show episodes
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show is live at 9 AM EST Monday through Thursday and tune in each Friday for a special Tech Corner with some of the industry's brightest minds to discuss the latest challenges, innovations, and technologies. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We wa ...
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Join us as our host Brian Semrau (a full time digital forensics investigator and part time owner of Infosec Chicago) talks about the latest issues plaguing information security. Rather than recapping what thousands of new stories are already talking about, Brian will be discussing the issues behind incidents in the news, techniques organizations can use to stay safe, and the changes the industry needs to make in order to stay a step ahead of the threat-actors.
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
CyberSpeaksLIVE is a weekly InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeaks ...
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Loading …
show series
 
In episode 60, we chat with AJ Yawn about AWS security, compliance in the cloud, choosing an auditor and more. My 3 main takeaways were 1) How to make compliance not suck 2) How to automate security within an AWS environment and 3) What shared responsibility means when managing cloud infrastructure For more information, including the show notes che…
 
In this podcast, Heather speaks with two of Hurricane Labs' Splunkers about machine learning's potential when paired with Splunk. Related articles: Exploratory Data Analysis for Anomaly Detection – Splunk Blogs Cyclical Statistical Forecasts and Anomalies – Splunk Blogs Welcome to the Machine Learning Toolkit – Splunk Docs Machine Learning Crash Co…
 
Today we're joined by SamanthaCowan. Sam is currently the Head of Compliance at HackerOne. She's the former Director of Compliance at OneLogin and former Security Engineer at CoverHound, Cyber Policy, and Zenefits. Sam initially perceive infosec as an "unhappy job", but later found herself taking her MBA and paving her way into the security industr…
 
Discussion on Professor Allen Gwinn's article in The Hill "Our cybersecurity 'industry best practices' keep allowing breaches". Link to original article: https://thehill.com/opinion/technology/553891-our-cybersecurity-industry-best-practices-keep-allowing-breaches (permalink: https://cite.law/M57E-TSVT) Article summary ends and analysis starts at 5…
 
Principal Research Scientist for Human Behavior at Forcepoint, Margaret Cunningham shares her story of how she landed in cybersecurity. With a background in psychology and counseling and not feeling that one-on-one counseling was her thing, Margaret had a transformational moment in her PhD program in applied experimental technology when she realize…
 
In this third episode of Through The TechVine Live Radio Program, we talk about things that may and may not happen in a galaxy, far, far away as new technology is allowing us to discover, and hopefully decode soon, Fast Radio Blasts never detected before, we then come back to Planet Earth and see how we now can use technology to monitor cows and pr…
 
Guest Adam Tagert is a Science of Security (SoS) Researcher in the National Security Agency Research Directorate. The National Security Agency (NSA) sponsors the Science of Security (SoS) Initiative for the promotion of a foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefens…
 
Diplomatic Backdoor afflicts Africa, Europe, and Southwest Asia. Electronic Arts source code stolen. “Fancy Lazarus” is back: despite the name, it’s an extortion gang, not an espionage service. An international law enforcement action takes down a credential market. Making good data available for AI research. There’s a growing appetite for cyber reg…
 
Davin shares his story how he went from a stealth fighter mechanic, to PC tech, to pentester and streamer. Davin discusses how he used streaming and blogging to help build a name in the community to further his pentesting career. ________________________ Guest Davin Jackson On Twitter 👉 https://twitter.com/Djax_Alpha On Linkedin 👉 https://www.linke…
 
Katherine Druckman, Doc Searls, and Shawn Powers talk discuss Apple's new privacy features, the Anom app, and the problems with cloud storage. Subscribe to our newsletter. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube Mastodon Special Guest: Shawn Powers. Support Reality 2.0 Links: Apple unveils new privacy features, dig…
 
Nicola is the co-founder of Titania Group and a champion of neuro-diversity within the cyber security industry. In this interview she discusses her entry into the cyber security industry, receiving her MBE and her vision for a future more like Star Trek than 1984. Thank you, to Nicola for an absolutely awesome interview. To find out more about Nico…
 
JBS paid $11 million ransom to cybercriminals Electronic Arts’ gaming source code stolen in hack Largest stolen creds market seized by law enforcement Thanks to our sponsor: Trend Micro Want to discover new ways to simplify and strengthen your security? Join Trend Micro Perspectives on June 16, where industry experts and practitioners will share de…
 
JBS discloses that it paid REvil roughly eleven-million dollars in ransom. REvil not only had a good haul, but the gang made a few points about its brand, too. Colonial Pipeline explains, and defends, its decision to pay ransom. The US Congress has a third-party problem that constituents may or may not notice. Dan Prince from Lancaster University o…
 
GitHub once again expands its security posture buy announcing GitHub secret scanner that looks for package registry credentials in code. This episode goes into the details of what this is and what the future of coding looks like. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Fi…
 
Kylie “KT” Boyle joins us in the latest episode of The New CISO, which is also the beginning of a new segment: The New CISO Foundations. Every security program is built off of a foundation; this episode will focus on KT’s mission and what building blocks his organization represents. Background KT Boyle leads Anubis Security Groups. He has been in t…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, June 7-11, 2021, is hosted by Steve Prentice (@stevenprentice) with our guest, Robert Wood, CISO, Centers for Medicare & Medicaid Services Thanks to our sponsor: Trend Micro Want to discover new ways to simplify and strengthen your security? Join Trend Micro Perspectives on Ju…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Emerging Ransomware Targets Dozens of Businesses Worldwide JBS paid $11 million to REvil ransomware, $22.5M first demanded New TLS Attack Allows User Data Extraction, Code Execution DarkSide Pwned Colonial With Old VPN Password Biden revokes Trump-era executive orders that soug…
 
It’s basically the FBI’s greatest fantasy come to life: Owning an operating an encrypted communications company exclusively used by some of the world’s most hardened and organized criminals. “Anom” the subscription based network operated by the feds, was used as the ultimate spy tool that gave an almost godlike view of organized crime to FBI agents…
 
This week on the Transatlantic Cable podcast, Jeff, Ahmed, and I look at how the DarkSide gang was able to use an old VPN account to breach the Colonial pipeline network. Moving on, we also chat about two related stories, including one in which lawmakers try to force companies to disclose attacks and one about the FBI reclaiming some of the $4.4 mi…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/starting-pay-for-cyber-staff/ What should an entry level cybersecurity person be paid? And what level of education and training should be expected of them? Check out this post for the basis for our conversation on this week’s episode which features me, David Sp…
 
Hey everybody, happy June! Our pal Joe is back to cover some great security stories with us, including: Peloton's leaky API Some Colonial Pipeline discussion (story 1, story 2) Amazon Sidewalk doesn't really share your Internet connection with neighbors/strangers. The Hacker News article doesn't do an awesome job of clearing that up either.…
 
Deidre Diamond shares her wisdom regarding diversity and inclusion, specifically in the Cybersecurity space. She represents the 1% of founding female Tech CEOs and joins us for an engaging discussion. Deidre Diamond shares her experience with diversity and inclusion, specifically in the Cybersecurity space. She represents the 1% of founding female …
 
Criminals are caught in a encrypted chat trap, should you trust Apple's repair team with your sexy snaps, and do you think the FBI should be able to tell who has been reading the USA Today website? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole…
 
SentinelOne attributes the cyberespionage campaign against Russia’s FSB to Chinese services. President Biden replaces his predecessor’s bans on TikTok and WeChat with a process of engagement, security reviews, and data protection. More on the FBI-led Operation Trojan Shield. Privateering, again. NATO’s Article 5 in cyberspace. Joe Carrigan weighs i…
 
If you're interested in learning more about the Payment Card Industry Data Security Standard (PCI DSS), head on over to https://www.pcisecuritystandards.org/. You should also check out Jeff's regular podcast, Security & Compliance Weekly. If you're wondering how GitHub actually landed on their new acceptable use policy (AUP), check the diff, or rea…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Crypto-Mining Attacks Targeting Kubernetes Clusters via Kubeflow Instances Update Your Windows Computers to Patch 6 New In-the-Wind Zero-Day BugsSiemens, Schneider Electric Inform Customers About Tens of Vulnerabilities Adobe Patches Major Security Flaws in PDF Reader, Photosho…
 
Let's face it; if you are a serious live music fan, there are good chances that you have - at some point in time - overpaid your ticket by getting it from some sketchy person outside the concert venue or from some even sketchier bot online. Nobody likes scalpers of any kind. The artist doesn't make extra money, the fan pays way more than what is fa…
 
The FBI seized a large portion of the funds DarkSide obtained from its extortion of Colonial Pipeline. An international sweep stings more than eight-hundred suspected criminals who were caught while using an encrypted chat app law enforcement was listening in on. CISA advises users to update their VMware instances. A new phishing campaign distribut…
 
You'll hear insights from a place seemingly far afield from tech: real estate investing. Elliott Elkhoury is the founder of Ace Properties, a guru on financial independence through real estate. Elliott Elkhoury is the founder of Ace Properties, a guru on financial independence through real estate, and perhaps most surprisingly: a massive voice on T…
 
Deb was covering the Cybersecurity Beat when most people didn't even know what it was, way before it was cool, and back when a professional journalist understood the difference between hackers and cybercriminals. As promised during our first short conversation about resilience during RSA Conference, we are back behind the microphones, and we dig de…
 
Whether the human element means creating a toxic-free environment for employees, navigating the maze of organizational politics and detractors, building the human firewall, or marketing security, people and culture are central to security. Focus on people and align vision and approach to achieve strategic organizational and security culture change.…
 
Apple held its annual World Wide Developer Conference and once again announced several new security and privacy improvements. Thie episode goes through the top new features that are coming in iOS15 later this year. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: New UAF Vulnerability Affecting Microsoft Office to be Patched Today U.S. Recovers $2.3 Million Ransom Paid to Colonial Pipeline Hackers Critical Vulnerabilities Patched in Android With June 2021 Security Updates Windows Container Malware Targets Kubernetes Clusters StackOverfl…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/excuse-me-what-bribes-do-you-accept/ The security vendor/practitioner sales cycle would go a lot faster and smoother if CISOs would just take an "incentive" for a meeting. Just tell me what "incentive" you would like. I'm sure it'll cost me a lot less than what…
 
You absolutely can phish your people secure. Just kidding. Phishing (and keeping people from falling for phishing) has been such a train wreck. The sad fact is that more phishing exercises once a year isn't going to solve the problem. The answer? We have some ideas as you can imagine. Hosts Rafal Los On ITSPmagazine 👉 https://www.itspmagazine.com/i…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login