Data Hackers public
[search 0]
More

Download the App!

show episodes
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
Reveal is for revenue leaders who want to reach their fullest potential. Every week we interview sales practitioners, leaders, and experts to explore how they use revenue intelligence – a new way of operating based on data instead of opinions – to win their market. You’ll hear candid stories of success (and failure), how to win with a data-first mentality, plus you’ll take home a micro action you can use today. Hosted by sales practitioner turned marketer, Devin Reed, and category designer, ...
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
 
The Develomentor podcast is an interview-based show designed to help you find your path in technology. Each interview explores the career path and lessons learned of individuals who have built successful careers in technology across a range of roles, including software engineering, data science, engineering management and sales engineering. A monthly bonus episode features a panel discussing timely topics in technology, like compensation, freelancing, joining a startup and much more.
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Tech on Reg is the podcast that explores all things at the intersection of law, technology and high regulated industry. Host Dara Tarkowski talks FinTech, RegTech, SexTech and more with thought leaders and entrepreneurs from around the world to share insights, trade viewpoints and get us all thinking about responsible innovation.
 
“Unprecedented” is a biweekly podcast hosted by Law.com reporter Ben Hancock about technology, the law, and the future of litigation. Based in San Francisco, Ben writes about third-party litigation finance, legal data analytics, artificial intelligence, privacy, and related issues. Listen to more Law.com podcasts here.
 
Welcome to the Cybrary Podcast! In this show, we will be speaking with current leaders and experts in the IT and Cybersecurity fields. Discussing topics from DevSecOps and Ransomware attacks to diversity and the retention of talent the Cybrary Podcast covers it all. Come join us on Cybrary and get to your Next Level! Want authorized access to the top security tips from the experts in InfoSec? Bi-weekly, join Thycotic’s ethical hacker Joseph Carson and the cybersecurity training experts from ...
 
Welcome to Start FM, hosted by active real estate investor and entrepreneur, Chad Duval. Struggling to buy your first rental property or start a business? He’s been there too. It took him years to conquer the fear, anxiety and confusion surrounding the first deal. In the show, Chad unpacks the stories of successful real estate investors, business owners and high performing athletes to discover their key's to starting any endeavor. Find out more about the show at www.chadduval.com and on Inst ...
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
 
Technically Legal is a podcast about legal tech, legal innovation and the impact of tech on the law and legal industry. In each episode we interview an innovator in the legal industry. Guests discuss how they are implementing legal technology and innovation into their legal departments and law firms and how listeners can too. The podcast is hosted by Chad Main, an attorney and founder of Percipient, a tech-enabled legal services provider. Chad launched Percipient on the belief that when tech ...
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
The Bid Picture is a weekly podcast that provides useful and actionable cyber intelligence by examining cybersecurity news and events, and how we can learn from them and apply those lessons to our daily lives.For questions, comments, or any suggestions on which topics you would like to hear about on future episodes, please send an email to bidemi@thebidpicture.com. Thank you for your time, and God bless.
 
Grab your weekly technology without having to geek out on TechTime Radio with Nathan Mumm. The Technology Show for your commute, exercise, or drinking fun. Listen to the best 60 minutes of Technology News and Information in a segmented radio format while sipping a little Whiskey on the side. We cover Top Tech Stories with a funny spin, this is a show that allows you to listen once a week and stay up-to-date on technology in the world without getting into the weeds. This Broadcast style forma ...
 
Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organ ...
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
A new second-stage backdoor has been found in a SolarWinds compromise victim. Those exploiting the now-patched Exchange Server zero days seem to have done so to establish a foothold in the targeted systems. India continues to investigate a Chinese cyber threat to its infrastructure. Misconfigured clouds leak mobile app data. A major airline IT prov…
 
Close the door. There is no more room. We resolved the cybersecurity skill gap problem, and it feels damn good! Well, maybe not, but is it really that hard? There are so many smart people out there that would do very well in InfoSec—do they even know this is an option? Would you dream of going to the moon if you never looked up to the sky? And even…
 
In this episode of Tech Done Different, Ted chats with Dr. Keri Pearlson, Executive Director of MIT's cybersecurity research organization, CAMS. She shares insight from her team's research into how companies of all sizes can build a strong security culture, even for little or no cost. You'll learn: why tech alone can't stop attackers, because they'…
 
Theresa Payton, CEO of Fortalice Solutions and former White House CIO, shares with us a little on how she got into cybersecurity. Theresa is also featured in the book Women Know Cyber: 100 Fascinating Females Fighting Cybercrime available on Amazon at https://amazon.com/Women-Know-Cyber-Fa…crime/dp/1733015701 • For more on cybersecurity, visit us a…
 
Adam Keown, Director Information Security and Global CISO at Eastman Chemical Company, joins host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, in this episode of the CISO 500. Adam shares how he got into cybersecurity after being in the FBI for 10 years, what it's like being a CISO and getting an organization from being reactive t…
 
The federal Lifeline program was intended to bridge the gap between Americans who could comfortably pay for phone and internet service, and those who couldn’t. But in the midst of the pandemic, Lifeline is falling woefully short. How did a program meant to help connect low-income Americans with phone and internet service ended up making them second…
 
A close look at how the latest silicon chips are made, what they’re used for, and why they represent “the new space race” at the heart of US-China rivalry. Presented by Rory Cellan-Jones, with BBC Online tech editor Leo Kelion. Produced by Jat Gill.(Image: Illustration with the flags of China and the USA behind a silicon chip, Credit: Getty Images)…
 
Indian authorities say October’s Mumbai blackout was “human error,” not cybersabotage. CISA directs US civilian agencies to clean up Microsoft Exchange on-premise vulnerabilities. More effects of the Accellion FTA supply chain compromise. Some trends in social engineering. Andrea Little Limbago brings us up to date on the RSA supply chain sandbox. …
 
John Steven is an industry expert and the CTO of Concourse Labs. In this episode of Cybercrime Radio, he weighs in on what threat modeling is, why it's essential for enterprises, and what lies ahead. This episode is brought to you by ThreatModeler, an automated threat modeling solution that secures and scales the enterprise software development lif…
 
As secure as the mainframe is, it is still another operating system with software running on it. Many information security programs tend to offer these systems special treatment, exemptions, and exceptions — especially when it comes to zero-trust frameworks. One organization — Key Resources — has been looking at this problem for quite some time, an…
 
Michal Braverman-Blumenstyk wears many hats at Microsoft Israel, which include Corporate Vice President, General Manager of Israel R&D Center, and CTO Cloud & AI Security. In this episode of Cybercrime Radio, she shares with us what got her interested in cyber, what's happening in the Israel cyber startup ecosystem, what's ahead for Microsoft Israe…
 
Daniel Tunkelang is currently an independent consultant or, in his words, a 'high-class consultant' for technology companies. Previous to this, he was a data science and engineering executive who has built and led some of the strongest teams in the software industry. Daniel studied computer science and math at MIT and has a PhD in computer science …
 
A special 12-episode series with Women In Cyber at CrowdStrike. Host Hillarie McClure, Multimedia Director at Cybercrime Magazine, goes one-on-one with a cross-section of women working in various cybersecurity roles at CrowdStrike to explore what it’s like to work in one of the fastest growing industries in tech, why your background isn’t a barrier…
 
India continues to investigate the possibility of RedEcho cybersabotage of its power distribution system, but says any hack was stopped and contained. Microsoft issues an out-of-band patch against a Chinese-run “Operation Exchange Marauder.” The financial sector works to contain an Ursnif outbreak. CISA issues ICS security advisories. Myanmar and t…
 
In this episode, Gordon Lawson joins host Hillarie McClure to discuss his recent article in Forbes on what pro sports can teach cybersecurity, as well as the value of hands on training and objective metrics for employees. RangeForce offers the world's most comprehensive cybersecurity training and cyber skills assessment program. They believe in the…
 
Did we invent computers, robots, and A.I. because we are fundamentally lazy? It may look like it, but that is not the technological driver. On the opposite side, it has to do with doing more, faster, more effectively, and going above and beyond our human capabilities. This same thing can be said of a carved stone used as a tool by our ancestors, th…
 
Robert Johnson, III, President & CEO at Cimcor, Inc., and his special guests, sit down with Cybercrime Magazine to share data security best practices, trends, and more. Cimcor is the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com…
 
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard. https://mastercard.us/…
 
The history, current state and the impact of Artificial Intelligence on the Electronic Discovery Reference Model (EDRM) is the topic of conversation with George Socha. George currently serves as Senior Vice President of Brand Awareness for e-discovery software company, Reveal Data, but back in 2005, he founded the EDRM along with Tom Gelbmann. What…
 
Eric Romero of the City of Baton Rouge Information Services department discusses International Open Data Day, March 6th and the advances in Baton Rouge’s Open Data Platform, after almost 15 years of the smartphone, what’s next and who is going to lead, and 2021 promises to be a big ear for the Augmented Reality, AR, industry!…
 
Have you ever heard of single tenant sale lease back? I hadn't either. This episode explains what this is and why it makes sense for industrial real estate plus explains how the average investor can get involved in deals inside this niche. You can learn more about our guest, Neil Wahlgren, and his company Mag Capital Partners at magcp.com…
 
Calling all engineers! This week on the Cybrary Podcast, we welcome Zachary Ozer from ClubHouse. From one VP of Engineering to another, Mike and Zach talk all things development, product planning, and how to help junior and senior engineers be more effective and enjoy their jobs. Zach also offers key insights into how people at ClubHouse further th…
 
Indian authorities continue to investigate the possibility that Mumbai’s power grid was hacked last October. Apple’s walled garden’s security can inhibit detection of threats that manage to get inside. An Atlantic Council report recommends international action against access-as-a-service brokers to stall proliferation of cyber offensive tools. Ben …
 
Michelle Gomez has been called the No. 1 Bounty Hunter by multiple authorities. She uses skip tracing to locate targets and help bring them in. In this episode, she and AJ Barrera, President of Barrera Investigations, join host Steve Morgan to discuss her bounty hunting tactics and what occurred when she was trying to find Ryan Eugene Mullens. For …
 
Forget about stereotypes of hackers being nefarious masterminds. Hackers are dynamic, young individuals who come from all walks of life — diversity is a big plus for this community — and so it is for the cybercriminals, but they actually are nefarious masterminds. Countless people are building the applications and systems we use at work and at home…
 
Lori Sussman was one of the first women to attend West Point, created a successful career in both the public and private sector, and is now bringing her experience to the classroom. In this episode, Lori shares why teaching cybersecurity to the next line of cyber defenders of our nation is important, what the cyber scene in Maine is like, and more.…
 
Alissa “Dr Jay” Abdullah, Deputy CSO at Mastercard, shares with us a little on why she's proud to be in the book Women Know Cyber: 100 Fascinating Females Fighting Cybercrime available on Amazon at https://amazon.com/Women-Know-Cyber-Fa…crime/dp/1733015701 • For more on cybersecurity, visit us at https://cybersecurityventures.com/…
 
This week on the Application Security News, Implementation pitfalls in parsing JSON, finding all forms of a flaw with CodeQL, more educational resources for hacking apps, engineering and product management practices for DevOps, & more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw14…
 
In 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user details. Username and password hashes were then sold to people willing to buy. This episode goes over the story of what happened. Sponsors Support for this episode comes from Quadrant Information Security. If you need a team of around the clock analysts to…
 
In looking at how to do application security right we talk about understanding the difference between defining types of security testing and the goals that security testing should be aiming for. Plus, we highlight how doing security right also means shifting left in terms of addressing security issues in the design phase. And throughout all this is…
 
Chinese cyber engagement with Indian critical infrastructure is reported: the objective isn’t benign from India’s point of view, but exactly what the objective is, specifically, remains a matter of speculation. The US Governemnt declassifies its report on the murder of Saudi journalist Jamal Khashoggi. The SolarWinds supply chain compromise remains…
 
On Episode 37, We start out with Fry's going out of Business, we have health care data startup Truveta, Google-Sidewalk has two strikes will it strike out? We have two guests, one talks about MeetOval an IoT (Internet of the Things) smart home device with privacy, the other joins us talking about autonomous cars and issues with them. We have our To…
 
Roger Grimes is an industry expert and the Data Driven Defense Evangelist for KnowBe4. In this episode, Roger weighs in on the recent Oldsmar, Fla. water hack, how their sheriff's department's handled the situation well, and why this isn't the first or the last time we'll see hacks of this nature. KnowBe4 is the world’s first and largest New-school…
 
Sri Sundaralingam, VP of Security and Cloud Solutions at ExtraHop, helps us break down the silos between security and IT teams. “The Ground Truth” is a Cybercrime Magazine podcast series brought to you by ExtraHop. In this series, we will discuss how network data helps you get to the ground source of truth for cyber attacks. ExtraHop is a cyber ana…
 
This week’s interview features a special guest from Gong’s Global Kick-Off. Jill Harris, Sr Director of Sales at LogMeIn, shares how reps can keep their skills sharp during good times so that they’re prepared to succeed in tougher selling environments. You’ll learn how to keep up your intensity and productivity over the long run, what the future of…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login