Radio Free Security: July 2012 Episode

Aug

2

August 2 , 2012 | Posted by Nachreiner | 1 Comment

Radio Free Security: July 2012 Episode

Blackhat & DEF CON 2012: The Highlights

Blackhat and DEF CON are two of the longest running security and hacking conferences in the industry, and arguably the first such conferences to exist. They’re also the subject of this month’s Radio Free Security. If you missed these popular security conferences this year, check out this month’s episode to learn about the latest research, attack vectors, and threats presented at these shows.

If you are new to our podcast, Radio Free Security (RFS) is a monthly audio program dedicated to spreading knowledge about network and information security, and to keeping busy IT administrators apprised of the latest security threats they face online.

July’s episode includes:

  • The Security Spotlight [4:05 - 45:59] – Blackhat and DEF CON 2012 highlights. This month, Ben Brobak takes a turn in the host chair to interview Corey Nachreiner about his trip to this year’s Blackhat and DEF CON security conferences. They cover the themes of the shows, Nachreiner’s favorite presentations, and the implications of some new attack vectors on the industry. They also share a few practical security tips along the way. If you couldn’t attend these exciting security conferences yourself, this segment gives you the skinny.
  • Security Story of the Month (SSotM) [46:33 - 1:28:02] – This month’s SSotM continues the Blackhat and DEF CON theme. Many researchers save their most important discoveries for these two conferences, so most of the big security stories this month revolve around things disclosed in Vegas. Join a round table of WatchGuard security professionals as they discuss the big stories from July, and figure out which one qualifies as the story of the month. If you use wireless networks in an enterprise setting, you won’t want to miss this segment.

You can always find the latest episode of Radio Free Security at:

Or just listen to July’s episode using the player below [runtime: 1:30:09].

— Corey Nachreiner, CISSP (@SecAdept)

Comments (1)

Add Comment

Your email address will not be published. Required fields are marked *