×
Computer Security public
[search 0]
×
Best Computer Security podcasts we could find (updated February 2020)
Best Computer Security podcasts we could find
Updated February 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world. We talk to social engineering experts, security pros, cognitive scientists, and those practiced in the arts of deception (perhaps even a magician or two). We also hear from people targeted by social engineering attacks and learn from their experiences.
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
If you obsess about the details inside computers then on This Week in Computer Hardware, you'll find out the latest in motherboards, CPUs, GPUs, storage, RAM, power supplies, input devices, and monitors. Hosts Patrick Norton of TekThing and Sebastian Peak of PC Perspective bring you the newest hardware, talk benchmarks, and even dive into the not-yet-released products on the horizon.Records live every Thursday at 3:30pm Eastern / 12:30pm Pacific / 20:30 UTC.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
 
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
 
Ever wonder how technology has transformed your life? In this entertaining and informative podcast, Kim Komando provides insight on the ever-changing tech issues and topics that are relevant to you. This free podcast featuring interviews that Kim conducts with experts in their field. You'll gain an in-depth understanding of a wide variety of topics such as the Dark Web, the life of digital nomads, staying focused on the road, what it takes to keep the lights on and so much more. Subscribe be ...
 
The Exascale Computing Project (ECP) is accelerating delivery of a capable exascale computing ecosystem to provide breakthrough solutions that will address America's most critical challenges in scientific discovery, energy assurance, economic competitiveness, and national security. Let’s Talk Exascale explores Application Development, Software Technology, and Hardware and Integration—focus areas of the ECP.
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Meher Roy, Sunny Aggarwal, and Friederike Ernst. Since 2014, episodes have been downloaded over 4 million times.
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Hosted on the www.embedded-computing.com website as well as iTunes, Google Play, Spotify, Stitcher, and Alexa, the Embedded Insiders Podcast is a fun talk show for electronics engineers. Each week, Rich Nass, Brandon Lewis, Alix Paultre, and Laura Dolan of Embedded Computing Design tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, and other technology marketplaces in a light and accessible format.
 
If you obsess about the details inside computers then on This Week in Computer Hardware, you'll find out the latest in motherboards, CPUs, GPUs, storage, RAM, power supplies, input devices, and monitors. Hosts Patrick Norton of TekThing and Sebastian Peak of PC Perspective bring you the newest hardware, talk benchmarks, and even dive into the not-yet-released products on the horizon.Records live every Thursday at 3:30pm Eastern / 12:30pm Pacific / 20:30 UTC.
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
Loading …
show series
 
Got a smart phone? Did you know its pretty much a computer? You probably take security seriously on your computer, so you should take it seriously there too! Mobile Security! So, tips and links to help you out! Use a PIN, Pattern, or Fingerprint reader. PINS and Patterns (android) are nice because you can change them, let other people know them if …
 
Is Your Mouse A Security Risk??? Intel says Quantum Computing is still far away, Mid-Price GPU Picks, Drop's ALT High-Profile Mechanical Keyboard, 5nm chips are everywhere... all that and much more with Sebastian Peak and Patrick Norton on This Week in Computer Hardware, episode 554! Hosts: Patrick Norton and Sebastian Peak Download or subscribe to…
 
How to Sharpen the Blurriness in Edge Computing IT and end users need to collaborate and agree on policies and procedures for edge security, software updates, asset management and technology deployment.
 
Mr Sathish Ashwin is the Head of Research and Operations at the National Cyber Defence Research Centre of India, a self-governed body controlled by National Cyber Safety and Security Standards and monitored by the High Level Committee chaired by Honorable Justice Dr. S. Mohan, Former Judge, Supreme Court of India. He is also the Director of BRICS (…
 
Rex M. Lee, Cybersecurity & Privacy Advisor Rex M. Lee, Privacy, Cybersecurity, & Intelligence Advisor, My Smart Privacy. He is also an accomplished freelance tech journalist. Mr. Lee has over 35 years of tech and telecom industry experience, which includes enterprise platform and software development. He is currently a cybersecurity and privacy ad…
 
it’s not cheap or easy to get your iPhone repaired – largely because there’s not a lot of real competition in the iPhone repair market. That’s no accident. Owners of modern John Deere tractors have really only one option: John Deere. Why? There’s no good technical reason. There’s really no good legal reason either, but laws like the Digital Millenn…
 
Nedbank Says 1.7 Million Customers Impacted by Breach at Third-Party Provider, 500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users, 5 inch piece of electrical tape can fool Tesla sensors, Israeli soldiers phished by HAMAS posing as interested women, and a simple guide to AI, Deep Learning, and Machine Learning. Visit https://www…
 
In another episode where we play with time once again to bring a discussion about the detections ownership of a SOC. Co-managing can be difficult as we humans tend to be difficult when interacting with one another. Be sure to check out The Diana Initiative Leap Day fundraiser stream, https://www.dianainitiative.org/leap-day-twitch-stream. Support t…
 
Interview with Bogdan 'Bob' Botezatu, Director of Threat Research and Reporting with Bitdefender whilst visiting Australia from Romania. Pre-release discussion about Bitdefender's new Digital Identity Protection (DIP) service. Scheduled for release in April 2020 the DIP scans the internet and dark web for background to give awareness to consumers o…
 
Computer piracy is probably more common than people admit. Especially in the business world. All those companies have tons of money, so no problem, right? Sorry, afraid not. Yarrr! Its illegal! Obviously, yeah. You want to save some money, but it could get you in trouble with the law. Employees (especially disgruntled ex-employees), even customers …
 
Elastic recently released Elastic Security 7.6 - the culmination of months of work by the security team and a monumental leap forward toward delivering a unified threat protection and security analytics solution. At the core of our solution is Elasticsearch, powering a new SIEM detection engine that automates threat detection and comes with 100+ pr…
 
SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards. On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at SafeBreach. The research can be found here: Realtek HD Audio Driver Package - DLL Preloading and Potential …
 
This week, Doug brings you the weekly Wrap Up, talking all things like D-List Celebrities will call you for money, RSA Sold for 2.1B, IBM pulls out of RSA due to fear of COVID-19, Citrix hacks, all this and more including highlights from this past week across all of our shows! Show Notes: https://wiki.securityweekly.com/SWNEpisode14 Visit https://w…
 
In this edition of the embedded insiders, Brandon and Rich share their thoughts on the upcoming embedded world trade show in Nuremberg, Germany – focusing on all of the companies that have pulled out due to concerns over the corona virus. After, the embedded insiders are joined by Steve Hanna, senior principal at Infineon Technologies and chair at …
 
This week, we welcome Mike Nichols, Head of Product at Elastic Security, to talk about how Elastic Security is unifying SIEM and Endpoint Security! In our second segment, we welcome Ian Coldwater, Lead Platform Security Engineer at Heroku, to talk bout Kubernetes and Container Security! In the Security News, Iranian Hackers are targeting Dutch Univ…
 
This week, we welcome Mike Nichols, Head of Product at Elastic Security, to talk about how Elastic Security is unifying SIEM and Endpoint Security! In our second segment, we welcome Ian Coldwater, Lead Platform Security Engineer at Heroku, to talk bout Kubernetes and Container Security! In the Security News, Iranian Hackers are targeting Dutch Univ…
 
The US Defense Information Agency discloses a data breach affecting personal information of up to two-hundred thousand individuals. More international reprobation for the alleged GRU hack of Georgian websites. Trolls move from creation to curation. Stalkerware data exposure. And a look at how the UK might actually implement its compromise position …
 
The RSA 2020 conference kicks off next week in San Francisco, this year with a theme looking at the "human element" of cybersecurity. As they prepare to cover the show, Threatpost editors Lindsey O'Donnell-Welch, Tom Spring and Tara Seals break down the biggest news, stories and trends that they expect to hear about at RSA 2020 this year - from tre…
 
IT Disappoints Business on Data and Analytics Business groups inside organizations express their disappointment with IT in terms of data and analytics in a new survey that looks at priorities and areas at risk for failure.
 
Valerie Thompsons isn't happy just being fast — she wants to be the fastest. Valerie is an eight-time land speed record club holder, dubbed the world's fastest female motorcycle racer. She talks to Kim about the risks she takes and what keeps her motivated. Plus, Kim chats with Chad, an Amazon Flex driver, about the pros and cons of his line of wor…
 
Is Your Mouse A Security Risk??? Intel says Quantum Computing is still far away, Mid-Price GPU Picks, Drop's ALT High-Profile Mechanical Keyboard, 5nm chips are everywhere... all that and much more with Sebastian Peak and Patrick Norton on This Week in Computer Hardware, episode 554! Hosts: Patrick Norton and Sebastian Peak Download or subscribe to…
 
British and American authorities blame Russia’s GRU for last October’s defacement campaign against Georgian websites. Senator Sanders thinks maybe some of his apparent supporters are Russian bots--the ones who are tweeting bad stuff in social media. Julian Assange says he was offered a pardon to say the Russians didn’t meddle with the DNC. Stolen d…
 
On today’s show, host Christopher Gorog has a conversation with Andrew Scully, head of cybersecurity at Shelde. They discuss skill shortage, differences in job culture in the US and Australia, and ensuring that you are delivering what you promise. Listen and join in on the conversation! Visit our sponsors: Cyber Resilience Institute Internet Broadc…
 
This week, Matt is joined by Scott Lyons and Josh Marpet to talk Enterprise News, and how IBM announced RSA Conference withdrawal, Dell Offloads RSA, 12 hottest new cybersecurity startups at RSA 2020, and lots of funding announcements! In the second segment, CEO of Red Lion LLC. Scott Lyons will provide an overview of their CTF at InfoSec World 202…
 
Loading …
Google login Twitter login Classic login