show episodes
 
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
  continue reading
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
  continue reading
 
R
Reality 2.0
Series avatar that links to series pageSeries avatar that links to series page

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
T
ThinkstScapes
Series avatar that links to series pageSeries avatar that links to series page

1
ThinkstScapes

Jacob Torrey, research@thinkst.com, haroon meer, marco slaviero

Unsubscribe
Unsubscribe
Monthly
 
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
S
Smashing Security
Series avatar that links to series pageSeries avatar that links to series page

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
  continue reading
 
T
The Host Unknown Podcast
Series avatar that links to series pageSeries avatar that links to series page

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
  continue reading
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for NORTH AMERICA by the 2021, 2022, and 2023 Cybersecurity Excellence Awards. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking with current leaders and experts in the IT and C ...
  continue reading
 
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
  continue reading
 
I
ITSPmagazine
Series avatar that links to series pageSeries avatar that links to series page

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
  continue reading
 
We're your daily briefing on the pulse of the cyber world. Each day, we decrypt the complex landscape of cyber threats, zero in on the latest hacks, and dissect the strategies that keep data defenders on their toes. Whether it's a deep dive into the latest enterprise breach, a spotlight on emerging threat vectors, or actionable intel from the cybersecurity trenches, 'DCTIB' is your essential source for the cyber news that matters. Join us in the loop, and stay one step ahead in the digital age
  continue reading
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at:Website: https://topcyberpro.com/Facebook: https://www.facebook.com/TopCyberPro/Instagram: https://www.instagram.com/topcyberpro/Twitter: https://twitter.com/TopCyberProTikTok: https://www.tiktok.com/@topcyberproLinkedIn: https://www.linkedin.com/company/topcyberpro/
  continue reading
 
Cybersecurity and data privacy is a requirement for any good business. So how can a CISO, CTO or compliance manager stay on top of where the industry is heading? Infosec veteran and former lead auditor, Blaise Wabo discusses the intersection of security, privacy and compliance. Topics include: Guest interviews with industry experts, framework updates, the business implications of compliance (and non-compliance), and discussions about compliance challenges, tips and tricks.
  continue reading
 
Loading …
show series
 
Join renowned cybersecurity experts Rob Lee and Jake Williams in a riveting livestream discussion as they delve into the complex world of offensive cyber operations amid ongoing nation-state conflicts. In this episode of Wait Just an Infosec, we’ll explore the critical role of cyber warfare in the Ukraine-Russia and other global conflicts, providin…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our guest, Suresh Vasudevan, CEO, Sysdig. In this episode: What will the employment landscape look like with Generative AI becoming the next big thing? W…
  continue reading
 
UK nuclear site attacked by state-linked attackers US confirms Iranian actors behind water breaches The infinite regress of ChatGPT data exfiltration Huge thanks to our sponsor, Barricade Cyber Solutions Facing a ransomware attack? Don't panic, remain calm and remember to contact Barricade Cyber Solutions, the DFIR team trusted to quickly recover b…
  continue reading
 
Oh misinformation, we will break your spell.. In this episode, understand the entangled complex web of disinformation and misinformation that threatens to disrupt the delicate balance of our communities. The false narratives start to manifest in the real world, the vulnerability of societal trust, and the importance of critical thinking in the face…
  continue reading
 
Episode Originally Aired Aug 2020: Officially granted the title within a company in 1995, the CISO role is relatively new in Infosec's grand scheme. Since this first attribution, many have taken the job - and the reigns - to shape and define the responsibilities, but it looks like it is still a work in progress. With each step comes new challenges,…
  continue reading
 
The US and Israel attribute attacks on PLCs to Iran. Agent Raccoon backdoors organizations on three continents. XDSpy is reported to be phishing the Russian defense sector. Trends in digital banking fraud. Repojacking Go module repositories. Ann Johnson from Afternoon Cyber Tea speaks with Lynn Dohm, executive director of WiCyS, about the power of …
  continue reading
 
In this episode: We have a new agent on the block, Agent Racoon. We also cover 2 new apple Zero days which have been used to hack victims devices. Arm yourself with knowledge and join us at the vanguard of digital defense. Subscribe for a front-row seat to the ongoing battle in the binary world of zeros and ones. 💻⚔️🛡️ #CybersecurityUpdate #ransomw…
  continue reading
 
Confidence Staveley of the CyberSafe Foundation and the CyberGirls program is today's guest. CyberGirls is a year-long cohort program in which women in Africa ages 18 to 28 can learn cybersecurity basics and create career tracks to fast-track these students into cybersecurity careers! Staveley tells us about the workings of the program, how she use…
  continue reading
 
Credit unions facing outages due to ransomware attack on cloud provider Roblox, Twitch allegedly targeted by ransomware cartel Apple fixes two new iOS zero-days in emergency updates Huge thanks to our sponsor, Barricade Cyber Solutions Experiencing ransomware? Barricade Cyber Solutions will help you recover from the nightmare. Trust the industry DF…
  continue reading
 
Are you prepared to redefine your approach to securing the public cloud? Join us for an enlightening discussion with Jeff, an InfoSec veteran, where we unravel the intricacies of securing public cloud-native platforms. As we step into Jeff's career of over two decades, we explore the world of cloud security and emphasize the role of cloud providers…
  continue reading
 
Bernard Brantley, CISO from Corelight sits down to share his inspiring career path with others. Bernard started at the very bottom of the tech stack, and shares how he was extremely unclear about what it was that he wanted to do in life and how he was going to get there. Ultimately he reached a point now where he has the self confidence and an incr…
  continue reading
 
This week in InfoSec (09:40) With content liberated from the “today in infosec” twitter account and further afield 24th November 2014: The Washington Post published an article which included a photo of TSA master keys. A short time later functional keys were 3-d printed using the key patterns in the photo. https://twitter.com/todayininfosec/status/…
  continue reading
 
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes In the 1960s, s…
  continue reading
 
In "Cybersecurity 2050: A Collective Odyssey into a Secure Future," we explore the transformative journey of cybersecurity from its nascent stages to a robust, interconnected landscape in 2050. Join us as we investigate the integration of advanced technologies like AI, quantum computing, IoT, and biometric systems with an open cybersecurity model. …
  continue reading
 
Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop Fox worked up a proof of concept demo. This research share how they were able to create that proof-of-concept…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, SpyCloud SpyCloud disrupts cybercrime by telling you what criminals know about your business and your customers, so you can take action on exposed authentication d…
  continue reading
 
Senator Wyden blocks the Senate vote on the new NSA and Cyber Command lead. GPS interference is attributed to Iran. Meta identifies and removes Chinese and Russian accounts and groups for coordinated inauthenticity. The EU Council president proposes ‘European cyber force’ with ‘offensive capabilities’. Twisted Spider is observed conducting new rans…
  continue reading
 
Your posts matter more than you think. Social media has changed the way wars are fought and the internet has become a new battlefield. Twitter may be dying, but it still matters an awful lot to policy makers. TikTok is ascendent, but often because its content can be repurposed on other platforms. Telegram can give you the news on the ground, but on…
  continue reading
 
Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist ______________________ Episode Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Introduction Cybersecurit…
  continue reading
 
Doc Searls and Katherine Druckman talk to Kyle Rankin about his journey into Kubernetes and the cloud native landscape. Site/Blog/Newsletter FaceBook Twitter Mastodon Special Guest: Kyle Rankin. Support Reality 2.0 Links: Bluefin | The Next Generation Linux Workstation — The next generation Linux workstation, designed for reliability, performance, …
  continue reading
 
Manufacturing industry tops cyber extortion trend Google’s RETVec the latest warrior on bad emails Zyxel warns of vulnerabilities in NAS devices Huge thanks to our sponsor, SpyCloud New research from SpyCloud reveals a critical discovery: nearly a third of ransomware victim companies this year were infected with infostealer malware like Raccoon, Vi…
  continue reading
 
Reports of a Critical Vulnerability in ownCloud. Sites serving bogus McAfee virus alerts. Japan’s space agency reports a breach. Okta revises the impact of their recent breach. Cryptomixer gets taken down in an international law enforcement operation. "SugarGh0st" RAT prospects targets in Uzbekistan and South Korea. NATO cyber exercise runs against…
  continue reading
 
Join hosts Giles House and Abby Rodrigues along with their guest Mark Petry, Cyber Compliance and Risk Manager at GoodLeap, as they lend valuable insights about the importance of building a culture of security. Listen to learn why more organizations should phase out rubber stamp reports, seek high-quality audits, and position compliance as a value …
  continue reading
 
The Future Of Artificial Intelligence with David YoungbloodIn this episode, I discuss the future of AI, Sam Altman, Open AI, AI research, human values, AI risk mitigation, how AI will improve lives, AI augmentation, and the benefits of AI.References:CommonThread AI: A Customer Journey Mapping and Data Interpreter Platform for B2B Organizations leve…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our guest, Jerich Beason, CISO, WM. In this episo…
  continue reading
 
In this episode: Sinbad Crypto Mixer gets taken down by LEO, Dollar Tree gets breached and some interesting insights in the paths a few young men took on their cyber journey. Arm yourself with knowledge and join us at the vanguard of digital defense. Subscribe for a front-row seat to the ongoing battle in the binary world of zeros and ones. 💻⚔️🛡️ #…
  continue reading
 
All Okta customers exposed in breach JAXA hit by cyberattack OpenAI’s chatbots leak secrets Huge thanks to our sponsor, SpyCloud For some people ignorance is bliss – but that’s not an option for those of us in cybersecurity. SpyCloud has a free tool that lets you check your company’s darknet exposure, and you might find some things that are pretty …
  continue reading
 
In this episode: Okta reveals that the October hack had a much bigger impact, Identity service gets hijacked to steal americans credentials, and Qilin ransoms Yanfeng. Arm yourself with knowledge and join us at the vanguard of digital defense. Subscribe for a front-row seat to the ongoing battle in the binary world of zeros and ones. 💻⚔️🛡️ #Cyberse…
  continue reading
 
Guests: Shawn Butler, Co-Founder / VP - Architecture & Analytics at BNS UEP [@bnsuep1] On LinkedIn | https://www.linkedin.com/in/1kindword/ Kika Von Klück, VP - Research and Innovation at BNS UEP [@bnsuep1] On Linkedin | https://www.linkedin.com/in/kikavonkluck/ ____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPma…
  continue reading
 
Don't minimise your Teams Meeting video call too hastily, you might reveal your dirty secrets! Would you be prepared to pay for Facebook and Instagram? And who is being faked to promote cryptocurrency scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carol…
  continue reading
 
A major ransomware gang is taken down in an international sweep. CISA and the WaterISAC respond to the Aliquippa cyberattack. Attacks against infrastructure operators hit business systems. Qlik Sense installations are hit with Cactus ransomware. Researchers discover a Google Workspace vulnerability. A hacktivist auxiliary compromises a Russian medi…
  continue reading
 
Guest: Tyler Cohen Wood, CEO and Co-Founder Dark Cryptonite | Keynote Speaker | 2023 Top 30 Women in #AI | Cyber Woman of the Year Finalist 2021 and 2023 | Top 50 Global #Cybersecurity | Board Member | Fmr DIA Cyber Deputy Division Chief On LinkedIn | https://www.linkedin.com/in/tylercohen78/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.i…
  continue reading
 
The latest episode of the Transatlantic Cable podcast begins with news that General Electric are investigating claims of a data breach, found it was found that an attacker was selling access to the business for just $500. From there, the team discuss how U.S police forces are returning $9 million in seized crypto assets back to victims of ‘pig butc…
  continue reading
 
Join host Joseph Carson for a compelling discussion with Bugcrowd founder Casey Ellis on the evolution of coordinated vulnerability disclosure. Ellis’ pioneering work connects ethical hackers with organizations to enhance their cyber resilience. He shares his experiences and unique insights into disclosure trends, including how changing regulations…
  continue reading
 
Ransomware gang busted in Ukraine by international operation North Texas water utility hit with cyberattack Former Uber CISO speaks out after 6-year silence Huge thanks to our sponsor, SpyCloud SpyCloud has discovered that infostealer malware infections are an early warning signal for ransomware. In fact, nearly a third of ransomware victim compani…
  continue reading
 
Loading …

Quick Reference Guide