Best security vulnerabilities podcasts we could find (Updated April 2018)
Related podcasts: Security Vulnerability Malware Tech Threat Hackers Exploits Cybersecurity Hacking Information Podcasting Vrt Snort Talos Zeroday Vuln Cisco Threats 0 Dev  
Security vulnerabilities public [search 0]
show episodes
 
The cybersecurity industry’s premier podcasts featuring the latest information security news, interviews and information.
 
I
InfoSec Daily Podcast
Monthly+
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
SecureMac presents The Checklist. Each week, Nicholas Raba, Nicholas Ptacek, and Ken Ray hit security topics for your Mac and iOS devices. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
Information about Tenable's unified security monitoring products, including Nessus and Security Center. A review of the latest news and vulnerabilities and interviews with some of the industries finest!
 
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
 
A daily news service that keeps you up-to-date on security issues, new threats and steps to defend networks against cyber attacks
 
T
The Ashimmy Blog
Daily+
 
Writings on work, kids and network security
 
Our podcast takes up the big questions of security, risk, and vulnerabilities. A weekly discussion with experts and the Varonis team. Follow us: @infosec_podcast
 
Ryan Naraine is the host of the SecurityWeek podcast series "Security Conversations". He is the head of Kaspersky Lab's Global Research & Analysis team in the USA and has extensive experience in computer security user education, specializing in operating system and third-party application vulnerabilities, zero-day attacks, social engineering and social networking threats.
 
R
Risk & Repeat
Weekly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
Organizations are facing a growing and rapidly evolving set of security threats, including: IT outsourcing, cybercrime, workforce mobility, Web 2.0, and data breaches. Lumension is the leading provider of operational endpoint security solutions that help protect your vital information and manage your critical risk across network and endpoint assets. Lumension delivers Vulnerability Management, Endpoint Protection, Data Protection, and Compliance and IT Risk Management solutions to more than ...
 
Preston Wiley, Mike Hill, and Keith Watson discuss interesting topics in information security and privacy. This biweekly podcast covers topics that range from the latest software vulnerabilities to security tools to legal issues. The Serious about Security Podcast is brought to you by the Greater Lafayette Security Professionals (GLSP) group, Secure Purdue, and the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University.
 
S
Scared Sh!tless
Weekly
 
To survive in today's world you have to stay connected. But do the benefits really outweigh the risks? Your smartphone, the Internet, social media accounts and all other facets of your tech-connected life make you vulnerable to hackers and cyberattacks. In this podcast, we speak with world-leading cybercrime experts to examine the frightening risks we unknowingly take every day, and how those risks impact our personal security and privacy.
 
The Solomon Success podcast is dedicated to the timeless wisdom of King Solomon and the Book of Proverbs in order to maximize one’s business and life. To our advantage, we can find King Solomon’s financial strategies in addition to many life philosophies documented in biblical scriptures. Focusing on these enduring fundamentals of success allows us to bypass the “get-rich-quick” schemes that cause many to stumble on their journey toward success. Our concern is not only spiritual in nature, b ...
 
S
Secure Ninja TV
Daily+
 
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
 
B
Beards in Security
Monthly
 
Beards in Security is a bi-weekly podcast featuring Matt Berry and Anthony Mannarino who cover IT security news, security program development, vulnerabilities, research, and related topics of interest for the information security community.
 
V
VAM Talks
Rare
 
Food security analysis, also known as Vulnerability Analysis and Mapping (VAM), is a core function of the World Food Programme's (WFP’s) work. VAM analyses the food security situation and answers some critical questions: WHO is food insecure or vulnerable? HOW MANY are there? WHERE do they live? WHY are they food insecure or vulnerable? HOW is the situation likely to evolve and what are the risks threatening them? WHAT should be done to save their lives and livelihoods?
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work.Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize i ...
 
Loading …
show series
 
Phillip Lanos is a Los Angeles native. Hyperactive and often pensive, this actor, singer, songwriter, and podcast producer is best experienced in person. Due to his half-Mexican, half-French descent, he’s had opportunities to appear on international Latino TV channels like Telemundo for an American Idol spin-off show named “Yo Soy El Artista.” ...…
 
This week we discuss AMD's release of their long-awaited Spectre variant 2 microcode patches, the end of Telegram messenger in Russia, the on-time arrival of Drupalgeddon2, Firefox and TLS v1.3, the new and widespread UPnProxy attacks, Microsoft's reversal on no longer providing Windows security updates without A/V installed, Google Chrome's de ...…
 
This week we discuss AMD's release of their long-awaited Spectre variant 2 microcode patches, the end of Telegram messenger in Russia, the on-time arrival of Drupalgeddon2, Firefox and TLS v1.3, the new and widespread UPnProxy attacks, Microsoft's reversal on no longer providing Windows security updates without A/V installed, Google Chrome's de ...…
 
Support the show, consider donating: BTC: 1CD83r9EzFinDNWwmRW4ssgCbhsM5bxXwg (https://epicenter.tv/tipbtc)BCC: 1M4dvWxjL5N9WniNtatKtxW7RcGV73TQTd (http://epicenter.tv/tipbch)ETH: 0x8cdb49ca5103Ce06717C4daBBFD4857183f50935 (https://epicenter.tv/tipeth)With the advent of mature quantum technologies, many of the critical cryptographic protocols wh ...…
 
If it seems like cybersecurity stories have started to pop up in the news more frequently, you’re not crazy. Although, headlines about cyber breaches, hacks and ransomware are still pushed off the front page by political gossip and other scandals, there is no doubt cybercrime is a topic of growing importance to business, elected officials and t ...…
 
Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet. Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more! Links: Uh Oh! Unified Logs in High Sierra (10.13) Show Plaintext Password ...…
 
On Season 2, Episode 6 of Hyperlink Radio, Karen Beattie is delving into a facet of American democracy that's currently under serious threat: Voting. Is there any validity to the allegation of Russian hacking in the 2016 election? Are our current voting machines actually secure? How do we prepare for the future and ensure that our voting system ...…
 
WHERE TO FIND THE SHOW iTunes | Google Play | Stitcher | SoundCloud | YouTube | TuneIn “It was really disappointing to see someone attacking my credibility. That hurt more than anything. Trying to take away from the hard work I have put into the space. That really got to me” — Desiree Dickerson Twitter and specifically Crypto Twitter is a great ...…
 
Tridib Roy Chowdhury talks about “The Future of ColdFusion (it is Bright)” in this episode of the CF Alive Podcast, with host Michaela Light. Episode highlights The state of CF 22 years old and it continues to do well Over last 8 years it is not dying Annual % growth 6-7%$ New releases every two years 18 quarters beat our sales goals Room for b ...…
 
March 25, 2018 John 19:14-22 Wes Granberg-Michaelson Seven years ago I made my way to the Potter’s House in Washington D.C. to see Gordon Cosby, the founder of Church of the Saviour and my spiritual mentor. Beginning shortly after World War II, this pioneering church community combined a commitment to the disciplined “inward journey” of spiritu ...…
 
Staying secure online can be tough. Here are several Chrome security extensions that you should consider adding. https://www.makeuseof.com/tag/best-chrome-security-extensions/ MakeUseOf’s assessment of security and privacy buying solid security software 4 Things to Consider When Buying a Security Suite 4 Things to Consider When Buying a Securit ...…
 
John 12:1-8 Jesus anointed at Bethany 1 Six days before the Passover, Jesus came to Bethany, where Lazarus lived, whom Jesus had raised from the dead. 2 Here a dinner was given in Jesus’ honour. Martha served, while Lazarus was among those reclining at the table with him. 3 Then Mary took about half a litre of pure nard, an expensive perfume; s ...…
 
The DAO was a system of smart contracts on the Ethereum blockchain that investors put millions of dollars into. Back in May 2016, it was the largest crowdfunding event in history, and we discussed it in detail in a previous episode with Matt Leising. The DAO was hacked due to a security vulnerability, and this event led to a hard fork of Ethere ...…
 
We cut through the noise and explain in clear terms what’s really been discovered. The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that.. Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia ge ...…
 
PC Perspective Podcast #492 - 03/22/18 Join us this week for MyDigitalSSD, CalDigit Tuff Drive, and more! You can subscribe to us through iTunes and you can still access it directly through the RSS page HERE. The URL for the podcast is: http://pcper.com/podcast - Share with your friends! iTunes - Subscribe to the podcast directly through the iT ...…
 
PC Perspective Podcast #492 - 03/22/18 Join us this week for MyDigitalSSD, CalDigit Tuff Drive, and more! You can subscribe to us through iTunes and you can still access it directly through the RSS page HERE. The URL for the podcast is: http://pcper.com/podcast - Share with your friends! iTunes - Subscribe to the podcast directly through the iT ...…
 
Join Sophie Gilbert, a Consulting Director at Russell Investments and Paul Eitelman a Senior Investment Strategist at Russell Investments, as they explore why the economy may be vulnerable to a recession. Disclosure:Interviews were recorded as of the date mentioned in the podcast, these views are subject to change at any time without notice bas ...…
 
On today’s episode, we’ll be talking about how blockchain technology will be impacting the identity verification industry. Online fraud and identity hacks are a serious problem. Identity theft, fraud cost consumers more than $16 billion in 2016. We revisit the Equifax hack and the downsides of the current industry: companies becoming custodians ...…
 
When you are starting a small business, there is plenty to worry about. How do you make your product amazing? How are you going to make sure your potential customers know about what you have to offer? How do you hire the right people? With so much going on, it is easy to see why protecting your data and securing your network can get pushed down ...…
 
E23 - Crypto the WonderDog - 3-15-18 Jim Bursch - D-MSG.com Sponsored by BCHARITY - BCharity.io Dean and Jim talk Dash, Bugs, Bounty, movies, messaging and everything thats going on with D-MSG.com Jim Bursch, Director, DASH Bug Bounty Program Cryptocurrency entrepreneur and cyber security expert, Jim Bursch, has seen the ups and downs of not on ...…
 
FOLLOW UP: GENEVA MOTOR SHOW 2018 Alan has attended the show, so now is able to speak from a position of knowledge, rather than our typical opinionated hillock which we normally throw stones from. He runs through a few cars that caught his eye. SMMT FEBRUARY 2018 NEW CAR REGISTRATION FIGURES Another month, another drop in registration figures. ...…
 
Last week, former Secretary of Homeland Security Jeh Johnson addressed the Boston Conference on Cybersecurity in a speech titled "Cyberspace is the New Battlespace." The next day, Secretary Johnson sat down with Harvard Law professor and Lawfare co-founder Jack Goldsmith to discuss the themes his speech reflected on. They discussed the hacking ...…
 
On this week’s show we’re taking a look at how an acceleration in 24-carat bonkers state-sponsored hacking is leading to calls at senior levels of government for some actual norms to be established. We’ve got Russia hacking the planet with NotPetya, North Korea owning central banks and cryptocurrency exchanges, China owning the CCleaner supply ...…
 
IKEA is making use of its TaskRabbit purchase by launching a furniture assembly service. Will this be a trend as retailers seek to expand their service offerings to compete? Plus CTS-Labs an Israeli security firm has found 13 vulnerabilities in AMD’s Ryzen chips and the ACLU has filed a FOIA (Freedom of Information Act) against the TSA seeking ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://audiobookspace.com/free Title: Braver Than You BelieveSubtitle: Guide to Understand Your Fears, Overcome Your Anxiety And Handle Your ShortcomingsAuthor: Zoe McKeyNarrator: Eva R. MarienchildFormat: UnabridgedLength: 2 hrs and 29 minsLanguage: EnglishRelease date: 01-12-17Publisher ...…
 
In episode 29 of this podcast we heard from Bill Ladd, Chief Data Scientist at Recorded Future, about the differences between the US and Chinese cyber threat vulnerability reporting systems. He pointed out the difference in speed-of-publishing between the two, with the Chinese generally being faster, as well as their conclusion that the Chinese ...…
 
In this episode Armen is joined by Demitrious Baird, Director of Risk at North American Bancard. They explore the types of fraud currently affecting the payments industry. Transcript Armen: Hi, this is Armen Najarian host of Digital Identity 360 and for today’s episode I’m here with Demitrious Baird, who is Director of Risk with North American ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: The Last Layover: The New Homefront, Volume 1Author: Steven C. BirdNarrator: Joshua BangleFormat: UnabridgedLength: 6 hrsLanguage: EnglishRelease date: 06-30-15Publisher: Steven BirdRatings: 4 of 5 out of 374 votesGenres: Mysteries & Thrillers, Suspense ...…
 
Dotmesh gives the capability to capture the stateful parts of your application during development and testing, said CEO and Founder Luke Marsden in this episode of The New Stack Makers. By saving the state, Dot-mesh is positioning itself as a platform to do more tests earlier and decreasing the number of bugs in production.A developer will use ...…
 
In today's podcast, we hear that spies like Apache Struts exploits. Server vulnerabilities described. A new cryptojacker steals at least four varieties of cryptocurrency. North Korea may have hacked UN sanctions enforcers. Dutch Intelligence (and Microsoft) warn of cyberwar, but it's not a declared war, which makes response harder. Update to th ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: This Life I LiveSubtitle: One Man's Extraordinary, Ordinary Life and the Woman Who Changed It ForeverAuthor: Rory FeekNarrator: Rory FeekFormat: UnabridgedLength: 6 hrs and 4 minsLanguage: EnglishRelease date: 02-14-17Publisher: Thomas Nelson Publishers ...…
 
In the news, Quickjack advanced Clickjacking & frame slicing attack tool, how to fight mobile number port-out scams, the Russians hacked the Olympics, top 5 ways security vulnerabilities hide in your IT systems, and GitHub hit by largest DDoS attack ever recorded at 1.35 Tbps! Full Show Notes: https://wiki.securityweekly.com/Episode549 Subscrib ...…
 
Published on 15 Feb 2018. The tensions between President Trump and the intelligence agencies escalated this week. On Tuesday, the nation’s top national-security officials warned the Senate Intelligence Committee that the current security-clearance program at the White House is broken, and that the country is dangerously vulnerable to ongoing cy ...…
 
Published on 15 Feb 2018. The tensions between President Trump and the intelligence agencies escalated this week. On Tuesday, the nation’s top national-security officials warned the Senate Intelligence Committee that the current security-clearance program at the White House is broken, and that the country is dangerously vulnerable to ongoing cy ...…
 
News AriseBank ICO Fraud Case May Ensnare Additional Parties SEC Sends Wave of Subpoenas to ICOs, Including Overstock’s tZERO Overstock Defends tZERO ICO: SEC Subpoenaed ‘Everyone Else’ *Update- They voluntarily cooperated with the SEC Bitcoin Wallet and Jaxx Blockchain Wallet Contain Major Security Flaws $1 Trillion Investment Management Compa ...…
 
Google login Twitter login Classic login