Best InfoSec Podcasts (2020)
show episodes
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Join Cameron Ivey, Gabe Gumbs and interview guests from around the cybersecurity world as they keep you informed around the topics of cybersecurity, data privacy, compliance, breaches, interesting infosec stories, and much more! Learn why it’s more important than ever that we protect what matters most.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.
 
Welcome to the Cybrary Podcast! In this show, we will be speaking with current leaders and experts in the IT and Cybersecurity fields. Discussing topics from DevSecOps and Ransomware attacks to diversity and the retention of talent the Cybrary Podcast covers it all. Come join us on Cybrary and get to your Next Level! Want authorized access to the top security tips from the experts in InfoSec? Bi-weekly, join Thycotic’s ethical hacker Joseph Carson and the cybersecurity training experts from ...
 
CyberSpeaksLIVE is a weekly InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeaks ...
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security experts, Caroline Wong and Vanessa Sauter, as they focus on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over four million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Welcome to the Cyber Coalface a fortnightly Purple Team Cyber Podcast covering the whole cyber threat, hosted by myself David Tyler and JayJay Davey two UK Military Veterans who ended up in Cyber Security.Join us today as we cover aspects affecting Cyber Security from the perspective of a Red Teamer and Blue Teamer. This podcast is ideal for anyone in the Cyber or Infosec field, come and listen to those on the Cyber front lines!
 
Intrusion Diversity System (IDS) is a Cyber Security podcast hosted by O'Shea Bowens, Doug Bryant Jr and Sienna Delvasto. Doug, O'Shea and Sienna weigh in on their experiences as minorities within the Cyber Security space. By telling stories, sharing experiences, giving career advice and demonstrating security tips, tricks & tools O'Shea, Doug, and Sienna hope to inspire others to see how exciting and valuable a career in Cyber Security could be.
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
Loading …
show series
 
This week Ed Bellis joins the show to talk about risk based vulnerability management. My 3 main takeaways were 1) which factors you should take into consideration when prioritizing vulnerability remediation 2) the effects that public exploit code has on remediation efforts 3) how organizations can improve their threat prioritization by using their …
 
Lisa Jiggetts knew from an early age that she was going to be in tech an cyber. A navy veteren who started off as a cook, she always found herself gravitating towards technology. She is also the Founder & Board of Director of Women’s Society of Cyberjutsu, a non-profit that is dedicated to increasing the opportunities and advancement for women in c…
 
Ep 8 - In this Season 1 finale episode, Asif and Christina catch up with COI listeners and discuss: Why they went dark since election week and what they have been up to. Election week chaos, exhaustion, new beginnings & other changes. The challenges of working from home for working parents. Suggestions on how to cope, including self-care. Our 2021 …
 
IoT is Vulnerable IoT Homefootage on sale in the deep and dark web and an intimate IoT device is found to have an exploit. https://www.hackread.com/3tb-clips-hacked-home-security-cameras-leaked/ https://gizmodo.com/a-security-flaw-could-send-your-dick-to-jail-forever-1845286359 Trickbot Takedown via Private and Public Sector Both Microsoft and USCy…
 
Michelle Valdez, the CISO at OneMain Financial, doesn’t approach cybersecurity through the lure of the threat. Instead, she applies a methodical, problem-driven approach honed through her background in the US military, where she served as an investigator for the U.S. Air Force. Her extensive experience working in national security, intelligence, an…
 
The Shadow Academy prospects universities in a domain shadowing campaign. Notes on Turla’s Crutch, an information-stealing backdoor. Bismuth was using crytpojacking as misdirection. CISA and the FBI warn think tanks that cyberspies are after them. North Korean cyberespionage is interested in COVID-19 treatments. Our guest is Carey O’Connor Kolaja f…
 
Why is it that after every breach or security incident a cavalcade of talking heads show up to hock their wares and speculate wildly? Why is it that after every breach or security incident a cavalcade of talking heads show up to hock their wares and speculate wildly? I'll tell you why - because we're no better than ambulance-chasing lawyers. There,…
 
In an odd turn of events, the 174th iteration of the Kaspersky Transatlantic Cable Podcast takes Dave and I back to slew of topics that were hot in 2018 – ransomware, Bitcoin prices and more. To start things off, we hop into a story about the skyrocketing price of Bitcoin. Dave and I share some of our theories on the rise - We are NOT financial ana…
 
A shocking report has been released detailing that over half of the 4 million containers on Docker Hub have at least one critical vulnerability. This episode goes into the details of this report and what you need to put in place when using 3rd party components. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of c…
 
This week on Privacy Please in our first company series part 2, please welcome the very insightful and passionate, Robert Hansen, CTO at Bit Discovery. In this conversation we have the luxury of speaking with Robert about his 25+ year background in web security, his time with eBay, being well known for creating hackers.org, working at whitehat, whe…
 
US Supreme Court eyes narrowing of CFAA FBI warns of BEC scammers using email auto-forwarding in attacks Trump lawyer calls for Christopher Krebs’ execution Thanks to our episode sponsor, SecureLayer7. Getting rid of vulnerabilities within the systems can be quite an intricate task. But why bother with anything else when there is an all in one cybe…
 
Most parents are struggling with where to draw the line with their children when it comes to technology. It’s designed to be addictive, so how do you teach your kids to understand the risks, set boundaries, and enforce them? And how do you make sure they protect their passwords and identities? Joe and Mike share the conversations they’ve had with t…
 
Everyone likes their privacy, but no one likes dealing with overly-complex security measures. This week we welcome Josh Lospinoso, Co-Founder of Shift5, and Matthew Dunlop, CISO at Under Armour as they shed light on the top growing competitive differentiator among consumers that market giants, like Apple, use to their advantage. Plus, an insider's …
 
Many organizations leverage regulations and standards to help them define their security and privacy programs, and in doing so, spend time and money creating policies, implementing controls, and monitoring for exceptions. But what happens when the regulation or standard changes? There's a seemingly constant barrage of change in the law and standard…
 
Cryptojacking from Hanoi. Dormant networks rise again, for no easily discernible reason (but it doesn’t look good). A gang is hitting German victims with the Gootkit banking Trojan, and sometimes mixing it up with a REvil ransomware payload. Conti ransomware hits IoT chipmaker. SCOTUS reviews the Computer Fraud and Abuse Act. A few predictions for …
 
Ransomware can cause damage beyond your files. This episode talks about a ransomware attack that has shutdown an entire school system. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/Security…
 
Together we build a smart, secure future. In silos, we stagnate. Governments, non-profits, and industries re-discover our time's pressing needs and re-connect to share resources, strategies, innovations, and success stories. Once again, and despite these unique times, our friend Lan Jenson was able to pull together her yearly signature event. The u…
 
What happens when two bots go on a date? 🤖 💕 All that and more as we round-up the security news in Watchtower Weekly. Settle in for a bumpy ride, as Matt & Roo record without Anna. Needless to say, most of this episode is on the cutting room floor. Saving the episode from total destruction is our special guest this week. Matt had the pleasure of ch…
 
Baltimore schools struggling with ransomware UK tightens restrictions on Huawei 5G equipment ZeroLogon now detected by Windows Defender Thanks to our episode sponsor, SecureLayer7. Getting rid of vulnerabilities within the systems can be quite an intricate task. But why bother with anything else when there is an all in one cybersecurity package for…
 
North Korean operators phish a major pharma company. The Bandook backdoor is back, and probably being distributed by mercenaries. A school district cancels classes after a ransomware attack. Man U continues to work on recovering its systems. Former CISA Director says there are no signs of foreign manipulation of US elections. Rick Howard wonders wh…
 
As the holiday season approaches that means the bad guys are stepping up their attacks. There is a new twist of phishing and Zoom bombing. This episode talks about what it is and how it works. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security…
 
This week's tools, tips and tricks comes in from a follower of my blogs and podcast. Finding a VPN can be difficult to wade through all the choices for something that is supposed to keep you secure. Someone created their own VPN guide and wanted to share it. Source: https://Bestvpn.org Be aware, be safe. Become A Patron! Patreon Page *** Support th…
 
Jeff Hussey is the President and CEO of Tempered. Jeff, the founder of F5 Networks, is an accomplished entrepreneur with a proven track record in the networking and security markets. He maintains several board positions across a variety of technology, nonprofit and philanthropic organizations and currently is the chairman of the board for Carena an…
 
Dive into all things Apple security with today’s guest, Kelli Conlin, Security Solutions Specialist at Jamf. Learn about securing devices across multiple operating systems, the hidden-in-plain-sight Apple security Bible, and why Kelli’s mom isn’t allowed to use the 15-year-old Mac laptop Kelli is still hanging on to after all these years. – Enter c…
 
Biden transition team forced to build its own cybersecurity protections China owns the lion’s share of internet cross-border data flow U.S. Supreme Court to rule on hacking laws Thanks to our episode sponsor, SecureLayer7. Getting rid of vulnerabilities within the systems can be quite an intricate task. But why bother with anything else when there …
 
This week we are talking with Youtuber CyberSecurity Meg. Our topic of the week is Incident Response. We will be covering things like the incident management process, some of our favorite tools, and some general industry chit chat. Be sure to join us on Twitch to participate in these conversations live as well as an opportunity to join the Q&A at t…
 
Cybersecurity attorney Camille Stewart shares how her childhood affinity for making contracts pointed to her eventual career as an attorney. Having a computer scientist father contributed to Camille's technical acumen and desire to include technology in her life's work. Camille has worked various facets of cybersecurity law from the private sector,…
 
2020 has been a colossal roller coaster of a year in many ways, and the numbers and depth of submissions hitting the Black Hat events review board for the 2020 European installment this year demonstrate the unique times in which we are all living. Taking into account the runaway trains of ransomware and misinformation to hacking the Sony PS4 and th…
 
The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat land…
 
Trigger warning, this episode is over an hour long; do not time anything with the length of this episode. This Week in InfoSec 21st November 2008: The Conficker worm was first discovered. It spread quickly by exploiting a vulnerability that was addressed via the patch described in Microsoft's out-of-band bulletin MS08-067 four weeks prior. It infec…
 
On today’s special episode of the New CISO podcast, Steve Moore chats with Deneen DeFiore of United Airlines, Colin Anderson of Levi Strauss & Co. and Charlie McNerney of Expedia on what it’s been like as a CISO during the pandemic. COVID and the Airline Industry Deneen begins by discussing how she became the CISO for United Airlines right as COVID…
 
This Season is dedicated to SASE ZTNA, our guest for the show is Michael. Michael is a Principal Global Solution Architect with Netskope. In his role, he advises Netskope customers on best practices around Netskope deployments and integrating Netskope solutions within customer environments by leveraging integration with the customer technology ecos…
 
In the second and final episode in a series for CYBER on neo-Nazi terror group the Base, we dive into its origins: The online brainchild of its leader Rinaldo Nazzaro, an ex-Pentagon contractor with alleged links to the Kremlin (which he denies) who began his project for “race war” as a WordPress site that evolved into a secretive, encrypted chat g…
 
Author and broadcaster Tim Harford joins us as we discuss the merits of robotic canine security guards, deepfakes, and the curious tale of an art forgery. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. And don't miss our special feat…
 
What does the CISO role look like at the state level in the United States? We got to speak with the first CISO of the State of California, Mark Weatherford, to get his perspective. He also has vast experience in the commercial sectors, and the comparison helps to highlight the differences and even some similarities. The priorities are quite differe…
 
Observers see a shift in Russia’s influence tactics, but prank calls are (probably) not among those tactics. An event site suffers a data breach, and warns customers to be alert for spoofing. COVID-19 contact tracing continues to arouse privacy concerns. Joe Carrigan has tips for safe online shopping during the holidays. Our guest is Dmitry Volkov …
 
In this episode we're joined by Eva Prokofiev. She'll be walking us through her thoughts and methodologies on pivoting off of password breach data in to other pieces of intelligence. Eva's original blog post can be found at: https://www.tracelabs.org/blog/thinking-outside-the-box-data-breaches Want to learn more about Open Source Intelligence? Join…
 
Loading …