Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware ... more
FAQs about Threat Monitor:How many episodes does Threat Monitor have?The podcast currently has 23 episodes available.
February 15, 2007Pod slurping: The latest data threatAllow iPods in the office? Perhaps it's time to reevaluate thatdevice policy, as iPods pose more danger to the corporate networkthan it might seem. In this tip, contributor Peter Giannoulisintroduces pod slurping, the latest hacking technique, and explainshow revising corporate policies can prevent potential data leaks....more0minPlay
February 01, 2007Is the CAN-SPAM Act a help or a hindrance?Three years have passed since CAN-SPAM was enacted, but has this legislation truly contained unsolicited commercial email? In this tip, contributor Joel Dubin examines if the law has effectively cracked down on spamming activities and examines how to put a stop to this email misuse....more0minPlay
January 17, 2007Ten emerging malware trends for 2007From phishing threats to zero-day flaws, hackers have certainly developed many sophisticated ways to exploit vulnerabilities for their gain. And, as SearchSecurity.com's information security expert Ed Skoudis explains, new methods are constantly being discovered. In this podcast, Skoudis outlines 10 emerging malware trends and provides tools and tactics to defend against them....more0minPlay
January 13, 2007Eight top information security events of 2006From WMF exploits to the Veterans Affairs data breach, information security threats were plentiful in 2006. In this tip, contributor Joel Dubin reviews what grabbed the attention of hackers in the information security world in 2006 and explains how they set the tone for 2007....more0minPlay
December 21, 2006Using steganography for securing data, not concealing itSteganography is a useful technique for securely storing sensitivedata, but the difficulty in detecting its usage can create anopportunity for digital miscreants. Michael Cobb explains how toensure the practice isn't used maliciously....more0minPlay
November 16, 2006How simple steps ensure database securityAn enterprise database stores an organization’s most valuable assets, and just one small mistake can lead to a data security disaster. In this tip, Michael Cobb looks at five common database vulnerabilities and the simple steps that can eradicate them....more0minPlay
October 18, 2006Defensive measures for evolving phishing tacticsFrom image spam to cross-site scripting, hackers certainly have a large arsenal of weapons to choose from. But as AT&T recently learned, hackers are putting a new twist on ever-dependable phishing schemes to gain access to confidential and sensitive information. In this tip, Ed Skoudis examines how phishing tactics have evolved and what enterprises can do to defend themselves....more0minPlay
October 04, 2006Malware: The changing landscapeMalware is arguably growing faster than ever before, but not in ways the industry has come to expect. Even though the days of the superworm might be numbered, contributor Mike Chapple says it's time for organizations to adapt their defense postures because the next generation of threats won't be as easy to detect....more0minPlay
September 20, 2006Does blogging pose enterprise information security risks?While blogging can be a useful marketing and communications tool, if not controlled it can pose significant risks to corporate information security. In this tip, SearchSecurity.com expert Mike Chapple examines these risks and how they can be reduced by creating and implementing blogging policies....more0minPlay
September 07, 2006Laptop crypto: Do it, but realize it's not a panaceaWith headlines declaring data thefts becoming more prevalent and increasingly scarier, the need for enterprises to enforce laptop security is as crucial as ever. In this tip, Ed Skoudis reviews the pros and cons of laptop encryption and explains how, while it is the not the final solution, it can keep your data secure -- even if it falls in the hands of the enemy....more0minPlay
FAQs about Threat Monitor:How many episodes does Threat Monitor have?The podcast currently has 23 episodes available.