show episodes
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
S
Smashing Security

1
Smashing Security

Graham Cluley, Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over six million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, a ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
 
T
The Host Unknown Podcast

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Weekly
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
T
The New CISO

1
The New CISO

Steve Moore, Exabeam

Unsubscribe
Unsubscribe
Monthly+
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
I
ITSPmagazine

51
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cyber security tips, tools, and more in the Alias Secure AF Cyber Security Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cyber security topics with coworkers and special guests. No matter where you are on the cyber security knowledge ladder, there's an episode here for you.
 
G
Getting Into Infosec

51
Getting Into Infosec

Ayman Elsawah (@coffeewithayman)

Unsubscribe
Unsubscribe
Monthly
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
I
InfoSec Daily Podcast

1
InfoSec Daily Podcast

Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z

Unsubscribe
Unsubscribe
Monthly
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
I
INFOSEC Today

1
INFOSEC Today

Scott Croskey and Peter Hackett

Unsubscribe
Unsubscribe
Daily+
 
Scott and Pete bring on guests to ramble on about any and all aspects of Information Security, including but not limited to trending news, Red/Blue/Purple team operations, governance, risk, compliance, architecture, assessments, and other focus areas.
 
A technology podcast and an engaging platform for real stories, discussions and opinions from renowned global experts on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and security enabling technology and business. Winner of 2019-Outstanding Security Performance Awards, she is an acclaimed and well-known security expert and public speaker. On the podcast, she brings on different cybersecurity and privacy ...
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
R
Reality 2.0

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
 
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide. Operating as a communit ...
 
Loading …
show series
 
In Episode 80, Josh Amishav talks about the pyschological warfare that is being waged against various ransomware gangs, developments to Darkside, REvil and Blackmatter, Russia's handling of cyber criminals, using stealer log combo lists as part of your OSINT investigations and more. For more information, including the show notes check out: https://…
 
A reply-chain incident is reported at a major international furniture and housewares retailer. North Korean operators are phishing for South Korean marks using bogus Samsung recruiting emails as phishbait. Fancy Bear has been seen pawing at Gmail. A regional escalation to civilian targets in the cyber conflict between Iran and Israel. More organiza…
 
RATDispenser spreads multiple remote access trojans into the wild North Korea-linked Zinc group posed as Samsung recruiters to target security firms Interpol arrests over 1,000 suspects linked to cyber crime Thanks to our episode sponsor, Votiro Your users need to accept and open files to do their jobs. Keep them safe and productive with Votiro. Wi…
 
On today’s podcast, Kyle McNulty of Secure Ventures talks about interviewing the people behind the most up-and-coming cybersecurity startups. We discuss the best advice he’s received on the show, how to get your own podcast off the ground and his own security startup, ConsultPlace. – Join the monthly challenge: https://www.infosecinstitute.com/chal…
 
CSCP is bringing back season 1 in a newly remastered version. This is part 1 of the interview with Chani. Chani Simms is the Managing Director and Co-Founder of Meta Defense Labs LTD, a consultant, the Founder of SHe CISO, a TEDx Speaker, and an Award-winning Cybersecurity Leader. Chani shares how she prepared for her TedX talk and her thoughts on …
 
Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. She began her career and remains at Raytheo…
 
Enjoy a peek into CyberWire Pro's Research Briefing as the team is off recovering from our Thanksgiving feasts. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: Iranian threat actors target the IT supply chain. North Korean …
 
Our team decided to extend our Thanksgiving holiday and thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalist…
 
Giving us some insight into what's being discussed in the US government and how previous cyber attack scenarios played out and will ultimately define how we prepare and respond in the future, guests Gregory Touhill and Chase Cunningham join us to discuss the "good guy vs bad actor" scenarios they play out the narrative of their new book, Rip Tide: …
 
Jason Haddix, world renowned bug bounty researcher, shares his story and valuable advice that has helped many aspiring pentesters and bug hunters. Jason shares his story of starting in IT, becoming a pentester, to helping a top bug bounty company in the beginning stages. Jason's advice includes learning resources, and career advice that he has shar…
 
“There’s a place in tech for everyone.” Tyler Menezes, Executive Director of CodeDay, is changing the narrative of CS education -- simply by getting students excited to learn and create. Tyler describes his spark with building cool things using tech after stumbling across a programming book for slot machines. Since then, Tyler has been helping thou…
 
This Week in InfoSec (11:00) With content liberated from the “today in infosec” Twitter account 23rd November 2011: It was reported that Apple took over 3 years to fix the iTunes installer vulnerability which the FinFisher remote spying Trojan exploited. Apple Took 3+ Years to Fix FinFisher Trojan Hole https://twitter.com/todayininfosec/status/1331…
 
A MetaThanksGiving Special where Diana, Sean, and Marco talk about The Metaverse, The FoodVerse, The Turkey Something that has nothing to do with your meal | And many more thoughts on what the MetaVerse is, could be, or not?! | Through The TechVine Radio Program Episode TwentyFive We have officially decided to keep Through The TechVine a live recor…
 
Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Human…
 
Heating systems are left vulnerable to attack in the high courts, cybercrime unicorns have become a reality (but what are they?), over 15 Terabytes of NFTs are made available for anyone to download ... and Carole reveals her Pick of the Year. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by comput…
 
Did you know 1/3 of cybersecurity professionals have had personal experience of harassment online? This episode dives into how companies can help, and the Respect in Security pledge. ______________________________ Guests Lisa Forte On LinkedIn | https://www.linkedin.com/in/lisa-forte/ On Twitter | https://twitter.com/LisaForteUK Nikki Webb On Linke…
 
An apparent cyberespionage campaign targets the Iranian diaspora. Babadeda is an emerging crypter seeing use against alt-coin and NFt speculators. RATDispenser is out in the wild, a malware-as-a-service operation. Proofs-of-concept published for Microsoft exploits. Apple sues NSO Group. Group-IB’s founder asks President Putin for clemency. Caleb Ba…
 
Interview Links Listen to Chris’s podcast, First Impressions. Check out the other, Jane Austen-themed First Impressions podcast. Learn more about MVSP at the official site and in this blog post from Google. Read up on the ETSI standard Jen mentioned. Revisit our previous episode on Disclose.io with Casey Ellis. Rapid Rundown Links Read about the Sk…
 
The topic of application security has never been more important. So how are companies approaching appsec? What should companies do to ensure appsec gets the attention it needs? Antti Tuomi, who works in Japan, and Antti Vaha-Sipila (known as AVS), from Finland, join the show to share their thoughts on changes in application security, shifting left,…
 
Welcome to the 229th episode of the Kaspersky Transatlantic Cable podcast. Ahmed, Dave and I start by looking into the world of NFTs. In this tale, it seems that a pirate site will allow users to download any NFT that has been bought and sold. Please tell me again, how a NFT site can be fooled by CTL-Right Click? From there, we dive into the Metave…
 
Over nine million Android devices infected Researcher discloses zero-day exploit due to low bounty payouts Threat actors compromise exposed services in 24 hours Thanks to our episode sponsor, deepwatch Increasing ransomware attacks and their evolving sophistication have been putting more pressure on security teams than ever before. Luckily, managed…
 
Tardigrade malware infests the US biomanufacturing sector. GoDaddy suffers a significant data breach. A Gizmodo-led consortium will review and release the Facebook Papers. Ben Yelin on our privacy rights during emergency situations. Our guest is Ric Longenecker of Open Systems to discuss how ransomware attacks represent the number one threat for un…
 
Encrypted messaging apps. We all love them. You don’t have to be doing anything shady to want to make sure your messages are end-to-end encrypted. And for most people there’s dozens of options. Signal, Wicker, even WhatsApp boasts end-to-end encryption. But what if you need something a little more secure? That’s where encrypted phone companies like…
 
Security executive, researcher and professor Ken Pyle joins Tech Done Different to dig deep into security research and what we can all do better. You'll learn: why complacency exists everywhere, and why it's a problem why it's a problem when a system works as designed but not as intended why you have to put in the work if we ever hope to make thing…
 
All links and images for this episode can be found on CISO Series It's extremely easy to say you want to diversify. In fact, I'll do it right now three times. We want diversity. We're very pro diversity and it's our focus for the next year. Diversity is a very important part of our security program. Please don't ask to though look at the lack of di…
 
Joseph Cox (https://twitter.com/josephfcox), Senior Staff Writer at Motherboard (https://www.vice.com/en/topic/motherboard), joins us to talk about the world of encrypted phones. Books Affiliate links to books: The Smart Girl’s Guide to Privacy: https://www.amazon.com/gp/product/1593276486/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1…
 
GoDaddy data breach impacts millions Microsoft looks at brute-force attacks Printers used to bypass fingerprint authentication Thanks to our episode sponsor, deepwatch What is the value of good security? Can you quantify what mature detection and response means for your organization? A recent Forrester study found that a deepwatch MDR customer achi…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco talk about: Do we still sit at the edge of our seats watching a movie, or are we too used to technology? | What is a “Drop-in Fuel” and why it is an excellent idea | Smart building material that can switch between heating and cooling properties | Luxury items …
 
The Lazarus Group seems interested in learning from, by which they mean stealing from, some of the world’s leading state-sponsored cyber operators. Void Balaur remains an enigma, but it’s not the only player in the C2C market. CISA and the FBI warn all, but especially critical infrastructure operators, to remain alert during the holidays. Some scam…
 
CSCP is bringing back season 1 in a newly remastered version. This is part two with Kevin Fielder, a CISO, NED, start-up and board advisor, researcher, and speaker based in the UK. Kevin is a CrossFit athlete who values a healthy work-life balance that allows him time for fitness and family. He answers questions about diversity in the workplace, re…
 
US banks will be required to report cyberattacks within 36 hours Microsoft Exchange malware campaign uses stolen internal reply-chain emails Conti ransomware group suffers a data breach Thanks to our episode sponsor, deepwatch Increasing ransomware attacks and their evolving sophistication have been putting more pressure on security teams than ever…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login