show episodes
 
Artwork

1
Rational Security

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Sergei & the Westminster Spy Ring

Carole Cadwalladr & Peter Jukes with Ruth Abrahams

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
  continue reading
 
Artwork
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork
 
WAR ROOM: Pandemic is the first and most comprehensive program to bring the most up to the minute information on the news of the day. Stephen K. Bannon brings medical experts, politicians, business leaders, and those on the front lines for a comprehensive look at the latest news from all and provide their insider insights.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Good Life Project

Jonathan Fields / Acast

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
What does it mean to live a good life? Is it about happiness, health, friendship, love, or meaning? What about work, wealth, purpose, service, or something else? Can you live a good life even when things are hard? These are the questions and topics we explore every week in conversation with leading voices from health, science, art, industry, mindset, and culture, like Brené Brown, Matthew McConaughey, Mel Robbins, Alex, Elle, Adam Grant, Elizabeth Gilbert, Yung Pueblo, Maya Shankar, Mitch Al ...
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
Security in Focus

Gallagher Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Our Security in Focus webinars provide an insight into the latest Gallagher developments as well as inform and educate on the security solutions available. The webinars are hosted by members of the Gallagher team across the globe and provide you with an opportunity to ask questions to our experts.
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork

1
The Watchers

Sentinel Blue

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
  continue reading
 
Artwork

1
Battle Lines

The Telegraph

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Across the world, from Europe to Asia, the Americas to the Middle East, tensions are rising between nation states. Traditional alliances and alignments are constantly evolving in the 21st century. An understanding of defence and security policy and the tides of political, social and economic changes is crucial for any informed understanding of our world. 2024 sees war in Europe and Israel, and elections in major economies, including the US, the UK, Taiwan, South Africa, and many others. Insu ...
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Artwork

1
The Cognitive Crucible

Information Professionals Association

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
  continue reading
 
This podcast explores investment strategies, economics, personal finance, and stock analysis. It features real conversations and analysis to inform, educate, and entertain. Note that nothing in this podcast is investment advice and it is for entertainment & discussion purposes only. Do your own due diligence before making any investment. www.securityanalysis.org
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
  continue reading
 
Loading …
show series
 
00:00 - PreShow Banter™ — Fake Australian 04:17 - BHIS - Talkin’ Bout [infosec] News 2025-01-27 04:34 - Story # 1: DeepSeek sparks AI stock selloff; Nvidia posts record market-cap loss 30:50 - Story # 2: Tech giants are putting $500bn into ‘Stargate’ to build up AI in US 42:23 - Story # 3: DeepSeek Faces Large-scale Cyberattack, Halts New User Regi…
  continue reading
 
In this special Edition of Unsecurity, Key Account Manager Tonya Barnes speaks on the creation of HERoic Hacks, the infosec conference that empowers women in the field. About HERoic Hacks: Envisioned by Tonya, and supported by FRSecure, HERoic Hacks addresses the gap in representation by providing networking opportunities, expert speakers, and awar…
  continue reading
 
In this episode, we dive into the latest developments shaking the cryptocurrency world. We begin with a critical vulnerability in Ethereum's software that could have led to widespread network disruptions. Next, we cover a shocking case in the UK, where a gang received lengthy prison sentences for crypto-related torture and kidnapping. The conversat…
  continue reading
 
On today’s podcast, Lawfare Associate Editor for Communications Anna Hickey spoke to Nayna Gupta, Director of Policy at the American Immigration Council, about the Laken Riley Act, the first piece of legislation signed by President Trump in his second term, its start as a messaging bill in the last Congress, and its impact on the immigration detent…
  continue reading
 
Critical RCE bug in Microsoft Outlook now exploited in attacks Kimsuky uses forceCopy malware to steal browser-stored credentials Treasury agrees to block additional DOGE staff from accessing sensitive payment systems Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersec…
  continue reading
 
In a shock announcement this week Donald Trump said he would ‘take over’ Gaza, ‘own’ it and called for Palestinians to be 'resettled' in neighbouring countries, prompting concerns over ethnic cleansing. Venetia Rainey catches up with The Telegraph’s woman in Washington Katie O'Neill about it and asks military expert Linda Robinson about the feasibi…
  continue reading
 
If you’re enjoying Sergei & the Westminster Spy Ring, we think you’ll love The Spy Who, from Wondery. In this special episode, we’ll play you an extract from their season: The Spy Who Putin Poisoned. When the USSR falls apart, GRU officer Sergei Skripal finds himself adrift in the new Russia, having never asked for the country's new democracy. So w…
  continue reading
 
Deepseek troubles, AI models explained, AMD CPU microcode signature validation, what happens when you leave an AWS S3 bucket laying around, 3D printing tips, and the malware that never was on Ethernet to USB adapters. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-860…
  continue reading
 
Deepseek troubles, AI models explained, AMD CPU microcode signature validation, what happens when you leave an AWS S3 bucket laying around, 3D printing tips, and the malware that never was on Ethernet to USB adapters. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-860…
  continue reading
 
In this episode, we break down Wi-Fi security from the ground up, using a detailed pen testing guide as our roadmap. We explain key concepts like the differences between 2.4 GHz and 5 GHz bands, as well as why outdated protocols like WEP are still worth understanding in today’s security landscape. Learn about advanced threats, including monitor mod…
  continue reading
 
In this episode, we delve into the escalating threat of cyber attacks on healthcare systems, analyzing three high-profile data breaches that have impacted millions of patients and providers. From the North Bay Healthcare breach compromising over 569,000 individuals' sensitive information to the River Region Cardiology incident involving 1.2 terabyt…
  continue reading
 
Aysegul Sensoy has over 20 years of management experience with blockchain, emerging technologies, fintech, business development, marketing and sales. She is currently the chair of the Istanbul Blockchain Women Association and CIS Regional Manager of Fuze Finance. She received her bachelor's degree in economics from Istanbul University and her maste…
  continue reading
 
Ever feel like your emotions are running the show? Learn breakthrough tools from Ethan Kross, PhD, leading expert on emotion regulation and author of Shift: Managing Your Emotions - So They Don't Manage You. Discover potent "sensory shifters," attention deployment tactics, and a step-by-step process to master your emotional world once and for all. …
  continue reading
 
Lawfare Foreign Policy Editor and Georgetown professor Daniel Byman sits down with Holly Berkley Fletcher, a former Senior Africa Analyst at the Central Intelligence Agency, to discuss the complex and tragic situation in Sudan and her recent Lawfare article on the subject, “The Sudan War and the Limits of American Power.” They talk about the initia…
  continue reading
 
Spain arrests hacker of U.S. and Spanish military agencies Robocallers called the FCC pretending to be from the FCC Ransomware payments decreased 35% year-over-year Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day at…
  continue reading
 
This week, we are joined by Jeff Williams, former Global Chairman of OWASP and Founder and CTO of Contrast Security, who is discussing what could happen to "Secure by Design" in the next administration and how to secure software through regs. Ben has the story of Elon Musk’s and DOGE’s incursion into federal databases. Dave's got the story of a man…
  continue reading
 
How can fiction and storytelling effectively engage the public with the complex challenges of national security? How does storytelling bridge gaps in historical narratives and deepen our understanding of contemporary conflicts? How can fiction help project future scenarios and explore potential outcomes? In this episode, Misha Zelinsky and Mick Rya…
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Benjamin Wittes, Molly Reynolds, and Anna Bower to talk through another big week of national security news, including: “Checked Out and Off Balance.” Over its first two weeks in office, the Trump administration has pushed against the traditional limits of congressional authority by unlawfully im…
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Benjamin Wittes, Molly Reynolds, and Anna Bower to talk through another big week of national security news, including: “Checked Out and Off Balance.” Over its first two weeks in office, the Trump administration has pushed against the traditional limits of congressional authority by unlawfully im…
  continue reading
 
👉 Listen Now: A deep dive into the biggest cybersecurity lessons, trends, and leadership insights from 50 episodes of The Professional CISO Show! 🔍 Episode Summary In this Year in Review episode, host David Malicoat reflects on the biggest cybersecurity trends, challenges, and insights from 50 expert conversations in 2024. 🔥 What You’ll Learn: • Th…
  continue reading
 
From online banking to mobile payments, nearly every aspect of our financial lives relies on digital systems. This reliance has brought incredible convenience, but it also means that any disruption — whether due to cyberattacks, system failures, or operational incidents— can have severe consequences. The Digital Operational Resilience Act (DORA) pr…
  continue reading
 
On Jan. 28, the Office of Personnel Management (OPM) sent out an email offering a “deferred resignation program” to over 2 million federal employees, encouraging them to resign effective Sept. 30. The offer is only open until Feb. 6—and in the intervening days since OPM announced the program, federal employees have received a blizzard of followup e…
  continue reading
 
In this episode, we dive into the world of passkeys and how they’re revolutionizing online security. Say goodbye to password fatigue and phishing scams—passkeys promise a more secure and seamless authentication experience. We discuss what passkeys are, how they work, and why major tech companies are adopting them. Topics Covered: What are passkeys …
  continue reading
 
Brett Gardner is author of the book Buffett’s Early Investments. The book analyzes key Buffett investments from the 1950’s and 1960’s, a period in which he had his most extraordinary returns. During the partnership years (1957-69), Buffett put together one of the greatest investment track records of all time, earning an astounding 29.5% CAGR withou…
  continue reading
 
In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by Jason Geffner, Principal Security Architect at Microsoft, to discuss his groundbreaking work on scaling and automating Dynamic Application Security Testing (DAST). Following on from his BlueHat 2024 session, and outlined in this MSRC blog post, Jason explain…
  continue reading
 
Meta says it may stop development of AI systems it deems too risky Ferret Malware Added to 'Contagious Interview' Campaign Credential Theft Becomes Cybercriminals' Favorite Target Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses f…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: DeepSeek leaves an unauthed database on the internet Russia hacked UK prime minister’s personal mail Australia sanctions a Telegram group… which is more sensible than it sounds Medical device backdoor turns out to be just poorly thought out upgrade f…
  continue reading
 
How can Entra ID Protection help keep your organization resist security breaches? Richard talks to Corissa Koopmans about thinking beyond authentication and authorization and into conditional access - knowing what is normal and abnormal behavior for your users. Corissa recommends looking at the Entra ID Protection Dashboard - whether you have confi…
  continue reading
 
Before Elon Musk and DOGE walked into the USAID security office, one former employee and whistleblower was already calling the USAID clearance process into question. From the archives: Mark Moyar joins the show to discuss his book, which sheds light on the complex relationship between security clearance eligibility and employment decisions. The aut…
  continue reading
 
In this episode, Steve sits down with author and leadership expert Sylvie di Giusto. Sylvie delineates five areas for everyone to consider in order to enhance their emotional intelligence. She and Steve also discuss how self-awareness and authenticity relate to situational awareness, and how improving in these areas can support career mobility. Key…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft FastTrack with guest Thomas Finney. They explore the benefits and eligibility of FastTrack, which is designed to help organizations adopt and deploy Microsoft 365 services. The conversation covers various aspects of FastTrack, including various Mi…
  continue reading
 
Today’s episode is a recording of Feb. 3 livestream that Senior Editor Scott R. Anderson hosted with George Ingram and Tony Pipa, both Senior Fellows in Global Economy and Development at the Brookings Institution, and Jonathan Katz, Senior Director of the Anti-Corruption, Democracy, and Security project also at Brookings—all three of whom are also …
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play