show episodes
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
I
In-Security
Rare
 
Computer security from the ground up.
 
P
Paul's Security Weekly
Weekly+
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
D
DEFCON 15 [Audio] Speeches from the hacker conventions
 
Past speeches and talks from DEF CON hacking conferences in an iTunes friendly Mp4 format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you didn't make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want. Video, audio and supporting materials from past conferences will be posted here, starting with the newest ...
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy. Follow the show on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
D
DEF CON 24 [Audio] Speeches from the Hacker Convention
 
The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Audio, audio and supporting materials from past conferences are available on our new media server at: https://media.defcon.org
 
P
Paul's Security Weekly (Podcast-Only)
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Note: This is only Paul's Security Weekly, recording once per week and typically 2 hour shows.
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
C
CyberSpeak's Podcast
Rare
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
P
Paul's Security Weekly
Weekly+
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
C
CyberTalkRadio
Weekly
 
From the dark web to your radio dial - a weekly discussion on internet and computer security with San Antonio's Bret Piatt.
 
B
Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
B
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washi ...
 
S
SAHAsays
Monthly+
 
SAHAsays is an Information Security related commentary program that pulls from recent headlines around the web. We offer four distinct voices from the Computer Security community: applied business, a software reverse engineer, a doctoral seeking, practicing academic, and the journeyman getting in the front door in the industry. These "voices" may represent our general perspectives, but we're all friends who meet at the San Antonio Hacker's Association (SAHA) on the 6th of every month at the ...
 
D
Digital Detectives
Monthly
 
Hosted by two leaders in the cyber-security industry, Sharon D. Nelson, Esq. and John W. Simek, Digital Detectives is for listeners who are interested in digital forensics, e-discovery, and information security issues. Nelson and Simek invite digital forensic and computer security experts to enlighten listeners on the latest technology, cyber threats, and necessary security measures to keep online data secure.
 
S
Security Conversations - A SecurityWeek Podcast
 
Ryan Naraine is the host of the SecurityWeek podcast series "Security Conversations". He is the head of Kaspersky Lab's Global Research & Analysis team in the USA and has extensive experience in computer security user education, specializing in operating system and third-party application vulnerabilities, zero-day attacks, social engineering and social networking threats.
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
B
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Europe was held March 27-30 at the Moevenpick Amsterdam Centre Hotel. Twdays, four different tracks. Roger Cumming, Head of Device Delivery and Knowledge at CPNI (Center for the Protection of National Infrastructure), spoke on "How can the Security Researcher Community Work Better for the Common Good." A post convention wrap up can be found at http://www.blackhat.com/html/bh-europe-07/bh-e ...
 
B
Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
 
B
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
C
CyberSpeak's Podcast
Rare
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
B
Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings in Japan 2006 was held October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/b ...
 
B
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washi ...
 
T
The Tech Authority Podcast
Monthly+
 
This podcast helps you and your business get more out of computer technology. Topics include computer security, data, new technology and tech news.
 
C
Cybersecurity Sense
Monthly+
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
P
Paul's Security Weekly
Weekly+
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
I
In-Security
Rare
 
Computer security from the ground up.
 
C
Cyber Talk Radio
Weekly
 
From the Dark Web to Your Radio Dial -- A Weekly Discussion About Internet & Computer Security
 
B
Black Hat Announcements
Rare
 
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
 
T
The Security Ledger Podcast
Monthly
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
B
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
B
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
 
S
Security 101 (SD) - Tech-zen.tv
Monthly
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand.We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can know ...
 
S
Security 101 (HD) - Tech-zen.tv
Monthly
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand.We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can know ...
 
S
Security 101 (Audio Only) - Tech-zen.tv
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand.We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can know ...
 
S
Security 101 (SD) - Tech-zen.tv
Monthly
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand.We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can know ...
 
S
Security 101 (Audio Only) - Tech-zen.tv
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand.We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can know ...
 
S
Security 101 (SD) - Tech-zen.tv
Monthly
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand.We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can know ...
 
S
Security 101 (HD) - Tech-zen.tv
Monthly
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand.We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can know ...
 
B
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
 
W
Welcome to "SpotLight"...with Denise Richardson & Jim Malmberg
 
A program designed to spotlight issues that affect each one of us -one way or another! We want to hear from you! Want to be a guest? Tell us your story. Guests will include experts, consumers, attorneys, advocates and you! A program designed to spotlight issues that affect each one of us -one way or another! We want to increase public and corporate awareness by shining a SpotLight on issues that matter to you... Credit Reporting issues, Identity Theft, Privacy Rights, Consumer Protection Law ...
 
Loading …
show series
 
M
Modern Life Network - Content as it relates to your life
 
We chatting about the major implications of Spectre and Meltdown. Both of these vulnerabilities in computer security are critical to understand, both from a technical side and a user security side. Spectre and Meltdown tear at the fundamental core of how we build and operate our computing systems over the past twenty years. Amazon Go opened in ...…
 
Not Speeding In Reverse is two village idiots just having a blast. Peter and Scott talk about random current topics ranging from martial arts, self-improvement, movies, and the latest computer security fails. This time: listener feedback from Adam Bell, Peter’s cohost of Blurring the Lines, gripes about Coinbase, Tesla Model S batteries, why we ...…
 
C
Computer Talk with TAB
 
Dealing with aging iPhone battery issues. A listener seeks advice on finding help and advice in purchasing a new computer and smartphone. Using Google Project fi could lower the cell phone bill for some users. A dual-monitor laptop user is looking for a better solution to hook up a wireless keyboard an mouse; a device called a port replicator m ...…
 
This week, Guilherme Rambo (AKA Mr. Rambo) returns to talk about, The state of security in iOS and macOS, and the state of Jailbreaking which on iOS that rose up from the dead. We also talk about whether Apple should make their own smart-home devices, now that Alexa dominates that market. And speculate about the iMac Pro cannibalizing HomePod s ...…
 
B
Business for Breakfast
 
On today's show, Ken and Mark talked about Cyber Monday with Amazon retail expert, Allison Flicker. Eric Marcus, CEO of Marcus Networking said today is National Computer Security Day and gave tips on how to make your system more secure. In Stump the Chumps Ken and Mark answered their question correctly and so did the contestant getting her a $5 ...…
 
Since Russia (most likely) hacked our Presidential election in 2016, there's been talk of using cell phones for voting. Think again.Read more at BigThink.com: http://bigthink.com/videos/kathleen-fisher-so-you-want-digital-voting-hackers-want-it-even-moreFollow Big Think here:YouTube: http://goo.gl/CPTsV5Facebook: https://www.facebook.com/BigThi ...…
 
Darren Coleman is the owner of Coleman Technologies located in Langley, BC, Canada.Coleman is a passionate information technology professional, entrepreneur and technology author based in British Columbia. He founded Coleman Technologies in 1999, and since that time has prided himself on his high quality services across a range of areas.These i ...…
 
On tonight’s episode of Divergent Thought, we discussed various elements of personal computer security. We talked about how to avoid phishing schemes, password protection strategies, and methods to protect yourself while shopping online.
 
S
Shoestring Networks Tech Tip Podcast
 
Are you chasing the latest bugs and vulnerabilities, or does your small business have an IT security strategy? Listen in this week to get started on implementing a tried-and-true security strategy to protect your digital stuff. Links Best practices for passwords updated after original author regrets his advice (Verge) NIST’s new password rules ...…
 
What will the recent rapid progress in machine learning and AI mean for the fields of computer security and privacy? This talk gives a tour of some answers, and some unanswered questions. It will discuss new types of attacks and surveillance that are becoming possible due with modern neural networks, and some new research problems that the comp ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
What will the recent rapid progress in machine learning and AI mean for the fields of computer security and privacy? This talk gives a tour of some answers, and some unanswered questions. It will discuss new types of attacks and surveillance that are becoming possible due with modern neural networks, and some new research problems that the comp ...…
 
Passwords are the bane of our modern existence. Why the hell haven’t we figured out a better way to prove who we are? Today is the first in a series of educational shows that I’ve dubbed Castle Defense 101: Defending Your Digital Drawbridge. In our inaugural session, we’ll take a deep dive into the problem of passwords. What really makes a good ...…
 
Is password manager 1Password treating its customers unfairly? Are autonomous cars driving us around the bend? And what is this Net Neutrality thing anyway? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Michael Hucks f ...…
 
Jim O’Reilley & Birgit Pauli-Haack discuss how to stack technology for a nonprofit in start-up mode from the very beginning and you will not have to rework major parts later on. A group of like-minded people working on an idea to better the world. When the organization doesn’t have a 501c3 status yet and is not eligible for offerings via TechSo ...…
 
The iPhone 8 is on its way and may use 3D facial recognition rather than a fingerprint sensor to lock out intruders, and the UK's Automobile Association claims it hasn't leaked any credit card data, so why is it getting so upset about security researchers publishing screenshots of leaked data? All this and more is discussed in the latest editio ...…
 
Google faces a fine of $2.7bn by the European Commission over a competition ruling on its shopping service, and Germany passes a law that requires internet firms to take down illegal content within 24 hours of being reported or face big penalties. Have regulators found their teeth against the internet giants? We ask Jeff Jarvis, author of the b ...…
 
With all the talk about Russian hacking and cyber spying one of the biggest and considered by many to be the best computer security systems is Kaspersky…from a Russian software company. The FBI has questioned them as officials fear Russian spies may be using the software to get in your computer. Is your computer safe? Where do you get your soft ...…
 
OnePlus 5 Review, Recover Erased Files, Find Your First Computer Security Job, External Drives For Backup! ------ Download Episode 131 Subscribe To Our Video on YouTube, iTunes, RSS! ------ OnePlus 5 Review Shannon's got a full video review of the new OnePlus 5... can this $539 phone with 128GB of storage and dual cameras hang with flagship mod ...…
 
OnePlus 5 Review, Recover Erased Files, Find Your First Computer Security Job, External Drives For Backup! ------ Download Episode 131 Subscribe To Our Video on YouTube, iTunes, RSS! ------ OnePlus 5 Review Shannon's got a full video review of the new OnePlus 5... can this $539 phone with 128GB of storage and dual cameras hang with flagship mod ...…
 
Another major ransomware outbreak rattles the world - but no-one can decide what it's called, the danger posed to driverless cars by kangaroos, and do you really want an Amazon Echo Show? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, join ...…
 
Guest: @ Jared Smith talks with Dave Rael about passion for what he does, security, extroversion, and building your brand Jared is a Computer Security researcher at the US's largest national laboratory in Oak Ridge, TN, where he works on projects ranging from novel security data analytics tools to malware research. He was previously a software ...…
 
One of the Middle East’s most prominent women’s right activists, Manal al-Sharif grew up in a modest family in Mecca. Devout in her youth, she didn’t associate with non-Muslims and destroyed her brother’s cassettes of forbidden music. But by her twenties she was working as a computer security engineer for Aramco. Her professional status didn’t ...…
 
From growing up as a devout woman from a modest family in Saudia Arabia to becoming an unexpected leader of a courageous movement to support women’s right to drive, Manal al-Sharif recounts her life’s journey in her ferociously intimate new memoir Daring to Drive: A Saudi Woman’s Awakening. When working in the male-dominated field of computer s ...…
 
This time Walker and Cameron talk about whether it’s OK to talk about their personal lives. Recorded on April 12th, 2017 Email us at andstuffpodcast@gmail.com Tweet at us at @andstuffpodcast Cameron likes to use steno as a sekrit code. Walker likes to use Volapuk as a sekrit code. NOLA Maker Faire NIST Turns out, Maryland is 12,407 mi^2, and Rh ...…
 
Microsoft gives us a Patch Tuesday shock, malware grows up for the Mac, and your mouse movements might reveal if you're an identity thief. All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest Javvad Malik of Ali ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login