This week in Security: September 22, 2015 Content We discuss the 150 successful Department of Energy Cyber Attacks between 2010 and 2014, Excellus Blue Cross and Blue Shield data breach from December 2013 to August 2015, Android Lock Screen Buffer Overflow vulnerability discovered by the University of Texas, and rationalize a timeline for either changing Adobe Flash or discarding it based on the frequency and severity of it being exploited. We recap the blogs and I add a little information and perspective. This is a work in progress. The only way to improve at podcasting is to do it more. I will be applying my knowledge of security, coupled with my teaching experience to create valuable IT and Cyber Security podcasts as time progresses.
This week in Security September 22 2015
This week in Security September 22 2015
This week in Security September 22 2015
This week in Security: September 22, 2015 Content We discuss the 150 successful Department of Energy Cyber Attacks between 2010 and 2014, Excellus Blue Cross and Blue Shield data breach from December 2013 to August 2015, Android Lock Screen Buffer Overflow vulnerability discovered by the University of Texas, and rationalize a timeline for either changing Adobe Flash or discarding it based on the frequency and severity of it being exploited. We recap the blogs and I add a little information and perspective. This is a work in progress. The only way to improve at podcasting is to do it more. I will be applying my knowledge of security, coupled with my teaching experience to create valuable IT and Cyber Security podcasts as time progresses.