
Tools – information security is fecund* with them, but it never seems like we have what we need. So what’s a poor security analyst supposed to do? In a recent two-part article, I discussed the built-in security functionalities of many…
Wow, an actual second podcast! In this episode we discuss the beginning of the Mac malware cat and mouse game, how attacking critical infrastructure can be considered an act of war, the recent spat of defense contractors getting attacked, a…
I just want to shoot out a quick post letting you all know that over the past two weeks I’ve been experimenting with some podcast editing here and there. Well I think all the hard work paid off as I…
Welcome to our first ever podcast that a some of us having been thinking of doing the past few months. After a few practice tries we finally got one out! Anyway, in this episode we discuss some general infosec news,…