ID | Interpret | Skladba | Album | |
121. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
122. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 3: Keeping Pace as the Security Field Evolves | CERT’s Podcasts for Business Leaders | |
123. | Steve Gibson with Leo Laporte | Security Now 65: Why Is Security So Difficult? - Sponsored by Astaro Corp. | Security Now November 2006 | |
124. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
125. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
126. | Steve Gibson with Leo Laporte | Security Now 38: Browser Security - sponsored by Astaro Corp. | Security Now May 2006 | |
127. | Steve Gibson with Leo Laporte | Security Now 52: Security Bulletins - Sponsored by Astaro Corp. | Security Now August 2006 | |
128. | Steve Gibson with Leo Laporte | Security Now 66: Vista Security - Sponsored by Astaro Corp. | Security Now November 2006 | |
129. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
130. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | CERT’s Podcasts for Business Leaders | |
131. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
132. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
133. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
134. | Steve Gibson with Leo Laporte | Security Now 179: Cracking Security Certificates | Security Now January 2009 | |
135. | Senators Patty Murray and Susan Collins | Remarks by Senators Patty Murray and Susan Collins Introducing the GreenLane Maritime Cargo Security Act at a Press Conference | | |
136. | Senators Patty Murray and Susan Collins | Remarks by Senators Patty Murray and Susan Collins Introducing the GreenLane Maritime Cargo Security Act at a Press Conference | | |
137. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
138. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
139. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
140. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
141. | Dan York & Jonathan Zar | Blue Box Podcast SE009: VoIP Security Presentation by Dan York at the IP Telephony Solutions for Government Conference April 18, 2006, in Arlington, VA | Blue Box: The VoIP Security Podcast | |
142. | Ricky Spero & Jeff Gamet | AWR 2007-07-21: Apple On the Rise, and Mac and iPhone Security | The Apple Weekly Report | |
143. | CNET.com | CNET Security Bites Podcast, May 25, 2007 | http://podcast.cnet.com | |
144. | Dan York & Jonathan Zar | Blue Box SE#026: Astricon 2007 presentation on Asterisk and VoIP security | Blue Box: The VoIP Security Podcast | |
145. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
146. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
147. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
148. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
149. | Chicago Public Radio | 2008 Making Media Connections Conference - Community Media Update | | |
150. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 1: Why Should Leaders Care About Security? | CERT Podcasts for Business Leaders | |