Oct 17, 2017
The first in a series of ten episodes going over each of the OWASP Top 10 items. A1 deals with Injection. This episode goes over the very high level description on what it is, how it's exploited and the damage that can be done.
Oct 16, 2017
Phishing is the technique to trick a victim to enter their account credentials into an app or website they think is legit. In reality it's a fake site and they send their account information to a criminal element. Apple iOS is not immune to these types of real looking tricks. This episode goes into tips on how you can...
Oct 13, 2017
This episode I review the book Secure Enough? 20 Cybersecurity Questions For Business Owners and Executives by Bryce Austin.
Website - https://www.binaryblogger.com
Podcast RSS - http://securityinfive.libsyn.com/rss
Oct 12, 2017
I received one of those tech support scam phone calls today. I am usually more prepared for them but it took me a few minutes to get prepared to record it. This episode shows you what these tech scam calls sound like, what they say and have you do and ultimately how to avoid them.
This was unscripted and recorded on...
Oct 12, 2017
Security and Risk Assessments are a critical components of a security program. You will see that regular assessments will be asked for more often by regulations, partners and departments. They are the reasons for any security initiatives and are also the proof of your effectiveness of decreasing risk for the company....