×
Information Security public
[search 0]
×
Best Information Security podcasts we could find (updated February 2020)
Best Information Security podcasts we could find
Updated February 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Crypto-Gram is a free monthly e-mail newsletter from security expert Bruce Schneier, with over 100,000 readers. Each issue is filled with interesting commentary, pointed critique, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news. This is the audio version of the Crypto-Gram Newsletter, and is read by Dan Henage.
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
 
"America First" was created by Dr. Sebastian Gorka ("Dr.G"), former Special Advisor to the President of the United States and Fox News National Security Strategist, to be the new front lines in the ongoing Culture War against the Left. In each episode, Dr.G will inform you about the Leftist assault on our traditional values and he will define how we win against them. Every episode features a retinue of amazing guests who augment the basic message that we must put our country first and we mus ...
 
Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
 
Loading …
show series
 
This is Frank Gaffney with the Secure Freedom Minute. In another important Trump administration effort to expose and counter Communist China’s ongoing “unrestricted warfare” against us, the State Department announced Tuesday that five of Beijing’s most important propaganda instruments would be treated as what they are: agents of the Chinese state. …
 
Sonicwall Vulnerabilities https://psirt.global.sonicwall.com/vuln-list https://blog.scrt.ch/2020/02/11/sonicwall-sra-and-sma-vulnerabilties/ SQL Server RCE Exploit https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/ Ransomware in Switzerland https://www.melani.admin.ch/melani/en/home/dokumentation/newsletter/sic…
 
Do you know what your attackers know? There’s a good chance you know, but you might not be aware of just how much information can be found historically and in real-time about your business operations and organization. Join Jordan Drysdale and Kent Ickler as they discuss and demonstrate Purple Team Enterprise Reconnaissance methods that increase […]…
 
Title: Delivering Trust and Confidence Description: This episode of the Information Security Podcast features a conversation with Kurt Van Etten @kurtvanetten from RedSeal and host Rob Nettgen (@Robert_Nettgen). This episode discusses the process of enabling a Security Team the capability of “Delivering Trust and Confidence” within their organizati…
 
Welcome to episode 67 of the UNSECURITY podcast. This week, Evan and Brad discuss roles and responsibilities. One of the foundational components of information security is understanding and implementing roles and responsibilities. Part one of a two-part episode, this week talks about information security roles and responsibilities at a macro level.…
 
The black letter law and articles in this episode are:U.S. Air Force JAG Corpshttps://www.airforce.com/careers/specialty-careers/jag/overviewU.S. Army JAG Corpshttps://www.goarmy.com/jag.htmlU.S. Coast Guard JAG Corpshttps://www.uscg.mil/resources/legal/U.S. Marine JAG Corpshttps://www.marines.com/becoming-a-marine/officer/marine-corps-law-program.…
 
British and American authorities blame Russia’s GRU for last October’s defacement campaign against Georgian websites. Senator Sanders thinks maybe some of his apparent supporters are Russian bots--the ones who are tweeting bad stuff in social media. Julian Assange says he was offered a pardon to say the Russians didn’t meddle with the DNC. Stolen d…
 
This week, Matt is joined by Scott Lyons and Josh Marpet to talk Enterprise News, and how IBM announced RSA Conference withdrawal, Dell Offloads RSA, 12 hottest new cybersecurity startups at RSA 2020, and lots of funding announcements! In the second segment, CEO of Red Lion LLC. Scott Lyons will provide an overview of their CTF at InfoSec World 202…
 
Another day another breach to talk about. Today MGM resorts had 10 million records from a breach last year posted online. This episode talks about the breach and what you can do to protect yourself if you are part of it. Have I Been Pwned - https://haveibeenpwned.com/ Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Pa…
 
These Soap Box podcasts are wholly sponsored. That means everyone you hear on one of these editions of the show, paid to be here. But that’s ok, because we have interesting sponsors! Today’s sponsor is AttackIQ. They make an attack and breach simulation platform. They started sponsoring risky biz when they were a little baby startup, but these days…
 
This week, we welcome Jeff Recor, Global IRM Lead at Accenture, to talk about how Integrated Risk Management is the New GRC! Jeff was scheduled to be part of the 'Security vs. Compliance' Roundtable (https://securityweekly.com/shows/security-vs-compliance-psw-632-2/) recorded on Dec. 19, 2019, but got snowed out! Show Notes: https://wiki.securitywe…
 
CISA reports a ransomware infestation in a US natural gas compression facility--it arrived by spearphishing and there are, CISA thinks, larger lessons to be learned. A new threat actor, possibly linked to China’s government, is running an espionage campaign against gambling and betting operations in Southeast Asia. More notes on firmware signatures…
 
Interview with Brett Hansen, South Pacific Country Manager for Milestone Systems. Brett is responsible for driving Milestone Systems across a diverse range of new and existing markets in the region, while facilitating large-scale projects and partnerships, as well as leading the company’s local team. Brett provides an overview of the Milestone Syst…
 
This week, Quantum Crypto Chaos, IBM Cloud Vulnerabilities in CICS, Crowded Flounder and Hacking Back, Turkish RATs, Israeli soldiers catfished by HAMAS, and the Julian Assange Trial: Australian PMs trying to prevent extradition to the United States! Show Notes: https://wiki.securityweekly.com/SWNEpisode13 Visit https://www.securityweekly.com/swn f…
 
Threat hunting has become a buzzword in the industry of late. But what is it all about? Why should companies consider using threat hunting as a part of their security strategy? Connor Morley, threat hunter with F-Secure, stops by to discuss how his craft helps companies take a proactive approach to security. Links: Episode 35 transcript Whitepaper:…
 
An investigation identified over 500 malicious Chrome extensions in the Google web store that were ultimately removed. This episode talks about what those extensions were doing and what you can do to protect yourself in the future. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the po…
 
“The geopolitical area is set to remain fairly complex. I would also say sort of turbulent and fragile as the US and China battle it out for global dominance”In this week’s podcast, we bring you the fourth episode in a series focusing on Forecast 2020: the global security threat outlook. Throughout the series, Steve Durbin, Managing Director of the…
 
Full notes and graphics are on www.brakeingsecurity.com Episode 2020-006 Book club “And maybe blurb for the cast could go something like this. Book club is starting up again with Hands-On AWS penetration testing with Kali Linux from Gilbert and Caudill. You read and get together to discuss or demo every Monday. Get the book, start reading and meet …
 
Back by popular demand, we’re talking more safety tips for business travel. Discover what you can do to make your hotel room safer, how to use Faraday bags and why you should bring your own safe with you. For more: www.thesecuredad.com/podcast Find Home Security: The Secure Dad’s Guide exclusively on Amazon: https://amzn.to/2JUV3Z6 Support the miss…
 
Discovering Contents of Folders Without Permission https://isc.sans.edu/forums/diary/Discovering+contents+of+folders+in+Windows+without+permissions/25816/ Ring Enforces 2FA https://blog.ring.com/2020/02/18/extra-layers-of-security-and-control/ Iranian's finally discover VPN Vulnerabilities https://www.clearskysec.com/fox-kitten/ WordPress ThemeGril…
 
(2020-01-31) It sounds unbelievable but this is the 10th episode of What The Beer Farmers think, a highly-irregular show about (information) security; and this time specifically about: BeerConOne: what happened, what did not and general reflections; thought leaders, influencers, vendors, toxicity - 18 months later; High Risk Vendors; 21 years of SQ…
 
On this week’s show Patrick and Adam discuss the week’s security news, including: Ransomware shutters US natural gas plants Huawei hit with huge indictment Voatz mobile voting app shredded by MIT, dust-up ensues The latest from the Vault7 trial Reality Winner seeking clemency Ring to force all users on to 2FA Israeli court rules Facebook must reins…
 
Loading …
Google login Twitter login Classic login