show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over four million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
GDPR Now! is brought to you by Data Protection 4 Business and Thisisdpo! Our podcast focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of speciali ...
 
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cybersecurity Effectiveness Podcast. Learn more about the Verodin Security Instrumentation Platform at https://www.verodin.com #InstrumentSecurity #ProveSecurity
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
Cybersecurity made simple. Come on a journey with our host Darnley G, to bring you through the rollercoaster of information security. We will discuss topics about any cybersecurity trending news, how to's, facts, who's been hacked, and even some tips to protect your business from cybercrime. Grab a cup of caffeine and enjoy!
 
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
 
Welcome to Cyber Career Chat, the podcast supporting innovation in the fast-paced world of cyber security. Join us as we explore the exciting career paths and opportunities available and keep up with industry developments in Australia and around the world. Cyber Career Chat is brought to you by the Workforce Development team at the New South Wales Cyber Cyber Security Innovation Node and proudly produced and supported by the Experts On Air Podcast Network.
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
 
Intrusion Diversity System (IDS) is a Cyber Security podcast hosted by O'Shea Bowens, Doug Bryant Jr and Sienna Delvasto. Doug, O'Shea and Sienna weigh in on their experiences as minorities within the Cyber Security space. By telling stories, sharing experiences, giving career advice and demonstrating security tips, tricks & tools O'Shea, Doug, and Sienna hope to inspire others to see how exciting and valuable a career in Cyber Security could be.
 
Loading …
show series
 
Vulnerable SonarQube Configurations Used to Steal Code https://beta.documentcloud.org/documents/20399900-fbi_flash_sonarqube_access_bc Microsoft Edge Security Updates (Chromium-Based) https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200002 Microsoft Releases Flash Removal Tool https://support.microsoft.com/en-us/help/4577586/up…
 
Introducing a takeaway interview from Episode 1 - MySecurityTV Tech & Sec Weekly Series - Aerospace, Defence & Security Technology Market Trends - Watch now... Russian State-Sponsored APT Actor Compromises U.S. Government Targets: Interview with Professor Matthew Warren, Director of RMIT University Centre for Cyber Security Research and Innovation.…
 
Jacinda Erkelens studied at Macquarie University and has a Bachelor of Security Studies and Security, whilst also completing International Relations and Politics units to enhance her understanding of the world we live in. Jacinda’s focus is within the strategic and policy making side of cyber security. Jacinda is now a full-time Information Assuran…
 
Are we doing enough to ensure that electoral campaigns and elections are cyber secure and perceived as such by the citizens? The short answer is, of course not — it is never enough. For the long answer, listen up. As we often remind everyone on ITSPmagazine, cybersecurity awareness and education must become second nature, an integral part of our cu…
 
Ariel Evans, the CEO of Cyber Innovative Technologies and the Founder of Cyber Intelligence 4U appears on Episode #155 to unpack the complexities of Cyber Risk in a way that only she can. We ask Evans what she thinks companies need to change to increase their cyber resiliency, how digital assets are used, how she thinks about Cyber Resiliency, and …
 
George McPherson, host of the “Blak Cyber” podcast, has an impressive background in IT and information security. On today’s episode, he discusses his cybersecurity journey, talks about his mentors and inspiration, and shares advice for learning cybersecurity and moving up the career ladder. – Get your free security awareness toolkit: https://infose…
 
We’re talking about weekly tasks, 365 authentication issues, and training. On the training front we have ITIL 4, SOC and Windows 10. LINKS 1. The SOC Age Or, A Young SOC Analyst's Illustrated Primer - Presentation from BHIS 2. SOC Core Skills w/ John Strand 3. ITIL 4 Foundation Course FIND US ON 1. Facebook 2. Twitter - DamienHull…
 
On this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman are joined by Symantec threat researchers Vikram Thakur and Alan Neville. Vikram discusses Symantec’s role in the cross-industry initiative to disrupt the Trickbot botnet. Symantec was part of a global partnership that secured a court order directing hosting providers to take dow…
 
Key Points: Data protection, network security, and Cyber Security Awareness Month Progress made by U.S. corporations/municipalities to better prepare and defend themselves against cyber-attacks Election security and disinformation campaigns designed to undermine the confidence in our electoral system By volume, China conducts the most disinformatio…
 
The US Federal Bureau of Investigation, the FBI, has taken an increasingly prominent role in the day to day cyber defense of organizations and institutions here in the U.S., and globally as well. Through the establishment of the IC3, the Internet Crime Complaint Center, the FBI provides an invaluable public resource for prevention, response, and mi…
 
It’s National Cyber Security Awareness Month! And you know what that means? It’s time to make everyone more aware! Since we all have that special someone in our lives who could use a refresher on internet hygenie, we figured it was time to talk about bringing up the topic of security to your friends and family who may not be as computer literate as…
 
You know about malware, ransomware, spyware. But there's an increasing concern about stalkerware, a creepy breed of apps that allow someone else to digitally monitor you. What is stalkerware all about and how can you recognize it? Who plants it and why, and who are its victims? Joining the show are Eva Galperin, director of cyber security at the El…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login