Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Classic tales of supernatural horror and suspense are brought to life in this series of audiobooks featuring the works of E.F.Benson, Saki, H.P. Lovecraft, Bram Stoker, and more. Fans of the creepiest, spookiest podcasts will thrill to the immersive retellings of these nightmarish short stories from the vaults of terror, complete with compelling narration, sound effects and music. As told by the mysterious Jasper L'Estrange, EnCrypted: The Classic Horror Podcast is your new home for scary st ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Music and Words but mostly Bass.
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
The officially unofficial podcast for Mr. Robot on USA. Each week we hack into the episode with a full recap and listener feedback.
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
…
continue reading
From privacy concerns to limitless potential, AI is rapidly impacting our evolving society. In this new season of The Brave Technologist Podcast - we’re demystifying artificial intelligence, challenging the status quo, and empowering everyday people to embrace the digital revolution.
…
continue reading
Don’t miss out on Practical Digital Strategies. For Digital Marketers, Content Creators, Business Owners looking to succeed in the digital space.
…
continue reading
Hashing It Out is a podcast which dives into the weeds with tech innovators in blockchain infrastructure and decentralized networks to learn more about what they build and the problems they face head on to overcome.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
The Castlerea Cybercast, hosted by Austin Farrell and Josh Hawk, brings you the latest news and information from the world of cybersecurity. From ways to protect yourself and your business to news about upcoming changes in the world of cyber, and interviews with industry leaders we have it all right here.
…
continue reading
A podcast to disrupt common narratives and constructs to empower diverse communities. We provide inspirational content from entrepreneurs and leaders who are disrupting the status quo.
…
continue reading
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
…
continue reading
SQL Server Radio is a Podcast for SQL Server DBAs, database developers, architects, system administrators, and anyone else who is interested in the Microsoft SQL Server platform and the Microsoft data platform in general. As the data world changes, we also occasionally talk about other platforms and services like Azure and Amazon cloud services, Elastic Search, Hadoop, MongoDB, Machine Learning, and much more.
…
continue reading
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
1
Make sure that your password manager uses zero-knowledge encryption
1:50
1:50
Play later
Play later
Lists
Like
Liked
1:50
Got a Minute? Checkout today's episode of Practical Digital Strategies podcast - the Google Doc for this episode is @ Make sure that your password manager uses zero-knowledge encryption ----more---- I help goal oriented business owners that run established companies to leverage the power of the internet Contact Guy R Cook @ https://guyrcook.com In …
…
continue reading
1
The Future of Encryption Security: Featuring Guest Tim Hollebeek
36:01
36:01
Play later
Play later
Lists
Like
Liked
36:01
In Episode 88, Patrick and Ciprian welcome back Tim Hollebeek from Digicert. They dive into the latest concerns surrounding learning with errors, the future security of encryption, and both current and emerging standards. Timothy Hollebeek, Industry and Standards Technical Strategist at DigiCert, Inc. has nearly two decades of computer security exp…
…
continue reading
1
Digital Currency Revolution: Brazil's Drex and the Future of Coexisting Stablecoins and CBDCs
1:02:13
1:02:13
Play later
Play later
Lists
Like
Liked
1:02:13
In this episode, we dive into the revolutionary world of digital currencies, focusing on Brazil's bold move with its CBDC, Drex. Join us as we explore how DREX aims to reshape the Brazilian financial system through a two-tier model, enabling programmability in transactions and influencing the broader financial ecosystem. We'll discuss the global la…
…
continue reading
1
"The Fifteenth Green" by Margery Lawrence
42:48
42:48
Play later
Play later
Lists
Like
Liked
42:48
Invited to share his story at Saunderson’s Round Table, a golfer provides a terrifying account of an old fisherman, a vengeful curse, and the mystery of The Fifteenth Green… This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “The Fifteenth Green” by Margery Lawrence (from “Nights of the Round Table”, first p…
…
continue reading
This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the pat…
…
continue reading
1
Disruption Now Episode 169: Encrypting Freedom
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03
Step into the digital arena with John Cavanaugh, a renowned digital privacy and safety expert, on this episode of "Encrypting Freedom." Uncover the hidden pitfalls in your digital practices and learn how to fortify your data against the encroaching eyes of AI technologies. John doesn't just outline the problems; he arms you with robust, actionable …
…
continue reading
1
IT Security: How encryption can protect - and deceive you
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27
Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises.By Tresorit
…
continue reading
1
Stop Your Apps Secretly Talking To Each Other!
15:23
15:23
Play later
Play later
Lists
Like
Liked
15:23
Did you know that apps on your phone can see which other apps you have installed? And that apps can talk to each other and share information, without you realizing? In this video we show you how to stop apps communicating with each other, and look at the scoped storage and sandboxing of apps in GrapheneOS, and what it does and doesn't protect again…
…
continue reading
Amit Malik, Director of Threat Research at Uptycs, is sharing their work on "New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware." The Uptycs Threat Research Team has discovered a large-scale Log4j campaign involving over 1700 IPs, aiming to deploy XMRig cryptominer malware. This ongoing operation was initially det…
…
continue reading
1
Boosting Engagement: Top Strategies for Your Blog and Facebook
3:45
3:45
Play later
Play later
Lists
Like
Liked
3:45
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Boosting Engagement: Top Strategies for Your Blog and Facebook ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the interne…
…
continue reading
The "you'll own nothing" trend got worse this week, our thoughts about the Raspberry Pi IPO, poor Nextcloud performance, and Alex's new high-fiber obsession. Sponsored By: Unraid: Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Grist: Grist - the open-source alternative to Airtab…
…
continue reading
1
PeerDAS and Data Availability Sampling in Practice
58:11
58:11
Play later
Play later
Lists
Like
Liked
58:11
JOIN THE COMMUNITY Logos Twitter: https://twitter.com/Logos_network Logos Discord: https://discord.gg/logosnetwork RESOURCES: Vitalik Buterin X - https://x.com/VitalikButerin Dankrad Feist X - https://x.com/dankrad Dmitriy Ryajov X - https://x.com/dryajov TIMESTAMPS: 00:00:00:00 Introduction 00:04:36:18 History of Sharding 00:10:05:06 Challenges in…
…
continue reading
1
Boost Engagement Through Interaction in 2024
1:18
1:18
Play later
Play later
Lists
Like
Liked
1:18
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Boost Engagement Through Interaction in 2024 ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact Guy R Co…
…
continue reading
1
Neue Funktionen von Tresorit (Spring Updates, 2024)
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55
Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024.By Tresorit
…
continue reading
1
362: Biden Deepfake Robocaller Indicted! ($6 Million Fine?!)
1:10:21
1:10:21
Play later
Play later
Lists
Like
Liked
1:10:21
This week on Technado, Google patched yet ANOTHER 0-day exploit - that's four this month, for those of you counting. Spyware program pcTattletale had their website defaced and database dumped. Several major pharmaceutical companies were affected by Cencora's February data loss. And in other news, hackers are phishing finance orgs using... Minesweep…
…
continue reading
1
The Perfect Combination: Dual Booting Linux and Windows 11 for Maximum Productivity
2:19
2:19
Play later
Play later
Lists
Like
Liked
2:19
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ The Perfect Combination: Dual Booting Linux and Windows 11 for Maximum Productivity ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the…
…
continue reading
1
Introducing Answer with AI, Brave’s New AI Assistant
49:10
49:10
Play later
Play later
Lists
Like
Liked
49:10
Josep M. Pujol (Chief of Search at Brave) and Rémi Berson (Principal Engineer at Brave) discuss Brave Search’s latest feature, Answer With AI, which is the first privacy-preserving answer engine available at scale. They explore what this new assistant’s capabilities mean for traditional search, and its potential to reshape our search habits. Key Ta…
…
continue reading
1
SN 976: The 50 Gigabyte Privacy Bomb - Google AI Workarounds, Microsoft Recall
2:13:33
2:13:33
Play later
Play later
Lists
Like
Liked
2:13:33
The bigger problem with AI Overview https://udm14.com/ -and- https://tenbluelinks.org/ The horses have left the barn VPNs and Firewalls Email @ GRC Extension to fix Google search Passwords and SPAM Fixing motherboard components Vertical tabs in Firefox FritzBox routers Too many PINs More Google search fixes Testing Windows XP The 50 Gigabyte Privac…
…
continue reading
1
SN 976: The 50 Gigabyte Privacy Bomb - Google AI Workarounds, Microsoft Recall
2:13:33
2:13:33
Play later
Play later
Lists
Like
Liked
2:13:33
The bigger problem with AI Overview https://udm14.com/ -and- https://tenbluelinks.org/ The horses have left the barn VPNs and Firewalls Email @ GRC Extension to fix Google search Passwords and SPAM Fixing motherboard components Vertical tabs in Firefox FritzBox routers Too many PINs More Google search fixes Testing Windows XP The 50 Gigabyte Privac…
…
continue reading
1
Ultimate Guide to Google Meet Mastery on Linux Mint
1:20
1:20
Play later
Play later
Lists
Like
Liked
1:20
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Ultimate Guide to Google Meet Mastery on Linux Mint ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact G…
…
continue reading
Rick Howard, N2K CyberWire’s Chief Analyst, CSO, and Senior Fellow, commemorates Memorial Day. References: Abraham Lincoln, 1863. The Gettysburg Address [Speech]. Abraham Lincoln Online. Amanda Onion, Original 2009, Updated 2023. Memorial Day 2022: Facts, Meaning & Traditions [Essay]. HISTORY. Brent Hugh, 2021. A Brief History of “John Brown’s Body…
…
continue reading
Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang…
…
continue reading
JOIN THE COMMUNITY Logos Twitter: https://twitter.com/Logos_network Logos Discord: https://discord.gg/logosnetwork RESOURCES: Vinay Gupta X - https://twitter.com/leashless Mattereum - https://mattereum.com/ TIMESTAMPS: Logos Press Engine includes Logos Podcast and Hashing It Out. Logos Podcast is a show about building sovereign communities: the peo…
…
continue reading
1
How to easily secure your WordPress Website with Two-Factor Authentication
3:08
3:08
Play later
Play later
Lists
Like
Liked
3:08
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ How to easily secure your WordPress Website with Two-Factor Authentication ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of…
…
continue reading
iykyk Transcript: https://securitycryptographywhatever.com/2024/05/25/ekr/ Links: - https://hovav.net/ucsd/dist/draft-shacham-tls-fasttrack-00.txt - https://crypto.stanford.edu/~dabo/pubs/papers/fasttrack.pdf - https://datatracker.ietf.org/doc/html/rfc8446 - SoK: SCT Auditing in Certificate Transparency: https://arxiv.org/pdf/2203.01661 - A hard lo…
…
continue reading
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Enhance collaboration using Google Meet ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact Guy R Cook @ …
…
continue reading
1
Boost Your Business Efficiency with Cloud Computing
1:16
1:16
Play later
Play later
Lists
Like
Liked
1:16
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Boost Your Business Efficiency with Cloud Computing ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact G…
…
continue reading
1
New Features and Functions of Tresorit (Spring Updates, 2024)
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42
Discover the latest updates from Tresorit's R&D department and take a look at the roadmap for 2024.By Tresorit
…
continue reading
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Join forums and online communities ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact Guy R Cook @ https…
…
continue reading
1
Balancing Environmental Stewardship with Technological Progress
46:43
46:43
Play later
Play later
Lists
Like
Liked
46:43
Steve Kinard, President of the AI Innovation Association, discusses Bitcoin mining and the environmental implications that turned him into an advocate with the Texas Blockchain Council. He also emphasizes the inevitability of AI's disruptive impact across industries, and advocates for prioritizing open source collaboration as the cornerstone of tec…
…
continue reading
1
SN 975: 312 Scientists & Researchers Respond - 3 Chrome Zero-Days, Free Laundry
2:14:17
2:14:17
Play later
Play later
Lists
Like
Liked
2:14:17
When you're the biggest target... Searching for Search How long will a Windows XP machine survive unprotected on the Internet? Free Laundry VPNs and Firewalls Netgate SG1100 Ad Industry vs. Google Privacy Sandbox Bitwarden and passkeys Token2 passkey dongle 312 Scientists & Researchers Respond Show Notes - https://www.grc.com/sn/SN-975-Notes.pdf Ho…
…
continue reading
1
SN 975: 312 Scientists & Researchers Respond - 3 Chrome Zero-Days, Free Laundry
2:14:17
2:14:17
Play later
Play later
Lists
Like
Liked
2:14:17
When you're the biggest target... Searching for Search How long will a Windows XP machine survive unprotected on the Internet? Free Laundry VPNs and Firewalls Netgate SG1100 Ad Industry vs. Google Privacy Sandbox Bitwarden and passkeys Token2 passkey dongle 312 Scientists & Researchers Respond Show Notes - https://www.grc.com/sn/SN-975-Notes.pdf Ho…
…
continue reading
1
Linux Foundation signup for Free Linux training newsletter
1:00
1:00
Play later
Play later
Lists
Like
Liked
1:00
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Linux Foundation signup for Free Linux training newsletter ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Co…
…
continue reading