show episodes
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Wise Monkey Security Podcast provides cybersecurity ideas and expertise in simple instructions for anyone to incorporate into their daily lives or professional career. This podcast describes how to reduce data collection, address censorship, and strengthen your right to privacy. Wise Monkey Security addresses cybersecurity Architecture, Engineering, Governance, Incident Response, Digital Forensics, and Personal Security.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Mark Maunder co-founded Wordfence in 2011 after his WordPress site was hacked and he learned how hard it was to clean and secure. Today the team has grown to over 35 members world-wide and Wordfence protects over 3 million WordPress sites. On the Think Like a Hacker podcast, we cover interesting topics related to WordPress, security and innovation. Episodes alternate between security news and interviews with innovators from WordPress and information security communities.
 
Welcome to the Zero Hour Podcast hosted by Karl Sharman and Karla Reffold, sponsored by Cyber Security Professionals. The podcast that speaks to the best talent in the cybersecurity industry. Each episode provides insights, techniques and tools required to be successful in the cybersecurity space. This podcast is now available on Stitcher, ITunes, SoundCloud and Spotify. Please follow our content at: Instagram: @zerohourexperience Twitter: @zero_hourpod Music by: Clark Henry-Brown
 
The SafetyPro Podcast, helping you manage safety one episode at a time. With the constant regulatory and workplace culture challenges businesses face, we’ll provide you with all the relevant information necessary to achieve a safer, more productive workplace. No management theory, platitudes, or guru speak - just actionable info you can use right now.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
CYBER24 is a weekly podcast with one simple goal: to help business leaders and policy makers understand the often-intimidating subjects of cybersecurity and data privacy. Each week, our panel of rotating experts discusses the top cybersecurity issues and stories in the news. We decode the cybersecurity jargon to help you understand the complexities of cybersecurity and to help you ask the right questions of your IT and cybersecurity teams.
 
Practice Management Nuggets is a weekly interview series with practice managers, healthcare providers, or trusted vendors who support healthcare practices. Topics help managers implement, maintain, or improve business and practice administration so that health care providers can focus on providing quality health care services. Hosted by Jean Eaton, your Practice Management Mentor, of Information Managers Ltd.
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
Loading …
show series
 
Dr. Michelle Meziere, Co-chair of Elmhurst Memorial Hospital's COVID-19 Incident Response, shares the latest COVID numbers from the Hospital. She also gives an update on vaccination progress and some information regarding a COVID-19 loss support group affiliated with the Hospital.By Richard Reichert
 
Leeann Nicolo, IR lead at Coalition Inc is our feature guest this week and is interviewed by Janelle Hsia. News from The Beer Spa, mountainFLOW eco-wax, BurstIQ, Ping Identity, Red Canary, Optiv, Webroot and a lot more!Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us…
 
We know that SOC team members are burning out as they try to protect companies, yet many InfoSec programs repeat the same strategies expecting different results. Can we take insanity out of the incident response? That's a good question. One that we're not going to answer, but one that we will discuss and hopefully encourage you all to think about w…
 
Now normally the show is hosted by Karla or Karl Sharman but this time we flipped it on its head and now Daniel Woods is hosting and interviewing Karl, which is strange. But Daniel provides a lot of research into the cyber insurance markets so we thought we would discuss the cyber insurance and primarily the Incident response eco-system in more dep…
 
Imagine you could experience worlds that you design and build the way you want them to be; alternative realities that you can enter and leave as you wish. Now, Imagine there's no countries, nothing to kill or die for... imagine all the people, livin' life in peace. You may say I'm a dreamer. But I'm not the only one. Certainly not the only one. The…
 
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
 
If a tree falls in a forest and no one is around to hear it, does it make a sound? Yes and no, it depends on who you ask. In our case, the answer is a solid FOR SURE. Especially once we consider the squirrels that live in the said forest — the criminal and the ethical ones. Listen up. In the cybersecurity community it is not uncommon to use the sen…
 
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
 
Chances are you’re on at least one social media platform. It’s a great way to connect, but you need to connect and share mindfully. Tim Sadler helps us take a closer look at how to social safely. You can overshare on social media and it can get risky quickly if you share personal data like your birthday, you COVID vaccine card, or even the names of…
 
When an Iowa Sheriff arrested Coalfire pentesters Gary DeMercurio and Justin Wynn on the job, it sent shockwaves through the cybersecurity community. The two InfoSec professionals faced felony charges, jail time, and the possibility of a criminal record for doing what they were hired to do. And information security professionals faced a possible ch…
 
Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accen…
 
Rich Schliep (CTO) and Craig Buesing (CISO) at Secretary of State's Office are our feature guests this week and are interviewed by Jason Jaques. News from The Gondola Shop, Otter, Red Canary, Ping Identity, LogRhythm, Optiv and a lot more!Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastr…
 
High Performance Computing Systems Administrator at Brigham Young University Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursui…
 
In this episode we talk to Kim Crawley about her experience in the cyber security industry. She shares her perspectives as an author and her efforts to bring more inclusive perspectives to the community. Come join us for another uncommon journey with Phil, Alyssa, and Chloe. In this episode they wander into the InfoSec bar and sit down for a conver…
 
Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)u…
 
You probably know Alissa Knight as the badass female hacker of banks and cars, but she is so much more! Join us as we get to know (and laugh with) Alissa – the author, content creator, entrepreneur, speaker, wife, and all around wonderful human! From starting her first company at 17 and selling it at age 20, to hacking connected cars and writing a …
 
Microsoft wraps up its internal investigation of Solorigate, which the US Government continues to grapple with, and which has had some effect in Norway. An apparent Iranian APT has been hosting its command-and-control in two Netherlands data centers. Estonia’s annual intelligence report describes Russian and Chinese ambitions in cyberspace. Threat …
 
An analysis of WordPress-related search trends found that interest in WooCommerce related results dominated during 2020. We discuss recent vulnerabilities discovered by our threat intelligence team in Ninja Forms, affecting over 1 million sites. WordPress issues a statement that pirated themes and plugins are prohibited on the repository. And a sup…
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident…
 
Water, we usually take it for granted that what comes out of our taps is safe. But recently an attacker attempted to poison a water supply in Florida. Bryson Bort, explains what happened. Bryson is a cyber-security expert with vast experience in cyber mission support for national defense, especially where a lot of industrial controls are implemente…
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
High Bitcoin valuation draws the attention of cybercriminals, and a number of those criminals work for Mr. Kim, of Pyongyang. Alleged criminals, we should say. Centreon offers an update of its investigation of the Sandworm incident ANSSI uncovered. Reports of the Big Hack are received with caution. Patches applied, pulled, and replaced. Joe Carriga…
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
France finds Sandworm’s trail in a software supply chain. Microsoft is impressed by the amount of effort Russian intelligence services put into the SolarWinds campaign. Pyongyang is reported to have attempted to steal COVID-19 vaccine information. Supermicro reiterates objections to Bloomberg's report on alleged hardware supply chain compromises. S…
 
In this special edition, our extended conversation with Hank Thomas and Mike Doniger from their new company SCVX. Both experienced investors, their plan is to bring a new funding mechanism known as a SPAC to cyber security which, they say, is new to the space. February 2021 Update: we revisit the topic with guest Hank Thomas to hear the latest on S…
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
In this episode Jon Helmus guest hosts a special episode on ITSPradio on behalf of Caroline Wong. His guest is Dr. Gerald Auger, Ph.D, Cyber Advisor, Speaker, and Educator. They talk about finding your passion within cybersecurity, how to get started in the field, and what companies should look for to build out their security programs. Guest Dr. Ge…
 
On this episode, Rafal and Chris discuss how a Washington state agency screwed its vulnerable users using an irresponsible vendor's 20-year-old software. You know what, they're both wrong. Even though there are technicalities, and someone is going to win in the upcoming court battles (quote us on this one), the real victims are those who have had t…
 
Classic Cinemas Founder Willis Johnson discusses the company's history and development of the York Theatre from a 'Classic' one-screen theatre into the 10-screen anchor of downtown Elmhurst it is today. He and current CEO, Chris Johnson, share the state of the movie theatre industry and their confidence of a successful future, post-Pandemic. LowDow…
 
This week we have Greg and Mike…we are two strong, independent people and don’t need nobody else. **Sponsors** Sonar.software Kwikbit.com Towercoverage.com **/Sponsors** This week we talk about: Arizona Sunshine multiplayer is all kinds of fun We had a chat with Simon Westlake from Sonar Some Netonix switches will power down if there’s no load pres…
 
This week we have Greg and Mike…we are two strong, independent people and don’t need nobody else. **Sponsors** Sonar.software Kwikbit.com Towercoverage.com **/Sponsors** This week we talk about: Arizona Sunshine multiplayer is all kinds of fun We had a chat with Simon Westlake from Sonar Some Netonix switches will power down if there’s no load pres…
 
Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was approached by a cybersecurity consultancy interested in t…
 
During this episode, Ted and Will talked about a gazillion things related to startups, investments, leadership, the cybersecurity market, and so much more. Here are some of the highlights: why venture capital is not about money; it's about helping founders succeed why to succeed you don't need to have a solution that 100% of CISOs need, you just ne…
 
Guest Dr. Shreyas Sen, a Perdue University associate professor of electrical and computer engineering, joins us to discuss the following scenario:. Instead of inserting a card or scanning a smartphone to make a payment, what if you could simply touch the machine with your finger? A prototype developed by Purdue University engineers would essentiall…
 
Who are you today? Is there one true self, or are we adapting behaviors to different social situations and goals? The answer is yes, and yes. Whether we realize it or not, we are all social engineers; we are all human hackers. Some of us are good at it and do it intentionally. Some are just being human and part of a social species. And, a few are s…
 
Bloomberg revives its reporting on hardware backdoors on chipsets. Has someone bought the source code for the Witcher and Cyberpunk? CISA issues ICS alerts. The FBI and CISA offer advice about water system cybersabotage as state and local utilities seek to learn from the Oldsmar attack. Verizon’s Chris Novak ponders if you should get your Cybersecu…
 
This week, the Wordfence team discusses cryptography in-depth, including the basics, a brief history, hashing, and the Crypto Wars. We also go over current news, including 2 new findings by the Wordfence Threat Intelligence team, a new milestone for WordPress, and a recent attack on a Florida Town's water supply.…
 
Join the Community of Safety Pros today! The OSHA guidance is intended to inform employers and workers in most workplace settings outside of healthcare to help them identify risks of being exposed to and/or contracting COVID-19 at work and to help them determine appropriate control measures to implement. Separate guidance is applicable to healthcar…
 
Welcome to the latest episode of the Zero Hour podcast and your host today is Karla Reffold. We are joined by Sandro Bucchianeri. Sandro is an award-winning, globally experienced Security Executive with over two decades of cybersecurity experience, with the last 12 years at the executive level (CISO and CSO). Sandro is currently the Group CSO at Ab…
 
This special cast has Greg, Mike, Chad Wachs, and Simon Westlake talking about where Sonar is and where they are going. I believe we have some choppy video on this one, so sorry about that. I also think this is session one with a follow up in the future. Please let us know if you have any questions for the next go around. This week we talk about: T…
 
This special cast has Greg, Mike, Chad Wachs, and Simon Westlake talking about where Sonar is and where they are going. I believe we have some choppy video on this one, so sorry about that. I also think this is session one with a follow up in the future. Please let us know if you have any questions for the next go around. This week we talk about: T…
 
Spyware in the Subcontinent. Some crooks auction stolen game source code while others bilk food delivery services. Emotet survived its takedown. Ransomware developments. The US now has a point person for Solorigate investigation and response. Andrea Little Limbago from Interos on her participation in the National Security Institute at George Mason …
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login