Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Deception, influence, and social engineering in the world of cyber crime.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
Hackers Podcast
Hosted by former covert CIA intelligence officer Andrew Bustamante, Everyday Espionage gives you practical, powerful spy skills you can use to get ahead in your everyday life.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
Thinking about the intersection of security, technology, and society—and what might be coming next. Every Monday morning you get a curated 15-30 minute summary of the week's most important stories and why they matter. Plus regular essays and interviews that explore a single topic.
Just two people trying to do IT and Security the right way.
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
T
The Azure Security Podcast


1
The Azure Security Podcast
Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2021 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
S
Symantec Cyber Security Brief Podcast


1
Symantec Cyber Security Brief Podcast
Security Response Team
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
B
Black Hills Information Security


1
Black Hills Information Security
Black Hills Information Security
Penetration testing for Fortune 50 companies since 2008.
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
D
Digital Forensic Survival Podcast


1
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
A look at the current state of enterprise security solutions, including new products, features and industry reporting. Hosted by Paul Asadoorian, Matt Alderman and John Strand.
The State and Popular Culture
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. Click Here. From The Record by Recorded ...
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
C
Careers Information Security Podcast

51
Careers Information Security Podcast
CareersInfoSecurity.com
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
G
Government Information Security Podcast

51
Government Information Security Podcast
GovInfoSecurity.com
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
B
Brakeing Down Security Podcast


1
Brakeing Down Security Podcast
Bryan Brake, Amanda Berlin, Brian Boettcher
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
Podcast series covering various topics in security and technology
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over seven million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
A podcast dedicated to bringing the latest news on information security and the industry - from those that work in the industry.
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
A podcast about security for developers, covering tools and best practices.
The Secure Talk podcast reviews the latest threats, tips, and trends related to cybersecurity, cryptocurrencies, and compliance. Host Mark Shriner interviews leading cybersecurity and cryptocurrency executives to discuss best practices related to IT security, data protection, cryptocurrency investment and usage.
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Produced with the support of Policy Forum. See acast.com/privacy for privacy and opt-out information.
New Macquarie University research into phone scams has identified the scripts and emotions that drive most calls. A team of researchers from Macquarie University’s Cyber Security Hub has analysed the content of more than 100 hours of scam phone calls to identify clear call ‘stages’ and pinpoint the social engineering techniques scammers use on thei…
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, May 16-20, is hosted by Rich Stroffolino with our guest, Jerich Beason, CISO, Commercial Bank, CapitalOne Thanks to today's episode sponsor, Torq All links and the video of this episode can be found on CISO Series.com
C
Cybersecurity Today


1
Cyber Security Today, Week in Review for May 20, 2022
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17
This episode features a discussion a report on security problems IT needs to address, an international survey of CISOs and the EU coming closer to beefing up security standardsBy ITWC
This week, in the first segment, Brian Glas answers the questions surrounding the next generations of AppSec professionals: What does it look like to try teaching cybersecurity at an undergraduate level? What are the goals and challenges faced when trying to help future generations learn what they need to know to contribute to this industry? Then, …
This week I offer brief updates from the road.Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free.Listen…
Bumblebee Malware from TransferXL URLs https://isc.sans.edu/forums/diary/Bumblebee+Malware+from+TransferXL+URLs/28664/ Microsoft Out-of-Band Update fixes Authentication Issues https://docs.microsoft.com/en-us/windows/release-health/status-windows-11-21h2#you-might-see-authentication-failures-on-the-server-or-client-for-services Sonicwall Patch for …
The latest edition of the ISMG Security Report analyzes the changes in the ransomware landscape one year after the attack on Colonial Pipeline. It also revisits the Ryuk ransomware attack on a school district in Illinois and examines common culprits hindering effective Zero Trust adoption.By CareersInfoSecurity.com
S
Symantec Cyber Security Brief Podcast


1
Chinese cyber-espionage activity, Conti gang threatens Costa Rica government, and U.S. warns about North Korean citizens seeking jobs in IT
25:45
25:45
Play later
Play later
Lists
Like
Liked
25:45
In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman discuss the recent in-depth whitepaper the Symantec Threat Hunter team produced about Chinese cyber-espionage activity, which details the most active groups operating out of that country at the moment, as well as the tactics, tools, and procedures they leverage, the custom malwar…
W
WIRED Security: News, Advice, and More


1
US Courts Are Coming After Crypto Exchanges That Skirt Sanctions
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53
A newly unsealed opinion is likely the first decision from a US federal court to find that cryptocurrencies can't be used to evade sanctions.
T
The National Security Podcast


1
Women in National Security: Catherine Burn, Deputy Director-General of the Australian Secret Intelligence Service
42:52
42:52
Play later
Play later
Lists
Like
Liked
42:52
In this episode of the National Security Podcast, we bring you the fourth instalment of the Women in National Security mini-series, produced in collaboration with Accenture. In her first-ever public interview in the role, Deputy Director-General of Capability and Corporate Management for the Australian Secret Intelligence Service (ASIS) Catherine B…
N
Naked Security Podcast


1
S3 Ep83: Cracking passwords, patching Firefox, and Apple vulns
26:20
26:20
Play later
Play later
Lists
Like
Liked
26:20
What does the word "non-commensurate" mean? When is cracking passwords legal? Why did Firefox get patched? Which computer needed dropping onto the desk? Why wasn't this 0-day listed in every Apple update? Did Duck get spammed, or was it actually a troll?https://nakedsecurity.sophos.com/he-cracked-passwords-for-a-livinghttps://nakedsecurity.sophos.c…
S
Smashing Security


1
275: Jail for Bing, and mental health apps may not be good for you
1:05:35
1:05:35
Play later
Play later
Lists
Like
Liked
1:05:35
A man hacks his employer to prove its security sucks, Telegram provides a helping hand to the Eternity Project malware, and what the heck do mental health apps think they're up to? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joine…
In this episode we talk to Shay Amar about Microsoft Defender for Containers, we go into the weeds in places! Also, Azure security news about Confidential Compute VMs, Azure Arc, Sentinel and Ransomware. Michael and Sarah also discuss their experiences with the AZ-500 exam refresh.
S
Security Weekly News (Audio)


1
SWN #213 - "Brushing", CISA, Nebuchadnezzar, Lianjia, iPhone, Leaky Sites, & Elon Balks
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31
Dr. Doug talks: Elon balking, CISA, Nebuchadnezzar, Lianjia, iPhone hacks leaky sites, the EU, and Chinese fraud reports, along with Jason Wood on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://w…
S
Security Now (Audio)


1
SN 871: The New EU Surveillance State - Eventful Patch Tuesday, Open Source Maintenance Crew, BIG-IP Boxes
1:54:53
1:54:53
Play later
Play later
Lists
Like
Liked
1:54:53
Picture of the Week. An "eventful" Patch Tuesday. Patch Tuesday. Apple patched a 0-day. Google's "Open Source Maintenance Crew". Conti suggests overthrowing the new Costa Rican government. Policing the Google Play Store. The situation has grown more dire for F5 systems' BIG-IP boxes. Errata. Closing The Loop. SpinRite. The New EU Surveillance State…
C
CyberWire Daily


1
CISA Alert AA22-137A – Weak security controls and practices routinely exploited for initial access. [CISA Alerts]
2:49
2:49
Play later
Play later
Lists
Like
Liked
2:49
This joint cybersecurity advisory was coauthored by the cybersecurity authorities of the US, Canada, New Zealand, the Netherlands, and the UK. Cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joi…
C
CISO Series Podcast


1
A Look Back at Foolish Security Policies of Past and Present
39:57
39:57
Play later
Play later
Lists
Like
Liked
39:57
All links and images for this episode can be found on CISO Series Are bad security policies of yesteryear just because we didn't know any better at the time, or were they some bozos idea of legitimate security yet the rest of us knew it was just security theater? This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series an…
S
Secure Talk - Cybersecurity


1
Preventing Phygital Attacks with Will Plummer, CSO at RaySecur
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21
Will Plummer, Chief Security Officer at RaySecur talks about best practices for mail screening and the prevention of phygital attacks.https://raysecur.com/https://raysecur.com/mail-security-report-2021/https://raysecur.com/case-study/presidential-candidate/www.securetalkpodcast.comBy Cybersecurity Secure Talk
T
The Secure Developer


1
Ep. 115, Security Ownership and Culture with Peter Oehlert
44:13
44:13
Play later
Play later
Lists
Like
Liked
44:13
Thanks for tuning in to a brand new episode of the Secure Developer! Joining us in conversation today is Peter Oehlert, Chief Security Officer at Highspot. We hear about Peter’s journey with Facebook, Smartsheet, and Microsoft, learn the difference between establishing a new security practice when there is an existing security culture and when ther…
B
Brakeing Down Security Podcast


51
Mieng Lim, Ransomware actions, using insurance to offset risk, good IR/PR comms
36:17
36:17
Play later
Play later
Lists
Like
Liked
36:17
Full VOD here (must subscribe to Twitch): https://www.twitch.tv/videos/1478955254 Mieng Lim, VP of Product at Digital Defense by HelpSystems Topic she will discuss: Outsmarting RaaS: Strategies to Implement Before, During, and After a Ransomware Attack Webinar: https://www.digitaldefense.com/resources/videos/webinar-outsmarting-raas-strategies-agai…
E
Enterprise Security Weekly (Audio)


1
ESW #273 - Yasser Rasheed & Omer Taran
1:41:10
1:41:10
Play later
Play later
Lists
Like
Liked
1:41:10
This week, in our first segment, we welcome Yasser Rasheed, Global Director of Enterprise Client Sales at Intel to talk about Protecting Your Environment with Intel vPro platform! Then, Omer Taran, Co-Founder and CTO of CybeReady, joins for an interview about Overcoming Challenges in Multinational Phishing Simulations! Lastly, in the Enterprise New…
Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Skyler Tuter, Edwin David, and Alex Hamerstone. Announcements Join the TrustedSec Discord Community TrustedSec is on Discord! Join our server to interact with …
S
Security Conversations


1
Project Zero's Maddie Stone on the surge in zero-day discoveries
42:10
42:10
Play later
Play later
Lists
Like
Liked
42:10
Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild. On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle t…
C
Cyber Work


1
What does an ICS security practitioner do? | Cybersecurity Career Series
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05
Industrial control system (ICS) security practitioners are responsible for securing mission-critical SCADA and ICS information systems. They are responsible for restricting digital and physical access to ICS devices, such as PLCs and RTUs, to maximize system uptime and availability. Extensive knowledge of OT and IT protocols, incident response, Lin…
There could be a new job in my future. Before that happens, we need to organize our IT. We’re looking at patching, Microsoft Defender for Business, and data recovery. FIND US ON 1. Twitter - DamienHull 2. YouTubeBy SECTION 9