show episodes
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Principal Security Consultant at FRSecure and a 20+ year veteran of the industry. Hosting things ...
 
T
ThinkstScapes

1
ThinkstScapes

Jacob Torrey, research@thinkst.com, haroon meer, marco slaviero

Unsubscribe
Unsubscribe
Monthly
 
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
 
R
Reality 2.0

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
S
Smashing Security

1
Smashing Security

Graham Cluley, Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over seven million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show is live at 9 AM EST Monday through Thursday and tune in each Friday for a special Tech Corner with some of the industry's brightest minds to discuss the latest challenges, innovations, and technologies. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We wa ...
 
Join hacker maker Phillip Wylie and his guests as they discuss and unveil the “secrets” of professional hacking — a mysterious, intriguing, and often misunderstood occupation, even by those in the field of cybersecurity. With the rising need for professional hackers, those entering the infosec world are drawn to it, and understandably so — it is an exciting and fascinating career. Still, it sure has nothing to do with magic. Join these conversations to discover what the role entails, the dif ...
 
Welcome to the Cybrary Studios, home to Cybrarys three podcast series, including the award-winning 401 Access Denied voted Best Cybersecurity Podcast for NORTH AMERICA by the 2021 Cybersecurity Excellence Awards.The Cybrary Podcast -In this show, we will be speaking with current leaders and experts in the IT and Cybersecurity fields. Discussing topics ranging from DevSecOps and Ransomware attacks to diversity and the retention of talent the Cybrary Podcast covers it all. Stay up to date with ...
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
 
T
The Host Unknown Podcast

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Weekly
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over 7 years of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
Loading …
show series
 
A daily look at the relevant information security news from overnight. Episode 238 - 13 May 2022 REvil killer - https://portswigger.net/daily-swig/researcher-stops-revil-ransomware-in-its-tracks-with-dll-hijacking-exploit Tricky phish - https://www.bleepingcomputer.com/news/security/iranian-hackers-exposed-in-a-highly-targeted-espionage-campaign/ Z…
 
In this episode, Alh4zr3d, Hopscotch, Homebrewer, PurpleFox, Cheese, and S1ren discuss how to break into Information Security as a profession as well as answer questions such as how to pivot out of Capture the Flags and into a career, How age factors into a job hunt, How to transition from a non-security role to a security role, and much more. We a…
 
The Hurricane Labs team shares a few stories about their experiences with social engineering–and ways we can become more resilient to this type of attack. Also, make sure to check out some of the articles and resources mentioned during this episode: Verizon 2021 Data Breach Investigations Report Influence: The Psychology of Persuasion RSA Key Extra…
 
Zyxel Firewall Exploit, SonicWall urges Patch, Iran OilRig & US Signs Cybercrime treaty Cybersecurity News CyberHub Podcast May 16th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: CISA Removes Windows Vulnerability From 'Must-Patch' List Due to Buggy Update SonicWall ‘strongly urges’ admins to patch SSLVPN SMA1000 bug…
 
Just getting started? This role is for you! The Cybersecurity Beginner role focuses on the foundational skills and knowledge that will allow anyone to take the first step towards transitioning into a cybersecurity career. No prior knowledge of cybersecurity or work experience is required. The only prerequisite is a passion for technology and cybers…
 
Ukraine CERT-UA warns of new attacks launched by Russia-linked Armageddon APT Microsoft fixes new PetitPotam Windows NTLM relay attack vector Hackers are exploiting critical bug in Zyxel firewalls and VPNs And now let’s thank today’s sponsor, Torq Myth 1: Automation Is Only a Reactive Part of SecOps Incorrect. Proactive management of security incid…
 
In this episode I talk with Thomas Kinsella about the life of a SOC Analyst and the struggles that come with it. We also touch on what someone can do to avoid those struggles and how companies should adjust to minimize the struggles. As always, if you enjoy this podcast please leave a review on Apple Podcasts. Below is all the links! Follow the Pod…
 
According to the zero trust philosophy, we all assume that our networks are already compromised and try to design them to limit the damage if it turns out to be so. In this episode of CyberWire-X, we’ve invited subject matter experts, Amanda Fennell, the Chief Information Officer and Chief Security Officer of Relativity, and Galeal Zino, CEO of epi…
 
Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten b…
 
In this new episode of KnightLife, I unbox the new PTZOptics 30X-SDI Gen 2 Live Streaming Broadcast Camera and Ubiquiti Networks UniFi Switch for building the ultimate live stream tech stack! I also present a detailed architecture diagram for how it will all be connected in my upcoming live streams at RSA Conference 2022. __________________________…
 
Dr. May Wang, Chief Technology Officer at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infus…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, May 9-13, is hosted by Rich Stroffolino with our guest, Rich Lindberg, CISO, JAMS Thanks to our sponsor, Datadog Break down silos between DevOps and Security teams to enable collaboration and strengthen the security of your environment. In this on-demand webinar, hear from one…
 
Ukraine holds its first war crimes trial. Are there war crimes in cyberspace? Iranian cyberespionage (and a possible APT side-hustle). Roblox seems to have been used to introduce a backdoor. CISA issues ICS advisories. Darkweb C2C trader sentenced. The last conspirator in the strange case of the eBay newsletter takes a guilty plea. Carole Theriault…
 
This Week in InfoSec (07:30) With content liberated from the “today in infosec” twitter account and further afield 9th May 2006: Jeanson James Ancheta became the first person to be charged for controlling a botnet. He had hijacked around 500,000 computers and was sentenced to 57 months in prison, forfeiture of a 1993 BMW and $58,000 in profit, and …
 
Mentor and former IT directory Mark Harvey shares his story and path from IT to cybersecurity. Mark took a non traditional approach to getting into cybersecurity through popular well known hands on learning resources to go from IT directory to cybersecurity consultant. _______________________ Guest Mark Harvey Security Engineer at Alias On LinkedIn…
 
Mentor and former IT directory Mark Harvey shares his story and path from IT to cybersecurity. Mark took a non traditional approach to getting into cybersecurity through popular well known hands on learning resources to go from IT director to cybersecurity consultant. _______________________ Guest Mark Harvey Security Engineer at Alias On LinkedIn …
 
GRC is comprised of the ethical management of an organization combined with the organization’s ability to identify, quantify, and manage risk, along with the ability to demonstrate compliance for these things in connection with internal, industry, and regulatory standards, frameworks, and requirements. If defined, implemented, and managed correctly…
 
Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project. Site/Blog/Newsletter FaceBook Twitter YouTube Mastodon Special Guest: Kyle Rankin. Support Reality 2.0 Links: GitHub - ZbayApp/monorepo — An early prototype for a peer-to-peer alternative to Slack and Discord.…
 
Ransomware attacks impacted 66% of organizations in 2021. As threat actor groups like FIN7 take advantage of expanded networks, security weaknesses, and human trust, it's more important than ever to keep up with their level of prowess. Cybrary's "enterprise defender," Owen Dubiel, and "chief thief," Matt Mullins, discuss how their cybersecurity wor…
 
Welcome to Episode 121 Main Topic How do I get a hold of expensive software, for the purposes of learning? Check with your school, a LOT of vendors have super-cheap solutions for education. Your school may be able to provide you a learning license/sub for software you are interested in Less than Legal alternatives Red hat enterprise linux Red Hat D…
 
Welcome to Episode 121b Announcements Patreon Update Z(ed)-Thor name_pending197 Jérémy Arinomi Andrew Tatro Bruce Robert Matt David S0l3mn Trooper_Ish LiNuXsys666 Mark The Mentor Marc Julius Andi J Charles 22532 Nate’s going to be helping host RHEL Presents. (as a guest host) Get your Iron Sysadmin Merch at Teespring! https://teespring.com/stores/i…
 
Killnet hits Italian targets. Access to RuTube is restored. Hacktivism in the hybrid war. Emotet surges. Clearing up the confusion of NPM dependency confusion attacks. Tim Eades from Cyber Mentor Fund on finding the right investors. Our guest is Michael DeBolt of Intel 471 on the growing interest in Biometrics in the criminal underground. And cyber…
 
The cybersecurity authorities of the UK, Australia, Canada, New Zealand, and the US have observed a recent increase in malicious cyber activity against managed service providers (MSPs). Allied cybersecurity authorities expect state-sponsored cyber actors to increase their targeting of MSPs in an attempt to exploit provider-customer trust relationsh…
 
This bonus episode of Cyber is sponsored by Command Line Heroes. If you like Cyber, you’re going to like Command Line Heroes. It’s an original podcast from Red Hat where listeners hear epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape. It’s an award winning show that’…
 
A daily look at the relevant information security news from overnight. Episode 237 - 12 May 2022 HP broken BIOS - https://www.bleepingcomputer.com/news/security/hp-fixes-bug-letting-attackers-overwrite-firmware-in-over-200-models/ New Nerbian - https://threatpost.com/nerbian-rat-advanced-trick/179600/ Bitter at Bangladesh - https://www.bleepingcomp…
 
Intel & Chrome Patch, F5 Warning, Iran targeting moderate countries Cybersecurity News CyberHub Podcast May 12th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: Intel Patches High-Severity Vulnerabilities in BIOS, Boot Guard Chrome 101 Update Patches High-Severity Vulnerabilities Government Agencies Warn of Increase in…
 
All links and images for this episode can be found on CISO Series In the cyber industry we pat each other on the back and give each other awards, all while the statistics for breaches appear to be worsening, Are we celebrating growing failure? Does the cyber industry suck? Check out this post for the discussions that are the basis of our conversati…
 
Old botnets are new again Meta withdraws Oversight Board guidance request EU proposes new CSAM rules Thanks to our episode sponsor, Datadog In this on-demand webinar, you’ll learn how to best utilize the suite of Datadog Cloud Security products to identify the root cause of an attack and how a unified platform provides real-time threat-detection an…
 
Jonathan Armstrong and Tom Fox return for another episode of Life with GDPR. In this episode, we take up the proposed agreement for data transfers from the EU (and UK) to the US. Some of the issues we consider in the myriad of questions around this latest version of Privacy Shield include: 1. Is this simply an agreement to agree? 2. Who will popula…
 
Clearview AI receives something of a slap in the face, and who is wrestling over an internet wormhole? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. And don't miss our featured interview with Artur Kane of GoodAccess. Visit https://www.smashi…
 
There’s international consensus on the cyberattack against Viasat. Kaspersky remains under investigation. The Nerbian RAT is out. NPM dependencies are exploited, but to what end? Caleb Barlow examines Russia’s future on the internet. Our guest is Deepen Desai from Zscaler with the latest phishing research. And new advisories from CISA and its partn…
 
Interview Links Learn more about Kali Linux. Check out what they’re up to over at Offensive Security. Follow g0tmi1k on Twitter, and check out his blog. Rapid Rundown Links Read the Krebs on Security article on the upcoming password changes. Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your f…
 
A daily look at the relevant information security news from overnight. Episode 236 - 11 May 2022 Windows zero-days patched - https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-new-ntlm-relay-zero-day-in-all-windows-versions/ Intel bad memory - https://threatpost.com/intel-memory-bug-poses-risk-for-hundreds-of-products/179595/ Siemens a…
 
Patch Tuesday Recap, EU Blames Russia & New National Cyber Directors Cybersecurity News CyberHub Podcast May 11th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: Microsoft Warns of New Zero-Day Being Exploited E.U. Blames Russia for Cyberattack on KA-SAT Satellite Network Operated by Viasat SAP Patches Spring4Shell Vul…
 
At an early age, Daniel Hall was fortunate to discover his creative outlet within software development. Coming from an abusive orphanage home to teaching coding to college students at the age of 13 to hacking the app, Clubhouse. Dan has dedicated 45 years to the technology field but beyond that, he provides a powerful voice in our industry. Join us…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login