Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Introduction
00:00 • 5min
Is There a Firerol Rule for Detection?
05:02 • 2min
Mac OS X Security
06:41 • 3min
What's the Difference Between a Notarization and a Signing Certificate?
10:05 • 4min
How Did Apple Respond to a Security Incident?
14:08 • 4min
What's the One Thing That Always Trips Your Ayes Up?
18:21 • 5min
What's the Thing That Makes Your Job Harder?
23:05 • 2min
Breech of the Week - Raise Your Hand
25:16 • 2min
What's the Future of Health Care Security?
26:51 • 2min
The Scary Thought That I Have
28:56 • 2min
Incentives in the Security Industry
30:48 • 2min
Are There Any Standards for Your Enterprise Start Up?
33:13 • 3min
Is There a Data Base From a Breach?
35:50 • 3min
Sass Application Security
38:48 • 3min
What's Happening in the Security Space?
41:19 • 2min
Security Reviews - Are They Really Required?
43:23 • 4min
Is There a Standardized Third Party Risk Assessment Process?
47:02 • 2min
Breach Placebunny - Movie Recommendation
49:04 • 1min