Best Cybersecurity podcasts we could find (Updated June 2018)   Cybersecurity public [search 0]
show episodes
 
Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Cyber Security and Wireless Tech Expert and Author Scott Schober delivers the latest cybersecurity news, tips, reviews and interviews with industry experts.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Information Security is the name of the game. Don’t let the hackers win!
 
Cybersecurity is not just computers and digital processes. Whether it's the threat or the response, the most important, and most interesting, part of the story is the people behind the keyboard. That’s why we’re launching The Cybersecurity Podcast, a monthly program featuring key leaders and thinkers in this space. Our half-hour podcast will go beyond the headlines to discuss some of the most pressing issues and newest ideas in cybersecurity.
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
He Who Controls The Domain Controls The Outcome
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
 
Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.
 
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
 
Welcome to HIMSS’s new health IT cybersecurity podcast, Code Red. Code Red focuses on cybersecurity challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cybersecurity posture from both a leadership & skills-based perspective.
 
National Cyber Security, the only "Daily" Cyber Security news show in the world.The show is has been designed for the laymen person who may not be technical, but also informative enough for all of the computer geeks of the world. Think of it like the CNN Headline News of Cyber SecurityOur daily news includes the latest news in hacking, id theft, IT Jobs, Government Security, Risk Management and 60+ other categories. Execute Produced by one of the worlds most known and respected Ex-hacker Gre ...
 
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Cybersecurity and Technology - Audio
 
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
The Secure Talk podcast reviews the latest threats, tips, and trends related to cybersecurity and compliance. Host, Mark Shriner, interviews leading cybersecurity executives, consultants, and educators and discuss best practices related to IT security and compliance.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work.Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize i ...
 
Cyber Security Dispatch brings you to the front lines of cyber security. In our podcast we interview leading experts and practitioners who are fighting attacks, securing systems, and exploring the cutting edge of cyber security and cyber warfare.
 
Quality Management consultant Warren Alford discusses topics such as Quality Management Systems (QMS) for products and services (hardware and software), Cyber Security, Quality Principles, ISO 9001 2015, Risk Management, Quality Tools, Process Improvement, Lean Six Sigma, Supply Chain Management, and Quality Auditing. Look for this podcast in the iTunes Store.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
Know the latest cybersecurity threats, innovations and actions to take. Our delivery is fast, and the security content coverage is thorough. We bring together today’s hardest working security talent to share their insights with you.
 
Cybersecurity and Technology - Video
 
Cybersecurity for the everyday user.
 
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
 
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
 
Interviews with executives and thought leaders on cybersecurity in business today. Hosted by Alan Hart, also the host of Marketing Today with Alan Hart. Alan talks to non-technical business leaders about the current state of cybersecurity across industries.
 
Planet Zuda Cyber Security and Technology podcast discussing security issues and everything in technology ranging from crypto currencies, Virtual reality, Augmented reality, apps, and more. We discuss all cyber security issues, whether they are exclusives from Planet Zuda or pertains to cyber security and or technology information you need to know or would love to know about.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
 
Cybersecurity Managed features up to date insights and analysis by the Fortify 24x7 security professionals on the most important cybersecurity issues affecting your life today. Since the world of cyber security can be extremely complicated, Cybersecurity Managed explains highly technical subject matter in non-technical terms in order to educate local businesses and listeners. We cover a range topics that are of vital interest to the cybersecurity professional and will also appeal to the novi ...
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
R
Risk & Repeat
Weekly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
The Cracking Cyber Security podcast from TEISS is dedicated to cracking cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
 
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
 
In its mission to deliver unique, most secure and highly versatile technologies to software publishers and intelligent device manufacturers, Wibu-Systems has developed CodeMeter, a comprehensive and award-winning suite of hardware- and software-based entitlement solutions for the protection of software rights and technical know-how against piracy, reverse engineering, tampering, sabotage, and espionage.
 
Our online life is real life. We walk, talk, work, LOL and even love on the Internet – but we don’t always treat it like real life. Host Veronica Belmont explores this disconnect with stories from the wilds of the Web – and gets to the bottom of online issues that affect us all. Whether it’s privacy breaches, closed platforms, hacking, fake news, or cyber bullying, we the people have the power to change the course of the Internet, keeping it healthy, weird, and wonderful for everyone.
 
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
 
Each week, the Kaspersky Lab team will break down some useful cybersecurity stories and offer usable tips in 20 minutes or less.
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
 
E
Eye on Security
Monthly
 
The latest on cybersecurity threats and news from FireEye.
 
Loading …
show series
 
Sandy Carielli, Security Technologies Director at Entrust Datacard, chats with Selena Templeton, host of Diverse IT on ITSPmagazine, about education, mentorships and how to attract a wide range of people into the cybersecurity industry.In my conversation with Sandy, she sheds some light on the differences in diversity between when she first sta ...…
 
Ron started his cybersecurity career as a network penetration tester for the NSA. at BBN, he developed network honeypots to lure hackers and he ran US Internetworking’s team of penetration testers and incident responders. Full Show NotesFollow us on Twitter: https://www.twitter.comsecurityweekly The post Ron Gula, Gula Tech Adventures – Applica ...…
 
LeetSpeak with Alissa Knight Episode 2: Women in Cybersecurity Leadership Special Guests: Carolina Ruiz, CEO of Latin America for Brier & Thorn Topics Covered: Barriers to leadership positions and seats in the boardroom for women globally, the recent suicide of Kate Spade, advice for women seeking leadership positions in cybersecurity, navigati ...…
 
“The internet is like a flower with teeth, it’s beautiful and ugly at the same time, it’s just like we are…” TEISS speaks with Bridget Kenyon, Global CISO at Thales eSecurity about the good, the bad and the ugly facets of the internet, how to reconcile the blurring of our private and public online lives with GDPR, as well as the challenges of d ...…
 
This interview with Jarrod Bassan, Practice Partner for Mobility & IoT Lead (Australia/NZ) for DXC Technology discusses the application of Augmented Reality (AR). DXC Technology formed in April 2017 from the merger of CSC and Hewlett Packard and retains technology interests in AR/VR, gamification, blockchain and Internet of Things. Virtual Real ...…
 
Unit 42 Threat Researcher, Ryan Olson, is joined in the studio by Rick Howard, Chief Security Officer at Palo Alto Networks for another season of their "Don't Panic" podcast, where they break down the components of large scale cyber security attacks and tell you why you don't need to panic. In this episode Ryan explains how a malicious actor wo ...…
 
Small businesses are focused on growing the business for its community, but can one hack end it all?CyberHub engage is the thought leadership and community engagement arm of CyberHub USA. Apply to join our group in LinkedIn and Facebook.Facebook: bit.ly/cyberhub-engage-facebookLinkedin: bit.ly/cyberhub-engage-linkedinMusic: Lost Years - Convert ...…
 
Google aka "Death Kreskin" - Cyber Security Expert Sean Tuma. Trade war with China a good idea? Clock Thief! - ABC's Ryan Burrow.
 
The Execution Gurus interview one of our distinguished collaborators - Bob Gourley - the former CTO and Head of Cyber for the Defense Intelligence Agency and a recognized thought leader in technology and cyber security who has advised many companies on cyber matters. We chat with Bob in the studio about strategies for quelling rising anxiety ar ...…
 
Aaron Pritz of Aaron Pritz & Associates (www.aaronpritz.com) sits down and talks with us about cyber security in healthcare and common threads from the May 2018 Spring Summit of NH-ISAC. This conversation evolves into data breach management, incident response readiness. This discussion goes into managing risk as an ongoing activity to maintain ...…
 
https://www.csoonline.com/article/3276584/ransomware/what-does-a-ransomware-attack-cost-beware-the-hidden-expenses.html https://www.bankinfosecurity.com/mental-health-provider-pays-ransom-to-recover-data-a-11040 https://www.itbusinessedge.com/blogs/data-security/did-we-see-our-first-data-breach-of-the-gdpr-era.html…
 
What is up, guys! Hope you've had a great past week like me. I've been all over the continent this past week trying to refresh from work and my outside projects so I can come back more sharp and ready for all of you guys following the Bit of Code journey. If you haven't listened to my past episodes, my name is Brady Murphy and I am a student at ...…
 
John May of OnTech Systems meets with Associate Director Dajen Bohacek to kick off our quarterly cyber-security podcast series.
 
Larry Snow with the Secure Transportation and Executive Protection News for Monday, June 18th, 2018 ===== In Vehicle News From CNN Money Audi CEO Rupert Stadler has been arrested in Germany as part of an investigation into emissions cheating. Munich prosecutors said in a statement Monday that Stadler had been detained because of concerns over p ...…
 
One day, Sean was working as a route setter at a rock climbing gym in Tennessee. The next, he was driving to San Francisco, without a plan, to start his career in tech. This is the story of his challenging, winding, but ultimately successful path to his first job as a software engineer. Written by Sean Smith: https://twitter.com/bonham_000 Read ...…
 
We talk about the future of role playing games, including the use of machine learning and neural networks to create a game master for use during gaming sessions. This week we also have a special interview with Austin Chaet -- a programmer who works in cyber security, neuroscience, and machine learning. He answers some questions as the conversat ...…
 
Tired of struggling to remember your passwords? Today we cover two tips that might help.This Weeks Challenge-How do you remember all the passwords you need? If the answer to that question is by using only one password, then this weeks challenge is now that you know a few ways to keep track of multiple passwords, can you consider changing each p ...…
 
Richard speaks to Adam Nash, Sales Manager EMEA of Webroot, a next-generation, cloud-based cyber security company.
 
This week on the ASC Podcast with John Goehle we discuss the latest ASC Industry News, Computer systems in an ASC and how you can start to digitize your manuals, We also have an interview with Nelson Gomes from Priority One Group who discusses Cybersecurity, the current state of IT and other IT Issues. This week’s episode is sponsored by Priori ...…
 
SMTP Strangeness - Possible C2 https://isc.sans.edu/forums/diary/SMTP+Strangeness+Possible+C2/23770/ Encrypted Office Documents https://isc.sans.edu/forums/diary/Encrypted+Office+Documents/23774/ Recent Port 8000 Scans https://www.bleepingcomputer.com/news/security/all-that-port-8000-traffic-this-week-yeah-thats-satori-looking-for-new-bots/ New ...…
 
The current generation of smart devices compromises on user security. The focus is overwhelmingly on user experience, at a huge cost in fraud and cybercrime. We believe the digital economy of the future cannot tolerate this trade-off: device architecture demands a paradigm shift that enables true security while maintaining excellent user experi ...…
 
Larry Snow with the Secure Transportation and Executive Protection News for Friday, June 15th, 2018. In Vehicle News From Business Insider China wants to track every driver by putting RFID chips on car windshields Beginning next year, China will require all new registered cars to have an RFID chip installed on windshields which will help study ...…
 
Analyzing a Compromised Wordpress Site https://isc.sans.edu/forums/diary/A+Bunch+of+Compromized+Wordpress+Sites/23764/ Breacking Bluetooth Low Energy Smart Padlock https://www.pentestpartners.com/security-blog/totally-pwning-the-tapplock-smart-lock/ WIM Disk Image Vulnerability https://blog.talosintelligence.com/2018/06/vulnerability-spotlight- ...…
 
Analyzing a Compromised Wordpress Site https://isc.sans.edu/forums/diary/A+Bunch+of+Compromized+Wordpress+Sites/23764/ Breacking Bluetooth Low Energy Smart Padlock https://www.pentestpartners.com/security-blog/totally-pwning-the-tapplock-smart-lock/ WIM Disk Image Vulnerability https://blog.talosintelligence.com/2018/06/vulnerability-spotlight- ...…
 
In this interview, Morry Morgan talks with Vumero General Manager, and the creator of the IoT Festival, Thomas Alomes. The two discuss the festival’s role in pushing the IoT agenda in Australia, and moving IoT away from just hype and theory, to real world applications – applications that have shown to improve productivity in traditional industr ...…
 
In this episode I chat with my friend Shannon Bond, Senior Director of Government Relations at Wolters Kluwer. We discuss cyber security threats to your tax office, and steps you can take to protect yourself and your taxpayers information.If you like what you hear, please give us a good rating wherever you listen to your podcasts.Music: www.ben ...…
 
Is Russia really to blame for the alleged 2016 election interference? Why have we not seen any major evidence from the Federal Government? Could there be more to the story than what is being reported by the media and being disclosed by the Federal Government. This week I go over the time line of events from 2015 to 2017 and give my perspective ...…
 
If you’re a woman, but especially if you’re a man, the latest episode of the Science of Economic Freedom podcast, “Women and Money: The Kara Duckworth Interview,” is a must. Why especially if you’re a man? Well, because if you’re a man, you likely have women in your life that you love. Whether it’s a wife, girlfriend, mother, sisters, daughters ...…
 
Larry Snow with the Secure Transportation and Executive Protection News for Thursday, June 14th, 2018. =================== In Security News From BBC News Egypt safer than US and UK - Gallup poll Egypt has been ranked the safest country in Africa and higher than both the UK and US, according to a new global poll. The annual Gallup Global Law and ...…
 
This episode was recorded at the Fake News Horror Show, an event NYC Media Lab hosted on June 7th and 8th, 2018 to explore the problems of propaganda and misinformation. Clint Watts, a former FBI Special Agent, U.S. Army officer and leading cyber-security expert, gave a keynote presentation on his recently published book, Messing with the Enemy ...…
 
TEISS speaks with Julie Conroy, Research Director for Aite Group’s Retail Banking practice about "digital identity"...Can we reclaim our scattered digital footprint? How can we secure our online identities? How can we predict the future with digital identity? Listen to this podcast where Julie tackles these questions and more...! Music: The Pai ...…
 
E-K title: Founder, President, and Managing Partner J. Eduardo is a seasoned strategist who designs sustainable solutions by building bridges across diverse groups. After creating business growth opportunities on four continents through his leadership roles at PwC, Embraer, and Bell Canada, he spent thirteen years at Microsoft, first as a cyber ...…
 
Drive Live Talks GDPR. The general data protection regulation has recently taken effect in the EU. Sebastien Pavie, Regional Director META, Enterprise & Cybersecurity at Gemalto tells us what it means to consumers, whether they’re EU citizens or not. He also touches on the rising concern of data breaches across the globe.…
 
Drive Live Talks GDPR. The general data protection regulation has recently taken effect in the EU. Sebastien Pavie, Regional Director META, Enterprise & Cybersecurity at Gemalto tells us what it means to consumers, whether they’re EU citizens or not. He also touches on the rising concern of data breaches across the globe.…
 
Back, due to popular demand is Geoff Hancock and this time we are talking to the CISO, Geoff shares 6 points on how CISO can work with the executive team to win them over and get their attention on Cybersecurity and win the budget war desperately needed.CyberHub engage is the thought leadership and community engagement arm of CyberHub USA. Appl ...…
 
We are joined by Daniel Ng at InfoSec Europe 2018. Daniel is the CEO of Cyber Owl - a system that provides early warnings from cyber attacks. Dan spent ten years at KPMG before Cyber Owl and is also the Chair of the Working Group at the IoT Security Foundation, a non profit working towards establishing principles and improving capability global ...…
 
Data breaches and cybersecurity vulnerabilities have been all over the news, elevating these issues in the mind of organizations and consumers. When it comes to cyber threats and attacks it’s not a question of “if” but “when” they’ll happen. Being prepared for evolving threats is a must to stay in business and establish customer trust. In this ...…
 
Microsoft Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+June+2018+Patch+Tuesday/23758/ Apple Code Signing Verification Vulnerability https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ Google Chrome Restricting Inline Extension Install https://blog.chromium.org/2018/06/improving-extension- ...…
 
Microsoft Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+June+2018+Patch+Tuesday/23758/ Apple Code Signing Verification Vulnerability https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/ Google Chrome Restricting Inline Extension Install https://blog.chromium.org/2018/06/improving-extension- ...…
 
Joey Smith, CISO for Schnuck Markets and host AJ Eads (Director of Communications, Alliance) talk about Joey's career pathway from entry level position through the ranks to his current CISO role. Joey provides some great insight into how his team works across business lines to train & motivate their nearly 15,000 employees across several states ...…
 
Anything connected to the internet can be hacked. But could that eventually have the potential to include hacking and controlling airplanes? Guest - Daniel Tobok, CEO, Cytelligence Inc. expert on cyber security (consulting includes penetration testing, vulnerability assessments, security audits and code reviews.)…
 
The federal government plans to act against criminals using encrypted apps to escape detection - but won't reveal how they plan to do this. Cyber Security Minister Angus Taylor says companies must be able to encrypt information, but law enforcement should still have access in a way that won't create a weakness for hackers to exploit. This featu ...…
 
More Malspam Pushing Lokibot https://isc.sans.edu/forums/diary/More+malspam+pushing+Lokibot/23754/ Ethereum JSON RPC Theft https://twitter.com/360Netlab/status/1006065566728085504 CryptoCurrency Miner Plays hide-and-seek https://www.bleepingcomputer.com/news/security/cryptocurrency-miner-plays-hide-and-seek-with-popular-games-and-tools/ Apple O ...…
 
HR2 - Mike Fitzpatrick, CEO and President, Cyber Security Expert for NCX Group, Inc. joins Lonnie.
 
Host Tim Stevens looks back at a Connected Car Expo panel that tackles the still-relevant topic of automotive cybersecurity. Both attackers and defenders appeared on the same stage to have a candid and open discussion on the state of the industry, what’s really at risk, and how to overcome challenges to create a truly secure vehicle. Featuring: ...…
 
Google login Twitter login Classic login