Best Computersecurity podcasts we could find (Updated June 2017)   Computersecurity public [search 0]

No series here

Try another search?

Broken tape
Loading …
 
Another major ransomware outbreak rattles the world - but no-one can decide what it's called, the danger posed to driverless cars by kangaroos, and do you really want an Amazon Echo Show? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, join ...…
 
Guest: @ Jared Smith talks with Dave Rael about passion for what he does, security, extroversion, and building your brand Jared is a Computer Security researcher at the US's largest national laboratory in Oak Ridge, TN, where he works on projects ranging from novel security data analytics tools to malware research. He was previously a software ...…
 
S
Slate's Live at Politics and Prose
 
One of the Middle East’s most prominent women’s right activists, Manal al-Sharif grew up in a modest family in Mecca. Devout in her youth, she didn’t associate with non-Muslims and destroyed her brother’s cassettes of forbidden music. But by her twenties she was working as a computer security engineer for Aramco. Her professional status didn’t ...…
 
Manal al-Sharif grew up in Mecca as a member of a fundamentalist family. And when she went to work as a computer security engineer, her eyes were opened to the sexist policies of her homeland. She joins us to talk about being a feminist in a patriarchy, which she writes about in her memoir, “Daring to Drive: A Saudi Woman’s Awakening” (Simon & ...…
 
Manal al-Sharif grew up in Mecca as a member of a fundamentalist family. And when she went to work as a computer security engineer, her eyes were opened to the sexist policies of her homeland. She joins us to talk about being a feminist in a patriarchy, which she writes about in her memoir, “Daring to Drive: A Saudi Woman’s Awakening” (Simon & ...…
 
Manal al-Sharif grew up in Mecca as a member of a fundamentalist family. And when she went to work as a computer security engineer, her eyes were opened to the sexist policies of her homeland. She joins us to talk about being a feminist in a patriarchy, which she writes about in her memoir, “Daring to Drive: A Saudi Woman’s Awakening” (Simon & ...…
 
In this episode of The Florida Bar Podcast from the 2017 Annual Florida Bar Convention, hosts Christine Bilbrey and Jonathon Israel talk to Lawrence Kunin and Serge Jorgensen about data security breaches and the legal implications of such a breach. They also discuss the ethical obligations of an attorney in regards to data security, as well as ...…
 
From growing up as a devout woman from a modest family in Saudia Arabia to becoming an unexpected leader of a courageous movement to support women’s right to drive, Manal al-Sharif recounts her life’s journey in her ferociously intimate new memoir Daring to Drive: A Saudi Woman’s Awakening. When working in the male-dominated field of computer s ...…
 
This time Walker and Cameron talk about whether it’s OK to talk about their personal lives. Recorded on April 12th, 2017 Email us at andstuffpodcast@gmail.com Tweet at us at @andstuffpodcast Cameron likes to use steno as a sekrit code. Walker likes to use Volapuk as a sekrit code. NOLA Maker Faire NIST Turns out, Maryland is 12,407 mi^2, and Rh ...…
 
[caption id="attachment_264730" align="alignright" width="153"] Source: Wikimedia Commons[/caption] Today host Mitch Jeserich interviews Manal Al-Sharif, a Saudi computer security engineer, about her memoir "Daring to Drive: A Saudi Woman's Awakening." Al-Sharif was a religious radical in her teens but eventually became one of the women to lead ...…
 
Ethical Hacker and security expert Bob Weiss rejoins the program to discuss the latest with the congressional hearings around the Russian probe. We also discuss the obstruction of justice charges that may be thrown at Trump. Bob Weiss Biography Bob Weiss is a computer, network, and cybersecurity guru to business owners. He is a Senior Cybersecu ...…
 
M
Microsoft Research - Channel 9
 
In the future, every company will be using AI, which means that every company will need a secure infrastructure that addresses AI security concerns. At the same time, the domain of computer security has been revolutionized by AI techniques, including machine learning, planning, and automatic reasoning. What are the opportunities for researchers ...…
 
Microsoft gives us a Patch Tuesday shock, malware grows up for the Mac, and your mouse movements might reveal if you're an identity thief. All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest Javvad Malik of Ali ...…
 
Veteran entrepreneur Christian Cotichini is the Co-founder and CEO of HeroX. This revolutionary organization empowers anyone to crowdsource the solutions to their most urgent challenges and incentivizes innovators from around the world to compete to solve them. Through this platform, NASA has already challenged coders to speed up its supercompu ...…
 
We watch Roswell season 1, episode 8: “Blood Brother” Discussion questions: Why not let Alex in on the secret? Should Isabel dreamwalk Topolsky? Could/Would Topolsky really protect Max? Did Alex have a crush on Liz? Did Liz intend to keep her promise? Is Topolsky bad at FBI computer security? Why does Topolsky need a confession? Episode MVP: Co ...…
 
Graham Cluley is an award-winning security blogger, researcher and public speaker. In this interview, we discuss ransomware, stealing content, the motivations of attackers, IoT, and more! Graham has been a well-known figure in the computer security industry since the early 1990s when he worked as a programmer, writing the first ever version of ...…
 
Australian governments and businesses have finally woken up to the scale of the cyber threats we face. But in the race to snap up computer security experts, we may have started too late.
 
Australian governments and businesses have finally woken up to the scale of the cyber threats we face. But in the race to snap up computer security experts, we may have started too late.
 
Australian governments and businesses have finally woken up to the scale of the cyber threats we face. But in the race to snap up computer security experts, we may have started too late.
 
Australian governments and businesses have finally woken up to the scale of the cyber threats we face. But in the race to snap up computer security experts, we may have started too late.
 
D
Delete Your Account
 
If you want to support the show and receive access to tons of bonus content, subscribe on our Patreon page for as little as $5 a month. Also, don't forget to subscribe, rate, and review the show on iTunes. We can't do this show without your support!!! On this episode, Kumars is joined once again by Eric Holthaus, a meteorologist who writes abou ...…
 
Evidence of Russia hacking the US election leaks from the NSA and Reality is not a winner, confidential data is accidentally exposed in the cloud by a defence contractor, and Gordon Ramsay has a few choice words for his hacking father-in-law. All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer sec ...…
 
A
AMERICA OUT LOUD PODCAST NETWORK
 
Do you have a “smart” TV? Or an Internet-connected baby monitor? Then you are a part of the Internet of Things (IoT)! Welcome to the world of everyday devices being connected to the network, allowing you to change the temperature of your home while traveling, check up on your dogs from work, and have a Bluetooth speaker that can also fetch tomo ...…
 
F
FIREWALLS DON'T STOP DRAGONS
 
Do you have a “smart” TV? Or an Internet-connected baby monitor? Then you are a part of the Internet of Things (IoT)! Welcome to the world of everyday devices being connected to the network, allowing you to change the temperature of your home while traveling, check up on your dogs from work, and have a Bluetooth speaker that can also fetch tomo ...…
 
A
AMERICA OUT LOUD PODCAST NETWORK
 
Do you have a “smart” TV? Or an Internet-connected baby monitor? Then you are a part of the Internet of Things (IoT)! Welcome to the world of everyday devices being connected to the network, allowing you to change the temperature of your home while traveling, check up on your dogs from work, and have a Bluetooth speaker that can also fetch tomo ...…
 
T
The Checklist by SecureMac
 
Everybody TALKS about computer security. Wanna DO something about it? On this week's edition of The Checklist - ways to learn computer security. Be sure to check our show notes: SecureMac.com/Checklist And send us an email: Checklist@SecureMac.com
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
Hackers are blackmailing cosmetic surgery patients, and threatening to release their naked photos. A British Airways IT snafu causes travel chaos for thousands. And Germany is threatening to throw hefty fines at Facebook if it can't police its content properly. All this and "Covfefe" is discussed in the latest edition of the "Smashing Security" ...…
 
S
Smashing Security
 
Hackers are blackmailing cosmetic surgery patients, and threatening to release their naked photos. A British Airways IT snafu causes travel chaos for thousands. And Germany is threatening to throw hefty fines at Facebook if it can't police its content properly. All this and "Covfefe" is discussed in the latest edition of the "Smashing Security" ...…
 
S
Smashing Security
 
Hackers are blackmailing cosmetic surgery patients, and threatening to release their naked photos. A British Airways IT snafu causes travel chaos for thousands. And Germany is threatening to throw hefty fines at Facebook if it can't police its content properly. All this and "Covfefe" is discussed in the latest edition of the "Smashing Security" ...…
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
The Samsung Galaxy S8 claims that its iris recognition technology provides "airtight security", but the Chaos Computer Club knows better and shows how it can be easily bypassed. Australian researchers create a wearable gizmo that authenticates you through your walk, but is it ever going to be practical? Mac malware reportedly wastes no time ste ...…
 
The Samsung Galaxy S8 claims that its iris recognition technology provides "airtight security", but the Chaos Computer Club knows better and shows how it can be easily bypassed. Australian researchers create a wearable gizmo that authenticates you through your walk, but is it ever going to be practical? Mac malware reportedly wastes no time ste ...…
 
The Samsung Galaxy S8 claims that its iris recognition technology provides "airtight security", but the Chaos Computer Club knows better and shows how it can be easily bypassed. Australian researchers create a wearable gizmo that authenticates you through your walk, but is it ever going to be practical? Mac malware reportedly wastes no time ste ...…
 
Colin Bartol has led a team that built 46% of the servers for Tricare West which covers 2.6 million people for the military which required security for NIST, PCI, and HIPPA. He has his MBA from Carlson school of management, CISSP, and is a SME for the CompTIA Project+ exam. Having been a consultant at 5 Fortune 100 companies in e-commerce, fina ...…
 
Carsten Schürmann is the leader of the Demtech research center, which studies the interplay between technology and democracy. Carsten is a world leading expert in computer security and critical digital infrastructure, with a background in the theory of programming languages and logics. We talk to him about digital democracy, in particular elect ...…
 
Carsten Schürmann is the leader of the Demtech research center, which studies the interplay between technology and democracy. Carsten is a world leading expert in computer security and critical digital infrastructure, with a background in the theory of programming languages and logics. We talk to him about digital democracy, in particular elect ...…
 
Carsten Schürmann is the leader of the Demtech research center, which studies the interplay between technology and democracy. Carsten is a world leading expert in computer security and critical digital infrastructure, with a background in the theory of programming languages and logics. We talk to him about digital democracy, in particular elect ...…
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
The WannaCry ransomware has struck! But before we tackle that subject, and who we should blame for one of the highest profile malware attacks for years, we discuss how HP has been unwittingly capturing the keystrokes of its laptop users. Then we briefly discuss what might be the worst cinema date in history, before rounding things off with a di ...…
 
The WannaCry ransomware has struck! But before we tackle that subject, and who we should blame for one of the highest profile malware attacks for years, we discuss how HP has been unwittingly capturing the keystrokes of its laptop users. Then we briefly discuss what might be the worst cinema date in history, before rounding things off with a di ...…
 
The WannaCry ransomware has struck! But before we tackle that subject, and who we should blame for one of the highest profile malware attacks for years, we discuss how HP has been unwittingly capturing the keystrokes of its laptop users. Then we briefly discuss what might be the worst cinema date in history, before rounding things off with a di ...…
 
Yet another incredibly large-scale cyber attack is currently underway, this time – no one may even know if they have been hacked.According to AFP, hackers are leveraging the same vulnerabilities the WannaCry ransomware worm exploited but, rather than freeze files, uses the hundreds of thousands of computers believed to have been infected to min ...…
 
A
AMERICA OUT LOUD PODCAST NETWORK
 
The WannaCry ransomware worm spread across the planet is a matter of hours, infecting over 200,000 computers in just a matter of hours - this included hospitals in the UK, phone service in Spain, and even a Russian ministry. The malware was stopped dead by one security researcher who basically got lucky. In today’s show, I will explain what Wan ...…
 
A
AMERICA OUT LOUD PODCAST NETWORK
 
The WannaCry ransomware worm spread across the planet is a matter of hours, infecting over 200,000 computers in just a matter of hours - this included hospitals in the UK, phone service in Spain, and even a Russian ministry. The malware was stopped dead by one security researcher who basically got lucky. In today’s show, I will explain what Wan ...…
 
F
FIREWALLS DON'T STOP DRAGONS
 
The WannaCry ransomware worm spread across the planet is a matter of hours, infecting over 200,000 computers in just a matter of hours - this included hospitals in the UK, phone service in Spain, and even a Russian ministry. The malware was stopped dead by one security researcher who basically got lucky. In today’s show, I will explain what Wan ...…
 
The White House says Trump did not leak confidential information to the Russians, Washington says the Syrian regime is executing political opponents, Computer security researchers find clues that link North Korea to cyberattacks, Venezuela protests refuse to back down and Turkey’s president meets US counterpart.…
 
In this episode, we talk with Andy Klein, Dir of Marketing for Backblaze, which backs up desktops and computers to the cloud and also offers cloud storage. Backblaze has a unique consumer data protection solution where customers pay a flat fee to backup their desktops and then may pay a separate fee for a large recovery. On their website, they ...…
 
In this episode, we talk with Andy Klein, Dir of Marketing for Backblaze, which backs up desktops and computers to the cloud and also offers cloud storage. Backblaze has a unique consumer data protection solution where customers pay a flat fee to backup their desktops and then may pay a separate fee for a large recovery. On their website, they ...…
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
Gizmodo's attempt to reveal Donald Trump's administration ineptitude when it comes to cybersecurity fails to impress. Mac users are warned that the HandBrake DVD-ripping app has been compromised by malware. And will the US Army insist IT security professionals spend months ironing their bedsheets..? All this and more is discussed by computer se ...…
 
Gizmodo's attempt to reveal Donald Trump's administration ineptitude when it comes to cybersecurity fails to impress. Mac users are warned that the HandBrake DVD-ripping app has been compromised by malware. And will the US Army insist IT security professionals spend months ironing their bedsheets..? All this and more is discussed by computer se ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login