×
Infosec public
[search 0]
×
Best Infosec podcasts we could find (updated January 2020)
Best Infosec podcasts we could find
Updated January 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Join us in the fight against cybercrime with weekly conversations about cybersecurity skills, jobs and industry trends.
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security experts, Caroline Wong and Vanessa Sauter, as they focus on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
Some real world sysadmins give you the news, and chat about sysadminning in the industry.
 
We podcast all things system administration/engineering/infosec, with a strong focus on GNU/Linux. We use F/OSS software whenever possible in the production of these podcasts. Please be sure to view our show notes on the site!
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
A list of some of my favorite Infosec podcasts and other podcasts that I think are great.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Security Nation is a podcast dedicated to celebrating the champions in the cybersecurity community who are advancing security in their own ways. We also cover the biggest events in security that you should know about.
 
Information Security Podcast
 
The 2112 Group's CEO and Chief Analyst Larry Walsh, one of the most recognizable figures in the IT channel and infosec communities, leads thought-provoking discussions with expert guests on a wide range of technology and business topics including: cloud computing, information security, business analytics, the Internet of Things (IoT), and much more.
 
It's hard to keep up with the latest infosec tools, let us help. Each episode join members of the Varonis security team, tool authors, and experts to learn about a new security tool for pentesting, defense, data exfiltration, or vulnerability checking.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
We need to talk about InfoSec is a podcast where we get real about the current state of Information Security. Join the talk with Laura Kankaala! Powered by Disobey.
 
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
Entertaining stories of how others got into Information Security and Cyber Security so you can be inspired and learn from their experience.
 
Bring Your Own Security Radio is hosted by Dave The IT Guy, CISSP, CEH and MCSE who brings you both the people behind the scenes securing systems from the bad guys, and some of the vendors who bring some of the hardware and software used to help secure an environment. Each episode is one hour in length, and often can provide you one CPE/CEU for your tech certifications simply for listening.
 
Braxton Ehle and Sean Williams rant about the latest in information security news to help enterprises and mere mortals defend their information.
 
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
 
The Latest from the Internet of Things, Tech and InfoSec!
 
The Health Information Security podcast from the Medical University of South Carolina
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Daily-ish (M--F) musings about security and privacy and how it impacts our communities. What questions should as technologists be asking as we build?Watch the show at https://4mn.ca/mwm-video
 
Cyber Speaks LIVE is a weekly InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. Cyber Speaks LIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cybersp ...
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
 
This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.
 
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
 
Bleeding edge and beyond.... Exotic Liability will push you into the new generation of security!
 
We podcast all things system administration/engineering/infosec, with a strong focus on GNU/Linux. We use F/OSS software whenever possible in the production of these podcasts. Please be sure to view our show notes on the site!
 
Loading …
show series
 
From pawning the Department of Justice at the age of ten to protecting Saudi Aramco in the wake of cyberattacks, Chris Kubecka leads an inimitable life. Now the founder and CEO of HypaSec, Kubecka grew up banned from using computers—as ordered by the federal government. Thanks to a moral waiver from the Air Force, Kubecka developed deep technical k…
 
https://www.securityweek.com/attacker-installs-backdoor-blocks-others-exploiting-citrix-adc-vulnerability https://www.securityweek.com/court-approves-equifax-data-breach-settlement https://www.infosecurity-magazine.com/news/equifax-breach-settlement-could/ https://www.natlawreview.com/article/ico-issues-fine-against-national-retailer-security-faili…
 
A daily look at the relevant information security news from overnight. Episode 225 - 31 December 2019 Not so Special - https://www.bleepingcomputer.com/news/security/special-olympics-new-york-hacked-to-send-phishing-emails/ Heritage ransomed - https://www.scmagazine.com/home/security-news/ransomware/ransomware-shuts-down-the-heritage-company/ Chrom…
 
Holly is an expert in cyber warfare and neuro diversity, helping organisation aware, educated and able to adopt best practices for neuro diverse mindsets. Listen to Jenny and Holly chat about her work helping organisations benefit from neuro diverse mindsets, how she became involved and how Family Guy is relevant to Siri. To follow Holly on LinkedI…
 
Welcome to Episode 73 Main Topic Self hosting, vs cloud hosting, vs colo hosting Control Home: full control Colo: less control but still high IaaS: You’ve lost some control, but you still retain some. Decent trade off. SaaS: little to no control Convenience Home: Convenient for access, but just about nothing else. Colo: Access is inconvenient, but …
 
There’s more phishing around the Arabian Gulf, but it doesn’t look local. Reactions to Brazil’s indictment of Glenn Greenwald. The forensic report on Jeff Bezos’s smartphone has emerged, and the UN wants some investigating. Microsoft discloses an exposed database, now secured. Ransomware gets even leakier--if it hits you, assume a data breach. And …
 
Listen in as Jenny and Neira explore her life and career, including her focus, inquisitiveness and the positive action that has put her at the vanguard of new technologies, won her a multitude of awards and brought her well-deserved and widespread industry respect and recognition. Thank you for an awesome and inspiring interview Neira! To follow Ne…
 
Proton Technologies, the maker of ProtonMail, is beginning to make all their client-facing platforms open source. This episode talks about this move and why it's good for users. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Fiv…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-presenting-to-the-board/) What metrics, reports, or strategies should a security professional utilize to communicate the value to the board? Or is the mode of "presenting to the board" a damaged approach? Check out this post for the discussion…
 
In a special breaking edition of Cyber Cipher, Joseph Cox sits down with us to go over the alleged hacking of Jeff Bezos' phone by Saudi Arabia. After the break we have one of Motherboard’s newest reporters on the Uber beat, Edward Ongweso Jr., to tell us all about Uber and its troubles. When Uber truly came onto the scene in the mid-2010s it compl…
 
This podcast is sponsored by Arctic Wolf, whose Concierge Security teams Monitor, Detect and Respond to Cyber threats 24/7 for thousands of customers around the world. Arctic Wolf. Redefining cybersecurity. Visit Arcticwolf.com/7MS to learn more. I'm working on a new security song called Don't Let the Internet Get You Down, and the chorus will go s…
 
A hospital gets hacked because of an ex-employee's grudge, robocalls are on the rise, and we share a scary story about the future of facial recognition. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Michael Hucks…
 
UN rapporteurs say that the Saudi Crown Prince was probably involved in the installation of spyware on Amazon founder Jeff Bezos’s personal phone. Brazilian prosecutors have indicted Glenn Greenwald, co-founder of the Intercept, on hacking charges. IBM describes a renewed NetWire campaign, and Microsoft says StarsLord is back, too. And in cyberspac…
 
Cloud misconfigurations can happen to anyone. Microsoft recently had misconfigured databases that exposed 250 million records going back 14 years. This episode talks about what happened. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Securi…
 
Dave and I open up the 126th episode of the Kaspersky Transatlantic Cable Podcast by following up with the Travelex story from last week. While not a resolution or mission accomplished moment, it is more of a warning of new phone-based scams targeting customers of the company. The second story heads to the adult industry and an unfortunate data bre…
 
A new RAT goes after Arabic-speaking targets. Updates on US-Iranian tension in cyberspace. An Internet Explorer bug is being exploited in the wild; a patch will arrive in February. A pseudo-vigilante seems to be preparing Citrix devices for future exploitation. Mitsubishi Electric discloses a breach. A booter service dumps half a million Telnet cre…
 
Mozilla, the maker of the Firefox browser, recently had layoffs. This episode talks about this move, why they did it and what the future means for Mozilla. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can…
 
Jay and Ben are joined by Daniel Woods. Daniel is a postdoctoral researcher at the University of Innsbruck in Austria. He received his doctorate titled “The Economics of Cyber Risk Transfer” from the Department of Computer Science at the University of Oxford. During his PhD, he visited the Security Economics Lab at the University of Tulsa as a Fulb…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/debunking-the-misused-chased-by-bear-cybersecurity-metaphor/) We don't want anyone to be caught by the bear on the latest episode of CISO/Security Vendor Relationship Podcast. This episode was recorded in person in San Francisco. It is hosted by me, David Spar…
 
Channel chiefs change jobs all the time, but few get the opportunity to build a channel program from the ground up. Channel veteran Bill Lipson not only designed Cohesity’s recently launched channel program, but he did so as an outside consultant that grew into the job. Lipson, a widely regarded channel leader, joins POD2112 to discuss returning to…
 
Hear what goes on internally when Microsoft discovers a major vulnerability within Windows. Guest Thanks to John Lambert for sharing this story with us. Sponsors Support for this episode comes from ProCircular. Use the team at ProCircular to conduct security assessments, penetration testing, SIEM monitoring, help with patches, or do incident respon…
 
Check out Maltego: https://www.maltego.com/ Maltego Twitter: https://twitter.com/maltegohq Check out Maltego use cases: https://docs.maltego.com/support/solutions/articles/15000012022-use-cases This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/…
 
James Patchett is the President and CEO of the New York City Economic Development Corporation. James has spent his career building stronger cities through investments in affordable housing, innovation, and 21st-century infrastructure. During his tenure, he has overseen some of the city’s most ambitious projects, including launching a citywide ferry…
 
Mari Galloway, CEO of Women's Society of Cyberjutsu, and Cyber Work podcast host Chris Sienko discuss Mari's career journey, the ethos of Women's Society of Cyberjutsu, and insights on how to diversify the cybersecurity workforce.– View the transcript, additional episodes and promotional offers: https://www.infosecinstitute.com/podcast– Election se…
 
My audio quality is less than ideal for this because I had a crash and lost my raw audio, so I had to use the Mumble recording for mine. But you know what? It doesn’t matter because see title.Also Paden got WAY too drunk. (Full shownotes at http://sysadministrivia.com/episodes/S4E22)By admin@sysadministrivia.com (r00t^2)
 
Circuit Swan stops by the show to talk all things Diana Initiative. If you're going to Hacker Summer Camp 2020, you may want to consider adding the Diana Initiative to your list of cons to attend. Some links of interest: Circuit Swan's Twitter: @CircuitSwan Diana Initiative Twitter: @DianaInitiative Website - https://www.dianainitiative.org Want to…
 
People from all over the world are looking for advice and information about interviews. Join us in this episode of Detections podcast as we do our part to try to save you from a normal commute. We take you to a recorded episode where we discuss things that we look for when we are conducting an interview and even offer up some advice to the intervie…
 
Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no surprise that these too are subject to attack. Steve Povolny is head of advanced research at McAfe…
 
Hacks and rumors of hacks surrounding US-Iranian tension. Ukrainian authorities are looking into the Burisma hack, and they’d like FBI assistance. The FBI quietly warns that two US cities were hacked by a foreign service. The New York Fed has thoughts on how a cyberattack could cascade into a run on banks. Arrests and a site takedown in the WeLeakI…
 
This week's tools, tips, and tricks talks about a Raspberry Pi project I put in called Pi-Hole. This episode talks about what it does, how it was built and why you should consider building one for your home network. Pi-Hole Project Page. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support …
 
Proof-of-concept exploits for the CryptoAPI vulnerability Microsoft patched this week have been released. CISA warns the chemical industry to look to its security during this period of what the agency calls “heightened geopolitical tension.” Families of deployed US soldiers receive threats via social media. Someone’s been phishing in Turtle Bay. Mo…
 
Microsoft rolled out its new Chromium based Edge browser starting this week. This episode talks about how they rolled it out and why they did it that way. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can …
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-the-iran-cybersecurity-threat/) The Iran conflict has threatened new retaliations and we don't know where they're going to come from. Cyber retaliation is a real possibility. Who's being threatened and how should we prepare? Check out this pos…
 
At its height, the hacktivist collective known as Anonymous was the bane of Scientologists, the FBI, CIA, Mastercard, Paypal, Middle Eastern dictatorships, and in its latest effective iterations, even ISIS. But in recent years, Anonymous has all but disappeared. It leaves a legacy: It single-handedly brought back the Guy Fawkes mask as a true symbo…
 
Welcome to the 125th edition of the Transatlantic Cable Podcast! Dave and I open up the episode deep in the heart of Texas. In this story, a school system lost millions of dollars by transferring funds to cybercriminals after falling victim to a phishing campaign. From there, we head further West to Las Vegas. The city was recently hit with a cyber…
 
Google login Twitter login Classic login