InfoSec public
[search 0]
More

Download the App!

show episodes
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
CyberSpeaksLIVE is a weekly InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeaks ...
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
Cybersecurity made simple. Come on a journey with our host Darnley G, to bring you through the rollercoaster of information security. We will discuss topics about any cybersecurity trending news, how to's, facts, who's been hacked, and even some tips to protect your business from cybercrime. Grab a cup of caffeine and enjoy!
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide. Operating as a communit ...
 
Welcome to the Cybrary Studios, home to Cybrarys three podcast series, including the award-winning 401 Access Denied voted Best Cybersecurity Podcast for NORTH AMERICA by the 2021 Cybersecurity Excellence Awards. The Cybrary Podcast - In this show, we will be speaking with current leaders and experts in the IT and Cybersecurity fields. Discussing topics ranging from DevSecOps and Ransomware attacks to diversity and the retention of talent the Cybrary Podcast covers it all. Stay up to date wi ...
 
Loading …
show series
 
This week we change things up a bit and review a curated (almost) 5 minute summary of the latest InfoSec news including SolarWinds sanctions, language supply chain attacks, Egregor ransomware as a service, N.Korean crypto theft, vuln exploitation in the wild, Mexican politicians and ATM skimming, a new password manager, legal use of look-alike doma…
 
This episode provides an overview of the MITRE Shield Framework for Active Defense. Released in August 2020, Shield provides network defenders with opportunities to degrade and disrupt an adversary that has gained initial unauthorized access to a protected network. For more information on MITRE Shield, visit their website: https://shield.mitre.org/…
 
Tanya Janca walks us through how her need for community inspired her to develop one of her own. Join us for an inclusive conversation on how to navigate a male-dominated field and how to create your own success. Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack…
 
On today’s show, Heather Terry chats with Steve McMaster, Brian Karrigan, Dusty Miller, and Austin O'Neil as they wrap up their discussion on designing a security operations center (SOC). In case you missed it, make sure to listen to Designing a SOC: Internal or External? Part 1. Click here for our podcast episode transcript.…
 
For our latest Humans of InfoSec podcast, we’re excited to welcome Phillip Wylie on the show. Phillip has over 22 years of experience with the last 8 years spent as a pentester. Phillip has a passion for mentoring and education. His passion motivated him to start teaching and founding The Pwn School Project a monthly educational meetup focusing on …
 
The Schrems II ruling and Brexit mean that UK organisations are required to reconsider the legal basis for the transfer of personal data to and from Europe.The webinar recording covers:The Schrems II decision regarding transfers of data;The implications for UK and EU data controllers regarding data transfers;The types of data transfers organisation…
 
Iran says Israel was responsible for sabotaging the Natanz nuclear facility yesterday, and Tehran promises revenge. Online plotting results in the arrest of a Texas man alleged to have planned an attack on an Amazon Web Services center. Scraped, not hacked, data from LinkedIn and Clubhouse are being hawked online. Andrea Little Limbago from Interos…
 
This week another social media platform had a large amount of user data offered online. LinkedIn had 500 million users' information put up for sale. However, this data was not gathered through a breach but through scraping. This episode talks about the difference. Be aware, be safe. Check your email: https://cybernews.com/personal-data-leak-check/ …
 
Digital forensics professional Ondrej Krehel talks about the work of digital forensics in federal and government locations, the things he learned during a months-long attempt at decrypting a well-secured Swiss bank file and why finishing the research beats any degree you could ever have. 0:00 - Intro 2:11 - Ondrej's cybersecurity journal 5:33 - Car…
 
Welcome all to the first Positively Blue Team Special, every so often something happens that shines a spotlight on the world of the defenders and people in DFIR, and when those things come to the forefront we want to talk about them. So tonight we are here to talk about the SOC X World Championships (socx.io) which consisted of 50 teams coming from…
 
Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debr…
 
During this episode, we meet with the brilliant and extremely humble JR who has over 15 years of experience in the cyber space. She talks about her unique experience going from medical work to now be working in the cyber threat space where she now works with Cyber Crime, Human Intel and so much more. Anyone considering getting into the cyber threat…
 
This week's tools, tips, and tricks talk about a new feature on HaveIBeenPwned.com. You can now search for your phone number. This episode talks about why this was added and why you should go search right now to see if you are a victim. Source - https://haveibeenpwned.com/ Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast wit…
 
Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, …
 
Lazarus Group has a new backdoor. Bogus Clubhouse app advertised on Facebook. Cryptojacking goes to school. A ransomware cartel is forming, but so far apparently without much profit-sharing. The US Senate is preparing to make strategic competition with China the law of the land. Dinah Davis from Arctic Wolf looks at phony COVID sites. Our guest is …
 
Virtual and Augmented Reality solutions are racing forward to the future! In this episode we explore the impact these technologies are having on the future of work, edtech and the human experience. JJ Snow is joined by Cortney Harding, Founder and CEO of Friends with Holograms, an entrepreneur and social impact technologist who is using her powers …
 
This week in Infosec (Liberated from the “today in infosec” twitter account): 4th April 1977: Ron Rivest first introduced Alice and Bob in the paper "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". https://twitter.com/todayininfosec/status/1246652917605527554 http://web.mit.edu/jemorris/humor/alice-and-bob https://xkcd.com/…
 
Newly appointed Executive Editor at VentureBeat Fahmida Rashid joins the show to talk about her introduction to computer networking in school, her winding path into cybersecurity journalism, the security stories worth telling, the venture capital ecosystem, and the surge in unicorn cybersecurity startups. Links: Follow Fahmida on Twitter Fahmida Ra…
 
When thinking of pentesting, you think of computers, networks, and other technologies, but there are pentesters that specialize in hacking humans and buildings. During this episode, Crystal shares how she got into physical pentesting and social engineering coming from a military career. Guest Crystal, Social Engineer, Physical Pentester, Veteran (@…
 
Nowadays, every company is pretty much a technology company, and as such, they all should have some understanding of quality assurance (QA). Also, an understanding of information security would be nice. The question is, how and where do these two worlds collide? And, is that security world AppSec or DevSecOps? Or is it something completely differen…
 
Cybersecurity is a complex topic to understand. A plethora of standards, frameworks, processes, tools, conferences, presentations, courses, and even certifications may help but can also be a bit overwhelming. This is where the community comes in. Understanding the threats and the risk faced by a university is one thing; understanding the high educa…
 
Cring ransomware afflicts vulnerable Fortigate VPN servers. Distance learning in France stumbles due to sudden high demand, and possibly also because of cyberattacks. Hafnium’s attack on Microsoft Exchange Servers may have been long in preparation, and may have used data obtained in earlier breaches. Commerce Department adds seven Chinese organizat…
 
Password vaults are the best solution to maintain and secure your account's credentials and other sensitive data. What do you do if you are unable to access your accounts due to illness or death? How do others get access? This episode talks about some options you can do to allow access to those accounts. Be aware, be safe. Become A Patron! Patreon …
 
What if we told you that your phone could be hacked 16$ and all of the texts that were meant for you, were rerouted to someone else with nefarious designs on your most personal exchanges? It’s a real thing and it happened to Motherboard reporter Joseph Cox who is on the show to explain how a simple hack, costing nothing at all, could happen to you.…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-securing-the-super-bowl-and-other-huge-events/ How do cybersecurity professionals secure a huge event like the Olympics, the Superbowl, or a city's New Year's Eve party? What are the unique considerations that come into play? Check out this pos…
 
Deepfake expert Nina Schick joins us as we discuss synthetic media, Facebook's latest data fiasco, and some less-than-brilliant April Fool's tricks. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast, hosted by computer security veterans Graham Cluley and Carole Theriault. Visit https://www.smashingsec…
 
Thank you for joining us for another candid conversation with one very special guest who's very well known in the industry: none other than Tanya Janca: she's an author, a CEO, a startup founder, a programmer, a hacker, and a philanthropist. In this episode, we're going to touch upon some really special aspects about who Tanya is and how she is mak…
 
Goblin Panda’s upped its game in recent attacks on Vietnamese government targets. The EU is investigating cyberattacks against a number of its organizations. Scraped LinkedIn data is being sold in a hackers’ forum. Facebook talks about the causes of its recent data incident. New Android malware poses as a Netflix app. Joe Carrigan shares comments f…
 
Today we talk through our first engagement using Hak5 Key Croc to steal and exfil data. In the past, my internal monologue when a new Hak5 toy is released sounds like this: "I certainly don't need another Hak5 doo-dad! The last one didn't ever work that great, and ended up in a drawer full of past Hak5 doo-dads that didn't work that great." "Whaaaa…
 
Evan ran across an article this week titled "15 Security Pitfalls and Fixes for SMBs." Small- and medium-sized businesses (SMBs) tend to be an underserved market, and with many businesses starting to regain their footing post-Covid, now is a great time to discuss SMB security. Brad and Evan analyze the "15 Security Pitfalls and Fixes for SMBs," pro…
 
Last week the U.S. Strategic Command send out a cryptic tweet. This caused concern and conspiracies to fly wild on what it meant. This episode talks about this, what it was and how it happened. The reason is humorous. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Wh…
 
With Easter holidays in the UK, we gave David the day off for recording the 196th episode of the Kaspersky Transatlantic Cable podcast. Instead, I am joined by two of my colleages from our Global Research and Analyst Team (GReAT). Last week, Dmitry Bestuzhev and Fabio Assolini hosted a webinar on the threat landscape in the financial sector. During…
 
Special guest Ted Harrington joins Joe and Mike today to discuss application security – how to be more secure, what AppSec myths to reconsider, and how to change mentalities at your organization. Ted is Executive Partner at Independent Security Evaluators and author of Hackable: How To Do Application Security Right.…
 
A watering hole campaign compromised several Ukrainian sites (and one Canadian one). File transfer blues. A couple of looks into the criminal-to-criminal marketplace: establishing a brand and selling malicious document building tools. Ben Yelin has details on a privacy suit against Intel. Our guest is Steve Ginty from RiskIQ on the threat actors be…
 
Microsoft's David Weston joins Ryan on the show to discuss a new report that shows 83% of organizations have been hit by a firmware attack in the last two years. As businesses continue to under-invest in resources to prevent firmware attacks, Weston warns about the inevitability of advanced attacks at the 'invisible' layer, the absence of skills an…
 
Looking for signs of fraud and the loss of intellectual property or customer data is not the same. What's the difference? What's the overlap? Are there organizations set up to do both well? Glad you asked. You will find the answers by listening to this podcast. As organizations take their journey on a digital transformation and move to the cloud, m…
 
In this episode of Tech Done Different, we chat with Dr Wanda Toro Turini, who shares insights about how to adapt in order to make sure that a given piece of innovative tech can best service the market. You'll learn: why you gotta listen to what the marketplace is telling you why you need strategy in order to wield the power of technology why (and …
 
This week on the show, we invite Colin Kennedy of Ramp to discuss how they're revolutionizing the world of online corporate spending, and to chat about a new partnership with 1Password. We also look at the burning issues of our time, everything from a cyber insurance firm hit by ransomware, to AI-powered Amazon trucks, with a bonus debate on how be…
 
Listenable is a resource full of a mirco-learning lessons on a wide range of topics. I have created a Cybersecurity course but I have also found many other lessons I found valuable. This episode talks about the site and what you can find on it. Note - This is not a sponsored episode, just me talking about it. 10 Cybersecurity Tips - https://listena…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login