Best Cyber Security podcasts we could find (Updated October 2018)
Related podcasts: Cybersecurity Security Tech Business Cyber Business News Podcasting Threatintelligence Informationsecurity Hacker Intel Technology Careers News Education National Cyber Security Transactionfraud Mobilesecurity Iotsecurity Breaches  
Cyber Security public [search 0]
show episodes
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Information Security is the name of the game. Don't let the hackers win!
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
National Cyber Security, the only "Daily" Cyber Security news show in the world.The show is has been designed for the laymen person who may not be technical, but also informative enough for all of the computer geeks of the world. Think of it like the CNN Headline News of Cyber SecurityOur daily news includes the latest news in hacking, id theft, IT Jobs, Government Security, Risk Management and 60+ other categories. Execute Produced by one of the worlds most known and respected Ex-hacker Gre ...
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.
 
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
Know the latest cybersecurity threats, innovations and actions to take. Our delivery is fast, and the security content coverage is thorough. We bring together today’s hardest working security talent to share their insights with you.
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work.Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize i ...
 
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
 
Cyber Security Dispatch brings you to the front lines of cyber security. In our podcast we interview leading experts and practitioners who are fighting attacks, securing systems, and exploring the cutting edge of cyber security and cyber warfare.
 
News you can use about cyber security.
 
Your weekly dose of cyber security news, hosted by threat researchers from Symantec Security Response
 
FocusPoint Technologies is positioned to become the leading IT Cyber Security company in the US. We are headquartered in St Paul Minnesota but can work with organizations throughout the country. We offer a full range of cyber security products and services to our clients. The company is comprised of industry veterans with deep roots in the IT industry. The company was formed due to a belief that the market is extremely under-served in cyber security technology and services. It's also very co ...
 
Planet Zuda Cyber Security and Technology podcast discussing security issues and everything in technology ranging from crypto currencies, Virtual reality, Augmented reality, apps, and more. We discuss all cyber security issues, whether they are exclusives from Planet Zuda or pertains to cyber security and or technology information you need to know or would love to know about.
 
The Cracking Cyber Security podcast from TEISS is dedicated to cracking cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
 
Welcome to the Do we need better Cyber Security policies In Asian Countries - By Mario96 podcast, where amazing things happen.
 
Loading …
show series
 
Our guest today is Paul Kurtz. He’s the co-founder and CEO of TruSTAR Technology, a company that develops collaborative intelligence-sharing platforms with the goal of streamlining the distribution of actionable information for cybersecurity professionals. Paul Kurtz began working in cybersecurity at the White House in the late 1990s, and later ...…
 
Our guest today is Paul Kurtz. He’s the co-founder and CEO of TruSTAR Technology, a company that develops collaborative intelligence-sharing platforms with the goal of streamlining the distribution of actionable information for cybersecurity professionals. Paul Kurtz began working in cybersecurity at the White House in the late 1990s, and later ...…
 
We did it! Or I should say Dorothy did it. She deployed her Asus Router on her home network. The deployment was flawless. We talk about the process and some of her fears. We also talk about how the OWASP Top 10 can be used in this situation. The OWASP Top 10 is a list of vulnerabilities or weaknesses. In this case we want to think about the vul ...…
 
Latest in Cyber Security news for the week ending 10_13. UK war-games cyberattacks that could black out Moscow, How US halted China Cybertheft, Cyber tests show nearly all Pentagon weapons are vulnerable, Google Plus Vulnerability
 
FocusPoint Partner Showcase - SafeBreach. Learn how SafeBreach leverages your existing technology to offer continuous cyber attacks without damage to your production environment, With a playbook with over 3600 attack simulations and growing. Hear from Chris Webber Senior Security Strategist from SafeBreach customer testimonials, difficulty of i ...…
 
What do you know about cyber security, a new sophisticated phishing scam and more security updates
 
On this episode we are commemorating Ada Lovelace Day, which happens on the second Tuesday of every October to celebrate the achievements of women in STEM careers (science, technology, engineering and mathematics), and was created in memory of Ada Lovelace, the first computer programmer. However, it’s also at these moments in time when we shoul ...…
 
In this week’s Cyber Security Brief, Dick O’Brien is joined by Symantec threat researchers Jon DiMaggio and Candid Wueest to discuss the big cyber security stories of the last week. We talk about Symantec’s latest research on a previously-unknown attack group called Gallmaker, which is using “living off the land” and publicly-available hack too ...…
 
Interview with Ricki Burke and Sarah Young, co-organisers AllSec Meetups in Melbourne and we dive into Ricki’s @BsidesPer Workshop and Sarah’s SecDevSecOpsSec session. Ricki is the Director and Founder of CyberSec People and partners with organisations around ANZ to hire infosec (Cyber Security) professionals. He is embedded in the security com ...…
 
David Senf of Cyverity is joined by Mike Davis of CounterTack and Josh Fu from Cylance to net out how our security industry is reshaped by artificial intelligence. We look at machine learning and where it is being embedded and which skills will need to be expanded.
 
New ransomware hits Canada, Google criticized and a PIN punched in credit bureau’s security
 
In the last of our Data Centre podcast series with DCD, we conclude in Singapore with Prof. Greg Sherry, General Director/ Professor, DCPRO Development and CEO of VARceti. Greg has been involved with the IT Industry for 40 years and has worked in many aspects across the data centre business.Greg has been delivering Data Centre training for many ...…
 
Should your laptop ever get stolen and fall into the wrong hands, you would probably be comfortable in the knowledge that the data on it is protected by full disk encryption. But what if a malicious adversary could get around that encryption and access the data anyway? F-Secure's Olle Segerdahl and Pasi Saarinen have discovered a flaw that allo ...…
 
The Recorded Future team is proud to have recently published its first book, “The Threat Intelligence Handbook — A Practical Guide for Security Teams to Unlocking the Power of Intelligence.” The book aims to provide readers with the information they’ll need to integrate threat intelligence into their organizations, to ensure that it’s actionabl ...…
 
The Recorded Future team is proud to have recently published its first book, “The Threat Intelligence Handbook — A Practical Guide for Security Teams to Unlocking the Power of Intelligence.” The book aims to provide readers with the information they’ll need to integrate threat intelligence into their organizations, to ensure that it’s actionabl ...…
 
This interview with Dr. Keyun Ruan dives into her research in identifying the value of ‘cyber’ in business, establishing traceability for better risk management, analyzing the attacker’s role in cyber risk and the outlook for the future of cyber risk quantification. Dr. Keyun Ruan has worked as a PhD researcher at the Center of Cyber security a ...…
 
Note: this episode is being re-released to fix a problem with the mp3 download. https://www.tripwire.com/state-of-security/security-data-protection/bec-as-a-service-offers-hacked-business-accounts-for-as-little-as-150/ https://www.bleepingcomputer.com/news/security/ic3-issues-alert-regarding-remote-desktop-protocol-rdp-attacks/ https://krebsons ...…
 
Note: this episode is being re-released to fix a problem with the mp3 download. https://www.tripwire.com/state-of-security/security-data-protection/bec-as-a-service-offers-hacked-business-accounts-for-as-little-as-150/ https://www.bleepingcomputer.com/news/security/ic3-issues-alert-regarding-remote-desktop-protocol-rdp-attacks/ https://krebsons ...…
 
It's the episode everyone has been waiting for! One of the most sought after Cyber Security Executive Recruiters in the world, Matt Comyns of Caldwell Partners, appears on Episode #51 of TF7 Radio to talk about how Cyber Security Executives can differentiate themselves when competing for senior positions, how much time executives should spend s ...…
 
Dorothy and I review the OWASP top 10 and my failure at answering one important interview question, “What is the OWASP Top 10?”. I recently had a job interview for an information security analyst position. I was asked some general security questions. All of which I think I answered OK. Then I was asked, “What is the OWASP Top 10?”. My answer wa ...…
 
GhostDNS, Botnet hijacked over 100,000 routers, Facebook Hack - what you need to know, Voice Phishing scams, Chinese spy chips found in hardware used by Apple and Amazon, Facebook potential $1.66 Billion Fine. The latest in cybersecurity.
 
How to spot cryptojacking, the newest phone scam and a dangerous fax con
 
Invisible, inaudible, and ignored, your devices are currently screaming out large amounts of information about you, your habits, your pattern of life to anyone who cares to listen. ‘Stephen’, who hails from the South Pacific and exported to the financial services sector in Singapore, presented at #BSidesPerth to demonstrate how to listen in, wh ...…
 
In this week’s Symantec Cyber Security Brief we discuss two of our recently-published pieces of research. First, we are joined by Threat Analyst Stephen Doherty to discuss the recent activity of APT28 (aka Swallowtail, Fancy Bear), which made headlines in 2016 due to its involvement in cyber attacks against an organisation involved in the U.S. ...…
 
As a security decision maker, you might be suffering from conference fatigue. You know, that all too familiar din as you attempt to traverse the never-ending conference floor only to be stalled in your tracks by yet another vendor touting the latest “silver bullet” for EVERY cyber vulnerability. And yet, relationship building, networking and di ...…
 
Following his presentation on stage at Cyber Security Asia, Kuala Lumpur, we sat down with Reuben Paul, our youngest guest and Cyber Security Ambassador, Child Hacker, Black Belt in Shaolin Do Kung Fu, USA Gymnast, Video-gamer & Cyber Ninja. These are some of the growing titles used to describe 12-year-old Reuben Paul aka “RAPst4r”, the Founder ...…
 
BSides Perth is organised by three mates with a collective 'lot' of years in the InfoSec industry… doles (Alex Dolan), nidogski (Nigel Hardy) and sneaky (Peter Yorke) – here’s their perspective on BSides and the massive effort required to put a community driven conference together. BSides Perth attracted over 300 delegates, including kids and f ...…
 
Our guest today is Tod Beardsley. He’s director of research at Rapid7, a cybersecurity company providing technology, services, and research to organizations around the world. Tod manages software vulnerability research efforts at Rapid7, handles vulnerability disclosures, contributes to Rapid7's data science-driven research projects, and serves ...…
 
Our guest today is Tod Beardsley. He’s director of research at Rapid7, a cybersecurity company providing technology, services, and research to organizations around the world. Tod manages software vulnerability research efforts at Rapid7, handles vulnerability disclosures, contributes to Rapid7's data science-driven research projects, and serves ...…
 
Bank machines being hacked, be careful of Android password managers and advice for using a password manage
 
O. Sami Saydjari, founder of the Cyber Defense Agency and Author of the new book "Engineering Trustworthy Systems - Getting Security Right at The Design Phase, appears on this week's episode of Task Force 7 Radio to talk about all things Cyber Security. Host George Rettas talks with Saydjari on everything from the Cyber Security emerging threat ...…
 
iTunes | Google | Stitcher | Spotify We found time to configure the Asus router and the Cisco Switch. We also found time to do a partial configuration of our Palo Alto firewall. To configure these devices we needed a basic understanding of vlans, subnets, and routing. Dorothy and I talk about how this knowledge is used in network design, securi ...…
 
Russian troll sites infiltrated Donald Trump subredidit, Britian to create cyber force to tackle Russian threat, W Virginia to allow Smartphone Votiing raises serious security concerns, and Facebook is breached by hackers, putting 50 Million users data at risk
 
Report on Canadian government data breaches, kill that recorder Android app and Web site woes for U.S. government
 
As the US mid-term elections approach, we thought we’d take a close look at “elections and hacking” with chief security scientist at Thycotic, Joseph Carson. On the podcast, Joe explains why information wars pose the greatest risk to democracy, how manipulating the mind works through misinformation, and what changes to the voting system he’d li ...…
 
In this week’s Symantec Cyber Security Brief, we discuss recent research Symantec has published on formjacking, as well as the formjacking attacks that have been carried out by the Magecart group. We also discuss how outdated plugins are allowing malicious code to be injected into WordPress sites, the Apple macOS Mojave zero day, and why it’s n ...…
 
Have you received threatening email recently? You’re not alone. We talk about how it happens and what you can do to stop it affecting you. First, find out about even supposedly reputable Internet actors that make it difficult for you to protect your privacy. Get the lowdown on the way that password and email files are hacked and resold for phis ...…
 
Three data breaches, botnets used for credentials stuffing and a new macOS update
 
Based in New York, Stephen Worn is the CEO of North America, Managing Director of Asia Pacific, as well as Global CTO for Data Centre Dynamics. This interview delves into data centre trends in Australia, Asia Pacific region and globally, as well as how technology and digital transformation is influencing and driving business opportunity and ris ...…
 
The SANS Institute is a well-known and respected cooperative research and education organization. Since its founding in 1989, it’s worked with over 165,000 security professionals around the world, providing training and certification. It also provides free access to a huge library of research documents about information security, and it runs th ...…
 
The SANS Institute is a well-known and respected cooperative research and education organization. Since its founding in 1989, it’s worked with over 165,000 security professionals around the world, providing training and certification. It also provides free access to a huge library of research documents about information security, and it runs th ...…
 
Ransomware note comes in French, ransomware from a resume hits a brewery and beware of remote access control software)
 
Former United States Secret Service Agent and current Executive Vice President of Q6 Cyber, Robert Villanueva, joins Task Force 7 Radio Host George Rettas and Guest Hosts Tom Pageler and Paul Jackson to discuss the importance of implementing a robust Cyber Intelligence capability in your organization. Villanueva, who founded the Secret Service' ...…
 
On a multi-faceted trip to Singapore, we took the opportunity to drop into JustCo and speak with Nina Bual and Shaily Shah of start-up, Blue Phish. These two dynamic individuals and #WomeninCyber, co-founded Blue Phish to work predominantly in South East Asia, with reputable organisations to raise cyber maturity in an engaging and interactive m ...…
 
Mike Johnson is the CISO of Lyft, where he is responsible for Security, Data Privacy, and a few other key areas he can’t talk about. He’s been in the security field long enough to be able to use “decades” as a measure. In his time he’s seen things, heard things, and shared his opinion on… The post #060 – Mike Johnson: Let’s Do The Right Thing a ...…
 
Mike Johnson is the CISO of Lyft, where he is responsible for Security, Data Privacy, and a few other key areas he can’t talk about. He’s been in the security field long enough to be able to use “decades” as a measure. In his time he’s seen things, heard things, and shared his opinion on… The post #060 – Mike Johnson: Let’s Do The Right Thing a ...…
 
Google login Twitter login Classic login