<?xml version="1.0" encoding="UTF-8" standalone="no"?><!-- must include xmlns:itunes tag --><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">


<channel>

 
<title>Adventures in Security</title>

<itunes:author>Tom Olzak</itunes:author>

<description> Commentary, reviews, and tips relevant to anyone responsible for information security.  Additional episodes are available at AdventuresinSecurity.com</description>

<link>http://adventuresinsecurity.com/</link>

<itunes:subtitle>Information Security Tips and Commentary</itunes:subtitle>

<itunes:summary>This is a weekly podcast.  Each week we present commentary, reviews, and tips relevant to anyone responsible for information security.  Additional episodes are available at AdventuresinSecurity.com.</itunes:summary>

<lastBuildDate>Sun, 04 Nov 2007 15:00:00 EST</lastBuildDate>

<language>en-us</language>

<copyright>℗ &amp; © 2006 Erudio Security, LLC </copyright>

<itunes:category text="Technology"/>


<itunes:explicit>No</itunes:explicit> 


<generator>Tom Olzak</generator>

<itunes:owner>

    <itunes:name>Tom Olzak</itunes:name>

    <itunes:email>podcasts@adventuresinsecurity.com</itunes:email>

</itunes:owner>

 

<!-- iTunes prefers square images 300x300 pixels or larger -->

<itunes:image href="http://adventuresinsecurity.com/Podcasts/AISSeries/ErudioLogo-Small.jpg"/>

<item>

<title>Episode 37 - Web Application Security, Part 8</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>The vulnerabilities and safeguards associated with Application Denial of Service and Insecure Configuration Management</description>  

    <itunes:subtitle>The vulnerabilities and safeguards associated with Application Denial of Service and Insecure Configuration Management</itunes:subtitle>

    <itunes:summary>The vulnerabilities and safeguards associated with Application Denial of Service and Insecure Configuration Management</itunes:summary>

    <enclosure length="17483695" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode37_Aug_19_2006.mp3"/>

    <pubDate>Sat, 19 Aug 2006 21:15:00 EST</pubDate>

    

    <itunes:duration>18:12</itunes:duration>

    <itunes:keywords>security,management,business,compliance,sox, hipaa,web security, web application security, OWASP, web application vulnerabilities, owasp top ten, denial of service, configuration management </itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 38 - Desperation doesn't justify bad security</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>The importance of change management, the potential security risks when desperation enters the project lifecycle, how virtual floors can provide secure flexible business-to-business connectivity, and finally, a look at some ways to handle sensitive information once printed copied or faxed.</description>  

    <itunes:subtitle>Change management, implementation desperation, Virtual floors, and printer data security</itunes:subtitle>

    <itunes:summary>The importance of change management, the potential security risks when desperation enters the project lifecycle, how virtual floors can provide secure flexible business-to-business connectivity, and finally, a look at some ways to handle sensitive information once printed, copied, or faxed.</itunes:summary>

    <enclosure length="14227937" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode38_Sep_09_2006.mp3"/>

    <pubDate>Sat, 09 Sep 2006 12:30:00 EST</pubDate>

    

    <itunes:duration>14:49</itunes:duration>

    <itunes:keywords>security,management,business,compliance,change management, printer, copier, fax, B2B connectivity, virtual floor</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 39 - The Home PC Threat</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>The importance of choosing the right source for audit artifacts, and the growing threat of employee home PCs to the business enterprise</description>  

    <itunes:subtitle>Providing audit artifacts and reducing home PC risk.</itunes:subtitle>

    <itunes:summary>The importance of choosing the right source for audit artifacts, and the growing threat of employee home PCs to the business enterprise.</itunes:summary>

    <enclosure length="13776123" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode39_Sep_24_2006.mp3"/>

    <pubDate>Sun, 24 Sep 2006 18:25:00 EST</pubDate>

    

    <itunes:duration>14:20</itunes:duration>

    <itunes:keywords>security,management,business,compliance,home pc, audit</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 40 - Keystroke Dynamics (KD)</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Examination of biometrics in general.  Introduction of Keystroke Dynamics as a low impact biometric alternative.</description>  

    <itunes:subtitle>Keystroke Dynamics as an alternative biometric solution</itunes:subtitle>

    <itunes:summary>Examination of biometrics in general.  Introduction of Keystroke Dynamics as a low impact biometric alternative.</itunes:summary>

    <enclosure length="17023666" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode40_Oct_2_2006.mp3"/>

    <pubDate>Mon, 02 Oct 2006 18:30:00 EST</pubDate>

    

    <itunes:duration>17:43</itunes:duration>

    <itunes:keywords>security,management,business,biometrics, keystroke dynamics</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 41 - Cyber-Espionage</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Customer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.</description>  

    <itunes:subtitle>Customer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.</itunes:subtitle>

    <itunes:summary>Customer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.</itunes:summary>

    <enclosure length="17550568" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode41_Oct_15_2006.mp3"/>

    <pubDate>Sun, 15 Oct 2006 08:30:00 EST</pubDate>

    

    <itunes:duration>18:16</itunes:duration>

    <itunes:keywords>security,management,business,assurance, espionage, cyber-espionage, cyber</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 42 - Stepping up to meet security challenges</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Commentary on iPods in business, security as a process, and how some programming teams are stepping up to meet security challenges.</description>  

    <itunes:subtitle>iPods in business, security as a process, meeting programming security challenges</itunes:subtitle>

    <itunes:summary>Commentary on iPods in business, security as a process, and how some programming teams are stepping up to meet security challenges.</itunes:summary>

    <enclosure length="8925980" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode42_Oct_28_2006.mp3"/>

    <pubDate>Sat, 28 Oct 2006 12:00:00 EST</pubDate>

    

    <itunes:duration>09:17</itunes:duration>

    <itunes:keywords>security,management,business,assurance, ipod, process, programming</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 43 - Risk Management</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Commentary on iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and Risk 	Management</description>  

    <itunes:subtitle>iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and Risk 	Management</itunes:subtitle>

    <itunes:summary>iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and risk 	management</itunes:summary>

    
    <enclosure length="16387114" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode43_Feb_18_2007.mp3"/>

    <pubDate>Sun, 18 Feb 2007 18:00:00 EST</pubDate>

    

    <itunes:duration>17:04</itunes:duration>

    <itunes:keywords>security,management,business,assurance, ipod, AJAX, risk, piracy</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 44 - Virtual Server Security</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server 	security </description>  

    <itunes:subtitle>Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual 	server security</itunes:subtitle>

    <itunes:summary>Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual 	server security</itunes:summary>

    <enclosure length="19327875" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode44_Feb_25_2007.mp3"/>

    <pubDate>Sun, 25 Feb 2007 17:00:00 EST</pubDate>

    

    <itunes:duration>20:07</itunes:duration>

    <itunes:keywords>security,management,business,assurance, hypervisor,vm,virtual,DST,outsourcing</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>


<item>

<title>Episode 45 - Keep your eye on the data</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection</description>  

    <itunes:subtitle>Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection</itunes:subtitle>

<itunes:summary>Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection</itunes:summary>

    <enclosure length="18022171" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_45_Mar_04_2007.mp3"/>

    <pubDate>Sun, 4 Mar 2007 08:55:00 EST</pubDate>

    

    <itunes:duration>18:46</itunes:duration>

    <itunes:keywords>security,management,business,assurance, fuzzing,privaCY, rootkit, kernel, malware, SPP, onecare</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 46 - Security Leadership</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management</description>  

    <itunes:subtitle>Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management</itunes:subtitle>

<itunes:summary>Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management</itunes:summary>

    <enclosure length="17820714" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_46_Mar_18_2007.mp3"/>

    <pubDate>Sun, 18 Mar 2007 15:10:00 EST</pubDate>

    

    <itunes:duration>18:33</itunes:duration>

    <itunes:keywords>security,management,business,assurance, encryption, leadership, risk, bot, fax, oracle</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>


<item>

<title>Episode 47 - Ad Hoc Wireless Networks</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.</description>  

    <itunes:subtitle>Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.</itunes:subtitle>

<itunes:summary>Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.</itunes:summary>

    <enclosure length="17444864" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_47_Mar_25_2007.mp3"/>

    <pubDate>Sun, 25 Mar 2007 11:30:00 EST</pubDate>

    

    <itunes:duration>18:10</itunes:duration>

    <itunes:keywords>security,management,business,assurance,malware,software,assurance,ad hoc, wireless</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 48 - The Problem with NetBIOS</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.</description>  

    <itunes:subtitle>Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.</itunes:subtitle>

<itunes:summary>Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.</itunes:summary>

    <enclosure length="15241070" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_48_Apr_01_2007.mp3"/>

    <pubDate>Sun, 01 Apr 2007 11:30:00 EST</pubDate>

    

    <itunes:duration>15:52</itunes:duration>

    <itunes:keywords>security,management,business,assurance,malware,cisco,NAC,RFID,trojans,NetBIOS,encryption,carderim</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 49 - Computer Forensics Part 1</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Cisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.</description>  

    <itunes:subtitle>Cisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.</itunes:subtitle>

<itunes:summary>Cisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.</itunes:summary>

    <enclosure length="10666089" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_49_Apr_29_2007.mp3"/>

    <pubDate>Sun, 29 Apr 2007 15:20:00 EST</pubDate>

    

    <itunes:duration>26:17</itunes:duration>

    <itunes:keywords>security,management,business,cisco,NAC,forensics</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 50 - Computer Forensics Part 2</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>MOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.</description>  

    <itunes:subtitle>MOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.</itunes:subtitle>

<itunes:summary>MOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.</itunes:summary>

    <enclosure length="14054902" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_50_May_13_2007.mp3"/>

    <pubDate>Sun, 13 May 2007 20:30:00 EST</pubDate>

    

    <itunes:duration>14:38</itunes:duration>

    <itunes:keywords>security,management,business,forensics,swap,hibernation,moice,ipv6</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 51 - Computer Forensics Part 3</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.</description>  

    <itunes:subtitle>Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.</itunes:subtitle>

<itunes:summary>Another government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.</itunes:summary>

    <enclosure length="15412851" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_51_May_27_2007.mp3"/>

    <pubDate>Sun, 27 May 2007 18:30:00 EST</pubDate>
  

    <itunes:duration>16:03</itunes:duration>

    <itunes:keywords>security,management,business,forensics,swap,hibernation,phishing,interpol,bios</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 52 - Phishing Undercover</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.</description>  

    <itunes:subtitle>Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.</itunes:subtitle>

<itunes:summary>Inexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.</itunes:summary>

    <enclosure length="18570115" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_52_Sep_30_2007.mp3"/>

    <pubDate>Sat, 29 Sep 2007 15:25:00 EST</pubDate>
  

    <itunes:duration>19:20</itunes:duration>

    <itunes:keywords>security,management,business,phishing,interpol,usb,memory,risk,tokens,ids,ips</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 53 - Desktop Application Virtualization</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Information Security is about protecting the data,desktop application virtualization and application streaming</description>  

    <itunes:subtitle>Information Security is about protecting the data,desktop application virtualization and application streaming</itunes:subtitle>

<itunes:summary>Information Security is about protecting the data,desktop application virtualization and application streaming</itunes:summary>

    <enclosure length="12623613" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_53_Oct_07_2007.mp3"/>

    <pubDate>Sun, 07 Oct 2007 20:10:00 EST</pubDate>
  

    <itunes:duration>19:20</itunes:duration>

    <itunes:keywords>security,management,business,phishing,interpol,usb,memory,risk,tokens,ids,ips</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 54 - IT Security Essential Body of Knowledge</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Security enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.</description>  

    <itunes:subtitle>Security enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.</itunes:subtitle>

<itunes:summary>Security enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.</itunes:summary>

    <enclosure length="5607189" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_54_Oct_14_2007.mp3"/>

    <pubDate>Sun, 14 Oct 2007 19:45:00 EST</pubDate>
  

    <itunes:duration>18:41</itunes:duration>

    <itunes:keywords>security,management,business,encryption,quantum,ebk,xp</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 55 - Recipe for Mobile Data Security</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.</description>  

    <itunes:subtitle>SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.</itunes:subtitle>

<itunes:summary>SOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.</itunes:summary>

    <enclosure length="7153389" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_55_Oct_28_2007.mp3"/>

    <pubDate>Sun, 28 Oct 2007 17:00:00 EST</pubDate>
  

    <itunes:duration>23:50</itunes:duration>

    <itunes:keywords>security,management,business,encryption,quantum,ebk,xp</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>

<item>

<title>Episode 56 - Suspect Interviewing Techniques</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description>Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.</description>  

    <itunes:subtitle>Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.</itunes:subtitle>

<itunes:summary>Finding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.</itunes:summary>

    <enclosure length="5208669" type="audio/x-m4a" url="http://adventuresinsecurity.com/Podcasts/AISSeries/AIS_56_Nov_04_2007.mp3"/>

    <pubDate>Sun, 04 Nov 2007 15:00:00 EST</pubDate>
  

    <itunes:duration>17:21</itunes:duration>

    <itunes:keywords>security,management,business,encryption,interviewing,wep,419,scam,rainbow</itunes:keywords>

<dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Olzak</dc:creator></item>


</channel>

</rss>