Episode 47: Top security holes for 2010

Jan. 12, 2010
In Episode 47 of SIW Radio's podcast series, SecurityInfoWatch.com editor Geoff Kohl speaks with Kevin Beaver about the top security holes affecting businesses. We cover web applications, social engineering, physical security, databases and network flaws. In the episode, we also take a look at the newly released edition of "Hacking for Dummies", which is a guide for business professionals to test their IT systems for security weaknesses. We close by examining the one thing that Kevin thinks businesses should do to minimize security weaknesses.
In Episode 47 of SIW Radio's podcast series, SecurityInfoWatch.com editor Geoff Kohl speaks with Kevin Beaver about the top security holes affecting businesses. We cover web applications, social engineering, physical security, databases and network flaws. In the episode, we also take a look at the newly released edition of "Hacking for Dummies", which is a guide for business professionals to test their IT systems for security weaknesses. We close by examining the one thing that Kevin thinks businesses should do to minimize security weaknesses.

Arkadiusz Warguła / iStock / Getty Images Plus via Getty Images
Maliciously crafted inputs can exploit machine learning models at the algorithmic level, bypassing traditional cybersecurity defenses.
Pakhnyushchyy / iStock / Getty Images Plus via Getty Images
Advocates highlight that with proper oversight and adherence to the Five Cs — Community Engagement, Civil Liberties Protection, Common Procedures, Clear Oversight, and Cybersecurity — drones can enhance public safety without compromising civil rights.