Encrypted public
[search 0]
×
Best Encrypted podcasts we could find (updated August 2020)
Best Encrypted podcasts we could find
Updated August 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you on the journey of their new ones. A Linux Academy podcast showcasing free and open source technologies you can host yourself.
 
Hello! This is The Vergecast, the flagship podcast of The Verge... and your life. Every Friday, Nilay Patel and Dieter Bohn make sense of the week's tech news with help from our wide-ranging staff. And on Tuesdays, Nilay hosts in-depth, one-on-one interviews with major technology leaders. Join us every week for a fun, deeply nerdy, often off-the-rails conversation about what's happening now (and next) in technology and gadgets.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Conversations with the hackers, leaders, and innovators of software development. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
The AWS Podcast is the definitive cloud platform podcast for developers, dev ops, and cloud professionals seeking the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Jeff Barr for regular updates, deep dives and interviews. Whether you’re building machine learning and AI models, open source projects, or hybrid cloud solutions, the AWS Podcast has something for you.
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
 
Interested in what is going on in the world of blockchain and crypto assets? Want to understand how the most pioneering entrepreneurs, enterprises and governments are creating the digital economies of the future? Involving a range of superb guests of likeminded innovators, enablers, investors, government officials, executives and more, Encrypted takes you on a journey to make sense of what is going on in the Wild West of cryptocurrencies, understand valid use cases of blockchain technology a ...
 
Every Tuesday and Friday, Recode’s Kara Swisher and NYU Professor Scott Galloway offer sharp, unfiltered insights into the biggest stories in tech, business, and politics. They make bold predictions, pick winners and losers, and bicker and banter like no one else. After all, with great power comes great scrutiny. From New York Magazine and the Vox Media Podcast Network.
 
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest developments and bring you behind the scenes with the people who were there. New episodes every Wednesday.
 
Zengineering Podcast is for everyone who loves Science & Technology and also cares deeply about the beauty of Life's Big Questions. We (Adam & Brian) are obsessed with the spot where modern Science, Technology & Engineering meet Philosophy, Art & Spirituality. We have found this to be the place where the most interesting questions are both formulated and discussed. It's the place where mental models are born, and that's what we're really chasing. Are you? Support this podcast: https://anchor ...
 
Android isn’t just phones. It's a complex ecosystem. It’s feature-filled. It’s customizable. Each week, Jason Howell will take a closer look at the Android operating system as well as the unique devices running it worldwide. From feature spotlights, to tips and tricks, and even reviews of apps that make Android so much fun, Hands-On Android will change how you use your smartphone for the better. Screen reader support enabled. New episodes are posted every Thursday.
 
Loading …
show series
 
Homomorphic encryption is a form of encryption allowing one to perform calculations on encrypted data without decrypting it first. The result of the computation is on an encrypted form, when decrypted the output is the same as if the operations had been performed on the unencrypted data. In this video I go through what homomorphic encryption is and…
 
In this episode, we uncover the story of how Barbados set its sights on creating a digital dollar and how this set the course for a legal central bank digital currency across the Caribbean. We speak to 3 amazing guests, Dr. Delisle Worrell (the Former Governor of the Barbados Central Bank), Gabriel Abed (Founder of Bitt.com) and Simon Chantry (CBDO…
 
Encryption plays a critical role in protecting our data from hackers and theft. But at the same time, it presents a challenge for law enforcement when it comes to their work catching dangerous criminals and terrorists. What are the possible options at the end of the encryption debate, and are any of them actually viable? How can we protect our data…
 
My first livestream in 4 months, but this is a topic worth going live about.There are currently 2 bills in Congress that are trying to destroy privacy and freedom of speech on the internet. The “EARN IT” bill would have internet “best practices” determined by a commission, and the “Lawful access to encrypted data act” would put backdoors in all of …
 
https://youtu.be/DPIq5cRbYqg Coming up on this week’s episode of Destination Linux: Google & Canonical are teaming up to bring Flutter to Linux for a cross-platform game changer. How Important is Disk Encryption & Security Keys – should you be using them or do you just prefer being hacked? We’ve got community feedback, a DRM FREE Game called Drox O…
 
Destination Linux 182: Security Keys, Disk Encryption & Two Factor Authentication (2FA) https://destinationlinux.org/episode-182 - Hosted by Ryan, Noah & Michael Coming up on this week’s episode of Destination Linux: Google & Canonical are teaming up to bring Flutter to Linux for a cross-platform game changer. How Important is Disk Encryption & Sec…
 
Hundreds are Arrested In an EU Encryption Bust, the EARN IT act Advances To the Floor, and Devs Had Access to Expired Facebook Data! All that coming up now on ThreatWire. #threatwire #hak5 Links:Support me on alternative platforms! https://snubsie.com/support Shop ThreatWire Merch Directly! - https://snubsie.com/shop Shop ThreatWire Merch on Teespr…
 
Today's Network Break podcast discusses critical security patches from F5 and Palo Alto Networks, examines the implications of a Senate bill that targets encryption, and dives into VMware's latest acquisition. We also explore a new space-oriented business unit at AWS and more tech news analysis. The post Network Break 291: F5 Patches Severe Vulnera…
 
Thank you for sponsoring the Android Central Podcast, Wild Wild Tech! Untold stories of how tech shapes our culture in truly wild ways. Hear the most bizarre stories about how technology is shaping culture on Wild Wild Tech: Apple Podcasts: https://podcasts.apple.com/us/podcast/wild-wild-tech/id1519846548 Google Podcasts: https://podcasts.google.co…
 
NSA, yes, NSA, has some privacy advice. Interpol offers its take on where cybercrime is going during the time of the pandemic. Iran’s Oilrig is getting clever with its data exfiltration. The FBI would like to know when you’re finally going to move on from Windows 7--like, c’mon people. Joe Carrigan looks at pesky ads from the Google Play store. Our…
 
Tommy and Ben talk about the enormous explosions in Beirut, why Cuba has become an issue for Congresswoman Karen Bass in Biden’s VP selection process, Biden’s 2000(!?!) campaign foreign policy advisors, why US troops are leaving Germany, the upcoming election in Belarus, why the Department of Homeland Security was collecting “intelligence” on activ…
 
Twitter hackers arrested, Garmin hackers get ransom. Vitamin D fights death by Covid Firefox is now at v79 Twitter hackers arrested Garmin hackers rewarded Tor and Dr. Krawetz Dropping 0Days Blocking Tor Connections the Smart Way Enabling Zoom Meeting Hacking Another SHA-1 Deprecation QNAP and QSnatch BootHole We invite you to read our show notes a…
 
Twitter hackers arrested, Garmin hackers get ransom. Vitamin D fights death by Covid Firefox is now at v79 Twitter hackers arrested Garmin hackers rewarded Tor and Dr. Krawetz Dropping 0Days Blocking Tor Connections the Smart Way Enabling Zoom Meeting Hacking Another SHA-1 Deprecation QNAP and QSnatch BootHole We invite you to read our show notes a…
 
The US attributes the Taidoor remote access Trojan to the Chinese government. Sources tell Reuters that documents used in an attempt to influence the last British general election were taken from the compromised email account of the trade minister. Pegasus spyware is found deployed against churchmen and political opposition figures in Togo. China d…
 
The Verge's Nilay Patel and Adi Robertson talk to Senator Ron Wyden, who co-authored Section 230 of the Communications Decency Act. Wyden discusses the forced sale of TikTok to a US-based company, the bills out to reform Section 230, his new privacy bill preventing law enforcement from buying data on the open market, and how Trump's handling of rec…
 
Three have been arrested for the twitter hack, the BootHole vulnerability creates bigger problems, and Rite Aid used facial recognition technology in hundreds of stores! All that coming up now on ThreatWire. #threatwire #hak5 Links:Support me on alternative platforms! https://snubsie.com/support Shop ThreatWire Merch Directly! - https://snubsie.com…
 
Kara is joined by guest host MSNBC Live anchor Stephanie Ruhle to talk about Microsoft in talks to buy up TikTok after Trump threatens to ban the China-based app. They also discuss SpaceX's return to Earth and the future of private companies in space. They talk to Friend of Pivot Congressman David Cicilline, the Chair of the House Antitrust Subcomm…
 
Microsoft is in talks to acquire TikTok as the US hints that it may be considering action against other Chinese software companies. Three young men have been charged in the Twitter hack. An apparent distributed denial-of-service attack turns out to have been a glitch. We welcome Verizon’s Chris Novak to the show. Rick Howard talks incident response…
 
I needed to record a “casual” podcast this week. Take a load off and hang out in your PJs! No notes. Just off the cuff chatting about a two major tech stories. We have to chat about the House Judiciary committee putting top tech CEOs under oath. We also need to chat about the Pixel … Continue reading "#SGGQA 166: The Pixel 4A Pajama Podcast"…
 
Today's Network Break podcast explores a new multi-cloud offering from Arista, Juniper's WAN Assurance service that leverages Mist AI, and Marvell's Ethernet ASIC line. We also discuss financial results from Juniper, A10 Networks, and F5, plus a space networking update and more. The post Network Break 295: Arista CloudEOS Edge Joins Multi-Cloud Por…
 
iTunes: https://itunes.apple.com/us/podcast/podnutz-android-app-addicts/id388881293?mt=2# RSS: http://feeds.feedburner.com/androidappaddicts Spreadsheet: https://docs.google.com/spreadsheets/d/1A3TXvX-IQ25U9AGHkCjLtkY88QOLRf3JqaZlrXZNc-o/edit?usp=sharing Show – http://podnutz.com/category/android-app-addicts/ Patreon: https://www.patreon.com/Androi…
 
Dropbox has fully migrated their proxying needs from nginx to envoy proxy. They wrote this detailed article about the reasons and motivations and problems faced during migration. It is an interesting read. Let us discuss https://dropbox.tech/infrastructure/how-we-migrated-dropbox-from-nginx-to-envoy Migrating Dropbox from Nginx to Envoy | Hacker Ne…
 
The twitter hackers got caught and the case is closed, what have we learned? what really happened? and how can we prevent such attacks in the future, can homomorphic encryption help? Resource https://www.theverge.com/2020/7/31/21349920/twitter-hack-arrest-florida-teen-fbi-irs-secret-service 0:00 Intro 2:00 Summary of July 15 3:30 How the attack rea…
 
Director of Security Engineering at Marketa and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the cybersecurity industry, from an intelligence job with the Marine Corps, to starting the intelligence apparatus for the House of Representatives, then on to leading Netflix's threat intelligence capability. Chri…
 
NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation campaigns within their Twitter feeds, particularly with the increase in disinformation of COVID-19. Jo…
 
Kayla Cinnamon, Program Manager at Microsoft for Windows Terminal, Console, Command Line, and Cascadia Code joined us to talk about the release of Windows Terminal 1.0 and the new Windows command-line experience. We talk about everything that went into rethinking the command line experience on Windows, the UX and UI design behind it all, the learni…
 
An update on social engineering at Twitter. A quick look at the phishing kit criminal market. The European Union sanctions individuals and organizations in Russia, China, and North Korea for involvement in notorious hacking campaigns. North Korea’s North Star campaign is back and dangling bogus job offers in front of its marks. Deceptikons snoop in…
 
Kara and Scott talk about the winners and losers from Wednesday's tech antitrust hearing in Congress and answer listener questions about what the US government might do next. They also discuss Snap's first diversity report, why MacKenzie Scott (née Bezos) and Rep. Pramila Jayapal won the week, and the most important news of late — Taylor Swift's ne…
 
Nilay, Makena, Adi, and Casey discuss the important moments from Congress' antitrust hearing with Apple’s Tim Cook, Amazon’s Jeff Bezos, Facebook’s Mark Zuckerberg, and Google’s Sundar Pichai. Stories discussed this week: Antivirus: A weekly digest of the latest COVID-19 research Kodak is branching out into pharmaceuticals with US investment Twitte…
 
This is an analysis of the #percona benchmark article comparing MySQL & mariaDB performance with regards to SSD disks with NVMe vs SATA controllers. Pretty neat 0:00 Intro 1:00 MariaDB vs MySQL 2:15 SATA vs NVMe 4:30 SATA Benchmark 7:30 NVMe Benchmark 10:00 SSD & B-Trees 11:20 Best Practices mySQL for SSDs Resources https://www.percona.com/blog/202…
 
Yesterday’s antitrust hearings in the US House of Representatives focus on Big Tech’s big data as something open to use in restraint of trade. And there are questions about community standards as well. The BootHole vulnerability may not represent an emergency, but it will be tough to fix. Android malware masquerades as COVID-19 contact-tracers. The…
 
Developers have many reasons for preventing Android users from taking screenshots or screen recordings of in-app content. Usually its for security but sometimes its to protect copyrighted material. Jason Howell walks through some examples of how this is enforced, and a few ways to work around those limitations. What kinds of apps prevent screenshot…
 
Bob Diachenko discovered an attack on MongoDB and ElasticSearch clustered that are unsecured. We discuss this attack in detail and how we as Backend Engineers can secure our databases. 0:00 The Meow Attack again MongoDB & ElasticSearch 1:43 How does it work? 5:00 Scope of the Attack 6:00 How Backup & MVCC Help 8:30 What does “Unsecure” mean? 11:00 …
 
The biggest news to come out of WWDC20 was Apple’s plan to move the Mac from Intel processors to a self-designed solution called Apple Silicon. Today - we’ll look at some differences between the two architectures, what the move will mean for people outside of Apple, and some of the security implications with SecureMac’s Nick Leon. Don't forget to c…
 
FIRE followup, Alexa’s hot, Mega City 3’s Chinese Consulate, the return of Vape Naysh news, cops, quar, and feds on run. All that, and more, on this week’s episode of “If I’ve said it once, I’ve said it a thousand times…” Also, check out the documentary “The Monopoly on Violence,” from the great Peter R. Quinones, Stateless Productions, and many fa…
 
YT: https://youtu.be/bD29fWa9CZQLBRY: https://open.lbry.com/@NaomiBrockwell:4/Cyber-czar:4?r=5JbxJH3dW6Mzx16EjXjNTdTMfqWtQ9f3The National Cyber Director Act was just passed by Congress as part of the NDAA which will create a "Cyber Czar". It's a disaster for internet privacy and freedom.The "Cyber Czar" position has an unspecified budget, and a dep…
 
Coming up on this week’s episode of Destination Linux, we have an interview with Dan Johansen of Manjaro ARM to talk all things ARM. The big topic of the week is about Bug Reports and how they can get better for both Users and Developers so Let’s Squash Some Bugs. In the News, we talk about the new AMD Ryzen Linux Laptops are finally hitting the ma…
 
Alleged Russian influence operations described by US intelligence services. “Ghostwriter” targets the Baltic region with anti-NATO false narratives. Chinese intelligence is said to have compromised Vatican networks. Loss of customer PII seems the costliest kind of data breach. VPN bugs represent a risk to OT networks. Big Tech comes to Capitol Hill…
 
Destination Linux 184: It Is Okay To Use Nano https://destinationlinux.org/episode-184 - Hosted by Michael, Ryan & Noah Coming up on this week’s episode of Destination Linux, we have an interview with Dan Johansen of Manjaro ARM to talk all things ARM. The big topic of the week is about Bug Reports and how they can get better for both Users and Dev…
 
Hi, Zengineers! I’m sure you’ve heard of Amazon, right? What about Facebook? Do you use it? Google? Apple? Ma Bell? Carnegie? Vanderbilt? Woot woot!! Ok… enough listing. What’s the topic, you ask? Yeah … we’re going for it, and taking on the roll of the United States Congress and breaking up the tech companies. Why, you might ask, are we doing this…
 
Tommy and Ben make the case for Susan Rice as Vice President, the latest on escalating tensions between the US and China, US plans to sell advanced armed drones abroad, two Trump donors turned ambassadors are engulfed in scandal, anti-corruption protests threaten the government in Bulgaria, Bob Gates writes a book and we’re confused, the truth abou…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login