show episodes
 
T
The Journal.

1
The Journal.

The Wall Street Journal & Gimlet

Unsubscribe
Unsubscribe
Weekly+
 
The most important stories, explained through the lens of business. A podcast about money, business and power. Hosted by Kate Linebaugh and Ryan Knutson. The Journal is a co-production from Gimlet Media and The Wall Street Journal.
 
The CyberPHIx is a regular audio podcast series that reports and presents expert viewpoints on data security strategy for organizations handling patient health or personal information in the delivery of health-related services. These timely programs cover trends and data security management issues such as cybersecurity risk management, HIPAA and OCR compliance strategy and vendor risk management. Meditology Services, the healthcare industry's leading security and compliance firm, moderates t ...
 
The Data Skeptic Podcast features interviews and discussion of topics related to data science, statistics, machine learning, artificial intelligence and the like, all from the perspective of applying critical thinking and the scientific method to evaluate the veracity of claims and efficacy of approaches.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Former acting Director of the CIA Michael Morell speaks with top leaders of the U.S. intelligence community as they reflect on their life, career and the critical roles they play in shaping national security policies. As a central figure in the most significant U.S. counter-terror efforts of the past two decades and a former CIA intelligence analyst, Morell is uniquely skilled at taking industry leading knowledge to make connections that provide deep insight into complex security events – he ...
 
Award-winning radio show host, nationally syndicated columnist and digital lifestyle expert Kim Komando breaks down the hottest topics in tech. Get insider secrets to protect yourself online, make money from home, secure your devices, avoid scams and more. Want more from Kim? Try her free, smart tech newsletters at https://www.komando.com/subscribe/
 
C
Caveat

1
Caveat

CyberWire, Inc.

Unsubscribe
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
நம் வாழ்முறையை மாற்றவல்ல தொழில்நுட்பங்கள் பற்றியும் பன்முகப்பட்ட தலைப்புக்களிலும் உரையாடும் ஒரு தமிழ் வலையொலி வழிகாட்டி.
 
a
a16z Podcast

1
a16z Podcast

Andreessen Horowitz

Unsubscribe
Unsubscribe
Monthly+
 
The a16z Podcast discusses tech and culture trends, news, and the future – especially as ‘software eats the world’. It features industry experts, business leaders, and other interesting thinkers and voices from around the world. This podcast is produced by Andreessen Horowitz (aka “a16z”), a Silicon Valley-based venture capital firm. Multiple episodes are released every week; visit a16z.com for more details and to sign up for our newsletters and other content as well!
 
Every week on the DirtySecurity Podcast, we chat with Cylance’s best and brightest about what is happening in the world of cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center.
 
The age of the customer isn’t a tagline — it’s a fundamental shift in the market that is forcing companies and executives to change course. In Forrester’s What It Means podcast, we’ll examine those changes, what they mean, and what executives can do about them.
 
Loading …
show series
 
On this week’s show Patrick Gray, Adam Boileau and Dmitri Alperovitch discuss the week’s security news, including: Russia arrests REvil crew Ukraine government hit in messy hacks White House hosts open source pow-wow, but is it pointless? US cyber reporting law will come back from the dead Report: Israeli police targeted activists with NSO but with…
 
A White House government-industry summit today addresses open-source software security. The US officially makes its second attribution of the week to a nation-state: it calls out Iran as the operator of the MuddyWater threat group. Israel arrests five on charges related to spying for Iran (they’re thought to have been recruited through catphishing)…
 
Ransomware hackers recently hit a hospital, and everything from the cardiac machines to IV pumps stopped working. Doctors and nurses had to use pen and paper. There were no electronic patient records. But what happened when the hackers found out it was a hospital will undoubtedly surprise you. Learn more about your ad choices. Visit megaphone.fm/ad…
 
Guest Adam Flatley, Director of Threat Intelligence at Redacted, talks with Dave about "the only way to truly disrupt the ransomware problem is to target the actors themselves," Joe shares some statistics that will help you stay up-to-date on recent cybersecurity trends, Dave's story is about criminal indictments in a case of a Maryland company buy…
 
Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-comin…
 
This episode is meant to spark ideas, stimulate thoughts and hopefully leave you with more questions than answers As you prepare your company for an incident or ransomware event. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj…
 
Biggest stories of the year including Meta, mRNA, Log4j, NFTs, Ransomware COVID-19's impact on tech. Elon Musk in 2021. The World Is Still Short of Everything. Get Used to It. GM's heated seats and steering wheels are the latest casualties of the chip shortage. Baby Driver: Philadelphia woman gives birth in the front seat of Tesla on autopilot. The…
 
This is a special joint webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. In this webcast, we cover the recent wave of attacks we are seeing, and we cover some of the history that got us to where we are. Consider this to […] The post Webcast: New Wave of Ransomw…
 
Guest James Gimbi, Director at technical advisory firm MOXFIVE, shares why he believes banning ransomware payments is bad policy, Ben shares some listener follow up from Twitter user @brentdstewart on CDA Sec230, Ben discusses the expansion of the so-called “Glomar response,” Dave looks at Google’s email scanning policies. While this show covers le…
 
This week on Privacy Please, we bring back on the fantastic Kelly Finnerty from Start Page for part 2 and she brings big news, real talk and belly laughs. Introducing Startpage Privacy Protection Extension, protecting you from cookies and trackers across the web. This thing works beautifully! Check out the link below and go download now! https://ww…
 
In this episode of Intelligence Matters, host Michael Morell speaks with State Department Counselor Derek Chollet about the top foreign policy challenges facing the United States, and how the State Department sees the way forward with regard to Russia, Iran, Afghanistan and China. Chollet outlines the U.S. strategy for deescalating tensions with Mo…
 
Picture of the Week "Hack the Pentagon" with Log4j Open Source Software Security Summit Microsoft's January Patch Tuesday Review: The GOOD News Microsoft's January Patch Tuesday Review: The Not So Good News Check Your Router Firmware Updates Chrome to Implement PNA Three High Severity Flaws in WordPress Add-ons Closing the Loop: Listener feedback S…
 
Earlier this month, Canada reached a landmark preliminary settlement with members of its indigenous community, capping a 15-year legal battle over child welfare resources. Cindy Blackstock, an advocate who vaulted the case onto the national stage, explains what drove the initial complaint, and WSJ's Kim Mackrael unpacks the importance of the $32 bi…
 
A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware …
 
Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, adjunct faculty at The Citadel Military College, and chief content creator of the successful YouTube channel SimplyCy…
 
The internet has grown exponentially for over 30 years and will soon surpass 30 billion connected devices. Yet, even for its age and the all the connected devices, the Internet of Things remains a 30-year-old infant. And like an infant, IoT needs guidance. It needs to be shown how to communicate and exchange data, taught how to make decisions, and …
 
Joining us today are Matt Lee and Gerald Auger to discuss the recent actions against REvil and Ukraine under threat. Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, …
 
Your bariatric website should function like a full time 24/7 salesperson who never sleeps (and doesn't leave their tuna and rye in the break room fridge to get stale and moldy). Many of our clients aren't getting the full value from their site. There are several reasons why. Jonah sits down with Loryn Lyle, founder of SILVR Agency, and talks about …
 
Pete Hertzog is a security expert and an educator with a vision: he wants our kids to learn about cybersecurity, and not just about not talking to strangers online – he wants them to learn even more advanced stuff, such as security analysis and hacking. Pete spoke with Nate Nelson about his Hacker Highschool initiative, and the lessons he learned f…
 
Sean Law, Principle Data Scientist, R&D at a Fortune 500 Company, comes on to talk about his creation of the STUMPY Python Library. Sponsored by Hello Fresh and mParticle: Go to Hellofresh.com/dataskeptic16 for up to 16 free meals AND 3 free gifts! Visit mparticle.com to learn how teams at Postmates, NBCUniversal, Spotify, and Airbnb use mParticle’…
 
Infosec’s Principal Security Researcher, instructor and cybersecurity renaissance man Keatron Evans returns to the show for the first in a series of once-quarterly episodes breaking down big stories in the news and cybersecurity trends for the future! We talk Solarwinds, Colonial Access Pipeline, Oldsmar, Keatron’s origin story and why, just like p…
 
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference,…
 
E3 goes virtual, microdosing in the metaverse. CES through the years. Oversized future USPS delivery truck on display at CES in Las Vegas. BMW debuts its new color-changing paint technology at CES: E Ink. Massage Robot at CES 2022. This super realistic "humanoid robot" stole the show at CES 2022. Using Elon Musk's Boring Tunnel at CES 2022: Hardly …
 
Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content produ…
 
Responses to climate change are often marked by frustration as much as fear. Those seeking to end our fossil-fuel dependency are increasingly turning to litigation to force the hands of companies and governments - often on human rights grounds. But do the courts have a legitimate role to play in leading the way? Or is this a form of judicial activi…
 
This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a numbe…
 
This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a numbe…
 
Three top officials have recently retired early from the Federal Reserve amid controversy surrounding personal stock trading activity. WSJ's Nick Timiraos explains what's led to the worst reputational crisis at the Fed in decades. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal & Gimlet
 
A large-scale cyberattack against Ukrainian websites looks like an influence operation, and Russian intelligence services are the prime suspects. The FSB raids REvil. The White House Open Source Software Security Summit looks toward software bills of materials. MuddyWater exploits Log4shell. The DPRK is working to steal cryptocurrency. Caleb Barlow…
 
Former N.Y. Fed head Bill Dudley on why the Federal Reserve should step on it, Cleveland Fed's Loretta Mester on taking a cautious approach on tightening, and Ira Jersey of Bloomberg Intelligence and Michael McKee of Bloomberg Radio and Television on what's behind the Fed's thinking on rate hikes. Plus, why packaged food prices are going up even mo…
 
Are you playing Wordle? It seems like just about everyone is! We've got pro tips to help you win the hot word game and a warning about the Wordle app. Plus, smart guns are coming and Kim has the details. And find out why the internet is up in arms over the latest "Batman" movie and its PG-13 rating. Learn more about your ad choices. Visit megaphone…
 
ORIGINALLY AIRED ON JANUARY 10, 2021 Articles discussed in this episode: 01:58 – Story # 1: WordPress Core Vulnerabilities – https://www.searchenginejournal.com/wordpress-core-vulnerabilities/432042/#close 11:32 – Story # 2: Card-stealing code on over 100 Sotheby’s luxury real estate sites – https://therecord.media/card-stealing-code-found-on-more-…
 
Today’s podcast focuses on the leadership element and mental health in the workplace as Vistas welcomes Mr. Nic Dunn - Director, Utah Community Builders Foundation at the Salt Lake Chamber. Nic Dunn is a public policy and strategic communications professional with nearly a decade of experience working in state and regional government, and the priva…
 
While agriculture remains one of the biggest contributors to climate change, it is also most exposed to its adverse effects. Scientists say that extreme weather events will become more frequent and more intense as global temperatures continue to rise. In 2021, harsh winters, unseasonably warm summers, and sudden changes in rainfall affected food pr…
 
What does the conviction of Theranos founder Elizabeth Holmes tell us about tech startup culture? The BBC's James Clayton is joined by NPR tech reporter Bobby Allyn to ask if any lessons are being learned by Silicon Valley, where startups are encouraged to promise world-changing technology, and investors demand sky-high valuations. We discuss the i…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login