show episodes
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
I
In-Security
Rare
 
Computer security from the ground up.
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Past speeches and talks from DEF CON hacking conferences in an iTunes friendly Mp4 format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you didn't make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want. Video, audio and supporting materials from past conferences will be posted here, starting with the newest ...
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Note: This is only Paul's Security Weekly, recording once per week and typically 2 hour shows.
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Video, audio and supporting materials from past conferences are available on our new media server at: https://media.defcon.org
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washi ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
S
SAHAsays
Monthly+
 
SAHAsays is an Information Security related commentary program that pulls from recent headlines around the web. We offer four distinct voices from the Computer Security community: applied business, a software reverse engineer, a doctoral seeking, practicing academic, and the journeyman getting in the front door in the industry. These "voices" may represent our general perspectives, but we're all friends who meet at the San Antonio Hacker's Association (SAHA) on the 6th of every month at the ...
 
The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Video, audio and supporting materials from past conferences are available on our new media server at: https://media.defcon.org
 
C
CyberTalkRadio
Weekly
 
From the dark web to your radio dial - a weekly discussion on internet and computer security with San Antonio's Bret Piatt.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
Ryan Naraine is the host of the SecurityWeek podcast series "Security Conversations". He is the head of Kaspersky Lab's Global Research & Analysis team in the USA and has extensive experience in computer security user education, specializing in operating system and third-party application vulnerabilities, zero-day attacks, social engineering and social networking threats.
 
D
Digital Detectives
Monthly
 
Hosted by two leaders in the cyber-security industry, Sharon D. Nelson, Esq. and John W. Simek, Digital Detectives is for listeners who are interested in digital forensics, e-discovery, and information security issues. Nelson and Simek invite digital forensic and computer security experts to enlighten listeners on the latest technology, cyber threats, and necessary security measures to keep online data secure.
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Europe was held March 27-30 at the Moevenpick Amsterdam Centre Hotel. Twdays, four different tracks. Roger Cumming, Head of Device Delivery and Knowledge at CPNI (Center for the Protection of National Infrastructure), spoke on "How can the Security Researcher Community Work Better for the Common Good." A post convention wrap up can be found at http://www.blackhat.com/html/bh-europe-07/bh-e ...
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
C
Cybersecurity Sense
Monthly+
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings in Japan 2006 was held October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/b ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washi ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
I
In-Security
Rare
 
Computer security from the ground up.
 
This podcast helps you and your business get more out of computer technology. Topics include computer security, data, new technology and tech news.
 
C
Cyber Talk Radio
Weekly
 
From the Dark Web to Your Radio Dial -- A Weekly Discussion About Internet & Computer Security
 
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
Loading …
show series
 
Dave interviews Morgan Wright, who is an internationally recognized expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. He’s a Senior Fellow at The Center for Digital Government, and a national security contributor to TheHill.com. Morgan's landmark testimony before Congress on Healthcare.gov changed how the government ...…
 
This episode we talk about software, software education, computer security, computer identity, career paths, and much more! Bryan is active in the software space and is currently involved at Okta, Inc. as a Technical Engagement Manager. He has decades of experience in computer security. It was a real pleasure to talk with Bryan Mabee and he is ...…
 
Walter O'Brien is the inspiration of the popular CBS TV show, Scorpion. The show is based on the life of the real Walter O'Brien. On today's episode the real Walter O'Brien share how the show is inspiring a new generation of geniuses to tap into their full potential. We also dive deep into how matching IQ and EQ on your team is the key to unloc ...…
 
If aliens did contact us would it be safe to open the email? Why would MoviePass track film lovers after they leave the cinema? Would you know how to get around Malaysia when your car rental website lets you down? And will Graham please stop talking about text adventure games? All this and much much more is discussed in the latest edition of th ...…
 
Karissa Breen, CEO of Karissa Breen Industries, talks with Jeff Demain, CEO of Hantheon, about her passion for growing computer security awareness and assisting companies. This is the next weekly podcast in Hantheon's series on leadership. Hantheon helps companies grow. Contact us at hello@hantheon.com for information. We look forward to talkin ...…
 
We chatting about the major implications of Spectre and Meltdown. Both of these vulnerabilities in computer security are critical to understand, both from a technical side and a user security side. Spectre and Meltdown tear at the fundamental core of how we build and operate our computing systems over the past twenty years. Amazon Go opened in ...…
 
Not Speeding In Reverse is two village idiots just having a blast. Peter and Scott talk about random current topics ranging from martial arts, self-improvement, movies, and the latest computer security fails. This time: listener feedback from Adam Bell, Peter’s cohost of Blurring the Lines, gripes about Coinbase, Tesla Model S batteries, why we ...…
 
Dealing with aging iPhone battery issues. A listener seeks advice on finding help and advice in purchasing a new computer and smartphone. Using Google Project fi could lower the cell phone bill for some users. A dual-monitor laptop user is looking for a better solution to hook up a wireless keyboard an mouse; a device called a port replicator m ...…
 
This week, Guilherme Rambo (AKA Mr. Rambo) returns to talk about, The state of security in iOS and macOS, and the state of Jailbreaking which on iOS that rose up from the dead. We also talk about whether Apple should make their own smart-home devices, now that Alexa dominates that market. And speculate about the iMac Pro cannibalizing HomePod s ...…
 
Since Russia (most likely) hacked our Presidential election in 2016, there's been talk of using cell phones for voting. Think again.Read more at BigThink.com: http://bigthink.com/videos/kathleen-fisher-so-you-want-digital-voting-hackers-want-it-even-moreFollow Big Think here:YouTube: http://goo.gl/CPTsV5Facebook: https://www.facebook.com/BigThi ...…
 
Darren Coleman is the owner of Coleman Technologies located in Langley, BC, Canada.Coleman is a passionate information technology professional, entrepreneur and technology author based in British Columbia. He founded Coleman Technologies in 1999, and since that time has prided himself on his high quality services across a range of areas.These i ...…
 
On tonight’s episode of Divergent Thought, we discussed various elements of personal computer security. We talked about how to avoid phishing schemes, password protection strategies, and methods to protect yourself while shopping online.
 
On tonight’s episode of Divergent Thought, we discussed various elements of personal computer security. We talked about how to avoid phishing schemes, password protection strategies, and methods to protect yourself while shopping online.
 
Are you chasing the latest bugs and vulnerabilities, or does your small business have an IT security strategy? Listen in this week to get started on implementing a tried-and-true security strategy to protect your digital stuff. Links Best practices for passwords updated after original author regrets his advice (Verge) NIST’s new password rules ...…
 
What will the recent rapid progress in machine learning and AI mean for the fields of computer security and privacy? This talk gives a tour of some answers, and some unanswered questions. It will discuss new types of attacks and surveillance that are becoming possible due with modern neural networks, and some new research problems that the comp ...…
 
What will the recent rapid progress in machine learning and AI mean for the fields of computer security and privacy? This talk gives a tour of some answers, and some unanswered questions. It will discuss new types of attacks and surveillance that are becoming possible due with modern neural networks, and some new research problems that the comp ...…
 
Passwords are the bane of our modern existence. Why the hell haven’t we figured out a better way to prove who we are? Today is the first in a series of educational shows that I’ve dubbed Castle Defense 101: Defending Your Digital Drawbridge. In our inaugural session, we’ll take a deep dive into the problem of passwords. What really makes a good ...…
 
Is password manager 1Password treating its customers unfairly? Are autonomous cars driving us around the bend? And what is this Net Neutrality thing anyway? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Michael Hucks f ...…
 
Jim O’Reilley & Birgit Pauli-Haack discuss how to stack technology for a nonprofit in start-up mode from the very beginning and you will not have to rework major parts later on. A group of like-minded people working on an idea to better the world. When the organization doesn’t have a 501c3 status yet and is not eligible for offerings via TechSo ...…
 
The iPhone 8 is on its way and may use 3D facial recognition rather than a fingerprint sensor to lock out intruders, and the UK's Automobile Association claims it hasn't leaked any credit card data, so why is it getting so upset about security researchers publishing screenshots of leaked data? All this and more is discussed in the latest editio ...…
 
Google faces a fine of $2.7bn by the European Commission over a competition ruling on its shopping service, and Germany passes a law that requires internet firms to take down illegal content within 24 hours of being reported or face big penalties. Have regulators found their teeth against the internet giants? We ask Jeff Jarvis, author of the b ...…
 
With all the talk about Russian hacking and cyber spying one of the biggest and considered by many to be the best computer security systems is Kaspersky…from a Russian software company. The FBI has questioned them as officials fear Russian spies may be using the software to get in your computer. Is your computer safe? Where do you get your soft ...…
 
OnePlus 5 Review, Recover Erased Files, Find Your First Computer Security Job, External Drives For Backup! ------ Download Episode 131 Subscribe To Our Video on YouTube, iTunes, RSS! ------ OnePlus 5 Review Shannon's got a full video review of the new OnePlus 5... can this $539 phone with 128GB of storage and dual cameras hang with flagship mod ...…
 
OnePlus 5 Review, Recover Erased Files, Find Your First Computer Security Job, External Drives For Backup! ------ Download Episode 131 Subscribe To Our Video on YouTube, iTunes, RSS! ------ OnePlus 5 Review Shannon's got a full video review of the new OnePlus 5... can this $539 phone with 128GB of storage and dual cameras hang with flagship mod ...…
 
Another major ransomware outbreak rattles the world - but no-one can decide what it's called, the danger posed to driverless cars by kangaroos, and do you really want an Amazon Echo Show? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, join ...…
 
Guest: @ Jared Smith talks with Dave Rael about passion for what he does, security, extroversion, and building your brand Jared is a Computer Security researcher at the US's largest national laboratory in Oak Ridge, TN, where he works on projects ranging from novel security data analytics tools to malware research. He was previously a software ...…
 
One of the Middle East’s most prominent women’s right activists, Manal al-Sharif grew up in a modest family in Mecca. Devout in her youth, she didn’t associate with non-Muslims and destroyed her brother’s cassettes of forbidden music. But by her twenties she was working as a computer security engineer for Aramco. Her professional status didn’t ...…
 
Google login Twitter login Classic login