Best Security podcasts — Latest news, interviews and information (Updated September 2018; image)
Related podcasts: Software Development Hacking Tech Technology Malware Information Featured FM Emcryption Cyber Crime Spyware Steve Gibson Leo Laporte Infosec Cyber Twit Cybersecurity Business News Pci Compliance  
public [subscription 711]
show episodes
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Risky Business
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
This is the audio podcast version of Troy Hunt's weekly update video published here:
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
The CyberWire
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
Security. Some assembly required. Security is HARD, and 'real security' is a compromise between usability and security while knowing you're still accepting risk. This podcast alternates between interesting interviews and news analysis every other week - tune in, subscribe and join the conversation on REAL security issues relevant to your enterprise. Follow us on Twitter: @DtSR_Podcast Check out Rafal's SecurityWeek column:
Darknet Diaries
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
Smashing Security
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat with guests about cybercrime, hacking, and online privacy.Winner: "Best Security Podcast 2018."Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
Join Andy Willingham, Martin Fisher,Steve Ragan, Yvette Johnson, and Joseph Sokoly as they discuss information security, news, and interview interesting people. Get in the discussion at
Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.
Off The Hook is a weekly show on WBAI radio, New York, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
Our weekly rants about the issues that impact your privacy and digital security.
The CyberJungle
The CyberJungle is the nation's first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fast-paced and includes hard hitting news analysis. Formerly The Data Security Podcast.
The Liquidmatrix Security Digest Podcast. Learn more at
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Sophos Podcasts
Podcast by SophosLabs
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
Computer security from the ground up.
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
Information about Tenable's unified security monitoring products, including Nessus and Security Center. A review of the latest news and vulnerabilities and interviews with some of the industries finest!
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Note: This is only Paul's Security Weekly, recording once per week and typically 2 hour shows.
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
Each week we explore an aspect of web security.
7 Minute Security
A podcast where I audibly regurgitate what I'm learning about information security - in 7-minute chunks!
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join Host Holly Gilbert Stowell as she interviews thought leaders and industry professionals, as well as editors from the magazine.
SecuraBit Before It Bytes!
A closer look at the notable stories inside Information Security and why they matter. Brought to you by Cisco.
Infosec news and views featuring interviews with expert faculty from the Institute for Applied Network Security (IANS) hosted each week by IANS Director of Technology Research Chris Gonsalves.
Red Hat's security podcast presented and broadcast by Richard Morrell
Security Nation
Rapid7 podcast series discussing all things security. Join us as we discuss information security with thought leaders in the space.
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
PVC Security
Passion, Vision, Communication (& Execution) in Leadership & Security Podcast, &t.
The Virtualization Security Round Table Podcast provides an open forum to discuss all things related to Virtualization, Virtual Environment, and Cloud Computing Security. The podcast is hosted by Talkshoe, with the after podcast write-ups and notes are hosted on The Virtualization Practice (
SAHAsays is an Information Security related commentary program that pulls from recent headlines around the web. We offer four distinct voices from the Computer Security community: applied business, a software reverse engineer, a doctoral seeking, practicing academic, and the journeyman getting in the front door in the industry. These "voices" may represent our general perspectives, but we're all friends who meet at the San Antonio Hacker's Association (SAHA) on the 6th of every month at the ...
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals.Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
Bringing you the leading voices in the field of Internet safety, privacy, and security.
Loading …
show series
This week, Michael Santarcangelo returns! Michael and Matt Alderman interview Chris Brenton from Active Countermeasures. Then the Tracking Security Innovation segment with special guest Ron Gula from Gula Tech Adventures! Full Show Notes: Visit for all the latest ep ...…
This week, on DtSR Episode 314, the infamous (that's more than famous) John Strand joins us. No, not the male model ...the guy who's been an InfoSec legend since before you could walk. Highlights from this week's show include... We take a stroll down memory lane We discuss the challenges with more complexity in development John takes us through ...…
Analyzing Office Docs Apple Updates Everything but macOS FBot Botnet Related STI Paper: Botnet Reciliency via Private ...…
In today's podcast, we hear about the ransomware that's clogged systems at a UK airport. New variants of ransomware are out and about in the wild. EternalBlue continues to be used to install cryptojackers in vulnerable systems—the campaign is being called WannaMine. EU considers short deadlines and sharp penalties for failure to remove "extremi ...…
A key amendment to Canada's Personal Information Protection and Electronic Documents Act goes into effect on Nov. 1. What are the baseline standards for compliance, and how does this change impact risk transfer and mitigation? Charlie Groves of CrowdStrike shares his views.
Making bigger advances in implementing nationwide health information exchange will require a multipronged effort, including getting patients more involved and using a variety of technical approaches, says Scott Stuewe, the new president and CEO of DirectTrust.
This week, we discuss the continuing fallout from the BA breach, the compromise of 5,000 Npower customers' details, DoJ charges against a North Korean computer programmer, and this month's Microsoft updates
Jacob Williams is the Founder and President of Rendition Infosec. Jake started his information security career doing classified work with the U.S. government and was awarded the National Security Agency (NSA) Exceptional Civilian Service Award, which is given to fewer than 20 people annually. He’s been involved in high-profile public sector cas ...…
Reversing Visual Basic Shortcuts Not So Random User Agent Safari DoS Webroot SecureAnywhere macOS Vulnerability ...…
Part 2 of our interview with Chris Hadnagy Discuss more about his book, best ways to setup your pre-text in an engagement how you might read someone on a poker table a great story about Chris's favorite person “Neil Fallon” from the rock band “Clutch” and we talk about “innocent lives foundation”, something near and dear to Chris' heart. We sta ...…
A team of researchers from Northeastern University and UC Santa Barbara examined over 17,000 Android apps, and revealed a number of alarming privacy risks. Elleen Pan and Christo Wilson were members of the research team, and they join us to share what they found. The research is titled Panoptispy: Characterizing Audio and Video Exfiltration fro ...…
Three stories in one! In this episode we hear about a penetration test from Mubix that he'll never forget, a incident response from Robert M. Lee which completely stunned him, and a social engineering mission from Snow. Podcast recommendation: Moonshot.
.NET Conf; Chrome UI Changes; FreshMenu Breach; CSP Filtering; Public Shaming; Cred Stuffing List; Securing JS Dependencies; Netsparker Sponsoring
In today's podcast we hear that Magecart has achieved another library infestation as Feedify is hit. An evil cursor attack is a variant of a familiar tech support scam. The Ramnit banking Trojan seems to be spiking during the summer, and there are various theories as to why this might be so. More Novichok disinformation is out. Safari url spoof ...…
This week we talk with a group of singles about being private while dating online.
This week, Paul interviews Brian Coulson, Sr. Threat Research Engineer at LogRhythm! Eyal Neemany, Sr. Cyber Security Researcher at Javelin Networks delivers the Technical Segment on Bypassing PAM! In the Security News, Microsoft accidentally let encrypted Windows 10 out into the world, Kernel exploit discovered in macOS Webroot SecureAnywhere ...…
This week, Paul interviews Brian Coulson, Sr. Threat Research Engineer at LogRhythm! Eyal Neemany, Sr. Cyber Security Researcher at Javelin Networks delivers the Technical Segment on Bypassing PAM! In the Security News, Microsoft accidentally let encrypted Windows 10 out into the world, Kernel exploit discovered in macOS Webroot SecureAnywhere ...…
The latest edition of the ISMG Security Report features an analysis of a new Government Accountability Office report on the causes of last year's massive Equifax breach. Also: An update on the role of tokenization in protecting payments.
Malicious MHT Files Improved Coldboot Attack SAP Patches
In today's podcast we hear that an Iranian domestic spyware campaign has been reported: it's most interested in ethnic Kurds. A bogus cryptocurrency wallet site is taken down. F-Secure warns of a widespread firmware problem that could be exploited for cold boot attacks. The BlueBorne Bluetooth bugs are apparently still out there. Tech support s ...…
This week, Paul and Matt Alderman interview Dave Maestas, Co-Founder and Chief Technology Officer at Bandura! In the Enterprise News, Proofpoint automates email security With CLEAR, OneLogin and Netskope partner to expand Cloud Security, Corelight expands network security platform with Virtual Edition, Demisto releases State of SOAR 2018 Report ...…
Today's episode is brought to you by my friends at Netwrix. Their amazing Netwrix Auditor tool gives you visibility into what’s happening both on your local network and cloud-based IT systems and tells you about critical changes, and when and where people have been accessing data. Give it a spin right in your browser here, and then try it in yo ...…
So What is Going on With IPv4 Fragments these Days? Magacart Javascript Injection Attacks Bypassing CSP using Polyglot JPEGs https://por ...…
By (Emmanuel Goldstein
Malicious script is being blamed for the British Airways hack, Trend Micro's apps are booted out of the Mac App Store for snaffling private data, and Paul Manafort's daughter wants Twitter to remove a link. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Clul ...…
In our podcast we hear that a US Executive Order issued today will impose sanctions on foreign actors following a determination that there's been an attempt at election meddling. The Executive Order covers both hacking and propaganda. British Airways may receive a heavy fine under GDPR for its recent breach. The EU passes controversial copyrigh ...…
This week, Keith and Paul interview Zane Lackey, Chief Security Officer and Founder of Signal Sciences! In the news, U.S. government releases Post-mortem on Equifax, Microsoft Windows Zero-Day found in Task Scheduler, British Airways breached via XSS, Windows subsystem Linux for Linux Distros, Bug Bounties and mental health, and more on this ep ...…
Effective "SecOps" involves revamping security processes that are inconsistent and ad hoc to make them targeted and consistent, says Rapid7 CEO Corey Thomas, who describes the roles of automation and orchestration.
This week we discuss Windows 7's additional three years of support life, MicroTik routers back in the news (and not in a good way), Google Chrome 69's new features, the hack of MEGA's cloud storage extension for Chrome, Week 3 of the Windows Task Scheduler 0-day, a new consequence of using '1234' as your password, Tesla makes their white hat ha ...…
Microsoft Patch Tuesday Adobe Patches Safari/Edge URL Bar Spoofing Exploit Search Engine…
[**PLEASE SEE BELOW FOR A CORRECTION**] This edition of the show features Adam Boileau and Patrick Gray discussing the week’s security news: The DPRK indictment and subsequent fall out British Airways gets owned Webauthn hits some roadblocks The latest action from Washington DC Trend Micro has a bad time Tesla pays out for key-fob clone attack ...…
This week, stealing your Tesla, British Airways hack, Equifax long list of mistakes, Windows 7 support, oops I forgot to encrypt your chats, I can see your browser history, Tor browsers, VPNs and Coldfusion? Jason Wood from Paladin Security joins us for expert commentary, so stay tuned for this episode of Hack Naked News! Full Show Notes: https ...…
In today's podcast, we hear that Trend Micro has clarified what was up with allegations it was deploying spyware with its tools—no spyware, but they've changed their products to remove the appearance of impropriety. RiskIQ fingers the Magecart gang as the hoods behind the British Airways data breach. Exploit broker Zerodium discloses a no-longe ...…
Why did CISOs at a half-dozen leading healthcare organizations launch a new council aimed at standardizing vendor security risk management? One of those CISOs, John Houston of UPMC, explains why the group was launched, how it will work and why managing cloud vendor risks is a top priority.
This week, we share a Pre-Recorded interview with Gabriel Gumbs, VP of Product Strategy at STEALTHbits! We talk about moving from detection to prevention, and protecting your data! In Tracking Security Innovation, Imperva acquires app security firm Prevoty, Allstate accelerates expansion into Identity Protection, 100+ startups globally accepted ...…
Friends welcome to yet another edition of the Down the Security Rabbithole Podcast - as we invite perennial favorite, Shawn Tuma onto the show! Shawn has a new office, a new law firm, and is giving us his take on what's new in the world of cyber and law. Listen in! Highlights from this week's episode include... Shawn brings up "The GDPR" and th ...…
"findstr" used to extract malware from LNK files Tor Browser Javascript Vulnerability Trend Micro App Leaks Data / Removed from Appstore ...…
In today's podcast, we hear about foreign information operations surrounding elections in Israel and Sweden. Domestic information operations surround local elections in Russia. Apple purges questionable security apps from its store. Are the Silence cyber criminals security industry veterans? British Airways continues to recover from its data br ...…
Security technology innovations entering the market are getting attached as features to an infrastructure that is fundamentally broken and an enforcement model that cannot operate in real time, says Matthew Moynahan, CEO at Forcepoint.
Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Josh previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, & strategy roles. He co-founded RuggedSoftware and IamTheCavalry to encourage n ...… ...…
Crypto Mining in a Windows Headless Browser MacOS Adware Doctor Stealing Browser History VPN Applications with Privilege Escalation Vulnerabilities https:/ ...…
Christopher Hadnagy Interview: Origin story connoisseur of moonshine Social Engineering: The Science of Human Hacking 2nd Edition Sponsored Link (paperback on Amazon): SEORG book list: Chris’ Podcast: SECTF at Derby (conte ...…
Researchers at Symantec recently published their findings on an active attack group named Leafminer that's targeting government organizations and businesses in the Middle East region. Vikram Thakur is a technical director at Symantec, and he joins us to share what they've found. The research can be found here: ...…
This week, Paul and the crew sit down with Wim Remes, Founder and Principal Consultant at Wire Security! In our Technical Segment, we welcome back Chris Brenton, Chief Operating Officer for Active Countermeasures, in which he explains why Beacon Analysis in an integral part of threat hunting! In the Security News this week, Vulnerabilities foun ...…
This week, Paul and the crew sit down with Wim Remes, Founder and Principal Consultant at Wire Security! In our Technical Segment, we welcome back Chris Brenton, Chief Operating Officer for Active Countermeasures, in which he explains why Beacon Analysis in an integral part of threat hunting! In the Security News this week, Vulnerabilities foun ...…
This week, Paul and John talk BitSight, SentinelOne, Swimlane, Fortinet, and more! After the Enterprise News, we air some pre-recorded interviews from Black Hat and DEF CON with Mimecast CTO Marc French, Director of Solutions of Synopsys Ofer Maor, CEO of ThreatX Bret Settle, and Willy Leichter of Virsec! Full Show Notes: https://wiki.securityw ...…
In today's podcast we hear that Russia says it had nothing to do with the Salisbury nerve agent attacks, but no one really seems to be buying the denial. The US indicts a North Korean hacker in matters pertaining to the Lazarus Group. overshares. British Airways sustains a data breach. The "Silence" gang makes some noise in the underwo ...…
Canada, which has a head start on the adoption of digital payments, has learned some valuable security lessons that could be beneficial to the U.S., says Gord Jamieson of Visa. He'll be a featured speaker at ISMG's Fraud & Breach Prevention Summit: Toronto, to be held Sept. 11-12.
Increasingly, threat hunting is a practice that enterprises want to understand and implement. But it is not always feasible to do so in-house, given the demand for resources and skills. That's where managed threat hunting enters, says CrowdStrike's Jennifer Ayers.
Google login Twitter login Classic login