show episodes
 
Följ med på en resa in i internets mörkaste hörn. Vill du höra mer? Stöd mig gärna på https://www.patreon.com/natetsmorkasida och få tillgång till exklusiva avsnitt, videos och mycket mer. Frågor, förslag, affärer? Kontakta mig på porsklevproduktion@gmail.com Support till showen http://supporter.acast.com/natets-morka-sida. See acast.com/privacy for privacy and opt-out information.
 
In this podiobook: Larry Lazard, CEO of hackoff.com, takes his company public and watches its stock price soar and collapse. Following a hostile takeover attempt, Lazard is found dead in his office of an apparently self-inflicted gunshot wound.Author Tom Evslin, a serial CEO, also took a company public in the Internet bubble and fought off hostile takeover attempts in the subsequent rubble. Unlike Larry, Evslin lived to tell what may be the definitive story of those strange times.The mystery ...
 
Cybersecurity is an ever growing field and representation within it matters more than ever! We here at The Other Side of the Firewall podcast, strive to highlight those movers and shakers and glass ceiling breakers. People of Color, who have made it to the other side of the proverbial firewall into those Senior and C-suite level positions. Aside from the interviews of IT Professionals, just like you, our crew will have fun discussing the latest and greatest news, measures to protect yourself ...
 
16 Minutes on the News is a short news podcast where we cover the top headlines of the week, the a16z podcast way -- why are these topics in the news; what's real, what's hype from our vantage point; and what are our experts' quick takes on these trends? About the a16z Podcast: Discusses tech and culture trends, news, and the future -- especially as ‘software eats the world’. It features industry experts, business leaders, and other interesting thinkers and voices from around the world. This ...
 
To Catch a Fraudster is a podcast for eCommerce merchants and enterprise security professionals who dream of vengeance on the thieves, hackers, and con artists stealing their revenue and customer data. Merchant Fraud Journal interviews the entrepreneurs, fraud experts, and corporate leaders on the front lines of the war against fraud. Join us to hear their real-world stories about the weird, the bold, and the infuriating of fraudster attacks. Learn from the mistakes of others and implement t ...
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
Welcome to Darnley's Cyber Cafe - cheers to a new smooth, bold podcast set on sailing you on this long journey of cybersecurity. Our host Darnley (Previously on Darn IT Podcast) will discuss topics about cybersecurity, business, IT, and everything in between. Sit back with your java (not script) and enjoy.
 
P
Protect and Secure

1
Protect and Secure

American Military University

Unsubscribe
Unsubscribe
Monthly
 
Technology, along with domestic and international events, are constantly threatening global security. American Military University brings you Protect and Secure, a podcast featuring experts in cybersecurity, homeland security, intelligence, international affairs, politics, the military, and more to discuss the ever-changing security landscape. To learn more, visit AMUonline.com. See acast.com/privacy for privacy and opt-out information.
 
"What the Hack with Adam Levin" is true cybercrime with dad jokes. It’s a no-shame zone for anyone who’s ever been scammed, hacked, phished or cyber-bushwhacked. Every week, we feature fascinating people talking about the terrifying, annoying, embarrassing, or infuriating things they’ve experienced online. Join consumer affairs veteran Adam Levin with co-hosts Beau “Hack Me” Friedlander and Travis “Here's What Actually Happened” Taylor for a good story and tips on how to make yourself a litt ...
 
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
 
Dr. James Perdue, Professor of Perseverance, shares other people’s stories of life tragedies of accepting adversities, begin battling, and conquer challenges to not only survive difficulties but also thrive in life so you can be prepared to persevere in life’s struggles. Professor of Perseverance Podcast will inspire you to face challenges head on in life so you provide motivation to be a leader for others by setting examples of winning through difficulties while encouraging people to live l ...
 
Hello world! Let's explore what’s beneath the surface of web security. Undetected by Detectify takes a holistic approach to web security and will bring forward pressing matters when it comes to web vulnerabilities, security culture and what can be done to fix the Internet. The show is hosted by ethical hacker and TV documentary figure, Laura Kankaala. This podcast is brought to you by Detectify, a web security company powered by ethical hackers.
 
America’s Leading Cybersecurity Strategist. My team and I start with a scan of all devices on your network to determine what needs to be secured. Then we work with you to develop a complete plan to secure what needs to be secured on your networks. In certain cases, my team and I will help businesses source, monitor, and run their cybersecurity. I've been providing Cybersecurity to enterprises of all sizes, and Federal and State agencies since 1991.
 
م
مذكرات العالم الخفي

1
مذكرات العالم الخفي

Hidden World Diary | مذكرات العالم الخفي

Unsubscribe
Unsubscribe
Daily+
 
Hidden World Diary I'm a normal guy just like you who was so curious about the dark web. One day, my brother challenged me to hack our neighbor's WIFI and he did it while looking down at me. I was a little skeptical myself, so I accepted the challenge and started my research. As any ethical hacker out there, you know that gathering info is so important for any type of attack. I did some social engineering work, got into his network, scanned it, changed the password and of course he got kicke ...
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cyber security tips, tools, and more in the Alias Secure AF Cyber Security Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cyber security topics with coworkers and special guests. No matter where you are on the cyber security knowledge ladder, there's an episode here for you.
 
Book 2 of the Borrowed Time Chronology Ness Relevant has traveled through time before. Now he must once again use his time machine to confront a determined foe. Only this time his personal stakes are even higher. Threatened by his future, he must find a way to save his wife and thwart a mad-man's schemes for world conquest, or he'll never regain his stolen time.
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, welcome to the show.Our moderator, John Verry, chat ...
 
P
Primed

1
Primed

KUOW News and Information

Unsubscribe
Unsubscribe
Monthly
 
It started with books. Today, Amazon is transforming virtually every facet of the American consumer economy. Primed explores what happened when Amazon set up shop in Seattle, what might be in store for its next headquarters, and how this iconic company is changing life as we know it.
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
 
F
Freedom From Concern

354
Freedom From Concern

Freedom Ninjas (Big Paulie & Brian Brown)

Unsubscribe
Unsubscribe
Monthly
 
Paul Moore and Sivilay Kounlabout are two Social Media Business Moguls that help people free the world from concern through teaching, mentoring and inspiration. This media empire was started by Brian Brown. Brian was a work at home funnel hacker and a little bit of a Napoleon Hill nut. Brian loves to help others get the most out of life with the use of the internet and technology. The Freedom Ninjas are freeing people from concern by showing them how to turn their free time into an income. E ...
 
The Linux Security Podcast covers key concepts in security, reviews some of the latest exploits and discusses the tools enterprises use to detect, prevent and recover from cyber attacks. The show features insights from Mike Shinn, co-founder and CEO of Atomicorp, and Scott Shinn, co-founder and CTO of Atomicorp as well as PM for OSSEC. Scott was also chief network manager at the White House and interim CISO at the Department of the Interior earlier in his career. Mike contributed to the firs ...
 
The state of application security is rapidly evolving and there is a need for a more frequent analysis of the threat landscape. Every month, join Setu Kulkarni, VP of Corporate Strategy and Business Development, alongside Zach Jones, Sr. Director Security Research, and other industry guests as they analyze key data points and trends, provide topical insights, and discuss what can be done to improve upon the current state of application security.
 
Loading …
show series
 
What's up, everyone! In this episode, Ryan, Shannon, and LeVon discuss Gootloader and how its operators are targeting accounting and law firms. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Article: GootLoader Hackers Targeting Employees of Law and Accounting Firms https://thehackernews.com/2022/01/gootloader-hackers-targeting-employees.html Socials…
 
Scott DeLuzio was a combat infantryman who fought in Afghanistan at the same time as his younger brother, Steven, who was killed in action just miles away from him. Minutes after learning of his brother's death, Scott found himself in a firefight with the Taliban. Website: https://driveonpodcast.com/ Drive On Podcast: https://driveonpodcast.com/ Am…
 
Evan Katz was a penniless screenwriter who made up a thriving career in his 30's, he always tells his children how much he has failed because he wants them to be resilient young adults. And, as a dating coach for smart, successful women who struggle to find love, persevering over adversity is Evan’s stock-in-trade. Website: https://www.evanmarckatz…
 
Do you store everything in the cloud? Is your entire business in the cloud? Do you trust Amazon/Google/Microsoft anymore? In this episode, Darnley discusses the next wave of vulnerabilities that makes you second guess the merit of relying on the public cloud for your protection. Amazon Web Services (AWS) was found to have a massive vulnerability th…
 
What's up, everyone! In this episode, Ryan, Shannon, and LeVon discuss the recent cyberattacks waged on the Ukrainian government and who the attacker may be. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Article: ‘Be Afraid:’ Massive Cyberattack Downs Ukrainian Gov’t Sites https://threatpost.com/be-afraid-massive-cyberattack-downs-ukrainian-govt-sit…
 
This week, Dr Doug talks: WordPress, Firefox Relay, Multiple Microsoft, White House Summit, Russia Strikes back, VPNLab, my crush on Judy Jetson, and Aaran Leyland. Show Notes: https://securityweekly.com/swn179 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us …
 
Vickie Li, developer evangelist at ShiftLeft, interviews Chloé Messdaghi about her work in ESG (Environmental, Social, and Governance) consulting in the cybersecurity industry. What are the biggest social challenges facing our industry? How can we take the steps to increase diversity and reduce the environmental impact of infosec? Listen on to find…
 
Pete Hertzog is a security expert and an educator with a vision: he wants our kids to learn about cybersecurity, and not just about not talking to strangers online – he wants them to learn even more advanced stuff, such as security analysis and hacking. Pete spoke with Nate Nelson about his Hacker Highschool initiative, and the lessons he learned f…
 
Trolls are misunderstood creatures, but they’re so mean that it’s hard to feel for them–unless you’re sussing out their soft underbelly for a kill shot. We talked to journalist Megan Carpentier, who is no stranger to online harassment. She gave us a crash course on trolls–how to recognize them and make them go away. Learn more about your ad choices…
 
What's up, everyone! In this episode, Ryan, Shannon, and LeVon discuss how the FBI, NSA, and CISA are warning businesses to patch old vulnerabilities against Russian APTs. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Article: FBI, NSA and CISA Warns of Russian Hackers Targeting Critical Infrastructure https://thehackernews.com/2022/01/fbi-nsa-and-c…
 
The Security Weekly 25 index has finally cooled off, closing at 2226.93 on January 13th, 2022, which is an increase of 122.69% (down from last Q) since inception. The NASDAQ Index closed at 14,806.81 on January 13th, 2022, which is an increase of 123.15% (down from last Q) during the same period. It hit another all-time high of 16,057.44 during the…
 
Do You Have a Smartspeaker? Another Danger Comes Your Way! By now, you've heard of tick talk. You might use Tik TOK. Many people do. It's their go-to site online, especially if you're a little on the younger side. Here is a danger of some of these tick talk challenges and combine that with Alexa. Oh my [Following is an automated transcript] This is…
 
Dr. Doug talks: Remote desktop, Apple, Microsoft Servers, Taco Tuesday, Gootloader, and "Farmville: Gangsta Edition", as well as his Favorite Threat of the Week! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly S…
 
ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover: * A Critical H2 Database Vulnerability* DDoS Extortion* Alternate ransomware techniques***Resources from this week’s podcast***Cyber Threats to the Education Systemhttps://www.digitalshadows.com/blog-and-research/cyber-threats-to-educa…
 
It’s a new year and a time when we make resolutions…which often drop off by the start of February. To keep your security resolutions for 2022, today’s show will be about enterprise security pitfalls and the areas corporations should focus on when planning their cybersecurity strategy for the year. Topics will include proper data hygiene; ransomware…
 
What's up, everyone! In this episode, Ryan and Shannon discuss what we've been doing all week and what media has piqued our interest. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Socials: Website - www.theothersideofthefirewall.com YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw Facebook - the other side of the firewall page and …
 
This week, we kick off the show with a tech segment walking through the Log4j Vuln, step by step! Then, Dragos Ruiu, creator of Pwn2Own, joins for an interview! In the Security News: Attacking RDP (from the inside), NetUSB exposed, the old mailing USB drives trick, a persisten DoS in your doorLock, Signal gets a new CEO, attacking the patching soft…
 
How cloud resources are architected and utilized is different for every organization, but whether cloud native or cloud traditionalist – security risk and complexity are problems. Concerns over account takeover, overprivileged access and the struggle to keep pace with the dynamism of the cloud are driving demand for a better way to secure access. H…
 
What's up, everyone! In this episode, Ryan, Shannon, and LeVon discuss if a recent North Korean cyberattack on Russia signals the end of a bromance. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Article: North Korean Hackers Start New Year with Attacks on Russian Foreign Ministry https://thehackernews.com/2022/01/north-korean-hackers-start-new-year.…
 
This week in the Security Weekly News: Toilet snakes, CES, CISA, Supply Chain Library Hijinx, QNAP, colors and fakers, and the first episode of 2022 for the Security Weekly News! All this and the returning Expert Commentary of Jason Wood! Show Notes: https://securityweekly.com/swn177 Visit https://www.securityweekly.com/swn for all the latest episo…
 
What's up, everyone! In this episode, Ryan, Shannon, and LeVon discuss a DOS-like vulnerability that can significantly impact casual iPhone users. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Article: Researchers Detail New HomeKit 'doorLock' Bug Affecting Apple iOS https://thehackernews.com/2022/01/researchers-detail-new-homekit-doorlock.html?fbcl…
 
There's an understandable focus on "shift left" in modern DevOps and appsec discussions. So what does it take to broaden what we call appsec into something effective for modern apps, whether they're on the web, mobile, or cloud? We'll talk about moving on from niche offerings into successful appsec programs. The FTC issues a warning about taking lo…
 
The space race 2.0 is happening right now, how long until we hear about a satellite being hacked in space? Would this be a page out of SkyNet's handbook? We have entered a new era of space exploration, corporations are leading the race to make us multi-planetary along with the technology required to make that happen. In 2022, will we now hear about…
 
“Hello. We are looking for highly intelligent individuals. To find them, we have devised a test.” These words, found in a message posted on 4Chan in January 2012, started a global ‘treasure hunt’ – with thousands of puzzle-loving and curious individuals desperately competing with one another to be the first to crack the devilish puzzles created by …
 
We all know Instagram influencer accounts get hacked and held for ransom. And it’s no secret men send women pictures of their private parts via DM. This episode meets at the crossroads of these two open secrets. Model and writer Lisa Seiffert joined us to tell the tale. Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
What's up, everyone! In this episode, Ryan, Shannon, and LeVon discuss the FBI's warning concerning Google Voice scams. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Article: Google Voice Authentication Scam Leaves Victims on the Hook https://threatpost.com/google-voice-authentication-scam/177421/?fbclid=IwAR0thAjdGlR8GkDN57Dbj3cvJUKjhtMjOUEDGAO4OWv…
 
David Grant shares about overcoming depression, beating ADHD, surviving a horrible military school with abuse, and three mental hospitals. He also dogged a few bullets in Egypt during the revolution. Website: https://www.granttrainingsystems.com/main_page_gts Podcast – The G Spot with David Grant: https://www.gspotpodcast.xyz/ Facebook: https://www…
 
Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir: Amenazas a los servicios financierosLas tres áreas de riesgo El desarrollo del ransomware El desarollo de la ciberdelincuencia Come siempre, si teneis algún comentario sobre este episodio o si queréis saber mas de algún tema, escribenos a shadowtalk@digitalshadows.…
 
Eric Teplitz has an abundance of life experiences to draw upon including things as varied as pursuing a music career in Nashville, backpacking over 500 miles of the Appalachian Trail, volunteering in a hospital, completing an Ironman triathlon (after three attempts), and finally meeting and marrying the love of his life, Samantha. Website: https://…
 
ZDNet Security Update: Danny Palmer talks to MIT's Professor Stuart Madnick about the continued growth of cyber attacks, why there's still so many misunderstandings around cybersecurity – and what has to happen to fix the problem. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy ZDNet
 
Do you feel FAT32? Do you have excess digital fat around your life? It is 2022 and it is time to lose some of that weight, learn 5 different ways to reduce your digital fat while feeling better about yourself in the future. Darnley discusses how data is collected, and what you can do about it. It is never too late to have a new years resolution. Br…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login