show episodes
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Welcome to the new home for Adam's rantings and ravings. This is the #1 Daily Downloaded Podcast in the World. GET IT ON as Adam shares his thoughts on current events, relationships, airport security, specialty pizzas, politics, and anything else he can complain about. Five days a week and completely uncensored, Adam welcomes a wide range of guests to join him in studio for in depth interviews and a front row seat to his unparalleled ranting. Let's not forget Bryan Bishop (Bald Bryan) on sou ...
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
 
Underhandedness. Trickery. Unscrupulous behavior. Skullduggery breaks down the conduct of Washington's political class, tracks the latest in conspiracy theories and disinformation campaigns coursing through social media — and who is pushing them — and keeps you up to date on the latest investigations into misbehavior by members of Congress as well as current and former government officials. Yahoo News’ veteran investigative journalists Michael Isikoff and Daniel Klaidman break news, offer au ...
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
Each week, Foreign Policy’s Amy Mackinnon, will recommend one podcast from around the world, interview the host, and play an excerpt. This curated show is designed to help listeners interested in the things we are—great stories, compelling interviews, and cogent analysis on international affairs—sort through the overwhelming variety of podcasts out there and find the best ones. And occasionally you’ll hear audio from our own newsroom. FP Playlist replaces our flagship podcast First Person.
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
 
Tech News Weekly hosted by Jason Howell and Mikah Sargent brings you interviews from tech journalists who make or break the top stories of the week. Jason and Mikah give you more context and perspective, with an in-depth look at the fast-paced world of technology and how it is changing our lives. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Loading …
show series
 
Link to Blog Post https://cisoseries.com/cyber-security-headlines-week-in-review-april-12-16-2021 This week’s Cyber Security Headlines - Week in Review, April 12-16, 2021, is hosted by Steve Prentice (@stevenprentice) with our guest, Davi Ottenheimer, vp, trust and digital ethics, Inrupt. Thanks to our episode sponsor, Sonatype With security concer…
 
We continue the discussion about the importance of effective security awareness programs and what that would actually look like. We'll also examine how to move beyond "bare minimum" check-box mentality about meeting security awareness training requirements and imagine building a culture of security aware employees in the organization. Visit https:/…
 
We speak with Chris Althaus who was appointed as Chief Executive Officer of the Australian Mobile Telecommunications Association (AMTA) in 2005. AMTA is the peak industry organisation representing Australia’s mobile telecommunications sector and operates programs covering all aspects of the mobile ecosystem such as - telecommunications policy, mobi…
 
Today we are going to take a look at security awareness training programs in organizations. We are joined to day by Kelley Bray and Stephanie Pratt who will help facilitate the discussion. We'll start with the history and evolution of security awareness programs; what has worked, or more precisely what hasn't worked. We'll also touch on how most se…
 
This week, Lennart Koopmann, the CTO of Graylog, Inc, joins us for an interview to talk about Nzyme, a Free and Open WiFi Defense System. Then, Dutch Schwartz, Principal Security Specialist at Amazon Web Services, joins us for a discussion on the Lessons Learned When Migrating from On Prem to Cloud! In the Security News, Polish blogger sued after r…
 
This week, Elon visits an audio-only virtual bar, Ubiquity denies, Accellion, ToadSuck.gov, and more, plus show wrap-ups! Show Notes: https://securityweekly.com/swn114 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secwe…
 
This week, In the first segment, Ryan Noon from Material Security join us for a discussion on Zero Trust! Next up, John Loucaides joins for an interview on firmware attacks, and what enterprises need to do! In the Enterprise Security News:Cyble raises $4M, ThreatQuotient raises $22.5M, OneTrust acquires Convercent, Digital Shadows announces new thr…
 
Are you struggling with Alert Overload, Manual Processes, Multiple/Disparate Tools, Talent Shortage, and/or Budget Constraints? Of course you are! John McClure, Chief Information Security Officer from Laureate Education, joins us to discuss how he solved these challenges by implementing SOAR and accelerating security. In the Leadership and Communic…
 
1. Teresa and Bryan (2009)2. Bill Simmons (2009)3. Jerry O' Connell (2009)4. Cruise Rotten Tomatoes Game (2016)Hosted by Chris Laxamana and Giovanni GiorgioSupport the show:Visit Apartments.comBlindsGalore.com and tell them we sent youVisit TommyJohn.com/ClassicsVisit Geico.comVisit Lifelock.com and use promo code AdamRequest clips:Classics@adamcar…
 
They used to say that a conservative was a liberal who’d been mugged. Today’s version is that a conservative who’s comfortable with business regulation is a conservative who’s been muzzled by Silicon Valley. David Kris kicks off this topic by introducing Justice Thomas’s opinion in a case over Trump’s authority to block users he didn’t like. The ca…
 
ShadowTalk hosts Stefano, Adam, Kim, and Chris bring you the latest in threat intelligence. This week they cover:- Kim takes us back to SolarWinds, the Centreon breach, the Accellion incident, and the Microsoft Exchange supply chain attack- The team discusses attributing attacks - state sponsored threat actors leverage sophisticated tactics, allowi…
 
Chris Neal from Talos Outreach has followed LodaRAT for years now. It’s gone from a fairly small threat to a full-on malware with several features that target all sorts of Android devices. Chris joins the show this week to discuss his history of researching LodaRAT and updates us on its latest TTPs. Find out how this trojan tries to trick users int…
 
This week I discuss the offense (investigations) and defense (privacy tactics) surrounding the aftermath of the Capitol siege, plus the latest privacy news.Direct support for this podcast comes from sales of my books and the online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorseme…
 
Sophos cybersecurity expert Chester Wisniewski provides excellent, topical and timely commentary on the FBI’s recent use of a malware-like method to forcibly clean up hundreds of servers still infected in the Hafnium aftermath.With Paul Ducklin and Chester Wisniewskihttps://nakedsecurity.sophos.com/fbi-hacks-into-hundreds-of-infected-us-servershttp…
 
Candace Owens sits down with Adam for a one-on-one conversation about becoming a powerful, yet controversial voice among social issues. The two also share their thoughts on what’s happened to the media in the United States. Later, Adam sits down with Tucker Carlson for a second one-on-one conversation in today’s pod. Topics include: people leaving …
 
US pins SolarWinds attack on Cozy Bear, boots 10 Russian diplomats Second Google Chromium zero-day released on Twitter this week Google rolls out Chrome 90 with HTTPS by default Thanks to our episode sponsor, Sonatype With security concerns around software supply chains ushered to center stage in recent months, organizations around the world are tu…
 
Mark Zuckerberg isn't convinced that an Instagram for kids app is actually a bad idea after all. Spotify is offering a free gadget called Car Thing and it is ideal for iOS users without CarPlay. Dan Moren from Six Colors picks apart the invite for Apple's upcoming Spring event to see what the company might unveil. Twitter is launching the Responsib…
 
The story of what we understand about the rare cases of blood clots associated with certain Covid-19 vaccines is constantly evolving. In today’s programme Professor Beverley Hunt looks at the emerging evidence.How have the restrictions due to Covid 19 effected how we grieve? Professor Claire White an expert in grief and mourning and investigating w…
 
Since Capitol Hill everybody has become pretty intimately familiar with how radical and violent the far-right truly is. Online it exists in cesspools like the encrypted app Telegram, or Gab, a Twitter knockoff popular among extremists and Maga types alike. And one thing many forms of the far-right have in common their hatred porn and the name-brand…
 
FBI patches Exchange server backdoors IcedID looks to fill the Emotet malware void Draft plan to improve US power grid security Thanks to our episode sponsor, Sonatype Ask any software developer, and they’ll tell you the truth about two things: 1. Conventional code analysis and appsec tools are noisy and not well integrated into the dev workflow. 2…
 
Adam opens today’s live podcast from Zanies Comedy Club in Nashville recapping his flight from Los Angeles on Mark Geragos’ private jet. Then, Adam talks about running into comedian Bryan Callen and taking Sonny out of school to travel with him. Bryan, Gina, and Jason Whitlock join the show next and Jason gives his take on the black bachelor and ex…
 
President Biden announces that all U.S. military forces will be out of Afghanistan by Sept. 11. A blackout at an Iranian nuclear facility is widely attributed to Israeli sabotage, complicating negotiations over a new nuclear deal. And we finally know the company that helped the FBI hack a notorious shooter’s phone. See acast.com/privacy for privacy…
 
We look at the big-money hacks from the 2021 Pwn2Own competition. We investigate the difficulties of hiring an assassin via the dark web. We wrestle with some of the privacy issues relating to COVID-19 infection tracking apps.https://nakedsecurity.sophos.com/pwn2own-2021-zoom-teams-exchange-chrome-and-edgehttps://nakedsecurity.sophos.com/italian-ch…
 
In this epsiode of the UNSECURITY Podcast, Evan and Brad have a candid discussion about how important it is to understand world events and apply the understanding to our jobs as security professionals. Everyone’s perspective is valid, so all perspectives (especially ones differing from our own) should be considered in our view of both society and o…
 
In the last two episodes of this series (#449 and #450) we've been diving into how to not only speed up the process of spinning up a DIY pentest dropbox, but how to automate nearly the entire build process! In today's episode we talk specifically about how to streamline the Windows 10 build process. As previously mentioned, this article is awesome …
 
This week, Foreign Policy Playlist features Al Jazeera’s Hindsight, a podcast that takes you into the minds of some of history’s most famous and infamous characters. One of Hindsight’s recent episodes is told from the perspective of Saddam Hussein as he navigates his way up the ladder in Iraq’s government. Al Jazeera’s executive producer Joanne Mel…
 
Today's podcast reports on more serious vulnerabilities found in on-prem Microsoft Exchange, a survey questions the effectiveness of cybersecurity training experts doubt a bomber's goal to cripple the internet would have workedBy ITWC
 
At the top of Part 2, Adam shows off a giant flask that was gifted to him. The guys also listen to a clip from a recent ‘Unprepared’ performance. Dawson then gives an update on his standup career, which leads to Adam reminiscing about the Loveline rating system. Later, Gina reads a news story about a police officer mistaking a gun for a taser, and …
 
At the top of the show, Adam tells Bryan and Gina about Dr. Drew’s black eye and ensuing paranoia. The guys then watch an interview with Adam’s grandma from ‘The Adam Carolla Project’, and look at some crazy cigarette ads from the past. From there, the guys take fan phone calls about Gina’s favorite spots in Joshua Tree, living next door to a sex o…
 
Chrome Zero-Day exploit posted on Twitter April Patch Tuesday patches 114 bugs including NSA’s two at 9.8 severity Cyberattacks are the number-one threat to the global financial system, Fed chair says Thanks to our episode sponsor, Sonatype With security concerns around software supply chains ushered to center stage in recent months, organizations …
 
Guest Dean Gonsowski of ActiveNav joins Dave to discuss data privacy legislation and data governance, Ben explains a Supreme Court Justice’s take on Section 230, and Dave's got the story from Wired that wonders about the online curation of our memories. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute …
 
USA - Back to the Future / Humanise People / Gig Economy / Turnbull - Rudd Finally Got it RIght / Aged Care Fiasco / Gas Extravaganza / Qantas - 'Model Employer' - Day in the Federal Court / Analysis Not Opinion / Rule by Media Conference - No Follow Through / MMT - Modern Monetary Theory / Morrison's Dirty Little Secret - Goodbye Christine Holgate…
 
Today we are going to take a look at security awareness training programs in organizations. We are joined to day by Kelley Bray and Stephanie Pratt who will help facilitate the discussion. We'll start with the history and evolution of security awareness programs; what has worked, or more precisely what hasn't worked. We'll also touch on how most se…
 
Facebook downplays the data leak, linkedin appears to be targeted in a similar attack, and Discord and Slack are being used to spread remote access trojans! All that coming up now on ThreatWire. #threatwire #hak5 Links: Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is a weekly news journalism show covering security a…
 
This week we sit down with Charlene Mowery, Director of Strategic Initiatives at Red Hat who shares insights and lessons learned on leadership and moving forward seemingly impossible and incredibly complex multi-stakeholder initiatives to success, such as the Ford Island Master Development Agreement. She also dives into the impact of DevSecOps in r…
 
At the top of the show, Dawson tells Adam, Bryan and Gina about a house exploding in his neighborhood. Adam then talks about a mysterious visitor at 9:45pm last night, and relates part of the George Floyd trial that may be good news for Dawson. The guys also take some listener calls about post-quarantine life in Georgia, and pizza ordering problems…
 
Jake Paul calls into the podcast at the top of Part 2. Adam asks Jake about how boxing saved him from self-destruction, and what he thinks he can expect for his fight this Saturday night. Later they talk about his training regiment, thoughts on legendary boxers like Tyson and Holyfield, and what else to look forward to during this weekend’s Pay Per…
 
Nvidia announces AI-powered tools for cybersecurity Biden announces nominations for cybersecurity positions Apple updates chip security mid-production Thanks to our episode sponsor, Sonatype Ask any software developer, and they’ll tell you the truth about two things: 1. Conventional code analysis and appsec tools are noisy and not well integrated i…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login