Computer Security public
[search 0]
×
Best Computer Security podcasts we could find (updated June 2020)
Best Computer Security podcasts we could find
Updated June 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019." Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon has over 19 years of experience in government and corporate cybersecurity providing you expertise that you will find value from the very first weekly podcast. Shon will provide you detailed CISSP training along with sample CISSP exam questions while utilizing colorful commentary to enhance the over ...
 
Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies. Guests share what they are currently working on, how they got to where they are today, who they are trying to help, and what keeps them motivated to overcome challenges along the way. The goal is for the rest of us to learn from their experiences and go on to promote usable security and privacy within our own pro ...
 
Ever wonder how technology has transformed your life? In this entertaining and informative podcast, Kim Komando provides insight on the ever-changing tech issues and topics that are relevant to you. This free podcast featuring interviews that Kim conducts with experts in their field. You'll gain an in-depth understanding of a wide variety of topics such as the Dark Web, the life of digital nomads, staying focused on the road, what it takes to keep the lights on and so much more. Subscribe be ...
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
 
The Exascale Computing Project (ECP) is accelerating delivery of a capable exascale computing ecosystem to provide breakthrough solutions that will address America's most critical challenges in scientific discovery, energy assurance, economic competitiveness, and national security. Let’s Talk Exascale explores Application Development, Software Technology, and Hardware and Integration—focus areas of the ECP.
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Meher Roy, Sunny Aggarwal, and Friederike Ernst. Since 2014, episodes have been downloaded over 4 million times.
 
Hey guys, welcome to NetworkChuck!! I love IT, Networks, VoIP, Security, Python..........IT's AWESOME!!! But my passion is helping people get started on this incredible career path. I make videos that help you get started in IT and keep you motivated along the way as you pursue GREATNESS. *****Want to help me create more videos? Hit me up on Patreon: https://patreon.com/networkchuck
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Hosted on the www.embedded-computing.com website as well as iTunes, Google Play, Spotify, Stitcher, and Alexa, the Embedded Insiders Podcast is a fun talk show for electronics engineers. Each week, Rich Nass, Brandon Lewis, Alix Paultre, and Laura Dolan of Embedded Computing Design tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, and other technology marketplaces in a light and accessible format.
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to Linux and Open Source, as well as digital privacy, cybersecurity, digital identity, and other current issues.
 
Loading …
show series
 
Both Segments: Scott Schober, Cyber Security Expert, Author Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a forty-six-year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. Schober also invented BVS’s cell phone detection tools, used to …
 
This week, we talk Enterprise News, to talk about how SureCloud Launches Cyber Resilience Assessment Solution, Blackpoint Cyber launches 365 Defense - a Microsoft 365 security add-on for its MDR service, Endace and Palo Alto Networks Cortex XSOAR enable accelerated forensics of cyberthreats, Zscaler acquires Edgewise Networks, WatchGuard Technologi…
 
The Soap Box podcasts we run here at Risky.Biz are wholly sponsored affairs – everyone you hear in a soap box podcast, paid to be here. The idea is vendors get to come on to the show and chat about their products, what their stuff does, the thinking behind it, so on and so on. Today we’re hearing from Justin McCarthy of StrongDM. StrongDM is a bit …
 
Police are hoping to stop kids becoming cybercriminals by bombarding them with Google Ads, phishers rub their hands in glee at the NHS track and trace service, and just how does a nano-layer of quantum holographic catalyzer technology make a USB stick cost hundreds of pounds? All this and much much more is discussed in the latest edition of the "Sm…
 
Protest groups sustain DDoS attacks, too. Old school denial-of-service afflicts police radio networks in Chicago: they’re being jammed with talk, music, and other noise. Influencers and wannabes continue to use unrest as an occasion for on-line branding. The Sodinokibi gang is selling data stolen in ransomware attacks, and Maze seems to be establis…
 
Dave and I kick off this week’s edition of the Kaspersky Transatlantic Cable podcast, we discuss disinformation in the US in the wake of current events. With the focus on the news in the States, we highlight the need for those educating themselves to make sure that they are reading solid information from reputable sources. There is a lot of misinfo…
 
On this week’s show Patrick and Adam discuss the week’s security news, including: NSA warns of Sandworm Exim exploitation Huawei CFO extradition process to continue Google TAG implicates Indian hacker-for-hire outfits in espionage Black lives matter F–k police brutality This week’s sponsor interview is with Marco Slaviero of Thinkst Canary. He’ll b…
 
Jeff loves PCI DSS. Josh has been a fierce critic of it... and... Josh has been working with public policy... We'll dig into the nuances and offer better ways to tell good from bad policy incentives. Show Notes: https://wiki.securityweekly.com/SCWEpisode30 Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: h…
 
This week, SpaceX docks, Anonymous returns, Apple pays, Zephyr blows, and Mobile Phishing is Expensive! Show Notes: https://wiki.securityweekly.com/SWNEpisode39 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly…
 
Unrest accompanied by misinformation, disinformation, and Anonymous theater. Booter hacktivism. Extremist inauthenticity. The Cyberspace Solarium Commission releases its white paper on the pandemic’s lessons for cybersecurity. Joe Carrigan unpacks Casio executing a DMCA takedown on a hardware hack. Our guest is Herb Stapleton from the FBI on the 20…
 
On today’s show, host Christopher Gorog sits down with Tim Weil, IT professional and Chair of Denver IEEE Communication Society. They discuss IOT security, Blockchain technology, and unique applications of enterprise security. Listen and join in the conversation! Visit our sponsors: Cyber Resilience Institute BlockFrame Inc. SecureSet Academy Murra…
 
We've heard it over and over again, Covid-19 has plunged us into a crisis like none other we’ve experienced in our lifetime. Although it is primarily a public health issue, it is also having a major impact on the global economy and financial system. Many businesses have been forced to shut down sparking debates on whether this is supply or demand s…
 
With the proliferation of cloud in enterprise environments, identity today is very different than how it used to be. Threatpost host Cody Hackett talks to Brian Johnson, CEO and co-founder of DivvyCloud, about how identity access management (IAM) is rapidly changing - and how businesses can keep up.By Mike Mimoso, Chris Brook
 
In this episode of Komando On Demand, Kim answers listener questions and talks to a few special guests. She gives advice on the best smart plugs, voice recognition software for writing a book, recording webinars automatically and more. Plus, Kim chats with a reporter who took the COVID-19 contact tracer training to see exactly how it works and a st…
 
This week, we welcome Jen Ellis, Vice President of Community & Public Affairs at Rapid7, to talk about How to Truly Disrupt Cybercrime! In the Leadership and Communications section, CISO vs. CEO: How executives rate their security posture, 3 Reasons Why Cybersecurity Is Not A Technical Problem, How to Be a Great Listener in Remote Meetings and more…
 
This week, we speak with John Chirhart, Customer Experience Engineer at Google Cloud, to discuss How to Prevent Account Takeover Attacks! In our second segment, we welcome Catherine Chambers, Senior Product Manager at Irdeto, to talk about why Apps Are the New Endpoint! Show Notes: https://wiki.securityweekly.com/ASWEpisode109 To learn more about I…
 
Hacking, and more claims of hacking, surround the unrest in Minnesota. Data breach at Amtrak Guest Rewards. More companies found port scanning. Four cybersecurity lessons from the pandemic. David Dufour from Webroot with an overview of online scams his team is tracking during COVID-19, Our own Rick Howard compares resiliency with business continuit…
 
The COVID-19 era has exposed several weaknesses in American infrastructure and exacerbated the gulf between the haves and the have-nots. Perhaps nowhere is this more evident than the digital divide: access to high speed internet. While much of the country was able to work and learn from home, for too many communities this was simply not an option d…
 
Loading …
Google login Twitter login Classic login