show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
R
Reality 2.0

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
S
Smashing Security

1
Smashing Security

Graham Cluley, Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over seven million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Principal Security Consultant at FRSecure and a 20+ year veteran of the industry. Hosting things ...
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show is live at 9 AM EST Monday through Thursday and tune in each Friday for a special Tech Corner with some of the industry's brightest minds to discuss the latest challenges, innovations, and technologies. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We wa ...
 
T
ThinkstScapes

1
ThinkstScapes

Jacob Torrey, research@thinkst.com, haroon meer, marco slaviero

Unsubscribe
Unsubscribe
Monthly
 
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
 
Join hacker maker Phillip Wylie and his guests as they discuss and unveil the “secrets” of professional hacking — a mysterious, intriguing, and often misunderstood occupation, even by those in the field of cybersecurity. With the rising need for professional hackers, those entering the infosec world are drawn to it, and understandably so — it is an exciting and fascinating career. Still, it sure has nothing to do with magic. Join these conversations to discover what the role entails, the dif ...
 
Welcome to the Cybrary Studios, home to Cybrarys three podcast series, including the award-winning 401 Access Denied voted Best Cybersecurity Podcast for NORTH AMERICA by the 2021 Cybersecurity Excellence Awards.The Cybrary Podcast -In this show, we will be speaking with current leaders and experts in the IT and Cybersecurity fields. Discussing topics ranging from DevSecOps and Ransomware attacks to diversity and the retention of talent the Cybrary Podcast covers it all. Stay up to date with ...
 
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
 
T
The Host Unknown Podcast

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Weekly
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over 7 years of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
The CyberPHIx is a regular audio podcast series that reports and presents expert viewpoints on data security strategy for organizations handling patient health or personal information in the delivery of health-related services. These timely programs cover trends and data security management issues such as cybersecurity risk management, HIPAA and OCR compliance strategy and vendor risk management. Meditology Services, the healthcare industry's leading security and compliance firm, moderates t ...
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
A daily look at the relevant information security news from overnight. Episode 234 - 27 May 2022 Buggy Android apps- https://www.bleepingcomputer.com/news/security/microsoft-finds-severe-bugs-in-android-apps-from-large-mobile-providers/ Guzzle cookies crumble - https://portswigger.net/daily-swig/patch-released-for-cross-domain-cookie-leakage-flaw-i…
 
Patti Titus is the Chief Privacy and Information Security Officer at Markel Corporation. She also serves on the Board of Directors for Black Kite and the Girl Scouts of the Commonwealth of Virginia. She was recognized as a 'Woman of Influence' by the Executive Women’s Forum in 2009 and the Silicon Valley Business Journal in 2013. Patti has held num…
 
In this episode, Alh4zr3d, Hopscotch, Homebrewer, PurpleFox, Cheese, and S1ren discuss how to break into Information Security as a profession as well as answer questions such as how to pivot out of Capture the Flags and into a career, How age factors into a job hunt, How to transition from a non-security role to a security role, and much more. We a…
 
Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors. Symantec found that The …
 
The European Cybersecurity Blogger Awards 2022 - Vote Here! We’re the 5th category down: “The Underdogs - Best Non-Vendor Cybersecurity Podcast” This Week in InfoSec (06:25) With content liberated from the “Today in InfoSec” twitter account and further afield 26th May 1995: Realising his company had missed the boat in estimating the impact and popu…
 
Pro-Russian DDoS attacks. Sanctions and their effect on ransomware. BlackCat wants $5 million from Carinthia. A fraudster pressures Verizon. Spain will tighten judicial review of intelligence services. Johannes Ullrich looks at VSTO Office Files. Our guests are Cecilia Marinier and Niloo Howe with a preview of the RSAC Innovation Sandbox. CISA rele…
 
Matt shares not only his story and advice, he gives valuable advice based on his personal interviewing and job hunting experience, as well as the experience he has gained interviewing others for roles in his consulting team. Matt also shares information about the community that he started to help people trying to get into the cybersecurity field. _…
 
Matt shares not only his story and advice, he gives valuable advice based on his personal interviewing and job hunting experience, as well as the experience he has gained interviewing others for roles in his consulting team. Matt also shares information about the community that he started to help people trying to get into the cybersecurity field. _…
 
Join Cyberjutsu's CEO to learn how to get involved with the organization and its mission. We also dive into the best tips for those who are new to cybersecurity and upcoming events with Cyberjutsu. ______________________________ Guest Mari Galloway CEO of Cyberjutsu [@WomenCyberjutsu] On Twitter | https://twitter.com/marigalloway On LinkedIn | http…
 
These 2 Cyber Chicks catch up with ajay Menendez - ajay is a military veteran and a cyber expert with over 30 years in this space. Tune in for more about threat intelligence, his take on learning and development in cyber, whether any social platforms are truly “secure” or private, and how to level up your LinkedIn recommendation game. And, most imp…
 
Our guest for the show is Mike Schuricht , Mike is the VP of Product Management at Forcepoint. Prior to that, he was the SVP of Product Management at Bitglass. He has a background in the development of innovative enterprise security products, with expertise in configuration management and user-interface design. Season 4 KickOff episode with Chase h…
 
Doc Searls and Katherine Druckman talk to Dave Huseby of Cryptid.tech about pseudonymous authentication and verifiable data. Site/Blog/Newsletter FaceBook Twitter YouTube Mastodon Special Guest: Dave Huseby. Support Reality 2.0 Links: Reality 2.0 Episode 112: Pseudonymous Authentication for Twitter — Katherine Druckman and Kyle Rankin talk to Dave …
 
Up to 83% of known compromised passwords would satisfy regulatory requirements Broadcom confirms deal to acquire VMware Experts warn of rise in ChromeLoader malware Thanks to today’s episode sponsor, Optiv Up for a Zero Trust Crash Course? Join our expert, Jerry Chapman, Engineering Fellow at Optiv and author of "Zero Trust Security: An Enterprise …
 
On this special episode Jenny chats with Snow and JC about the new Social Engineering Community that will be at DEF CON 2022, held in Las Vegas this August. Listen in as some old favourites and new features are announced, plus how you can get involved, but be quick as there are deadlines! To follow the SE Community on Twitter, click this link. To v…
 
In 2018, the Camp Fire swept through California. It was the deadliest in the state’s history, destroying more than 18,000 buildings and killing 85 people. The town of Paradise all but burned to the ground at the time. Four years later, Paradise is in the midst of a housing boom. New homes are everywhere as people, some of them who lost their homes …
 
"Pantsdown" in QCT Baseboard Management Controllers. A warning on ChromeLoader. Conti updates. Ransomware’s effect on SpiceJet. CISA's Known Exploited Vulnerabilities Catalog expands, again. Kyiv honors Google. Josh Ray from Accenture reminds us it’s military appreciation month. Our guest is Melissa Bischoping of Tanium with lessons learned from th…
 
A daily look at the relevant information security news from overnight. Episode 233 - 26 May 2022 Curb Kerberos- https://www.zdnet.com/article/microsoft-heres-how-to-defend-windows-against-these-new-privilege-escalation-attacks/ Tales from the Cheerscrypt - https://www.bleepingcomputer.com/news/security/new-cheers-linux-ransomware-targets-vmware-esx…
 
All links and images for this episode can be found on CISO Series Zero trust is a hollow buzzword. In any form of security, there exist critical points where we have to trust. What we need is a move away from implicit trust to explicit trust, or identity that can be verified. Check out this post for the discussion that is the basis of our conversat…
 
Welcome to episode 251 of the Transatlantic Cable. This week, the team look at some of the more ‘interesting’ stories in the cybersecurity world. To kick things off, Dave and Ahmed look at a, seemingly, good news story – about the closing down of the ransomware gang, Conti. However, things aren’t quite as they appear. From there they move to a stor…
 
Popular open source libraries leaked keys for “research” DuckDuckGo gives Microsoft a pass on trackers Microsoft weathers the vulnerability storm Thanks to today’s episode sponsor, Optiv Need a guide on your Zero Trust journey? Jerry Chapman, Engineering Fellow at Optiv and author of "Zero Trust Security: An Enterprise Guide" shares the following t…
 
The CyberPHIx Roundup is your quick source for keeping up with the latest cybersecurity news, trends, and industry-leading practices, specifically for the healthcare industry. In this episode, our host Brian Selfridge highlights the following topics trending in healthcare cybersecurity this week: Highlights from the US Senate HELP hearing discussin…
 
How can purple teaming benefit your organization? When red teamers like Matt Mullins collaborate with blue teamers like Owen Dubiel, you know you'll get a thorough and cost-effective assessment of your security environment. Listen to Matt and Owen share their strategies for successful purple teaming design and implementation. Plus, hear about their…
 
Tom Fox returns for another episode of Life with GDPR. Jonathan Armstrong is on assignment this week, so we are joined by our colleague André Paris, a Brazilian Privacy and Compliance Consultant, Professor and Lawyer. Andre is the author of the book "Ethics and Transparency - A Path to Compliance". He is a specialist in building a Corporate Culture…
 
A browser extension bug let malicious websites spy on webcams, hackers threaten the global food supply chain, and Michael Fish (not that one...) hacked into his female classmates' online accounts, hunting for nude photos and videos. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer securit…
 
A daily look at the relevant information security news from overnight. Episode 232 - 25 May 2022 Mozilla un-pwned- https://www.bleepingcomputer.com/news/security/mozilla-fixes-firefox-thunderbird-zero-days-exploited-at-pwn2own/ Chrome hardened - https://www.securityweek.com/chrome-102-patches-32-vulnerabilities Moshen Dragon Trend-ing - https://www…
 
More cyberespionage targets Russian networks. Lincoln Project veterans visit Ukraine with advice on conducting an influence campaign against President Putin. A politically motivated DDoS attack hits the Port of London Authority website. Is REvil back and looking into new criminal techniques, or is a recent DDoS campaign the work of impostors? Ranso…
 
Interview Links Check out Omer and Richard’s paper. Learn more about Omer’s work and Richard’s work. Rapid Rundown Links Read the news about the change in DOJ policy toward ethical hackers. Visit the Rapid7 blog on the same topic. Dive into Harley’s great Twitter thread on the topic. Read up on the HiQ and Missouri cases mentioned. Like the show? W…
 
On May 24, several news outlets reported on the internal workings of a Chinese run Uyghur internment camp in Xinjiang. The reports included detailed blueprints of the camp’s interiors, classified speeches from officials, and the personal information of police officers. An anonymous source hacked the information and got it out of China and into the …
 
Interpol warns nation-state malware could become a commodity on dark web soon General Motors Hit by cyber-attack exposing car owners' personal info Canada to ban China's Huawei and ZTE from its 5G networks Thanks to today’s episode sponsor, Optiv Up for a Zero Trust Crash Course? Join our expert, Jerry Chapman, Engineering Fellow at Optiv and autho…
 
Episode 176 of the Unsecurity Podcast is now live! This week, Evan and FRSecure CTO, Oscar Minks sit down to discuss job descriptions in the information security field. Give episode 176 a listen and send any questions, comments, or feedback to unsecurity@protonmail.com. Don't forget to like and subscribe!…
 
Verizon's 2022 Data Breach Investigation Report shows a sharp rise in ransomware. Origins of the Chaos ransomware operation. The GuLoader campaign uses bogus purchase orders. Security researchers are targeted in a malware campaign. Hyperlocal disinformation. Turla reconnaissance has been detected in Austrian and Estonian networks. Ben Yelin describ…
 
A daily look at the relevant information security news from overnight. Episode 231 - 24 May 2022 Yik Yak fixed that - https://portswigger.net/daily-swig/yik-yak-fixes-information-disclosure-bug-that-leaked-users-gps-location Abusing the abused - https://www.bleepingcomputer.com/news/security/photos-of-abused-victims-used-in-new-id-verification-scam…
 
All links and images for this episode can be found on CISO Series I have talked to vendors who get all excited about Gartner opening up a new category for them. All I can think is uggh, something new to confuse the security marketplace. I know there's a need to label products in categories to simplify sales. But the complexity is driving buyers nut…
 
From finding bugs to pentesting and now a successful woman entrepreneur. Let's listen to her story of building resilience, strength, and believing in herself. It is said that we carve our own destiny, that we create our own opportunities. This conversation inspires us as a woman to never give up on our dreams. Laura Bell started finding bugs and be…
 
Cyberattack divorces Zola users from registries A look at the RansomHouse data-extortion operation Now we have to worry about pre-hijacking attacks Thanks to today’s episode sponsor, Optiv Need a guide on your Zero Trust journey? Jerry Chapman, Engineering Fellow at Optiv and author of "Zero Trust Security: An Enterprise Guide" shares the following…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login