Preview Mode Links will not work in preview mode

Security In Five Podcast

Jun 29, 2018

This week's Tools, Tips and Tricks talks about Microsoft Threat Modeling Tool. This tool is a vital component of security architecture and design. The Microsoft tool is free and very useful to identify security risks within an application or environment prior to development. 

Download the Microsoft Threat Modeling...


Jun 28, 2018

Tesla announced that it was the victim of sabotage and data breach. The culprit of this activity was an employee that became disgruntled. This episode talks about real risks of insider threats and Tesla's security gaps that allowed one person to do so much damage. 

 

Be aware, be...


Jun 27, 2018

Continuing with the mini-series OWASP Top 10 Proactive Controls For Developers we are at number 3. Secure Database Access is the next control developers need to be aware of. This episode goes into the components of secure data access and what considerations should be taken in a project.

 

Be aware, be...


Jun 26, 2018

Voice-enabled devices is slowly becoming the new Internet of Things. Now you are able to basic banking actions using home assistance devices. This episode talks about this movement and what needs to happen with the voice security in order to make me consider using it. 

 

Be aware, be...


Jun 25, 2018

This episode topic came in from a listener's question. How can an IoT device get hacked behind my router? This episode and the complimenting blog post on my blog https://www.binaryblogger.com goes into how this is done. 

 

Be aware, be safe.

------------------------------------

Website -