Best Cybercrime podcasts we could find (Updated February 2019)
Related podcasts: Cyber Tech Business Cybersecurity Privacy Security Hacking News Business News Society Education Cyberwarfare Computer Security Infosec Crime Technology Higher Education #17ps #femalenotfeemale Alastair Hunte  
Cybercrime public [search 0]
×
Join millions of Player FM users today to get Cybercrime news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018."Follow the podcast on Twitter at @SmashinSecurity, and subscribe in Castbox or your favourite podcast app. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
Cyber Security and Wireless Tech Expert and Author Scott Schober delivers the latest cybersecurity news, tips, reviews and interviews with industry experts.
 
a
a16z
Weekly
 
The a16z Podcast discusses tech and culture trends, news, and the future -- especially as ‘software eats the world’. It features industry experts, business leaders, and other interesting thinkers and voices from around the world. This podcast is produced by Andreessen Horowitz (aka “a16z”), a Silicon Valley-based venture capital firm. Multiple episodes are released every week; visit a16z.com for more details and to sign up for our newsletters and other content as well!
 
R
Risk & Repeat
Monthly+
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
O
Otherwise?
Monthly+
 
Otherwise is a weekly show that explores Kenyan current affairs issues as chosen by you. Visit our site at www.otherwisepodcast.com
 
Râmnicu Vâlcea, Romania has only 120,000 residents, but among law enforcement experts around the world, it has a nickname: Hackerville. In the last year alone, $1 billion was stolen in the U.S. by Romanian hackers. Convicted criminals with nicknames like Guccifer and Iceman have been caught breaking into the email accounts of NASA, Hillary Clinton and George W. Bush—but that’s just the beginning. The world is finally waking up to the realities of cybercrime and the threats that it poses to o ...
 
Like a rowdy carpool, or sitting in the bar car on the train home, join us for a raucous roundtable discussion of topics from big (politics) to small (obscure movie minutiae). Hosted by screenwriter/filmmaker C. Jay Cox, regular panelists include Jackie Monahan, Dommy Siclari, Julie Perkins, Chip Phillips, Helen McElwain & Greg Ivan Smith.
 
Armen Najarian, CMO of ThreatMetrix, talks to executives and industry experts at the forefront of the emerging digital economy.
 
Partnered with the University of Cincinnati School of Criminal Justice, this podcast aims to educate, inform, and promote awareness of criminal justice issues and research. http://cech.uc.edu/criminaljustice.html
 
I
In beta
Rare
 
In beta is a podcast which investigates the big questions facing human rights in the digital environment.It's created and delivered by Global Partners Digital (GPD) – a social purpose company dedicated to fostering a digital environment underpinned by human rights and democratic values.
 
Raj Lala, President & CEO of Evolve ETFs, joins industry experts to discuss topics such as; cyber security, artificial intelligence (A.I.), auto innovation (including electric and self-driving cars), blockchain, ETFs, and more.
 
The Ready Business Show is about inspiration, great insights, and real-life stories of blood, sweat and tears from people who have tried, failed and succeeded in business in Ireland.For more: http://www.independent.ie/podcasts/ready-business/(Opening tune by RedKid – www.redkidtheband.com)
 
Podcast by Navigant
 
The Cracking Cyber Security podcast from TEISS is dedicated to cracking cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
 
S
Sherri Jefferson
Monthly
 
2019 - CONVERSATIONS WITH SHERRI JEFFERSON. Unlock Your Potential.Each episode is informative, inspiring, and innovative. Explore issues and challenges facing our homes, schools, and communities. Call 646-727-2566 LISTEN LIVE, ITUNE OR ON DEMANDMore about Sherri Jefferson#FemaleNOTFeemalewww.SherriJefferson.com www.SherriJeffersonPublishing.com
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIO's, CEO's and CISO's discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry called cyber security.
 
There are more information security and privacy threats than ever before. As more technologies emerge, more big data analytics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the ...
 
P
Privacy Now TV
Monthly+
 
Privacy Now TV is your weekly source of news, tips and tricks for online security and privacy.
 
U
UBM Radio
Weekly+
 
UBM Radio is the audio home of Interop, InformationWeek, Dark Reading, Network Computing, Bank Systems & Technology, EETimes, and more. Several times each week, the various channels of UBM Radio will present interviews and panel discussions with enterprise technology leaders and experts, all designed to help CIOs boost the efficiency of their IT operations and investments, freeing resources for innovation.Best of all, each show will feature live chat on the channel's home page, where you can ...
 
B
Brent MacLean
Rare
 
The Cyber Crime Report. The show that discusses and educates the public about online and offline security recommendations in today's world. The show that deals with computer related and national security, cyber crime, and areas affiliated with your personal and corporate safety. For more information, please goto www.jbm.net. and www.thecybercrimereport.com. Safe Surfing. Please rate our show. Sign up for our weekly newsletter for perils of wisdom in this growing and exponential problem in No ...
 
Strictly Business Radio is a radio talk show highlighting businesses from Start-Up to sensational.The program features a variety of business owners from many industries including banking, energy, retail, technology, manufacturing, health-care, law, construction, and professional services. Created, hosted and produced by business coach and consultant, Anna D. Banks, this program is designed to support and build entrepreneurship.Ms. Banks designed this program in an effort to create awareness ...
 
Loading …
show series
 
with Ryan Caldbeck (@ryan_caldbeck), Jeff Jordan (@jeff_jordan), and Sonal Chokshi (@smc90)It's clear that all kinds of commerce companies and consumer products have been disrupted -- or enabled -- by tech. Yet for certain categories, like consumer packaged goods (CPG), it seems like tech hasn't changed things very much. How is the rise of so-c ...…
 
with Kate Darling (@grok_) and Hanne Tidnam (@omnivorousread)We already know that we have an innate tendency to anthropomorphize robots. But beyond just projecting human qualities onto them, as we begin to share more and more spaces, social and private, what kind of relationships will we develop with them? And how will those relationships in tu ...…
 
Kenya is flagged as a source, transit, and destination country for persons subjected to forced labour and sex trafficking in East Africa by the Trafficking in Persons Report of 2018. We continue to host illegal recruiters who maintain networks in Uganda and Ethiopia. They recruit Kenyan, Rwandan, Ethiopian and Ugandan workers through fraudulent ...…
 
We talk about naked parties and then get into how badly people treat servers.
 
Is two factor authentication such a pain in the rear end that it's costing the economy millions? Do you feel safe having a Google Nest in your home? And don't get caught by a catfisher this Valentine's Day. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Clul ...…
 
Is two factor authentication such a pain in the rear end that it's costing the economy millions? Do you feel safe having a Google Nest in your home? And don't get caught by a catfisher this Valentine's Day. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Clul ...…
 
The Pretty Good Privacy (PGP) encryption tool became freely available in 1991, drastically improving data security. It also stirred the ire of US government folks who could not surveil on the encrypted data. Dr. Philip Zimmermann, PGP creator, was then made target of a 3-year criminal investigation, while PGP became the most widely used email e ...…
 
with Chris Burniske (@cburniske), Joel Monegro (@jmonegro), Denis Nazarov (@Iiterature), and Jesse Walden (@jessewldn)When designing cryptonetworks -- really, emerging economies -- how do we avoid some of the monetary and fiscal policy failings of "real-world" economies? Like not separating currency and capital, which accelerated and spread eco ...…
 
with Phil Daian (@phildaian) and Ali Yahya (@ali01)Whether in corporations, boardrooms, or political elections, voting is something we see in all kinds of social systems... including blockchains. It's the natural human tendency for how to organize decisions, and in distributed systems without centralized middlemen, it's the only clear Schelling ...…
 
This week's Risk & Repeat podcast looks at Apple's decision to temporarily revoke Facebook's and Google's enterprise certificates following reports of questionable app activity.By Rob Wright.
 
This week on the podcast we are talking with Naaman Haart, a UK-based threat hunter for the cybersecurity company, Digital Guardian. The role of the Threat hunter is a fairly new one within the industry and on this episode Naaman discusses the ins and outs of what the job entails, as well as how he hunts for, investigates and quarantines threat ...…
 
Kenya is set to begin open field trials of GMO cotton in March 2019, following the approval for national performance trials by the National Environment Management Authority (NEMA) in 2018. [In June 2018, it was reported that Kenya would start growing GMO cotton on a commercial basis in 2019.] This would make us the first in East Africa to grow ...…
 
Jack Rhysider from the "Darknet Diaries" podcast joins us to chat about his interview with the elusive Hacker Giraffe, how a death is preventing cryptocurrency investors from reaching their money, and how 'beauty camera' apps are redirecting users to phishing websites and stealing their selfies. All this and much much more is discussed in the l ...…
 
Jack Rhysider from the "Darknet Diaries" podcast joins us to chat about his interview with the elusive Hacker Giraffe, how a death is preventing cryptocurrency investors from reaching their money, and how 'beauty camera' apps are redirecting users to phishing websites and stealing their selfies. All this and much much more is discussed in the l ...…
 
Government leaders & law enforcement are trying to force tech companies to put backdoors in encryption in the name of public safety. There are 750,000 law enforcement employees & 1/2 million US intelligence agencies community employees who may use those backdoors, & likely many others worldwide. Strong encryption is available throughout the wor ...…
 
with Jyoti Bansal (@jyotibansalsf), Peter Levine, Satish Talluri (@satishtalluri), and Sonal Chokshi (@smc90)One of the toughest challenges for founders -- and especially technical founders who are used to focusing so much on product features over sales -- is striking "product-market fit". The concept can be defined many ways, but the simple de ...…
 
On this week’s episode, we talk to cyber security company Tanium’s CEO Orion Hindawi and Chief Technology Officer, Ryan Kazanciyan, at their yearly conference, CONVERGE. Is it fair to label vendors as the snake oil of the cyber security industry? How can CISOs measure risk and present their findings to the board in a comprehensive way? Can comp ...…
 
In this episode Frank is joined by Jason Lane-Sellers, Director of Solution Consulting for ThreatMetrix. They explore threats to the telco industry, and the unique position of telcos in the new digital landscape. Transcript Frank: Hey everybody. Welcome to another edition of Digital Identity 360. We’re privileged to have Jason Lane-Sellers with ...…
 
After 32 years of the 8-4-4 curriculum, the new 2-6-3-3-3 curriculum rolled out early in January 2019. Its goal is to provide quality education and training policies for all. It aims to improve access, quality, relevance and equity in line with international, regional and national policies, as well as legal commitments, and move us closer towar ...…
 
with Mark Leslie (@mleslie45) and Peter LevineWhat does it actually take to win at enterprise sales? In this episode, Mark Leslie, former CEO and chairman and founding team member of Veritas Software, and a lecturer at the Stanford Graduate School of Business, and a16z general partner Peter Levine -- who worked together at Veritas -- share stor ...…
 
A FaceTime bug allows callers to see and hear you before you answer the phone, Facebook's Nick Clegg tries to convince us the social network is changing its ways, and IoT hacking is big in Japan. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Caro ...…
 
A FaceTime bug allows callers to see and hear you before you answer the phone, Facebook's Nick Clegg tries to convince us the social network is changing its ways, and IoT hacking is big in Japan. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Caro ...…
 
We talk about the scams that we may, or may not have fallen victim to and then we come up with our own new ideas how to scam people.
 
with Peter Levine, Bob Tinker, and Hanne Tidnam (@omnivorousread) For consumer companies, often when the holy grail of product-market fit is achieved, the company takes off: magic happens, growth unlocks. Enterprise B2B companies face a different challenge. Sometimes, despite achieving product-market fit (and knowing when you've achieved it) an ...…
 
Learn about how artificial intelligence (AI) and cyber security are intertwined, the association of increased connectivity to cybercrime, the trade-off between convenience and privacy, the impact of GDPR (General Data Protection Regulation), top predictions, and more. • About Carole Piovesan • Carole Piovesan is Lawyer, Lead in Artificial Intel ...…
 
Medical cannabis is legal in 33 US states, Washington, D.C., & 4 US territories. Ten states allow legalized sale of adult use marijuana. Many more are projected to legalize in 2019. Those using cannabis dispensaries assume their personal data is secured, and many incorrectly believe paying cash will leave no record of the purchases. Many risks ...…
 
Veterinary oncology can inform human oncology, and vice versa -- providing a better model for looking at drug performance, interrelationships, and more. Especially when you add in data (there's no "doggy HIPAA!") and networks to get a "living laboratory at scale".Or so argues Amy Abernethy (Chief Medical and Chief Scientific Officer at Flatiron ...…
 
In this episode Chad Boeckmann interviews Adam Stone about the new California Consumer Privacy Act of 2018 (CCPA). The discussion leads off with the comparison of GDPR to CCPA some similarities and differences between the two. The latter half of the interview dives into a role-play of scoping a business for CCPA compliance. Adam guides our list ...…
 
On 20th January 2019, we found out that while we were busy enjoying our holidays, Uhuru Kenyatta was busy passing new laws, and changes to old ones through a Miscellaneous Amendment Act. One of the most controversial amendments was the one to the Registration of Persons Act, which added new requirements for both location data (such as GPS coord ...…
 
Business email compromise evolves to target your company's payroll, how the world's largest gold coin was stolen from a Berlin museum, and are internet giants feeling the heat yet over data security? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and ...…
 
Business email compromise evolves to target your company's payroll, how the world's largest gold coin was stolen from a Berlin museum, and are internet giants feeling the heat yet over data security? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and ...…
 
This week's Risk & Repeat podcast looks at the claims of the Democratic National Committee that Russian hackers tried to breach its network following the midterm elections.By Rob Wright.
 
We're starting this season off by publishing closer to our recording date. In this episode we are joined by comedian MATT GALLAGHER (check out his special "A STUMBLE IN THE WOODS" on Amazon) We talk about kids who are awful and end up discussing self strangulation. wtf?
 
Kristin Judge brings a very interesting background in counseling, teaching, public service and leadership to drive cybersecurity awareness and learning to the masses. Ron Woerner and Kristin have a conversation about the qualities of a good leader and how this can translate into driving change and awareness across the cyber security landscape. ...…
 
2018 privacy hero of the year, Tara Taubman-Bassirian, discusses the EU GDPR, the increasing need for protecting privacy in the increasingly technology-rich environment, and some activities for Data Privacy Day on January 28, 2019. What are the benefits of GDPR? Where can it be improved upon? What do companies struggle with most for GDPR compli ...…
 
Would you eat or be eaten is the question this week. We end up talking about cannibalism and Dommy assumes there's always an emergency supply of BBQ sauce on hand if your plane crashes in the mountains. Then, as if the discussion wasn't gruesome already, we talk about how to get rid of a dead body.
 
In this episode, Rulon Stacey, a managing director and leader of Navigant’s healthcare strategy business unit, discusses the trends that will significantly impact healthcare in 2019 and beyond, as well as the steps providers and payers should take to prepare for their futures. The healthcare trends that are shared in this podcast are based, in ...…
 
On this week’s podcast TEISS speaks with Detective Superintendent Andrew Gould - Head of the Metropolitan Police Cyber Crime Unit about how the Met is tackling international cybercrime, how well nation states cooperate when it comes to tracking down the criminals and what he’s learned from previous work in counter terrorism that is helping in t ...…
 
with Joel de la Garza, Jonathan Lusthaus, and Hanne Tidnam (@omnivorousread)The idea of the cybercriminal as lone wolf or hobby hacker is no longer much of a reality. Instead, the business of cybercrime looks a lot more just like that -- a large, global technology business, with many of the associated structures, challenges, and even casts of c ...…
 
In this episode Frank is joined by Dan Welch, SVP of Global Services at ThreatMetrix. They explore the power of the network approach to fighting fraud, the benefits of the champion/challenger model, and the upward trend of the mobile channel. Transcript Frank: Hey, everybody. Welcome to another edition of Digital Identity 360. I am privileged a ...…
 
In the aftermath of the attack on 14th Riverside on 15th January 2019, many citizens asked how they could help ease the situation, as well as assist the victims of the disaster. Today we’re joined by Naomi Mutua, a digital PR specialist and a citizen responder who has been at the front-lines of organizing responses to crises, to discuss this. P ...…
 
with Benedict Evans (@benedictevans) and Steven Sinofsky (@stevesi)Every year, the Consumer Electronics Show (CES) puts the latest and greatest developments in consumer technology on display in Vegas. But beyond the excitement and the hype, what's really here -- or not here -- to stay? Will televisions roll up into tiny boxes? Will Alexa find h ...…
 
Why a business spat resulted in Liberia falling off the internet, how the US Government shutdown is impacting website security, and the perplexing world of extreme IoT devices. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joine ...…
 
Why a business spat resulted in Liberia falling off the internet, how the US Government shutdown is impacting website security, and the perplexing world of extreme IoT devices. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joine ...…
 
Find out how Canada's gender-balanced cabinet has changed the dynamic and views within the government over the past few years; the three biggest challenges in closing the overall gender gap; what is being done to encourage females to enter the STEM (Science, Technology, Engineering and Mathematics) fields; and gender diversity in the United Sta ...…
 
This week's Risk & Repeat podcast looks at the expiration of more than 80 TLS certificates for U.S. government websites amid the ongoing government shutdown.By Rob Wright.
 
with Susannah Fox (@susannahfox), Anil Sethi (@anilsethiusa / @ciitizencorp), Vijay Pande (@vijaypande), and Sonal Chokshi (@smc90) The problem of "dark data" in healthcare isn't just a feel-good empowerment thing, but a structural issue that leads to miscommunication and extra friction, different players in the entire healthcare system not bei ...…
 
There have been concerns about the ethical use of technology, data, and the results of processing for many decades. We are now dealing with additional emerging ethical issues involving big data analytics, artificial intelligence and the associated biases, the use of personal data found online that is not protected, and also for data that is gen ...…
 
with Vas Narasimhan (@vasnarasimhan), Jorge Conde (@jorgecondebio), Vijay Pande (@vijaypande), and Sonal Chokshi (@smc90)On average, only 1 out of 20 medicines works when we actually bring them into the human body, and these rates of success haven't moved much in the pharma industry overall in the past 15 years, despite much scientific progress ...…
 
In this episode, Dommie throws things at birds, C. Jay has a problem with color-blind casting, and we make our psychic predictions for 2019!
 
Google login Twitter login Classic login