Cybercrime public
[search 0]
×
Best Cybercrime podcasts we could find (updated June 2020)
Best Cybercrime podcasts we could find
Updated June 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe on Apple Podcasts, SoundCloud, or Google Podcasts to get new episodes as they become available.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019." Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
Each day, the flood of technology news hits. In an industry that always changes, those who deliver technology services need to focus on the information that matters to them. The Business of Tech podcast focuses on the news you need to know. Covering both the story and why it matters to the way services are created and delivered, channel veteran Dave Sobel brings you up to speed and gives you resources to go deeper. With insights and analysis, this five minute podcast focuses on the knowledge ...
 
Strictly Business Radio is a radio talk show highlighting businesses from Start-Up to sensational.The program features a variety of business owners from many industries including banking, energy, retail, technology, manufacturing, health-care, law, construction, and professional services. Created, hosted and produced by business coach and consultant, Anna D. Banks, this program is designed to support and build entrepreneurship.Ms. Banks designed this program in an effort to create awareness ...
 
Akancha Against Harassment is a campaign spearheaded by entrepreneur and branding consultant, Akancha Srivastava. After having faced online harassment herself, she wrote about her experiences to create meaningful dialogues and fight against online harassment. This menace has claimed many lives and every single person who has access to the internet is vulnerable to it. Young children are being targeted, teenagers are blackmailed and in many instances, the victims have ended their lives under ...
 
Welcome to the Swansea Cyber Law & Security Podcast. Sara Correia and Patrick Bishop bring you some news and discussion on the cyber law and security happenings of the last month. The views expressed on this podcast are personal and do not represent those of our employers or partner organisations. ​ - Sara Correia is an ESRC doctoral researcher at the Hillary Rodham Clinton School of Law - formerly the College of Law and Criminology, Swansea University (@SGCorreia). - Dr. Patrick Bishop is a ...
 
Nick Hewer and an expert panel discuss major global business trends, their impacts on the insurance industry and the challenges they pose to insurance brokers. At a time when business and technology are constantly changing, which fundamental worldwide shifts will have the greatest impact on businesses, and entire industries? What risks do we need to mitigate against, and which changes offer the most exciting opportunities? A podcast series by Allianz Insurance. Want to find out more about (B ...
 
Inspire, Empower and Guide people to their very best… Be THE SENSEI LEADER! Walking the Walk is the official podcast of THE SENSEI LEADER Program. We feature personal conversations with today's most influential leaders, speakers and authors to support you in your personal and professional life as a leader. Learn more about THE SENSEI LEADER at TheSenseiLeader.com FREE ebook on your first visit!
 
Brett Johnson and Karisse Hendrick are both anti-cybercrime experts. But, with very different experiences. Karisse has worked with hundreds of the World's largest e-commerce and mobile companies to help them prevent payment fraud and other threats to their bottom line and customers. Brett, started his journey as an online fraudster, creating the first darknet forum for buying & selling credit cards and was responsible for creating the criminal enterprise that commits identity theft, credit c ...
 
Ann Johnson, CVP of the Cybersecurity Solutions Group at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of tools and systems powered by AI, IoT, machine learning, and other emerging technology, as well as the impact on how humans work, communicate, consume information, and live in this ...
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIO's, CEO's and CISO's discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry called cyber security.
 
Information is now the fuel behind business, politics and many aspects of our personal lives. This information is no longer just sitting in our enterprise data center – it is on our mobile devices, in the cloud and in many places we never imagined. In this podcast we discuss the latest trends and issues affecting Security, Service Management, Mobile Computing and the Cloud. Hosted by Caleb Barlow, Vice President - Strategic Initiatives at IBM, he features topics for both business executives ...
 
A new podcast series by Discovery Business Insurance presents inspiring, expert-led content to empower entrepreneurs with insights that will help them start a business, grow and achieve success. The Healthy Business Show features well-known business luminaries from a diverse range of areas that are vital to an entrepreneur’s business health. Listen to the podcasts to gain knowledge that'll help you make better business decisions and inspire you to entrepreneurial success. Your Healthy Busine ...
 
Tax inVoice is the official podcast of the Australian Taxation Office (ATO). At the ATO, we want tax and super to be as easy to understand as possible, so we're doing things a bit differently. Each episode, we invite industry experts to sit down with ATO’s senior leaders to ask them the questions. Hear about the tax topics and issues you want to know about, straight from the source. Listen now to keep up to date with the latest tax and super information and how you can meet your obligations. ...
 
Sick Sad World is a bi-weekly podcast on the dark and macabre. Co-Hosts Mari and Jasmine will take on grisly murders, spooky ghost stories, alien tales, and all things creepy, bringing their unique perspectives and (hopefully) witty banter. New episodes every other Friday! (Content warnings included before each story) If you’d like to share a spooky story, suggest a theme or case, or just want to let us know how lovely we are, send us an e-mail at sicksadworldpod@gmail.com. Mari is a nonbina ...
 
Loading …
show series
 
What does the Future of Cybercrime Look Like? Find out in this solo Brett Johnson episode. Brett interviews a well-respected cybercriminal who owns several Telegram Channels. But there is a catch. The guy refuses to have his voice heard and will only communicate by text. For our listeners and because Brett Johnson is THAT guy? Brett plays the part …
 
Police are hoping to stop kids becoming cybercriminals by bombarding them with Google Ads, phishers rub their hands in glee at the NHS track and trace service, and just how does a nano-layer of quantum holographic catalyzer technology make a USB stick cost hundreds of pounds? All this and much much more is discussed in the latest edition of the "Sm…
 
Protest groups sustain DDoS attacks, too. Old school denial-of-service afflicts police radio networks in Chicago: they’re being jammed with talk, music, and other noise. Influencers and wannabes continue to use unrest as an occasion for on-line branding. The Sodinokibi gang is selling data stolen in ransomware attacks, and Maze seems to be establis…
 
Sponsored By: www.mastercard.us/en-us.htmlFor more of our podcasts visit: cybersecurityventures.com/podcasts/For more on cybersecurity, visit us at cybersecurityventures.com/Follow Cybersecurity Ventures / Cybercrime Magazine here:LinkedIn: linkedin.com/company/cybercrime-magazine/Twitter: twitter.com/CybersecuritySFApple Podcasts: Cybercrime Magaz…
 
Jen Ellis focuses on cybersecurity policy for Rapid7. Working with governments, manufacturers, and operators, Jen strategizes on policies and practices that will actually disrupt cybercrime at scale. By changing the behavior of attackers through complexity and costs, these strategies can truly disrupt cybercrime. We'll discuss some of the latest st…
 
Today Searches of phones defined further https://arstechnica.com/tech-policy/2020/05/just-turning-your-phone-on-qualifies-as-searching-it-court-rules/ AP tests teach us about user experience https://www.theverge.com/2020/5/20/21262302/ap-test-fail-iphone-photos-glitch-email-college-board-jpeg-heic Facebook may move on cheaper labor https://www.mark…
 
The culture of computers and information technology evolves quickly. In this environment, how can we build a culture of security through regulations and best practices when technology can move so much faster than legislative bodies? The Future of Cyber Podcast Series explores whether we can use the innovations of the past to address the problems of…
 
Co-Founder and CEO Casey Rosenthal and Co-Founder and CTO Aaron Rinehart of Verica join us today to talk Chaos Engineering and Security, Continuous Integration, Delivery, Verification, and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode186…
 
Today France and Germany launch Gaia-X – what is that? https://www.reuters.com/article/us-europe-tech/france-germany-back-european-cloud-computing-moonshot-idUSKBN23B26B Google and iOS for physical security keys https://www.theverge.com/21279454/google-accounts-nfc-usb-c-lightning-security-keys-ios-apple-log-in AND Hire or Wire – what is it, and wh…
 
It’s mostly cyberespionage today, with an admixture of influence operations. Google has warned both major US Presidential campaigns that Chinese and Iranian intelligence services are after their staffers’ email accounts, so far apparently without much success. Russia, China, and Iran devote some purposive media attention to US civil unrest. Johanne…
 
Whether you are deploying your own software or someone else's software, there are a chain of dependencies that likely includes vulnerabilities. From the base OS image, to utilities, to frameworks and app servers, to language specific libraries, all can contain vulnerabilities. Not only can they contain vulnerabilities, but the chain of dependencies…
 
SureCloud Launches Cyber Resilience Assessment Solution, Blackpoint Cyber launches 365 Defense - a Microsoft 365 security add-on for its MDR service, Endace and Palo Alto Networks Cortex XSOAR enable accelerated forensics of cyberthreats, Zscaler acquires Edgewise Networks, WatchGuard Technologies Completes Acquisition of Panda Security, and more! …
 
Today California’s Privacy Law now fully fleshed out Trend Micro identifies a new scary Phishing vector https://www.techradar.com/news/forget-sextortion-scams-were-more-worried-about-deepfake-ransomware AND CES says they’re still on in Vegas in 2021 https://www.engadget.com/ces-2021-in-person-covid-19-coronavirus-163342511.html…
 
Bill Coletti is a reputation management, crisis communications and professional development expert, keynote speaker and Wall Street Journal Risk & Compliance panelist. His best-selling book is: Critical Moments: The New Mindset of Reputation Management. He has more than 25 years of global experience managing high-stakes crises, issues management, a…
 
Nuisance-level hacktivism continues to surround US protests. The Higaisa APT is active in Southeast Asia. Goblin Panda is back, with USB-borne malware. A new strain of ransomware is described: “Tycoon.” The EU considers whether to sanction Russia over the GRU’s hack of Germany’s Bundestag. CISA launches a new public resource for cybersecurity. Zulf…
 
Jeff loves PCI DSS. Josh has been a fierce critic of it... and... Josh has been working with public policy... We'll dig into the nuances and offer better ways to tell good from bad policy incentives. Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/SCWEpisode30…
 
Today Zoom’s security rollout has a specific strategy to work with law enforcement https://thenextweb.com/security/2020/06/03/zoom-wont-encrypt-free-calls-because-it-wants-to-comply-with-law-enforcement/ Edge computing – who do customers turn to? https://channelnomics.com/2020/06/03/theres-a-disconnect-between-telecoms-edge-report/ AND Microsoft Ed…
 
Jeff loves PCI DSS. Josh has been a fierce critic of it... and... Josh has been working with public policy... We'll dig into the nuances and offer better ways to tell good from bad policy incentives. Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/SCWEpisode30…
 
3D Secure is a payer authentication, a security protocol that helps to prevent fraud in online credit and debit card transactions. Credit card thieves worry about it. Many merchants haven't adopted it. Brett and Karisse discuss what it is and what it means in the fight to protect against credit card fraud that merchants face every day. Learn more a…
 
Today Samsung launches an offer that tech services companies do not want to miss https://9to5google.com/2020/06/01/samsung-access-launches-in-the-us-w-extended-warranties-microsoft-365-more/ https://www.thurrott.com/mobile/235946/samsung-offers-subscription-service-with-galaxy-s20-and-microsoft-365-personal Lessons from three moves in the time of c…
 
In the Leadership and Communications section, CISO vs. CEO: How executives rate their security posture, 3 Reasons Why Cybersecurity Is Not A Technical Problem, How to Be a Great Listener in Remote Meetings and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode175…
 
Unrest accompanied by misinformation, disinformation, and Anonymous theater. Booter hacktivism. Extremist inauthenticity. The Cyberspace Solarium Commission releases its white paper on the pandemic’s lessons for cybersecurity. Joe Carrigan unpacks Casio executing a DMCA takedown on a hardware hack. Our guest is Herb Stapleton from the FBI on the 20…
 
Sign up for the conference: https://www.breakingsecurityawareness.com/Sponsored by: https://livingsecurity.com/For more on cybersecurity, visit us at https://cybersecurityventures.com/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/Twitter: https://twitter.com/CybersecuritySF…
 
Sponsored By: https://ironscales.com/For more on cybersecurity, visit us at https://cybersecurityventures.com/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/Twitter: https://twitter.com/CybersecuritySFApple Podcasts: Cybercrime Magazine Podcast…
 
Jen Ellis focuses on cybersecurity policy for Rapid7. Working with governments, manufacturers, and operators, Jen strategizes on policies and practices that will actually disrupt cybercrime at scale. By changing the behavior of attackers through complexity and costs, these strategies can truly disrupt cybercrime. We'll discuss some of the latest st…
 
Apps are everywhere. Increasingly apps are the main entry point for daily services such as banking, home security or even unlocking a car. But mobile devices are untrustworthy: a place where hackers can reverse engineer apps, tamper with them, and steal the secrets they hold. As apps become the new endpoints, it’s high time to reconsider their secu…
 
In the Leadership and Communications section, CISO vs. CEO: How executives rate their security posture, 3 Reasons Why Cybersecurity Is Not A Technical Problem, How to Be a Great Listener in Remote Meetings and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode175…
 
Today Three tech stories within the unrest in the US https://www.bloomberg.com/news/articles/2020-05-31/amazon-calls-delivery-drivers-back-closes-hubs-near-protests?sref=ExbtjcSG https://www.channelpartnerinsight.com/news/4015895/absolutely-abhorrent-tech-ceos-voice-outrage-us-justice-death-george-floyd https://www.businessinsider.com/internal-stri…
 
Attackers are using methods such as password spraying and credential theft to commit fraud against websites at an alarming rate. Automated bots are aiding the attacker to conduct these operations at scale. Your defensive strategy should include a mechanism to determine if a session is being controlled by a real user or a bot. How can we best accomp…
 
Hacking, and more claims of hacking, surround the unrest in Minnesota. Data breach at Amtrak Guest Rewards. More companies found port scanning. Four cybersecurity lessons from the pandemic. David Dufour from Webroot with an overview of online scams his team is tracking during COVID-19, Our own Rick Howard compares resiliency with business continuit…
 
The 2020 presidential election is just around the corner, and cybersecurity is once again at the forefront. From disinformation campaigns and election-related vulnerabilities to lockdowns and vote by mail efforts due to COVID-19, we cover it all — and more — in this jam packed episode featuring returning favorite, John Dickson, Principal at Denim G…
 
Karisse follows up on our recent podcast about Refund Fraud with a solo episode.giving advice to the merchants being victimized. Want to know what your company can do to stop one of the fasted growing forms of fraud? Listen to this episode and find out! Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
This is Dave Sobel's session from the SMB Online Conference entitled "Let's Get Topical". Description: "Sessions in the online conference have given lots of insight, so let’s break down how the trends of the day work. This online discussion will be interactive, as we’ll answer questions from the audience and discuss how to leverage news and informa…
 
In this episode of CyberWire-X, Rick Howard, the CyberWire’s Chief Analyst, interviews security thought leaders on the strategy and tactics to extend the security controls we’ve typically used to protect our handful of remote employees in the past to today, during the pandemic, that requires us to deploy flexible but equivalent controls at scale to…
 
Loading …
Google login Twitter login Classic login