Best InfoSec podcasts we could find (Updated September 2019)   InfoSec public [search 0]
×
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Podcast smarter! Player FM is free and easy.
show episodes
 
C
Cyber Work
Weekly
 
Join us in the fight against cybercrime with weekly conversations about cybersecurity skills, jobs and industry trends.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
C
CYBER
Weekly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Entertaining stories of how others got into Information Security (aka cybsersecurity), their experiences, lessons learned, and advice about getting in. Join my newsletter.Listen for an "Easter Egg" in each show!If you're looking to break into infosec, I wrote a little guide! Check it out:“I purchased the kindle book last night and just finished it. It was a great “mini-mentoring” session, and I felt encouraged to persevere. I plan to listen to the podcasts regularly. As a woman getting into ...
 
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
 
C
CYBER
Weekly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
 
h
humans-of-infosec
Monthly
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security experts, Caroline Wong and Vanessa Sauter, as they focus on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
We need to talk about InfoSec is a podcast where we get real about the current state of Information Security. Join the talk with Laura Kankaala! Powered by Disobey.
 
Some real world sysadmins give you the news, and chat about sysadminning in the industry.
 
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
 
D
Defense in Depth
Weekly
 
Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
 
Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
I
InfoSec ICU
Weekly
 
The Health Information Security podcast from the Medical University of South Carolina
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
S
Sysadministrivia
Monthly
 
We podcast all things system administration/engineering/infosec, with a strong focus on GNU/Linux. We use F/OSS software whenever possible in the production of these podcasts. Please be sure to view our show notes on the site!
 
S
SecTools Podcast
Monthly
 
Podcast by InfoSec Campus
 
T
ThugCrowd
Weekly
 
Join us every week for live discussions on hacking, phreaking, and everything that DOESNT SUCK in infosec!
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
We need to talk about InfoSec is a podcast where we get real about the current state of Information Security. Join the talk with Laura Kankaala! Powered by Disobey.
 
C
Cyber Speaks LIVE
Monthly+
 
Cyber Speaks LIVE is a weekly InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. Cyber Speaks LIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cybersp ...
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
 
S
Securit13 Podcast
Monthly
 
Первый украинский подкаст об информационной безопасности
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
D
Darknet Diaries
Monthly
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
C
Cyentia Podcast
Monthly
 
This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.
 
p
pod2112 Podcast
Monthly+
 
The 2112 Group's CEO and Chief Analyst Larry Walsh, one of the most recognizable figures in the IT channel and infosec communities, leads thought-provoking discussions with expert guests on a wide range of technology and business topics including: cloud computing, information security, business analytics, the Internet of Things (IoT), and much more.
 
We podcast all things system administration/engineering/infosec, with a strong focus on GNU/Linux. We use F/OSS software whenever possible in the production of these podcasts. Please be sure to view our show notes on the site!
 
B
Breach
Monthly
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
ITSPmagazine is free online publication that focuses on information technology, cybersecurity, data privacy, the InfoSec community and the influence that all this has on our everyday lives – as businesses, individuals and the society in which we live.Delivered through articles, podcasts, webcasts, webinars, live panels, event coverage and talk shows, our team of cybersecurity experts explores the topics that matter the most: the human element and its symbiotic effect on the latest in technol ...
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
A list of some of my favorite Infosec podcasts and other podcasts that I think are great.
 
M
Mornings With Mark
Weekly
 
Daily-ish (M--F) musings about security and privacy and how it impacts our communities. What questions should as technologists be asking as we build?Watch the show at https://4mn.ca/mwm-video
 
p
pod2112 Podcast
Monthly+
 
The 2112 Group's CEO and Chief Analyst Larry Walsh, one of the most recognizable figures in the IT channel and infosec communities, leads thought-provoking discussions with expert guests on a wide range of technology and business topics including: cloud computing, information security, business analytics, the Internet of Things (IoT), and much more.
 
C
Command and Control
Monthly
 
The Command and Control podcast analyses a different information security topic each episode, interviewing leading figures in the IT Security industry to cover the threats, solutions and recommendations to help protect your organisation. Topics include DDoS, WAF, firewall and web content security.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
R
Risk & Repeat
Monthly+
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
Information Security is the name of the game. Don't let the hackers win!
 
This is a podcast where we explore the issues today with the insider threat, or human factor, of our organizations. We also talk about ways to tackle those issues through training, culture, and technology in order to help information security and business professionals reduce risks in their environments.We have a patreon page for the podcast, located at . I don't want to be too pushy for this, but a couple of you have asked about ways that you can support the show.
 
T
The GDPR Guy
Daily+
 
The GDPR Guy - the podcast dedicated to helping your organisation comply with the General Data Protection Regulation. Hosted by Carl Gottlieb, Data Protection consultant and Director of the Security Solutions provider, Cognition. Each episode Carl will be providing information, insights and inspiration to help you on your GDPR journey. You’ll find show notes and useful resources on the website, THE GDPR GUY.com, as well as details for getting in touch with Carl directly.
 
Bring Your Own Security Radio is hosted by Dave The IT Guy, CISSP, CEH and MCSE who brings you both the people behind the scenes securing systems from the bad guys, and some of the vendors who bring some of the hardware and software used to help secure an environment. Each episode is one hour in length, and often can provide you one CPE/CEU for your tech certifications simply for listening.
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
T
The GDPR Guy
Daily+
 
The GDPR Guy - the podcast dedicated to helping your organisation comply with the General Data Protection Regulation. Hosted by Carl Gottlieb, Data Protection consultant and Director of the Security Solutions provider, Cognition. Each episode Carl will be providing information, insights and inspiration to help you on your GDPR journey. You’ll find show notes and useful resources on the website, THE GDPR GUY.com, as well as details for getting in touch with Carl directly.
 
Loading …
show series
 
A daily look at the relevant information security news from overnight. Episode 155 - 18 September 2019 Lion Air exposed - https://www.bleepingcomputer.com/news/security/millions-of-lion-air-passenger-records-exposed-and-exchanged-on-forums/ Gootkit exposed - https://www.zdnet.com/article/gootkit-malware-crew-left-their-database-exposed-online-w ...…
 
Gerry and Brandon discuss risk when working through merger and acquisitions and Gerry interviews Cyber Risk Underwriter’s Jeffrey Smith about cyber insurance. As always they end with One Cool Thing. Show Notes Resources: Mergers and Acquisitions Put Your IP at Risk https://www.scmagazine.com/home/opinion/executive-insight/ma-gone-bad-the-brutal ...…
 
After a short break, we return to talk more about infosec! This time I have a social engineering professional Riku Juurikko with me, and we discuss what kind of methods are used to persuade us into complying with in any kind of situation. Tune in and let us know what you think!By Laura Kankaala.
 
By Marco Ciappelli and Sean Martin"A long time ago in a galaxy far, far away...."I cannot think of a better way to start this intro chronicle to today's Episode. While it will become clear why this is the case as you listen to it, you will probably come to envision a movie made from this story. I sure saw one in my head while I was following al ...…
 
Former Lyft CISO and fellow podcaster Mike Johnson takes his new job seriously: He’s a CISO on vacation. With nearly twenty years of infosec experience, including nine years leading teams at Salesforce, Johnson has witnessed tremendous changes in the industry. In this episode of Humans of Infosec, Johnson reflects on his career and path into cy ...…
 
In just a few taps and clicks, the system, made by a private company, shows where a car has been seen throughout the U.S. Tipped by a private investigator source, Joseph Cox broke the news that a powerful system used by an industry including repossession agents and insurance companies tracks cars across the US. Armed with just a car's plate num ...…
 
In just a few taps and clicks, the system, made by a private company, shows where a car has been seen throughout the U.S. Tipped by a private investigator source, Joseph Cox broke the news that a powerful system used by an industry including repossession agents and insurance companies tracks cars across the US. Armed with just a car's plate num ...…
 
In the latest edition of the "Smashing Security" podcast, hosted by computer security veterans Graham Cluley and Carole Theriault, Carole has suffered an injury, we journey back in time to one of our earliest episodes to discuss the perils of passwords, and Rachael Stockton from LastPass drops by for a chat. Visit https://www.smashingsecurity.c ...…
 
In the latest edition of the "Smashing Security" podcast, hosted by computer security veterans Graham Cluley and Carole Theriault, Carole has suffered an injury, we journey back in time to one of our earliest episodes to discuss the perils of passwords, and Rachael Stockton from LastPass drops by for a chat. Visit https://www.smashingsecurity.c ...…
 
A newly discovered threat actor, “Tortoiseshell,” has been active against targets in the Middle East. The Simjacker vulnerability may not be as widely exploitable as early reports led many to believe. The US Army seems committed to decentralizing cyber operations along long-familiar artillery lines. Joint Task Force Ares continues to keep an ey ...…
 
What is hacking when it comes to collecting data? According to two court rulings if it's publicly avaialble it's free game. This epsiode talks about the court rulings and what it means to your privacy to the data you free post. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In ...…
 
More notes on the RCMP espionage scandal. The CSE’s preliminary assessment sounds serious indeed, and Canadian intelligence services are trying to identify and contain the damage Cameron Ortis is alleged to have done. And the other Four Eyes are doing so as well. Australia considered that a hacking incident early this spring may have been a Chi ...…
 
A daily look at the relevant information security news from overnight. Episode 154 - 17 September 2019 Emotet awakes - https://www.zdnet.com/article/emotet-todays-most-dangerous-botnet-comes-back-to-life/ Ordinypt wiper - https://www.bleepingcomputer.com/news/security/destructive-ordinypt-malware-hitting-germany-in-new-spam-campaign/ Lumin PDF ...…
 
The CIS Top 20 is the defacto standard to build an effective security program. This epsiode talks about the controls you should implement first. Source. Old Podcast Episodes. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't forget to subscribe to the Security In Fiv ...…
 
All images and links for this episode can be found on CISO Series (https://cisoseries.com/serious-hackers-wear-two-black-hoodies/) We're doubling down and embracing the absolute worst of hacker tropes. Put on your black hoodie and then a second one. Boot up your Matrix screensaver and listen to the latest episode of CISO/Security Vendor Relatio ...…
 
On this week’s edition of the Kaspersky Podcast, Dave and I stay Stateside for the majority of the stories this week. The first story on episode 110 has us looking at YouTube for the second week in a row. This week, we look at a tale from the BBC where major advertisers are seeing their ads landing next to fake cancer cure videos. Following tha ...…
 
This is the story about an ex-NSA agent who went to work for a secret hacking group in the UAE. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where th ...…
 
After a short break, we return to talk more about infosec! This time I have a social engineering professional Riku Juurikko with me, and we discuss what kind of methods are used to persuade us into complying with in any kind of situation. Tune in and let us know what you think!By Laura Kankaala.
 
Spy versus spy, in America, Canada, and Australia, with special guest stars from the Russian and Chinese services. The US Treasury Department issues more sanctions against North Korea’s Reconnaissance General Bureau, better known as the Lazarus Group or Hidden Cobra. Russian election influence goes local (and domestic). Password manager securit ...…
 
Dave talks about Ring Doorbell Cameras and how law enforcement can access the video from each camera in their area.By BYOSRADIO.
 
A daily look at the relevant information security news from overnight. Episode 153 - 16 September 2019 Entercom issues - https://www.bleepingcomputer.com/news/security/giant-entercom-radio-network-deals-with-ransomware-like-incident/ Phishing with Asteroth - https://threatpost.com/astaroth-spy-trojan-facebook-youtube/148327/ LastPass leaky - ht ...…
 
The new iPhones are coming out and trade-in deals are a big thing with dealers. This epsiodetalks about things you should do before you hand you old phone over to a dealer or buyer to protect your privacy and data. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't fo ...…
 
Alissa Knight, Senior Analyst at Aite Group, discusses API security, the Magecart hacking group, recent breaches, formjacking skimmers and her upcoming book.In the podcast, Knight and host Chris Sienko discuss:– What's been happening since you've been on the podcast last? (3:10)– You've been on an international tour, sharing vulnerabilities you ...…
 
Bill Conner is the President and CEO of SonicWall. Bill has lead key divisions of AT&T, took Nortel into the $9 billion acquisition of Bay Networks, worked to secure digital identities with Entrust, and brought secure communications and privacy from the consumer to the enterprise through mobile and cloud with Silent Circle. Bill also created… T ...…
 
Time to start securing systems and software. To do that, we’re using the CIS benchmarks. These are configuration guides for things like Windows 10 and BIND 9. The two things we’re focusing on. We have to start somewhere. LINKS 1. What are CIS Benchmarks? 2. CIS Benchmarks - All of them FIND US ON 1. Facebook 2. Twitter - DamienHull…
 
We talk about “soft skills” – are they REALLY necessary for Operations? (Full shownotes at http://sysadministrivia.com/episodes/S4E15)By admin@sysadministrivia.com (r00t^2).
 
The Sysadministrivia PodcastBy r00t^2.
 
A team of researchers have published a report titled, "KNOB Attack. Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security." The report outlines vulnerabilities in the Bluetooth standard, along with mitigations to prevent them. Daniele Antonioli is from Singapore University of Technology and Design, and is one of the researchers study ...…
 
Conversations At The Intersection Of Technology, CyberSecurity And Society.Guests Amit Elazari | MK PalmoreHostsSean Martin | Marco CiappelliITSPmagazine’s Unusual Gatherings XXXIV:The Legal, Civil, Commercial, and Societal Pulse of CyberSecurityIf I had to take a bet before Hacker Summer Camp in Las Vegas 2019 I wouldn’t have put my money on “ ...…
 
The Ukrainian electrical grid hack seems, on further review, to have been designed to do far more damage than it actually accomplished. InnfiRAT is scouting for access to cryptocurrency wallets. A sophisticated threat actor is using Simjacker for surveillance on phones in the Middle East. The SINET 16 have been announced. A penetration test goe ...…
 
Dave talking about the trend in online doctor's visits and how soon you'll be able to start having in home appointments!By BYOSRADIO.
 
The Internet of Things trend is creating massive product and service sales opportunities. Businesses are spending billions of dollars acquiring new sensors, infrastructure, and applications to leverage IoT devices and systems to improve operations, create new experiences, and capitalize on emerging models. In the channel, IoT is still an emergi ...…
 
The Internet of Things trend is creating massive product and service sales opportunities. Businesses are spending billions of dollars acquiring new sensors, infrastructure, and applications to leverage IoT devices and systems to improve operations, create new experiences, and capitalize on emerging models. In the channel, IoT is still an emergi ...…
 
A daily look at the relevant information security news from overnight. Episode 152 - 13 September 2019 SMS tracker - https://www.zdnet.com/article/new-simjacker-attack-exploited-in-the-wild-to-track-users-for-at-least-two-years/ RAT sandwich - https://www.bleepingcomputer.com/news/security/new-wiryjmper-dropper-hides-netwire-rat-payloads-in-pla ...…
 
This week's Tools, Tips and Tricks goes through several tips to help you secure your browser, no matter which one you use. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't forget to subscribe to the Security In Five Newsletter. —————— Where you can find Security In ...…
 
Kim writes about cybersecurity for Tripwire, AT&T Cybersecurity, Venafi, and Cylance's blogs. She also writes for Peerlyst. In the past Kim has contributed to Infosecurity Magazine, Threatpost, Comodo's blog, CCSI's blog, CSO, CIO, Computerworld, Hacker Noon, The Threat Report, and 2600 Magazine. Listen in as Jenny and Kim discuss early years t ...…
 
Welcome to Episode 67 Main Topic D*E*R*B*Y*C*O*N Talks: http://www.irongeek.com/i.php?page=videos/derbycon9/mainlist Opening Ceremony: http://www.irongeek.com/i.php?page=videos/derbycon9/1-00-opening-ceremony-derbycon-crew Keyonte from Ed Skoudis: http://www.irongeek.com/i.php?page=videos/derbycon9/1-01-opening-keynote-presented-by-ed-skoudis-e ...…
 
DC StingRays alleged to be Israeli devices. North Korea is slipping malware past defenses by putting it into old, obscure file formats. Ryuk ransomware gets some spyware functionality. Google has purged Joker-infested apps from the Play store. The US Defense Department explains its “multifaceted” approach to cyber deterrence. The FBI warns that ...…
 
A daily look at the relevant information security news from overnight. Episode 151 - 12 September 2019 Fraudsters leak - https://threatpost.com/major-groupon-ticketmaster-fraud-scheme-exposed-by-insecure-database/148246/ Ryuk stealer - https://www.bleepingcomputer.com/news/security/ryuk-related-malware-steals-confidential-military-financial-fil ...…
 
A large, prominent cybersecurity firm suffered a breach of their cloud services. This epsiode talks about the details of the breach and what you need to remember when using cloud services. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't forget to subscribe to the S ...…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-top-ciso-communication-issues/) Understanding risk. Communicating with the board. Getting others to understand and care about security. What is the most vexing cybersecurity issue for a CISO? Check out this post by Kate Fazzini, cybersecur ...…
 
At the end of August, researchers at Google dropped a bombshell: they had discovered malicious websites that they said were indiscriminately spreading iPhone malware for years. At certain points the websites were even using zero day exploits; attacks that take advantage of vulnerabilities that Apple is not aware of. Apple subsequently confirmed ...…
 
At the end of August, researchers at Google dropped a bombshell: they had discovered malicious websites that they said were indiscriminately spreading iPhone malware for years. At certain points the websites were even using zero day exploits; attacks that take advantage of vulnerabilities that Apple is not aware of. Apple subsequently confirmed ...…
 
At the end of August, researchers at Google dropped a bombshell: they had discovered malicious websites that they said were indiscriminately spreading iPhone malware for years. At certain points the websites were even using zero day exploits; attacks that take advantage of vulnerabilities that Apple is not aware of. Apple subsequently confirmed ...…
 
Apple is furious with Google over iPhone hacking attacks against Uyghur Muslims in China, DNS-over-HTTPS is good for privacy but makes ISPs angry, and concern over digital assistants listening to our private moments continues to rise. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer s ...…
 
Apple is furious with Google over iPhone hacking attacks against Uyghur Muslims in China, DNS-over-HTTPS is good for privacy but makes ISPs angry, and concern over digital assistants listening to our private moments continues to rise. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer s ...…
 
Guests: Katie Nickels | Fred Wilmot | Ryan KovarI was trying hard for a couple of months to organize a chat with Katie Nickels [Lead Cyber Security Engineer at MITRE] and Fred Wilmot [VP, Security Engineering at Devo] to dig into the topic of MITRE ATT&CK. I wanted to know more about the framework, how it works, why it was getting so much tract ...…
 
Cobalt Dickens is back, and phishing in universities’ ponds. UNICEF scores a security own-goal. Patch Tuesday notes. A look at US election security offers bad news, but with some hope for improvement. The US extends its state of national emergency with respect to foreign meddling in elections. And an international police sweep draws in 281 alle ...…
 
Fil & Stas, founders of the disruptive AttackForge platform, were recently presenting at Black Hat USA Arsenal telling their story about why pen testing is broken – a term we do hear often in security - and how they are trying to solve the problems. In this episode of Cyber Speaks LIVE they shared their experiences and provided us with some kee ...…
 
A daily look at the relevant information security news from overnight. Episode 150 - 11 September 2019 Microsoft Teams vuln - https://www.bleepingcomputer.com/news/security/microsoft-teams-can-be-used-to-execute-arbitrary-payloads/ D-Link and Comba flaws - https://threatpost.com/vulnerabilities-in-d-link-comba-routers-can-leak-credentials/14815 ...…
 
Google login Twitter login Classic login