Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for NORTH AMERICA by the 2021, 2022, and 2023 Cybersecurity Excellence Awards. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking with current leaders and experts in the IT and C ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Explore the minds of world-class web3 hackers, smart contract protocol developers, startup founders, and cybersecurity specialists with host DeGatchi as he takes you on a journey through the chaotic world of Ethereum Virtual Machine (EVM) blockchain cyberspace. Keywords: solo auditor, public auditing platforms, private audits, scalability, freedom, Scraping Bits podcast, blockchain technology, audit industry, flashbots, reverse engineering, cybersecurity, infosec, mev, mev bot, quant, defi, ...
…
continue reading
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
…
continue reading
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
A interview series where information security marketing executives share their stories, insights, best practices. For more information, check out: https://cybersecuritysalesinsider.substack.com and https://aphinia.com/
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Podcast by InfoSec Campus
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
…
continue reading
Trace Labs is a Canadian based non profit specializing in the crowd sourcing of open source intelligence collection. In this series, we explore the topics, techniques and tools that relate to OSINT collection.
…
continue reading
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
1
3/13/2024 - International Hacking Co. Featuring: Josh Mason
1:00:20
1:00:20
Play later
Play later
Lists
Like
Liked
1:00:20
00:00 - PreShow Banter™ — Death to Clippy 05:18 - BHIS - Talkin’ Bout [infosec] News 2024-03-11 – Featuring Josh Mason 06:58 - Story # 1: Behind the doors of a Chinese hacking company, a sordid culture fueled by influence, alcohol, and sex 13:43 - Story # 2: Top US cybersecurity agency hacked and forced to take some systems offline 23:39 - Story # …
…
continue reading
1
BREAKING: “Department of No” Upgraded to “Department of Slow”
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our sponsored guest, Nadav Lotan, product management team leader, Cisco. In this episode: How can security teams do their jobs without seeming like an im…
…
continue reading
1
Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37
CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she t…
…
continue reading
1
Change Healthcare payout, FTC probe into Reddit, Japanese tech giant breached
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49
UnitedHealth fronts over $2 billion in recovery efforts Spyware agreement gains more international support FTC probes Reddit's AI data licensing ahead of IPO Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and securi…
…
continue reading
1
Seizing IT Opportunities - Gerry Gebel's Professional Saga
40:28
40:28
Play later
Play later
Lists
Like
Liked
40:28
Ever wondered how an economics graduate ends up orchestrating identities in the tech world? Join us as Gerry Gebel unpacks his incredible journey from an unexpected programming class to spearheading a bank's leap into IBM technology. His story, far from typical, is a testament to seizing opportunities and navigating the dynamic landscape of IT. In …
…
continue reading
1
How Do We Handle Sneaky Changes in Terms and Conditions That Allow Training of AI with Sensitive/Customer Data Essentially Without Our Knowledge | A Conversation with Nigel Cannings| Redefining CyberSecurity ...
43:33
43:33
Play later
Play later
Lists
Like
Liked
43:33
Guest: Nigel Cannings, CEO at Intelligent Voice [@intelligentvox] On Linkedin | https://www.linkedin.com/in/nigelcannings/?originalSubdomain=uk Google Scholar | https://scholar.google.co.uk/citations?user=zHL1sngAAAAJ&hl=en ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurit…
…
continue reading
Volt Typhoon retains the attention of US investigators. The IMF reports a cyber breach. Fujitsu finds malware on internal systems. Securonix researchers describe DEEP#GOSU targeting South Korea. Subsea cable breaks leave West and Central Africa offline. Health care groups oppose enhanced cyber security regulations. A Pennsylvania school district gr…
…
continue reading
1
🚨 Cyber News: McDonalds Outage, IMF Hacked, Supply Chain Threats, AT&T Data Leak, POC for Fortra RCE, Bham Network Outage
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35
🚨 Cyber News: McDonalds Outage, IMF Hacked, Supply Chain Threats, AT&T Data Leak, POC for Fortra RCE, Bham Network Outage Cybersecurity News CyberHub Podcast March 18th, 2024 Today's Headlines and the latest #cybernews from the desk of the #CISO: McDonald's: Global outage was caused by "configuration change" Network outages in Birmingham persist as…
…
continue reading
1
McDonald’s outage update, Chrome URL protection, Birmingham Alabama outage
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34
Global McDonald’s outage blamed on third-party vendor, not cyberattack Google adds real-Time URL protection for Chrome Network outages hit Birmingham Alabama Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and securi…
…
continue reading
This week in InfoSec (14:26) With content liberated from the “today in infosec” twitter account and further afield 7th March 2017: WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency (CIA). Code-named Vault 7 by WikiLeaks, it was the largest ever publication of confidential documents on the agency. https://twitter.com/to…
…
continue reading
1
Encore: Dawn Cappelli: Becoming the cyber fairy godmother. [OT] [Career Notes]
10:02
10:02
Play later
Play later
Lists
Like
Liked
10:02
Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working wi…
…
continue reading
1
Unveiling the updated NICE Framework & cybersecurity education’s future. [Special Edition]
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32
The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1) provides a set of building blocks for describing the Tasks, Knowledge, and Skills (TKS) that are needed to perform cybersecurity work by individuals or teams. Through these building blocks, the NICE Framework enables organizations to develop th…
…
continue reading
1
Book | Sigh, See, Start: How to Be the Parent Your Child Needs in a World That Won’t Stop Pushing—A Science-Based Method in Three Simple Steps | A Conversation With Author Dr. Alison Escalante MD | Audio ...
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35
Guests: Alison Escalante, Author, Pediatrician On LinkedIn | https://www.linkedin.com/in/alisonescalantemd/ On Twitter | https://twitter.com/AEscalanteMD Website | https://theprimarycarer.com/ _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcas…
…
continue reading
1
Inside SendGrid's phishy business. [Research Saturday]
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55
Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. Hackers behind this novel phishing campaign us…
…
continue reading
1
A Conversation with David Lillefloren | The Leadership Student Podcast with MK Palmore
31:20
31:20
Play later
Play later
Lists
Like
Liked
31:20
Guest: David Lillefloren, CEO, Sunraycer On LinkedIn | https://www.linkedin.com/in/david-lillefloren-4b2b821/ ______________________ Host: MK Palmore, Host of The Leadership Student Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/mk-palmore ______________________ This Episode’s Sponsors Are you interested in …
…
continue reading
1
Week in Review: Russian Microsoft exfiltration, JetBrains Rapid7 feud, Change Healthcare fallout
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Alexandra Landegger, Executive Director and CISO Collins Aerospace Thanks to our show sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compli…
…
continue reading
1
Flight fiasco: UK Defence Minister's jet faces GPS jamming.
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14
Russia’s accused of jamming a jet carrying the UK’s defense minister. Senators introduce a bipartisan Section 702 compromise bill. The Cybercrime Atlas initiative seeks to dismantle cybercrime. StopCrypt ransomware grows stealthier. A Scottish healthcare provider is under cyber attack. Workers in France are at risk of data exposure. CERT-BE warns o…
…
continue reading
1
CISSP exam tips and tricks part two | Cyber Work Hacks
12:56
12:56
Play later
Play later
Lists
Like
Liked
12:56
Infosec and Cyber Work Hacks are here to help you pass the CISSP exam. Today’s Hack is part two, so I encourage you to go back and listen to part one of Steve Spearman’s CISSP exam tips and tricks. In part two, I pass the mic to Spearman to give you his top five test-taking strategies for the CISSP. What’s the Sesame Street rule? How does the CISSP…
…
continue reading
1
Crisis Management: Strategies When Communicating with Multiple Stakeholders | An On Location Conference Coverage Conversation with Mary Chaney, Melanie Ensign, and Shawn Tuma
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00
Guests: Mary Chaney, Chairwoman, CEO and President, Minorities in Cybersecurity On LinkedIn | https://www.linkedin.com/in/marynchaney/ Melanie Ensign, Founder & CEO, Discernible Inc On LinkedIn | https://www.linkedin.com/in/melanieensign/ Shawn Tuma, Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP [@SpencerFane] On LinkedIn | http…
…
continue reading
1
Change Healthcare fallout, Fortinet SQL warning, Yacht company breach
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55
Change Healthcare - AHA asks for aid, HHS questions HIPAA compliance Fortinet warns of severe SQLi vulnerability in FortiClientEMS software Yacht company MarineMax announces cyberattack Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for …
…
continue reading
1
A CIA Psychologist on the Minds of World Leaders, Pt. 1 with Dr. Ursula Wilder [SpyCast]
1:13:33
1:13:33
Play later
Play later
Lists
Like
Liked
1:13:33
In honor of Women's History Month, please enjoy this episode of the International Spy Museum's SpyCast podcast featuring part 1 of Andrew Hammond's discussion with Dr. Ursula Wilder of the Central Intelligence Agency. Summary Dr. Ursula Wilder (LinkedIn) joins Andrew (X; LinkedIn) to discuss the intersections between psychology and intelligence. Ur…
…
continue reading
1
TikTok showdown: U.S. lawmakers target privacy and security.
33:46
33:46
Play later
Play later
Lists
Like
Liked
33:46
The US House votes to enact restrictions on TikTok. HHS launches an investigation into Change Healthcare. An Irish Covid-19 portal puts over a million vaccination records at risk. Google distributes $10 million in bug bounty rewards. Nissan Oceana reports a data breach resulting from an Akira ransomware attack. Meta sues a former VP for alleged dat…
…
continue reading
1
Tenets For Managing Yourself with Tom Heiser
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54
In this episode, Gene Fay interviews Tom Heiser about his journey and shares tenets for managing oneself. The conversation covers topics such as execution, accountability, expressing passion, doing the best job possible, getting outside one's comfort zone, and focusing on what one can control. Takeaways Execution is key to success. Just do it. Acco…
…
continue reading
1
🚨 Cyber News: Kubernetes Exploit, Fortinet RCE Bug, Nissan Data Breach, Probe into Change Healthcare & Russia Targeted by West
13:41
13:41
Play later
Play later
Lists
Like
Liked
13:41
🚨 Cyber News: Kubernetes Exploit, Fortinet RCE Bug, Nissan Data Breach, Probe into Change Healthcare & Russia Targeted by West Cybersecurity News CyberHub Podcast March 14th, 2024 Today's Headlines and the latest #cybernews from the desk of the #CISO: Kubernetes Vulnerability Allows Remote Code Execution on Windows Endpoints Fortinet warns of criti…
…
continue reading
1
Discussing the art of intelligence and the true meaning of creativity: Generative AI's Impact on Creative Professions | A Conversation with Alex Shvartsman | Redefining Society with Marco Ciappelli
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50
Guest: ✨ Alex Shvartsman, Anthologist / Editor, UFO Publishing, Caezik SF&F [@arcmanorbooks] On LinkedIn | https://www.alexshvartsman.com On Twitter | https://twitter.com/AShvartsman Website | https://www.alexshvartsman.com On Facebook | https://www.facebook.com/shvartsman.alex ____________________________ Host: Marco Ciappelli, Co-Founder at ITSPm…
…
continue reading
1
#63: Fuzzing $8M Of Zero-Day Exploits; AI Fuzzing Smart Contracts - Ft. ChaoFan
42:57
42:57
Play later
Play later
Lists
Like
Liked
42:57
In this insightful episode of the Scraping Bits podcast, host DeGatchi welcomes ChaoFan, an acclaimed cybersecurity expert and pioneer in the field of smart contract security. This episode delves into ChaoFan's remarkable achievement of uncovering $8 million worth of zero-day exploits in various blockchain systems, emphasizing the role of AI in fuz…
…
continue reading
1
#64: Smart Contract SMT Formal Verification, Symbolic Execution & Fuzzing - Ft. Palina Tolmach
58:46
58:46
Play later
Play later
Lists
Like
Liked
58:46
Dive into the intricate world of smart contract security and formal verification techniques in episode 61 of the Scraping Bits Podcast with your host DeGatchi. Joining him is the esteemed expert Palina, as they unravel the complexities of smart contract symbolic execution, SMT formal verification, and fuzzing techniques. In this enlightening episod…
…
continue reading
1
Security, Laws, and Vulnerabilities: Unpacking the Disclosure Process to Understand the Intersection of CFAA, DMCA, and Coordinated Vulnerability Disclosure | A Conversation with Katie Noble and Harley ...
51:27
51:27
Play later
Play later
Lists
Like
Liked
51:27
Guests: Katie Noble, Director, PSIRT and Bug Bounty at Intel Corporation On LinkedIn | https://www.linkedin.com/in/katie-trimble-noble-b877ba18a/ Harley Geiger, Founder and Coordinator, Security Research Legal Defense Fund On LinkedIn | https://www.linkedin.com/in/harleylorenzgeiger/ ____________________________ Host: Sean Martin, Co-Founder at ITS…
…
continue reading
What happens after a municipality gets hacked? In this episode, Darnley discusses the fates of a city or town that gets hit with a ransomware. Who pays for it? How much damage does it really cause? What is the price to be paid post-breach? Why it is the citizens responsibility to hold their local governments accountable before it happens to them? S…
…
continue reading
1
The Demand for Affordable Blue Team Training
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Ron Gula, president and co-founder, Gula Tech Adventures. In this epi…
…
continue reading
1
Teresa Rothaar: Outwork the competition. [Analyst] [Career Notes]
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03
Teresa Rothaar, a governance, risk, and compliance (GRC) analyst at Keeper Security sits down to share her story, from performer to cyber. She fell in love with writing as a young girl, she experimented with writing fanfiction which made her want to grow up to be in the arts. After attending college she found that she was good at math, lighting the…
…
continue reading
1
Gemini vulnerabilities, NYT-OpenAI drama, GitHub leak report
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
Researchers find vulnerabilities in Gemini New York Times denies it “hacked” OpenAI for lawsuit Leaked GitHub secrets up 28% Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and security programs is increasingly chall…
…
continue reading
1
Stuck streaming sticks, TikTok conspiracies, and spying cars
51:11
51:11
Play later
Play later
Lists
Like
Liked
51:11
Roku users are revolting after their TVs are bricked by the company, we learn how to make money through conspiracy videos on TikTok, and just how much is your car snooping on your driving? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, j…
…
continue reading