Computer Security public
[search 0]
×
Best Computer Security podcasts we could find (updated May 2020)
Best Computer Security podcasts we could find
Updated May 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019." Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
The Future State Podcast will be tackling the issues at that intersection of technology, politics, and national security. Host Richard A Clarke served the last three Presidents as a senior White House Advisor holding the titles of Special Assistant to the President for Global Affairs, National Coordinator for Security and Counterterrorism, and Special Advisor to the President for Cyber Security. He will be talking to some of the most fascinating people on the front lines. In Season 1, Richar ...
 
Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon has over 19 years of experience in government and corporate cybersecurity providing you expertise that you will find value from the very first weekly podcast. Shon will provide you detailed CISSP training along with sample CISSP exam questions while utilizing colorful commentary to enhance the over ...
 
Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies. Guests share what they are currently working on, how they got to where they are today, who they are trying to help, and what keeps them motivated to overcome challenges along the way. The goal is for the rest of us to learn from their experiences and go on to promote usable security and privacy within our own pro ...
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
The CyberJungle is the nation's first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fast-paced and includes hard hitting news analysis. Formerly The Data Security Podcast.
 
Ever wonder how technology has transformed your life? In this entertaining and informative podcast, Kim Komando provides insight on the ever-changing tech issues and topics that are relevant to you. This free podcast featuring interviews that Kim conducts with experts in their field. You'll gain an in-depth understanding of a wide variety of topics such as the Dark Web, the life of digital nomads, staying focused on the road, what it takes to keep the lights on and so much more. Subscribe be ...
 
The Exascale Computing Project (ECP) is accelerating delivery of a capable exascale computing ecosystem to provide breakthrough solutions that will address America's most critical challenges in scientific discovery, energy assurance, economic competitiveness, and national security. Let’s Talk Exascale explores Application Development, Software Technology, and Hardware and Integration—focus areas of the ECP.
 
SecuraBit is an information security podcast that features some of the biggest names in the industry who come on to talk to us about what they're up to. We also engage in both light and heavy discussion on the latest news and goings on in the community. We aren't intended to be an authoritative source of information if you're writing a paper for some infoseec class inc ollege. Our goal is to bring the community closer together and to help people understand who the movers and shakers are in t ...
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Meher Roy, Sunny Aggarwal, and Friederike Ernst. Since 2014, episodes have been downloaded over 4 million times.
 
Hey guys, welcome to NetworkChuck!! I love IT, Networks, VoIP, Security, Python..........IT's AWESOME!!! But my passion is helping people get started on this incredible career path. I make videos that help you get started in IT and keep you motivated along the way as you pursue GREATNESS. *****Want to help me create more videos? Hit me up on Patreon: https://patreon.com/networkchuck
 
Hosted on the www.embedded-computing.com website as well as iTunes, Google Play, Spotify, Stitcher, and Alexa, the Embedded Insiders Podcast is a fun talk show for electronics engineers. Each week, Rich Nass, Brandon Lewis, Alix Paultre, and Laura Dolan of Embedded Computing Design tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, and other technology marketplaces in a light and accessible format.
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Loading …
show series
 
Both Segments: Scott Schober, Cyber Security Expert, Author Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a forty-six-year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. Schober also invented BVS’s cell phone detection tools, used to …
 
Both Segments: Popzara.com. Nathan Evans, Managing Editor. Throughout Popzara you’ll find views on gaming, movies, technology, cultural icons and so much more. Reviews and previews, in-depth analyses, opinion pieces, conversations, and a regularly updated Podcast help keep things interesting and always entertaining. Our diverse editorial staff is c…
 
This week, we welcome Greg Foss, Senior Threat Researcher at VMware Carbon Black's Threat Analysis Unit, to talk about 2020 MITRE ATT&CK Malware Trends! In this week's Security News, NSA warns Russia-linked APT group is exploiting Exim flaw since 2019, 'Suspicious superhumans' behind rise in attacks on online services, Hackers Compromise Cisco Serv…
 
This week, we welcome Greg Foss, Senior Threat Researcher at VMware Carbon Black's Threat Analysis Unit, to talk about 2020 MITRE ATT&CK Malware Trends! In this week's Security News, NSA warns Russia-linked APT group is exploiting Exim flaw since 2019, 'Suspicious superhumans' behind rise in attacks on online services, Hackers Compromise Cisco Serv…
 
In this edition of the Embedded Insiders, Brandon and Rich wonder how the COVID-19 pandemic has been affecting the tech sector, both from a financial perspective and with regards to the productivity of engineers now working at home. Are those engineers executing, innovating, or just relaxing? Later, Rich interviews Jean Labrosse, formerly a disting…
 
Show news, 5G Quantum Oscillations, Ragnar, Windows Hello, Facebook, and FISA! Show Notes: https://wiki.securityweekly.com/SWNEpisode38 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly…
 
NSA warns that the GRU’s Sandworm outfit has been actively exploiting a known vulnerability in Exim. Someone is attacking industrial targets in Japan and Europe using steganography and other evasive tactics. NTT Communications is breached, and Michigan State University sustains a ransomware attack. Ben Yelin unpacks the President’s executive order …
 
In March, T-Mobile closed 80% of its stores due to the coronavirus pandemic. How did they manage a huge workforce of more than 110,000 employees? Kim chats with Jon Freier, T-Mobile's Executive Vice President of Consumer Markets, about the company's pivot during the pandemic, how to lead during a crisis and T-Mobile's on-going commitment to the mil…
 
On today’s show, host Abe Thompson chats with Erin Miller, Vice President of Operations for Space ISAC at National Cybersecurity Center. They discuss the development of Space Force, ISACs and ISAOs, and allowing information sharing. Listen and join in on the conversation! Visit our sponsors: Cyber Resilience Institute BlockFrame Inc. SecureSet Acad…
 
Both Segments: Computer And Technology News. Topics: Donald Trump’s move against Twitter factchecking could backfire | Technology | The Guardian Defying Trump, Twitter Doubles Down on Labeling Tweets – The New York Times Zuckerberg dismisses fact-checking after bragging about fact-checking | Ars Technica A $350 “anti-5G” device is just a 128MB USB …
 
Hackers-for-hire find criminal work during the pandemic. The US Department of Energy is said to have taken possession of a Chinese-manufactured transformer. US President Trump may be considering an Executive Order about the legal status of social media. Contact-tracing apps in France and the UK are scrutinized for privacy. Ben Yelin from with the l…
 
Inside Science this week is all about our information - the stuff we volunteer and the traces our everyday movements leave behind.With the launch of NHS Test and Trace across England, if you start to feel unwell with suspected Covid-19 and call a new NHS hotline 119, you’ll be tested for the virus. Your close contacts will be traced and, if you tes…
 
In this inaugural post-interview chat, Friederike and Sebastien discuss their recent interview with Arweave Co-founder and CEO, Sam Williams. Moving forward, these conversations will be released every week on Substack. Subscribe to never miss an episode at https://epicenter.rocks/substackBy Sebastien Couture, Friederike Ernst
 
This week, we talk Enterprise News, to talk about the MITRE ATT&CK for ICS: A Technical Deep Dive, Tufin Expands Security Automation Capabilities, Strengthen Business and Security Alignment with ThreatConnect, BeyondTrust Privilege Management for Windows and Mac SaaS Accelerates and Enhances Endpoint Security, Re-imaging threat detection, hunting a…
 
This feature podcast series is produced with the assistance of the Hewlett Foundation’s Cyber Initiative. They gave us a grant so we could spend more time focussing on issues around cyber policy, and today we’re really going to hook in to a topic that’s near and dear to my heart: alternative approaches to dealing with ransomware. Regular listeners …
 
Berserk Bear is back, and snuffling around Germany’s infrastructure. Two new Android issues surface. India opens up the source code for its COVID-19 contact-tracing app as such technological adjuncts to public health continue to arouse privacy concerns. [F]Unicorn poses as Italy’s Immuni app. An alleged FIN7 gangster is arrested. Australia’s Data61…
 
A lot of hype has generated around the Chinese vision of social ratings. People on both sides of the aisle have chimed in. However one thing that is often left off the table is that social ratings are around all of us whether we like it or not. For this edition of the Kaspersky Transatlantic Cable podcast, Dave and I sit down with Marco Preuss to d…
 
Doc Searls and Katherine Druckman talk to Bruce Schneier about contact tracing, digital identity, hacking, privacy, and regulation. Show notes: 0:00:25: Contact tracing apps 0:02:31: Contract tracing false positive and false negative 0:04:24: Contract tracing apps adoption rate 0:07:36: Katherine agrees apps should build more trust 0:11:44: The 2nd…
 
On this week’s show Patrick and Adam discuss the week’s security news, including: German intelligence warns of widespread Russian infrastructure hacks NGOs urge COVID-19 hack de-escalation UK mulls total Huawei ban… we think it’s a done deal DHS warning on 5G “moronavirus” Wen jailbreak? NOW JAILBREAK!! iOS 14 leaks Much, much more… This week’s spo…
 
This week, Defcon is still cancelled, Cyber insurance?, Phishing, rogue drones, the return of the dark web, Sarwent malware, and Dutch Grandmothers in trouble. Jason Wood joins us for the Expert Commentary on how eBay users spot the online auction house port-scanning their PCs! Show Notes: https://wiki.securityweekly.com/SWNEpisode37 Visit https://…
 
Turla tunes its tools. The commodity Trojan AnarchyGrabber is now stealing passwords. A new iOS jailbreak has been released. The UK reconsiders its decision to allow Huawei into its 5G networks. A tech group lobbies the US House against warrantless inspection of searches. Remote work’s regulatory risk. COVID-19 conspiracy theories. Hackers say they…
 
On today’s show, host Abe Thompson sits down with Umesh Verma, CEO of Blue Lance as well as the founder of Cyber Houston and the Houston Cyber Summit. They discuss the data behind cyber hygiene, 20 internal controls that are basic block and tackling, and the startling results of the free cyber scans which he offers. Listen and join in the conversat…
 
In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Steve Hanna joins us to talk about COVID 19 and the security risks that go along with the "new normal" that has emerged out of the pandemic. While organizations face challenges securing remote workers, Steve also sees more than a glimmer of a silver lining to the disrup…
 
The internet was originally created as a platform to communicate freely, but it soon became a place where people could be monitored, controlled, and censored. 98% of content on the internet is deleted every 20 years. More surprisingly, based on a Twitter study, a third of links change their content fundamentally or are removed completely, within th…
 
Lots to cover in this week's Network Break podcast, including a consortium of telcos and Facebook laying new undersea cable in Africa, new features for service providers and enterprises in Cisco's ACI 5.0, why Intel bought Rivet Networks, software and Wi-Fi for contact tracing, AT&T getting called on misleading 5G advertising, and more. The post Ne…
 
Loading …
Google login Twitter login Classic login