<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Security Wire Weekly</title><description>SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.</description><managingEditor>noreply@blogger.com (Unknown)</managingEditor><pubDate>Wed, 28 Aug 2024 06:18:45 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">113</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://securitywireweekly.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>All Rights Reserved, Copyright 2000 - 2005, TechTarget</copyright><itunes:image href="http://media.techtarget.com/digitalguide/images/Misc/security_wire_weekly.jpg"/><itunes:keywords>information,technology,technology,security,virus,worm,malware,spyware,intrusion,detection,firewall,VPN,news</itunes:keywords><itunes:summary>Security Wire Weekly recaps the week's top news in the world of information security, plus features interviews with industry luminaries, experts and information security pros.</itunes:summary><itunes:subtitle>Security Wire Weekly recaps the week's top news in the world of information security, plus features interviews with industry luminaries, experts and information security pros.</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:author>SearchSecurity.TechTarget.com</itunes:author><itunes:owner><itunes:email>rwestervelt@techtarget.com</itunes:email><itunes:name>SearchSecurity.TechTarget.com</itunes:name></itunes:owner><item><title>Security Wire Weekly / Sept. 5, 2007</title><link>http://securitywireweekly.blogspot.com/2007/09/security-wire-weekly-sept-5-2007.html</link><pubDate>Thu, 6 Sep 2007 06:31:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-2303919420367841788</guid><description>TippingPoint security researcher Pedram Amini explains why the Sulley fuzzing framework is an important development in the quest to uncover software vulnerabilities. Also, a new flaw is found in Firefox and MIT fixes flaws in its widely-used Kerberos program.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_09_05_07.mp3&lt;br /&gt;&lt;br /&gt;Please subscribe to our new feed:&lt;br /&gt;&lt;br /&gt;&lt;itunes:new-feed-url&gt;http://feeds.feedburner.com/techtarget/fHup&lt;/itunes:new-feed-url&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly: We've changed our feed</title><link>http://securitywireweekly.blogspot.com/2007/09/security-wire-weekly-weve-changed-our.html</link><pubDate>Tue, 4 Sep 2007 08:44:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-1964289127072911838</guid><description>Please use the new feed:&lt;br /&gt;&lt;br /&gt;&lt;itunes:new-feed-url&gt;http://feeds.feedburner.com/techtarget/fHup&lt;/itunes:new-feed-url&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly -- Aug. 8, 2007</title><link>http://securitywireweekly.blogspot.com/2007/08/security-wire-weekly-aug-8-2007.html</link><pubDate>Wed, 8 Aug 2007 11:29:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-1023122885629206711</guid><description>We will be phasing out this RSS feed. Go to SearchSecurity.com/podcast to get the new Security Wire Weekly feed. Thanks for listening. In this edition, David Foote of Foote Partners shares his latest research on the value of IT security job skills and certifications. Also a wrap up of the news from Black Hat 2007.&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_08_08_2007.mp3"&gt;&lt;br /&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="19591953" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_08_08_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>We will be phasing out this RSS feed. Go to SearchSecurity.com/podcast to get the new Security Wire Weekly feed. Thanks for listening. In this edition, David Foote of Foote Partners shares his latest research on the value of IT security job skills and certifications. Also a wrap up of the news from Black Hat 2007. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>We will be phasing out this RSS feed. Go to SearchSecurity.com/podcast to get the new Security Wire Weekly feed. Thanks for listening. In this edition, David Foote of Foote Partners shares his latest research on the value of IT security job skills and certifications. Also a wrap up of the news from Black Hat 2007. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly Special Edition: Black Hat 2007</title><link>http://securitywireweekly.blogspot.com/2007/08/security-wire-weekly-special-edition.html</link><pubDate>Mon, 6 Aug 2007 12:26:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-6909455089896439803</guid><description>Security researchers Brian Chess and Jacob West of Fortify Software discuss penetration testing, secure software development and their latest book. Also, a researcher warns that attackers could threaten Vista users by exploiting Teredo, an IPv6 tunneling tool enabled by default in the latest Windows OS. We will be phasing out this RSS feed. Go to SearchSecurity.com/podcast to get the new Security Wire Weekly feed. Thanks for listening.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_Special_08_06_07.mp3"&gt;Download mp3&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="19463232" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_Special_08_06_07.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Security researchers Brian Chess and Jacob West of Fortify Software discuss penetration testing, secure software development and their latest book. Also, a researcher warns that attackers could threaten Vista users by exploiting Teredo, an IPv6 tunneling tool enabled by default in the latest Windows OS. We will be phasing out this RSS feed. Go to SearchSecurity.com/podcast to get the new Security Wire Weekly feed. Thanks for listening. Download mp3</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Security researchers Brian Chess and Jacob West of Fortify Software discuss penetration testing, secure software development and their latest book. Also, a researcher warns that attackers could threaten Vista users by exploiting Teredo, an IPv6 tunneling tool enabled by default in the latest Windows OS. We will be phasing out this RSS feed. Go to SearchSecurity.com/podcast to get the new Security Wire Weekly feed. Thanks for listening. Download mp3</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Squad: Apple iPhone security, Google’s security moves</title><link>http://securitywireweekly.blogspot.com/2007/08/security-squad-apple-iphone-security.html</link><pubDate>Wed, 1 Aug 2007 05:59:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-2058323877326501728</guid><description>SearchSecurity.com editors discuss the state of Apple iPhone security, Google’s continued march into the security market and vulnerability disclosure in the wake of the eBay like vulnerability auction site, WabiSabiLabi.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Squad_07_30_2007.mp3"&gt;Download Security Squad&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="24711318" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Squad_07_30_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>SearchSecurity.com editors discuss the state of Apple iPhone security, Google’s continued march into the security market and vulnerability disclosure in the wake of the eBay like vulnerability auction site, WabiSabiLabi. Download Security Squad</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>SearchSecurity.com editors discuss the state of Apple iPhone security, Google’s continued march into the security market and vulnerability disclosure in the wake of the eBay like vulnerability auction site, WabiSabiLabi. Download Security Squad</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / July 25, 2007</title><link>http://securitywireweekly.blogspot.com/2007/07/security-wire-weekly-july-25-2007.html</link><pubDate>Wed, 25 Jul 2007 15:27:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-9149908848350854681</guid><description>Chris Haddad, director of technical architecture at the Burton Group lays out some of the serious threats facing Web services and service oriented architecture development. Also, a review of the week’s news. &lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_07_25_07.mp3"&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="18997387" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_07_25_07.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Chris Haddad, director of technical architecture at the Burton Group lays out some of the serious threats facing Web services and service oriented architecture development. Also, a review of the week’s news. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Chris Haddad, director of technical architecture at the Burton Group lays out some of the serious threats facing Web services and service oriented architecture development. Also, a review of the week’s news. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>We have a new RSS feed</title><link>http://securitywireweekly.blogspot.com/2007/07/we-have-new-rss-feed.html</link><pubDate>Thu, 19 Jul 2007 07:31:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-5415957039465902689</guid><description>SearchSecurity officially launched the Security Wire Weekly blog today. &lt;a href="http://feeds.feedburner.com/techtarget/fHup"&gt;Please subscribe to our new RSS feed.&lt;/a&gt; The blog hosts our Security Wire Weekly podcasts, which have been in production for nearly two years. Soon we’ll be moving all of our archived podcasts to this blog. We hope the new blog will make it easier for you to communicate with the podcast production team. Now, listeners can respond to each podcast by leaving a comment; we have added a feature in which listeners may post 30-second audio comments in response to a particular podcast. In the future, we’ll also be adding our Security Newsmaker, Security Squad and Security360 podcasts onto the blog, which will be accessible through the same feed. All of our podcasts will continue to be accessible at SearchSecurity.com/podcast. Thanks for listening.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / July 18, 2007</title><link>http://securitywireweekly.blogspot.com/2007/07/security-wire-weekly-july-18-2007.html</link><pubDate>Wed, 18 Jul 2007 12:54:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-8665527529330897687</guid><description>Amichai Shulman from Imperva describes a flaw his organization discovered in the Oracle E-Business Suite. The flaw was patched Tuesday as part of Oracle's July 2007 CPU. Also, a summary of this week's top IT security news.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_07_18_07.mp3"&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="6596358" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_07_18_07.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Amichai Shulman from Imperva describes a flaw his organization discovered in the Oracle E-Business Suite. The flaw was patched Tuesday as part of Oracle's July 2007 CPU. Also, a summary of this week's top IT security news. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Amichai Shulman from Imperva describes a flaw his organization discovered in the Oracle E-Business Suite. The flaw was patched Tuesday as part of Oracle's July 2007 CPU. Also, a summary of this week's top IT security news. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Squad: Database security, encryption</title><link>http://securitywireweekly.blogspot.com/2007/07/security-squad-database-security.html</link><pubDate>Tue, 17 Jul 2007 06:35:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-6910614122617480557</guid><description>Information Security magazine editors Neil Roiter and Michael Mimoso discuss Google's foray into the security market and whether companies should turn to database encryption to meet the PCI Data Security Standard in the wake of the TJX data security breach. Also the editors discuss whether the "month of" security flaw Web sites are helpful in securing software or just shameless publicity by security researchers. And finally, SearchSecurity.com News Writer Bill Brenner provides analysis from the Gartner IT Security Summit in Washington. (Runtime: 23:51)&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Squad_06_08_2007.mp3"&gt;Download Security Squad&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="22908383" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Squad_06_08_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Information Security magazine editors Neil Roiter and Michael Mimoso discuss Google's foray into the security market and whether companies should turn to database encryption to meet the PCI Data Security Standard in the wake of the TJX data security breach. Also the editors discuss whether the "month of" security flaw Web sites are helpful in securing software or just shameless publicity by security researchers. And finally, SearchSecurity.com News Writer Bill Brenner provides analysis from the Gartner IT Security Summit in Washington. (Runtime: 23:51) Download Security Squad</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Information Security magazine editors Neil Roiter and Michael Mimoso discuss Google's foray into the security market and whether companies should turn to database encryption to meet the PCI Data Security Standard in the wake of the TJX data security breach. Also the editors discuss whether the "month of" security flaw Web sites are helpful in securing software or just shameless publicity by security researchers. And finally, SearchSecurity.com News Writer Bill Brenner provides analysis from the Gartner IT Security Summit in Washington. (Runtime: 23:51) Download Security Squad</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / July 11, 2007</title><link>http://securitywireweekly.blogspot.com/2007/07/security-wire-weekly-july-11-2007.html</link><pubDate>Wed, 11 Jul 2007 16:13:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-894550227457456909</guid><description>Security researchers Tom Cross and David Dewey of IBM's Internet Security Systems X-Force research team discuss their team's discovery of the Microsoft Active Directory flaw and Microsoft's latest round of patches. Plus, a summary of the week's IT security news.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_07_11_07.mp3"&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="12287109" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_07_11_07.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Security researchers Tom Cross and David Dewey of IBM's Internet Security Systems X-Force research team discuss their team's discovery of the Microsoft Active Directory flaw and Microsoft's latest round of patches. Plus, a summary of the week's IT security news. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Security researchers Tom Cross and David Dewey of IBM's Internet Security Systems X-Force research team discuss their team's discovery of the Microsoft Active Directory flaw and Microsoft's latest round of patches. Plus, a summary of the week's IT security news. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly special edition -- PCI audit</title><link>http://securitywireweekly.blogspot.com/2007/07/security-wire-weekly-special-edition_05.html</link><pubDate>Thu, 5 Jul 2007 05:39:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-378834376922181078</guid><description>SearchSecurity.com reports from the Burton Group Catalyst Conference in San Francisco. Diana Kelley, vice president and service director at the Burton Group, explains the scope of a PCI audit and how some auditors are pitching products and services. Dan Jones, director of IT at the University of Colorado, explains his school's ongoing PCI compliance initiatives.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_Special_06_27_2007.mp3"&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="13183557" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_Special_06_27_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>SearchSecurity.com reports from the Burton Group Catalyst Conference in San Francisco. Diana Kelley, vice president and service director at the Burton Group, explains the scope of a PCI audit and how some auditors are pitching products and services. Dan Jones, director of IT at the University of Colorado, explains his school's ongoing PCI compliance initiatives. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>SearchSecurity.com reports from the Burton Group Catalyst Conference in San Francisco. Diana Kelley, vice president and service director at the Burton Group, explains the scope of a PCI audit and how some auditors are pitching products and services. Dan Jones, director of IT at the University of Colorado, explains his school's ongoing PCI compliance initiatives. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly special edition -- Network security; identity management</title><link>http://securitywireweekly.blogspot.com/2007/07/security-wire-weekly-special-edition.html</link><pubDate>Thu, 5 Jul 2007 05:37:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-8325545621808141584</guid><description>SearchSecurity.com reports from the Burton Group Catalyst Conference in San Francisco. Burton Group vice president Phil Schacter sums up the day's sessions on open and secure network architectures. Conference attendees talk about their security concerns including identity management and risk assessments.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_Burton_Special_06_28_2007.mp3"&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="11697258" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_Burton_Special_06_28_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>SearchSecurity.com reports from the Burton Group Catalyst Conference in San Francisco. Burton Group vice president Phil Schacter sums up the day's sessions on open and secure network architectures. Conference attendees talk about their security concerns including identity management and risk assessments. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>SearchSecurity.com reports from the Burton Group Catalyst Conference in San Francisco. Burton Group vice president Phil Schacter sums up the day's sessions on open and secure network architectures. Conference attendees talk about their security concerns including identity management and risk assessments. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / June 27, 2007</title><link>http://securitywireweekly.blogspot.com/2007/06/security-wire-weekly-june-27-2007.html</link><pubDate>Wed, 27 Jun 2007 08:00:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-6690059116675920400</guid><description>Cisco executives discuss the acquisition of security vendor IronPort, plus a look at how one IT shop moved into the &lt;st1:place st="on"&gt;Vista&lt;/st1:place&gt; fast lane despite compatibility problems.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_06_27_2007.mp3"&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="14033155" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_06_27_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Cisco executives discuss the acquisition of security vendor IronPort, plus a look at how one IT shop moved into the Vista fast lane despite compatibility problems. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Anonymous)</itunes:author><itunes:summary>Cisco executives discuss the acquisition of security vendor IronPort, plus a look at how one IT shop moved into the Vista fast lane despite compatibility problems. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / June 20, 2007</title><link>http://securitywireweekly.blogspot.com/2007/06/security-wire-weekly-june-20-2007.html</link><pubDate>Wed, 20 Jun 2007 09:20:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-7135587134985371072</guid><description>This week, former Microsoft CISO Karen Worstell talks about the current state of security. Also, more consolidation in the security market with HP acquiring SPI Dynamics and PatchLink merging with SecureWave.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_06_20_07.mp3"&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="18569922" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_06_20_07.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>This week, former Microsoft CISO Karen Worstell talks about the current state of security. Also, more consolidation in the security market with HP acquiring SPI Dynamics and PatchLink merging with SecureWave. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>This week, former Microsoft CISO Karen Worstell talks about the current state of security. Also, more consolidation in the security market with HP acquiring SPI Dynamics and PatchLink merging with SecureWave. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly – June 13, 2007</title><link>http://securitywireweekly.blogspot.com/2007/06/security-wire-weekly-june-13-2007.html</link><pubDate>Wed, 13 Jun 2007 09:03:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-2468884171803216049</guid><description>Eric Schultze, chief security architect of Shavlik Technologies helps prioritize Microsoft’s Patch Tuesday Bulletins. Jack Danahy, chief technology officer and founder of Ounce Labs discusses Microsoft’s proactive security posture and how it has affected security in the software development lifecycle. Also, a summary of this week's news.&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_06_13_2007.mp3"&gt;&lt;br /&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="25905843" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_06_13_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Eric Schultze, chief security architect of Shavlik Technologies helps prioritize Microsoft’s Patch Tuesday Bulletins. Jack Danahy, chief technology officer and founder of Ounce Labs discusses Microsoft’s proactive security posture and how it has affected security in the software development lifecycle. Also, a summary of this week's news. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Eric Schultze, chief security architect of Shavlik Technologies helps prioritize Microsoft’s Patch Tuesday Bulletins. Jack Danahy, chief technology officer and founder of Ounce Labs discusses Microsoft’s proactive security posture and how it has affected security in the software development lifecycle. Also, a summary of this week's news. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / June 6, 2007</title><link>http://securitywireweekly.blogspot.com/2007/06/security-wire-weekly-june-6-2007.html</link><pubDate>Thu, 7 Jun 2007 05:11:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-7064242052744641606</guid><description>Senior News Writer Bill Brenner reports from the Gartner IT Summit in Washington. Bryan Sartin, Cybertrust’s vice president of investigative response talks about his company’s merger with Verizon. Bruce Schneier, chief technology officer of BT Counterpane, and Lloyd Hession, CSO of BT Radianz talk about life after their mergers with British Telecom. Also, a review of the week’s news. &lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_06_06_2007.mp3"&gt;&lt;br /&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="12364430" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_06_06_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Senior News Writer Bill Brenner reports from the Gartner IT Summit in Washington. Bryan Sartin, Cybertrust’s vice president of investigative response talks about his company’s merger with Verizon. Bruce Schneier, chief technology officer of BT Counterpane, and Lloyd Hession, CSO of BT Radianz talk about life after their mergers with British Telecom. Also, a review of the week’s news. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Senior News Writer Bill Brenner reports from the Gartner IT Summit in Washington. Bryan Sartin, Cybertrust’s vice president of investigative response talks about his company’s merger with Verizon. Bruce Schneier, chief technology officer of BT Counterpane, and Lloyd Hession, CSO of BT Radianz talk about life after their mergers with British Telecom. Also, a review of the week’s news. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly Special - New Hacking Technique</title><link>http://securitywireweekly.blogspot.com/2007/06/security-wire-weekly-special-new.html</link><pubDate>Tue, 5 Jun 2007 11:30:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-8704825276239700652</guid><description>In this brief interview at the Gartner IT Summit in Washington, Yuval Ben-Itzhak, chief technology officer of security vendor Finjan talks about a newly discovered hacking technique used by attackers to avoid detection. (Runtime 3:56)&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_Special_06_05_2007.mp3"&gt;Download Security Wire Weekly Special Edition&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="3783500" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_Special_06_05_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>In this brief interview at the Gartner IT Summit in Washington, Yuval Ben-Itzhak, chief technology officer of security vendor Finjan talks about a newly discovered hacking technique used by attackers to avoid detection. (Runtime 3:56) Download Security Wire Weekly Special Edition</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>In this brief interview at the Gartner IT Summit in Washington, Yuval Ben-Itzhak, chief technology officer of security vendor Finjan talks about a newly discovered hacking technique used by attackers to avoid detection. (Runtime 3:56) Download Security Wire Weekly Special Edition</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Squad Roundtable: Wi-Fi security; Patch Tuesday</title><link>http://securitywireweekly.blogspot.com/2007/05/security-squad-roundtable-wi-fi.html</link><pubDate>Thu, 31 May 2007 04:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-7308610995542079399</guid><description>SearchSecurity.com editors discuss whether Microsoft should abandon Patch Tuesday, whether blogging is a security threat to corporate systems, the state of Wi-Fi security and Verizon's acquisition of CyberTrust.&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Squad_Roundtable_05_18_07.mp3"&gt;&lt;br /&gt;Download Security Squad Roundtable&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="28456633" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Squad_Roundtable_05_18_07.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>SearchSecurity.com editors discuss whether Microsoft should abandon Patch Tuesday, whether blogging is a security threat to corporate systems, the state of Wi-Fi security and Verizon's acquisition of CyberTrust. Download Security Squad Roundtable</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>SearchSecurity.com editors discuss whether Microsoft should abandon Patch Tuesday, whether blogging is a security threat to corporate systems, the state of Wi-Fi security and Verizon's acquisition of CyberTrust. Download Security Squad Roundtable</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / May 30 2007</title><link>http://securitywireweekly.blogspot.com/2007/05/security-wire-weekly-may-30-2007.html</link><pubDate>Wed, 30 May 2007 14:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-5606154323356179302</guid><description>Snort creator and Sourcefire founder Marty Roesch talks about last year's failed Check Point acquisition and his decision to take Sourcefire public. Also, a summary of this week's news.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_05_31_07_mixdown.mp3 "&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="11636051" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_05_31_07_mixdown.mp3 "/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Snort creator and Sourcefire founder Marty Roesch talks about last year's failed Check Point acquisition and his decision to take Sourcefire public. Also, a summary of this week's news. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Snort creator and Sourcefire founder Marty Roesch talks about last year's failed Check Point acquisition and his decision to take Sourcefire public. Also, a summary of this week's news. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security360 -- Industry Consolidation</title><link>http://securitywireweekly.blogspot.com/2007/05/security360-industry-consolidation.html</link><pubDate>Tue, 29 May 2007 05:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-4481507894469224568</guid><description>Andy Jones, a researcher with the UK-based Information Security Forum, explains how to develop an effective security strategy to deal with large projects and defend the budget. Paul Adamonis, director of security solutions at Forsythe Security talks about how to navigate industry consolidation by developing a buying strategy; and Sandra Kay Miller gives her observations of the industry and explains why some companies may not fare well in this era of consolidation. (Runtime: 25:01).&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security360_Industry_Consolidation_05_24_07.mp3"&gt;Download Security360&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="24024516" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security360_Industry_Consolidation_05_24_07.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Andy Jones, a researcher with the UK-based Information Security Forum, explains how to develop an effective security strategy to deal with large projects and defend the budget. Paul Adamonis, director of security solutions at Forsythe Security talks about how to navigate industry consolidation by developing a buying strategy; and Sandra Kay Miller gives her observations of the industry and explains why some companies may not fare well in this era of consolidation. (Runtime: 25:01). Download Security360</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Andy Jones, a researcher with the UK-based Information Security Forum, explains how to develop an effective security strategy to deal with large projects and defend the budget. Paul Adamonis, director of security solutions at Forsythe Security talks about how to navigate industry consolidation by developing a buying strategy; and Sandra Kay Miller gives her observations of the industry and explains why some companies may not fare well in this era of consolidation. (Runtime: 25:01). Download Security360</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / May 23, 2007</title><link>http://securitywireweekly.blogspot.com/2007/05/security-wire-weekly-may-23-2007.html</link><pubDate>Thu, 24 May 2007 04:52:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-7722440097500115705</guid><description>Security consultant Don Ulsch of Jefferson-Wells discusses the risk of blogging on company-owned mobile devices. Also, a summary of this week's news.&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_05_23_07.mp3"&gt;&lt;br /&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="13676928" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_05_23_07.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Security consultant Don Ulsch of Jefferson-Wells discusses the risk of blogging on company-owned mobile devices. Also, a summary of this week's news. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Security consultant Don Ulsch of Jefferson-Wells discusses the risk of blogging on company-owned mobile devices. Also, a summary of this week's news. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / May 16, 2007</title><link>http://securitywireweekly.blogspot.com/2007/05/security-wire-weekly-may-16-2007.html</link><pubDate>Wed, 16 May 2007 10:38:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-4455611316757520993</guid><description>Core Security's Ivan Arce discusses the pros and cons of penetration testing, "month-of" flaw disclosure projects and hacking contests. Also, a summary of this week's news.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/searchSecurity/downloads/Security_Wire_Weekly_05_16_07_mixdown.mp3 "&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="16272454" type="audio/mpeg" url="http://media.techtarget.com/searchSecurity/downloads/Security_Wire_Weekly_05_16_07_mixdown.mp3 "/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Core Security's Ivan Arce discusses the pros and cons of penetration testing, "month-of" flaw disclosure projects and hacking contests. Also, a summary of this week's news. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Core Security's Ivan Arce discusses the pros and cons of penetration testing, "month-of" flaw disclosure projects and hacking contests. Also, a summary of this week's news. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / May 9, 2007</title><link>http://securitywireweekly.blogspot.com/2007/05/security-wire-weekly-may-9-2007.html</link><pubDate>Wed, 9 May 2007 15:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-8442040703848617235</guid><description>Mark Allen, a patch analyst with Shavlik Technologies discusses Microsoft’s recent updates, including the zero-day DNS patch and the Exchange and Internet Explorer updates. Plus, a summary of this week's IT security news.&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_05_09_07.mp3 "&gt;&lt;br /&gt;Download Security Wire Weekly&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="13448284" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Wire_Weekly_05_09_07.mp3 "/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Mark Allen, a patch analyst with Shavlik Technologies discusses Microsoft’s recent updates, including the zero-day DNS patch and the Exchange and Internet Explorer updates. Plus, a summary of this week's IT security news. Download Security Wire Weekly</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Mark Allen, a patch analyst with Shavlik Technologies discusses Microsoft’s recent updates, including the zero-day DNS patch and the Exchange and Internet Explorer updates. Plus, a summary of this week's IT security news. Download Security Wire Weekly</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Squad Roundtable: Mac hacks / May 3, 2007</title><link>http://securitywireweekly.blogspot.com/2007/05/security-squad-roundtable-mac-hacks-may.html</link><pubDate>Tue, 8 May 2007 08:00:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-1460757690740356834</guid><description>In the debut edition of SearchSecurity.com's Security Squad roundtable news-talk podcast, editors debate the growing concern about Apple security and whether Apple really cares about keeping its products secure, the emergence of Google hacking as an enterprise data security threat and the pros and cons of "dumbing down" the PCI Data Security Standard. &lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/audioCast/SECURITY/Security_Roundtable_05_03_2007.mp3"&gt;Download MP3&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="25258071" type="audio/mpeg" url="http://media.techtarget.com/audioCast/SECURITY/Security_Roundtable_05_03_2007.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>In the debut edition of SearchSecurity.com's Security Squad roundtable news-talk podcast, editors debate the growing concern about Apple security and whether Apple really cares about keeping its products secure, the emergence of Google hacking as an enterprise data security threat and the pros and cons of "dumbing down" the PCI Data Security Standard. Download MP3</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>In the debut edition of SearchSecurity.com's Security Squad roundtable news-talk podcast, editors debate the growing concern about Apple security and whether Apple really cares about keeping its products secure, the emergence of Google hacking as an enterprise data security threat and the pros and cons of "dumbing down" the PCI Data Security Standard. Download MP3</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item><item><title>Security Wire Weekly / May 2, 2007</title><link>http://securitywireweekly.blogspot.com/2007/05/security-wire-weekly-may-2-2007.html</link><pubDate>Wed, 2 May 2007 11:10:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-18879201.post-6589987432294431122</guid><description>Sven Krasser from Secure Computing discusses new and dangerous techniques the bad guys are working into image spam. Plus, a summary of this week's IT security news.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://media.techtarget.com/searchSecurity/downloads/Security_Wire_Weekly_05_02_07.mp3"&gt;Download Security Wire Weekly.&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="12004242" type="audio/mpeg" url="http://media.techtarget.com/searchSecurity/downloads/Security_Wire_Weekly_05_02_07.mp3"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Sven Krasser from Secure Computing discusses new and dangerous techniques the bad guys are working into image spam. Plus, a summary of this week's IT security news. Download Security Wire Weekly.</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>Sven Krasser from Secure Computing discusses new and dangerous techniques the bad guys are working into image spam. Plus, a summary of this week's IT security news. Download Security Wire Weekly.</itunes:summary><itunes:keywords>IT,news,information,technology,news,security,news,IT,security,virus,worm,Trojan,malware,security,identity,theft,phishing,VPN,intrusion,detection,SSL,firewall,root,kit,encryption,spyware,wireless,authentication,security,log</itunes:keywords><author>rwestervelt@techtarget.com (SearchSecurity.TechTarget.com)</author></item></channel></rss>