Best Security podcasts — Latest news, interviews and information (Updated February 2018; image)
Related podcasts: Software Development Hacking Tech Featured FM Technology Malware Infosec Emcryption Cyber Crime Spyware Steve Gibson Leo Laporte Twit Information Cyber Business News Pci Cybersecurity Compliance  
public [subscription 711]
show episodes
 
S
Security Now (MP3)
Weekly
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
R
Risky Business
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
T
Troy Hunt's Weekly Update Podcast
 
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
 
P
Paul's Security Weekly
Weekly+
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Daily update on current cyber security threats
 
T
The CyberWire - Your cyber security news connection.
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
D
Down the Security Rabbithole
Weekly
 
Security. Some assembly required. Security is HARD, and 'real security' is a compromise between usability and security while knowing you're still accepting risk. This podcast alternates between interesting interviews and news analysis every other week - tune in, subscribe and join the conversation on REAL security issues relevant to your enterprise. Follow us on Twitter: @DtSR_Podcast Check out Rafal's SecurityWeek column: http://www.securityweek.com/authors/rafal-los
 
C
Crypto-Gram Security Podcast
Monthly
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
T
The Southern Fried Security Podcast
 
Join Andy Willingham, Martin Fisher,Steve Ragan, Yvette Johnson, and Joseph Sokoly as they discuss information security, news, and interview interesting people. Get in the discussion at www.southernfriedsecurity.com.
 
O
Off The Hook (high-bitrate)
Weekly
 
Off The Hook is a weekly show on WBAI radio, New York, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
T
The CyberJungle
Monthly
 
The CyberJungle is the nation's first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fast-paced and includes hard hitting news analysis. Formerly The Data Security Podcast.
 
L
Liquidmatrix Security Digest Podcast
 
The Liquidmatrix Security Digest Podcast. Learn more at http://www.liquidmatrix.org/blog/podcast
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
I
Info Risk Today Podcast
Daily
 
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
 
S
Security Insider - Podcast Edition
 
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
 
S
Sophos Podcasts
Monthly+
 
Podcast by SophosLabs
 
T
The Complete Privacy & Security Podcast
 
Our weekly rants about the issues that impact your privacy and digital security.
 
I
In-Security
Rare
 
Computer security from the ground up.
 
C
Cisco TAC Security Podcast Series
 
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
 
T
Tenable Network Security Podcast
Monthly+
 
Information about Tenable's unified security monitoring products, including Nessus and Security Center. A review of the latest news and vulnerabilities and interviews with some of the industries finest!
 
C
Cigital » The Silver Bullet Security Podcast with Gary McGraw
 
Building Security In
 
D
Darknet Diaries
Monthly+
 
Darknet Diaries explores true stories from the dark side of the Internet. Stories about hackers, defenders, advanced persistent threats, viruses, bugs, crypto, privacy, breaches, online criminals, and the Internet. A true crime hacker narrative. "Cyber crime is the crime of our generation."
 
P
Paul's Security Weekly (Podcast-Only)
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Note: This is only Paul's Security Weekly, recording once per week and typically 2 hour shows.
 
W
Web Security Warriors
Monthly
 
Each week we explore an aspect of web security.
 
I
InfoSec Weekly Podcast
Weekly
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
7
7 Minute Security
Weekly
 
A podcast where I audibly regurgitate what I'm learning about information security - in 7-minute chunks!
 
S
Security Management Highlights
Monthly
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join Host Holly Gilbert Stowell as she interviews thought leaders and industry professionals, as well as editors from the magazine.
 
S
SecuraBit
Monthly
 
SecuraBit Before It Bytes!
 
L
Locked Down - Security Podcast
Weekly
 
Red Hat's security podcast presented and broadcast by Richard Morrell
 
A
An Information Security Place Podcast
 
Where you can listen to commentary on the state of information security
 
R
ROOT ACCESS
Rare
 
A closer look at the notable stories inside Information Security and why they matter. Brought to you by Cisco.
 
I
IANS Information Security Podcast
Monthly+
 
Infosec news and views featuring interviews with expert faculty from the Institute for Applied Network Security (IANS) hosted each week by IANS Director of Technology Research Chris Gonsalves.
 
E
EurotrashSecurity
Rare
 
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
 
S
Security Nation
Monthly+
 
Rapid7 podcast series discussing all things security. Join us as we discuss information security with thought leaders in the space.
 
P
PVC Security
Monthly+
 
Passion, Vision, Communication (& Execution) in Leadership & Security Podcast, &t.
 
V
Virtualization Security Roundtable
 
The Virtualization Security Round Table Podcast provides an open forum to discuss all things related to Virtualization, Virtual Environment, and Cloud Computing Security. The podcast is hosted by Talkshoe, with the after podcast write-ups and notes are hosted on The Virtualization Practice (http://www.virtualizationpractice.com)This Podcast was created using www.talkshoe.com
 
S
SAHAsays
Monthly+
 
SAHAsays is an Information Security related commentary program that pulls from recent headlines around the web. We offer four distinct voices from the Computer Security community: applied business, a software reverse engineer, a doctoral seeking, practicing academic, and the journeyman getting in the front door in the industry. These "voices" may represent our general perspectives, but we're all friends who meet at the San Antonio Hacker's Association (SAHA) on the 6th of every month at the ...
 
S
Secure Sessions Podcast Sponsored By IPVanish VPN
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals.Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
C
ConnectSafely
Monthly
 
Bringing you the leading voices in the field of Internet safety, privacy, and security.
 
Loading …
show series
 
In today's podcast we hear, OMG, that Mirai is out in a new and improved form. Researchers find buggy smart contracts on Ethereum. A Chase glitch briefly exposed banking customers' information to other banking customers. Hacktivists continue to hit spyware companies. Verizon's Mobile Index warns that mobile security is being traded for business ...…
 
What are the top security lessons that covered entities and business associates should learn from the latest HIPAA settlements? Illiana Peters, a former top HIPAA enforcer, shares her insights.
 
T
The Complete Privacy & Security Podcast
 
This week we continue our transition to 100% Linux by discussing considerations for choosing the most appropriate operating system.
 
Leading the latest edition of the ISMG Security Report: The Department of Justice indicts Russians for allegedly running an industrialized troll factory designed to influence U.S. politics. Also, a feature in Australia's new real-time payment system could be abused by identity thieves.
 
T
Troy Hunt's Weekly Update Podcast
 
Angry HTTPS People, The Futility of EV Certs, Pwned Passwords V2, Tech Fabric Sponsoring https://www.troyhunt.com/weekly-update-75/
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Another Intel Spectre Update https://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/ npm Patch kills BSD Systems http://blog.npmjs.org/post/171169301000/v571 https://github.com/npm/npm/issues/19883 Counterfeit Code Signing Certificates on the Rise https://www.recordedfuture.com/code-signing-certificates/…
 
In today's podcast, we hear that counterfeit certificates are on sale in criminal souks. Cybercrime is said to cost $600 billion globally every year. Russia objects to being called a bad actor in cyberspace. North Korea's Reaper threat actor steps out from the shadow of its big brother, the Lazarus Group. Catphish from Lebanon spread spyware th ...…
 
This week, we discuss new reports from Cisco, McAfee and the CSIS, and Big Brother Watch, and hear more about malicious Monero mining.
 
A vital source of information and thought-provoking insights into potential issues within critical information infrastructure (CII).
 
As banking institutions of all sizes maximize their digital channels, there is growing tension between the need to prevent fraud and the desire to maintain a frictionless customer experience. IBM Trusteer's Valerie Bradford discusses how to defuse this tension.
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Password Spraying for Active Directory Credentials https://isc.sans.edu/forums/diary/Should+We+Call+it+Quits+for+Passwords+Or+Password+Spraying+for+the+Win/23361/ Critical Cisco Vulnerabilities https://tools.cisco.com/security/center/publicationListing.x Windows Privilege Escalation Flaw https://bugs.chromium.org/p/project-zero/issues/detail?id ...…
 
O
Off The Hook (high-bitrate)
 
By oth@2600.com (Emmanuel Goldstein et.al.).
 
This edition of Soap Box is brought to you by Bugcrowd. So the next 40 minutes or so is a conversation between Bugcrowd CTO and founder Casey Ellis and I. As most of you would know, Bugcrowd runs outsourced bug bounty programs for a wide variety of organisations, from Silicon Valley megabrands to financial services to development-heavy SMEs, Bu ...…
 
Flight simulators packed with password-grabbing malware, Facebook fighting Russian trolls, and how vulnerability researchers fear being sued. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special gues ...…
 
In today's podcast, we hear that SWIFT phishbait is hitting inboxes. North Korean hackers show fresh sophistication and new ambitions. Fancy Bear seems to be snuffling east. Monero miners in Word, and why cryptojacking for Bitcoin is harder than it is for other currencies. The Coldroot RAT hides in plain sight. The US Departments of Justice and ...…
 
How can organizations decide what security technologies best meet their needs? CISO Mark Eggleston shares his tips for making the right purchase decisions.
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Statically Unpacking a Brazilian Banker Malware Sample https://isc.sans.edu/forums/diary/Statically+Unpacking+a+Brazilian+Banker+Malware/23359/ More Crypto Miners https://blog.redlock.io/cryptojacking-tesla Difficulties Detecting Coldroot RAT Affecting MacOS/OSX Systems https://objective-see.com/blog/blog_0x2A.html uTorrent Remote Code Executio ...…
 
This week we examine and discuss the appearance of new forms of Meltdown and Spectre attacks, the legal response against Intel, the adoption of new cybersecurity responsibility in New York, some more on Salon and authorized crypto mining, more on software cheating auto emissions, a newly revealed instance of highly profitable mal-mining, checki ...…
 
In today's podcast we hear that SWIFT fraud has hit an Indian lender. North Korean hacking continues, even during the DPRK's Winter Olympics charm offensive. US indicts Russian influence operators—the Internet Research Agency is the leading defendant. Russian trolling continues, exploiting the Florida school shooting. (And the alleged shooter a ...…
 
This week, Michael and Paul interview Joe Kay, Founder & CEO of Enswarm! In the Tracking Security Information segment, IdentityMind Global rasied $10M, DataVisor raised $40M, & Infocyte raised $5.2M! Last but not least, our second feature interview with Sean D'Souza, author of The Brain Audit! All that and more, on this episode of Business Secu ...…
 
D
Down the Security Rabbithole
 
This week on the Down the Security Rabbithole Podcast, Raf and James welcome long-time friend of Rafal's - Scott Stanton - to the microphone. Scott's able to join Raf in person in Atlanta, while James is predictably on the other end of a Howdy Doodie (you'll get this if you listen). This week, we tackle the MSS issue (Managed Security Services ...…
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Apple Releases Fix for Unicode Messaging DoS Flaw in All Operating Systems https://support.apple.com/en-us/HT208534 Flight Simulator Mod Company Uses Password Stealer to "Fight Back" https://www.reddit.com/r/flightsim/comments/7yh4zu/fslabs_a320_installer_seems_to_include_a_chrome/ https://forums.flightsimlabs.com/index.php?/announcement/10-a32 ...…
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
https://www.bleepingcomputer.com/news/security/destructive-malware-wreaks-havoc-at-pyeongchang-2018-winter-olympics/ https://www.cyberscoop.com/atos-olympics-hack-olympic-destroyer-malware-peyongchang/ https://www.bankinfosecurity.com/blogs/attribution-games-dont-rush-to-blame-p-2594 http://www.zdnet.com/article/meltdown-spectre-flaws-weve-foun ...…
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Inspecting Malicious MSI Files https://isc.sans.edu/forums/diary/Malware+Delivered+via+Windows+Installer+Files/23349/ Monero Miner Injected via Jenkins Flaw https://research.checkpoint.com/jenkins-miner-one-biggest-mining-operations-ever-discovered/ Microsoft Edge Arbitrary Code Guard Bypass https://bugs.chromium.org/p/project-zero/issues/detai ...…
 
T
The CyberWire - Your cyber security news connection.
 
The research we’re discussing today is called, “Beware the Hex Men”, and it tracks multiple attack campaigns conducted by a Chinese threat actor. The GuardiCore Labs team identified three attack variants that they named Hex, Hanako and Taylor, targeting SQL servers. The CyberWire's Research Saturday is presented by the Hewlett Foundation Cyber ...…
 
This week, Keith and Paul discuss Data Security and Bug Bounty programs! In the news, Lenovo warns of critical Wifi vulnerability, Russian nuclear scientists arrested for Bitcoin mining plot, remote workers outperforming office workers, and more on this episode of Application Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ASW ...…
 
Cyber intelligence expert Tom Kellermann discusses the significance and impact of the announcement that 13 Russian nationals and three Russian entities were indicted Friday for allegedly meddling in the 2016 presidential election.
 
In today's podcast, we hear more about Olympic Destroyer: its relationship status with known threat actors is "complicated." The US joins the UK in blaming Russia for NotPetya, and seems to be considering sanctions. The US Congress considers election security, and considers a state-level option: let governors call in the National Guard. New Yor ...…
 
S
Security Insider - Podcast Edition
 
PCI DSS requiress two factor authentication (also known as multifactor authentication) - something you know and something you have. For IBM i users, this usually means a password and an authentication code provided to a token or mobile device. However, tokens are expensive and are frequently lost - and SMS messages to mobile devices have become ...…
 
With advances in big data, artificial intelligence, machine learning and more, healthcare is primed to innovate. But do HIPAA, GDPR and other regulatory standards inhibit the ability to innovate? Scott Whyte of ClearDATA discusses healthcare's complex convergence of innovation and compliance.
 
T
The Complete Privacy & Security Podcast
 
This week, we discuss the woman holding out from her $560 Million lottery winning due to privacy concerns, and offer our advice.
 
Leading the latest edition of the ISMG Security Report: U.S. intelligence chiefs warn Congress that Russia's information operations continue, while Europol says criminals love cryptocurrencies, both for stealing via scams as well as to launder "dirty money."
 
P
Paul's Security Weekly (Podcast-Only)
 
This week, Steve Tcherchian, CISO and Director of Product Management of XYPRO Technology joins us for an interview! In our second feature interview, Paul speaks with Michael Bazzell, OSINT & Privacy Consultant! In the news, we have updates from Google, Bitcoin, NSA, Microsoft, and more on this episode of Paul's Security Weekly! Full Show Notes: ...…
 
This week, Steve Tcherchian, CISO and Director of Product Management of XYPRO Technology joins us for an interview! In our second feature interview, Paul speaks with Michael Bazzell, OSINT & Privacy Consultant! In the news, we have updates from Google, Bitcoin, NSA, Microsoft, and more on this episode of Paul's Security Weekly! Full Show Notes: ...…
 
This week, we discuss the use of cryptocurrency mining software on numerous government websites, a phishing scam that robbed Bee Token investors of $1 million and cyber attacks on the Pyeongchang Winter Olympics
 
T
Troy Hunt's Weekly Update Podcast
 
JavaScript Supply Chain, The "Dark Web", Pwned Passwords (and Poop), Netsparker Sponsoring https://www.troyhunt.com/weekly-update-74/
 
When faced with a ransomware attacks, why do some healthcare entities choose to pay extortionists a ransom to decrypt data? Security expert Ron Pelletier offers insights.
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Skype Update Vulnerability Fixed in October https://answers.microsoft.com/en-us/skype/forum/skype_newsms/update-on-installer-for-skype-for-windows-desktop/242f1415-1399-42e1-a6a2-cd535c8b7ff8?tm=1518635969608&auth=1 iOS Indian Character DoS http://www.openradar.me/37458268 Executing Code in Word Without Macros https://www.trustwave.com/Resource ...…
 
In today's podcast we hear that Olympic Destroyer may have started with a supply-chain compromise back in December. The British Foreign Office blames Russia for NotPetya pseudoransomware, and the Russian Foreign Ministry says they didn't do anything. Trend Micro researchers find a new Monero cryptomining campaign underway. Coinherder phishes in ...…
 
V
Virtualization Security Roundtable
 
By info@talkshoe.com.
 
Cryptomining goes nuclear, YouTube for Kids gets scary, and TV ads have been given the green light to mess with your Amazon Alexa. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Maria Var ...…
 
This week, Paul and John are accompanied by Guy Franco, Security Consultant for Javelin Networks, who will deliver a Technical Segment on Domain Persistence! In the news, we have updates from ServerSide, Palo Alto, NopSec, Microsoft, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Epis ...…
 
D
Darknet Diaries
 
In 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerable in the book. And the data that came out of it was amazing.
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Meltdown Prime and SpectrePrime: More CPU Exploits Coming https://arxiv.org/abs/1802.03802 Winter Olympics Attack Launched via IT Provider https://www.cyberscoop.com/atos-olympics-hack-olympic-destroyer-malware-peyongchang/ OpenSSL Releases TLS 1.3 Alpha as Part of OpenSSL 1.1.1 pre release 1 https://www.openssl.org/news/openssl-1.1.1-notes.htm ...…
 
Last week I talked about how business has been going with the LLC. Today I answer some additional questions that I didn't have time to address: How I'm finding leads/projects to work on (TLDR: I'm NOT sending 1TB of PDFs to people, spamming them, calling them endlessly or LinkedIn'ing everybody and their mom) The interesting conversations I'm h ...…
 
O
Off The Hook (high-bitrate)
 
By oth@2600.com (Emmanuel Goldstein et.al.).
 
On this week’s show we’re going to chat with Katie Moussouris about her testimony before a Senate Subcommittee last week. She fronted a session on Consumer Protection, Product Safety, Insurance, and Data Security titled, “Data Security and Bug Bounty Programs: Lessons Learned from the Uber Breach and Security Researchers. We’ll hear from her on ...…
 
As internet of things devices become increasingly common in the enterprise, CISOs must lead the way in making sure emerging security issues, including a higher risk of distributed denial-of-service attacks, are adequately addressed, says John Pescatore of the SANS Institute, which offers training for CISOs and others.…
 
In today's podcast, we hear that Olympic Destroyer exploits EternalRomance and morphs as it moves from machine to machine. Other Olympic hacks are out there, too. The US Intelligence Community tells Congress to expect a more assertive Iran, Russia, and North Korea in cyberspace. They also forecast more election influence operations. General Nak ...…
 
A vital source of useful information and thought-provoking insights into potential issues within critical information infrastructure (CII).
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login