular contributor to the podcast. This episode ran a little bit long (OK a lot long) but I think you'll enjoy the show...
In this episode...
Direct download: DtSR_Episode_176_-_2015_InfoSec_Legal_Review.mp3
Category:Enterprise Security -- posted at: 11:26pm CST |
Tue, 5 January 2016
In this episode...
Juniper has a backdoor problem
Iranians broke into New York dam in 2013 and “had a look around”
Facebook announced it’s dumping Adobe Flash
191 Million US voter records found ‘unprotected’ by a researcher
PayPal rolls out the welcome mat for hackers
PCI Council extends encryption deadline
Direct download: DtSR_Episode_175_-_NewsCast_for_January_5th_2016.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 28 December 2015
In this episode...
Guest
Direct download: DtSR_Episode_174_-_Health_Check_on_Healthcare_InfoSec.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 14 December 2015
In this episode...
Direct download: DtSR_Episode_173_-_NewsCast_for_December_14th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 7 December 2015
Thanks for joining us! This is a very important episode with true experts on the topic of cyber insurance. I was lucky enough to get an attorney and a VP of an insurance firm who specialize in the topic and their depth of knowledge and candor may shock you. The net is that cyber insurance is a positive for our industry.
In this episode..
Guests
Direct download: DtSR_Episode_172_-_The_Truth_on_Cyber_Insurance.mp3
Category:Enterprise Security -- posted at: 10:20am CST |
Mon, 30 November 2015
In this episode I interview Mike Daugherty - author of The Devil Inside the Beltway [Amazon.com link] live from the Security Advisor Alliance first-ever Summit in Dallas, TX. Mike was kind enough to sit down with me (twice, thanks to a tech failure) and tell his absolutely surreal story of what happened to him, his company at the hands of what can only be described as an insane situation. If you own a business, or manage a business, or work in enterprise -- you need to hear Mike's story. If it wasn't documented and video recorded, you'd never believe it's true. Truth be told, I've been a supporter of the FTC as an advocate for the victims of breaches - the person who's information is stolen. After hearing Mike's story... I have had my mind completely changed.
Direct download: DtSR_Episode_171_-_When_the_FTC_Attacks.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 23 November 2015
In this episode
Guests
Direct download: DtSR_Episode_170_-_Minneapolis_CISO_Summit_Roundtable_1.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 16 November 2015
In this episode...
Direct download: DtSR_Episode_169_-_NewsCast_for_November_16th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 9 November 2015
In this episode
Guests
Direct download: DtSR_Episode_168_-_Practical_Enterprise_Threat_Intelligence.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 2 November 2015
In this episode...
Direct download: DtSR_Episode_167_-_NewsCast_for_Nov_2nd_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 26 October 2015
In this episode...
Guest
Direct download: DtSR_Episode_166_-_Cyber_Security_From_Board_Room_to_White_House.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 19 October 2015
In this episode...
Direct download: DtSR_Episode_165_-_NewsCast_for_October_19th_2015_.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 12 October 2015
In this episode...
Guest:
Direct download: DtSR_Episode_164_-_3rd_Party_and_Supply_Chain_Risks.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 5 October 2015
In this episode...
Direct download: DtSR_Episode_163_-_NewsCast_for_October_5th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 28 September 2015
In this episode...
Guest
Direct download: DtSR_Episode_162_-_OSINT_and_Privacy_in_a_Digital_World.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 21 September 2015
On this episode of the NewsCast
Direct download: DtSR_Episode_161_-_NewsCast_for_Sept_21_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 14 September 2015
In this episode...
Guest
Links
Direct download: DtSR_Episode_160_-_Leadership_from_a_Navy_SEAL.mp3
Category:Enterprise Security -- posted at: 1:02am CST |
Mon, 7 September 2015
In this episode
Direct download: DtSR_Episode_159_-_NewsCast_for_Sept_7th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Tue, 1 September 2015
In this MicroCast, live from HTCIA Conference 2015 in Orlando, FL, Michael and I quickly set the stage for a conversation on conference speaker/attendee engagement. [Raf] One of my biggest pet peeves as a speaker is getting a room-full of people who watch (and listen) me speak, wait for me to finish, and leave when I'm done. [Michael] As an attendee, you need to know what you "do" and what you're looking for from the conference.
--> Here's the link to the article Michael mentions: http://paulsohn.org/how-to-connect-with-anyone-you-just-met-with-5-questions/
We welcome the discussion on this topic, #DtSR on Twitter!
Direct download: DtSR_MicroCast_08_-_Conference_Engagement.mp3
Category:MicroCast -- posted at: 6:13pm CST |
Mon, 31 August 2015
In this episode...
Guest
Direct download: DtSR_Episode_158_-_Managing_Security_with_Outsourced_IT.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 24 August 2015
In this episode...
Direct download: DtSR_Episode_157_-_NewsCast_for_Aug_24th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 17 August 2015
In this episode...
Direct download: DtSR_Episode_156_-_Leadership_Defined_Measured_and_Discussed.mp3
Category:Enterprise Security -- posted at: 12:56am CST |
Mon, 10 August 2015
In this episode...
Direct download: DtSR_Episode_155_-_NewsCast_for_Aug_10th_2015.mp3
Category:NewsCast -- posted at: 12:51am CST |
Mon, 3 August 2015
In this episode
Guest
Direct download: DtSR_Episode_154_-_Enterprise_Software_Security_Reloaded.mp3
Category:Enterprise Security -- posted at: 12:12am CST |
Mon, 27 July 2015
In this episode...
Direct download: DtSR_Episode_153_-_NewsCast_for_July_27th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 20 July 2015
In this episode
Guest
Direct download: DtSR_Episode_152_-_The_Great_InfoSec_Talent_Shortage.mp3
Category:Enterprise Security -- posted at: 12:45am CST |
Wed, 15 July 2015
In this episode...
Direct download: DtSR_FeatureCast_-_HTCIA_Int_Conf_2015_Preview_-_July_2015.mp3
Category:FeatureCast -- posted at: 12:00am CST |
Mon, 13 July 2015
In this episode...
Direct download: DtSR_Episode_151_-_NewsCast_for_July_13th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 6 July 2015
In this episode
Guest
Direct download: DtSR_Episode_150_-_A_CEOs_Perspective.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 29 June 2015
In this episode With me gone, James and Michael run feral!
Direct download: DtSR_Episode_149_-_NewsCast_for_June_29th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 22 June 2015
In this episode...
Guest
Direct download: DtSR_Episode_148_-_Focus_on_the_CISO.mp3
Category:Enterprise Security -- posted at: 12:13am CST |
Mon, 15 June 2015
In this episode...
Direct download: DtSR_Episode_147_-_NewsCast_for_June_15th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 8 June 2015
In this episode...
Guest
Direct download: DtSR_Episode_146_-_State_of_Enterprise_Incident_Response.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 1 June 2015
Apologies to anyone who is having issues downloading this episode! In this episode...
Direct download: DtSR_Episode_145_-_NewsCast_for_June_1st_2015.mp3
Category:NewsCast -- posted at: 12:22am CST |
Mon, 25 May 2015
In this episode...
Guest
Direct download: DtSR_Episode_144_-_Insights_from_the_ISC2_2015_Survey.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 18 May 2015
In this episode...
Note back from United Bug Bounty Team: Posted with permission-- "Rafal: Thank you for the question. We want researchers to be able to notify of potential issues they find while still protecting customers who are not participating in the program. If a researcher launched a brute force attack and locked the accounts of 10,000 customers through already existing security measures this would negatively affect our customers and the program. If any researchers believe they may have found a brute force condition, they can feel free to submit it to us without testing. We will check on our end and if we confirm a bug exists we will gladly reward them for their effort. Does that make sense? Best, United Bug Bounty Team"
Direct download: DtSR_Episode_143_-_NewsCast_for_May_18th_2015.mp3
Category:NewsCast -- posted at: 12:07am CST |
Mon, 11 May 2015
In this episode...
Guests
Direct download: DtSR_Episode_142_-_Basics_and_Fundamentals_That_Win.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 4 May 2015
In this episode...
Direct download: DtSR_Episode_141_-_NewsCast_for_May_4th_2015.mp3
Category:NewsCast -- posted at: 9:12am CST |
Mon, 27 April 2015
In this episode...
Guests
Direct download: DtSR_Episode_140_-_Ethics_of_Hacking_Live_from_AtlSecCon.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 20 April 2015
In this episode...
Direct download: DtSR_Episode_139_-_NewsCast_for_April_20th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 13 April 2015
In this episode...
Guest
Direct download: DtSR_Episode_138_-_Useful_Knowledge_on_Intelligence.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 6 April 2015
In this episode...
Direct download: DtSR_Episode_137_-_NewsCast_for_April_6th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 30 March 2015
In this episode...
Guest
Direct download: DtSR_Episode_136_-_Crypto_and_Privacy_with_Jon_Callas.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 23 March 2015
Remember folks, as you listen reach out to us on Twitter and hit the hashtag #DtSR to continue the conversation, and speak your mind! Let's hear what your take is on the stories we discuss...maybe you have a unique angle we've not considered? In this episode--
Direct download: DtSR_Episode_135_-_NewsCast_for_March_23rd_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 16 March 2015
In this episode...
Guest
Direct download: DtSR_Episode_134_-_Fundamental_Security.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 9 March 2015
In this episode--
Direct download: DtSR_Episode_133_-_NewsCast_for_March_9th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 2 March 2015
In this episode...
Guest
Direct download: DtSR_Episode_132_-_Good_Guys_Bad_Guys_and_Reality.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 23 February 2015
In this episode--
Direct download: DtSR_Episode_131_-_NewsCast_for_February_23rd_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 16 February 2015
In this episode
Guest
Direct download: DtSR_Episode_130_-_Where_the_Law_and_Cyber_Collide.mp3
Category:Cyber Law -- posted at: 12:00am CST |
Mon, 9 February 2015
Topics covered
Direct download: DtSR_Episode_129_-_NewsCast_for_February_9th_2015.mp3
Category:NewsCast -- posted at: 12:00am CST |
Sun, 8 February 2015
This is the 7th installment (call it a rebirth) of the MicroCast. Short and to the point, Michael and James talk about the phrase breached companies use - "We take your security seriously..." .. join the conversation at #DtSR on Twitter!
Direct download: DtSR_MicroCast_07_-_Taking_Security_Seriously.mp3
Category:MicroCast -- posted at: 12:00am CST |
Mon, 2 February 2015
Fans - If you haven't booked your ticket for InfoSec World 2015 in sunny Orlando, FL check this out. Register using our code CLD15/RABBIT for 15% off. If you want a chance to go for FREE, listen to Episode 127 for your chance!
In this episode...
Guest
Links
Direct download: DtSR_Episode_128_-_When_Breach_Buy_the_Dip.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 26 January 2015
** There is a special gift for our listeners in this episode, from our friends at InfoSec World 2015! Listen to find out how you can go for free. We have a promo code! CLD15/RABBIT – 15% off for “Down the Rabbit Hole” listeners Topics Covered
Watch this podcast page later this week for that freebie Michael told you about!
Direct download: DtSR_Episode_127_-_NewsCast_for_January_26th_2015_RAW.mp3
Category:NewsCast -- posted at: 12:09pm CST |
Mon, 19 January 2015
In this episode...
Guest
Direct download: DtSR_Episode_126_-_The_Defense_Always_Loses.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 12 January 2015
Welcome to a new year of the Down the Security Rabbithole Podcast! We are kicking off this year with a guest on this morning's program, Phil Beyer joined us to talk about the last few weeks that have been a wild, wild ride in the security indsutry! Thanks for your support so far, and we promise a fantastic 2015 to come.
Topics Covered
Direct download: DtSR_Episode_125_-_NewsCast_for_January_12th_2015.mp3
Category:NewsCast -- posted at: 9:12pm CST |
Mon, 5 January 2015
Hi everyone! Welcome to the very first episode of the Down the Security Rabbithole Podcast for 2015! On this opening episode, Jeff Man joins us to talk truth to power on PCI-DSS and shatters myths for us.
In this episode
Guest
Direct download: DtSR_Episode_124_-_PCI_DSS_and_Security_Yes_Really.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 29 December 2014
Hey everyone! We're almost done with 2014 and another new year is right around the corner. We thought this was the perfect time to sit back, relax a little and reflect on the year that was...and boy was it ever! Jack Daniel & Allison Miller join Michael, James and I on the podcast to talk it all out, share a few chuckles and try to make sense of it all!
Thanks for listening everyone, it's been an epic year and we look forward to more awesome things in 2015!
Direct download: DtSR_FeatureCast_-_2014_Year_In_Review.mp3
Category:FeatureCast -- posted at: 12:00am CST |
Mon, 22 December 2014
In this episode Attorney and CFAA expert Shawn Tuma joins us to talk about the US vs. Salinas case where Mr. Salinas was threatened with 440 years in jail, and now plead down to a misdemeanor. Prosecutorial discretion, or attorneys-gone-wild? Link: http://www.wired.com/2014/11/from-440-years-to-misdemeanor/
Direct download: FeatureCast_-_US_vs_Salinas_CFAA_Case_-_December_21_2014.mp3
Category:Cyber Law -- posted at: 12:00am CST |
Mon, 15 December 2014
Topics covered
Direct download: DtSR_Episode_123_-_NewsCast_for_December_15th_2014.mp3
Category:NewsCast -- posted at: 2:00pm CST |
Mon, 8 December 2014
In this episode
Guest
Additional Links
Direct download: DtSR_Episode_122_-_Enterprise_Architectures_Role_in_Security.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 1 December 2014
Topics covered
Direct download: DtSR_Episode_121_-_NewsCast_for_Dec_1st_2014.mp3
Category:NewsCast -- posted at: 1:05pm CST |
Mon, 24 November 2014
In this episode
Guest
Links:
Direct download: DtSR_Episode_120_-_Hacking_the_Humans_Again.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 17 November 2014
Note: The hashtag for the show on Twitter has changed, please connect with us using #DtSR going forward. Thanks!
Topics covered
Direct download: DtR_Episode_119_-_NewsCast_for_November_17_2014.mp3
Category:NewsCast -- posted at: 10:55am CST |
Mon, 10 November 2014
In this episode
Guests
Direct download: DtR_Episode_118-_Demystifying_Threat_Intelligence.mp3
Category:Information Security -- posted at: 12:00am CST |
Fri, 7 November 2014
In this episode
Guest
Additional Links
Direct download: DtR_FeatureCast_-_Norse_Corp_DDoS_-_Nov_7_2014.mp3
Category:FeatureCast -- posted at: 10:38am CST |
Mon, 3 November 2014
Topics covered
Direct download: DtR_Episode_117_-_NewsCast_for_November_3rd_2014.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 27 October 2014
In this episode
Guests
Direct download: DtR_Episode_116_-_Lines_in_the_Sand_on_Security_Research.mp3
Category:Information Security -- posted at: 12:33am CST |
Mon, 20 October 2014
Topics covered
Direct download: DtR_Episode_115_-_NewsCast_for_October_20th_2014.mp3
Category:NewsCast -- posted at: 10:59am CST |
Mon, 13 October 2014
In this episode
Guest
Direct download: DtR_Episode_114_-_Threat_and_Vulnerability_Management.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 6 October 2014
Topics covered
Direct download: DtR_Episode_113_-_NewsCast_for_October_6th_2014.mp3
Category:general -- posted at: 10:10am CST |
Thu, 2 October 2014
Thank you to Shawn Tuma - an attorney specializing in CFAA and a good friend of our show - for stopping by and lending his expertise on this episode. If you enjoy Shawn's insights, consider following him on Twitter ( @ShawnETuma ) or just saying hello!
In this episode
Guest
Direct download: DtR_FeatureCast_-_CFAA_Shellshock_and_Security_Research_-_October_2nd_2014.mp3
Category:FeatureCast -- posted at: 12:46pm CST |
Mon, 29 September 2014
In this episode
Guests
Direct download: DtR_Episode_112_-_DREAMR_framework.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 22 September 2014
Topics covered
Direct download: DtR_Episode_111_-_NewsCast_for_September_22nd_2014a.mp3
Category:NewsCast -- posted at: 9:57am CST |
Mon, 15 September 2014
In this episode
Guest
|
Mon, 8 September 2014
Topics covered
Direct download: DtR_Episode_109_-_NewsCast_for_September_8th_2014.mp3
Category:NewsCast -- posted at: 12:24pm CST |
Mon, 1 September 2014
In this episode
Guests
Direct download: DtR_Episode_108_-_Security_in_State_Government.mp3
Category:NewsCast -- posted at: 12:00am CST |
Mon, 25 August 2014
Topics covered
Direct download: Dtr_Episode_107_-_NewsCast_for_August_25_2014.mp3
Category:NewsCast -- posted at: 10:30am CST |
Mon, 18 August 2014
In this episode
Guest
Direct download: DtR_Episode_106_-_My_Compliance_is_Better_Than_Your_Security.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 11 August 2014
Topics covered
Direct download: DtR_Episode_105_-_NewsCast_for_August_11_2014.mp3
Category:NewsCast -- posted at: 10:49am CST |
Mon, 4 August 2014
In this episode
Guest
Direct download: DtR_Episode_104_-_Security_Leaders_Series_-_JW_Goerlich.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 28 July 2014
Topics covered
Not discussed, but interesting reads:
Direct download: DtR_Episode_103_-_NewsCast_for_July_28th_2014.mp3
Category:NewsCast -- posted at: 10:57am CST |
Mon, 21 July 2014
In this episode
Guest
Direct download: DtR_Episode_102_-_Security_Leaders_Series_-_Jim_Tiller.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 14 July 2014
Topics covered
Direct download: DtR_Episode_101_-_NewsCast_for_July_14th_2014.mp3
Category:NewsCast -- posted at: 12:01pm CST |
Mon, 7 July 2014
In this episode
Guest
Direct download: DtR_Episode_100_-_Security_Wisdom_from_Dan_Geer.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 30 June 2014
Topics covered
Direct download: DtR_Episode_99_-_NewsCast_for_June_30th_2014.mp3
Category:NewsCast -- posted at: 11:47am CST |
Mon, 23 June 2014
In this episode
Guest
Links
Direct download: DtR_Episode_98_-_Grr_Grr_Rapid_Response.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 16 June 2014
Note: I want to thank Will Gragido for stopping by this morning to talk over the news with us. Always great to have someone with a fresh perspective, I hope you enjoy the show.
Topics Covered
Direct download: DtR_Episode_97_-_NewsCast_for_June_16th_2014.mp3
Category:NewsCast -- posted at: 10:58am CST |
Mon, 9 June 2014
My apologies for some of the skips in this episode - we had some difficulty with the recording and ultimately I hope it doesn't take away from Joe's wonderful message. Thanks for your patience. In this episode
Guest
Direct download: DtR_Episode_96_-_A_CIO_talks_about_CISOs.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 2 June 2014
Note: Today, Kim Halavakoski joined us on the show to provide perspective all the way from Finland! We appreciate his international addition to the show, and hope the listeners enjoy the added brainpower.
Topics covered
Direct download: DtR_Episode_95_-_NewsCast_for_June_2nd_2014.mp3
Category:NewsCast -- posted at: 11:36am CST |
Mon, 26 May 2014
In this episode
Guest:
Direct download: DtR_Episode_94_-_ICANN_Tor_and_Internet_Freedom.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 19 May 2014
Announcements:
Topics discussed
Direct download: DtR_Episode_93_-_NewsCast_for_May_19th_2014.mp3
Category:NewsCast -- posted at: 11:18am CST |
Mon, 12 May 2014
In this episode
Guests:
Direct download: DtR_Episode_92_-_Rapid_Incident_Response.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 5 May 2014
Topics dicussed
Direct download: DtR_Episode_91_-_NewsCast_for_May_5th_2014.mp3
Category:NewsCast -- posted at: 11:47am CST |
Mon, 28 April 2014
In this episode
Guest
Direct download: DtR_Episode_90_-_Things_Your_Auto_Insurance_Knows.mp3
Category:Information Security -- posted at: 12:00am CST |
Sun, 27 April 2014
Hey listeners!
Thanks to everyone who's put us in their RSS feed and regularly grabs the latest content. I just ran a running average of the last 20 episodes, and as of right now we're averaging ~802 downloads/episode. That's awesome, and so much more than I ever thought this show would grow to! It's all thanks to you, for listening, spreading the word, and being fans.
As we near episode 100 I promise you an episode you'll want to listen to, and share with those you know. James and I are working hard to make it special, with a guest that's ... well ... you'll see.
Thanks for being a fan. /Raf & James
Category:administrivia
-- posted at: 9:50pm CST
|
Mon, 21 April 2014
Topics discussed
Direct download: DtR_Episode_89_-_NewsCast_for_April_21st_2014.mp3
Category:NewsCast -- posted at: 11:31am CST |
Mon, 14 April 2014
In this episode
Guests
Direct download: DtR_Episode_88_-_Advanced_Threat_Actors_Panel_Discussion.mp3
Category:advanced threat -- posted at: 12:00am CST |
Tue, 8 April 2014
Topics covered
Direct download: DtR_Episode_87_-_NewsCast_for_April_7th_2014.mp3
Category:NewsCast -- posted at: 9:11am CST |
Mon, 31 March 2014
In this episode
Guest
Did you catch all that? DtR is giving away a free ticket to Source Boston - if you're interested in being the lucky recipient - be the first to @Wh1t3Rabbit with "I just won a ticket to @SOURCEConf Boston courtesy of the #DtR Podcast!"
Direct download: DtR_Episode_86_-_From_DDoS_to_Quantum_Computing.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 24 March 2014
Topics covered
Direct download: DtR_Episode_85_-_NewsCast_for_March_24th_2014.mp3
Category:NewsCast -- posted at: 11:13am CST |
Mon, 17 March 2014
In this episode
Guest
Direct download: DtR_Episode_84_-_Rise_of_the_Security_Machines.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 10 March 2014
Topics covered
Direct download: DtR_Episode_83_-_NewsCast_for_March_10th_2014.mp3
Category:NewsCast -- posted at: 11:05am CST |
Mon, 3 March 2014
In this episode
Guests
Direct download: DtR_Episode_82_-_Likely_Threats.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 24 February 2014
Topics covered
Direct download: DtR_Episode_81_-_NewsCast_for_February_24th_2014.mp3
Category:NewsCast -- posted at: 1:22pm CST |
Mon, 17 February 2014
In this episode
Guests
Direct download: DtR_Episode_80_-_Jay_Jacobs__Bob_Rudis_-_Lies_Damned_Lies_and_InfoSec_Statistics.mp3
Category:enterprise risk -- posted at: 12:00pm CST |
Mon, 10 February 2014
Topics covered
Direct download: DtR_Episode_79_-_NewsCast_for_February_10th_2014.mp3
Category:NewsCast -- posted at: 2:08pm CST |
Mon, 3 February 2014
In this episode
Guest
Direct download: DtR_Episode_78_-_Guest_David_Prince_-_Legal_Professional_Privilege.mp3
Category:Information Security -- posted at: 10:13am CST |
Mon, 27 January 2014
Special thanks to Michael Santarcangelo ( @catalyst ) for stopping by the show and guest-hosting with James and I! We had fun, and I think you'll all enjoy Michael's perspective and humor. Topics Covered
Direct download: DtR_Episode_77_-_NewsCast_for_January_27th_2014.mp3
Category:NewsCast -- posted at: 12:58pm CST |
Mon, 20 January 2014
In this episode
Guests
Direct download: DtR_Episode_76_-_Portengen__Claytor_-_Payment_Industry_Turmoil.mp3
Category:Security Specialists Panel -- posted at: 1:57pm CST |
Mon, 13 January 2014
I can't believe it's 2014 already, and we're rolling through our 3rd calendar year! As we grow and you "regulars" mount, James and I want to thank you for listening, bookmarking, sharing and talking about the podcast. Your patronage has really made a us smile, and you're the reason we do this. Topics covered
Direct download: DtR_NewsCast_-_January_13th_2014.mp3
Category:Enterprise Security -- posted at: 5:47pm CST |
Mon, 6 January 2014
In this episode
Guest
Direct download: DtR_Episode_74_-_Wysopal_-_Supply_Chain_InSecurity.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 23 December 2013
In this episode
Guest
Direct download: DtR_Episode_72_-_Applied_Threat_Research_and_Defense.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 16 December 2013
Hello! This is a special episode in that it's our year-end wrap-up. We bring together 3 of the industry's best to talk about the year that was, the things that made were on your mind, and maybe give us a hint at what is to come... Guests
Notably absent, but invited, were Dave Lewis ("fell asleep") and Dave Kennedy ("was on an airplane") ...apparently because I thought it would be fun to invite every Dave I know....... but seriously next time guys :) James and I would like to wish all our listeners a very merry holiday season, and a happy, healthy and prosperous 2014.
Direct download: DtR_FeatureCast_-_Wrapping_up_2013.mp3
Category:Enterprise Security -- posted at: 10:01am CST |
Mon, 9 December 2013
Folks, if you work with, design, or implement embedded systems this is one episode you don't want to miss. Fair warning, it's a little bit long at just over 50 minutes total. I hope you find the extra time worth the effort of listening, I know we sure did! In this episode
Guest
Direct download: DtR_Episode_70_-_Embedded_Systems_Shenanigans.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 2 December 2013
Special thanks to Steve Ragan ( @SteveD3 ) for sitting in this morning and providing his perspective as a journalist. Topics Covered
Direct download: DtR_NewsCast_for_December_2nd_2013.mp3
Category:Information Security -- posted at: 1:58pm CST |
Mon, 25 November 2013
I want to thank Carolyn Kopprasch and the @BufferApp team for getting back to me, and agreeing to not only join the podcast, but also field questions from "anyone" ...what a cool group of people! In this episode
Guest
Links!
Direct download: DtR_Episode_68_-_Buffers_Big_Hack.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 18 November 2013
I'm back! Maybe a little sleep-deprived and a tad grumpier than usual, but back to talk news! Topics Covered
Direct download: DtR_NewsCast_-_Nov_18th_2013.mp3
Category:Enterprise Security -- posted at: 1:16pm CST |
Mon, 11 November 2013
In this episode...
Guest
Direct download: DtR_Episode_66_-_ISSA_International_2013_-_Cowperthwaite_Weighs_In.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Tue, 5 November 2013
Hey all - Raf here and I wanted to thank James for flying solo as my wife and I celebrate the brith of Niccolai and Isabella our new twins! I'll be back in our next episode... Topics Covered
Direct download: DtR_NewsCast_-_November_4th_2013.mp3
Category:Enterprise Security -- posted at: 11:05pm CST |
Mon, 28 October 2013
Special thank you to the US District Attorney's office for the Southern District of California for a fantastic interview and for letting us pick Sabrina's mind for the podcast... In this episode...
Guest
Direct download: DtR_Episode_64_-_A_US_Attorneys_Perspective_on_Cybercrime.mp3
Category:CyberCrime -- posted at: 12:00am CST |
Fri, 25 October 2013
In this episode
Guest
Direct download: FeatureCast_-_Baroness_Neville-Jones_at_ISSA_Intl_2013.mp3
Category:Information Security -- posted at: 7:35pm CST |
Mon, 21 October 2013
Thanks to Josh Corman for joining us this morning ... always nice to have Josh's experience and brain power on the show. Topics Covered
Hat-tips this week go to...
Direct download: DtR_Episode_63_-_NewsCast_for_October_21st_2013.mp3
Category:Enterprise Security -- posted at: 9:49am CST |
Mon, 14 October 2013
In this episode...
Guest
Direct download: DtR_Episode_62_-_A_peek_behind_the_blue_curtain.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 7 October 2013
Big thanks to the soon-to-be-regular peanut gallery ... @JoeKnape and @BeauWoods for jumping in this morning and breaking it down with James and I. As a personal message to those of you who listen and our community - please ...remember we all live in a giant glass house, and throwing rocks is a bad, bad idea. I've said it before and I'm looking right at the media for this one (ahem...) - unless you've been in a high-stress environment and have successfully thwarted every attack, please don't go trying to personally attack those out there who work hard at it every day. It just makes you look like an idiot. Nobody wins when we name and shame and attack people personally. Remember that when it's your turn to stand in the spotlight. Topics Covered
So ... does anyone actually read these? If so, let me know on Twitter? Hashtag #DtR
Direct download: DtR_Episode_61_-_NewsCast_for_October_7th_2013.mp3
Category:Information Security -- posted at: 11:12am CST |
Sun, 29 September 2013
In this episode...
Guests
Direct download: DtR_Episode_60_-_Conversations_from_DerbyCon_3.mp3
Category:Information Security -- posted at: 11:57pm CST |
Mon, 23 September 2013
I want to thank Mr. Josh Corman ( @JoshCorman ) for guest-commentating today's episode, and lending his expertise and industry leadership point of view. Topics Covered
More information on The Cavalry The talk: "The Cavalry Isn't Coming: Starting the Revolution to FSCK it all!" The video of the more mellow, smaller BSides "warm-up before DEF CON 21" is here: http://www.irongeek.com/i.php?page=videos/bsideslasvegas2013/1-2-2-the-cavalry-isnt-coming-starting-the-revolution-to-fsck-it-all-nicholas-j-percoco-and-joshua-corman Twitter: @iamthecavalry email info@iamthecavalry.org google group: https://groups.google.com/d/forum/iamthecavalry Josh Corman's Bio: Joshua Corman is the Director of Security Intelligence for Akamai. Mr. Corman’s cross-domain research highlights adversaries, game theory and motivational structures. His analysis cuts across sectors to the core security challenges and toward emerging technologies and shifting incentives. A staunch advocate for CISOs, Corman also serves as a Fellow with the Ponemon Institute, on the Faculty for IANS, co-founder of Rugged Software and was a 2009 Top Influencer of IT in NetworkWorld. Corman received his bachelor’s degree in philosophy, graduating summa cum laude, from the University of New Hampshire.
Direct download: DtR_Episode_59_-_NewsCast_for_September_23rd_2013.mp3
Category:Information Security -- posted at: 9:26am CST |
Wed, 18 September 2013
For those of you unfamiliar with the event, HP Protect is the premier event of the year for the HP Enterprise Security products and services organization, held to bring customer practitioners, industry experts, products/services managers and their support specialists together to not only solve real-world problems but to also help set the course for the next year. If you've not had a chance to attend the event and you're an HP customer, or you're interested in the event - check out the HP Protect website. I was a guest at the conference this year and had an amazing opportunity to sit down in 3 separate sessions with a serviceEpis provider, a practitioner, and 2 vendor-partners and talk real-world security... Episode 3 - Vikas Bhatia (CEO of Kalki Consulting) and Anton Goncharov (Managing Principal of MetaNet, LLC) - In this discussion, we just barely scratched the surface on the challenges SMEs face with integrating security into business processes and developing security solutions on a shoestring. This discussion focuse entirely on processes and the need for business integration and insight - and is likely the starting point for many further conversations to come.
Direct download: DtR_FeatureCast_-_HP_Protect_2013_Episode_3_-_Vikas_Bhatia__Anton_Goncharov.mp3
Category:FeatureCast -- posted at: 2:45pm CST |
Wed, 18 September 2013
For those of you unfamiliar with the event, HP Protect is the premier event of the year for the HP Enterprise Security products and services organization, held to bring customer practitioners, industry experts, products/services managers and their support specialists together to not only solve real-world problems but to also help set the course for the next year. If you've not had a chance to attend the event and you're an HP customer, or you're interested in the event - check out the HP Protect website. I was a guest at the conference this year and had an amazing opportunity to sit down in 3 separate sessions with a serviceEpis provider, a practitioner, and 2 vendor-partners and talk real-world security... Episode 2 - Wasif Shakeel, Program Director Information Security, General Dynamics - Wasif and I discovered that we have entierly too much in common, and talked about the need for a sane, process and measurement approach to security and handling the "needle in a haystack" problem many Security Operations Centers are faced with.
Direct download: DtR_FeatureCast_-_HP_Protect_2013_Episode_2_-_Wasif_Shakeel_of_General_Dynamics.mp3
Category:FeatureCast -- posted at: 2:34pm CST |
Wed, 18 September 2013
For those of you unfamiliar with the event, HP Protect is the premier event of the year for the HP Enterprise Security products and services organization, held to bring customer practitioners, industry experts, products/services managers and their support specialists together to not only solve real-world problems but to also help set the course for the next year. If you've not had a chance to attend the event and you're an HP customer, or you're interested in the event - check out the HP Protect website. I was a guest at the conference this year and had an amazing opportunity to sit down in 3 separate sessions with a serviceEpis provider, a practitioner, and 2 vendor-partners and talk real-world security... Episode 1 - Ian Beckford, Senior Product Manager, TELUS Security Solutions - Ian and I had a lively discussion around the service-provider use of the analytics and network security devices (currently ArcSight and TippingPoint) to provide customers with security solutions which benefit them, while remaining cost effective.
Direct download: DtR_FeatureCast_-_HP_Protect_2013_Episode_1_-_Ian_Beckford_of_TELUS.mp3
Category:FeatureCast -- posted at: 12:00am CST |
Mon, 16 September 2013
In this episode...
Guest
Direct download: DtR_Episode_58_-_Of_BSides_and_Bettering_Infosec.mp3
Category:Information Security -- posted at: 12:00am CST |
Fri, 13 September 2013
Today I had the pleasure of sitting down with one old friend, and one new. As a speaker at the HTCIA International conference, and the CISO Summit - I had the opportunity to gain some valuable insight, meet lots of excellent leaders, and force some new relationships. As a wonderful side-effect I had the pleasure of sitting down with Mike Murray of Mad Security, and Vince Skinner an attendee of the conference and security leader of his enterprise. We talked about a range of topics from history of the information security industry, to our experiences and the current lack of direction and strategy in much of the enterprise space. We also discussed some topics that dated us quite a bit ...so don't judge! Guests
Direct download: DtR_FeatureCast_-_HTCIA_International_Sept_12_2013.mp3
Category:Enterprise Security -- posted at: 12:57am CST |
Mon, 9 September 2013
I want to thank our guests - Beau Woods and Joe Knape for joining us this morning. It was great to have these two well-versed commentators on the show ...vote with your downloads folks - if you want to make this a regular thing leave us a comment! Topics Covered
Other Links
Direct download: DtR_Episode_57_-_NewsCast_for_September_9th_2013.mp3
Category:Information Security -- posted at: 10:27am CST |
Tue, 3 September 2013
Every once in a while this podcast has a guest who makes us truly feel blessed to be doing this - Rob Dubois is one of those people. If you don't know anything about Rob, go read his website, listen to this podcast and check out his book. He is a real American hero, a fantastic human being, and a true patriot. On behalf of James and I - I want to extend a hearty thank you for the time Rob spent, and wisdom he's imparted. In this episode...
Guest
Direct download: DtR_Episode_56_-_Understanding_the_InfoSec_Elephant.mp3
Category:Information Security -- posted at: 11:50pm CST |
Mon, 26 August 2013
Since James is out this week with something called "work", I've pulled in two friends (affectionately known as "The Joshes") Josh Marpet and Josh C. Big thanks for these fine gentlemen for stepping in and co-chairing this Monday morning quarterback session... I hope you enjoy! Topics Covered
Other links
Direct download: DtR_Episode_55_-_NewsCast_for_August_26th_2013.mp3
Category:Enterprise Security -- posted at: 12:50pm CST |
Mon, 19 August 2013
In this episode...
Guest
Direct download: DtR_Episode_54_-_Evolution_of_InfoSec_with_The_Godfather_of_IPS.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 12 August 2013
Topics Covered
Direct download: DtR_Episode_53_-_NewsCast_for_August_12th_2013.mp3
Category:Information Security -- posted at: 10:59am CST |
Mon, 5 August 2013
In this episode...
Guest
Direct download: DtR_Episode_52_-_Advanced_threats_remedial_defenses_broken_record.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 29 July 2013
Ladies and gentlemen, we are over the 50 episodes mark! If you've enjoyed the podcast, please go rate us in the iTunes store, or leave us a note here. Have you checked out past episodes?! There are some gems in there, I promise, and worth your time. Topics Covered
Direct download: DtR_Episode_51_-_NewsCast_for_July_29th_2013.mp3
Category:Information Security -- posted at: 9:52am CST |
Mon, 22 July 2013
Welcome down the rabbithole as we hit EPISODE 50! I'm thrilled that we've made it this far, and look forward to having you along for the ride into the future! At this point, I'd like to encourage you to listen to some of the fascinating guests we've had on this show, people I'm proud to have had a chat with, in the past archives... suggest guests, or just leave us a comment. /Wh1t3Rabbit In this episode...
Guest
Direct download: DtR_Episode_50_-_The_Emergence_of_Geopolitics_in_InfoSec.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 15 July 2013
Topics Covered
Direct download: DtR_Episode_49_-_NewsCast_for_July_15th_2013.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 8 July 2013
In this episode...
Guest
Direct download: DtR_Episode_48_-_Securing_HP_Software.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Tue, 2 July 2013
*Apologies for this very important episode getting out a bit late ladies and gents, experienced a loss in the family so things were a little slow to re-start, we should be back on track for next week's episode. Topics Covered
Direct download: DtR_Episode_47_-_NewsCast_for_July_1st_2013.mp3
Category:Information Security -- posted at: 12:59pm CST |
Mon, 24 June 2013
In this episode...
Guest
Direct download: DtR_Episode_46_-_Serious_Problems_with_Industrial_Control_Systems.mp3
Category:Enterprise Security -- posted at: 12:52am CST |
Mon, 17 June 2013
This week, James is flying solo on the microphone catching you up on all the latest news and BIG stories since I'm at HP Discover, Las Vegas and Suits and Spooks in La Jolla, CA. A busy week all the way around, some pretty earth-shattering news coming out! Topics Covered
Direct download: DtR_Episode_45_-_NewsCast_for_June_17th_2013.mp3
Category:Enterprise Security -- posted at: 6:14am CST |
Mon, 10 June 2013
In this episode...
[ More info on NSS Labs and the two guests today can be found here: https://www.nsslabs.com/analysts and https://www.nsslabs.com/ ] Guests
Direct download: DtR_Episode_44_-_Unmasking_Security_Products.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 3 June 2013
It's June already?! Where has the first half of 2013 gone? James and I break down the last 2 weeks of interesting InfoSec news in a short "Monday morning quarterback" style... enjoy! Topics Covered
Direct download: DtR_Episode_43_-_NewsCast_for_June_3rd_2013.mp3
Category:Enterprise Security -- posted at: 12:01am CST |
Mon, 27 May 2013
In this episode...
Guest
Direct download: DtR_Episode_42_-_Threat_Modeling.mp3
Category:Enterprise Security -- posted at: 11:53pm CST |
Mon, 20 May 2013
Welcome to Monday, May 20th 2013 as James and I discuss the last 2 weeks' worth of Information Security news and relate it (attemptively) to your enterprise day-job. This week was a bit on the lighter side, with the quote of the year (as far as I'm concerned) winner going to the Washington State Administrative Office of the Court for ...well, you'll just have to read the rest of the show notes and listen to the podcast. Also ... we are now on the Zune store. So ...to the 2 new Zune listeners - HELLO! Topics Covered
Direct download: DtR_Episode_41_-_NewsCast_for_May_20th_2013.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 13 May 2013
In this episode...
Guest
Direct download: DtR_Episode_40_-_Breakers_Builders_and_the_Enterprise.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 6 May 2013
It's another beautiful Monday (somewhere) and we've got the news of the last 2 weeks covered, and we're breaking it down for you. The news this week is, well, quite frankly kind of dark. Everything tells us we're in for a rough ride for the rest of the year, and it's only getting worse. If I sound a little funny, it's because I'm talking through a massive sinus infection and it's making me talk funny and stuffy. Also the recording you hear is take 2 ... I had a major technology fail so we had to re-record, with less sadness. Topics Covered
Direct download: DtR_Episode_39_-_NewsCast_for_May_6th_2013.mp3
Category:Information Security -- posted at: 12:39am CST |
Mon, 29 April 2013
In this episode... Live (live-to-tape) from 44Con, London, England. It's amazing, listening to this episode recorded at 44Con last fall, how little the landscape of enterprise security has changed. I took some time during the busy conference to sit down with Ian Amit and Dennis Groves to discuss Ian and my talks (which were perfectly aligned, and completely unplanned!) on the state of security in the enterprise. It's always interesting to get the perspective from 2 industry-well-known speakers and thinkers. We discuss the topics of #SecBiz including the role of security in the enterprise, the challenges business security professionals face, metrics and why we have some of the crazy change management failures in security. We laugh, we almost start to cry - but ultimately come to the realization that we need change. Ian and Dennis and I are working on driving that change! Guests
Direct download: DtR_Episode_38_-_Enterprise_Security_in_the_Real_World_44Con_12.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 22 April 2013
It's Monday April 22nd, 2013, and here are the topics from the last 2 weeks James ( @jardinesoftware ) and I ( @Wh1t3Rabbit ) will be talking about as we Monday-morning-quarterback the last 2 weeks in Information Security... Fair warning, we have way too many topics to fit into 20 minutes... so went a little bit longer but both feel it's well worth your time. Laugh, cry, and be informed. Topics Covered
Direct download: DtR_Episode_37_-_NewsCast_for_April_22nd_2013.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 15 April 2013
In this episode...
Guest
Direct download: DtR_Epsiode_36_-_Unmasking_Cyber_Intelligence.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 8 April 2013
In this second episode of our Monday morning InfoSec quarterbacking, James and I actually got through the news items we had lined up in just about 20 minutes. I count this as a win. Topics Covered
Direct download: DtR_Episode_35_-_NewsCast_April_8th_2013.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 1 April 2013
First ...a milestone. I want to take this time to formally welcome Mr. James Jardine, of SecureIdeas, as my permanent co-host to the podcast. James has experience podcasting as he already co-pilots the Professionally Evil Podcast, and he's witty, knowledgeable, and awesome to work with on the microphone. I ask that you all give James a warm welcome! In this episode...
Guest
Links
Direct download: DtR_Episode_34_-_The_Inside_Scoop_on_Cyber_Liability_Insurance.mp3
Category:Enterprise Security -- posted at: 12:00am CST |
Mon, 25 March 2013
Welcome to the Down the Rabbithole NewsCast! Join me in welcoming James Jardine ( @JardineSoftware) of Secure Ideas to the show as a permanent co-host! The NewsCast is a bi-weekly (2nd and 4th Monday of the month) release where we'll discuss the news and events of the past 2 weeks, and attempt to analyze, break down, and generally make sense of the madness of the Security industry and real world at large. Also a big thanks to Todd Haverkos, the voice behind the hilarious intro you'll hear on this podcast, and all the others ... Topics We Covered
Direct download: DtR_Episode_33_-_NewsCast_March_25th_2013.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 18 March 2013
In this episode...
Guests
Direct download: DtR_Episode_32_-_Big_Data_in_Little_InfoSec.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 11 March 2013
Synopsis This timely podcast is right on the heels of the US vs. Cotterman decision from the 9th Circuit Court of Appeals. One of the watershed decisions on privacy and digital law, this is an extremely important case that touches on whether government agents can take and search your digital property while crossing the border with or without cause or suspicion. Michael and Shawn give their analysis, and we get some critical information for international business travelers, as well as those of us in the security community who regularly cross the US border with sensitive, potentially encrypted or password-protected information. Link to the original 9th Circuit Court of Appeals decision: http://cdn.ca9.uscourts.gov/datastore/opinions/2013/03/08/09-10139.pdf You're not going to want to miss this podcast. Guests
Direct download: DtR_Episode_31_-_Analyzing_US_vs_Cotterman.mp3
Category:Cyber Law -- posted at: 12:00am CST |
Fri, 8 March 2013
Synopsis Security has an interesting view on "business decisions", and in this podcast episode recorded at GrrCon 2012 in Grand Rapids, MI I sit down with some of the talent behind MISEC and we discuss #SecBiz topics of interest including the ugly phrase "it's a business decision" and why we say that. We also dive into how decisions are made, and why security and business are still often at odds on goals and acceptable 'risks'... and why our recommendations and guidance still falls on seemingly deaf ears. We sample some of the sage wisdom of J.W. Goerlich as he runs his IT and security organization, and how he asks his security employees to think business, and put themselves into the frame of reference of the business when making decisions. Jen Fox brings up Miller's Law, and teachs us to ask "What is that true of?" when framing discussions in the business context with non-technologists. Jen makes us think about frames of reference. She tells us that we must assume that a statement someone makes is true ... from their frame of reference and we simply must get inside their frame of reference to understand their thinking. Steven Fox gives us a little bit of a glimpse into the government world where you can't always go sit down with the decision maker, and have to depend on your relationships, cooperation, and sometimes back-room politics to get things done. I invite you to listen in, this is a timeless discussion that everyone should participate in. Guests
Direct download: DtR_Episode_30_-_Its_Always_a_Business_Decision.mp3
Category:Information Security -- posted at: 9:17am CST |
Mon, 4 February 2013
Synopsis Shawn and I have been trying to get together to record an episode for what seems like forever. We first started talking about the CFAA (Computer Fraud and Abuse Act) when it was ruled that a person could not be charged as a 'hacked' under the CFAA by their employer when they accessed information improperly if the employed did not restrict that access appropriately. Shawn's expert insight here as an attorney dealing with the CFAA shines as we talk about hacking, vulnerability research, and other critical topics to the hacker culture, information security industry and security professionals. You're not going to want to miss what Shawn has to say... I want to thank him for his time, and encourage anyone who needs the sort of advice Shawn has to give him a call, or send him a Tweet. Guest Shawn E. Tuma - Shawn E. Tuma is an experienced business, litigation, and intellectual property attorney at BrittonTuma who helps businesses and individuals assess, avoid, and resolve business and legal issues. Shawn has spent his career handling cases before state and federal courts alike and is well versed in both traditional and emerging areas of the law. In addition to his career-long business law and litigation practice, he has developed a niche practice as a thought-leader in emerging areas of such as computer fraud, data breach, privacy, and social media law, with a strong command of the Computer Fraud and Abuse Act. Shawn enjoys handling highly complex commercial, technological, and intellectual property matters as much as he does those that are more traditional. Shawn can be found on Twitter as @shawnetuma.
Direct download: DtR_Episode_29_-_The_Law_and_the_Hacker.mp3
Category:Information Security -- posted at: 9:32pm CST |
Tue, 29 January 2013
Synopsis I sat down with Bill at ISSA International in Anaheim, CA in the fall of 2012 to discuss what it's like, and what types of challenges he faces in the fast-paced, hybrid world of security at Netflix. We talked about some of the challenges his environment faces, and more generic issues that are endemic to the evolving security landscape. It's fascinating to hear Bill's take on what the big picture items are, and how security is really in a state of evolution right now. Join us, I tihnk you'll love this episode. Guest Bill Burns - Director of IT Security and Networking, Netflix - Bill is a silicon valley titan, his name is associated with the likes of Infoblox, Riverbed and Netflix. Currently he's the Director of IT Security and networking at Netflix managing security in a hybrid cloud, traditional IT world, and facing some of the most complicated challenges in today's tough security landscape.
Direct download: DtR_Episode_28_-_InfoSec_in_a_Cloud_of_Constant_Flux.mp3
Category:Information Security -- posted at: 9:19am CST |
Mon, 7 January 2013
Synopsis To kick off January on the Down the Rabbithole podcast I have Mikko Hypponen, the "malware adventurer" and Chief Resarch Officer from F-Secure Corp and we're talking about the state of malware and 'viruses' digging into the modern threat landscape and maybe digging up a bit of nostalgia from the late 90's. This is a fascinating conversation so I invite you to break out your old boot sector and COM viruses and join us for some interesting discussion! Guest Mikko Hypponen - Chief Research Officer at F-Secure Corp., TED speaker, and self-professed "malware adventurer". He can be found on Twitter at @Mikko
Direct download: DtR_Episode_27_-_Way_behond_viruses.mp3
Category:Information Security -- posted at: 4:00am CST |
Fri, 21 December 2012
Synopsis This microcast episode was recorded live from hackfest.ca 2012, on location in Quebec. The conference is a phenomenal success for the challenges they face (primarily non-English speaking region, small market, etc) but they've managed to attract a ridiculous amount of people to this conference, awesome speakers, and have one of the best 'War games' scenarios I've ever seen... listen to these two guys talk about how they make this happen. Guests
Direct download: DtR_MicroCast_06_-_Hacking_in_Quebec_Hackfest.ca.mp3
Category:Information Security -- posted at: 12:00am CST |
Tue, 18 December 2012
Synopsis This episode is special because it's been a long-time-in-the-making interview with Brad Arkin of Adobe. This is the organization that many of the hacker community like to hate, and pick on - without realizing the monumental task of securing the software that Brad's team is responsible for. Brad's official title at Adobe is Engineering Senior Director but in real life one of the responsibilities his team is tasked with is doing product security for products like Adobe Flash and Reader ... Brad's take on software security and how he got the bug problem under control at Adobe is worth a listen! Guest Brad Arkin - Engineering Senior Director at Adobe - Brad has a long history of being involved in the Information Security world, particularly software security and has held many interesting roles from Cigital, to a technical director at @Stake, to working his way through Adobe since 2008. Brad can be found on LinkedIn, here: http://www.linkedin.com/pub/brad-arkin/1/2a8/4.
Direct download: DtR_Episode_26_-_Software_Security_under_pressure.mp3
Category:Information Security -- posted at: 4:30pm CST |
Fri, 26 October 2012
Synopsis LIVE from day 2 of the ISSA International conference 2012, in Anaheim, California I cornered Eric Cowperthwaite after a much-anticipated year-long wait... and we talked about his prediction that in the next 2 years many of the traditional IT employees will be employed as either business-IT resources in the enterprise, or IT-technical resources at an IT outsource or cloud provider... Eric's predictions tend to be right on the money so it'll be interesting if some of the things he advocates in this microcast come true! Only time will tell. Guest
Direct download: Cowperthwaite-ISSA_Intl_-_Rise_and_Fall_of_Enterprise_IT_01.mp3
Category:Information Security -- posted at: 5:43pm CST |
Mon, 22 October 2012
Syhopsis When I caught up with these two gentlemen in Amsterdam over the week of Black Hat 2012, I knew we wouldn't run out of things to talk about! We ended up chatting for quite some time, and I think you'll find this conversation interesting from hearing of David's recent work with Oracle, and Jim's perspective on "the fix"... I kept the conversation going and am probably at last partially responsible for how long this podcast ended up being. It's well worth the time, in my opinion, as we cover the following topics:
Guests
Direct download: DtR_Episode_25_-_From_Black_Hat_Amsterdam_2012_with_SQLi.mp3
Category:Information Security -- posted at: 2:43pm CST |
Thu, 4 October 2012
Synopsis This week we went free-form with two of my favorite InfoSec insiders ...people you probably follow on Twitter but can't quite place. Here are some of the topics covered this week:
Guests
Direct download: DtR_Episode_24_-_All_the_things_InfoSec.mp3
Category:Information Security -- posted at: 11:00am CST |
Mon, 24 September 2012
Synopsis Today's podcast discussion is with someone who has one of the toughest jobs in the security world... Patrick helps organizations that generate and deliver the power that runs our gadgets and critical systems that maintain life as we know it. The power grid is not only surprisingly vulnerable due to it's age-old infrastructure, but also surprisingly resilient due to the complex nature of power distribution and generation... there's just a lot more to it than most people realize. Patrick separates fact from fiction and goes into the pragmatic approach on national electric grid security - where we realize that it's really worse than we believed from a cyber security perspective, but better than we know because as you read this the electric grid is under constant attack, but it's still transmitting clean power. I urge you to listen to this podcast, and then engage Patrick (@PatrickCMiller) or I in discussion... Guest
President & CEO of EnergySec Principal Investigator of National Electric Sector CyberSecurity Organization (NESCO) Links:
Direct download: DtR_Episode_23_-_Energy_Sector_SmartGrid_and_Resiliency.mp3
Category:Information Security -- posted at: 10:08am CST |
Thu, 20 September 2012
Synopsis This episode is a mini-episode recorded live from the social media lounge at HP Discover Las Vegas 2012. It was an incredible show, where I caught up with Marc and Matt - two guys who are really from opposite side of today's deploy vs. secure coin. Somehow we quickly dove into DevOps and picked up right where my conversation with the incomprable Gene Kim left off in episode 20. Ironically, we discussed how to deploy faster (sound familiar?) and still get security and quality into the scope of delivery... this isn't a product pitch but it's two HP guys talking about how products impact software quality, security and overall delivery speed. Guests
Direct download: DtR_Episode_22_-_Marc_Blackmer__Matt_Morgan_-_Security__App_Lifecycle_viewpoints_HP_Discover_Vegas_2012.mp3
Category:software development -- posted at: 2:39pm CST |
Wed, 29 August 2012
Synopsis In this episode we ask the big question of "Can security be a part of the 'build/deploy faster!' culture?" We discuss the need to separate out high/low risk code, understanding how to deploy dormant components of the applications, proper testing strategies and branching/merging in a world where faster isn't just an ask, it's a need to stay competitive. A huge thank you to all my guests for their time and expert insight. The combined talent and experience of my 3 guests is something you should absolutely take a listen to, as these gentlemen really know what they're talking about - whether it's Information/Application Security, or DevOps ... this is a discussion that bridges both with expert precision. Guests
Links:
Direct download: DtR_21_-_Wickett_Galbreath_Saudan_-_Continuous_deployment__security.mp3
Category:Information Security -- posted at: 10:20am CST |
Mon, 6 August 2012
Synopsis This episode was recorded in June '12, live from the show floor at HP Discover Las Vegas, 2012 and the talk of the town was once again DevOps. Gene and I have had 2 prior conversations on the topic, but we're once again tackling the impact of DevOps on the IT and security relationship and overall business value. We tip our hats to several people including Josh Corman (Rugged DevOps), David Mortman, James Wickett, Nick Galbreath and Mr. Daniel Blander for their prior contributions and supporting work on the topic. Gene talks about some of the mechanisms we have available to us to bridge that IT Security-to-developer-to-operations gap that's holding us back from true business value. Fun fact- studies have found that when you wake up a developer at 2am to solve an issue, problem resolution times plummet! Enjoy the podcast, and go grab Gene's books when they're available... comments are welcome! Guest
Links
Direct download: DtR_20_-_Gene_Kim_-_DevOps_from_HP_Discover.mp3
Category:Information Security -- posted at: 12:00am CST |
Tue, 10 July 2012
Synopsis This episode is special, not because it's more Info Security stuff, but because we take a far departure from the world of bits and bugs to the world of the pick-pocket and thief. Sitting down with Bob Arno is a real pleasure, as he has the storytelling ability and knowledge to educate and open your eyes to a world where nothing is as it seems and anyone can be separated from their valuables. Yes - this extends into the world of Information Security, and there are lessons to learn. In this episode Bob and I talk about picking pockets, keeping yourself safe, and the world of criminal activity in the physical and digital world... Bob is also speaking at Hacker Halted, Miami 2012 so if you listen to this episode and are thinking about going ... there's a contest coming! Stay tuned... and you can win an excusive, private dinner with Bob in Miami! Guest Bob Arno is widely known as the "World's foremost legal pick-pocket". He's performed on stage, on television and has provided advice to travelers on how to keep from being roused... Bob is a speaker, entertainer, author, and special lecturer to law enforcement agencies. He has been profiled or quoted on NPR, CNN, MSNBC, ABC’s 20/20, The Travel Channel, The Learning Channel, Discovery, Court TV, in The New York Times, USA Today, Fortune, Kiplinger’s, National Geographic Traveler, Law and Order, and others. He has lectured for the Police Departments of Chicago, San Diego, Houston, Las Vegas, Detroit, Honolulu, Anaheim, and many abroad; for the California Tourism Safety & Security Conference, the International Tourism Safety and Security Conference, and many others; for Kroll & Associates, RSA Security Conference and Expo, and more. He taught an accredited course at the Connecticut State Police Training Academy. Links
Direct download: Episode_19_-_Bob_Arno_-_The_Worlds_foremost_legal_pickpocket.mp3
Category:Information Security -- posted at: 3:12pm CST |
Sun, 1 July 2012
Synopsis I caught up with my friend Kellman Meghu at BSides Detroit as the conference was coming to a close and we finally got to sit down and have a fun conversation about chaos, and what sorts of things enterprises can realistically do to increase security today. We both work for vendors so we talked about "shiny blinky boxes", when things fail, and the notion of resiliency. Fun conversation ensues ... with a random sprinkling of security buzzwords. Kellman's famous quote is from this episode is "I can hand you this tool, and that doesn't suddenly make you any more secure than if you hand me a hammer I suddenly become a carpenter." Wise words to live by folks, wise words indeed. Spend a few minutes with Kellman and I, and see why he's one of my favorite people to interview. Guests
Links
Direct download: DtR_Episode_18_-_Kellman_Meghu_-_Chaos.mp3
Category:Information Security -- posted at: 11:06pm CST |
Mon, 18 June 2012
Synopsis Greetings fans, this episode promises to be a great one with the likes of Adam Shostack starting off talking about what the whole concept of "New School Security" is all about, and how it differs from the way we've all done it for the past 15+ years. Adam and I talked through some new interesting ideas for moving the information security community and discipline forward, and even commented on how we can start to overcome the security community's focus on 'secrecy' when things go wrong. How do security professionals understand what the desired outcomes should be, then start to move towards implemting pragmatic approaches to move closer to those desired outcomes - because in the end it's really about business and getting it done, not about 'security'. You will be sorry if you miss this episode! Guest
Links
Direct download: Episode_17_-_Adam_Shostack_on_New_School_Security.mp3
Category:Information Security -- posted at: 12:36pm CST |
Thu, 14 June 2012
Synopsis Last winter, on a frigid afternoon I got a chance to sit down with 2 of my favorite Iowa locals, Kevin and Kenneth to talk about the tenuous relationship between QA and Information Security. Earlier in the day I had given a workshop on software security testing (of the web variety) to a ViViT user group, and with that topic and their questions/concerns fresh in my mind I settled down for a 30 minute conversation with Kevin and Kenneth ... we essentially continued the conversation from Episode 3 (please give that a listen if you haven't yet to get a background). Some of the questions we tackled included "Which team within the software development or security organization is best positioned to test the security of applications?", and "Can Information Security ever really thoroughly test an application without the full context?" ...and much more. Give this episode a listen! Guests
Direct download: MicroCast_04_-_Kevin_Riggins__Kenneth_Johnson_-_QA__Security_Software_Testing.mp3
Category:Information Security -- posted at: 3:02pm CST |
Mon, 4 June 2012
Greetings friends! I am taking some time to do something a little out of the ordinary right now... I'm coming to you from beautiful Las Vegas, Nevada and HP Discover 2012 where the theme is Make it matter. Rather than doing yet another blog post on how beautiful the show floor is, and how amazing the content is going to be, I've recorded a little bit of audio, about 6:30 miutes or so to give you a feel for what we're up to, what's going on, and why I'm downright giddy with excitement.
Direct download: Welcome_to_HP_Discover_Las_Vegas_2012.mp3
Category:Information Security -- posted at: 5:50pm CST |
Tue, 29 May 2012
Synopsis This episode of Down the Rabbithole microcast (~15 minutes length) was recorded live at the Ohio Information Security Summit. Albert and Paul were kind enough to sit down with me and discuss metrics and process - and essentially what demonstrating "good security" means to an enterprise. "Can we ever get there?" Where is there? Understanding the basics of security, measurement, and whether if we really do a great job, Information Security can work itself out of a job ... those are some heavy topics for a mini-podcast. Enjoy! Feedback is always welcome Guests
Direct download: Down_the_Rabbithole_-_MicroCast_3_-_Paul_Elwell__Albert_School_-_Measuring_Security.mp3
Category:Information Security -- posted at: 10:00am CST |
Fri, 25 May 2012
Synopsis In this episode, streamed live and recorded for your listening pleasure, I'm joined by @SpaceRog and @Shpantzer from Security BSides Delaware. What started out as an off-the-cuff discussion on the 'Cyber Apocalypse' quickly materialized into a much longer discussionw which dove into various aspects of infrastructure security, critical protection and even the inability to separate the physical from the cyber worlds. Join us for a little bit of nostalgia, a little bit of knowledge and a lot of commentary from these two very smart staples of the security community. This is one of those conversations which I barely edited... it was free-flowing, entertaining and insightful. I hope you enjoy it! Guests
Direct download: Down_the_Rabbithole_-_Episode_16_-_Spacerog_and_Shpantzer_talk_CyberPocalypse.mp3
Category:Information Security -- posted at: 11:27am CST |
Tue, 8 May 2012
Synopsis It's rare that I get to be a spectator at a podcast, but in this case I was listening to some of the conversations and talks being given at Chicago's very own THOTCON 0x3, and decided it would be valueable to you to get some of the conversation movers on the microphone. We started talking about the applicability of information security conferences to your "day job", got into a discussion on "hallway con" and then went down the rabbithole on some interesting tangential topics ... and of course the fresh rap from DualCore was awesome. I hope you enjoy the episode ... Guests
Direct download: Down_the_Rabbithole_-_Episode_15_-_Backstage_at_THOTCON_0x3.mp3
Category:Information Security -- posted at: 1:04am CST |
Fri, 27 April 2012
Synopsis In this short microcast we rap about the THOTCON 0x3 experience, why we think the Chicago community has taken off so much, and what sorts of interesting things make THOTCON, and the local hacker con here in Chicago, so attractive to people from around the world. Yes, there is comedy involved... Guests
Direct download: Down_the_Rabbithole_-_Microcast_-_THOTCON_0x3_1.mp3
Category:Information Security -- posted at: 4:23pm CST |
Tue, 24 April 2012
Synopsis This episode I sit down with Dave Frederickon who has a unique viewpoint on cloud computing from a Canadian point of view, as well as a VP of the HP Canada business. I pose some tough questions to Dave including "Is 'cloud' just marketing hype?" and other discussion topics and we have a good chat on the reality of cloud computing, who's adopting it and how it's changing and revolutionizing Information Technology at the pace of business. This is another great podcast in the cloud series, and you should not miss it! Guest
Direct download: Down_the_Rabbithole_Podcast_-_Episode_14_-_Dave_Frederickson_on_Cloud_Reality.mp3
Category:Information Security -- posted at: 12:32pm CST |
Mon, 2 April 2012
Synopsis On this episode of Down the Rabbithole I get the distinct pleasure of sitting down with one of Silicon Valley's top attorneys to talk Cloud Computing T's and C's ...and let me tell you this was a wild ride. I learned a lot, including the fact that I know a famous legal court case about a tugboat captain and the use of radar ... and what all that CAPSLOCK PRINT ON SOFTWARE LICENSE AGREEMENTS means ...and so very much more. Join me, and learn a little bit more about the legal aspects of cloud, before you find out the hard way. This is a do not miss episode. Guest Mark Radcliffe [DLA Piper] - Mark F. Radcliffe concentrates in strategic intellectual property advice, private financing, corporate partnering, software licensing, Internet licensing and copyright and trademark. More on Mark on his profile page: http://www.dlapiper.com/mark_radcliffe/
Direct download: Episode_13_-_Mark_Radcliffe_-_The_Ts_and_Cs_of_Cloud_Security.mp3
Category:Information Security -- posted at: 12:00am CST |
Wed, 21 March 2012
Summary This 1 hour podcast was recorded live at the March 7th, Chicago Cloud Security Alliance chapter meeting, where we were fortunate enough to have a panel of attorneys discuss the issues with cloud security from a legal perspective. I hope you find the content stimulating, if not a little bit worrisome. Apologies for some of the flaws in the audio, but this was an ad-hoc recording and I didn't have time to clean up the taps and paper shuffling that the super-sensitive microphone picked up. This was the first recording using the mobile Zoom H4n, and I think you'll agree it's an amazing piece of tech. This podcast is posted as-is, and hosting is provided courtesy of HP.
Direct download: CSA_Chicago_Chapter_-_Legal_Panel_03-07-2012.mp3
Category:Information Security -- posted at: 1:16am CST |
Mon, 5 March 2012
Synopsis The guest on this podcast will blow your mind ... literally. He is none other than the "human hacker" himself, Christopher Hadnagy, who has written a book and now runs social-engineer.org. Chris is a long-time friend of mine and an invaluable resource in the psy-ops James Bond style social engineering world. Chris knows his stuff, and he's willing to teach you if you're willing to listen... so buckle down and get educated on social engineering background, tricks and even the 6 things your company must do to prevent being a victim of social engineering attacks. Oh ... and let's not forget, somewhere in this episode Chris makes you an offer you can't refuse, just for you Down the Rabbithole listeners, how cool is that? If you've ever thought about taking a class, or having your organization fortified against social engineering attacks but didn't think it was within your budget - listen to this podcast ... Guest Christopher Hadnagy - Chris, or as his friends on Twitter know him - @HumanHacker - is a fountain of knowledge on social engineering and the art and science behind corporate-level offense and defense using the human mind. Chris has written a book called Social Engineering: The art of human hacking, and runs social-engineer.org contributing to community through teaching, speaking and writing as well as hosting a heck of a podcast on the fascinating topic of social engineering. Chris's organization offers SE penetration testing, education and is at the forefront of social engineering tactics for the defensive good. Links
Direct download: Down_the_Rabbithole_-_Episode_12_-_Chris_Hadnagy_-_Hacking_the_Human_mind.mp3
Category:Information Security -- posted at: 12:52pm CST |
Wed, 29 February 2012
Synopsis I had the pleasure of sitting down with Nathaniel Dean, someone I had met through a mutual colleague's introduction, and hear about a neat concept that takes the software security program to a new level. Interestingly enough, Nathaniel runs a red team but it's guaranteed to be unlike any red team you've probably ever worked with. The crazy thing? It's working. We talk through the mechanics, psychology, and business implications of what he's driving, and how he's rollig up his sleeves and getting it done which is probably more important than anything else. Jack in and get a 25-minute does of knowledge from someone I know you'll learn something from. Guest
Direct download: Episode_11_-_Nathaniel_Dean_-_Software_Security_Remediation_Red_Teaming.mp3
Category:Information Security -- posted at: 8:16pm CST |
Fri, 10 February 2012
Synopsis We were "live to tape" (as Adam says) from HP's Master the Cloud event in Calgary. As we wrap up the road tour in the frozen city of Calgary I had the pleasure of sitting down with a comedian and celebrity, a technical expert on virtualization from HP, and the manager of Intel's advanced server technologies team. This was a wild, off-the-rails discussion and you can really tell we were just having a good time and excited to wrap up the tour. Great topics of discussion... Topics covered in this episode include...
Special Guests
Links
Direct download: Master_the_Cloud_-_Live_from_Calgary_w_Jake_Smith_Adam_Growe.mp3
Category:Information Security -- posted at: 7:56pm CST |
Mon, 6 February 2012
Synopsis World-renowned author, researcher, speaker and founder of legendary TripWire joins me semi-live from LASCON in Austin, Texas to talk about his current project(s) [The DevOps Cookbook, and When IT Fails: A Novel], and his book Visible Ops and how this can all be applied to security in today's tough business climate. Gene and I discuss what in the DNA of well-performing (or "agile") IT organizations, based on Gene's research and experience, enables them to not only perform better, but also serve the business faster. These high-performing organizations all have things in common, and you may be shocked to hear it's not heaps of money, or resources, or "powerful" CISOs. The experience was a pleasure and I guarantee you'll learn something from this podcast, and I highly encourage you to add Gene's books as a staple of your career-building library. Guest
Links
Direct download: Down_the_Rabbithole_-_Episode_10_-_The_real_Gene_Kim_on_DevOps_KPIs_and_high_performance_IT.mp3
Category:Information Security -- posted at: 12:00am CST |
Tue, 31 January 2012
Synopsis I sat down at the HP Master the Cloud (hp.com/go/cloud) event in Toronto, Canada to answer some Twitter-based questions, talk about the trade show, and listen to some of the fantastic things Victor and his team are working on right now in their incubator ... and it was a really great 20 minutes. We covered the questions below (posted directly from Twitter, special thanks to all who participated) and talked about technology, the evolution of security, and how organizations can take advantage of this shift as technology turns the corner in a new operating and delivery paradigm. Is cloud right for everyone? Probably not. Is cloud right in every situation? Probably not. This is exactly why you need to listen to Victor ... this is definitely a worthwhile way to spend 20 minutes of your time. Questions from Twitter
Guest
Links
Direct download: Master_the_Cloud_-_Toronto-_Victor_Garcia_CTO_HP_Canada.mp3
Category:Information Security -- posted at: 3:10pm CST |
Thu, 26 January 2012
Synopsis This special episode of Down the Rabbithole is sponsored exclusively by HP Canada, and I wanted to thank them for hosting this fantastic event! In this episode I sat down with Charlie Bess and EG Nadhan to talk about Cloud Computing. Now, this isn't your standard cloud discussion ... no my friends, these are two of the top technologists HP has to offer from the labs and services organizations talking about the paradigm shifts in computing that "the cloud" offers. We talk through business adoption, getting over the "it's cheaper" mentatlity, security ... and even some of the things learned here at the event in Montreal. What a fantastic opportunity to pick the brains of some extremely smart people, and hear their responses to one of the most difficult and rewarding business shifts in technology in the last 10 years. You're not going to want to miss this. Guests
Direct download: Master_the_Cloud_-_Montreal_-_Charlie_Bess__EG_Nadhan.mp3
Category:Information Security -- posted at: 2:12pm CST |
Wed, 25 January 2012
Synopsis This month's cal lkicks off 2012 with a big question - "Do security professionals follow their own policies?" ... and as we talk through this issue we discover that there are other subtleties to this question. Does it make sense for Information Security to have separate accounts for general and administrative access? Does a securit policy fail if it does not account for 'exceptions' to that policy - legitimate exceptions? What about an exception policy that allows information security professionals to navigate complex policy issues and receive 'allowances' to do their jobs without being limited by the general user policy? These are complex questions that we tackle, and offer some guidance for ... and in the end, things aren't as simple and black-and-white as we'd all like ... you'll just have to listen to hear the advice we dispense! Guest
Direct download: January_SecBiz_Call_-_Eating_our_own_dogfood.mp3
Category:Information Security -- posted at: 10:38pm CST |
Mon, 16 January 2012
Synopsis This episode with Jeff was awesome, recorded at the OWASP LASCON security conference, I got a chance to sit down with Jeff in person and talk shop. I always learn something, but in this podcast Jeff dispensed his usual wisdom in buckets, I could barely write this stuff down fast enough. We covered the raising of the "information security table stakes", and what the last 15 years have meant to the information security profession in terms of evolution. We went into a discussion on how information security can avoid being a cost center and feeling the traditional expansion and contraction with workload and economic times, and I learned what the phrase "it was a business decision" really means. In case you need one more compelling reason, Jeff brought up yet another gem when he discussed how the business pushes the boulder off the cliff, then expects information security to change its trajectory mid-fall ... you're not going to want to miss this. I had a wonderful time catching up with Mr. Reich, and you'll enjoy this podcast, that's a promise. Guest
Direct download: Down_the_Rabbithole_-_Episode_09_-_Jeff_Reich_explains_information_security_table_stakes.mp3
Category:Information Security -- posted at: 12:00am CST |
Mon, 9 January 2012
Synopsis This is the third and final part of a 3-part (3 x 30 minute segments) holiday episode that was aired LIVE, where Will, Scott and I talk about what significant things happened in 2011, and what we should be looking forward to in 2012. No predictions, no propaganda, just hard-hitting, amusing, and often nostalgic discussion about the realities of living in an ever-more connected world as we go into 2012. I hope you enjoy the podcast series if you missed it live. In the future, look for announcements of live episodes on my (@Wh1t3rabbit) podcast feed and join in the discussion! If you're a fan of the dirty world of cyber-crime, botnets, and the seedy underbelly of polymorphic, crypto-virological (I think Will made that word up...) code, you need to hear this episode. A great opportunity to hear Will share he experience as we talk through some of the nasty threats, real dangers and critical problems with the way we deal with the continuing digital criminal enterprise. Enjoy the epside! Guests
Direct download: Down_the_Rabbithole_-_Holiday_Episode_Part_3_-_Will_Gragido_Scott_Clark.mp3
Category:Information Security -- posted at: 10:55am CST |
Wed, 28 December 2011
Synopsis This is the second part of a 3-part (3 x 30 minute segments) holiday episode that was aired LIVE, where Will, Scott and I talk about what significant things happened in 2011, and what we should be looking forward to in 2012. No predictions, no propaganda, just hard-hitting, amusing, and often nostalgic discussion about the realities of living in an ever-more connected world as we go into 2012. I hope you enjoy the podcast series if you missed it live. In the future, look for announcements of live episodes on my (@Wh1t3rabbit) podcast feed and join in the discussion! I'm a particular fan of this segment because we tackle education... and the ever-popular how do we train or educate people to be good Info Security people ...and also get into "hacker worship" and other thorny topics. Listen in, this one is especially fun. Guests
Direct download: Down_the_Rabbithole_-_Holiday_Episode_Part_2_-_Will_Gragido_Scott_Clark.mp3
Category:Information Security -- posted at: 11:18am CST |
Mon, 26 December 2011
Synopsis This is the first part of a 3-part (3 x 30 minute segments) holiday episode that was aired LIVE, where Will, Scott and I talk about what significant things happened in 2011, and what we should be looking forward to in 2012. No predictions, no propaganda, just hard-hitting, amusing, and often nostalgic discussion about the realities of living in an ever-more connected world as we go into 2012. I hope you enjoy the podcast series if you missed it live. In the future, look for announcements of live episodes on my (@Wh1t3rabbit) podcast feed and join in the discussion! Guests
Direct download: Down_the_Rabbithole_-_Holiday_Episode_Part_1_-_Will_Gragido_Scott_Clark.mp3
Category:Information Security -- posted at: 11:08am CST |
Mon, 19 December 2011
Synopsis On this edition of the podcast, Kris Herrin joins me from the ISSA International Conference to talk about his unenviable role as Chief Information Security Officer of Heartland Payment Systems during one of the most epic data breaches in history. For those of you who didn't live in a cave - Kris and his organization turned the ship around ...not only that - this incident was used to help the organization find religion in Information Security and sound risk management practices. Now as Heartland leads the payment industry in security - Kris talks about his ascention through the tanks to CTO, and how getting in front of the bull made all the difference. You do not want to miss this episode! Guest
Direct download: Down_the_Rabbithole_-_Episode_08_-_Kris_Herrin_Discusses_the_Realities_of_IT_and_Catastrophic_Breaches_edited.mp3
Category:Information Security -- posted at: 8:00pm CST |
Tue, 6 December 2011
Synopsis My guest David Elfering (@icxc on Twitter) and I go all over the map covering various SecBiz related topic, and come up with a fantastic set of quotes including: "No matter how long you hold the light bulb up, the world will not revolve around InfoSec" and other gems. We talk through how to present to a business group or executive, the communication and written skills required and various other topics related with bridging the business - security gap. This is a great episode to listen to - we cover a lot of ground. Guest
Direct download: Down_the_Rabbithole_-_Episode_07_-_Dave_Elfering_-_As_the_Security_Lightbulb_Turns.mp3
Category:Information Security -- posted at: 11:02am CST |
Mon, 21 November 2011
Synopsis In this edition of the podcast, I sit down with Jeff Moss (@TheDarkTangent) to talk about all of the interesting evolutions currently going on in the Internet age. As one of the people who has watched the cyber punk culture evolve from the dark culture of hacking for curiosity, through the "dot com boom" and now into mainstream business, and he has some interesting commentary on how we've evolved as a culture and a group. We also talk through some interesting hacker vs. government regulation topics, and IPv6 of course! Listen in, and hear all the really exciting things Jeff has to say.
Guest
Direct download: Down_the_Rabbithole_-_Episode_06_-_Jeff_Moss_Talks_Internet_Evolution.mp3
Category:Information Security -- posted at: 5:32pm CST |
Mon, 14 November 2011
Synopsis This is perhaps the most important podcast I've recorded to date, and probably will record for some time. The guests on my show in this episodes are not only privacy experts, but people who deal with digital privacy every day ...and are just as appalled as I am about the rapid erosion of privacy in the modern digital age. From 4Square to the automated toll collection system - you're being tracked when you tweet, drive, and buy discount paper towels at your local market ...and technology is facilitating the privacy you're willfully giving up. STOP the madness! This episode just scratches the surface on all the different methods we're giving away our reasonable expectation of privacy, and how corporations and governments are hastening its demise. Guests My guests on this podcast wished to remain anonymous (lower-case A) except for their Twitter handles. Join me in thanking them for their time, thought, and insight. Links
Direct download: LIVE_from_Security_BSides_Delware_-_Discussing_the_Erosion_of_Privacy.mp3
Category:Information Security -- posted at: 10:11am CST |
Mon, 7 November 2011
Synopsis This week I host Bryan Stiekes, a distinguished technologist with HP ...and not a security guy by trade. Bryan has been a part of IT for a very long and distinguished career, with a background in networking and architecture. Bryan's premise is that Information Security is at its core fundamentelly broken ...and I can't say I disagree. We discuss the different aspects of what's been wrong with modern information security, and whether this is a good time to be in the 'business' of IT. This is a fascinating conversation for anyone who's feeling lost in IT Security ...and looking for some light at the end of the dark tunnel we've managed to wander into.
Guest
Direct download: Down_the_Rabbithole_-_Epidode_05_-_Bryan_Stiekes_Says_IT_Security_is_Broken.mp3
Category:Information Security -- posted at: 1:00am CST |
Mon, 31 October 2011
Synopsis This is the first MicroCast, a new 15-minute format jammed packed with a series of great topics. This time around, Jack Nichelson joins me and tells us how Bruce Lee feels about IT Security (this is a great quote!), why really good IT Security is just really good IT, and whether we will all be replaced by "Cyber-Insurance" policies. Yikes ... this is definitely 15 minutes you'll be happy you listened. Guest:
Direct download: Down_the_Rabbithole_-_MicroCast_01_-_Jack_Nichelson_-_Security_is_Just_Good_IT.mp3
Category:Information Security -- posted at: 4:35pm CST |
Mon, 24 October 2011
Synopsis This is a special episode for anyone who's feeling like "Information Security" in their small business is impossible. My guests and I talk through how to make information security a proper entity that can both serve the business need, and be respected; more than just survival, it's about making security thrive in the small business. Michael potificates on what makes the security community such a valuable resource to security managers in his position, and we go into what advice you could give a vendor selling into a small business ... what a fascinating discussion! Guests
Links
Direct download: Down_the_Rabbithole_-_Episode_04_-_Effective_Small_Business_Security.mp3
Category:Information Security -- posted at: 1:51pm CST |
Mon, 10 October 2011
Synopsis Over the past year and a half of so, I've been pushing hard to change the paradigm around secure software - specifically the testing aspect of it to incorporate a much heavier emphasis on quality assurance. That conversation spilled over into an OWASP conversation, which lead Glenn, Rohit and I to sit down and record this conversation we had - as we appear to be of like mind. While it's not trivial to incorporate security testing into quality assurance, it's not impossible, and in fact, more practical than you may think. In this segment we discuss what security testing in a QA team looks like, how it's potentially split up, and whether we can really and truly make it work. Glenn provides his practical perspective being an implementer of this methodology, while Rohit and I provide an across-the-industry discussion and commentary. I think you'll find this podcast episode fascinating, especially if you're struggling with the QA/Security relationship. Guests
Links
Direct download: Down_the_Rabbithole_-_Episode_3_-_QA_and_Security_Can_we_make_it_work.mp3
Category:Information Security -- posted at: 4:34pm CST |
Thu, 29 September 2011
Synopsis This edition of the podcast doesn't hold back. We ask "Can someone be hacked out of business?" and as usual we don't really like the answers we come up with. While Martin, Rob and I have been in most every aspect of security for just over a combined 3 decades, we end up with a conslusion that I don't think any of us are comfortable with ...at least not that we were willing to say out loud, until now. So is it possible? Is DigiNotar being "hacked out of business" as Dark Reading suggests all FUD? Listen and find out where we go with this topic! Guests
Links
Direct download: Down_the_Rabbithole_-_Episode_2.mp3
Category:Information Security -- posted at: 1:42am CST |
Fri, 16 September 2011
This is the inaugural podcast episode of Down the Rabbithole. Our podcast focuses on security, but from a business perspective and shines a light on the often misunderstood connection between Information Security and "business". Today's guests were:
The topic for today's podcast was the question: "Everyone's getting hacked, should I panic?" ...and we also mention the HP TippingPoint DVLabs 1st Half 2011 Cyber Threat Report. Links:
Direct download: Down_the_Rabbithole_-_Episode_1.mp3
Category:Information Security -- posted at: 5:35pm CST |
Tue, 13 September 2011
Phil Cox joins Rafal (aka Wh1t3 Rabbit) and Martin McKeay and a gallery of others dicussing the issues with the very nebulous term "Cloud Security", and what it means, and how we as vendors can realistically help the consumers of cloud get a handle on what the heck this all means. Fascinating conversation ensues.
Direct download: SecBiz_Podcast_-_What_is_Cloud_Security_with_Phil_Cox.mp3
Category:Information Security -- posted at: 5:38pm CST |
