<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Security Slice by Tripwire</title>
	<atom:link href="https://www.tripwire.com/state-of-security/topics/security-slice-podcast/feed/" rel="self" type="application/rss+xml"/>
	<link>https://www.tripwire.com/state-of-security</link>
	<description></description>
	<lastBuildDate>Wed, 03 Feb 2021 13:42:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<itunes:new-feed-url>http://feeds.feedburner.com/SecuritySliceByTripwire</itunes:new-feed-url>
	<itunes:explicit>no</itunes:explicit><copyright>Copyright Tripwire, Inc.</copyright><itunes:image href="http://www.tripwire.com/state-of-security/wp-content/uploads/2014/06/tripwire-logo-1400.png"/><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords><itunes:summary>Security news and commentary from Tripwire.</itunes:summary><itunes:subtitle>Security news and commentary from Tripwire.</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:author>Tripwire, Inc.</itunes:author><itunes:owner><itunes:email>marketing@tripwire.com</itunes:email><itunes:name>Tripwire, Inc.</itunes:name></itunes:owner><item>
		<title>Inaugural BSidesPhilly Event a Smashing Success</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/inaugural-bsidesphilly-event-a-smashing-success/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/inaugural-bsidesphilly-event-a-smashing-success/#respond</comments>
		
		
		<pubDate>Fri, 16 Dec 2016 04:00:35 +0000</pubDate>
				<category><![CDATA[Featured Articles]]></category>
		<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[bsides]]></category>
		<category><![CDATA[Infosec]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=44876</guid>

					<description><![CDATA[<p>People say that Philadelphia has an inferiority complex. They say that that we feel overlooked being located between New York and Washington, D.C. Until earlier this month, as far Security BSides was concerned, that was pretty much true. Great BSides groups are easy driving distance from Philadelphia, but we had nothing in our own backyard. [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/inaugural-bsidesphilly-event-a-smashing-success/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/inaugural-bsidesphilly-event-a-smashing-success/">Inaugural BSidesPhilly Event a Smashing Success</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/inaugural-bsidesphilly-event-a-smashing-success/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator></item>
		<item>
		<title>What the Cloud Can Do to Improve IT Security</title>
		<link>https://www.tripwire.com/state-of-security/security-data-protection/what-the-cloud-can-do-to-improve-it-security/</link>
					<comments>https://www.tripwire.com/state-of-security/security-data-protection/what-the-cloud-can-do-to-improve-it-security/#respond</comments>
		
		
		<pubDate>Mon, 28 Nov 2016 04:01:13 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Featured Articles]]></category>
		<category><![CDATA[IT Security and Data Protection]]></category>
		<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[security-as-a-service]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=44540</guid>

					<description><![CDATA[<p>Cloud computing has come a long way in just a few years. Now, most businesses use some sort of cloud service, whether it be for a specific software application, infrastructure requirements, or more. The cloud certainly represents the way many companies are choosing to operate, but some have shown reluctance to adopt cloud solutions. One [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-data-protection/what-the-cloud-can-do-to-improve-it-security/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-data-protection/what-the-cloud-can-do-to-improve-it-security/">What the Cloud Can Do to Improve IT Security</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-data-protection/what-the-cloud-can-do-to-improve-it-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator></item>
		<item>
		<title>Security Slice – Sweet Security: Building a Defensive Raspberry Pi</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-sweet-security-building-a-defensive-raspberry-pi/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-sweet-security-building-a-defensive-raspberry-pi/#respond</comments>
		
		
		<pubDate>Tue, 19 Jul 2016 03:01:28 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Infosecurity Europe 2016]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<category><![CDATA[Travis Smith]]></category>
		<category><![CDATA[Tyler Reguly]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=41741</guid>

					<description><![CDATA[<p>In June, Tripwire security researcher Travis Smith conducted a presentation at InfoSecurity Europe 2016 on how open source and other free tools can monitor, protect and mitigate threats in IoT environments. In addition, Smith explained how these tools and methodologies can be deployed on inexpensive hardware, such as the Raspberry Pi. In this special security slice podcast hosted by Tyler [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-sweet-security-building-a-defensive-raspberry-pi/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-sweet-security-building-a-defensive-raspberry-pi/">Security Slice &#8211; Sweet Security: Building a Defensive Raspberry Pi</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-sweet-security-building-a-defensive-raspberry-pi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="6076509" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP163_Sweet-Security_Building_a_Defensive_Raspberry_Pi.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>In June, Tripwire security researcher Travis Smith conducted a presentation at InfoSecurity Europe 2016 on how open source and other free tools can monitor, protect and mitigate threats in IoT environments. In addition, Smith explained how these tools and methodologies can be deployed on inexpensive hardware, such as the Raspberry Pi. In this special security slice podcast hosted by Tyler [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice &amp;#8211; Sweet Security: Building a Defensive Raspberry Pi appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>In June, Tripwire security researcher Travis Smith conducted a presentation at InfoSecurity Europe 2016 on how open source and other free tools can monitor, protect and mitigate threats in IoT environments. In addition, Smith explained how these tools and methodologies can be deployed on inexpensive hardware, such as the Raspberry Pi. In this special security slice podcast hosted by Tyler [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice &amp;#8211; Sweet Security: Building a Defensive Raspberry Pi appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: The Zero-Day Arms Race</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-zero-day-arms-race/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-zero-day-arms-race/#respond</comments>
		
		
		<pubDate>Tue, 17 May 2016 03:01:00 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Craig Young]]></category>
		<category><![CDATA[Hacking Team]]></category>
		<category><![CDATA[Lane Thames]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=40309</guid>

					<description><![CDATA[<p>According to a recent report by Symantec, attacks exploiting previously unknown (or zero-day) software vulnerabilities more than doubled last year. Researchers believed this spike may be caused by the Hacking Team breach, which forced several zero-day exploits into the wild. Was the recent increase in zero-days a onetime occurrence, or should we expect disclosure of [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-zero-day-arms-race/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-zero-day-arms-race/">Security Slice: The Zero-Day Arms Race</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-zero-day-arms-race/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="4858654" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP162_The-Zero_Day_Arms_Race.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>According to a recent report by Symantec, attacks exploiting previously unknown (or zero-day) software vulnerabilities more than doubled last year. Researchers believed this spike may be caused by the Hacking Team breach, which forced several zero-day exploits into the wild. Was the recent increase in zero-days a onetime occurrence, or should we expect disclosure of [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Zero-Day Arms Race appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>According to a recent report by Symantec, attacks exploiting previously unknown (or zero-day) software vulnerabilities more than doubled last year. Researchers believed this spike may be caused by the Hacking Team breach, which forced several zero-day exploits into the wild. Was the recent increase in zero-days a onetime occurrence, or should we expect disclosure of [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Zero-Day Arms Race appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: The Bug That Cried Wolf</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-bug-that-cried-wolf/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-bug-that-cried-wolf/#respond</comments>
		
		
		<pubDate>Mon, 09 May 2016 03:00:03 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Badlock]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=40298</guid>

					<description><![CDATA[<p>In the beginning of April, the Badlock vulnerability was everywhere. It had its own logo and website, along with an announcement stating security updates would only become available as part of the April Microsoft Patch Tuesday. But when the details were revealed, many security experts felt Badlock’s marketing was not consistent with the severity of the [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-bug-that-cried-wolf/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-bug-that-cried-wolf/">Security Slice: The Bug That Cried Wolf</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-bug-that-cried-wolf/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="5579661" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP161_The_Bug_That_Cried_Wolf.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>In the beginning of April, the Badlock vulnerability was everywhere. It had its own logo and website, along with an announcement stating security updates would only become available as part of the April Microsoft Patch Tuesday. But when the details were revealed, many security experts felt Badlock’s marketing was not consistent with the severity of the [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Bug That Cried Wolf appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>In the beginning of April, the Badlock vulnerability was everywhere. It had its own logo and website, along with an announcement stating security updates would only become available as part of the April Microsoft Patch Tuesday. But when the details were revealed, many security experts felt Badlock’s marketing was not consistent with the severity of the [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Bug That Cried Wolf appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: The Resurgence of Ransomware</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-resurgence-of-ransomware/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-resurgence-of-ransomware/#respond</comments>
		
		
		<pubDate>Mon, 25 Apr 2016 03:00:38 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=39604</guid>

					<description><![CDATA[<p>Ransomware seems to be everywhere. According to Blue Coat Systems&#8217; 2015 Mobile Malware Report, ransomware is now the top malware threat targeting mobile devices, and it has even begun to infect Apple&#8217;s Macintosh computers. Hospitals across the nation have been significantly impacted by ransomware campaigns. What factors are driving this dramatic rise in ransomware? Listen to our [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-resurgence-of-ransomware/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-resurgence-of-ransomware/">Security Slice: The Resurgence of Ransomware</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-resurgence-of-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="5579666" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP160_The_Resurgence_of_Ransomware.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Ransomware seems to be everywhere. According to Blue Coat Systems&amp;#8217; 2015 Mobile Malware Report, ransomware is now the top malware threat targeting mobile devices, and it has even begun to infect Apple&amp;#8217;s Macintosh computers. Hospitals across the nation have been significantly impacted by ransomware campaigns. What factors are driving this dramatic rise in ransomware? Listen to our [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Resurgence of Ransomware appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>Ransomware seems to be everywhere. According to Blue Coat Systems&amp;#8217; 2015 Mobile Malware Report, ransomware is now the top malware threat targeting mobile devices, and it has even begun to infect Apple&amp;#8217;s Macintosh computers. Hospitals across the nation have been significantly impacted by ransomware campaigns. What factors are driving this dramatic rise in ransomware? Listen to our [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Resurgence of Ransomware appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: The Apple Encryption Debate</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-apple-encryption-debate/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-apple-encryption-debate/#respond</comments>
		
		
		<pubDate>Mon, 11 Apr 2016 03:00:53 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=39597</guid>

					<description><![CDATA[<p>After weeks of controversy, the FBI announced it successfully cracked the iPhone of the San Bernardino shooter. The FBI’s method did not require Apple’s assistance, but the discussion surrounding encryption and law enforcement is far from over. This special security slice podcast was recorded several days before the FBI dropped its legal case against Apple. [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-apple-encryption-debate/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-apple-encryption-debate/">Security Slice: The Apple Encryption Debate</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-apple-encryption-debate/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="5901493" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP159_The_Apple_Encryption_Debate.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>After weeks of controversy, the FBI announced it successfully cracked the iPhone of the San Bernardino shooter. The FBI’s method did not require Apple’s assistance, but the discussion surrounding encryption and law enforcement is far from over. This special security slice podcast was recorded several days before the FBI dropped its legal case against Apple. [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Apple Encryption Debate appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>After weeks of controversy, the FBI announced it successfully cracked the iPhone of the San Bernardino shooter. The FBI’s method did not require Apple’s assistance, but the discussion surrounding encryption and law enforcement is far from over. This special security slice podcast was recorded several days before the FBI dropped its legal case against Apple. [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Apple Encryption Debate appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Dreaming of IoCs and Threat Intelligence</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-dreaming-of-iocs-and-threat-intelligence/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-dreaming-of-iocs-and-threat-intelligence/#respond</comments>
		
		
		<pubDate>Thu, 31 Mar 2016 03:00:07 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[RSA Conference 2016]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[Travis Smith]]></category>
		<category><![CDATA[Tyler Reguly]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=39419</guid>

					<description><![CDATA[<p>In early March, Tripwire security researcher Travis Smith did a presentation at RSA Conference 2016 on how commercial and open source threat intelligence tools can work together to add essential time context to log data. This crucial data allows organizations to pinpoint exactly when a breach occurred and other critical forensic analysis information. Listen to this special security slice [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-dreaming-of-iocs-and-threat-intelligence/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-dreaming-of-iocs-and-threat-intelligence/">Security Slice: Dreaming of IoCs and Threat Intelligence</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-dreaming-of-iocs-and-threat-intelligence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="6986191" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP158_Dreaming_of_IoCs.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>In early March, Tripwire security researcher Travis Smith did a presentation at RSA Conference 2016 on how commercial and open source threat intelligence tools can work together to add essential time context to log data. This crucial data allows organizations to pinpoint exactly when a breach occurred and other critical forensic analysis information. Listen to this special security slice [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Dreaming of IoCs and Threat Intelligence appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>In early March, Tripwire security researcher Travis Smith did a presentation at RSA Conference 2016 on how commercial and open source threat intelligence tools can work together to add essential time context to log data. This crucial data allows organizations to pinpoint exactly when a breach occurred and other critical forensic analysis information. Listen to this special security slice [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Dreaming of IoCs and Threat Intelligence appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Secure Software Development</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-secure-software-development/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-secure-software-development/#respond</comments>
		
		
		<pubDate>Tue, 09 Feb 2016 04:00:53 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[RSA]]></category>
		<category><![CDATA[software]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=38040</guid>

					<description><![CDATA[<p>San Francisco is hosting a major software development festival roughly 10 days before RSA’s 2016 security conference rolls into the city. Whether you are a new software developer or a seasoned architect, how can you build security into your development process? Listen to our latest Security Slice podcast and hear Tim Erlin, Tyler Reguly and Craig Young discuss why developer [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-secure-software-development/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-secure-software-development/">Security Slice: Secure Software Development</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-secure-software-development/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="5670546" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP157_Secure_Software_Development.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>San Francisco is hosting a major software development festival roughly 10 days before RSA’s 2016 security conference rolls into the city. Whether you are a new software developer or a seasoned architect, how can you build security into your development process? Listen to our latest Security Slice podcast and hear Tim Erlin, Tyler Reguly and Craig Young discuss why developer [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Secure Software Development appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>San Francisco is hosting a major software development festival roughly 10 days before RSA’s 2016 security conference rolls into the city. Whether you are a new software developer or a seasoned architect, how can you build security into your development process? Listen to our latest Security Slice podcast and hear Tim Erlin, Tyler Reguly and Craig Young discuss why developer [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Secure Software Development appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: BlackEnergy Blackouts</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-blackenergy-blackouts/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-blackenergy-blackouts/#respond</comments>
		
		
		<pubDate>Mon, 01 Feb 2016 04:00:54 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Infosec]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=38034</guid>

					<description><![CDATA[<p>In December 2015, a power outage in the Ukraine left over 700,000 citizens without electricity. Security researchers confirmed that the outage was caused by BlackEnergy malware and there&#8217;s been a lot of speculation that Russia was behind the cyber attack. What lessons can U.S. critical infrastructure providers learn from these attacks? Listen to our latest Security [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-blackenergy-blackouts/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-blackenergy-blackouts/">Security Slice: BlackEnergy Blackouts</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-blackenergy-blackouts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="6650653" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP156_BlackEnergy_Blackouts.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>In December 2015, a power outage in the Ukraine left over 700,000 citizens without electricity. Security researchers confirmed that the outage was caused by BlackEnergy malware and there&amp;#8217;s been a lot of speculation that Russia was behind the cyber attack. What lessons can U.S. critical infrastructure providers learn from these attacks? Listen to our latest Security [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: BlackEnergy Blackouts appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>In December 2015, a power outage in the Ukraine left over 700,000 citizens without electricity. Security researchers confirmed that the outage was caused by BlackEnergy malware and there&amp;#8217;s been a lot of speculation that Russia was behind the cyber attack. What lessons can U.S. critical infrastructure providers learn from these attacks? Listen to our latest Security [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: BlackEnergy Blackouts appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: The High Cost of Trolls</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-high-cost-of-trolls/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-high-cost-of-trolls/#respond</comments>
		
		
		<pubDate>Mon, 18 Jan 2016 04:00:58 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=37364</guid>

					<description><![CDATA[<p>A multinational insurance company called Chubb will soon offer their clients ‘troll insurance.’ This new policy will allow holders to claim up to £50,000 to pay for expenses caused by online abuse, including professional counselling and forensics to track down the original bullies. The Internet is infamous for widespread cyber bullying; will this become a [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-high-cost-of-trolls/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-high-cost-of-trolls/">Security Slice: The High Cost of Trolls</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-high-cost-of-trolls/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="4851525" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP155_The_High_Cost_of_Trolling.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>A multinational insurance company called Chubb will soon offer their clients ‘troll insurance.’ This new policy will allow holders to claim up to £50,000 to pay for expenses caused by online abuse, including professional counselling and forensics to track down the original bullies. The Internet is infamous for widespread cyber bullying; will this become a [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The High Cost of Trolls appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>A multinational insurance company called Chubb will soon offer their clients ‘troll insurance.’ This new policy will allow holders to claim up to £50,000 to pay for expenses caused by online abuse, including professional counselling and forensics to track down the original bullies. The Internet is infamous for widespread cyber bullying; will this become a [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The High Cost of Trolls appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Diffusing DDoS Damage</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-diffusing-ddos-damage/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-diffusing-ddos-damage/#respond</comments>
		
		
		<pubDate>Wed, 13 Jan 2016 04:01:39 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Akamai Technologies]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Lane Thames]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Tim Erlin]]></category>
		<category><![CDATA[Tyler Reguly]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=37358</guid>

					<description><![CDATA[<p>In their Q3 2015 report, Akamai Technologies noticed a dramatic rise in Distributed Denial-of-Service (DDoS) attacks. These attacks rose 23% from the previous quarter and jumped a dramatic 180% from Q3 2014. What is behind the increase in distributed denial-of-service attacks and the damage they cause? Listen to our latest Security Slice podcast and hear Tim [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-diffusing-ddos-damage/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-diffusing-ddos-damage/">Security Slice: Diffusing DDoS Damage</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-diffusing-ddos-damage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="3570424" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP154_Diffusing_DDoS_Damage.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>In their Q3 2015 report, Akamai Technologies noticed a dramatic rise in Distributed Denial-of-Service (DDoS) attacks. These attacks rose 23% from the previous quarter and jumped a dramatic 180% from Q3 2014. What is behind the increase in distributed denial-of-service attacks and the damage they cause? Listen to our latest Security Slice podcast and hear Tim [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Diffusing DDoS Damage appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>In their Q3 2015 report, Akamai Technologies noticed a dramatic rise in Distributed Denial-of-Service (DDoS) attacks. These attacks rose 23% from the previous quarter and jumped a dramatic 180% from Q3 2014. What is behind the increase in distributed denial-of-service attacks and the damage they cause? Listen to our latest Security Slice podcast and hear Tim [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Diffusing DDoS Damage appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Cloudy with a Chance of Patching</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cloudy-with-a-chance-of-patching/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cloudy-with-a-chance-of-patching/#respond</comments>
		
		
		<pubDate>Mon, 04 Jan 2016 04:00:07 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=36943</guid>

					<description><![CDATA[<p>FireEye recently discovered a massive spear-phishing malware campaign targeting journalists in Hong Kong. The attack appeared to be state-sponsored, and hid a command and control server in their victim’s Dropbox account. As is often the case, the attack could have been circumvented by installing a few simple patches. How can vendors support the patching process [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cloudy-with-a-chance-of-patching/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cloudy-with-a-chance-of-patching/">Security Slice: Cloudy with a Chance of Patching</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cloudy-with-a-chance-of-patching/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="4060492" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP153_Cloudy_with_a_Chance_of_Patching.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>FireEye recently discovered a massive spear-phishing malware campaign targeting journalists in Hong Kong. The attack appeared to be state-sponsored, and hid a command and control server in their victim’s Dropbox account. As is often the case, the attack could have been circumvented by installing a few simple patches. How can vendors support the patching process [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Cloudy with a Chance of Patching appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>FireEye recently discovered a massive spear-phishing malware campaign targeting journalists in Hong Kong. The attack appeared to be state-sponsored, and hid a command and control server in their victim’s Dropbox account. As is often the case, the attack could have been circumvented by installing a few simple patches. How can vendors support the patching process [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Cloudy with a Chance of Patching appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: The VTech Breach</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-vtech-breach/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-vtech-breach/#respond</comments>
		
		
		<pubDate>Mon, 28 Dec 2015 06:00:52 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=36935</guid>

					<description><![CDATA[<p>VTech, a global electronics manufacturer and toymaker, recently suffered from a data breach that exposed personal information for over 200,000 children and 5 million adults. The data leaked included names, home addresses, genders, birthdays and linked parents and children. Do children face unique security risks when their information is exposed in a data breach? Listen [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-vtech-breach/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-vtech-breach/">Security Slice: The VTech Breach</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-vtech-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="6552636" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP152_The_VTech_Breach.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>VTech, a global electronics manufacturer and toymaker, recently suffered from a data breach that exposed personal information for over 200,000 children and 5 million adults. The data leaked included names, home addresses, genders, birthdays and linked parents and children. Do children face unique security risks when their information is exposed in a data breach? Listen [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The VTech Breach appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>VTech, a global electronics manufacturer and toymaker, recently suffered from a data breach that exposed personal information for over 200,000 children and 5 million adults. The data leaked included names, home addresses, genders, birthdays and linked parents and children. Do children face unique security risks when their information is exposed in a data breach? Listen [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The VTech Breach appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Cyber Crime: The Gift That Keeps on Giving</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cyber-crime-the-gift-that-keeps-on-giving/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cyber-crime-the-gift-that-keeps-on-giving/#respond</comments>
		
		
		<pubDate>Fri, 27 Nov 2015 04:00:22 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=36065</guid>

					<description><![CDATA[<p>According to a recent report by Trend Micro, the majority of cyber criminals in Japan request payment through gift cards. Meanwhile, an Apple Store employee in New York was recently arrested for using fraudulent credit card details to buy almost $1 million worth of Apple gift cards. Credit card fraud is  widely understood but how [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cyber-crime-the-gift-that-keeps-on-giving/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cyber-crime-the-gift-that-keeps-on-giving/">Security Slice: Cyber Crime: The Gift That Keeps on Giving</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-cyber-crime-the-gift-that-keeps-on-giving/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="4690250" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP149_Giving_the_Gift_of_Cyber_Crime.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>According to a recent report by Trend Micro, the majority of cyber criminals in Japan request payment through gift cards. Meanwhile, an Apple Store employee in New York was recently arrested for using fraudulent credit card details to buy almost $1 million worth of Apple gift cards. Credit card fraud is  widely understood but how [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Cyber Crime: The Gift That Keeps on Giving appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>According to a recent report by Trend Micro, the majority of cyber criminals in Japan request payment through gift cards. Meanwhile, an Apple Store employee in New York was recently arrested for using fraudulent credit card details to buy almost $1 million worth of Apple gift cards. Credit card fraud is  widely understood but how [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Cyber Crime: The Gift That Keeps on Giving appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: The Rising Cost of Ransomware</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-rising-cost-of-ransomware/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-rising-cost-of-ransomware/#comments</comments>
		
		
		<pubDate>Wed, 25 Nov 2015 05:00:15 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=36127</guid>

					<description><![CDATA[<p>Surprise, surprise: ransomware is on the rise. Not only is ransome-focused malware becoming more common, it’s becoming more complicated, as well. For example, Linux.Encoder.1 is a new breed of ransomware which can be injected into websites to pose as shopping cart programs. Despite the dangers of ransomware, a member of the FBI recently recommended that [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-rising-cost-of-ransomware/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-rising-cost-of-ransomware/">Security Slice: The Rising Cost of Ransomware</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-the-rising-cost-of-ransomware/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		<enclosure length="5460627" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP151_The-Rising_Cost_of_Ransomware.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Surprise, surprise: ransomware is on the rise. Not only is ransome-focused malware becoming more common, it’s becoming more complicated, as well. For example, Linux.Encoder.1 is a new breed of ransomware which can be injected into websites to pose as shopping cart programs. Despite the dangers of ransomware, a member of the FBI recently recommended that [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Rising Cost of Ransomware appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>Surprise, surprise: ransomware is on the rise. Not only is ransome-focused malware becoming more common, it’s becoming more complicated, as well. For example, Linux.Encoder.1 is a new breed of ransomware which can be injected into websites to pose as shopping cart programs. Despite the dangers of ransomware, a member of the FBI recently recommended that [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: The Rising Cost of Ransomware appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Avoiding Adverse Apps</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-avoiding-adverse-apps/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-avoiding-adverse-apps/#respond</comments>
		
		
		<pubDate>Mon, 23 Nov 2015 04:02:20 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Craig Young]]></category>
		<category><![CDATA[Lane Thames]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Tim Erlin]]></category>
		<category><![CDATA[Youmi]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=36058</guid>

					<description><![CDATA[<p>Apple recently removed over 250 iOS from their App Store. Every removed app used a software-development kit from Chinese advertiser Youmi, which allegedly data mined massive amounts of information from users without the developers or customer’s knowledge. How can users identify malicious or intrusive apps on mobile stores? Listen to our latest Security Slice podcast [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-avoiding-adverse-apps/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-avoiding-adverse-apps/">Security Slice: Avoiding Adverse Apps</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-avoiding-adverse-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="6139384" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP148_Avoiding_Adverse_Apps.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Apple recently removed over 250 iOS from their App Store. Every removed app used a software-development kit from Chinese advertiser Youmi, which allegedly data mined massive amounts of information from users without the developers or customer’s knowledge. How can users identify malicious or intrusive apps on mobile stores? Listen to our latest Security Slice podcast [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Avoiding Adverse Apps appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>Apple recently removed over 250 iOS from their App Store. Every removed app used a software-development kit from Chinese advertiser Youmi, which allegedly data mined massive amounts of information from users without the developers or customer’s knowledge. How can users identify malicious or intrusive apps on mobile stores? Listen to our latest Security Slice podcast [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Avoiding Adverse Apps appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Honey, the Kids Are Going to Be Hackers</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-honey-the-kids-are-going-to-be-hackers/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-honey-the-kids-are-going-to-be-hackers/#respond</comments>
		
		
		<pubDate>Mon, 16 Nov 2015 04:01:27 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Craig Young]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[TalkTalk]]></category>
		<category><![CDATA[Tyler Reguly]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=36121</guid>

					<description><![CDATA[<p>The TalkTalk breach has already led to several arrests, and the alleged hackers&#8217; ages range from 15 to 20. This isn’t the only recent incident involving young hackers. Earlier this year, a teenager claimed to have breached the email account of CIA Director John Brennan. Are cyber attackers getting younger? Listen to our latest Security [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-honey-the-kids-are-going-to-be-hackers/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-honey-the-kids-are-going-to-be-hackers/">Security Slice: Honey, the Kids Are Going to Be Hackers</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-honey-the-kids-are-going-to-be-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="4081711" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP150_Honey_the_Kids_Are_Going_to_Be_Hackers.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>The TalkTalk breach has already led to several arrests, and the alleged hackers&amp;#8217; ages range from 15 to 20. This isn’t the only recent incident involving young hackers. Earlier this year, a teenager claimed to have breached the email account of CIA Director John Brennan. Are cyber attackers getting younger? Listen to our latest Security [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Honey, the Kids Are Going to Be Hackers appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>The TalkTalk breach has already led to several arrests, and the alleged hackers&amp;#8217; ages range from 15 to 20. This isn’t the only recent incident involving young hackers. Earlier this year, a teenager claimed to have breached the email account of CIA Director John Brennan. Are cyber attackers getting younger? Listen to our latest Security [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Honey, the Kids Are Going to Be Hackers appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Healing Healthcare Security</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-healing-healthcare-security/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-healing-healthcare-security/#respond</comments>
		
		
		<pubDate>Tue, 27 Oct 2015 03:01:18 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Raytheon|Websense]]></category>
		<category><![CDATA[Tim Erlin]]></category>
		<category><![CDATA[Tyler Reguly]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=35372</guid>

					<description><![CDATA[<p>According to Raytheon&#124;Websense, the healthcare industry is four times more likely to suffer advanced malware attacks than is any other sector. The news gets more concerning, as phishing attacks are 74 percent more likely to affect healthcare organizations. What can the healthcare industry do about their unique security challenges? Listen to our latest Security Slice [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-healing-healthcare-security/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-healing-healthcare-security/">Security Slice: Healing Healthcare Security</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-healing-healthcare-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="5614591" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP146_Healing_Healthcare_Security.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>According to Raytheon&amp;#124;Websense, the healthcare industry is four times more likely to suffer advanced malware attacks than is any other sector. The news gets more concerning, as phishing attacks are 74 percent more likely to affect healthcare organizations. What can the healthcare industry do about their unique security challenges? Listen to our latest Security Slice [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Healing Healthcare Security appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>According to Raytheon&amp;#124;Websense, the healthcare industry is four times more likely to suffer advanced malware attacks than is any other sector. The news gets more concerning, as phishing attacks are 74 percent more likely to affect healthcare organizations. What can the healthcare industry do about their unique security challenges? Listen to our latest Security Slice [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Healing Healthcare Security appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Beneficial Botnets?</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-beneficial-botnets/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-beneficial-botnets/#respond</comments>
		
		
		<pubDate>Thu, 22 Oct 2015 03:00:44 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[botnets]]></category>
		<category><![CDATA[Craig Young]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Linux.Wifatch]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[symantec]]></category>
		<category><![CDATA[Tyler Reguly]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=35438</guid>

					<description><![CDATA[<p>Symantec recently discovered a new strain of malware, dubbed &#8220;Linux.Wifatch,&#8221; which has already infected more than 10,000 IoT devices. The malware’s author says Linux.Wifatch is actually beneficial because it removes a malicious backdoor and encourages users to update weak passwords. Do the ends of vigilante-style malware and beneficial botnets like Linux.Wifatch justify the means? Listen [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-beneficial-botnets/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-beneficial-botnets/">Security Slice: Beneficial Botnets?</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-beneficial-botnets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="6041736" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP146_Beneficial_Botnets.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Symantec recently discovered a new strain of malware, dubbed &amp;#8220;Linux.Wifatch,&amp;#8221; which has already infected more than 10,000 IoT devices. The malware’s author says Linux.Wifatch is actually beneficial because it removes a malicious backdoor and encourages users to update weak passwords. Do the ends of vigilante-style malware and beneficial botnets like Linux.Wifatch justify the means? Listen [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Beneficial Botnets? appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>Symantec recently discovered a new strain of malware, dubbed &amp;#8220;Linux.Wifatch,&amp;#8221; which has already infected more than 10,000 IoT devices. The malware’s author says Linux.Wifatch is actually beneficial because it removes a malicious backdoor and encourages users to update weak passwords. Do the ends of vigilante-style malware and beneficial botnets like Linux.Wifatch justify the means? Listen [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Beneficial Botnets? appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Human Resources Security Woes</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-human-resources-security-woes/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-human-resources-security-woes/#respond</comments>
		
		
		<pubDate>Thu, 15 Oct 2015 03:00:26 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Clearwater]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[human resources]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=35366</guid>

					<description><![CDATA[<p>According to a recent study by Clearswift, IT professionals believe finance and human resources employees are more likely to cause a data breach than other departments. In addition, employees between the ages of 35-44 were believed to be the most likely to leak company data with malicious intent. Do these statistics accurately reflect enterprise risk [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-human-resources-security-woes/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-human-resources-security-woes/">Security Slice: Human Resources Security Woes</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-human-resources-security-woes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="6559768" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP145_HR_Security_Woes.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>According to a recent study by Clearswift, IT professionals believe finance and human resources employees are more likely to cause a data breach than other departments. In addition, employees between the ages of 35-44 were believed to be the most likely to leak company data with malicious intent. Do these statistics accurately reflect enterprise risk [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Human Resources Security Woes appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>According to a recent study by Clearswift, IT professionals believe finance and human resources employees are more likely to cause a data breach than other departments. In addition, employees between the ages of 35-44 were believed to be the most likely to leak company data with malicious intent. Do these statistics accurately reflect enterprise risk [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Human Resources Security Woes appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Game of Drones</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-game-of-drones/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-game-of-drones/#comments</comments>
		
		
		<pubDate>Tue, 22 Sep 2015 04:00:19 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[Drones]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=34486</guid>

					<description><![CDATA[<p>Drone security has been in the news recently. First, a computer hacker associated with the Islamic State was killed in a drone strike. Second, two popular consumer drones were successfully hijacked by security researchers at DEF CON 23. As privacy and drone security issues begin to intertwine, what issues should privacy advocates be concerned about? [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-game-of-drones/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-game-of-drones/">Security Slice: Game of Drones</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-game-of-drones/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		<enclosure length="4986488" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP144_Game_of_Drones.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Drone security has been in the news recently. First, a computer hacker associated with the Islamic State was killed in a drone strike. Second, two popular consumer drones were successfully hijacked by security researchers at DEF CON 23. As privacy and drone security issues begin to intertwine, what issues should privacy advocates be concerned about? [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Game of Drones appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>Drone security has been in the news recently. First, a computer hacker associated with the Islamic State was killed in a drone strike. Second, two popular consumer drones were successfully hijacked by security researchers at DEF CON 23. As privacy and drone security issues begin to intertwine, what issues should privacy advocates be concerned about? [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Game of Drones appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Crash Course in University Security</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-crash-course-in-university-security/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-crash-course-in-university-security/#respond</comments>
		
		
		<pubDate>Tue, 15 Sep 2015 03:01:10 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[attribution]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Lane Thames]]></category>
		<category><![CDATA[Tim Erlin]]></category>
		<category><![CDATA[Tyler Reguly]]></category>
		<category><![CDATA[university]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=34492</guid>

					<description><![CDATA[<p>The University of Virginia recently announced a data breach that reportedly originated from China. Personal information was not exposed; however, the attackers targeted two university employees with ties to the Defense Department and other intelligence agencies. What can other organizations learn from this breach about nation state attacks? Listen to our latest Security Slice podcast [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-crash-course-in-university-security/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-crash-course-in-university-security/">Security Slice: Crash Course in University Security</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-crash-course-in-university-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="3480447" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP145_Crash_Course_in_University_Security.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>The University of Virginia recently announced a data breach that reportedly originated from China. Personal information was not exposed; however, the attackers targeted two university employees with ties to the Defense Department and other intelligence agencies. What can other organizations learn from this breach about nation state attacks? Listen to our latest Security Slice podcast [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Crash Course in University Security appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>The University of Virginia recently announced a data breach that reportedly originated from China. Personal information was not exposed; however, the attackers targeted two university employees with ties to the Defense Department and other intelligence agencies. What can other organizations learn from this breach about nation state attacks? Listen to our latest Security Slice podcast [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Crash Course in University Security appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
		<item>
		<title>Security Slice: Confessions of a Professional Cyber Stalker – Part Two</title>
		<link>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-confessions-of-a-professional-cyber-stalker-part-two/</link>
					<comments>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-confessions-of-a-professional-cyber-stalker-part-two/#comments</comments>
		
		
		<pubDate>Tue, 08 Sep 2015 04:00:58 +0000</pubDate>
				<category><![CDATA[Security Slice]]></category>
		<category><![CDATA[cyber stalker]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.tripwire.com/state-of-security/?p=34211</guid>

					<description><![CDATA[<p>In the first part of our security slice podcast on Ken Westin’s DEF CON 23 presentation, “Confessions of a Professional Cyber Stalker,” Ken discussed his white hat cyber stalker skills and how he’s used them to track and convict cybercriminals. These skills have come into sharp focus in light of the Ashley Madison data breach that [&#8230;]&#8230;&#160;<a class="view-article " href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-confessions-of-a-professional-cyber-stalker-part-two/" title="Read More" >Read More</a></p>
<p>The post <a rel="nofollow" href="https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-confessions-of-a-professional-cyber-stalker-part-two/">Security Slice: Confessions of a Professional Cyber Stalker – Part Two</a> appeared first on <a rel="nofollow" href="https://www.tripwire.com/state-of-security">The State of Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.tripwire.com/state-of-security/security-slice-podcast/security-slice-confessions-of-a-professional-cyber-stalker-part-two/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		<enclosure length="4686607" type="audio/mpeg" url="https://www.tripwire.com/state-of-security/wp-content/uploads/sites/3/EP143_Confessions_of_a_Professional_Cyber_Stalker_2.mp3"/>

			<dc:creator>marketing@tripwire.com (Tripwire, Inc.)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>In the first part of our security slice podcast on Ken Westin’s DEF CON 23 presentation, “Confessions of a Professional Cyber Stalker,” Ken discussed his white hat cyber stalker skills and how he’s used them to track and convict cybercriminals. These skills have come into sharp focus in light of the Ashley Madison data breach that [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Confessions of a Professional Cyber Stalker – Part Two appeared first on The State of Security.</itunes:subtitle><itunes:author>Tripwire, Inc.</itunes:author><itunes:summary>In the first part of our security slice podcast on Ken Westin’s DEF CON 23 presentation, “Confessions of a Professional Cyber Stalker,” Ken discussed his white hat cyber stalker skills and how he’s used them to track and convict cybercriminals. These skills have come into sharp focus in light of the Ashley Madison data breach that [&amp;#8230;]&amp;#8230;&amp;#160;Read More The post Security Slice: Confessions of a Professional Cyber Stalker – Part Two appeared first on The State of Security.</itunes:summary><itunes:keywords>Technology,Security,Cybersecurity,InformationSecurity,News</itunes:keywords></item>
	</channel>
</rss>