Best Cybersecurity podcasts we could find (Updated September 2018)
Related podcasts: Tech Security Business Malware Data Infosec Education Podcasting News Intrusions Shadowit Datarecovery Socreports Riskassessments Pcireports Informationsecurityconsulting Hitrust Hipaacompliance Ransomware Itsecurity  
Cybersecurity public [search 0]
show episodes
 
Cyber Security and Wireless Tech Expert and Author Scott Schober delivers the latest cybersecurity news, tips, reviews and interviews with industry experts.
 
Cybersecurity is not just computers and digital processes. Whether it's the threat or the response, the most important, and most interesting, part of the story is the people behind the keyboard. That’s why we’re launching The Cybersecurity Podcast, a monthly program featuring key leaders and thinkers in this space. Our half-hour podcast will go beyond the headlines to discuss some of the most pressing issues and newest ideas in cybersecurity.
 
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
 
Quality Management consultant Warren Alford discusses topics such as Quality Management Systems (QMS) for products and services (hardware and software), Cyber Security, Quality Principles, ISO 9001 2015, Risk Management, Quality Tools, Process Improvement, Lean Six Sigma, Supply Chain Management, and Quality Auditing. Look for this podcast in the iTunes Store.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
 
Welcome to HIMSS’s new health IT cybersecurity podcast, Code Red. Code Red focuses on cybersecurity challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cybersecurity posture from both a leadership & skills-based perspective.
 
The Secure Talk podcast reviews the latest threats, tips, and trends related to cybersecurity and compliance. Host, Mark Shriner, interviews leading cybersecurity executives, consultants, and educators and discuss best practices related to IT security and compliance.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
 
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
 
In its mission to deliver unique, most secure and highly versatile technologies to software publishers and intelligent device manufacturers, Wibu-Systems has developed CodeMeter, a comprehensive and award-winning suite of hardware- and software-based entitlement solutions for the protection of software rights and technical know-how against piracy, reverse engineering, tampering, sabotage, and espionage.
 
Cybersecurity for the everyday user.
 
Interviews with executives and thought leaders on cybersecurity in business today. Hosted by Alan Hart, also the host of Marketing Today with Alan Hart. Alan talks to non-technical business leaders about the current state of cybersecurity across industries.
 
Cybersecurity Managed features up to date insights and analysis by the Fortify 24x7 security professionals on the most important cybersecurity issues affecting your life today. Since the world of cyber security can be extremely complicated, Cybersecurity Managed explains highly technical subject matter in non-technical terms in order to educate local businesses and listeners. We cover a range topics that are of vital interest to the cybersecurity professional and will also appeal to the novi ...
 
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cybersecurity Effectiveness Podcast.
 
Up to date news in the cybersecurity realm with meaningful commentary and content you can use to make decisions about your own security posture.
 
Loading …
show series
 
Wednesday September 12, 2018 Cyber: ProofPoint says email threats are way up in every industry in Q2 and Q3 this year. https://www.proofpoint.com/us/resources/threat-reports/targeted-attacks-analysis-august-2018?https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fevents%2Fprotect%2Fregistration=Proofpoint18 Magecart Group Pinned in Recent British Airways B ...…
 
Cryptocurrency Ethereum Downtrend Might Not be Over Yet, Actual ICO Sell Off Expected https://www.cnbc.com/amp/2018/09/10/winklevoss-firm-rolls-out-new-cryptocoin-pegged-to-us-dollar.html?__twitter_impression=true Cybersecurity https://www.zdnet.com/article/exploit-vendor-drops-tor-browser-zero-day-on-twitter/ https://www.techradar.com/news/maj ...…
 
Follow me on Twitter: @eenglish34 https://itunes.apple.com/us/podcast/cyber-security-cryptocurrency-podcast-with-eric-english/id1414720078?mt=2#
 
Cyber: Active Campaign Exploits Critical Apache Struts 2 Flaw in the Wild https://www.scmagazine.com/when-cybersecurity-pros-go-bad-silence-cybergang-makes-noise-with-800000-in-atm-thefts/article/793577/ 23andMe underscores that privacy-loving customers need to opt out of its data deal with GlaxoSmithKline Crypto: https://www.coindesk.com/irans ...…
 
Today I talk more about masternodes and the market downturn. I also talk about KnowBe4, have I been pwned, and Geo blocking in SSO applications. Follow me on Twitter: @eenglish34 https://itunes.apple.com/us/podcast/cyber-security-cryptocurrency-podcast-with-eric-english/id1414720078?mt=2#
 
Host Kevin Greene and guest Brian Knapp, industry renowned software developer discuss the importance of software engineering in modern software development. Brian discuss the need for “minimalism” in software development to help reduce technical debt, complexity and size of today’s software. Brian shares his thoughts on how organizations approa ...…
 
Crypto: Today I talk about masternodes and what their function is in the crypto world. masternodes.online Follow me on Twitter: @eenglish34 https://itunes.apple.com/us/podcast/cyber-security-cryptocurrency-podcast-with-eric-english/id1414720078?mt=2#
 
Today I talk about breaking into your first Info Sec job and things to do to stand out from the crowd. I also talk about the latest news about the Ethereum upgrade coming up in October.
 
Ian Paterson, CEO of Plurilock, explains how behavioral biometrics can be used to perform post login authentication.
 
Cyber: Air Canada Alerts Customers of Mobile App Breach, 20,000 Users Affected https://www.databreachtoday.com/breach-reveal-pge-exposed-30000-sensitive-records-a-11429?rf=2018-08-29_ENEWS_SUB_DBT_Slot1&mkt_tok=eyJpIjoiTkdRd09UUTJZak15WmpNMiIsInQiOiJkTEZOK0pNRU42YlpRMElJSHduZENaUVBoTmdBU0FndGl6TjFaaWR4dUxYNkZoSFwvd0FDU3A4R0lnTEdHYnoyQ1A0NnNUMjN ...…
 
Cyber: https://thehackernews.com/2018/08/windows-zero-day-exploit.html https://www.engadget.com/2018/08/28/twitter-suspends-accounts-for-coordinated-manipulation/ https://krebsonsecurity.com/2018/08/fiserv-flaw-exposed-customer-data-at-hundreds-of-banks/ https://www.zdnet.com/article/why-facebook-is-powerless-to-stop-its-own-descent/ Crypto: ht ...…
 
Security Architect Matt Soseman talks about recent developments in multi-factor authentication (MFA), conditional access, data protection, and other areas related to cybersecurity.
 
Cyber: https://www.scmagazine.com/massive-wordpress-redirect-campaign-spotted-targeting-tagdiv-themes-and-ultimate-member-plugins/article/790878/ New Intel chip flaw “Foreshadow” attacks SGX technology to extract sensitive data https://thehackernews.com/2018/08/facebook-vpn-app-apple-store.html Microsoft KB2871997: Back-Porting Windows 8.1/Win2 ...…
 
VP of Marketing from Awake Security, Rudolph Araujo, explains why he joined Awake Security and how Awake's technology helps organizations to prevent, detect, and respond to non-malware "living off the land" attacks.
 
Crypto: https://www.coindesk.com/sec-rejects-7-bitcoin-etf-proposals/ https://www.coindesk.com/what-an-sec-bitcoin-etf-rejection-review-really-means/ Cyber: T-Mobile Alerts 2.3 Million Customers of Data Breach Tied to Leaky API Follow me on Twitter: @eenglish34 https://itunes.apple.com/us/podcast/cyber-security-cryptocurrency-podcast-with-eric- ...…
 
Cybersecurity experts from around the globe share experiences around their journey to increase security effectiveness. Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to ...…
 
In a very interconnected world, cyber vulnerability is real. Kirsten Koepsel, lawyer and engineer specializing in cyber security, talks with SAE International about how this new environment affects the planes and airports we use every day.
 
Cyber: https://thehackernews.com/2018/08/apache-struts-vulnerability.html Airmail 3 Exploit Instantly Steals Info from Apple Users http://www.ehackingnews.com/2018/08/canadian-telecom-providers-affected-by.html?utm_source=dlvr.it&utm_medium=twitter Follow me on Twitter: @eenglish34 https://itunes.apple.com/us/podcast/cyber-security-cryptocurren ...…
 
Crypto: https://www.coindesk.com/sec-bitcoin-futures-etf/ https://www.coindesk.com/sec-faces-thursday-deadline-for-proshares-bitcoin-etf-decision/ https://www.coindesk.com/gemini-partners-with-3-crypto-exchanges-in-push-for-self-regulatory-org/ Cyber: https://thehackernews.com/2018/08/mexico-banking-malware.html https://thehackernews.com/2018/0 ...…
 
100% of all organizations are in danger of being victims of cyber attack. Yet, only 50% US businesses have cyber insurance. Steve and Femi talk with Ari Vared of CyberPolicy, a comparative site for cyber insurance for small businesses. They answer all of the questions you need to know about why and how to get started on getting a cybersecurity ...…
 
Crypto: https://www.polygon.com/2018/8/20/17760038/nvidia-geforce-rtx-2080-ti-2070-specs-release-date-price-turing Coinbase Trading Drops 83% Since January, Offshore Cryptocurrency Exchanges Make Gains Cyber: IoT botnet of heaters & ovens can cause massive widespread power outages Follow me on Twitter: @eenglish34 https://itunes.apple.com/us/po ...…
 
Since incident response issues are no longer just an IT issue and can often involve legal issues, it is important for organizations to develop an incident response team, seek outside expertise, and have an overall action plan in the event of an incident. In this podcast, LBMC Information Security’s Bill Dean discusses how a complex situation li ...…
 
Crypto: https://www.engadget.com/2018/08/15/att-224-million-lawsuit-cryptocurrency-theft/ https://www.coindesk.com/30-of-uk-firms-hit-by-crypto-mining-malware-in-a-month-survey/ Cyber: https://thehackernews.com/2018/08/foreshadow-intel-processor-vulnerability.html Hundreds of reports of hacked Instagram accounts, possible Russian link https://w ...…
 
Cryptocurrency: SEC Slaps Fake ICO founder fined 30k https://www.coindesk.com/sec-slaps-fraudulent-ico-founder-with-30k-fine-lifetime-ban/ Current Bitcoin Price hit all time low for this year 5700 https://www.coindesk.com/under-pressure-bitcoin-price-could-defend-5-6k-charts-say/ Fantasy Football blockchain startup to get 100m in funding https: ...…
 
Follow me on Twitter: @eenglish34 https://itunes.apple.com/us/podcast/cyber-security-cryptocurrency-podcast-with-eric-english/id1414720078?mt=2#
 
Today we discuss: Cybersecurity: New WPA2 hacking technique https://thehackernews.com/2018/08/how-to-hack-wifi-password.html Office365 bypassing spam filtering Cryptocurrency: Current market price drop. Mining profitability decrease. SEC ruling. https://www.coindesk.com/the-crypto-market-just-hit-a-new-low-for-2018/ Follow me on Twitter: @eengl ...…
 
Today we discuss: Cybersecurity: Different ways to harden and secure your Office 365 environment. Cryptocurrency: Coinbase and Ethereum Classic (ETC) Follow me on Twitter: @eenglish34 https://itunes.apple.com/us/podcast/cyber-security-cryptocurrency-podcast-with-eric-english/id1414720078?mt=2#
 
Today we discuss: Crypto: Micro Tik Routers hacked to mine crypto http://links.ismgcorp.com/ek8flI00000XZI0RFnBpI0d Coinbase to accept ETC Cyber: Boston Children’s Hospital DDoS attacker convicted. 15 years http://links.ismgcorp.com/rF0q0I0I8XGpfkZnI00R0d0 Virus Total samples and how to turn it off in Anti-Virus. Follow me on Twitter: @eenglish ...…
 
Today we discuss: Cybersecurity: https://www.databreachtoday.com/salesforce-security-alert-api-error-exposed-marketing-data-a-11278?rf=2018-08-03_ENEWS_ACQ_DBT_Slot1&mkt_tok=eyJpIjoiWVRJNE56Y3pPVEl6WXpkaSIsInQiOiJIemk4TFVxN2JlNEhQTFVOdlZiR0N2QktlMWo2T1dkb05LYTcxSzVvTkRkUDRKYTQ5YUlNYjVyTHdTTEFHRHZNMTBCRVFBTXp6WVwvODhmV3F3cFpPU253cjROSHc3c2VvMWhK ...…
 
Today we discuss: Cybersecurity: https://www.databreachtoday.com/iowa-health-group-data-breach-hits-14-million-patients-a-11264?rf=2018-08-01_ENEWS_ACQ_DBT_Slot9&mkt_tok=eyJpIjoiWlRjM1lUZGtOVGM1TTJZNCIsInQiOiJqM2U5UjlSMUp6R2lBWHBEWEVIMTdycGxwc2h4cStyZTZDVW85Y0dselFXZ3dmZitjZ1djWEhST1FVYnUyZWVJZzNsYjNGUkJqMXNiSTBWTForemVEaWg1ZFNqMk95azlmVDhvbUxS ...…
 
Today we discuss: Cybersecurity: Facebook 3rd party quizzes/apps/games/plugins and the dangers they hide. https://www.bbb.org/en/us/article/news-releases/16992-scam-alert-that-facebook-quiz-might-be-a-big-data-company-mining-your-personal-information Read this before you take a Facebook quiz again https://thehackernews.com/2018/07/dixons-carpho ...…
 
Trusona Founder & CEO, Ori Eisen, talks about how passwords can and should be replaced, and provides an introduction to Trusona's passwordless solutions.
 
Today we discuss: Cybersecurity: Unsecured server exposes 157GB of highly sensitive data from Tesla and Toyota. A company called Level One Robotics https://www.csoonline.com/article/3291328/security/unsecured-server-exposes-157-gb-of-highly-sensitive-data-from-tesla-toyota-and-more.html Bluetooth Vulnerability https://thehackernews.com/2018/07/ ...…
 
Episode 7 we discuss: Cybersecurity- Circumventing 2-Factor for O365 https://www.proofpoint.com/us/corporate-blog/post/microsoft-office-365-attacks-circumvent-multi-factor-authentication-lead-account The LabCorp attack was actually a Ransomware attack: http://links.ismgcorp.com/P080k0dZpX0INF040fhIfR0 Singapore Healthcare hack leaked 1.5 millio ...…
 
On Episode 6 we discuss: Cybersecurity: Singapore’s Largest Healthcare Group Hacked https://thehackernews.com/2018/07/singapore-healthcare-breach.html Russian hackers hacked 3 2018 Midterm Election Candidates https://thehackernews.com/2018/07/russia-election-hacking.html Cryptocurrency: New ERC-20 Token taking over. ZIL https://globalcoinreport ...…
 
Episode 5 of the Cybersecurity & Cryptocurrency Podcast we discuss: Cybersecurity: LabCorp Cyber Attack: http://links.ismgcorp.com/K00RFZX00p8I0edfI8dk0I0 Cryptocurrency: Using Blockchain for Identity Management: http://links.ismgcorp.com/R00pFfdXRd0000I0ZGI8ck8 Coinbase Trio Acquisition and potential new coins listing https://globalcoinreport. ...…
 
Episode 4 Cybersecurity- We discuss a recent Business Email Compromise that happened at my job and the lessons I learned from it. We also discuss personal security when traveling, VPN services, and Password Managers. Cryptocurrency- We discuss SmartCash mining issues with Claymore, starting your own ERC-20 Token, and recent trends in cryptojack ...…
 
In a previous podcast, we discussed purple-teaming as it compares to a conventional penetration test. Let’s now build on that approach, starting with the differences between attack simulation and conventional penetration tests. The methodology of attack simulation is the assumption that the network or a system will become compromised and the cu ...…
 
Today’s episode we will discuss the additional findings from the TimeHop breach, Business Email Compromise costs, and President Trump’s response to his DNC server that went missing. In Crypto News, we’ll discuss recent market trends, Ethereum’s transaction spikes and my mining rig. Cybersecurity article links: http://links.ismgcorp.com/Y0dF880k ...…
 
Ticketmaster Hack with widely used tools. RiskIQ says it has identified malicious code within a different third-party marketing and analytics service used by Ticketmaster. The service is developed by a company called SociaPlus. “This supplier was also breached by the Magecart actors, and the scripts they served to customers were modified on sub ...…
 
I’m taking my 2 favorite topics and starting a podcast to discuss all things cybersecurity and cryptocurrency. This is a quick episode to get things off the ground so I can learn how to post these podcasts to the various podcast platforms. The intro episode includes my background and my passion for cyber and crypto topics. I hope you enjoy it.…
 
Commitment is critical to a successful security program, and that commitment isn’t just to the technology and processes. The human component is especially important, whether you want your customers to have confidence in your organization’s ability to protect their data, or whether you need to persuade the C-Suite that the benefits of a solid se ...…
 
Most penetration testers are considered “red team,” while most defenders are considered “blue team.” Thus, the irony of a conventional penetration test is that these two groups are typically pitted against each other. When the red teams and blue teams are working together, you have what’s called a “purple team.” While purple-teaming has not alw ...…
 
Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and gives examples of how it can help companies that have been cyber attacked.(This is part 2 of a 2 part podcast)
 
Join Josh Susen for the latest security news. In this episode he discusses another Facebook data leaking app, a new Android vulnerability, along with a very large data breach exposing nearly the entire US population. NameTests https://thehackernews.com/2018/06/facebook-users-data-leak.html Gentoo https://thehackernews.com/2018/06/gentoo-linux-g ...…
 
Automating license and entitlement management with CodeMeter License Central can free up your time, provide a reliable source of alerts for you to intervene in person when you have to, and allow you to customize factors to meet your customers' needsBy team@wibu.com (Wibu-Systems).
 
Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and what buyers should be looking for when they purchase a cyber insurance policy.(This is part 1 of a 2 part podcast)
 
Josh Susen has a years of experience in programming, system administration, worked across multiple industries, most recently in banking and healthcare, and holds a CISSP. This week he covers Tesla’s insider threat, Telecommunication Carriers location sharing with third parties, Smartlocks, and more.
 
The HIMSS Cybersecurity Call to Action includes an appeal to use a cybersecurity framework across the sector. There are several out there to choose from and, as we state in our call, HIMSS recommends the NIST Cybersecurity Framework. In our latest cybersecurity survey, we asked respondents whether or not they used a framework, and if so, which ...…
 
This week, Robert Fleming offers an expert perspective.By info@scottschober.com (Scott Schober).
 
Google login Twitter login Classic login