In this episode of The Cicada Security Podcast, Ryk Edelstein talks about using your own devices in a corporate environment and the security issues it raises.
Author Archives: Ryk
The Cicada Security Podcast, episode 5
In this episode of The Cicada Security Podcast, Ryk Edelstein talks about The Cicada 2.
The Cicada Security Podcast, episode 4
In this episode of The Cicada Security Podcast, Ryke Edelstein talks about bad password choices, passwords 101 for businesses, points out that it is always good business practice to wipe passwords off your whiteboard before being interviewed on TV, and how the sinking of The T.J. Hooper in 1932 relates to physical IT security.
The Cicada Security Podcast, episode 3
In this episode of The Cicada Security Podcast Ryk Edelstein, discusses How Apple and Amazon Security Flaws Led to Mat Honan’s Epic Hacking and how it relates to password security. Then talks about Cicada’s first security alert.
The Cicada Security Podcast, episode 2
The most recent Cicada Security Podcast. In it Ryk Edelstein talks about Reasons to Keep External Employees Internally Controlled, The Endpoint Security Management Buyers Guide, and Best Practices for the Destruction of Digital Data.
The Cicada Security Podcast
Today Ryk Edelstein and Chris ‘Zeke’ Hand discuss Ryk’s recent trip to Black Hat and how the presentations by Paul Mesterhazy, Acting Deputy Director, National Cyber Security Division at the US Department of Homeland Security and Jonathan Brossard of Toucan System were applicable to The Cicada.
Worst Security Breaches of 2012, so far…
CSO Magazine has a nifty little slide show of the worst data security breaches in the first half of the year. Of particular note are numbers 4, 12 and 16, all which could have prevented with the use of Cicada Security Technology
Interesting view on two-factor authentication
Over at the WiKIDBlog, Nick and Eric ponder how secure various two-factor authentication processes really are, and how best to guarantee that they stay 100% secure
Protecting large physical assets
Over in England, the Telegraph reports on a ring of car thieves who would hack into the onboard computers of luxury cars and bug them with GPS tracking devices in order to find the best time/place combination to steal them.
Encryption – guess again
So, Android has full-disk encryption, but anyone who breaks into your Google account can remotely install apps with no confirmation. Sigh.
— Josh Triplett (@josh_triplett) July 7, 2012
And how difficult is it to break into your Google account if you leave your laptop open and lying about?