it security 15

A number of different security vendors and security researchers now post weekly podcasts on security topics. Using a search engine, locate three different podcasts about computer security. Listen to them. Next, write a summary of what was discussed and a critique of the podcasts. Were they beneficial to you? Were they accurate? Would you recommend them to someone else? List the three different URL’s and a 150 word summation of your results.