Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
Bestselling author, professor and entrepreneur Scott Galloway combines business insight and analysis with provocative life and career advice. On Mondays, Prof G Markets breaks down what’s moving the capital markets, teaching the basics of financial literacy so you can build economic security. Wednesdays, during Office Hours, Scott answers your questions about business, career, and life. Thursdays, Scott has a conversation with a blue-flame thinker in the innovation economy. And Scott closes ...
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 19:00 UTC.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
…
continue reading
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Welcome to the new home for Adam's rantings and ravings. This is the #1 Daily Downloaded Podcast in the World. GET IT ON as Adam shares his thoughts on current events, relationships, airport security, specialty pizzas, politics, and anything else he can complain about. Five days a week and completely uncensored, Adam welcomes a wide range of guests to join him in studio for in depth interviews and a front row seat to his unparalleled ranting. Let's not forget Bryan Bishop (Bald Bryan) on sou ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
…
continue reading
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 19:00 UTC.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Weekly long-form conversations with fascinating people at the creative edges of national security. Unscripted. Informal. Always fresh. Chatter guests roll with the punches to describe artistic endeavors related to national security and jump into cutting-edge thinking at the frontiers where defense and foreign policy overlap with technology, intelligence, climate change, history, sports, culture, and beyond. Each week, listeners get a no-holds-barred dialogue at an intersection between Lawfar ...
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
This Week in Immigration gives you a rundown of key immigration issues. Experts from the Bipartisan Policy Center discuss and analyze all that is new and noteworthy on immigration policy.
…
continue reading
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
…
continue reading
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Play later
Play later
Lists
Like
Liked
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
…
continue reading
1
CISOs 2023 Planning Guide: Forecast The Recession's Impact On Your Program - Jeff Pollard - BSW Vault
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday, June 28, 2024
25:53
25:53
Play later
Play later
Lists
Like
Liked
25:53
This episode features a discussion on the latest MOVEit vulnerability, a report on recruiting cybersecurity pros and how an API coding error is being blamed for a large cyber breach in AustraliaBy Howard Solomon
…
continue reading
Mitigating Skeleton Key is a new type of generative AI jailbreak techniqueBy Carl Franklin
…
continue reading
1
Week in Review: CDK Blacksuit developments, Criminal nuclear failures. U.S. Kaspersky ban
22:45
22:45
Play later
Play later
Lists
Like
Liked
22:45
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jim Bowie, CISO, Tampa General Hospital Thanks to our show sponsor, Prelude Security When executives ask the question, are we vulnerable to this threat? How long does it take you to get a confident answer? Prelude automatically transform…
…
continue reading
1
The TeamViewer Breach and a Busy Week for APT29
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07
Dennis Fisher and Lindsey O'Donnell-Welch dig into the news of the TeamViewer corporate breach, attributed to APT29/Midnight Blizzard, and news of more victims from the Microsoft intrusion by the same group earlier this year.By Decipher
…
continue reading
1
Shared Responsibility Models, AI in Offensive Security, Apple's Private Cloud Compute - ASW #289
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10
Thoughts on shared responsibility models after the Snowflake credential attacks, looking at AI's current and future role in offensive security, secure by design lessons from Apple's Private Cloud Computer, and more! Show Notes: https://securityweekly.com/asw-289
…
continue reading
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
In this interview, we speak with Mac Munsayac, Head of Customer Experience at Philippine Airlines, to explore the transformative role of AI in the aviation industry. Mac elaborates on the integration of generative AI and tools to enhance customer interactions by providing personalized, proactive, and frictionless experiences, especially in scenario…
…
continue reading
1
TNW 341: What You Might Have Missed At WWDC24 - Alexa, AI Detectors, AI-Powered Security Cameras
1:07:55
1:07:55
Play later
Play later
Lists
Like
Liked
1:07:55
Amazon's Alexa could have been in a prime position to dominate AI. Why AI detection tools for detecting AI written content are hurting writers. What was announced at WWDC earlier this week? And how security cameras getting smarter with AI is a good thing. Jennifer Pattison Tuohy talks about how over a dozen employees who worked on Amazon's Alexa ha…
…
continue reading
By Jerry Bell and Andrew Kalat
…
continue reading
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Play later
Play later
Lists
Like
Liked
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
1
Weekly: TeamViewer Supply Chain Attack, MOVEit Horrors, Medusa Ransomware Case Study
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57
In this episode of ShadowTalk, hosts Chris and Kim, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include: TeamViewer compromise by APT29 in supply chain attack MOVEit in the headlines again, critical severity vulnerability disclosed Popular Content Delivery Network (CDN) providers compromised in…
…
continue reading
1
Lawfare Daily: Anupam Chander, Kyle Langvhardt, and Alan Rozenshtein on the Supreme Court's Decision in Moody v. NetChoice
52:41
52:41
Play later
Play later
Lists
Like
Liked
52:41
Anupam Chander, Scott Ginsburg Professor of Law and Technology at Georgetown Law; Kyle Langvhardt, Assistant Professor at the Nebraska College of Law; and Alan Rozenshtein, Senior Editor at Lawfare and Associate Professor at Minnesota Law, join Kevin Frazier, Assistant Professor at St. Thomas University College of Law and a Tarbell Fellow at Lawfar…
…
continue reading
1
Cyber Security Today, July 3, 3034 - Beware of advanced attack tactics
3:41
3:41
Play later
Play later
Lists
Like
Liked
3:41
This episode reports on some of the new ways threat actors are bypassing phishing defencesBy Howard Solomon
…
continue reading
1
The Defense Industry, Greatness Is in the Agency of Others, and What to Do When Your Partner Makes More Money Than You
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50
Scott speaks about the defense tech industry, specifically why he believes it is a great business. He then discusses how greatness is in the agency of others, particularly in the context of the workplace. He wraps up with advice to a listener about how to act if your partner makes more money than you. Music: https://www.davidcuttermusic.com / @dcut…
…
continue reading
Comedian Jesus Trejo makes his first visit to the show. They open by discussing Jesus’ upbringing in Long Beach, CA, the Latino comedy stars that inspired him as a kid and Adam’s early attempts to get into radio.Next, Mike Dawson joins to read the news including the uproar surrounding OJ Simpson being included in an awards show In Memoriam tribute …
…
continue reading
1
Evolve breach update, Patelco cyberattack, LockBit claims Croatian cyberattack
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29
Evolve Bank data breach is evolving Patelco Credit Union cyberattack disrupts services for nearly 500,000 members LockBit claims cyberattack on Croatia’s largest hospital Huge thanks to our sponsor, Demoed Did you know that Demoed is the first platform that allows you to watch a live product demo and ask questions without receiving a barrage of fol…
…
continue reading
1
Risky Business #755 -- SSH 0day! Polyfill drama! Entrust crushed!
59:19
59:19
Play later
Play later
Lists
Like
Liked
59:19
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news, including: Widely used polyfill javascript gets hijacked by its new owners MacOS supply chain disaster bullet dodged That OpenSSH remote code exec OH MY <3 Entrust gets its CA business kicked to the kerb by Google South Korean telco intentionally viruses 600k custo…
…
continue reading
1
Risky Business #755 -- SSH 0day! Polyfill drama! Entrust crushed!
59:19
59:19
Play later
Play later
Lists
Like
Liked
59:19
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news, including: Widely used polyfill javascript gets hijacked by its new owners MacOS supply chain disaster bullet dodged That OpenSSH remote code exec OH MY <3 Entrust gets its CA business kicked to the kerb by Google South Korean telco intentionally viruses 600k custo…
…
continue reading
1
SN 981: The End of Entrust Trust - Open SSH Vulnerability, SyncThing, Endtrust
2:27:44
2:27:44
Play later
Play later
Lists
Like
Liked
2:27:44
The regreSSHion Bug 50BTC moved Voyager 1 Update Email @ GRC SyncThing DNS queries Recall The End of Entrust Trust Show Notes - https://www.grc.com/sn/SN-981-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can …
…
continue reading
By Emmanuel Goldstein
…
continue reading
1
Chatter: The Librarians Who Saved Books in World War II, with Kathy Peiss
1:12:16
1:12:16
Play later
Play later
Lists
Like
Liked
1:12:16
As the Second World War started, an unsung cadre of US librarians and other information management professionals was making its way to Europe to acquire printed material that could help American analysts understand international threats. As the war went on, the mission of these experts expanded to also include an unprecedented effort to locate, pre…
…
continue reading
https://youtu.be/p_zv9TEIZO0This week on the podcast, we cover OpenSSH's recent critical vulnerability and what it means for systems administrators. Before that, we discuss the CDK Global ransomware attack impacting car dealerships across the us, a Korean internet service provider delivering malware to their customers, and a takeover of a popular J…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
…
continue reading
1
Founder to Founder Fireside Chat with Sara Teare and Adamaka Ajaelo
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53
Surprise! Tune in for our bonus episode, as we host a founder-to-founder fireside chat. 🔥🪵 Join 1Password Founder, Sara Teare, and Self-eSTEM founder, Adamaka Ajaelo as they share their personal experiences as women in STEM careers and the things they've learned along the way. Settle in and learn how you can overcome some of the common challenges w…
…
continue reading
1
Ep. 173: On the Other Side of The Border – Immigration and Mexico’s Incoming President
1:01:41
1:01:41
Play later
Play later
Lists
Like
Liked
1:01:41
In this week’s episode, BPC Senior Advisor Theresa Cardinal Brown delves into the recent Mexican presidential election and its implications for U.S. immigration policy with three distinguished guests. Joining us are Andrew Selee, President of the Migration Policy Institute, José Díaz Briseño, a U.S.-based reporter for the Mexican newspaper REFORMA,…
…
continue reading
1
The Librarians Who Saved Books in World War II, with Kathy Peiss
1:12:16
1:12:16
Play later
Play later
Lists
Like
Liked
1:12:16
As the Second World War started, an unsung cadre of US librarians and other information management professionals was making its way to Europe to acquire printed material that could help American analysts understand international threats. As the war went on, the mission of these experts expanded to also include an unprecedented effort to locate, pre…
…
continue reading
1
Lawfare Daily: Are Former Presidents Immune From Criminal Prosecution? We’re Still Not Sure
1:05:08
1:05:08
Play later
Play later
Lists
Like
Liked
1:05:08
It’s the decision we’ve all been waiting for: on the very last day of the Supreme Court’s 2023 term, the Court handed down its ruling in Trump v. United States, concerning the former president’s potential immunity from prosecution over his efforts to overturn the 2020 election. Rather than resolving the issue clearly, a 6-3 conservative majority fo…
…
continue reading
Actor & podcaster Chris Wylde makes his first appearance on the show and they open by talking about Adam’s busy trip to New York, including his most recent run-in with Gavin Newsom, sharing a panel with Stephen A. Smith and, of course, the trials and tribulations of traveling with Mike August.Next, they discuss the 2024 elections first presidential…
…
continue reading
1
14 million Linux systems threatened, Critical patch for Juniper routers, Millions impacted by Prudential breach
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05
14 million Linux systems threatened by ‘RegreSSHion’ vulnerability Critical patch issued for Juniper routers Millions not thousands impacted by Prudential breach Huge thanks to our sponsor, Demoed “I have extra time in my day” is something no security professional has ever said. Vendors on Demoed host 15-minute pitches highlighting their value and …
…
continue reading
1
All about identity access management with the Identity Jedi | Guest David Lee
1:02:09
1:02:09
Play later
Play later
Lists
Like
Liked
1:02:09
How does a childhood curiosity turn into a groundbreaking career in identity and access management? Join us for an engaging conversation with David Lee, the Identity Jedi, as he recounts his fascinating journey from tinkering with computers as a child to becoming a sought-after expert in IAM. Lee shares the pivotal moments and unexpected opportunit…
…
continue reading
1
CISOs 2023 Planning Guide: Forecast The Recession's Impact On Your Program - Jeff Pollard - BSW Vault
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
…
continue reading
1
Lawfare Daily: The Supreme Court Rules in Fischer v. United States
51:05
51:05
Play later
Play later
Lists
Like
Liked
51:05
On June 28, the Supreme Court released its opinion in Fischer v. U.S., narrowing the interpretation of an obstruction statute, 18 U.S.C. § 1512(c)(2), used by the Department of Justice to charge over 300 Jan. 6 defendants, including former President Trump. Lawfare Editor-in-Chief Benjamin Wittes talked to Lawfare Senior Editors Quinta Jurecic and R…
…
continue reading
1
Cyber Security Today, July 1, 2024 - A critical patch for GitLab
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19
This episode reports on new reports on vulnerabilities and software supply chain securityBy Howard Solomon
…
continue reading
1
Prof G Markets: Rivian and Volkswagen’s New Partnership + Scott’s Tax Strategy
51:52
51:52
Play later
Play later
Lists
Like
Liked
51:52
Scott shares his thoughts on Volkswagen’s investment in Rivian and why he thinks the electrical vehicle industry is entering the “Valley of Death”. Then Scott and Ed discuss JPMorgan’s tax management business and Scott breaks down different tax avoidance strategies he thinks more young people should know about. Follow our new Prof G Markets feed: A…
…
continue reading
Adam welcomes commentator Tyrus back to the show as they discuss a variety of issues, including the commonality of prejudice, the obsession with race in our culture and politics, and how journalists are rigging the game instead of just calling balls and strikes like a credible umpire. Next, Adam is joined by television personality Jon Taffer and th…
…
continue reading
1
TeamViewer breach update, HubSpot customer attacks, Cyber insurance problems
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28
Update on the TeamViewer network breach HubSpot looks into customer account hacks U.S. businesses struggle to obtain cyber insurance Huge thanks to our sponsor, Demoed Demoed is a unique platform that connects buyers and sellers. Buyers want to see more products, and vendors want more leads. Demoed solves this for both by making buyers anonymous. B…
…
continue reading
1
The U.S. Bans Kaspersky Antivirus, WordPress Plugin Supply Chain Attacks
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44
In episode 336 of the Shared Security Podcast, we discuss the Biden administration’s recent ban on Kaspersky antivirus software in the U.S. due to security concerns linked to its Russian origins. We also highlight the importance of keeping all software updated, using recent examples of supply chain attacks that have compromised several popular Word…
…
continue reading
1
7MS #630: Epic Road Trip Served with Security Sprinkles
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27
Today I recap a two week persona/biz road trip and talk about the security stuff that got sprinkled into it, including: Family members who don’t care about their personal security Weakpass – a cool collection of word lists for brute-forcing and spraying that I’d never heard of Working on two security Webinars for Netwrix (here’s part 1: Mastering P…
…
continue reading
1
Lawfare Archive: Tech CEOs Head to the Hill, Again
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33
From April 1, 2021: This week on Arbiters of Truth, the Lawfare Podcast’s miniseries on our online information ecosystem, Evelyn Douek and Quinta Jurecic spoke with Issie Lapowsky, a senior reporter at the tech journalism publication Protocol. They discussed last week’s hearing before the House Energy and Commerce Committee with the CEOs of Faceboo…
…
continue reading