Menu

Podcasts

  • Spectre and Meltdown

    January 10, 2018

    It’s never good news when potential security exploits are detected. But when they affect all personal computers, mobile devices and cloud infrastructure dating back to 1995, it creates a problem of a whole new magnitude. In this episode, we’ll be talking with Paul Kocher, the researcher credited with co-discovering Spectre and a co-author of the Meltdown research paper. Some of the topics that we…

  • Hackers and Threats

    The holiday season is upon us. And our gift to you? An insider look at the potential threats and countering strategies that could have the greatest impact, for better or worse, in 2018. In this…

  • Security Operations and Strategy

    People, process, and technology. It’s an interlocked trio that’s vital to most organizations today. And when there’s a shift in security operations or strategy, all three will feel the jolt. In this…

  • Cybersafety

    Big numbers have a way of getting our attention. And in the case of recent data breaches, they’re eye-poppingly notable. According to Gemalto, 1.9 billion data records were exposed in the first half…

  • Technology and Security

    What’s the good, the bad and the future of the increasingly close relationship between technology and security? Find out as Ben Jun, CEO, HVF Labs, and Ed Amoroso, CEO, TAG Cyber, share the latest…

  • Equifax Breach

    What exactly happened? And how can you best protect yourself? Get answers to these questions and more as Lance Spitzner, Director at SANS Securing the Human, weighs in on the data breach affecting…

  • Professional Development

    You know “Must See TV”? Well, this is a must-hear podcast. This episode is focused on professional development, and we’ll be talking with two guest speakers who have very different backgrounds but…

  • Policy and Government

    Our first episode focuses on policy and government regulations in information security, including: How the Cybersecurity Framework (CSF) is holding up against the recent wave of attacks Strategies…

This document was retrieved from http://www.rsaconference.com/podcasts on Mon, 22 Jan 2018 13:27:23 -0500.