show episodes
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security experts, Caroline Wong and Vanessa Sauter, as they focus on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over four million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.
 
Welcome to the Cyber Coalface a fortnightly Purple Team Cyber Podcast covering the whole cyber threat, hosted by myself David Tyler and JayJay Davey two UK Military Veterans who ended up in Cyber Security.Join us today as we cover aspects affecting Cyber Security from the perspective of a Red Teamer and Blue Teamer. This podcast is ideal for anyone in the Cyber or Infosec field, come and listen to those on the Cyber front lines!
 
Intrusion Diversity System (IDS) is a Cyber Security podcast hosted by O'Shea Bowens, Doug Bryant Jr and Sienna Delvasto. Doug, O'Shea and Sienna weigh in on their experiences as minorities within the Cyber Security space. By telling stories, sharing experiences, giving career advice and demonstrating security tips, tricks & tools O'Shea, Doug, and Sienna hope to inspire others to see how exciting and valuable a career in Cyber Security could be.
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the CyberWire editorial team.
 
Loading …
show series
 
This week Tracy Maleeff hangs out to talk about using empathy to improve your InfoSec investigations. My 3 main takeaways were 1) how to collaborate OSINT findings before drawing a conclusion 2) how to communicate technical issues to a non-technical audience and 3) some tactical tips on using empathy to discover new information. For more informatio…
 
Brad is back after his recent bout with Labyrinthitis for episode 108 of the UNSECURITY Podcast. This week, Evan and Brad continue the conversation from episode 106. With many people working and schooling from home this year, in-home security is more important than ever. But why? Check out this episode to find out—and get some advice from the guys …
 
Lisa Jiggetts knew from an early age that she was going to be in tech an cyber. A navy veteren who started off as a cook, she always found herself gravitating towards technology. She is also the Founder & Board of Director of Women’s Society of Cyberjutsu, a non-profit that is dedicated to increasing the opportunities and advancement for women in c…
 
Ep 8 - In this Season 1 finale episode, Asif and Christina catch up with COI listeners and discuss: Why they went dark since election week and what they have been up to. Election week chaos, exhaustion, new beginnings & other changes. The challenges of working from home for working parents. Suggestions on how to cope, including self-care. Our 2021 …
 
IoT is Vulnerable IoT Homefootage on sale in the deep and dark web and an intimate IoT device is found to have an exploit. https://www.hackread.com/3tb-clips-hacked-home-security-cameras-leaked/ https://gizmodo.com/a-security-flaw-could-send-your-dick-to-jail-forever-1845286359 Trickbot Takedown via Private and Public Sector Both Microsoft and USCy…
 
Michelle Valdez, the CISO at OneMain Financial, doesn’t approach cybersecurity through the lure of the threat. Instead, she applies a methodical, problem-driven approach honed through her background in the US military, where she served as an investigator for the U.S. Air Force. Her extensive experience working in national security, intelligence, an…
 
Founded in 1850 by Allan Pinkerton, a Scottish immigrant that went on to become the first detective in the history of Chicago, the Pinkerton Detective Agency became synonymous in American life with conspiracy theories and violent clandestine activities—and with good reason. Though Pinkerton himself was one of the Union’s first spymasters during the…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-why-dont-more-companies-take-cybersecurity-seriously/) With every cybersecurity breach, we still don't seem to be getting through. Many companies don't seem to be taking cybersecurity seriously. What does it take? Obviously not scare tactics. …
 
Fears are raised about cyber bioterrorists, there's a widespread blackout for IoT devices caused by a cloud cock-up, and why role do strippers play in a revamp of the United States's computer crime laws. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and …
 
The Shadow Academy prospects universities in a domain shadowing campaign. Notes on Turla’s Crutch, an information-stealing backdoor. Bismuth was using crytpojacking as misdirection. CISA and the FBI warn think tanks that cyberspies are after them. North Korean cyberespionage is interested in COVID-19 treatments. Our guest is Carey O’Connor Kolaja f…
 
Happy December! Today I virtually sat down with Christopher Fielder of Arctic Wolf, who started his career in security at 18 (I was just playing a lot of video games when I was that old)! Christopher has served in the Air Force, worked for a university and SANS, served for some three-letter organizations - and more! Christopher and I had a great ch…
 
Today's Headlines: Analysis of 4 Million Docker Images Shows Half Have Critical Vulnerabilities Open source software security vulnerabilities exist for over four years before detection FBI warns of BEC scammers using email auto-forwarding in attacks Critical Oracle WebLogic flaw actively exploited by DarkIRC malware To make sure you never miss a si…
 
In an odd turn of events, the 174th iteration of the Kaspersky Transatlantic Cable Podcast takes Dave and I back to slew of topics that were hot in 2018 – ransomware, Bitcoin prices and more. To start things off, we hop into a story about the skyrocketing price of Bitcoin. Dave and I share some of our theories on the rise - We are NOT financial ana…
 
Cryptojacking from Hanoi. Dormant networks rise again, for no easily discernible reason (but it doesn’t look good). A gang is hitting German victims with the Gootkit banking Trojan, and sometimes mixing it up with a REvil ransomware payload. Conti ransomware hits IoT chipmaker. SCOTUS reviews the Computer Fraud and Abuse Act. A few predictions for …
 
What does a resilient and secure organization look like? What are key strategies and technologies these organizations should have? How does a resilient organization empower its employees? In this episode, we glean insights from Adam Leisring, Chief Information Security Officer at Paycor. Also, we have new research from Trend Micro. The latest repor…
 
Today's Headlines:Docker malware is now common, so devs need to take Docker security seriouslyMagecart Attack Convincingly Hijacks PayPal Transactions at CheckoutDigitally Signed Bandook Trojan Reemerges in Global Spy Campaign To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailchi.mp/1c199cd854f0…
 
What happens when two bots go on a date? 🤖 💕 All that and more as we round-up the security news in Watchtower Weekly. Settle in for a bumpy ride, as Matt & Roo record without Anna. Needless to say, most of this episode is on the cutting room floor. Saving the episode from total destruction is our special guest this week. Matt had the pleasure of ch…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/why-is-pay-the-ransom-in-next-years-budget/) With 25 percent of ransomware victims paying the ransomware, have we waved the white flag to the attackers? Should we just budget for it? This week’s episode is hosted by me, David Spark (@dspark), producer of CISO …
 
North Korean operators phish a major pharma company. The Bandook backdoor is back, and probably being distributed by mercenaries. A school district cancels classes after a ransomware attack. Man U continues to work on recovering its systems. Former CISA Director says there are no signs of foreign manipulation of US elections. Rick Howard wonders wh…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
Chris Eng joins David, Ben and Jay to talk about Volume 11 of Veracode's State of Software Security. But rather than focusing on the various statistics, they focused on time-to-fix and how the various attributes of the development teams, applications and development environments affect the remediation timelines. https://www.veracode.com/state-of-so…
 
Today's Headlines:Tens of Dormant North American Networks Suspiciously Resurrected at OnceVietnam-Linked Cyberspies Use New macOS Backdoor in AttacksCISA Warns of Password Leak on Vulnerable Fortinet VPNs To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailchi.mp/1c199cd854f0/practitioners-brief *…
 
Jeff Hussey is the President and CEO of Tempered. Jeff, the founder of F5 Networks, is an accomplished entrepreneur with a proven track record in the networking and security markets. He maintains several board positions across a variety of technology, nonprofit and philanthropic organizations and currently is the chairman of the board for Carena an…
 
Dive into all things Apple security with today’s guest, Kelli Conlin, Security Solutions Specialist at Jamf. Learn about securing devices across multiple operating systems, the hidden-in-plain-sight Apple security Bible, and why Kelli’s mom isn’t allowed to use the 15-year-old Mac laptop Kelli is still hanging on to after all these years. – Enter c…
 
This week we are talking with Youtuber CyberSecurity Meg. Our topic of the week is Incident Response. We will be covering things like the incident management process, some of our favorite tools, and some general industry chit chat. Be sure to join us on Twitch to participate in these conversations live as well as an opportunity to join the Q&A at t…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
Cybersecurity attorney Camille Stewart shares how her childhood affinity for making contracts pointed to her eventual career as an attorney. Having a computer scientist father contributed to Camille's technical acumen and desire to include technology in her life's work. Camille has worked various facets of cybersecurity law from the private sector,…
 
The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat land…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
Trigger warning, this episode is over an hour long; do not time anything with the length of this episode. This Week in InfoSec 21st November 2008: The Conficker worm was first discovered. It spread quickly by exploiting a vulnerability that was addressed via the patch described in Microsoft's out-of-band bulletin MS08-067 four weeks prior. It infec…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
Mark Lynd - Head of Digital Business This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, h…
 
Happy Thanksgiving! While the turkey and pie settle in your belly, why not also digest some fantastic security news stories with our pal Gh0sthax? Today's stories include: It was another epic month of patching - both Threatpost and Krebs have great coverage of what you need to know. We don't support software pirating, but it's interesting that we j…
 
This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they transitioned to working as ci…
 
In the second and final episode in a series for CYBER on neo-Nazi terror group the Base, we dive into its origins: The online brainchild of its leader Rinaldo Nazzaro, an ex-Pentagon contractor with alleged links to the Kremlin (which he denies) who began his project for “race war” as a WordPress site that evolved into a secretive, encrypted chat g…
 
This week Ed Bellis joins the show to talk about risk based vulnerability management. My 3 main takeaways were 1) which factors you should take into consideration when prioritizing vulnerability remediation 2) the effects that public exploit code has on remediation efforts 3) how organizations can improve their threat prioritization by using their …
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login