Hello, its been a while since I posted to the blog. At Enclave, we have been trying some other social media outlets, and unfortunately, the blog has suffered a little. We apologize to our fans, and now we are back on track with a post on Information Security podcasts.
We all have time constraints and an ever present need to keep current on technology. Podcasts are a great tool along with an MP3 player to listen to new content, ‘read’ a book, or even learn a new language. We listen to podcasts in the car, while gardening, cleaning the house, and in airports. Here is a list of our Top Ten Information Security Podcasts.
2600 Off the Hook
2600 Hacker Magazine
Social Media Security
Exposing the insecurities of social media
Two former federal agents discussing computer forensics, cybercrime, and computer security.
PaulDotCom Security weekly’s mission is to provide free content within the subject matter of IT security news, vulnerabilities, hacking, and research. We strive to use new technologies to reach a wider audience across the globe to teach people how to grow, learn, and be security ninjas. The mixture of technical content and entertainment will continue to set a new standard for podcasting and Internet TV. (Can be explicit)
The Center for Education and Research in Information Assurance and Security (CERIAS) is currently viewed as one of the world’s leading centers for research and education in areas of information security that are crucial to the protection of critical computing and communication infrastructure. This a video podcast, but it is an interesting audio presentation as well.
Welcome to the Security Justice podcast website! This is where the Security Justice crew posts all new episodes and keeps you up-to-date on all the latest news with the podcast. Security Justice is a group of security professionals from Cleveland, Ohio. (Can Be Explicit).
The Data Security Podcast is a weekly 30 minute audio program on data security, privacy and the law.
TechTV’s Leo Laporte and Steve Gibson issues of personal computer security, long-standing problems, concerns, or solutions.
SANS Internet Storm Center
The ISC relies on an all-volunteer effort to detect problems, analyze the threat, and disseminate both technical as well as procedural information to the general public. Thousands of sensors that work with most firewalls, intrusion detection systems, home broadband devices, and nearly all operating systems are constantly collecting information about unwanted traffic arriving from the Internet. These devices feed the DShield database where human volunteers as well as machines pour through the data looking for abnormal trends and behavior. The resulting analysis is posted to the ISC’s main web page where it can be automatically retrieved by simple scripts or can be viewed in near real time by any Internet user.
Future Tense brings you the latest technology topics in daily five-minute capsules. From electronic privacy and digital democracy to spam and computer worms, Future Tense keeps you up to date on the rapidly changing world of technology.