show episodes
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
  continue reading
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Monthly
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
  continue reading
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

Unsubscribe
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
  continue reading
 
Aimil has been at the forefront of the Instrumentation industry in India, providing state-of-the-art instruments and services in the fields of Civil Engineering, Electronics, Analytical & Industrial applications and healthcare.
  continue reading
 
The Treasury Update Podcast is your source for interesting treasury news, in your car, at the gym, or wherever you decide to tune in! Strategic Treasurer was formed in 2004 to provide corporate, educational, and government entities direct access to comprehensive and current assistance with their treasury and financial technology, control and process efficiency requirements. Strategic Treasurer publishes content via newsletters, white-papers, blogs, videos, e-books, infographics, and analyst ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

Unsubscribe
Unsubscribe
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Ages ago, elves and dwarves unknowingly migrated between Universes via a Junction. Jenneva and Egam believe they have found a Junction and plan a trip with Alexander to test the theory and investigate the origins of the elves and dwarves. Because they believe that the perennial animosity between the two races is due to misunderstandings about their histories, the mages include the prince of elves and the prince of dwarves in the group. Trouble begins at the very start of the journey as Egam ...
  continue reading
 
Blue Fox Group, a technology company that specializes in supporting customers with the best infrastructure, live support, and communications technology available. Supporting your business objectives and improving your bottom line.
  continue reading
 
Artwork

1
Hacker Talk

Firo Solutions LTD

Unsubscribe
Unsubscribe
Monthly
 
Every second week, Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
  continue reading
 
Cybersecurity and data privacy is a requirement for any good business. So how can a CISO, CTO or compliance manager stay on top of where the industry is heading? Infosec veteran and former lead auditor, Blaise Wabo discusses the intersection of security, privacy and compliance. Topics include: Guest interviews with industry experts, framework updates, the business implications of compliance (and non-compliance), and discussions about compliance challenges, tips and tricks.
  continue reading
 
Artwork
 
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
  continue reading
 
Continuing our efforts to help organisations of all sizes understand their cyber security responsibilities, ECSC explore the latest cyber security trends, risks and news with insight from cyber security specialist Ian Mann and a number of special guests. More about ECSC: Founded and Established in 2000, ECSC Group plc is the UK’s longest running full-service cyber security service provider. With an extensive range of in-house developed proprietary technologies, including advanced Artificial ...
  continue reading
 
Loading …
show series
 
Today’s tale of pentest pwnage is all about my new favorite attack called SPN-less RBCD. We did a teaser episode last week that actually ended up being a full episode all about the attack, and even step by step commands to pull it off. But I didn’t want today’s episode to just be “Hey friends, check out the YouTube version of this attack!” so I als…
  continue reading
 
Laboratory Rock Tests: Essential Techniques and Instruments Laboratory rock tests provide detailed insights into these properties, ensuring the safety and effectiveness of construction, mining, and other geotechnical projects. In this podcast, we will explore some of the most common laboratory rock tests and the instruments used to conduct them. 1.…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad, Oscar, and Pinky discuss recent news stories about IP and central manager flaws, as well as a vulnerability enrichment project by CISA. They also share an interesting incident response story involving internal domains and proxy auto-configuration files. Please send any questions, comments, or feedbac…
  continue reading
 
One area of technology that many vendors and technologies are gunning for is smart metering, whether commercial or residential electric meters, water meters, or something else. The number of potential meters is HUGE. But which technology makes the most sense for this application? As you might expect, it depends on who you talk to. For this podcast,…
  continue reading
 
Send us a Text Message. In this episode, Spencer and Darrius share their expertise on navigating the world of cybersecurity training and certification. With decades of experience and numerous certifications, they provide valuable insights, tips, and personal stories to help listeners stay ahead of emerging threats and advance their careers in cyber…
  continue reading
 
Dor Dali, Head of Security Research at Cyolo, joins Nic Fillingham on this week's episode of The BlueHat Podcast. They delve into Dor's journey into cybersecurity, from pranking friends as a teenager to his professional roles, including his involvement in the Blue Hat conference through GE, where he helped create the Capture The Flag (CTF) challeng…
  continue reading
 
Medical wearables can greatly enhance the quality of life for many people. This can be done by instantly accessing medical information and potentially alerting a professional, or simply tracking stats on an individual. According to Andrew Burt, the Director of Product Line Management of Digital Healthcare at Analog Devices, his company has produced…
  continue reading
 
Staying Mindful throughout Data Breaches at Any Program Maturity Level Meet Lee Vorthman, a Chief Security Officer (CSO) known for his expertise in cybersecurity program maturity and team leadership. Get to know Lee as he discusses how to respond to security events no matter what stage of maturity you’re at. Read Lee Vorthman’s 370 Security blog…
  continue reading
 
Send us a Text Message. In this episode, Spencer and Brad discuss the highly respected 2024 Verizon Data Breach Investigations Report (DBIR), a data-driven analysis of cyberattacks and data breaches from around the world. Tune in to discover the latest global trends and patterns in cybersecurity, as well as key insights for security professionals a…
  continue reading
 
Understanding bank fees helps consumers and corporations make informed decisions, avoid hidden charges, and negotiate better terms. In today’s podcast, Craig Jeffery and Christin Cifaldi discuss the importance of understanding bank fees, including their impact on consumer decisions, corporate finances, and negotiation strategies. Join our webinar o…
  continue reading
 
Sadly, the Broadcom acquisition of VMWare has hit 7MinSec hard – we love running ESXi on our NUCs, but ESXi free is no longer available. To add insult to injury, our vCenter lab at OVHcloud HQ got a huge price gouge (due to license cost increase; not OVH’s fault). Now we’re exploring Proxmox as an alternative hypervisor, so we’re using today’s epis…
  continue reading
 
Send us a Text Message. In this episode Spencer chats with Mark Brophy (of SecurIT360) to discuss his background and experience with coaching a collegiate cyber defense team and how many of those lessons learned from defending against expert red team operators translate to securing organizations in today's modern thread landscape. Another must-list…
  continue reading
 
In this era of AI, designers have to think differently about every aspect of their projects. That includes the memory subsystem. To that end, Micron had a series of announcements to help facilitate AI, particularly on mobile devices. But beyond each subsystem, there’s just so much that needs to be learned and still so much that’s unknown. That’s wh…
  continue reading
 
Cyber Security Content Creator, Speaker & Ethical Hacker, Katie Paxton-Fear, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Katie holds a PhD in defense and security AI plus cybersecurity and works as an academic, teaching undergraduate students cybersecurity topics. She also runs a popular YouTube channel focused on bug bounty…
  continue reading
 
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the launch of PCI v4.0 and the ins and outs of the new INFI (Items Noted For Improvement) Worksheet. Next up, we'll cover Requirement 11 - Test security of s…
  continue reading
 
Today on The Professionally Evil Perspective, Nathan and Aaron discuss the Apex Legends hack that occured during a global esports tournament with a 5 million dollar prize pool. Esports League Postponed After Players Hacked Midgame BSides Oklahoma Got suggestions, complaints, or feedback? Tell us at podcast@secureideas.com or reach out on Twitter: @…
  continue reading
 
Welcome to another episode of our Learning from Financial Fraud Series. In this episode, we'll look at a case of payment server and network compromise. Craig Jeffery provides his insights on the situation, the attack method, the loss, and the key takeaways. More from this series: Payment Server Breach Understanding “Pig Butchering” Unpacking the Be…
  continue reading
 
Treasury technology is rapidly changing. In this podcast we cover perspectives and thoughts on technology developments and plans uncovered from survey results and numerous client engagements. These perspectives come to us in the context of overall economic sentiment and after multiple years of significant technology improvements. Opportunities abou…
  continue reading
 
Today we revisit a series about eating the security dog food – in other words, practicing what we preach as security gurus! Specifically we talk about: We’re going to get a third-party assessment on 7MinSec (the business) Tips for secure email backup/storage Limiting the retention of sensitive data you store in cloud places…
  continue reading
 
In this episode of the Unsecurity Podcast, Brad interviews guest Ryan Cloutier as part of our Meet the Mentors series. They discuss the importance of the CISSP Mentor Program and the value of different perspectives in teaching. They also discuss the release of an exploit code for the Palo Alto Networks Zero Day vulnerability and the ethics of publi…
  continue reading
 
Sam Procter started out studying computer science at the University of Nebraska, but he didn’t love it. It wasn’t until he took his first software engineering course that he knew he’d found his career path. In this podcast from the Carnegie Mellon University Software Engineering Institute, Sam Procter discusses the early influences that shaped his …
  continue reading
 
Pre-compliance testing is a phenomenon that should be a no-brainer, but for lots of reasons—none of them good—it’s not always done. When you’re doing a design that requires RF and you don’t do the testing, you’re really asking for trouble. That goes double for a product that’s going to ship into multiple geographies. To understand how this process …
  continue reading
 
Send us a Text Message. In this episode, Spencer and Darrius break down the complexities of credential protection, discussing everything from user education and tools to threat modeling and guardrails. Plus, we delve into the world of protecting credentials within scripts and code. This is a must-listen for all IT admins, CISOs and any other IT/Sec…
  continue reading
 
In this episode of the Short-Term Investing Series with Federated Hermes on the Treasury Update Podcast, experts from Federated Hermes delve into cash investing options, discussing bank deposits and money market funds. Explore the latest on safety, liquidity, and yield, plus the impact of recent bank failures and FDIC actions. Understand the pros a…
  continue reading
 
Following audience responses to Pod 107 with Jason Blake, Secarma Jen Williams has circled back to do a deeper dive into the PSTI legislation and IoT devices.With the legislation going live at the end of April, any manufacturers that have not yet found a successful route to show compliance should listen to this podcast which goes into finer detail …
  continue reading
 
Today we’re talking about tips to deal with stress and anxiety: It sounds basic, but take breaks – and take them in a different place (don’t just stay in the office and do more screen/doom-scrolling) I’ve never gotten to a place in my workload where I go “Ahhh, all caught up!” so I should stop striving to hit that invisible goal. Chiropractic and b…
  continue reading
 
Today on The Professionally Evil Perspective, Nathan and Aaron discuss the risk of vending machines using facial recognition software for targeted marketing. Facial Recognition Software Discovered in College Campus Vending Machines Ode to Reeses Peanut Butter Cups Flowers By Irene Got suggestions, complaints, or feedback? Tell us at podcast@securei…
  continue reading
 
Loading …

Quick Reference Guide