In our March episode, the LiveSecurity analyst team discusses two months worth of InfoSec news during our Security Story of the Month segment. We cover new weaknesses in a cipher associated with ...
During this month's Security Story of the Month segment the LiveSecurity analyst team discusses the biggest InfoSec stories from January. Topics include wide-spread Java zero days, a nasty new ad...
Last episode, we reviewed our 2012 security prediction results. This time we unveil WatchGuard's 2013 security predictions. They cover topics like life-threatening hardware hacks, mobile device p...
We're nearing the end of the year, which means it's prediction time. In the first of two special episodes, the Radio Free Security team looks back at our 2012 security forecasts. Did our predicti...
In October's Security Spotlight, Ben Brobak and Corey Nachreiner unveil the secret culprit for most security breaches. More importantly, they discuss firewall policy best practices that will help...
Digital network attacks that can blow up generators, shut down power grids, or damage nuclear facilities seem like the stuff of science fiction. However, we currently live in a world where nation...
August's abbreviated episode includes an exciting Security Story of the Month segment and a trip down memory lane, with the Tip-o-matic 650. In this month's security news recap, Richard Gilmour, ...
In July's Security Spotlight, guest host Ben Brobak interviews Corey Nachreiner about the most interesting briefings he attended at this year's Black hat security conference. They discuss the imp...
Ben and Corey discuss the Flame worm in this month's Security Spotlight. What does this malware do, how does it spread, and how can you protect yourself from this type of advanced attack. They al...
In this month's Security Spotlight, Corey and Peter discuss Application Control; What is it? What can you do with it? And how do you get started? Learn how this powerful new security tool can inc...
In this month's Security Spotlight, Corey chats with WatchGuard's Director of Product Management about the history of virtualization and its security ramifications. He also learns about WatchGuar...
In this episode, we return to our regular format. During the first segment, Corey interviews guest expert, Dean Colpitts, to discuss practical ways IT administrators can manage and secure Mobile ...
Last episode we looked back at WatchGuard's 2011 security predictions. Now it's time to look towards the future. Do you know what security threats and trends you should expect this year? If not, ...
Radio Free Security returns after two years radio silence! In this episode, Corey Nachreiner looks back at WatchGuard's 2011 security predictions with Tim Helming and Ben Brobak, to see how well ...
In this double dose of Radio Free Security, Senior Network Security Analyst Corey Nachreiner, CISSP, and WatchGuard Trainer Nathan Buff talk about two months worth of security stories. Topics inc...
In the inaugural 2009 episode of Radio Free Security, Senior Network Security Analyst Corey Nachreiner, CISSP, and WatchGuard Trainer Nathan Buff talk about a huge industry data breach, a fast sp...
Senior Network Security Analyst Corey Nachreiner, CISSP, and Information Security Analyst Scott Pinzon, CISSP, host their second annual Security Predictions episode. They assess and score the six...
Senior Network Security Analyst Corey Nachreiner, CISSP, details the happy results of Internet Service Providers (ISPs) shutting down McColo.com, but he questions the methods used. Danny McPherso...
WatchGuard trainers answer a network administrator's question about how to lock down a high school's network. Greek researcher Elias Athanasopoulos explains how social networking sites such as Fa...
Dave Piscitello, Senior Security Technologist for ICANN and a member of the Anti-Phishing Workgroup (APWG), describes how scam artists utilize second-level domain names to make it harder for auth...
In his Security Story of the Month, Corey Nachreiner, CISSP, describes the compromise of Best Western Hotels in Germany, and why it is not "the greatest cyberheist in history," as the Glasgow Sun...
In this month's episode, VP of Marketing Eric Aarrestad discusses WatchGuard's roadmap in the coming year - the release of XTM, or "Extensible Threat Management" products. Also, Tech Support Team...
Two disgruntled men figured prominently in the news last month. Corey Nachreiner, CISSP, considers what lessons we can learn from engineer Terry Childs, who locked the City of San Francisco out o...
In this month's episode, Radio Free Security's Scott Pinzon and Corey Nachreiner, both CISSPs, analyze the recent news of a potential "DNS cache poisoning" scare. They explain what it is, and how...
In his Security Story of the Month, Corey Nachreiner, CISSP, briefly touches on several topics, including hackers taking over a server related to Citibank; poor disclosure at online catalog compa...
In this month's episode, Ian Kilpatrick of England's Wick Hill Group discusses how Europe is setting the pace for technology that is environmentally responsible - and how WatchGuard's UTM product...
Corey Nachreiner, CISSP, explains how the newly announced rootkit for Cisco IOS works, and what to do about it. Dave Piscitello of ICANN describes a hack where Comcast lost its domain names tempo...
In this month's episode, we take a deep dive into Report Manager, which was completely redesigned in Fireware Version Ten. We'll hear three perspectives on it -- from Product Manager Steve Fallin...
Corey Nachreiner, CISSP, demystifies the workings of attacks that make legitimate web sites serve malicious software to their customers. Topics explained include SEO poisoning (sometimes called "...
This month, we tackle one big topic: Helping you navigate the LiveSecurity web site. What are the key resources to help LiveSecurity subscribers use our products, and where exactly are they locat...
A Very Special Episode: Welcome Newbies! This month's program is dedicated to new IT personnel who want to learn network security, but have almost no money or time. Fred Avolio, one of the invent...
Online safety consultant and "white hat stalker" Linda Criddle of Look Both Ways describes how predators can grab information you thought was private. Scott Pinzon, CISSP, and Corey Nachreiner, C...
In this episode, we introduce a brand-new appliance, the WatchGuard SSL VPN. Training expert Kyle Porter explains Single Sign-On authentication, a new feature in Version 10. Sales engineer Pete A...
In this episode, sales engineer Pete Adams describes several features of System Manager that show you exactly what's happening on your network. Training experts Nathan Buff and Kyle Porter talk a...
A mysterious attack placed trojans on over 10,000 legitimate web sites, causing them to distribute malware to their customers. How was it done? Corey Nachreiner, CISSP, reports. Chris Squier, CIS...
In this first episode, tech support experts Nathan Buff and Kyle Porter give you fine tuning tips for remote authentication. Product managers Tim Helming and Tom Fischer preview of Fireware Versi...
Scott Pinzon, CISSP, and Corey Nachreiner, CISSP, predict six developments in network security during 2008, covering topics such as international cyberwarfare, IPv6 adoption, OS X security, botne...
Corey Nachreiner, CISSP, interviews UK security pro Steve Huddleston about Her Majesty's Revenue and Customs losing two disks containing PII for 25 million UK citizens. Steve Fallin, Director of ...
Corey Nachreiner, CISSP, details the evolution of the Storm botnet from low threat to state-of-the-art malware. Google hacker Johnny Long explains the concept behind his latest book, No-Tech Hack...
Gary Hinson, CEO of Isect Ltd. In New Zealand, explains how to transform your organization so that all network users have a "security aware culture." Three short "Closetful of Clutter" segments e...
Our recap of Black Hat 2007 includes a report by network security analyst Corey Nachreiner on the Estonian cyber-riot, including what techniques worked for the attackers and what worked for the d...
Dave Piscitello, a fellow of the ICANN Security and Stability Committee, explains how criminals use DNS fast flux techniques to make illegal web sites difficult to trace and shut down. Then, in a...
Network security professionals discuss the persistent Distributed Denial of Service attack that plagued Estonia for over two months, and the sudden attack on 10,000 Italian web sites. Corey Nachr...
Corey Nachreiner, CISSP, reports on his findings after purposely letting bot nets infect his test network. Veteran technologists discuss security tactics and tips, including: reduced user rights ...
Veteran network administrator Steve Fallin decodes the strange dialect of marketing copy, then gives practical tips on how to get the right technology product on the first try. Corey Nachreiner, ...
Corey Nachreiner discusses the odd backstory behind last month's gargantuan patch of 45 vulnerabilities in Apple's OS X. In the Feedback segment, Scott Pinzon highlights upcoming free security tr...
LiveSecurity Editor-in-Chief Scott Pinzon, CISSP, interviews network security analyst Corey Nachreiner about threats emerging from February. Covered: drive-by pharming, Distributed Denial of Serv...
The inaugural episode of Radio Free Security! LiveSecurity Editor-in-Chief Scott Pinzon interviews network security analyst Corey Nachreiner about emerging threats from January. Covered: Flaws in...