show episodes
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
The people behind The Intercept’s fearless reporting and incisive commentary discuss the crucial issues of our time: national security, civil liberties, foreign policy, and criminal justice. See acast.com/privacy for privacy and opt-out information.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
ROGUE NEWS is a group of political scientists, editorial engineers, and radio show developers drawn together by a shared vision of bringing Alternative news through digital mediums that evangelize our civil liberties. www.roguenews.comPLEASE SUBSCRIBE! See acast.com/privacy for privacy and opt-out information.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
 
C
Caveat

1
Caveat

CyberWire, Inc.

Unsubscribe
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. See acast.com/privacy for privacy and opt-out information.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cyber security tips, tools, and more in the Alias Secure AF Cyber Security Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cyber security topics with coworkers and special guests. No matter where you are on the cyber security knowledge ladder, there's an episode here for you.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Each week, Foreign Policy’s Amy Mackinnon, will recommend one podcast from around the world, interview the host, and play an excerpt. This curated show is designed to help listeners interested in the things we are—great stories, compelling interviews, and cogent analysis on international affairs—sort through the overwhelming variety of podcasts out there and find the best ones. And occasionally you’ll hear audio from our own newsroom. FP Playlist replaces our flagship podcast First Person. S ...
 
C
CISO Tradecraft

1
CISO Tradecraft

G Mark Hardy & Ross Young

Unsubscribe
Unsubscribe
Weekly
 
Welcome to CISO Tradecraft. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
 
Each week The Intercept’s Washington, D.C. bureau brings you one important or overlooked story from the political world. Bureau Chief Ryan Grim and a rotating cast of journalists, politicians, academics and historians tell you what the rest of the media are missing. See acast.com/privacy for privacy and opt-out information.
 
Loading …
show series
 
Chris Wysopal is Co-Founder and Chief Technology Officer at Veracode, which pioneered the concept of using automated static binary analysis to discover vulnerabilities in software. In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecur…
 
Many individual police officers acted heroically on January 6th. But the successful attack on the Capitol by a pro-Trump mob, seeking to disrupt the certification of the electoral votes, remains one of the biggest policing failures in American history. Not only did the Capitol police fail to prepare for the attack, but many members of the mob were …
 
Jenkins discloses dozens of zero-day bugs in multiple plugins Rogue HackerOne employee steals bug reports to sell on the side Patchable and preventable security issues lead causes of Q1 attacks Thanks to today’s episode sponsor, Votiro Can you trust that your content and data is free of malware and ransomware? With Votiro you can. Votiro removes ev…
 
7-Zip and MotW; Session Manager Backdoor; Chrome 0Day Patch 7Zip Mark of the Web For Office Files https://isc.sans.edu/forums/diary/7Zip+MoW+For+Office+files/28812/ SessionManager Backdoor Seen with IIS https://securelist.com/the-sessionmanager-iis-backdoor/106868/ Googe Chrome Stable Channel Update https://chromereleases.googleblog.com/2022/03/sta…
 
In this episode, Marc and Patrick Morley, former CEO of Carbon Black, get nostalgic as they discuss Patrick's journey of coming up through the start up scene in the 90s—from working with VCs to taking companies public—and compare it to running cyber companies today. Along with the early career experience that helped form Patrick's leadership philos…
 
Today we’re bringing you another episode of Lawfare No Bull, a podcast featuring primary source audio from the world of national security law and policy. Today’s episode features audio from the surprise sixth public hearing held by the House select committee to investigate the Jan. 6 attack on the Capitol. The committee heard explosive testimony fr…
 
On this episode of CISO Tradecraft, we feature Helen Patton. Helen shares many of her career experiences working across JP Morgan, The Ohio State University, and now Cisco. -Is technical acumen needed for CISOs? -Surviving organizational politics (34:45) Helen discusses The Fab 5 Security Outcomes study. Volume 1 Study - Link Volume 2 Study - Link…
 
Today we’re bringing you another episode of Lawfare No Bull, a podcast featuring primary source audio from the world of national security law and policy. Today’s episode features audio of the fifth of a series of public hearings held by the House select committee to investigate the Jan. 6 attack on the Capitol. The hearing included testimony from f…
 
Chatter, a podcast from Lawfare, features weekly long-form conversations with fascinating people at the creative edges of national security. This week on Chatter, David Priess talked with former U.S. Secret Service agent Jonathan Wackrow to discuss the inherent dilemmas that come along with the job. One of them can arise if agents become partisan a…
 
Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well a…
 
An update on the DDoS attack against Norway. NATO's resolutions on cyber security. North Korea seems to be behind the Harmony cryptocurrency heist. MedusaLocker warninga. Microsoft sees improvements in a gang's technique. Google blocks underworld domains. The Israeli-Iranian conflict in cyberspace. Chris Novak from Verizon with his take on this yea…
 
How can a global enterprise build security and business continuity capacity in their local branches? Develop credibility through listening and patience, says RC Miles with the AIDS Healthcare Foundation. That capacity paid off when conflict arose, he tells SM Highlights host Chuck Harold in this episode, sponsored by RaySecur (https://raysecur.com/…
 
In today's episode we talk about Purple Knight, a free tool to help assess your organization's Active Directory security. I stuck Purple Knight in our Light Pentest LITE pentest training lab and did an informal compare-and-contrast of its detection capabilities versus PingCastle, which we talked about in depth in episode #489.…
 
In Robert Kuttner’s new book, “Going Big: FDR’s Legacy, Biden’s New Deal, and the Struggle to Save Democracy,” he explains how we got to our present political inflection point, how high the stakes are, and what comes next. Kuttner — who co-founded the Economic Policy Institute as well as The American Prospect — joins Jon Schwarz to discuss. https:/…
 
When a Russian missile recently struck a TV tower in Kyiv, near Babyn Yar, the site of Nazi mass murders during the Holocaust, some saw the attack as a potent symbol of the tragic occurrence of violence in Ukraine. To talk through the historical significance of the attack, Lawfare Managing Editor Tyler McBrien sat down with Maksym Rokmaniko, an arc…
 
A new sophisticated malware is attacking SOHO routers New study shows over half of employees use prohibited apps Google battles bots, puts Workspace admins on alert Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to …
 
Cobalt Strike Domain Suspension; ManageEngine Vuln Details; CWE Top 25 Update Case Study: Cobalt Strike Server Lives on After its Domain is Suspended https://isc.sans.edu/forums/diary/Case+Study+Cobalt+Strike+Server+Lives+on+After+Its+Domain+Is+Suspended/28804/ CVE-2022-28219: Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit…
 
CISA, the FBI, the Department of the Treasury, and the Financial Crimes Enforcement Network are releasing this alert to provide information on MedusaLocker ransomware. Observed as recently as May 2022, MedusaLocker actors predominantly rely on vulnerabilities in Remote Desktop Protocol to access victims’ networks. AA22-181A Alert, Technical Details…
 
On June 30, the U.S. Supreme Court issued a ruling that will have far reaching consequences about the power of the federal government to fight climate change. How did the landmark ruling even end up in front of the Justices, why did they decide to rule on it, and what will the consequences be for the environment and the country? On this episode of …
 
Killnet hits Norwegian websites. Hacktivists are tied to Russia's government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea Little Limbago from Interos examines borderless data. Rick Howard speaks with Cody Chamberlain from NetSPI on Breach Communication. Roscosmos publishes locations of…
 
On this episode of The New CISO, Steve is joined by Kevin DeLange, the VP and CISO of IGT, to discuss how Kevin’s love of problem-solving led him to a career in cyber security. Before joining the information security field, Kevin served in the military and completed a degree in Anthropology. Now a CISO, he reflects on how the skills he developed th…
 
L'animatrice, rédactrice et productrice Alexia Bouallagui s'entretient avec le Commandant Jeremy Bachelier, Officier de Liaison français au Centre de Fusion de l’Information (IFC) à Singapour. Ils discutent des missions du centre et de la contribution de l'IFC à la sécurité maritime du point de vue d'un Officier de Liaison français. Ils abordent ég…
 
Commander Jeremy Bachelier, the French Liaison Officer at the Information Fusion Center (IFC) in Singapore joins us to discuss the missions of the center and the IFC’s contribution to maritime security from the perspective of a French Liaison Officer. We also explore the current and future challenges to maritime security in the Indo-Pacific as well…
 
ESET, a global leader in cybersecurity, has released its T1 2022 Threat Report, which summarizes the most notable trends that shaped the threat landscape from January to April 2022. Join ISACA’s Research Advisor, Brian Fletcher, as he breaks down the ESET T1 2022 Threat Report with Chief Security Evangelist for ESET, Tony Anscombe. For more informa…
 
The House committee investigating the Jan. 6 insurrection is midway through a blockbuster series of hearings exploring Donald Trump’s efforts to overturn the 2020 election and disrupt the peaceful transfer of power. Central to those efforts, of course, was the Big Lie—the false notion that Trump was cheated out of victory in 2020. This week on Arbi…
 
NATO to create rapid response cyber force FBI warns of deep fakes for remote work Ship controls identified as another major attack surface Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to comb through the D&R clutt…
 
Gary Buonacorsi, Tanium’s SLED CTO and Chief IT Architect, joins Dave to discuss Cyber Incident Reporting for the Critical Infrastructure Act. Ben and Dave share some listener follow up from a listener who spent some time being a U.S. Marshall, and their input on a recent episode where someone had a fake warrant out for their arrest. Ben's story fo…
 
In this episode of the National Security Podcast, we bring you the fifth instalment of the Women in National Security mini-series, produced in collaboration with Accenture. In this episode of the National Security Podcast, hosts Gai Brodtmann, National Security College Futures Council member, and Meg Tapia, Principal Director for Defence and Nation…
 
Moving MFA; Managing Human Risk Report; Service Fabric PoC; Zimbra RCE; Deepfake Interviews; Its New Phone Day: Time to Migrate Your MFA https://isc.sans.edu/forums/diary/Its+New+Phone+Day+Time+to+migrate+your+MFA/28800/ Managing Human Risk Security Awareness Report https://go.sans.org/lp-wp-2022-sans-security-awareness-report Microsoft Azure Servi…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login