This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
1
Mobius Binary Presents the Penetration Testing Podcast Series
Mobius Binary // Penetration Testing Trends Podcast.
Mobius Binary presents a podcast series where we get into the technical details of penetration testing, the common challenges that companies face, along with the techniques that our security testing experts use.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
a 360 aerial penetration entrance at the beginning of every episode (an inhuman erection)
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
The Treasury Update Podcast is your source for interesting treasury news, in your car, at the gym, or wherever you decide to tune in! Strategic Treasurer was formed in 2004 to provide corporate, educational, and government entities direct access to comprehensive and current assistance with their treasury and financial technology, control and process efficiency requirements. Strategic Treasurer publishes content via newsletters, white-papers, blogs, videos, e-books, infographics, and analyst ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Podcast by CyberTalk
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading
Ages ago, elves and dwarves unknowingly migrated between Universes via a Junction. Jenneva and Egam believe they have found a Junction and plan a trip with Alexander to test the theory and investigate the origins of the elves and dwarves. Because they believe that the perennial animosity between the two races is due to misunderstandings about their histories, the mages include the prince of elves and the prince of dwarves in the group. Trouble begins at the very start of the journey as Egam ...
…
continue reading
Blue Fox Group, a technology company that specializes in supporting customers with the best infrastructure, live support, and communications technology available. Supporting your business objectives and improving your bottom line.
…
continue reading
Every second week, Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
The one and only official podcast from OffSec, Inc. -- creators of the Kali OS, the OSCP certification, and the world's leading cybersecurity training
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading
Cybersecurity and data privacy is a requirement for any good business. So how can a CISO, CTO or compliance manager stay on top of where the industry is heading? Infosec veteran and former lead auditor, Blaise Wabo discusses the intersection of security, privacy and compliance. Topics include: Guest interviews with industry experts, framework updates, the business implications of compliance (and non-compliance), and discussions about compliance challenges, tips and tricks.
…
continue reading
1
HACKED: Into the minds of Cybersecurity leaders
Talking cybersecurity with nexus IT Security group
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
…
continue reading
1
7MS #628: How to Succeed in Business Without Really Crying – Part 17
9:36
9:36
Play later
Play later
Lists
Like
Liked
9:36
Hey friends, today we talk about some not-so-glamorous but ever-so-important stuff related to running a cybersecurity consultancy, including: Taking an inventory of all the SaaS stuff your business uses – to keep an eye on spending, know when services are expiring, and track which credit card the services are tied to (so the services don’t almost g…
…
continue reading
1
Episode 96: How to Harden Active Directory to Prevent Cyber Attacks
1:21:40
1:21:40
Play later
Play later
Lists
Like
Liked
1:21:40
Text us feedback! This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for secur…
…
continue reading
1
MSRC VP Tom Gallagher on 25 Years of Security at Microsoft
31:38
31:38
Play later
Play later
Lists
Like
Liked
31:38
Tom Gallagher, VP of Engineering and head of MSRC, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. After nearly 25 years at Microsoft, Tom reflects on his early days at the company, where he started as a penetration tester on SharePoint, offering insights into the evolving landscape of cybersecurity since 1999. …
…
continue reading
1
7MS #627: Migrating from vCenter to Proxmox – Part 2
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36
Hey friends, today we continue our series all about migrating from VMWare to the world Proxmox! Specifically: Getting my first Proxmox-based NUCs out in the field for live engagements! Pulling the trigger on two bare-metal Proxmox servers to eventually replace my vCenter environment. OVHCloud made it super easy to to add Proxmox to those bare-metal…
…
continue reading
1
Shifts and Conflicts in Today’s Economy – Part 2: A Continued Conversation with Dr. William Chittenden
17:05
17:05
Play later
Play later
Lists
Like
Liked
17:05
In today’s podcast, Dr. William Chittenden, President & CEO of SW Graduate School of Banking, will continue the discussion with a deeper look into critical economic issues. Topics of discussion include debt to GDP, government spending, monetary and fiscal policy. Bill will also cover how this can impact businesses and the overall economy.…
…
continue reading
1
Coffee Break Session #111: What Is the Internet of Things?
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50
Christin Cifaldi, Director of Product Development & Analytics, joins us on today's podcast to discuss the concept of the internet of things (IoT) in technology. What is the IoT, and what are its benefits and risks? Listen in to learn more.
…
continue reading
1
CISSP Certification and Becoming a Security Consultant w/ Brian Kelley
38:38
38:38
Play later
Play later
Lists
Like
Liked
38:38
In this episode of the Unsecurity Podcast, Brad, and Oscar discuss the CISSP Mentorship Program with Brian Kelley now that this year's course has officially wrapped up, and touch on challenges and roadblocks for security professionals in the job market. 00:00 Intro 01:56 Ransomware and Security Best Practices 06:32 CISSP Mentorship Program and Lear…
…
continue reading
1
Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd
50:20
50:20
Play later
Play later
Lists
Like
Liked
50:20
Text us feedback! In this episode, Alex Boyd joins Spencer and Brad. Alex is a shareholder in Polsinelli's national Technology Transactions and Data Privacy practice, shares crucial insights for CTOs, IT Directors, CISOs, Security Managers when responding to security incidents. Discover common misconceptions about breaches and the mistakes organiza…
…
continue reading
1
Shifts and Conflicts in Today’s Economy – A Conversation with Dr. William Chittenden
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14
Despite recent data, many people still believe inflation is increasing. In today’s podcast, Dr. William Chittenden, President & CEO of SW Graduate School of Banking, will discuss a Harris Poll showing that 55% think the economy is shrinking, 56% believe the US is in a recession, 49% think the S&P 500 is down, and 49% believe unemployment is at a 50…
…
continue reading
1
UK Says it's "Zero Cool" to Use Weak Default Passwords
19:11
19:11
Play later
Play later
Lists
Like
Liked
19:11
Today on The Professionally Evil Perspective, Nathan and Aaron discuss the UK's move to prohibit easily guessable default passwords. UK becomes first country to outlaw easily guessable default passwords Executive order on improving the nations cybersecurity Cute Cybersecurity Logos UK's device security law kicks in EnergyStar Got suggestions, compl…
…
continue reading
Hey friends, today we’ve got a security milkshake episode about Web app pentesting. Specifically we talk about: Burp Suite Enterprise Caido – a lightweight alternative to Burp wfuzz – Web fuzzer. Using a proxy:wfuzz -c -z file,/usr/share/wfuzz/wordlist/Injections/XSS.txt –sc 200 “https://somedomain.com/shopping?&qty=%2FUZZ” -p 10.0.7.11:8080 KNOXSS…
…
continue reading
1
Automated Repair of Static Analysis Alerts
27:05
27:05
Play later
Play later
Lists
Like
Liked
27:05
Developers know that static analysis helps make code more secure. However, static analysis tools often produce a large number of false positives, hindering their usefulness. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), David Svoboda, a software security engineer in the SEI’s CERT Division, discusses Rede…
…
continue reading
1
Episode 94: Defending Against Ransomware Part 2
54:09
54:09
Play later
Play later
Lists
Like
Liked
54:09
Text us feedback! In this episode, Brad and Spencer discuss the preparation stage of defending against ransomware. As we know, the time to have a plan is before you enter the woods and cybersecurity is no different. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.com/cyberthreatpov Work with Us: …
…
continue reading
1
Educating the Future: Aaron Tng's Cybersecurity Blueprint
32:51
32:51
Play later
Play later
Lists
Like
Liked
32:51
Aaron Tng, a Microsoft Student Ambassador and BlueHat Conference Speaker, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Aaron shares how his curiosity during the pandemic in 2020, sparked by the surge in cyber-attacks, propelled him into the world of cybersecurity. Through dedicated self-learning and leveraging resources like …
…
continue reading
Not all paths to cybersecurity careers look the same. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Randy Trzeciak, deputy director of cyber risk and resilience in the SEI’s CERT division, discusses his career journey, resources for pursuing a career in cybersecurity, and the importance of building a dive…
…
continue reading
1
Learning from Financial Fraud Series Episode 11: Control Removal – The Criminals' Backdoor
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32
Welcome to another episode of our Learning from Financial Fraud Series. In this eleventh episode, we'll look at what can be learned from a recent scam involving an unauthorized debit. Craig Jeffery provides his insights on the situation, the attack method, the loss, and the key takeaways. More from this series: Learning from Financial Fraud Series …
…
continue reading
1
7MS #625: A Peek into the 7MS Mail Bag - Part 4
44:00
44:00
Play later
Play later
Lists
Like
Liked
44:00
Road trip time! I’ve been traveling this week doing some fun security projects, and thought all this highway time would be a perfect opportunity to take a dip into the 7MS mail bag! Today’s questions include: How do you price internal network penetration tests? Have you ever had to deal with a difficult client situation, and how did you resolve it?…
…
continue reading
1
Episode 93: Defending Against Ransomware Part 1
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45
Text us feedback! In this episode, Brad and Spencer discuss the preparation stage of defending against ransomware. As we know, the time to have a plan is before you enter the woods and cybersecurity is no different. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.com/cyberthreatpov Work with Us: …
…
continue reading
1
PCI Monthly Update: Latest News and Updates to Requirement 12
39:37
39:37
Play later
Play later
Lists
Like
Liked
39:37
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the impact of PCI v4.0 and how organizations are adjusting. In case you missed it - Andy Kerr joined PCI Practice Partner Stewart Fey for an interactive Q&A …
…
continue reading
1
Learning from Financial Fraud Series Episode 10: Learning from Deepfake Scams
12:37
12:37
Play later
Play later
Lists
Like
Liked
12:37
Welcome to another episode of our Learning from Financial Fraud Series. In this tenth episode, we'll look at what can be learned from a recent deepfake scam. Craig Jeffery provides his insights on the situation, the attack method, the loss, and the key takeaways. More from this series: Learning from Financial Fraud Series Episode 9: Payment Server …
…
continue reading
1
7MS #624: Tales of Pentest Pwnage – Part 57
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04
Today’s tale of pentest pwnage is all about my new favorite attack called SPN-less RBCD. We did a teaser episode last week that actually ended up being a full episode all about the attack, and even step by step commands to pull it off. But I didn’t want today’s episode to just be “Hey friends, check out the YouTube version of this attack!” so I als…
…
continue reading
1
Coffee Break Session #110: What Is a Botnet?
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27
In today’s podcast, we’ll hear from Christin Cifaldi, Director of Product Development & Analytics, on the topic of botnets in cyber security. What is a botnet, and what role does it play in the security landscape? Listen in to learn more.
…
continue reading
1
Incident Response Stories w/ Mike (Pinky) Thompson
39:07
39:07
Play later
Play later
Lists
Like
Liked
39:07
In this episode of the Unsecurity Podcast, Brad, Oscar, and Pinky discuss recent news stories about IP and central manager flaws, as well as a vulnerability enrichment project by CISA. They also share an interesting incident response story involving internal domains and proxy auto-configuration files. Please send any questions, comments, or feedbac…
…
continue reading
1
Episode 92: Cybersecurity Training and Certification Advice
34:32
34:32
Play later
Play later
Lists
Like
Liked
34:32
Text us feedback! In this episode, Spencer and Darrius share their expertise on navigating the world of cybersecurity training and certification. With decades of experience and numerous certifications, they provide valuable insights, tips, and personal stories to help listeners stay ahead of emerging threats and advance their careers in cybersecuri…
…
continue reading
Dor Dali, Head of Security Research at Cyolo, joins Nic Fillingham on this week's episode of The BlueHat Podcast. They delve into Dor's journey into cybersecurity, from pranking friends as a teenager to his professional roles, including his involvement in the Blue Hat conference through GE, where he helped create the Capture The Flag (CTF) challeng…
…
continue reading
1
The Role of Penetration Testing in Payment Security
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37
Payment penetration testing involves simulated cyberattacks to uncover vulnerabilities in payment systems. In today’s podcast, Craig Jeffery and Christin Cifaldi discuss different testing methods such as black-box, white-box, and gray-box testing, highlighting their pros and cons. Listen in to learn more!…
…
continue reading
1
7MS #623: Prelude to a Tale of Pentest Pwnage
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52
Today’s prelude to a tale of pentest pwnage talks about something called “spnless RBCD” (resource-based constrained delegation). The show notes don't format well here in the podcast notes, so head to 7minsec.com to see the notes in all their glory.
…
continue reading
1
Episode 058 - Staying Mindful throughout Data Breaches at Any Program Maturity Level - Lee Vorthman
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06
Staying Mindful throughout Data Breaches at Any Program Maturity Level Meet Lee Vorthman, a Chief Security Officer (CSO) known for his expertise in cybersecurity program maturity and team leadership. Get to know Lee as he discusses how to respond to security events no matter what stage of maturity you’re at. Read Lee Vorthman’s 370 Security blog…
…
continue reading
1
Episode 91: The 2024 Verizon Data Breach Investigations Report
42:19
42:19
Play later
Play later
Lists
Like
Liked
42:19
Text us feedback! In this episode, Spencer and Brad discuss the highly respected 2024 Verizon Data Breach Investigations Report (DBIR), a data-driven analysis of cyberattacks and data breaches from around the world. Tune in to discover the latest global trends and patterns in cybersecurity, as well as key insights for security professionals and exe…
…
continue reading
1
Bank Fee Standards: Decisions, Negotiations, and Savings
16:44
16:44
Play later
Play later
Lists
Like
Liked
16:44
Understanding bank fees helps consumers and corporations make informed decisions, avoid hidden charges, and negotiate better terms. In today’s podcast, Craig Jeffery and Christin Cifaldi discuss the importance of understanding bank fees, including their impact on consumer decisions, corporate finances, and negotiation strategies. Join our webinar o…
…
continue reading