Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Just two people trying to do IT and Security the right way.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
S
Symantec Cyber Security Brief Podcast


1
Symantec Cyber Security Brief Podcast
Security Response Team
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
Deception, influence, and social engineering in the world of cyber crime.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec


201
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
D
DARKWEB.TODAY - Hackers & Cyber SECURITY


1
DARKWEB.TODAY - Hackers & Cyber SECURITY
Alberto Daniel Hill
“In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened." I am Alberto and this podcast is about my story, cybersecurity and hackers. https://podcast.darkweb.today/ https://twitter.com/ADanielHill https://twitter.com/Darkwebtoday https://darkweb.today http ...
Cyber Context exposes the story behind the story with information security that increasingly defines our economy. The podcast features Jonathan Moore, chief technology officer of SpiderOak, a leading voice in cyber, software design, and business. Co-host Christian Whiton is a PR guy and former diplomat and banker.
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
Welcome to Security Happy Hour, where we interview new and established members of the cybersecurity community. In this show we cover where guests have come from and where they want to go, as well as current events and other security related items.
Welcome to Darnley's Cyber Cafe - cheers to a new smooth, bold podcast set on sailing you on this long journey of cybersecurity. Our host Darnley (Previously on Darn IT Podcast) will discuss topics about cybersecurity, business, IT, and everything in between. Sit back with your java (not script) and enjoy.
Agent of Influence is a podcast hosted by NetSPI Managing Director Nabil Hannan, as a place to share best practices and trends in the world of cyber security and vulnerability management.
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
The audio version of videos from my popular YouTube channel (JonGoodCyber).
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
C
Cyber Security Effectiveness Podcast


54
Cyber Security Effectiveness Podcast
Mandiant Security Validation
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cyber Security Effectiveness Podcast.
C
Control System Cyber Security Association International: CS2AI

(CS)²AI is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 23,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education and directly support cyber security professional development in every way. Founder, Derek Harp interviews the Cybersecurity leaders and brings relevant insights to help any company ...
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
Cyber Security & Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims ...
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over 7 years of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
Cyber Security is no longer a topic that is addressed only by programmers and coders. CISOs and their executive peers need to think about “cyber security” differently. In this podcast, Tom Garrison, Vice President and GM of Client Security Strategy and Initiatives, and co-host Camille Morhardt, Director of Security Initiatives & Communications, will discuss relevant topics in clear, easy to understand language. This podcast is intended for security experts and businesspeople alike. We will h ...
S
Sales Bluebird for cyber security sales teams & sales leaders


1
Sales Bluebird for cyber security sales teams & sales leaders
Andrew Monaghan
For salespeople and sales leaders at cybersecurity startups and companies about how to get better at your craft as a B2B cyber security seller and VP Sales / CRO. Includes SaaS sales and software sales. Actionable. Impactful. Sales tips. Sales ideas. Sales for startups. Cyber security sales.
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
S
SecurityLah - the Asian Cyber Security Show


1
SecurityLah - the Asian Cyber Security Show
SecurityLah
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
Technological and digital news from around the world.
It seems that the common theme is that there’s a gap between the security teams’ objectives and the end users’ convenience. Security leaders are tasked with protecting the company’s data. End users are tasked with performing their daily responsibilities in a productive way. At times, those tasks conflict… Or do they? Is there really friction between the security team and the people? Or is it simply a miscommunication? Perhaps the focus is not pointed in the right direction. These are the que ...
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. Click Here. From The Record by Recorded ...
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over seven million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
97% of breaches could have been prevented with basic security measures. But once you've been hit... You can never get UnHacked!
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cyber security tips, tools, and more in the Alias Secure AF Cyber Security Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cyber security topics with coworkers and special guests. No matter where you are on the cyber security knowledge ladder, there's an episode here for you.
Bop
A technology podcast and an engaging platform for real stories, discussions and opinions from renowned global experts on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and security enabling technology and business. Winner of 2019-Outstanding Security Performance Awards, she is an acclaimed and well-known security expert and public speaker. On the podcast, she brings on different cybersecurity and privacy ...
VMware bugs abused to deliver Mirai malware Microsoft to debut of zero trust GDAP tool Bank of Zambia refuses to pay ransom to cyberattack group Hive And now let’s thank today’s sponsor, Torq Myth 4: Automation Will Replace Skilled Security Professionals Not true. Any business that attempts to automate security will quickly find that most high-stak…
random twitter space --- Send in a voice message: https://anchor.fm/darkwebtoday/message
VMWare Flaws https://core.vmware.com/vmsa-2022-0014-questions-answers-faq https://blog.barracuda.com/2022/05/17/threat-spotlight-attempts-to-exploit-new-vmware-vulnerabilities/ Tesla BLE Proximity Authentication Vulnerable to Relay Attacks https://research.nccgroup.com/2022/05/15/technical-advisory-ble-proximity-authentication-vulnerable-to-relay-a…
C
Cybersecurity Today


1
Cyber Security Today, May 18, 2022 - A warning to e-commerce sites, Conti ransomware gang squeezes Costa Rica and more
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00
This episode reports on credit card web scraping with PHP, Conti ransomware gang threatens overthrow of Costa Rica, a warning to users of Bluetooth Low Energy smart locks patches from NvidiaBy TIWC
Use Your Browser Internal Password Vault... or Not? https://isc.sans.edu/forums/diary/Use+Your+Browser+Internal+Password+Vault+or+Not/28658/ SQL Server Brute Forcing https://twitter.com/MsftSecIntel/status/1526680337216114693 UpdateAgent Adapts Again https://www.jamf.com/blog/updateagent-adapts-again/ Updated Exploited Vulnerabilities https://www.c…
Navigating the cyber world and finding a career can be difficult. Tonight we will discuss Mike's journey and how you can best find your path to the field. Tonight's guest is Mike Miller Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and t…
S
Sales Bluebird for cyber security sales teams & sales leaders


1
127: 2 questions to ask the CEO/founder before joining a cyber security startup
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31
At a startup, the founder usually has a big impact on everything to do with the company. With that being said, it’s not uncommon to have the founder come in and critique the work being done in every department. They are a part of the culture, character, messaging, vision and so much more that will directly affect the success of the company. So, wha…
C
Control System Cyber Security Association International: CS2AI

1
37: Engineers Should Consider a Cyber Security Career with Vivek Ponnada
39:22
39:22
Play later
Play later
Lists
Like
Liked
39:22
Derek Harp is excited to have Vivek Ponnada, the Regional Sales Director for Nozomi Networks, joining him for another episode in the series on security leaders! Vivek was also a long-time contributor at GE. Vivek Ponnada has over 23 years of experience in Industrial Control Systems. He currently serves customers in Western Canada for Nozomi Network…
t
teissPodcast - Cracking Cyber Security


1
teissTalk: Testing your EQ - using emotional intelligence to retain talent and reduce cyber risk
47:35
47:35
Play later
Play later
Lists
Like
Liked
47:35
Building, leading and retaining emotionally intelligent infosec teams How good EQ can help CISOs understand, communicate and address risk across the organisation Where can automation tools support analyst retention and EQ development?By TEISS
C
Cyber Security Inside


1
96. The Cybersecurity of IoT: Protecting Our Systems
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53
In this episode of Cyber Security Inside, Camille and Tom get to chat with Malcolm Harkins, Chief Security & Trust Officer at Epiphany Systems, and Rob Bathurst, Co-Founder & Chief Technology Officer at Epiphany Systems about the Internet of Things and thinking like attackers to protect systems. The conversation covers: - How the systems in a build…
C
Cyber Security TLDR


1
Cyber Security News // Weekly Recap (05/08/22 to 05/14/22)
36:59
36:59
Play later
Play later
Lists
Like
Liked
36:59
SHOW NOTES:By Jon Good
C
Cyber Work

1
What does an ICS security practitioner do? | Cybersecurity Career Series
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05
Industrial control system (ICS) security practitioners are responsible for securing mission-critical SCADA and ICS information systems. They are responsible for restricting digital and physical access to ICS devices, such as PLCs and RTUs, to maximize system uptime and availability. Extensive knowledge of OT and IT protocols, incident response, Lin…
There could be a new job in my future. Before that happens, we need to organize our IT. We’re looking at patching, Microsoft Defender for Business, and data recovery. FIND US ON 1. Twitter - DamienHull 2. YouTubeBy SECTION 9
C
Cyber Security & Insurance Leaders


1
Ep 1 - Navigating the Tight-Knit Cyber Insurance Industry and Handling Cyber Claims – with Scott Godes
34:07
34:07
Play later
Play later
Lists
Like
Liked
34:07
In our first episode of Cyber Security & Insurance Leaders, our host Anthony, CEO at Asceris, catches up with Scott Godes, Partner and Co-Chair at Barnes & Thornburg LLP. What's in it for you 1. How to navigate the liability-void between general insurance and professional liability insurance 2. The best metrics to measure success for and with your …
S
Symantec Cyber Security Brief Podcast


1
North Korea’s Stonefly, commodity malware, and the potential return of the REvil ransomware
31:58
31:58
Play later
Play later
Lists
Like
Liked
31:58
In the latest Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of the recent research published by Symantec’s Threat Hunter Team, including our blog about the activity of North Korean APT group Stonefly, and our latest whitepaper on the topic of Commodity Malware. We also talk about some stories that were in the news over the las…
C
Cyber Security Weekly Podcast


1
Episode 322 - Russian Information Warfare and Cyber Threats – perspectives from a Native Georgian speaker and cybersecurity expert
Dr. Khatuna Mshvidobadze is a Professorial Lecturer of Cybersecurity at the George Washington University and Adjunct Professor of Cyber Security at Champlain College. She is also a Senior Fellow at the Rondeli Foundation in Tbilisi, Georgia. Earlier, she developed and taught cyber security courses for M.S. and M.P.S. programs at Utica College. She …
S
SecurityLah - the Asian Cyber Security Show


1
S2E08: About CISO, and IT Security Part 2/2
23:32
23:32
Play later
Play later
Lists
Like
Liked
23:32
Team SecurityLAH continues the discussion on the appointment of CISO for organizations due to regulatory and environmental requirements, and at the same time tearing apart the formation of IT Security in organizations.By SecurityLah
Do you travel abroad? Do you know your data is being tracked, stolen or used against your will? In this episode, Darnley discusses that foreign intelligence collection activities are running wild and you need to do something about it. Stop making security assumptions, understand what to do while travelling abroad. Making the right preparations will…
S
Simply Secure Podcast


1
003: Breaking Into Cyber w/ William Dodgen
18:22
18:22
Play later
Play later
Lists
Like
Liked
18:22
Breaking into cyber. It’s one of the top searched questions on the internet. Unfortunately, there’s not exact clear path that some HAS to follow in order to penetrate into the industry…(see what I did there?) It may be difficult, but at the end of the day, it’s worth it. Today we’re speaking with William Dodgen, Cyber Security Manager at DataLocker…