Preview Mode Links will not work in preview mode

Security In Five Podcast

Oct 17, 2017

The first in a series of ten episodes going over each of the OWASP Top 10 items. A1 deals with Injection. This episode goes over the very high level description on what it is, how it's exploited and the damage that can be done.

Reference Links:

A1 Injection Page

SQL Injection Prevention Cheat Sheet

Query...


Oct 16, 2017

Phishing is the technique to trick a victim to enter their account credentials into an app or website they think is legit. In reality it's a fake site and they send their account information to a criminal element. Apple iOS is not immune to these types of real looking tricks. This episode goes into tips on how you can...


Oct 13, 2017

This episode I review the book Secure Enough? 20 Cybersecurity Questions For Business Owners and Executives by Bryce Austin.

Amazon Link.

Goodreads Link.

TCE Strategy, Bryce's Website.

------------------------------------

Website - https://www.binaryblogger.com

Podcast RSS - http://securityinfive.libsyn.com/rss

Twitter...


Oct 12, 2017

I received one of those tech support scam phone calls today. I am usually more prepared for them but it took me a few minutes to get prepared to record it. This episode shows you what these tech scam calls sound like, what they say and have you do and ultimately how to avoid them. 

This was unscripted and recorded on...


Oct 12, 2017

Security and Risk Assessments are a critical components of a security program. You will see that regular assessments will be asked for more often by regulations, partners and departments. They are the reasons for any security initiatives and are also the proof of your effectiveness of decreasing risk for the company....