Defensive Security Podcast Episode 53

More advice from Bob; Follow up on Coke’s lost laptops; Honey Encryption to frustrate attackers; What the Target breach shows us about vendor risk; Managing the response to a data breach; More POS malware, this time with TOR goodness. Subscribe in iTunes | Podcast RSS Feed | Twitter | Email

Popout Listen on the new Podbay