show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
  continue reading
 
Artwork

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
  continue reading
 
Classic tales of supernatural horror and suspense are brought to life in this series of audiobooks featuring the works of E.F.Benson, Saki, H.P. Lovecraft, Bram Stoker, and more. Fans of the creepiest, spookiest podcasts will thrill to the immersive retellings of these nightmarish short stories from the vaults of terror, complete with compelling narration, sound effects and music. As told by the mysterious Jasper L'Estrange, EnCrypted: The Classic Horror Podcast is your new home for scary st ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
  continue reading
 
Artwork
 
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP OGG

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
TechSNAP Mobile Video

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
Artwork

1
In Conversation With

Internet Watch Foundation (IWF)

Unsubscribe
Unsubscribe
Monthly
 
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
Small Business Cybersecurity Podcast

Small Business Cybersecurity Podcast

Unsubscribe
Unsubscribe
Monthly
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
  continue reading
 
From privacy concerns to limitless potential, AI is rapidly impacting our evolving society. In this new season of The Brave Technologist Podcast - we’re demystifying artificial intelligence, challenging the status quo, and empowering everyday people to embrace the digital revolution.
  continue reading
 
Artwork

1
Hashing It Out

Corey Petty, Dee Ferguson, Jessie Santiago, Christian Noguera

Unsubscribe
Unsubscribe
Monthly+
 
Hashing It Out is a podcast which dives into the weeds with tech innovators in blockchain infrastructure and decentralized networks to learn more about what they build and the problems they face head on to overcome.
  continue reading
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Artwork
 
The Castlerea Cybercast, hosted by Austin Farrell and Josh Hawk, brings you the latest news and information from the world of cybersecurity. From ways to protect yourself and your business to news about upcoming changes in the world of cyber, and interviews with industry leaders we have it all right here.
  continue reading
 
Artwork
 
A podcast to disrupt common narratives and constructs to empower diverse communities. We provide inspirational content from entrepreneurs and leaders who are disrupting the status quo.
  continue reading
 
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
  continue reading
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork
 
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
  continue reading
 
Artwork

1
SQL Server Radio

Guy Glantser, Eitan Blumin

Unsubscribe
Unsubscribe
Monthly
 
SQL Server Radio is a Podcast for SQL Server DBAs, database developers, architects, system administrators, and anyone else who is interested in the Microsoft SQL Server platform and the Microsoft data platform in general. As the data world changes, we also occasionally talk about other platforms and services like Azure and Amazon cloud services, Elastic Search, Hadoop, MongoDB, Machine Learning, and much more.
  continue reading
 
Artwork
 
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
  continue reading
 
Artwork
 
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
  continue reading
 
Loading …
show series
 
Got a Minute? Checkout today's episode of Practical Digital Strategies podcast - the Google Doc for this episode is @ Make sure that your password manager uses zero-knowledge encryption ----more---- I help goal oriented business owners that run established companies to leverage the power of the internet Contact Guy R Cook @ https://guyrcook.com In …
  continue reading
 
In Episode 88, Patrick and Ciprian welcome back Tim Hollebeek from Digicert. They dive into the latest concerns surrounding learning with errors, the future security of encryption, and both current and emerging standards. Timothy Hollebeek, Industry and Standards Technical Strategist at DigiCert, Inc. has nearly two decades of computer security exp…
  continue reading
 
In this episode, we dive into the revolutionary world of digital currencies, focusing on Brazil's bold move with its CBDC, Drex. Join us as we explore how DREX aims to reshape the Brazilian financial system through a two-tier model, enabling programmability in transactions and influencing the broader financial ecosystem. We'll discuss the global la…
  continue reading
 
Invited to share his story at Saunderson’s Round Table, a golfer provides a terrifying account of an old fisherman, a vengeful curse, and the mystery of The Fifteenth Green… This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “The Fifteenth Green” by Margery Lawrence (from “Nights of the Round Table”, first p…
  continue reading
 
This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the pat…
  continue reading
 
Step into the digital arena with John Cavanaugh, a renowned digital privacy and safety expert, on this episode of "Encrypting Freedom." Uncover the hidden pitfalls in your digital practices and learn how to fortify your data against the encroaching eyes of AI technologies. John doesn't just outline the problems; he arms you with robust, actionable …
  continue reading
 
Did you know that apps on your phone can see which other apps you have installed? And that apps can talk to each other and share information, without you realizing? In this video we show you how to stop apps communicating with each other, and look at the scoped storage and sandboxing of apps in GrapheneOS, and what it does and doesn't protect again…
  continue reading
 
Amit Malik, Director of Threat Research at Uptycs, is sharing their work on "New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware." The Uptycs Threat Research Team has discovered a large-scale Log4j campaign involving over 1700 IPs, aiming to deploy XMRig cryptominer malware. This ongoing operation was initially det…
  continue reading
 
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Boosting Engagement: Top Strategies for Your Blog and Facebook ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the interne…
  continue reading
 
The "you'll own nothing" trend got worse this week, our thoughts about the Raspberry Pi IPO, poor Nextcloud performance, and Alex's new high-fiber obsession. Sponsored By: Unraid: Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Grist: Grist - the open-source alternative to Airtab…
  continue reading
 
JOIN THE COMMUNITY Logos Twitter: https://twitter.com/Logos_network Logos Discord: https://discord.gg/logosnetwork RESOURCES: Vitalik Buterin X - https://x.com/VitalikButerin Dankrad Feist X - https://x.com/dankrad Dmitriy Ryajov X - https://x.com/dryajov TIMESTAMPS: 00:00:00:00 Introduction 00:04:36:18 History of Sharding 00:10:05:06 Challenges in…
  continue reading
 
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Boost Engagement Through Interaction in 2024 ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact Guy R Co…
  continue reading
 
This week on Technado, Google patched yet ANOTHER 0-day exploit - that's four this month, for those of you counting. Spyware program pcTattletale had their website defaced and database dumped. Several major pharmaceutical companies were affected by Cencora's February data loss. And in other news, hackers are phishing finance orgs using... Minesweep…
  continue reading
 
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ The Perfect Combination: Dual Booting Linux and Windows 11 for Maximum Productivity ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the…
  continue reading
 
Josep M. Pujol (Chief of Search at Brave) and Rémi Berson (Principal Engineer at Brave) discuss Brave Search’s latest feature, Answer With AI, which is the first privacy-preserving answer engine available at scale. They explore what this new assistant’s capabilities mean for traditional search, and its potential to reshape our search habits. Key Ta…
  continue reading
 
The bigger problem with AI Overview https://udm14.com/ -and- https://tenbluelinks.org/ The horses have left the barn VPNs and Firewalls Email @ GRC Extension to fix Google search Passwords and SPAM Fixing motherboard components Vertical tabs in Firefox FritzBox routers Too many PINs More Google search fixes Testing Windows XP The 50 Gigabyte Privac…
  continue reading
 
The bigger problem with AI Overview https://udm14.com/ -and- https://tenbluelinks.org/ The horses have left the barn VPNs and Firewalls Email @ GRC Extension to fix Google search Passwords and SPAM Fixing motherboard components Vertical tabs in Firefox FritzBox routers Too many PINs More Google search fixes Testing Windows XP The 50 Gigabyte Privac…
  continue reading
 
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Ultimate Guide to Google Meet Mastery on Linux Mint ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact G…
  continue reading
 
Rick Howard, N2K CyberWire’s Chief Analyst, CSO, and Senior Fellow, commemorates Memorial Day. References: Abraham Lincoln, 1863. The Gettysburg Address [Speech]. Abraham Lincoln Online. Amanda Onion, Original 2009, Updated 2023. Memorial Day 2022: Facts, Meaning & Traditions [Essay]. HISTORY. Brent Hugh, 2021. A Brief History of “John Brown’s Body…
  continue reading
 
Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang…
  continue reading
 
JOIN THE COMMUNITY Logos Twitter: https://twitter.com/Logos_network Logos Discord: https://discord.gg/logosnetwork RESOURCES: Vinay Gupta X - https://twitter.com/leashless Mattereum - https://mattereum.com/ TIMESTAMPS: Logos Press Engine includes Logos Podcast and Hashing It Out. Logos Podcast is a show about building sovereign communities: the peo…
  continue reading
 
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ How to easily secure your WordPress Website with Two-Factor Authentication ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of…
  continue reading
 
iykyk Transcript: https://securitycryptographywhatever.com/2024/05/25/ekr/ Links: - https://hovav.net/ucsd/dist/draft-shacham-tls-fasttrack-00.txt - https://crypto.stanford.edu/~dabo/pubs/papers/fasttrack.pdf - https://datatracker.ietf.org/doc/html/rfc8446 - SoK: SCT Auditing in Certificate Transparency: https://arxiv.org/pdf/2203.01661 - A hard lo…
  continue reading
 
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Enhance collaboration using Google Meet ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact Guy R Cook @ …
  continue reading
 
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Boost Your Business Efficiency with Cloud Computing ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact G…
  continue reading
 
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Join forums and online communities ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact Guy R Cook @ https…
  continue reading
 
Steve Kinard, President of the AI Innovation Association, discusses Bitcoin mining and the environmental implications that turned him into an advocate with the Texas Blockchain Council. He also emphasizes the inevitability of AI's disruptive impact across industries, and advocates for prioritizing open source collaboration as the cornerstone of tec…
  continue reading
 
When you're the biggest target... Searching for Search How long will a Windows XP machine survive unprotected on the Internet? Free Laundry VPNs and Firewalls Netgate SG1100 Ad Industry vs. Google Privacy Sandbox Bitwarden and passkeys Token2 passkey dongle 312 Scientists & Researchers Respond Show Notes - https://www.grc.com/sn/SN-975-Notes.pdf Ho…
  continue reading
 
When you're the biggest target... Searching for Search How long will a Windows XP machine survive unprotected on the Internet? Free Laundry VPNs and Firewalls Netgate SG1100 Ad Industry vs. Google Privacy Sandbox Bitwarden and passkeys Token2 passkey dongle 312 Scientists & Researchers Respond Show Notes - https://www.grc.com/sn/SN-975-Notes.pdf Ho…
  continue reading
 
Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ Linux Foundation signup for Free Linux training newsletter ----more---- Support this podcastSubscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Co…
  continue reading
 
Loading …

Quick Reference Guide