Best Security podcasts — Latest news, interviews and information (Updated June 2018; image)
Related podcasts: Software Development Hacking Featured FM Technology Tech Malware Infosec Emcryption Cyber Crime Spyware Steve Gibson Leo Laporte Twit Information Compliance Business News Pci Cissp Cyber  
public [subscription 711]
show episodes
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Risky Business
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
This is the audio podcast version of Troy Hunt's weekly update video published here:
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
Security. Some assembly required. Security is HARD, and 'real security' is a compromise between usability and security while knowing you're still accepting risk. This podcast alternates between interesting interviews and news analysis every other week - tune in, subscribe and join the conversation on REAL security issues relevant to your enterprise. Follow us on Twitter: @DtSR_Podcast Check out Rafal's SecurityWeek column:
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
Join Andy Willingham, Martin Fisher,Steve Ragan, Yvette Johnson, and Joseph Sokoly as they discuss information security, news, and interview interesting people. Get in the discussion at
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
Off The Hook is a weekly show on WBAI radio, New York, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
Smashing Security
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.
The CyberJungle
The CyberJungle is the nation's first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fast-paced and includes hard hitting news analysis. Formerly The Data Security Podcast.
The Liquidmatrix Security Digest Podcast. Learn more at
Our weekly rants about the issues that impact your privacy and digital security.
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
Sophos Podcasts
Podcast by SophosLabs
Darknet Diaries
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are. #infosec #security #hacking #privacy #Internet #hackers #breaches #threats #security #malware #trojan #virus #crypto
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
Computer security from the ground up.
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
Information about Tenable's unified security monitoring products, including Nessus and Security Center. A review of the latest news and vulnerabilities and interviews with some of the industries finest!
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Note: This is only Paul's Security Weekly, recording once per week and typically 2 hour shows.
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
7 Minute Security
A podcast where I audibly regurgitate what I'm learning about information security - in 7-minute chunks!
Web Security Warriors
Each week we explore an aspect of web security.
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join Host Holly Gilbert Stowell as she interviews thought leaders and industry professionals, as well as editors from the magazine.
SecuraBit Before It Bytes!
Where you can listen to commentary on the state of information security
A closer look at the notable stories inside Information Security and why they matter. Brought to you by Cisco.
Infosec news and views featuring interviews with expert faculty from the Institute for Applied Network Security (IANS) hosted each week by IANS Director of Technology Research Chris Gonsalves.
Red Hat's security podcast presented and broadcast by Richard Morrell
Security Nation
Rapid7 podcast series discussing all things security. Join us as we discuss information security with thought leaders in the space.
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
The Virtualization Security Round Table Podcast provides an open forum to discuss all things related to Virtualization, Virtual Environment, and Cloud Computing Security. The podcast is hosted by Talkshoe, with the after podcast write-ups and notes are hosted on The Virtualization Practice ( Podcast was created using
PVC Security
Passion, Vision, Communication (& Execution) in Leadership & Security Podcast, &t.
SAHAsays is an Information Security related commentary program that pulls from recent headlines around the web. We offer four distinct voices from the Computer Security community: applied business, a software reverse engineer, a doctoral seeking, practicing academic, and the journeyman getting in the front door in the industry. These "voices" may represent our general perspectives, but we're all friends who meet at the San Antonio Hacker's Association (SAHA) on the 6th of every month at the ...
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals.Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
Bringing you the leading voices in the field of Internet safety, privacy, and security.
Loading …
show series
SMTP Strangeness - Possible C2 Encrypted Office Documents Recent Port 8000 Scans New ...…
We’re at NDC Oslo; Security Workshops; Processing Billions of Security Reports in Report URI; HTTPS Anti-vaxxers; A Real nomx!
Carbon Black's Chief Cybersecurity Officer Tom Kellerman shares the results of their recent report, Modern Bank Heists: Cyberattacks & Lateral Movement in the Financial Sector. For the report, they interviewed CISOs at 40 major financial institutions, revealing attack and mitigation trends. The CyberWire's Research Saturday is presented by the ...…
This week, Paul interviews Jason Haddix, VP of Trust and Security at Bugcrowd! In our Technical Segment, Application Security Weekly host Keith Hoodlet talks about Bug Bounty Hunting! Paul and the crew will then wrap up the show with the Security News, and more on this episode of Paul’s Security Weekly! Full Show Notes: https://wiki.securitywee ...…
This week, Paul interviews Jason Haddix, VP of Trust and Security at Bugcrowd! In our Technical Segment, Application Security Weekly host Keith Hoodlet talks about Bug Bounty Hunting! Paul and the crew will then wrap up the show with the Security News, and more on this episode of Paul’s Security Weekly! Full Show Notes: https://wiki.securitywee ...…
In today's podcast we hear that MysteryBot is under development and presumably being prepared for sale on the black market. Satan ransomware gets a makeover and a new name. Apple has taken measures to make iOS traffic less accessible to snooping, but lawful snoops may already have a way around that security. Kasperky will no longer work with Eu ...…
This week we talk about Firefox privacy extensions, Apple security changes, Copperhead OS, PIA logs, Wire support, and our new book.
Leading the latest edition of the ISMG Security Report: An analysis of how distraction tactics were used during a $10 million SWIFT-related hack at Banco de Chile. Also, a wrapup of Infosecurity Europe.
Analyzing a Compromised Wordpress Site Breacking Bluetooth Low Energy Smart Padlock WIM Disk Image Vulnerability ...…
This week's podcast finds Chet and John both enjoying some well deserved time in their respective homes. Topics include an overview of InfoSec Europe and BSides London, the dangers of not providing password management tools, how small mistakes lead to bigger vulnerabilities, the state of cryptojacking and the latest FBI cybercrime bust.…
In today's podcast, we hear that LuckyMouse has crept into an unnamed Central Asian house. Dixons Carphone data exposure presents complex legal and regulatory issues—it's the first big incident since GDPR came into effect. "Lazy State" is another CPU speculative execution bug. The US Congress doesn't care for ZTE, Australia's government is wary ...…
Joe warns of scammers taking advantage of natural disasters, Dave explores romance scams, and gets a strange voice mail. Stephen Frank from the National Hockey League Players Association joins us to share how professional athletes protect themselves from online scams. Thanks to our show sponsor KnowBe4.…
This week, Paul and John welcome Chris Brenton, Chief Operating Officer of Active Countermeasures! In the Enterprise News, we have updates from Riverbed, Tufin, ServiceNow, Splunk, and more on this episode of Enterprise Security Weekly! Full Show Notes: Visit for al ...…
Thank you, listeners! Down the Security Rabbithole has reached milestone episode #300. In this episode, James and Rafal sit down with the nothing more than an open mic and talk through topics the podcast has previously covered, and others we still have yet to cover. Join us. And a personal thank you to all of our guests over the past 300+ episo ...…
From MicroTik With Love: Yet Another Router Botnet? Using Cortana To Compromise Windows 10 Compromised Docker Images ...…
By (Emmanuel Goldstein
Coinrail cryptocurrency exchange goes offline after hack, Russia appears to be 'live testing' cyber attacks, and Florida stopped running background checks on gun buyers because of forgotten password. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and ...…
You probably create DR plans for your business (or help other companies build them), but have you thought about creating one for yourself? Yeah, I know it's grim to think about "What will my loved ones do to get into my accounts, backups, photos, social media accounts..." but it's probably not a bad idea to prepare for that (spoiler alert: we a ...…
This week, Keith and Paul interview Peter Chestna, Director of Developer Engagement at Veracode! In the news, Windows 10 update April 2018 update breaks SMBv1, GitHub vs. GitLab, ThoughtWorks Technology Radar, DevOps brings value to security, and more on this episode of Application Security Weekly! Full Show Notes: https://wiki.securityweekly.c ...…
Threatpost's Lindsey O'Donnell talks with Zack Allen, ZeroFOX’s manager of threat operations, about the broader social media threats landscape and the growing issue of malicious content being spread across networks like Twitter, Facebook and LinkedIn.By (Mike Mimoso, Chris Brook).
In today's podcast we hear that old news is new news when it comes to undersea cables. The Lazarus Group is still at it, against South Korean targets. BabaYaga eats other malware so it can stage WordPress spam. Patch Tuesday notes, including some products that Redmond will no longer support. Crytpojackers are still busy. One new strain of coin- ...… -- Excellent Book! You must buy it. DetSEC mention ShowMe Con panel and keynote SeaSec East standing room only. Crispin gave a great toalk about running as Standard user Bsides Cleveland - 1Password version 7.1 integrates with Troy Hunt's ...…
This week we update again on VPNFilter, look at another new emerging threat, check in on Drupalgeddon2, examine a very troubling remote Android vulnerability under active wormable exploitation, take stock of Cisco's multiple firmware backdoors, look at a new cryptomining strategy, the evolution of Russian state-sponsored cybercrime, a genealogy ...…
Microsoft Patch Tuesday Apple Code Signing Verification Vulnerability Google Chrome Restricting Inline Extension Install ...…
You might have noticed North Korea’s been in the news over the last couple of days. Well, we’re sticking with the theme – we’ve got a great feature interview for you this week with Andrea Berger. She’s a senior research associate at the US-based James Martin Centre for Nonproliferation Studies and the co-host of the Arms Control Wonk podcast. T ...…
This week, Paul is joined by Matt Alderman to interview Masha Sedova, Co-Founder of Elevate Security! In the Article Discussion, “Senior Executives Get More Sleep Than Everyone Else”, “The Changing Face of B2B Marketing”, “The Best Mentors Ask These 8 Questions”, and more! In Tracking Security Innovation, Fortinet acquired Bradford Networks, Qu ...…
In today's podcast we hear that the US Treasury Department has announced sanctions against Russian entities it says were too cyber-cozy with the FSB. Code-signing issue looks like what we have here is a failure to communicate. Android devices are being shipped with ADB enabled, and cryptojackers enter by the backdoor. A layered criminal attack ...…
More Malspam Pushing Lokibot Ethereum JSON RPC Theft CryptoCurrency Miner Plays hide-and-seek Apple O ...…
This week, Technology Alliances Engineer at LogRhythm Jake Reynolds joins us for an interview! Matt Alderman and Doug White run the show this week and talk with the crew about the Security News: Google Chrome has a critical vulnerability, Flash has another zero-day exploit, Colorado passes “most stringent” breach notification law, hackers hack ...…
This week, Technology Alliances Engineer at LogRhythm Jake Reynolds joins us for an interview! Matt Alderman and Doug White run the show this week and talk with the crew about the Security News: Google Chrome has a critical vulnerability, Flash has another zero-day exploit, Colorado passes “most stringent” breach notification law, hackers hack ...…
In today's podcast, we hear about more SWIFT fraud, with a wiper attack as misdirection. Cryptocurrency exchange looted of ICO tokens. Chinese espionage in Rhode Island, and a conviction in Virginia. Dropping Elephant spearphishes in think tanks. G7 agreement suggests a coordinated response to hostile cyber operations. Net neutrality expired th ...…
Although all the major credit card brands have dropped the requirement for obtaining signatures to verify point-of-sale transactions made with EMV payment cards, they're not pushing strongly for using PINs instead, leaving that authentication decision to card issuers, says Linda Kirkpatrick of Mastercard.…
The Seven Properties of Highly Secure Devices Finding Deserialisation Issues With Burp ...…
European Security Blogger Awards; SC Awards & Report URI; Infosec Europe; nomx and the “UK blogger”; 1Password 7 for Windows & biometric auth
Researchers from ProtectWise's 401TRG team recently published research linking a variety of new and previously reported Chinese cyber threat groups. Tom Hegel is a Senior Threat Researcher with the 401TRG, and he joins us to share their findings. The CyberWire's Research Saturday is presented by the Hewlett Foundation Cyber Initiative. Thanks t ...…
In today's podcast, we hear that Adobe has patched a Flash vulnerability. InvisiMole is a discrete, selective cyber espionage tool. A Facebook glitch inadvertently changed users' default privacy settings. Leidos exits the commercial cyber market. China is back at IP theft, and some conventional cyber espionage, too. Congress wants explanations ...…
Threatpost editors Tom Spring, Tara Seals and Lindsey O’Donnell discuss the week’s information security news, including a slew of IoT device privacy incidents, a critical Adobe Flash vulnerability, and scary new data on the breadth and impact of the VPNFilter malware.By (Mike Mimoso, Chris Brook).
What happens to all of our encrypted data and accounts when we die? This week, we discuss privacy considerations before we pass.
This week, we discuss the compromise of 92 million MyHeritage users' credentials, “unauthorised activity” at PageUp, a missing memory stick at Rochester Grammar School, and the first couple of weeks of the GDPR
Chester and Ben talk about the week's security news including the latest Flash and Internet Explorer zero-day vulnerabilities, insecure toys being yanked from major retailers, Naked Security's award winning performance at InfoSec Europe 2018, the debate of a public postmortem at the City of Atlanta and the conviction of Yahoo! hacker Karim Baratov.…
Leading the latest edition of the ISMG Security Report: Our exclusive report on an Australian criminal investigation into a company that apparently swiped cryptocurrency using a software backdoor. Also, cutting through the hype on artificial intelligence and machine learning.
Critical Adobe Flash Update SuperMicro Firmware Vulnerability FOSCAM Video Camera Vulnerabilities Sof ...…
As I was preparing for my Secure 360 talk a month or so ago, I stumbled upon this awesome article which details a method for getting Domain Admin access in just a few minutes - without cracking passwords or doing anything else "loud." The tools you'll need are: PowerShell Empire DeathStar Responder Ntlmrelayx I've written up all the steps in a ...…
Iron Group said to use Hacking Team source code to build a backdoor. Operation Prowli both cryptojacks and sells traffic. Fancy Bear may be getting noisier. VPNFilter has a more extensive set of victim devices than previously believed. ZTE pays a billion dollar fine. CloudPets are oversharing via an unsecured server. The US Senate wants answers ...…
Since its inception the NIST Cybersecurity Framework has been embraced across geographies and sectors. Trend Micro's Ed Cabrera talks about how to maximize the framework as a baseline for improving cybersecurity posture.
In this episode, Joe examines the anatomy of a phishing attack, Dave explores pretexting, and a scammer targets real estate agents. Professor Stephen Lewandowsky from the University of Bristol joins us to share his research on misinformation, fake news, and inoculating people against them. Thanks to our show sponsor KnowBe4.…
This week, on a Special Edition of Enterprise Security Weekly, Paul and John welcome Adrian Sanabria, Director of Research for Savage Security; Dave Kennedy, Founder of TrustedSec, Binary Defense, and DerbyCon; and Security Weekly's very own Jeff Man, for a group discussion on Penetration Testing! In the Enterprise News, we have updates from Qu ...…
Companies offering cybersecurity products are using the terms "artificial intelligence" and "machine learning" in many different ways. But the real meanings of the terms are far more nuanced than marketing hyperbole would lead us to believe, says Grant Wernick of Insight Engines.
VPNFilter Update Prowli Botnet Cisco Security Bulletins F-Secure RAR Vulnerability ...…
The mastermind behind the Owari botnet doesn't seem to have learnt anything from his victims, and someone at Wessex Water forgets to remove an embarrassing sentence from a letter sent to customers... All this and much much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Grah ...…
Google login Twitter login Classic login