show episodes
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
State of the Hack is hosted by FireEye's Christopher Glyer (@cglyer) and Nick Carr (@itsreallynick), that discusses the latest in information security, digital forensics, incident response, cyber espionage, APT attack trends, and tales from the front lines of significant targeted intrusions.
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
 
The Portal is an exploration into discovery, including conversations with thought leaders. Host Eric Weinstein, Managing Director of Thiel Capital, brings his unique expertise and diverse roster of guests for a wide range of discussions, including science, culture, business, and capitalism. The show will feature people whose lives demonstrate that portals into what we would normally consider impossible, are indeed possible. Guests include presidential candidate Andrew Yang, NY Times bestsell ...
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Mark Maunder co-founded Wordfence in 2011 after his WordPress site was hacked and he learned how hard it was to clean and secure. Today the team has grown to over 35 members world-wide and Wordfence protects over 3 million WordPress sites. On the Think Like a Hacker podcast, we cover interesting topics related to WordPress, security and innovation. Episodes alternate between security news and interviews with innovators from WordPress and information security communities.
 
SecuraBit is an information security podcast that features some of the biggest names in the industry who come on to talk to us about what they're up to. We also engage in both light and heavy discussion on the latest news and goings on in the community. We aren't intended to be an authoritative source of information if you're writing a paper for some infoseec class inc ollege. Our goal is to bring the community closer together and to help people understand who the movers and shakers are in t ...
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are. Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
The Nick Margerrison podcast. Former Kerrang! Radio & LBC presenter Nick Margerrison's fortnightly podcast is a continuation of his often eclectic radio career. Building on the legacy of the critically acclaimed first series "The Cult Of Nick" this podcast looks at how topics which were explored back then are now considered to be the bare bones of what is frequently termed 'the intellectual dark web'. A proud Discordian Nick's take is always sincere but never too serious. Contact the show vi ...
 
Loading …
show series
 
TechWrap Episode 35 – 22nd October 2020 · Sales on mobile phones are down due to COVID, but it didn't stop Apple pre-sales from exploding. · Elon Musk makes changes to Tesla sales, no 7 day returns or decent warranties on used cars. · Survey of Tech workers in the USA reveals some strain with living the WFH life. · Sneaky malware creators have disg…
 
Today we’re going to discuss Microsoft’s acquisition of ZeniMax, which means Bethesda is now an XBOX property. We will also look into a new look for Wikipedia. It will be a slow go and interesting in the end. We will then have a discussion of 5G and Huwaei with Jose Olaya. Ian will then tell us about what he’s been cooking up, some Lemon Mahi-Mahi.…
 
Our Threat Intelligence team discovered several vulnerabilities present in XCloner Backup and Restore, a WordPress plugin installed on over 30,000 sites. These vulnerabilities could have allowed an attacker to modify arbitrary files, including PHP files. The US government Cybersecurity and Infrastructure Security Agency is warning of detected persi…
 
This week, first we talk Enterprise News, discussing how Palo Alto Networks announces cloud native security platform, Akamai launches new API security tool, SentinelOne secures patent for unique approach to uncovering exploits in their initial payload stage, Splunk helps security teams modernize and unify their security operations in the cloud, and…
 
This week, Dr. Doug wraps up all the shows from this week, and talks about Twitter hacks, Oracle patches, Sandworm, Singapore facial recognition, and Donald Trump says we don't need security! Show Notes: https://securityweekly.com/swn76 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.c…
 
Someone is trying to undermine this year’s election and someone is trying to steal your money. The good news: There are steps you can take to fight both voter intimidation and election-centered phishing attempts. We’ll tackle those topics on episode 204 of The Checklist brought to you by SecureMac. Don't forget to check out our show notes: SecureMa…
 
Why contact tracing technology has been slow to make an impact. Ed Butler speaks to Jenny Wanger from the Linux Foundation Public Health in the US where many states are only now rolling out contact tracing apps, months after many countries around the world. We hear from Colm Harte, technical director at NearForm, the company behind Ireland's app, w…
 
Josh and Kirk discuss 5G: what it is, how it works, and how fast it is. Is it worth getting a new iPhone 12 for 5G? Also, we look at another case of Apple notarizing malware, and a new RAT that started out on Windows and is now threatening the Mac. Show Notes: Apple notarizes new Mac malware… again Apple notarizes dozens of Mac malware samples (Aug…
 
In this (wholly sponsored) edition of the Snake Oilers podcast, three vendors will drop by to pitch their sweet, sweet snake oil: Gravwell pitches its “structure on read” approach to SIEM Plextrac describes its red team/pentest reporting platform ITProTV’s Don Pezet talks about trends in online training Show notes Gravwell PlexTrac - The Purple Tea…
 
This week, we welcome Steve Schlarman, Integrated Risk Management Strategist at RSA Security, to discuss Integrated Risk Management & Operational Resiliency! In our second segment, we welcome David Mundhenk, Principal Security Consultant at Herjavec Group, and Ivan Tsarynny, Co-Founder and CEO at Feroot Security, to talk about How Backdoors Lead To…
 
With thanks to the amazing callers... Craig is here: https://www.facebook.com/craig.read.90/ James's twitter is here: https://twitter.com/OverTheMooooon He's done a mix here which he mentions: https://www.mixcloud.com/james-parker3/season-part-03-autumn/ I've decided to link to my YouTube channel, it now has most of these podcasts on it, hardly any…
 
This week we update you on the Security Weekly 25 Index! In the Leadership and Communications segment, 96% of Cybersecurity Professionals are Happy With Their Roles, 4 Tips for Effective Virtual Collaboration, What’s Really Happening in Infosec Hiring Now?, 5 Signs That Point to a Schism in Cybersecurity, Tactical vs Strategic: CISOs and Boards Nar…
 
The US government has filed charges against Google, accusing the company of violating competition law to preserve its monopoly over internet searches and online advertising. As the Department of Justice sues the search engine google for being a monopoly, could all tech giants be under threat? We hear from Eric Schmidt, the former CEO of Google and …
 
Zoom end-to-end encryption, Windows 10 god mode, Manifest v3. Last Wednesday, Zoom announced that THIS week their 30-evaluation of end-to-end encrypted video conferencing would begin How to enable Windows 10 "God Mode" Edge to be updated with browser extensions "Manifest v3" Last Tuesday Microsoft issued fixes for 87 security vulnerabilities - so, …
 
Zoom end-to-end encryption, Windows 10 god mode, Manifest v3. Last Wednesday, Zoom announced that THIS week their 30-evaluation of end-to-end encrypted video conferencing would begin How to enable Windows 10 "God Mode" Edge to be updated with browser extensions "Manifest v3" Last Tuesday Microsoft issued fixes for 87 security vulnerabilities - so, …
 
On this week’s show Patrick and Adam discuss the week’s security news, including: US DoJ unseals indictments against Sandworm operators Twitter backtracks on “hacked materials” policy No consensus on Trickbot c2 status NSA publishes “most exploited” listicle that’s actually interesting Much, much more Cmd Security is this week’s sponsor. Its CEO Ja…
 
Danny Akacki discusses how do we, as a NDR product company with an emphasis on user outreach and education, continue not only to keep our product effective for distributed workforce's but also continue to beat the drum on education and knowledge share? It's not easy but we've come up with a few ways both to stay connected to our clients and help th…
 
This week, we welcome Taylor McCaslin, Security Product Manager at GitLab, to discuss current trends in the application security testing industry! In the Application Security News, Patch Your Windows - “Ping of Death” bug revealed, 800,000 SonicWall VPNs vulnerable to remote code execution bug, T2 Exploit Team Creates Cable That Hacks Mac, Zoom Rol…
 
Bluetooth vulnerabilities hit linux devices, the APT31 hacking group is mimicking McAfee Antivirus, and Barnes & Noble confirms a cyberattack! All that coming up now on ThreatWire. #threatwire #hak5 Subscribe for my next Wifi Pineapple Mk VII Giveaway! https://youtube.com/shannonmorse Links:Support me on alternative platforms! https://snubsie.com/s…
 
62% of businesses experienced phishing and social engineering attacks in 2018. 68% of business leaders feel their cybersecurity risks are increasing. Only 5% of companies’ folders are properly protected, on average. Data breaches exposed 4.1 billion records in the first half of 2019. 71% of breaches were financially motivated and 25% were motivated…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login