Wed, 28 December 2011
Synopsis This is the second part of a 3-part (3 x 30 minute segments) holiday episode that was aired LIVE, where Will, Scott and I talk about what significant things happened in 2011, and what we should be looking forward to in 2012. No predictions, no propaganda, just hard-hitting, amusing, and often nostalgic discussion about the realities of living in an ever-more connected world as we go into 2012. I hope you enjoy the podcast series if you missed it live. In the future, look for announcements of live episodes on my (@Wh1t3rabbit) podcast feed and join in the discussion! I'm a particular fan of this segment because we tackle education... and the ever-popular how do we train or educate people to be good Info Security people ...and also get into "hacker worship" and other thorny topics. Listen in, this one is especially fun. Guests
Direct download: Down_the_Rabbithole_-_Holiday_Episode_Part_2_-_Will_Gragido_Scott_Clark.mp3
Category:Information Security -- posted at: 11:18am CST |
Mon, 26 December 2011
Synopsis This is the first part of a 3-part (3 x 30 minute segments) holiday episode that was aired LIVE, where Will, Scott and I talk about what significant things happened in 2011, and what we should be looking forward to in 2012. No predictions, no propaganda, just hard-hitting, amusing, and often nostalgic discussion about the realities of living in an ever-more connected world as we go into 2012. I hope you enjoy the podcast series if you missed it live. In the future, look for announcements of live episodes on my (@Wh1t3rabbit) podcast feed and join in the discussion! Guests
Direct download: Down_the_Rabbithole_-_Holiday_Episode_Part_1_-_Will_Gragido_Scott_Clark.mp3
Category:Information Security -- posted at: 11:08am CST |
Mon, 19 December 2011
Synopsis On this edition of the podcast, Kris Herrin joins me from the ISSA International Conference to talk about his unenviable role as Chief Information Security Officer of Heartland Payment Systems during one of the most epic data breaches in history. For those of you who didn't live in a cave - Kris and his organization turned the ship around ...not only that - this incident was used to help the organization find religion in Information Security and sound risk management practices. Now as Heartland leads the payment industry in security - Kris talks about his ascention through the tanks to CTO, and how getting in front of the bull made all the difference. You do not want to miss this episode! Guest
Direct download: Down_the_Rabbithole_-_Episode_08_-_Kris_Herrin_Discusses_the_Realities_of_IT_and_Catastrophic_Breaches_edited.mp3
Category:Information Security -- posted at: 8:00pm CST |
Tue, 6 December 2011
Synopsis My guest David Elfering (@icxc on Twitter) and I go all over the map covering various SecBiz related topic, and come up with a fantastic set of quotes including: "No matter how long you hold the light bulb up, the world will not revolve around InfoSec" and other gems. We talk through how to present to a business group or executive, the communication and written skills required and various other topics related with bridging the business - security gap. This is a great episode to listen to - we cover a lot of ground. Guest
Direct download: Down_the_Rabbithole_-_Episode_07_-_Dave_Elfering_-_As_the_Security_Lightbulb_Turns.mp3
Category:Information Security -- posted at: 11:02am CST |
Mon, 21 November 2011
Synopsis In this edition of the podcast, I sit down with Jeff Moss (@TheDarkTangent) to talk about all of the interesting evolutions currently going on in the Internet age. As one of the people who has watched the cyber punk culture evolve from the dark culture of hacking for curiosity, through the "dot com boom" and now into mainstream business, and he has some interesting commentary on how we've evolved as a culture and a group. We also talk through some interesting hacker vs. government regulation topics, and IPv6 of course! Listen in, and hear all the really exciting things Jeff has to say.
Guest
Direct download: Down_the_Rabbithole_-_Episode_06_-_Jeff_Moss_Talks_Internet_Evolution.mp3
Category:Information Security -- posted at: 5:32pm CST |
Mon, 14 November 2011
Synopsis This is perhaps the most important podcast I've recorded to date, and probably will record for some time. The guests on my show in this episodes are not only privacy experts, but people who deal with digital privacy every day ...and are just as appalled as I am about the rapid erosion of privacy in the modern digital age. From 4Square to the automated toll collection system - you're being tracked when you tweet, drive, and buy discount paper towels at your local market ...and technology is facilitating the privacy you're willfully giving up. STOP the madness! This episode just scratches the surface on all the different methods we're giving away our reasonable expectation of privacy, and how corporations and governments are hastening its demise. Guests My guests on this podcast wished to remain anonymous (lower-case A) except for their Twitter handles. Join me in thanking them for their time, thought, and insight. Links
Direct download: LIVE_from_Security_BSides_Delware_-_Discussing_the_Erosion_of_Privacy.mp3
Category:Information Security -- posted at: 10:11am CST |
Mon, 7 November 2011
Synopsis This week I host Bryan Stiekes, a distinguished technologist with HP ...and not a security guy by trade. Bryan has been a part of IT for a very long and distinguished career, with a background in networking and architecture. Bryan's premise is that Information Security is at its core fundamentelly broken ...and I can't say I disagree. We discuss the different aspects of what's been wrong with modern information security, and whether this is a good time to be in the 'business' of IT. This is a fascinating conversation for anyone who's feeling lost in IT Security ...and looking for some light at the end of the dark tunnel we've managed to wander into.
Guest
Direct download: Down_the_Rabbithole_-_Epidode_05_-_Bryan_Stiekes_Says_IT_Security_is_Broken.mp3
Category:Information Security -- posted at: 1:00am CST |
Mon, 31 October 2011
Synopsis This is the first MicroCast, a new 15-minute format jammed packed with a series of great topics. This time around, Jack Nichelson joins me and tells us how Bruce Lee feels about IT Security (this is a great quote!), why really good IT Security is just really good IT, and whether we will all be replaced by "Cyber-Insurance" policies. Yikes ... this is definitely 15 minutes you'll be happy you listened. Guest:
Direct download: Down_the_Rabbithole_-_MicroCast_01_-_Jack_Nichelson_-_Security_is_Just_Good_IT.mp3
Category:Information Security -- posted at: 4:35pm CST |
Mon, 24 October 2011
Synopsis This is a special episode for anyone who's feeling like "Information Security" in their small business is impossible. My guests and I talk through how to make information security a proper entity that can both serve the business need, and be respected; more than just survival, it's about making security thrive in the small business. Michael potificates on what makes the security community such a valuable resource to security managers in his position, and we go into what advice you could give a vendor selling into a small business ... what a fascinating discussion! Guests
Links
Direct download: Down_the_Rabbithole_-_Episode_04_-_Effective_Small_Business_Security.mp3
Category:Information Security -- posted at: 1:51pm CST |
Mon, 10 October 2011
Synopsis Over the past year and a half of so, I've been pushing hard to change the paradigm around secure software - specifically the testing aspect of it to incorporate a much heavier emphasis on quality assurance. That conversation spilled over into an OWASP conversation, which lead Glenn, Rohit and I to sit down and record this conversation we had - as we appear to be of like mind. While it's not trivial to incorporate security testing into quality assurance, it's not impossible, and in fact, more practical than you may think. In this segment we discuss what security testing in a QA team looks like, how it's potentially split up, and whether we can really and truly make it work. Glenn provides his practical perspective being an implementer of this methodology, while Rohit and I provide an across-the-industry discussion and commentary. I think you'll find this podcast episode fascinating, especially if you're struggling with the QA/Security relationship. Guests
Links
Direct download: Down_the_Rabbithole_-_Episode_3_-_QA_and_Security_Can_we_make_it_work.mp3
Category:Information Security -- posted at: 4:34pm CST |
Thu, 29 September 2011
Synopsis This edition of the podcast doesn't hold back. We ask "Can someone be hacked out of business?" and as usual we don't really like the answers we come up with. While Martin, Rob and I have been in most every aspect of security for just over a combined 3 decades, we end up with a conslusion that I don't think any of us are comfortable with ...at least not that we were willing to say out loud, until now. So is it possible? Is DigiNotar being "hacked out of business" as Dark Reading suggests all FUD? Listen and find out where we go with this topic! Guests
Links
Direct download: Down_the_Rabbithole_-_Episode_2.mp3
Category:Information Security -- posted at: 1:42am CST |
Fri, 16 September 2011
This is the inaugural podcast episode of Down the Rabbithole. Our podcast focuses on security, but from a business perspective and shines a light on the often misunderstood connection between Information Security and "business". Today's guests were:
The topic for today's podcast was the question: "Everyone's getting hacked, should I panic?" ...and we also mention the HP TippingPoint DVLabs 1st Half 2011 Cyber Threat Report. Links:
Direct download: Down_the_Rabbithole_-_Episode_1.mp3
Category:Information Security -- posted at: 5:35pm CST |
Tue, 13 September 2011
Phil Cox joins Rafal (aka Wh1t3 Rabbit) and Martin McKeay and a gallery of others dicussing the issues with the very nebulous term "Cloud Security", and what it means, and how we as vendors can realistically help the consumers of cloud get a handle on what the heck this all means. Fascinating conversation ensues.
Direct download: SecBiz_Podcast_-_What_is_Cloud_Security_with_Phil_Cox.mp3
Category:Information Security -- posted at: 5:38pm CST |
