Feb 4, 2014

More advice from Bob; Follow up on Coke’s lost laptops; Honey Encryption to frustrate attackers; What the Target breach shows us about vendor risk; Managing the response to a data breach; More POS malware, this time with TOR goodness. Subscribe in iTunes | Podcast RSS Feed | Twitter | Email http://blogs.csoonline.com/security-leadership/2957/interesting-finding-coke-data-breach-and-why-you-need-prevent-it-happening-you http://www.technologyreview.com/news/523746/honey-encryption-will-bambo...more

Pastime is not the owner of the podcast content presented on this page. Pastime is not affiliated with nor endorses this content. © 2017 Pastime