show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Creating connections and conversations about people, technology and the intersection of health and wellbeing. Recorded through the "cyber synaptic space." Catherine speaks to people who are considered experts in their fields. Important information for parents, teachers, professionals and anyone who wants to learn about cyberspace, digital parenting, security, data protection, counselling, health, wellbeing, personal growth and development. This is your acoustic & neuroplastic ride that will ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
This podcast will share insights into the lives of public safety professionals who play a crucial role in society, often putting their own lives on the line to ensure the safety and well-being of their communities. Throughout the series, I'm sure you'll discover unique stories and motivations from each guest who bring their perspective and experiences to showcase the various reasons why they commit their lives to protecting others. I look forward to hearing these inspiring stories and learni ...
  continue reading
 
Defuse / Diːˈfjuːz/ Verb: To Make A Situation Less Tense Or Dangerous. Join me in listening to this informative podcast that delves into the critical issues facing private and corporate clients. Each episode features global experts sharing their insights on preventing and resolving problematic behaviors and security issues that cause harm. The podcast covers a wide range of topics, including stalking, protective security, intelligence, psychological profiling, crisis management, risk managem ...
  continue reading
 
Cyber Security doesn't have to be a daunting task. Everyone has the right to be more secure and enjoy some privacy while surfing the web. That's where we come in. We will give you simple yet effective ways of staying safe and private online. And we'll do it in a language you'll understand. Learn how to be Cyber Smart because Privacy Matters.
  continue reading
 
Artwork

1
Building Cyber Resilience

Ann Irvine and Rich Seiersen

Unsubscribe
Unsubscribe
Monthly
 
The Building Cyber Resilience podcast shifts the focus on cyber safety from fear to action by sharing simple steps that benefit both your team and your customers. Hosts Dr. Ann Irvine and Richard Seiersen talk about the positive outcomes of developing risk management and utilizing data science across industries to create a smarter business. Listen in and learn how you can build a cyber resilient organization in today's technology-driven landscape.
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

Unsubscribe
Unsubscribe
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
Artwork

1
Protect Kids Online

Wisconsin Department of Justice

Unsubscribe
Unsubscribe
Monthly
 
The Protect Kids Online (PKO) Podcast is brought to you by the Wisconsin Department of Justice, Internet Crimes Against Children (ICAC) Task Force. This podcast is designed for parents, grandparents, guardians, or caregivers of children. Get information about the trends and updates on the latest apps, websites, and online activity of children 17 yrs and younger. Topics include: activities of the Wisconsin ICAC Task Force; App of the Week; tips & methods for combating online child exploitatio ...
  continue reading
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

Unsubscribe
Unsubscribe
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork

1
Safe Nation

Nikki Renfroe

Unsubscribe
Unsubscribe
Monthly
 
Safe Nation is an inaugural podcast curated to share insight and discussion about law enforcement, security and crime prevention with a focus on current events and honest data. Offering a fresh perspective on safety through interviews, opinions and great practical advice, join your host, retired, female state trooper Captain Nikki Renfroe. Listen as she interviews industry professionals, sharing information on how to protect yourself from danger and crimes while also bringing attention to un ...
  continue reading
 
Artwork

1
UAB TechKnow

University of Alabama at Birmingham

Unsubscribe
Unsubscribe
Monthly
 
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
  continue reading
 
Hello! This is the Aware and Prepared podcast. I'm your host, Mandi Pratt, a trained domestic violence advocate. I teach women and vulnerable populations how to be street smart. I'm a mom with a gnarly backstory from almost two decades ago. The FBI showed up at my door one day to alert me that my abusive ex had become wanted for multiple bank robberies. Our story was in the news (a few times). I was tired of feeling vulnerable and learned how to keep myself and my son safer.I wish when I was ...
  continue reading
 
Artwork

1
Robyn Rishani

Robyn Rishani - Online World Expert, Speaker & Educator

Unsubscribe
Unsubscribe
Monthly
 
Secrets to better parenting and understanding of your kids online world from leading Cyber Safety & Awareness Expert, Speaker and Educator, Robyn Rishani
  continue reading
 
Where safety and security meet. The prepare. respond. recover. podcast, in partnership with the Natural Disaster and Emergency Management Expo (www.ndemevent.com) features impactful stories and real-world learnings from top business continuity, emergency management, and security professionals. Join host Todd De Voe as he and his guests discuss how to stay secure and resilient all while maintaining operational continuity and ensuring public safety in this ever-changing world.
  continue reading
 
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

Unsubscribe
Unsubscribe
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
Dive into the world of bleeding-edge technology with our AI-powered podcast. We go beyond the headlines to explore innovations, tech trends, and the future of technology. Let our AI agents be your guide, delivering insightful analyses that will keep you ahead of the curve.
  continue reading
 
Welcome to Maddocks on the Mic — the official podcast of Maddocks, the modern Australian law firm — operating in Canberra, Melbourne and Sydney, Australia. Dive into bite-sized series from around the firm aimed at educating and hopefully entertaining too!
  continue reading
 
Securely HERS is a cybersecurity podcast dedicated to providing women with practical advice and guidance to protect their personal and professional lives from cyber threats. Hosted by cybersecurity expert Veronica Duff, each episode features discussions on the latest cybersecurity trends, tips on how to secure personal devices and accounts, and interviews with industry professionals on various topics related to cybersecurity. Whether you're a beginner or an experienced user, Securely HERS pr ...
  continue reading
 
Artwork

1
Your Undivided Attention

Tristan Harris and Aza Raskin, The Center for Humane Technology

Unsubscribe
Unsubscribe
Monthly+
 
In our podcast, Your Undivided Attention, co-hosts Tristan Harris, Aza Raskin and Daniel Barcay explore the unprecedented power of emerging technologies: how they fit into our lives, and how they fit into a humane future. Join us every other Thursday as we confront challenges and explore solutions with a wide range of thought leaders and change-makers — like Audrey Tang on digital democracy, neurotechnology with Nita Farahany, getting beyond dystopia with Yuval Noah Harari, and Esther Perel ...
  continue reading
 
Artwork

1
The Parenting Couch

Rachel Chappell and Sarah Levett

Unsubscribe
Unsubscribe
Monthly+
 
Join Rachel Chappell and Sarah Levett on The Parenting Couch, where we discuss the big issues facing Mums across Australia. We share our experiences and advice about navigating the ever-changing parenting challenges, and are joined by experts, celebrities and parents too. Listen to feel more connected & supported, while having a laugh about what parenting is really like. Brought to you by North Shore Mums.
  continue reading
 
Artwork
 
You might have heard a thing or two about the CIA, but have you ever heard from the CIA? In the Central Intelligence Agency's first public podcast, you will. Let us be your guides around the corridors of CIA Headquarters in Langley, as you step beyond the Hollywood scripts and shadowed whispers to hear directly from the people serving each day as America's first line of defense. These are their stories. This is The Langley Files.
  continue reading
 
Artwork
 
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
  continue reading
 
Artwork
 
Learn the insider tricks to mastering technology. Technology isn't really complex is just that not explained properly. I've shown hundreds how to master technology, and now it's your turn! - Orman Beckles aka The Hi Tech Nomad YouTube: http://youtube.com/thehitechnomad
  continue reading
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
  continue reading
 
The Global Center for Women and Justice launched the Ending Human Trafficking podcast in 2011. Our hosts are Dr. Sandie Morgan and Dr. Dave Stachowiak. Our mantra is Study the Issues. Be a voice. Make a difference. We believe that if you do not study first, you may say or do the wrong thing.
  continue reading
 
Artwork
 
Join this community of curious minds. Through in-depth conversations with preeminent thought leaders, authors, activists, community and business leaders, industry experts and academics, listeners get an “insiders” perspective about trends impacting our communities, families and individual lives. Born in Bayamon, Puerto Rico, raised in Chicago, Illinois, USA, and currently residing in Dallas, Texas, USA, Brian has a unique perspective on current global events and public policy. His Puerto Ric ...
  continue reading
 
Loading …
show series
 
CIA’s digital systems need to process some of the most sensitive data in the world—intelligence that is vital to keeping Americans safe and must be kept from falling into the wrong hands. But who is responsible for ensuring the security of those systems? And do they have any best practices that you could incorporate into your own tech life? On this…
  continue reading
 
In this episode, we delve into NASA's decision to favor SpaceX over Boeing for astronaut returns, explore Meta's new disappearing posts feature on Threads, and look ahead to the groundbreaking Polaris Dawn mission. Tune in for the latest updates and insights, and don't forget to share this episode with your friends!…
  continue reading
 
In this episode, we explore NASA's tough choice for astronauts' return, the clash between SpaceX's Starlink and telecom giants, and the groundbreaking Polaris Dawn mission. Discover the latest in space technology and the challenges shaping the future of space exploration. Don't miss out—tune in and share this episode with fellow space enthusiasts!…
  continue reading
 
Swimlane and GenAI Join Swimlane CISO, Mike Lyborg and Security Weekly’s Mandy Logan as they cut through the AI peanut butter! While Generative AI is the not-so-new hot topic, it's also not the first time the cybersecurity industry has embraced emerging technology that can mimic human actions. Security automation and its ability to take action on b…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
In this episode, we explore Google's new 'Essentials' app for HP laptops, which centralizes core services for a seamless user experience. We also delve into the privacy concerns surrounding Slack's use of private conversations to train AI, and the backlash from users. Finally, we discuss the ethical dilemmas faced by Google DeepMind employees prote…
  continue reading
 
This week: YAVD: Yet Another Vulnerable Driver, why bring your own when one already exists, backdoors in MIFARE Classic, wireless hacking tips, AMD sinkclose vulnerability will keep running, you down with SLDP yea you know me, Phrack!, IoTGoats, Pixel vulnerabilities, leaking variables, a DEF CON talk that was not cancelled, Telnet is still a thing…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
The exposed and public nature of application programming interfaces (APIs) come with risks including the increased network attack surface. Zero trust principles are helpful for mitigating these risks and making APIs more secure. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconiers-Hasan, a solu…
  continue reading
 
Listen as Terrance (my AI British Cockney alter ego) gives you my thoughts on Foldable phones. Production: Talent: Terrence Gathers (Eleven Labs) Script Writer: Chetji Peightee (ChatGPT) Author/Producer: Orman Beckles aka "The Hi Tech Nomad" Check out: Subscribe to: ⁠⁠The Hi Tech Nomad's Newsletter⁠⁠⁠ Website: ⁠⁠www.TheHiTechNomad.com⁠⁠ Videos: ⁠⁠Y…
  continue reading
 
In this episode, we dive into Blue Origin's recent rocket engine explosion and its impact on future launches. We also explore SpaceX's ambitious Polaris Dawn mission, aiming for the highest Earth orbit since Apollo and the first commercial spacewalk. Lastly, we discuss Google's multi-million dollar deal to support local journalism in California. Tu…
  continue reading
 
SquareX With employees spending most of their working hours on the browser, web attacks are one of the biggest attack vectors today. Yet, both enterprises and security vendors today aren’t focused on securing the browser – a huge risk given that attackers can easily bypass Secure Web Gateways, SASE and SSE solutions. This segment will demonstrate t…
  continue reading
 
Send us a Text Message. Have you ever wondered how drastically your media consumption could change just by crossing state lines? During a recent family vacation to Nashville, I experienced firsthand how my YouTube and social media feeds were manipulated to present opposing political views. This episode exposes the unnerving reality of regional medi…
  continue reading
 
Join us as we explore the groundbreaking Polaris Dawn mission, delve into OpenAI's new content partnership with Condé Nast, and discuss the growing backlash against AI. Discover how these developments are shaping the future of space exploration, media, and technology. Don't forget to share this episode with your friends!…
  continue reading
 
Michael Howard, Principal Security Program Manager at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Michael shares his journey at Microsoft, starting from his early days in New Zealand as part of a small team of ten. He discusses his extensive career, his contributions to cybersecurity, and his role in the developmen…
  continue reading
 
Revocation Update GRC's next experiment Patch Tuesday "The Famous Computer Café" IsBootSecure GRC Email Working through WiFi Firewalls Transferring DNS OCSP attestation vs. TLS expiration Platform key expiration National Public Data Show Notes - https://www.grc.com/sn/SN-988-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to thi…
  continue reading
 
Revocation Update GRC's next experiment Patch Tuesday "The Famous Computer Café" IsBootSecure GRC Email Working through WiFi Firewalls Transferring DNS OCSP attestation vs. TLS expiration Platform key expiration National Public Data Show Notes - https://www.grc.com/sn/SN-988-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to thi…
  continue reading
 
As development cycles shorten and more responsibilities shift to developers, application security (AppSec) is rapidly evolving. Organizations are increasingly building mature programs that automate and enhance AppSec, moving beyond manual processes. In this discussion, we explore how organizations are adapting their AppSec practices, highlighting t…
  continue reading
 
In this episode, we’re joined by Dr. Nick Fuller, a leading expert in the field of childhood nutrition and author of the new book "Healthy Parents, Healthy Kids". We dive deep into the essentials of creating a healthy, happy home environment, starting with meal planning and how to involve your kids in choosing what’s on the menu. Dr Fuller shares h…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
Dive into the heated debate between US tech giants and Indian telecom operators over internet regulation. Discover Zoom's new webinar capabilities for up to 1 million attendees, and explore the impact of significant job layoffs in the Bay Area's tech and biotech sectors. Don't miss this insightful episode, and share it with your network!…
  continue reading
 
While CISOs are often responsible for technology implementation, they are not getting the support they need at a strategic level. The Accelerator found that 73% of CISOs expressed concern over cybersecurity becoming unwieldy, requiring risk-laden tradeoffs, compared to only 58% of both CIOs and CTOs. Understanding the C-suite’s business priorities …
  continue reading
 
John Christly, VP of Services for Blue Team Alpha, and author of two cybersecurity books, brings his wealth of experience to this episode of Kitecast. With a background spanning roles such as CEO, CIO, CISO, and CTO, as well as military service, Christly offers unique insights into the world of cybersecurity compliance for Department of Defense (Do…
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
Loading …

Quick Reference Guide