show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over six million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, a ...
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
 
Award-winning radio show host, nationally syndicated columnist and digital lifestyle expert Kim Komando breaks down the hottest topics in tech. Get insider secrets to protect yourself online, make money from home, secure your devices, avoid scams and more. Want more from Kim? Try her free, smart tech newsletters at https://www.komando.com/subscribe/
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
Brett Johnson and Karisse Hendrick are both anti-cybercrime experts. But, with very different experiences. Karisse has worked with hundreds of the World's largest e-commerce and mobile companies to help them prevent payment fraud and other threats to their bottom line and customers. Brett, started his journey as an online fraudster, creating the first darknet forum for buying & selling credit cards and was responsible for creating the criminal enterprise that commits identity theft, credit c ...
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
A DAILY paranormal podcast filled with real ghost stories of horror, told by real people. Stories that encompass all areas of the paranormal, supernatural, demonic, ghost investigations, haunted houses, possessions, shadow people, the unexplained and more. Some listeners describe our true ghost stories as "a podcast full of great spooky stories". Another listener writes "not the same old boring zombies, vampires, witches and werewolves! This is the best ghost story podcast out there", and an ...
 
Mark Maunder co-founded Wordfence in 2011 after his WordPress site was hacked and he learned how hard it was to clean and secure. Today the team has grown to over 35 members world-wide and Wordfence protects over 4 million WordPress sites. On the Think Like a Hacker podcast, we cover interesting topics related to WordPress, security and innovation. Episodes alternate between security news and interviews with innovators from WordPress and information security communities.
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warnings signs of trouble, take quick action, and lower the risk of becoming a victim.
 
In the digital world, identity has evolved far beyond its old definitions. It’s the way we consume products. Our ability to vote. Our financial security. Digital identity can be created quickly, accessed broadly and even stolen...easily. And it doesn’t just live online. Welcome to Hello, User: the podcast that covers modern identity across every facet of our lives, from personal to public to professional.
 
Mike Walters discovers a mysterious and violent online game named WOE.BEGONE. What begins as an exploration of an alternate reality game with real-life consequences quickly becomes a search for the technology that makes the game possible. New soundtrack every episode.
 
Discover real people, overcoming security problems. 30-minute interviews with entrepreneurs, engineers, and leaders that explore modern security dilemmas and how we overcome them. A shame-free space to engage in open and honest discussions about what's really going on in Security. Interviews of about 30 minutes in length explore the dilemmas and opportunities faced by real entrepreneurs, operators, engineers, and leaders. Join us and catch a glimpse into the proven technologies and technique ...
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
 
Loading …
show series
 
Andy is joined by professional photographer Claire Rodahaver. Claire is passionate about photo safety and creating awareness of the potential dangers of posting online. Together they discuss online photo safety and how to best protect your children when posting on social media. Please share this conversation with your friends. Photo Safety with Cla…
 
Safety in online dating spaces is an issue the dating industry has grappled with for some time; with the surge of dating app usage during the pandemic, the demand for dating apps to take responsibility and ensure safer online interactions is at an all-time high. RealMe is a technology platform that hopes to solve this problem on dating apps (and ot…
 
Last week, LGBTQ student groups in China woke up to find their social media accounts abruptly shut down. It came after several feminist activists had similar shutdowns back in April. When Chinese activist Li Maizi saw another feminist being attacked online by nationalist trolls, she felt that she had to respond. After posting, she found her Weibo a…
 
Transferring money through a third party can add substantial fees and using cryptocurrency bypasses those. However, does the emerging technology invite additional risks? Today’s guest is Erica Stanford. Erica is founder of the Crypto Curry Club, UK’s number one rated networking educational event for blockchain, digital currency, crypto payments AI,…
 
In the Leadership and Communications section for this week: In modernization, security is a barrier and an incentive, Federal CISO DeRusha Maps FISMA Reform Priorities, Cybersecurity salaries: What 8 top security jobs pay, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw225…
 
Did the spirit of a deceased couple continue to haunt their home long after they were gone? Here is a preview of the story. “In the late 90's I was living in Virginia and working in Washington, D.C. and Layla was living in Wyoming and working for a popular museum and historical center. As part of her salary, she was allowed to live rent free in a s…
 
With the recent activities in space tourism, there has been increased awareness and excitement for the possibilities in space. But, are those possibilities safe AND secure? Rather than leaving this answer to chance, a team of aerospace and aviation experts, fanatics, and hackers come together to host the Aerospace Village at DEF CON. They also do a…
 
Guest Anup Ghosh, CEO of Fidelis Cybersecurity, joins Dave to share his views on the private sector hacking back, Ben digs in to the NSO Group Pegasus spyware controversy, Dave looks at a Catholic Priest being outed through deanonymized mobile device data. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitu…
 
Mike uses this new calm to chat up an old friend. And since the calm never comes before anything else, he's totally in the clear. Sidenote: can you imagine being the guy who has to monitor Mike's calls? The spinoff series, The Diary of Aliza Schultz, is available now, for free. Aliza Schultz reviews nearly every single book by airport paperback nov…
 
Lately, our societies have been dealing with more technology than ever before — some expected — some not so much. Nevertheless, rushing technology into the public should always require a lot of testing and even more thinking. We know that we cannot predict the future, but we do know that looking at things from every possible angle and asking as man…
 
Both the Security Weekly 25 Index and the NASDAQ close at record highs on 7/23/2021. See how the security market continues to stay hot. The current companies in the Security Weekly 25 Index: SCWX PANW CHKP SPLK NLOK FTNT AKAM FFIV ZS PFPT FEYE QLYS VRNT CYBR TENB SAIL MIME NET CRWD NTCT VRNS RPD SUMO RDWR PING Visit https://www.securityweekly.com/b…
 
Adrian Crisan has the ultimate authority to make decisions about tech for his company. However, in this episode of Tech Done Different, he walks us through the power of listening, how to build consensus, and new ways to think about problem-solving. You'll learn why to reframe yourself from "technologist" to "problem-solver" how (and why!) to priori…
 
In Russia, there's a green light for a new vaccine trial. The idea is to combine a first dose of the Russian vaccine, Sputnik V, with a second dose of the British AstraZeneca shot. The country’s registry of approved clinical trials shows the small study was scheduled to start July 26 and will enroll 150 volunteers. Related: Immunized but banned: EU…
 
This week in the AppSec News: CWE releases the top 25 vulns for 2021, findings bugs in similar code, Sequoia vuln in the Linux kernel, Twitter transparency for account security, a future for cloud security, & more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw159…
 
Adoption of serverless functions is rapidly growing, which means security teams will be challenged to deliver protection for data and applications in these complex environments in the coming months and years. Peter Klimek is helping Imperva customers address these challenges and will offer guidance on how to get protection for functions without slo…
 
Ever struggled to prepare for a technical job interview? Never fear! We’ve got you covered this week as we chat to Emma Bostian, author of De-coding the Technical Interview Process: A guide to help you nail your next technical interview. Plus, in Watchtower Weekly, Matt and Roo discuss the mysterious disappearance of ransomware gang REvil and the P…
 
To make a successful podcast, you need solid storytelling and production skills. That's why I sat down with audio expert Valerie Geller to break down the biggest mistakes audio pioneers make. We share anecdotes from our own careers, tips that worked for us and the top four ways you can reel in listeners and boost your ratings. Learn more about your…
 
What were the mysterious messages and dates found on a series of bricks? Here is a preview of the story. “We ended up discovering bricks engraved with names in them with what looked like birth year to death year. Did not really know the history of the property other than that it uses to be an orchard of fruits. I think that was where things really …
 
Today’s conversation is one of my all-time favorites, with someone I’ve come to respect deeply in the field of investing. My guest is Carl Kawaja, who has served as a portfolio manager at Capital Group for decades. Capital Group is among the most respected shareholders in the world, with over $2T of assets, and listening to Carl, you’ll hear why. I…
 
Land, sea, air, space, and cyberspace, that is the multi-domain environment that the Army sees operations occurring in from now forward. What does this shift in viewing the environment mean for all the aspects of raising and sustaining an army and all of its interactions and interdependencies in the joint force? Doctrine is being written and re-wri…
 
Tune in today to hear a new way of doing business, sharing CISO expert resources between more than one organization. Today's guest Jim Mallahey tells us about this new business module where these most valuable resources don't have to be full-time with your organization. Small businesses may find this extremely valuable. Hear how changing the narrat…
 
Critical Infrastructure is the ground floor for all things built in our society. Every sector is built upon the rules of Cyber. Learn more about the ICS Village. _______________________ Guest Bryson Bort On Linkedin 👉 https://www.linkedin.com/in/brysonbort/ On Twitter 👉 https://twitter.com/brysonbort ______________________ Host Keenan Skelly On ITS…
 
Abhijith once lived in a home without electricity but he overcame all obstacles to become a red teamer and eventually red team manager. Abhijith not only excelled as a red teamer, he is an educator and founder of the DEF CON Adversary Village. Abhijith's passion is well known through his efforts in the cybersecurity community. _____________________…
 
Join me for an interview with Prakash Darji, General Manager of Digital Experience Business Unit at Pure Storage, for a lively discussion on the future of storage and security. Everything from Pure Storage's recent Portworx acquisition to recovering quickly from ransomware, take a sneak peek into the future of storage and security as Prakash sees i…
 
To celebrate Hacked Off's 100th episode, we spoke with Jai Aenugu – founder of TechForce Cyber - a highly regarded cybersecurity resilience organisation with offices in both Edinburgh and Aberdeen. This week’s podcast features conversation around what sets Scotland apart in terms of cybersecurity, doing one thing and doing it really well, plus secu…
 
Just what exactly is the death gift, and is it something one would want or run from? Here is a preview of the story. “Anyway, she passed away from a heart attack and an aneurysm. They did not know which triggered which, the doctors told my family they happened at the same time. They even drug tested her and found nothing. That was not the first dea…
 
WeOpenTech is a global community of marginalized genders who work in security and tech. “You are welcome to join us if you are of a marginalized gender (even if you are unsure at this time), including non-men and/or non-cis individuals, and other genders which have been systematically oppressed. We welcome members across all nationalities, races, r…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login