show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
Cybersecurity made simple. Come on a journey with our host Darnley G, to bring you through the rollercoaster of information security. We will discuss topics about any cybersecurity trending news, how to's, facts, who's been hacked, and even some tips to protect your business from cybercrime. Grab a cup of caffeine and enjoy!
 
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
GDPR Now! is brought to you by Data Protection 4 Business and Thisisdpo! Our podcast focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of speciali ...
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
 
Loading …
show series
 
Colonial Pipeline makes ransom payment of nearly $5 million Biden signs executive order to bolster federal cyber defenses Apple failed to disclose security incident affecting millions of users Thanks to our episode sponsor, Altitude Networks Wouldn’t it be great if you could INSTANTLY KNOW if a file containing sensitive information was shared in th…
 
Cross Browser Tracking with Schemeflood https://fingerprintjs.com/blog/external-protocol-flooding/ Cisco AnyConnect Secure Mobility Client Patch https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK MSBuild Abused By Attackers https://www.anomali.com/blog/threat-actors-use-msbuild-to-deliver-rats-fil…
 
Interview by Jane Lo, Singapore Correspondent with Dr. Herbert Lin, Senior research scholar, Cyber Policy and Security, Center for International Security and Cooperation; Hank J. Holland Fellow, Cyber Policy and Security, Hoover Institution; and Elected Fellow, American Association for the Advancement of Science. In addition to his positions at Sta…
 
One of the most respected Cyber Security Professionals in the world and Former CISO of Mass Mutual, Aetna, KPMG, DTCC, and American Express, Mr. James Routh appears on Episode #179 of Task Force 7 Radio to break down what companies should be doing to defend themselves against supply chain attacks and how CISO's should be thinking about their DevOps…
 
On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss some research we have recently been working on at Symantec. First, we discuss a blog we published this week, which looks at multi-factor authentication and how it has become a headache for malicious actors, leading them to adopt new attack techniques in an attempt…
 
Pulse Secure patches its VPN, and CISA for one thinks you ought to apply those fixes. Apple has also patched two zero-days in its Webkit engine. Scripps Health recovers from what’s said to be a ransomware attack. Researchers describe Genesis, a criminal market for digital fingerprints. Ben Yelin described a grand jury subpoena for Signal user data.…
 
In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. The post Seeds of Destruction: Cyber Risk Is Growing in A…
 
If you haven't started on your cybersecurity goals for 2021, there is no better time to start than now. Why? Well, cybercriminals aren't only targeting large organizations anymore. 43% of cyber attacks now target small businesses. If your business is struggling right now, how scary would a cyberattack be? Would your business be able to survive a cy…
 
Mark Bowling, VP, Security Response Services at ExtraHop, discusses how his public sector experience has informed his current role, how the cybersecurity landscape is a battlefield, why preparation is integral, and more. “The Ground Truth” is a Cybercrime Magazine podcast series brought to you by ExtraHop. In this series, we will discuss how networ…
 
This episode we welcome Jeff Schmidt of Covail to discuss security and risk management, working at the FBI to create the InfraGard program, and what cybersecurity can learn from physical security controls and fire safety and protection. 0:00 - Intro 2:30 - Origin story 4:31 - Stepping stones throughout career 8:00 - Average work day 12:14 - Learnin…
 
Hey friends! Today Joe "The Machine" Skeen (a.k.a. Gh0sthax) and I talk about some of our favorite news stories, including: FBI removes hacker back doors NSA: 5 security bugs under active nation-state cyberattack Ubiquiti is accused of covering up a ‘catastrophic’ data breach — and it’s not denying it. On a side note, enjoy our podcast about how we…
 
The role of a chief information security officer demands technical knowledge, but it also requires soft skills of leading and influencing - especially over the past year as cybersecurity has grown in visibility for companies. So how can CISOs get their security message across to boards, the business, employees and the security team? Joining Janne a…
 
What roles are available in the cyber security industry? What qualities do employers look for? Currently, there is a shortage of skilled cyber security workers around the world. In Australia, the pipeline needs to continue to expand to meet the sector’s – and the economy’s – growth needs. The workforce is estimated to increase to 33,500 by 2024, wi…
 
Sam Stephanyan is an independent applications security consultant and Chapter Leader of OWASP London. Sam explains the history and purpose of OWASP (The Open Web Application Security Project), a non-profit that outlines the Top 10 security concerns. Francesco and Sam also discuss Nettacker, virtual hackathons and meetups, and the various ways to ex…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login