show episodes
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Loading …
show series
 
Ransomware can cause damage beyond your files. This episode talks about a ransomware attack that has shutdown an entire school system. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/Security…
 
Today's Headlines:Docker malware is now common, so devs need to take Docker security seriouslyMagecart Attack Convincingly Hijacks PayPal Transactions at CheckoutDigitally Signed Bandook Trojan Reemerges in Global Spy Campaign To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailchi.mp/1c199cd854f0…
 
Baltimore schools struggling with ransomware UK tightens restrictions on Huawei 5G equipment ZeroLogon now detected by Windows Defender Thanks to our episode sponsor, SecureLayer7. Getting rid of vulnerabilities within the systems can be quite an intricate task. But why bother with anything else when there is an all in one cybersecurity package for…
 
As the holiday season approaches that means the bad guys are stepping up their attacks. There is a new twist of phishing and Zoom bombing. This episode talks about what it is and how it works. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security…
 
This week's tools, tips and tricks comes in from a follower of my blogs and podcast. Finding a VPN can be difficult to wade through all the choices for something that is supposed to keep you secure. Someone created their own VPN guide and wanted to share it. Source: https://Bestvpn.org Be aware, be safe. Become A Patron! Patreon Page *** Support th…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
Today's Headlines:Tens of Dormant North American Networks Suspiciously Resurrected at OnceVietnam-Linked Cyberspies Use New macOS Backdoor in AttacksCISA Warns of Password Leak on Vulnerable Fortinet VPNs To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailchi.mp/1c199cd854f0/practitioners-brief *…
 
Biden transition team forced to build its own cybersecurity protections China owns the lion’s share of internet cross-border data flow U.S. Supreme Court to rule on hacking laws Thanks to our episode sponsor, SecureLayer7. Getting rid of vulnerabilities within the systems can be quite an intricate task. But why bother with anything else when there …
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
Mark Lynd - Head of Digital Business This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, h…
 
On today’s special episode of the New CISO podcast, Steve Moore chats with Deneen DeFiore of United Airlines, Colin Anderson of Levi Strauss & Co. and Charlie McNerney of Expedia on what it’s been like as a CISO during the pandemic. COVID and the Airline Industry Deneen begins by discussing how she became the CISO for United Airlines right as COVID…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
Today's Headlines:2FA Bypass Vulnerability Patched in cPanel & WebHost ManagerChinese Threat Actor 'Mustang Panda' Updates Tools in Attacks on VaticanStantinko's Linux malware now poses as an Apache web serverThis critical software flaw is now being used to break into networks - so update fast To make sure you never miss a single Practitioner Brief…
 
The US Senate approves a bill that will help support the research into detecting deepfakes. Deepfake videos are getting easier to make and are becoming more realistic by the day. Watch this one or the whole series, it's hilarious, by the makers of South Park - https://www.youtube.com/watch?v=_r-r6lFheKA Be aware, be safe. Become A Patron! Patreon P…
 
Brazil continues to recover from its worst cyberattack Apple's security chief indicted on bribery charges Baidu apps are leaking data Thanks to our sponsor, Dtex Traditional Employee Monitoring solutions are creepy. Capturing screenshots, recording keystrokes, monitoring web browsing and following social media activities is unnecessary and damages …
 
Vladimir Svidesskis – CISO This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they tr…
 
Today's Headlines:VMware Working on Patches for Critical Workspace ONE Access VulnerabilityMicrosoft Releases Out-of-Band Update for Kerberos Authentication IssuesQbot Banking Trojan Now Deploying Egregor RansomwareFBI warns of recently registered domains spoofing its sites To make sure you never miss a single Practitioner Brief sign up for our dai…
 
On Nov. 21, 2020 the US Senate unanimously passed the IoT Cybersecurity Improvement Act to send to the President to sign. This episode talks about what this bill will do and why it's an important step in addressing IoT security or lack thereof. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi…
 
New Jersey passes anti-doxxing law TikTok patches account takeover flaw Watch out of DDoS on Black Friday Thanks to our sponsor, Dtex Forget projects, get answers. Start preventing insider threats, stopping data loss, and monitoring remote employees in minutes, not days. And do it all without invading user privacy. DTEX Systems helps enterprises ru…
 
Sébastien Dudek - @FlUxIuS @penthertz Why we are here today? Software Defined Radio (sdr-radio.com) What kind of hardware or software do you need? Why would a security professional want to know how to use SDR tools and attacks? What other kinds of attacks can be launched? (I mean, other than replay type attacks) Door systems (badge systems) NFC? Co…
 
Daniel Sergile is the Deputy CISO at CIOX Health This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss thei…
 
Researchers from COSIC the Computer Security and Industrial Cryptography have released a video showing them hacking and driving away with a Tesla Model X in minutes. This episode breaks down how the hack works and what equipment was needed to pull it off. Tesla has since patched the vulnerability. Video of the hack - https://www.youtube.com/watch?v…
 
Today's Headlines: New Grelos Skimmer Variants Siphon Credit Card Data VMware Fixes Critical Flaw in ESXi Hypervisor Hacker posts exploits for over 49,000 vulnerable Fortinet VPNs Major Power Outage in India Possibly Caused by Hackers: Reports To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailch…
 
GoDaddy employees duped in cryptocurrency hack Global financial industry facing fresh round of cyberthreats Egregor ransomware prints its own ransom notes Thanks to our sponsor, Dtex Reliance on ‘person of interest’ identification and potential analyst bias have put first-generation insider threat solutions on the shelf. DTEX InTERCEPT offers IT an…
 
This week is my birthday special, I celebrated my birthday this weekend and leading into thanksgiving, I wanted to speak with the veterans that have impacted me the most. I hope you enjoy this week's line up of episodes This Week's guest: David Vaughn This is a special series dedicated to the men and women who volunteered and served in uniform in t…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
Ep 8 - In this Season 1 finale episode, Asif and Christina catch up with COI listeners and discuss: Why they went dark since election week and what they have been up to. Election week chaos, exhaustion, new beginnings & other changes. The challenges of working from home for working parents. Suggestions on how to cope, including self-care. Our 2021 …
 
Worldwide campaign targets ZeroLogon exploit Brandon Wales takes over at CISA Maybe ransomware operators aren’t trustworthy after all? Thanks to our sponsor, Dtex Remote Workforce Security is a thing. Network detection and web proxy solutions have been rendered nearly useless as employees are working remotely and away from the corporate network. DT…
 
Welcome to Episode 92 Main Topic Interview with Ed Skoudis! Who is Ed? What is holiday hack (for those that are new to this) How many participants did you get last year? What sort of new theme can we expect this year? You guys developed an entire web game engine for this.. How'd that go? What kind of infrastructure do you have the event running on …
 
Rob Oden – Cybersecurity Architect at L3 Harris This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their…
 
Today's Headlines: IoT Cybersecurity Improvement Act Passes Senate Cisco Webex Vulnerability Allows Ghost Access to Meetings Google Chrome 87 Closes High-Severity ‘NAT Slipstreaming’ Hole To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailchi.mp/1c199cd854f0/practitioners-brief **** James Azar Ho…
 
Breaches often make you think of a malicious act from a hacker or disgruntled person with access. This is not the case. This episode talks about insider threats and all the things you should be considering with protecting your sensitive data. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi S…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-data-protection-and-visibility/) Where is your data? Who's accessing it? You may know if you have an identity access management solution, but what happens when that data leaves your control. What do you do then? Check out this post for the bas…
 
Trump’s tweets to lose protected status post-presidency macOS Big Sur lets apps slip past security safety nets Deepfake bot used to abuse women runs wild on Telegram Thanks to our sponsor, Dtex Endpoint DLP tools that rely on intrusive, resource intensive content inspection rules do nothing but slow down endpoint performance and upset your SecOps t…
 
Rafael Nunez This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to …
 
When most people hear about a breach they assume a computer was hacked or a digital file was copied. This episode talks about how a breach is simply the loss of data and you don't need a computer problem to have a breach. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————…
 
Today's Headlines:Some Apple Apps on macOS Big Sur Bypass Content Filters, VPNsMultiple Industrial Control System Vendors Warn of Critical BugsDHS cybersecurity director Chris Krebs sackedMore Ransomware-as-a-Service Operations Seek Affiliates To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailch…
 
Trump fires CISA director Chris Krebs Facebook and Twitter grilled over US election actions Darktrace pays out nearly $2 million in overtime pay class action suit Thanks to our sponsor, Dtex Traditional Employee Monitoring solutions are creepy. Capturing screenshots, recording keystrokes, monitoring web browsing and following social media activitie…
 
Larci Robertson This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned …
 
This episode talks about another breach for a misconfigured S3 bucket. However, the owner is no longer in business. What happens to systems and data when a company shuts down and everyone walks away? Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find S…
 
Today's Headlines:Citrix SD-WAN Bugs Allow Remote Code ExecutionAttackers Target Porn Site Goers in ‘Malsmoke’ Zloader AttackCisco reveals this critical bug in Cisco Security Manager after exploits are posted – patch nowMore than 200 systems infected by new Chinese APT 'FunnyDream' To make sure you never miss a single Practitioner Brief sign up for…
 
In this episode, we are learning about modern cybersecurity leadership. We hear from Yaron Levi, CISO of Blue Cross and Blue Shield of Kansas City. Levi shares about what security professionals need to do now to lead. And he helps us consider the following questions: Why is information security mainly reactive instead of proactive? Why do most orga…
 
Apple responds to macOS privacy concerns The ransomware landscape is increasingly crowded Microsoft pauses Windows 10 updates in December Thanks to our sponsor, Dtex Reliance on ‘person of interest’ identification and potential analyst bias have put first-generation insider threat solutions on the shelf. DTEX InTERCEPT offers IT and SecOps teams a …
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login