show episodes
 
The day’s news made fast, fair and fun – in 10 minutes. Erica Mandy is like a trusted friend who always ‘gets’ both sides. She’s a veteran journalist who was tired of talking heads, alarmist headlines and monotone voices, so she created something different. The NewsWorthy is packed with politics, tech, business and entertainment from a variety of sources -- brought together in one, convenient place (and with a fun twist). Join the thousands of people already listening each weekday!
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. See acast.com/privacy for privacy and opt-out information.
 
Save Meduza! https://support.meduza.io/en Meduza’s first English-language podcast, The Naked Pravda highlights how our top reporting intersects with the wider research and expertise that exists about Russia. The broader context of Meduza’s in-depth, original journalism isn’t always clear, which is where this show comes in. Here you’ll hear from the world’s community of Russia experts, activists, and reporters about the issues at the heart of Meduza’s stories.
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
S
Smashing Security

1
Smashing Security

Graham Cluley, Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over seven million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Join Mat and Mike from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
 
Policy Options is a digital magazine published by the Institute for Research on Public Policy (IRPP) in Montreal, Quebec. It features daily articles on issues of public policy by contributors from academia, research institutions, the political world, the public service and the non-profit and private sectors. We’re committed to introducing our listeners to a diversity of viewpoints on the important public policy challenges of our time. Twitter: https://twitter.com/IRPP Facebook: https://www.f ...
 
DARPA’s podcast series, "Voices from DARPA," offers a revealing and informative window on the minds of the Agency's program managers. In each episode, a program manager from one of DARPA’s six technical offices—Biological Technologies, Defense Sciences, Information Innovation, Microsystems Technology, Strategic Technology, and Tactical Technology—will discuss in informal and personal terms why they are at DARPA and what they are up to. The goal of "Voices from DARPA" is to share with listene ...
 
C
Caveat

1
Caveat

CyberWire, Inc.

Unsubscribe
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. Click Here. Produced by The Record Media
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us!
 
Loading …
show series
 
Cybersecurity keeps changing at an ever-quickening pace, and, really, it’s probably going to stay that way. Sharon Nelson and John Simek welcome friend and cybersecurity expert David G. Ries to discuss some of the major happenings of the past year and what we should expect for 2022. David gives an overview of current cyber-threats and notable data …
 
Cyber risk continues over Ukraine as the US and NATO reject Russian demands. Emissary Panda’s industrial espionage against German industry. Fancy Bear is spotted in Western Asia. The C2C market’s initial access broker Prophet Spider is selling access to unpatched VMware Horizon instances. Social engineering adapts to its marks. Thomas Etheridge fro…
 
It’s been a wild few weeks for crypto and NFTs. The whole market took some hits, but the crypto markets especially have seemed to spiral. At the same time, there’s been so many hacks, stolen Apes, and ransomed tokens that it’s hard to keep track of them all. This week on Cyber, we go through it all. Who lost what and how? Also, what is it about the…
 
Host Luke McNamara is joined by Michelle Cantos, John Doyle, and James Sadowski to discuss the role of contractors in cyber network exploitation (CNE) and other cyber operations. For further reading on this topic for Mandiant Advantage and MA Free users, please see “She Doesn’t Even Go Here: The Role of Contractors in the Cyber Landscape” at https:…
 
Cybersecurity keeps changing at an ever-quickening pace, and, really, it’s probably going to stay that way. Sharon Nelson and John Simek welcome friend and cybersecurity expert David G. Ries to discuss some of the major happenings of the past year and what we should expect for 2022. David gives an overview of current cyber-threats and notable data …
 
To kick off the latest edition of the Kaspersky Transatlantic Cable podcast, Ahmed and I ask Dave the status of his Covid-19 NFT. Unfortunately, he was too busy recovering from the actual virus to create his own NFT. However, we stay on the topic of NFTs for a pair of articles. The first is with our friends on Twitter and how users can now have the…
 
All links and images for this episode can be found on CISO Series Security professionals are drowning in activities. Not all of them can be valuable. What should security professionals stop doing be to get back some time? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark…
 
As we’ve discussed on the show, online advertisements are the shifting, unstable sand on which the contemporary internet is built. And one of the many, many ways in which the online ad ecosystem is confusing and opaque involves how advertisers can find their ads popping up alongside content they’d rather not be associated with—and, all too often, n…
 
The news to know for Thursday, January 27th, 2022! We're talking about an open seat on the Supreme Court: who is retiring and when a new justice is expected to take over. Also, what to know about a new version of Covid-19 that's been detected in the U.S. Plus, a SpaceX rocket booster on a collision course with the moon, why Spotify is removing a Gr…
 
White House releases new cybersecurity strategy Trickbot gets trickier VPNLab shuttered in global takedown Thanks to our episode sponsor, deepwatch Increasing ransomware attacks and their evolving sophistication have been putting more pressure on security teams than ever before. Luckily, managed detection and response (or MDR) has emerged as a crit…
 
Guest Susan St. Clair of WhiteSource discusses increased regulation in the open source community with Dave. Ben looks at a lawsuit against Google targeting location data. and Dave talks about rising cyber insurance costs and the influence they have on best practices. While this show covers legal topics, and Ben is a lawyer, the views expressed do n…
 
Automation is a term that goes all the way back to the bronze age. Throughout human history, we have sought different types of automation in order to manipulate the world around us into making things easier. Simply put, automation makes the complex--simple. At their core, computers are the very definition of automation. That's why they were created…
 
Wordle - good or bad for the world? Whatever your opinion, at least someone wants to spoil players' fun. Meanwhile, we take a look at the threat mobile phones can pose to your mental health. All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. Visit…
 
Tensions between Russia and Ukraine remain high as NATO offers Ukraine cyber, diplomatic, and other support. North Korea gets DDoSed. DazzleSpy hits Hong Kong dissidents drawn to a watering hole. TrickBot ups its game. A quick look at ransomware trends. Microsoft’s Kevin Magee unpacks a recent World Economic Forum report. Our own Rick Howard speaks…
 
Just when you thought law firm salaries had settled into a nice equilibrium, Milbank announced another round of base salary hikes and the whole cycle began again. But with some notable hold-outs, the industry is left wondering if this is the last word on the matter or if another raise is on the horizon. We also talk about Elon Musk's effort to get …
 
Over the past few years, the need for governments to work with one another has been ramping up. Canada is facing a long and unpredictable pandemic, a changing economy and high expectations from Canadians. 2022 is upon us, and with the new year come new policies for governments to fight over and old disagreements to revisit. So, what issues are on t…
 
The 1972 issuance of the Report of the National Commission on State Workmen's Compensation Laws is one of the watershed moments in modern workers' compensation. As this year marks the 50th anniversary of the report, we felt it was worth revisiting our conversation with John F. Burton, Jr., who served as chairman on that commission. In this episode,…
 
Want to take your cross-examination skills to the next level. In this encore episode, renowned attorney and author Patrick Malone challenges tired cross-examination practices and offers fresh insights on how, when, and where to research witnesses, outlines traps to catch the cherry-pickers and details his “no hands” approach. Join John and Erich in…
 
There's plenty of conventional wisdom about what makes a good legal brief or court opinion. Judge Robert E. Bacharach of the Denver-based 10th Circuit Court of Appeals says that when judges socialize, their conversations often devolve into discussions about language and pieces of writing they enjoy or revile. But Bacharach decided he wanted to dive…
 
Sloppy jury instructions can lead to appeal due to instructional error or confusion in deliberations, and nobody wants that. In this episode, you’ll learn about verdict directors, clean and dirty instructions, roving commissions, potential pitfalls, and resources to help you draft more concise instructions that help the jury come to a decision in y…
 
What if we declared an end to the costly system of how we classify national security information in the United States? Oona Hathaway, the Gerard C. and Bernice Latrobe Smith Professor of International Law at Yale Law School, poses this question in her article “Secrecy’s End.” Stephanie Pell talked with Oona about some of our classification system’s…
 
Online Legal Directories can be useful tools for firms seeking to build visibility, increase traffic and attract clients. They may still provide value, but there are tricks and traps to avoid. Take a deep dive and hear how to ensure your marketing budget is well spent. And news: The University of Michigan reached a $490 million settlement over sexu…
 
The news to know for Wednesday, January 26th, 2022! We have an update on the rising tensions in Eastern Europe. Russia seems to be taking more action, and the U.S. is shopping for fuel. Also, all eyes are on the Federal Reserve. What the central bank is expected to announce today, and how it's already impacting the stock market. Plus, one shortage …
 
Canada's foreign ministry hacked Hactivists target Belarus rail system to stop Russian military buildup Segway victimized by Magecart attack Thanks to our episode sponsor, deepwatch Increasing ransomware attacks and their evolving sophistication have been putting more pressure on security teams than ever before. Luckily, managed detection and respo…
 
This is the audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; Russia arrests REvil ransomware gang members, seize $6.6 million https://www.bleepingcomputer.com/news/security/russia-arrests-revil-ransomware-…
 
The Saudi-led coalition carried out airstrikes in Yemen last Friday, hitting two separate targets: a detention center, where migrants are held, and a telecommunications tower, cutting off internet access for most of the country for four days. At least 60 people were killed in the attack, including three children.…
 
Tensions remain high as Russia assembles troops near Ukraine and NATO moves to higher states of readiness. The Belarusian Cyber Partisans claim responsibility for a ransomware attack against Belarusian railroads. The BRATA banking Trojan spreads, as does DTPacker malware. REvil alumni may be getting the band back together. Ransomware operators work…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login