Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
B
Black Hills Information Security


1
Black Hills Information Security
Black Hills Information Security
Penetration testing for Fortune 50 companies since 2008.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. See acast.com/privacy for privacy and opt-out information.
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec


1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
C
Careers Information Security Podcast

1
Careers Information Security Podcast
CareersInfoSecurity.com
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
G
Government Information Security Podcast

1
Government Information Security Podcast
GovInfoSecurity.com
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
The people behind The Intercept’s fearless reporting and incisive commentary discuss the crucial issues of our time: national security, civil liberties, foreign policy, and criminal justice. See acast.com/privacy for privacy and opt-out information.
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Chuck Harold as he interviews thought leaders and industry professionals, as well as editors from the magazine.
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Business and Lifestyle Programme
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Produced with the support of Policy Forum. See acast.com/privacy for privacy and opt-out information.
D
Down the Security Rabbithole Podcast


1
Down the Security Rabbithole Podcast
Rafal Los (Wh1t3Rabbit)
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
ROGUE NEWS is a group of political scientists, editorial engineers, and radio show developers drawn together by a shared vision of bringing Alternative news through digital mediums that evangelize our civil liberties. www.roguenews.comPLEASE SUBSCRIBE! See acast.com/privacy for privacy and opt-out information.
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. See acast.com/privacy for privacy and opt-out information.
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, history and all things naval.
S
SANS Internet Storm Center's Daily Network Security News Podcast


1
SANS Internet Storm Center's Daily Network Security News Podcast
Johannes B. Ullrich
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cyber security tips, tools, and more in the Alias Secure AF Cyber Security Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cyber security topics with coworkers and special guests. No matter where you are on the cyber security knowledge ladder, there's an episode here for you.
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field.
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
A podcast telling the story of the Roman (Byzantine) Empire from 476 AD to 1453. www.thehistoryofbyzantium.com See acast.com/privacy for privacy and opt-out information.
Each week, Foreign Policy’s Amy Mackinnon, will recommend one podcast from around the world, interview the host, and play an excerpt. This curated show is designed to help listeners interested in the things we are—great stories, compelling interviews, and cogent analysis on international affairs—sort through the overwhelming variety of podcasts out there and find the best ones. And occasionally you’ll hear audio from our own newsroom. FP Playlist replaces our flagship podcast First Person. S ...
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
U
Unsolicited Response Podcast


1
Unsolicited Response Podcast
Dale Peterson: ICS Security Catalyst and S4 Conference Chair
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
B
Brakeing Down Security Podcast


1
Brakeing Down Security Podcast
Bryan Brake, Amanda Berlin, Brian Boettcher
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
Information security with a whiskey filter.
Welcome to CISO Tradecraft. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
Each week The Intercept’s Washington, D.C. bureau brings you one important or overlooked story from the political world. Bureau Chief Ryan Grim and a rotating cast of journalists, politicians, academics and historians tell you what the rest of the media are missing. See acast.com/privacy for privacy and opt-out information.
Location data, browser history, IP addresses, and appointment scheduling are among the sensitive data putting individuals' privacy at risk in the wake of the decision to overturn Roe v. Wade, says Alexandra Reeve Givens of the Center for Democracy and Technology.By GovInfoSecurity.com
OT security has been at the center of the security conversation ever since the Colonial Pipeline attacks. Scott Flower, the founder of Pareto Cyber and a former global intelligence officer at FS-ISAC, discusses the challenges in OT security and where the industry needs to go.By BankInfoSecurity.com
ORIGINALLY AIRED ON JUNE 27, 2022 Articles discussed in this episode: 02:13 – Story # 1: The #1 Period Tracker on the App Store Will Hand Over Data Without a […] The post Talkin’ About Infosec News – 6/27/2022 appeared first on Black Hills Information Security.By Black Hills Information Security
e
eXecutive Security


1
How Cybersecurity’s Origins Inform Its Future with Chris Wysopal of Veracode
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03
Chris Wysopal is Co-Founder and Chief Technology Officer at Veracode, which pioneered the concept of using automated static binary analysis to discover vulnerabilities in software. In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecur…
T
The Lawfare Podcast


1
How the Police Contributed to the January 6th Insurrection
47:13
47:13
Play later
Play later
Lists
Like
Liked
47:13
Many individual police officers acted heroically on January 6th. But the successful attack on the Capitol by a pro-Trump mob, seeking to disrupt the certification of the electoral votes, remains one of the biggest policing failures in American history. Not only did the Capitol police fail to prepare for the attack, but many members of the mob were …
Jenkins discloses dozens of zero-day bugs in multiple plugins Rogue HackerOne employee steals bug reports to sell on the side Patchable and preventable security issues lead causes of Q1 attacks Thanks to today’s episode sponsor, Votiro Can you trust that your content and data is free of malware and ransomware? With Votiro you can. Votiro removes ev…
S
SANS Internet Storm Center's Daily Network Security News Podcast


1
Network Security News Summary for Tuesday July 5th, 2022
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31
7-Zip and MotW; Session Manager Backdoor; Chrome 0Day Patch 7Zip Mark of the Web For Office Files https://isc.sans.edu/forums/diary/7Zip+MoW+For+Office+files/28812/ SessionManager Backdoor Seen with IIS https://securelist.com/the-sessionmanager-iis-backdoor/106868/ Googe Chrome Stable Channel Update https://chromereleases.googleblog.com/2022/03/sta…
C
CyberWire Daily


1
Patrick Morley: Former Carbon Black CEO [Cyber CEOs Decoded]
1:01:11
1:01:11
Play later
Play later
Lists
Like
Liked
1:01:11
In this episode, Marc and Patrick Morley, former CEO of Carbon Black, get nostalgic as they discuss Patrick's journey of coming up through the start up scene in the 90s—from working with VCs to taking companies public—and compare it to running cyber companies today. Along with the early career experience that helped form Patrick's leadership philos…
T
The Lawfare Podcast


1
Lawfare No Bull: Day 6, House Select Committee on the January 6 Attack
1:38:52
1:38:52
Play later
Play later
Lists
Like
Liked
1:38:52
Today we’re bringing you another episode of Lawfare No Bull, a podcast featuring primary source audio from the world of national security law and policy. Today’s episode features audio from the surprise sixth public hearing held by the House select committee to investigate the Jan. 6 attack on the Capitol. The committee heard explosive testimony fr…
C
CISO Tradecraft


1
#85 - The Fab 5 Security Outcomes Study (with Helen Patton)
44:20
44:20
Play later
Play later
Lists
Like
Liked
44:20
On this episode of CISO Tradecraft, we feature Helen Patton. Helen shares many of her career experiences working across JP Morgan, The Ohio State University, and now Cisco. -Is technical acumen needed for CISOs? -Surviving organizational politics (34:45) Helen discusses The Fab 5 Security Outcomes study. Volume 1 Study - Link Volume 2 Study - Link…
T
The Lawfare Podcast


1
Lawfare No Bull: Day 5, House Select Committee on the January 6 Attack
2:15:59
2:15:59
Play later
Play later
Lists
Like
Liked
2:15:59
Today we’re bringing you another episode of Lawfare No Bull, a podcast featuring primary source audio from the world of national security law and policy. Today’s episode features audio of the fifth of a series of public hearings held by the House select committee to investigate the Jan. 6 attack on the Capitol. The hearing included testimony from f…
S
Sea Control


1
Sea Control 359 - Maritime Radiological & Nuclear Trafficking with Jay Benson
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32
Link: Maritime Radiological and Nuclear Trafficking by Small, Traditional, and Unregulated Vessels by Jay Benson, Stable Seas, March 29, 2022.By Jared Samuelson, Jonathan Selling, Jay Benson
T
The Lawfare Podcast


1
Chatter: Secret Service Dilemmas and Training with Jon Wackrow
1:48:48
1:48:48
Play later
Play later
Lists
Like
Liked
1:48:48
Chatter, a podcast from Lawfare, features weekly long-form conversations with fascinating people at the creative edges of national security. This week on Chatter, David Priess talked with former U.S. Secret Service agent Jonathan Wackrow to discuss the inherent dilemmas that come along with the job. One of them can arise if agents become partisan a…
C
CyberWire Daily


1
Could REvil have a copycat? [Research Saturday]
16:06
16:06
Play later
Play later
Lists
Like
Liked
16:06
Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well a…
C
CyberWire Daily


1
Notes on cyber conflict. Lazarus Group blamed for the Harmony cryptocurrency heist. MedusaLocker warning. Observation of the C2C market. The Crypto Queen cracks the FBI’s Ten Most Wanted.
30:21
30:21
Play later
Play later
Lists
Like
Liked
30:21
An update on the DDoS attack against Norway. NATO's resolutions on cyber security. North Korea seems to be behind the Harmony cryptocurrency heist. MedusaLocker warninga. Microsoft sees improvements in a gang's technique. Google blocks underworld domains. The Israeli-Iranian conflict in cyberspace. Chris Novak from Verizon with his take on this yea…
S
Security Management Highlights


1
July 2022: Building Credibility and Preparedness in Local Operations; Plus Managing Digital Nomads
42:52
42:52
Play later
Play later
Lists
Like
Liked
42:52
How can a global enterprise build security and business continuity capacity in their local branches? Develop credibility through listening and patience, says RC Miles with the AIDS Healthcare Foundation. That capacity paid off when conflict arose, he tells SM Highlights host Chuck Harold in this episode, sponsored by RaySecur (https://raysecur.com/…
Location data, browser history, IP addresses, and appointment scheduling are among the sensitive data putting individuals' privacy at risk in the wake of the decision to overturn Roe v. Wade, says Alexandra Reeve Givens of the Center for Democracy and Technology.By CareersInfoSecurity.com
OT security has been at the center of the security conversation ever since the Colonial Pipeline attacks. Scott Flower, the founder of Pareto Cyber and a former global intelligence officer at FS-ISAC, discusses the challenges in OT security and where the industry needs to go.By GovInfoSecurity.com
R
RogueNews Radio


1
Rogue News In The Morning - V & CJ 01 July
43:33
43:33
Play later
Play later
Lists
Like
Liked
43:33
V & CJ See acast.com/privacy for privacy and opt-out information.
OT security has been at the center of the security conversation ever since the Colonial Pipeline attacks. Scott Flower, the founder of Pareto Cyber and a former global intelligence officer at FS-ISAC, discusses the challenges in OT security and where the industry needs to go.By CareersInfoSecurity.com
7
7 Minute Security


1
7MS #527: First Impressions of Purple Knight
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49
In today's episode we talk about Purple Knight, a free tool to help assess your organization's Active Directory security. I stuck Purple Knight in our Light Pentest LITE pentest training lab and did an informal compare-and-contrast of its detection capabilities versus PingCastle, which we talked about in depth in episode #489.…
D
Deconstructed


1
How the Democrats Forgot the New Deal and Paved the Way for Trumpism
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06
In Robert Kuttner’s new book, “Going Big: FDR’s Legacy, Biden’s New Deal, and the Struggle to Save Democracy,” he explains how we got to our present political inflection point, how high the stakes are, and what comes next. Kuttner — who co-founded the Economic Policy Institute as well as The American Prospect — joins Jon Schwarz to discuss. https:/…
T
The Lawfare Podcast


1
Memorializing Babyn Yar after the Russian Invasion of Ukraine
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10
When a Russian missile recently struck a TV tower in Kyiv, near Babyn Yar, the site of Nazi mass murders during the Holocaust, some saw the attack as a potent symbol of the tragic occurrence of violence in Ukraine. To talk through the historical significance of the attack, Lawfare Managing Editor Tyler McBrien sat down with Maksym Rokmaniko, an arc…
A new sophisticated malware is attacking SOHO routers New study shows over half of employees use prohibited apps Google battles bots, puts Workspace admins on alert Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to …
S
SANS Internet Storm Center's Daily Network Security News Podcast


1
Network Security News Summary for Friday July 1st, 2022
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28
Cobalt Strike Domain Suspension; ManageEngine Vuln Details; CWE Top 25 Update Case Study: Cobalt Strike Server Lives on After its Domain is Suspended https://isc.sans.edu/forums/diary/Case+Study+Cobalt+Strike+Server+Lives+on+After+Its+Domain+Is+Suspended/28804/ CVE-2022-28219: Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit…
C
CyberWire Daily


1
CISA Alert AA22-181A – #StopRansomware: MedusaLocker. [CISA Alert]
3:09
3:09
Play later
Play later
Lists
Like
Liked
3:09
CISA, the FBI, the Department of the Treasury, and the Financial Crimes Enforcement Network are releasing this alert to provide information on MedusaLocker ransomware. Observed as recently as May 2022, MedusaLocker actors predominantly rely on vulnerabilities in Remote Desktop Protocol to access victims’ networks. AA22-181A Alert, Technical Details…
C
CYBER


1
The Supreme Court Doesn't Care About What Americans Want
52:35
52:35
Play later
Play later
Lists
Like
Liked
52:35
On June 30, the U.S. Supreme Court issued a ruling that will have far reaching consequences about the power of the federal government to fight climate change. How did the landmark ruling even end up in front of the Justices, why did they decide to rule on it, and what will the consequences be for the environment and the country? On this episode of …
C
CyberWire Daily


1
Killnet hits Norwegian websites. Hacktivists tied to Russia's government. Looking ahead to new cyber phases of Russia's hybrid war. C2C market differentiation. Gennady Bukin, call your shoe store.
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35
Killnet hits Norwegian websites. Hacktivists are tied to Russia's government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea Little Limbago from Interos examines borderless data. Rick Howard speaks with Cody Chamberlain from NetSPI on Breach Communication. Roscosmos publishes locations of…
R
RogueNews Radio


1
Rogue Mornings - V, CJ & Guest: CryptoCowboy 30 June
1:08:27
1:08:27
Play later
Play later
Lists
Like
Liked
1:08:27
Crypto Cowboy See acast.com/privacy for privacy and opt-out information.
T
The New CISO


1
Solving Security Puzzles with Kevin DeLange
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43
On this episode of The New CISO, Steve is joined by Kevin DeLange, the VP and CISO of IGT, to discuss how Kevin’s love of problem-solving led him to a career in cyber security. Before joining the information security field, Kevin served in the military and completed a degree in Anthropology. Now a CISO, he reflects on how the skills he developed th…
How secure is your password really? Well it's time to find out. On this episode of the Secure AF podcast, you'll leave with a high level look of what password cracking is as well as how you can use better passwords.By Alias
S
Sea Control


1
Sea Control 358 - Information Fusion Center Singapore with Cdr Jeremy Bachelier (French Version)
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04
L'animatrice, rédactrice et productrice Alexia Bouallagui s'entretient avec le Commandant Jeremy Bachelier, Officier de Liaison français au Centre de Fusion de l’Information (IFC) à Singapour. Ils discutent des missions du centre et de la contribution de l'IFC à la sécurité maritime du point de vue d'un Officier de Liaison français. Ils abordent ég…
S
Sea Control


1
Sea Control 358 - Information Fusion Center Singapore with Cdr Jeremy Bachelier (English Version)
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55
Commander Jeremy Bachelier, the French Liaison Officer at the Information Fusion Center (IFC) in Singapore joins us to discuss the missions of the center and the IFC’s contribution to maritime security from the perspective of a French Liaison Officer. We also explore the current and future challenges to maritime security in the Indo-Pacific as well…
I
ISACA Podcast


1
Breaking Down the ESET T1 2022 Threat Report
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49
ESET, a global leader in cybersecurity, has released its T1 2022 Threat Report, which summarizes the most notable trends that shaped the threat landscape from January to April 2022. Join ISACA’s Research Advisor, Brian Fletcher, as he breaks down the ESET T1 2022 Threat Report with Chief Security Evangelist for ESET, Tony Anscombe. For more informa…
C
Cyber Security Sauna


1
SPHERE SESSION | Carole Cadwalladr on threats to democracy
10:32
10:32
Play later
Play later
Lists
Like
Liked
10:32
TED speaker and Pulitzer-nominated journalist Carole Cadwalladr joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconference, for a discussion about threats to democracy.
T
The Lawfare Podcast


1
The Jan. 6 Committee Takes On the Big Lie
54:06
54:06
Play later
Play later
Lists
Like
Liked
54:06
The House committee investigating the Jan. 6 insurrection is midway through a blockbuster series of hearings exploring Donald Trump’s efforts to overturn the 2020 election and disrupt the peaceful transfer of power. Central to those efforts, of course, was the Big Lie—the false notion that Trump was cheated out of victory in 2020. This week on Arbi…
NATO to create rapid response cyber force FBI warns of deep fakes for remote work Ship controls identified as another major attack surface Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to comb through the D&R clutt…
Gary Buonacorsi, Tanium’s SLED CTO and Chief IT Architect, joins Dave to discuss Cyber Incident Reporting for the Critical Infrastructure Act. Ben and Dave share some listener follow up from a listener who spent some time being a U.S. Marshall, and their input on a recent episode where someone had a fake warrant out for their arrest. Ben's story fo…
The latest edition of the ISMG Security Report describes why firewalls and VPNs don't belong in Zero Trust design. It also discusses cybercriminals' evolving ransomware tactics and the devastating price of responding to a ransomware attack, as experienced by Travelex in 2019.By GovInfoSecurity.com
The latest edition of the ISMG Security Report describes why firewalls and VPNs don't belong in Zero Trust design. It also discusses cybercriminals' evolving ransomware tactics and the devastating price of responding to a ransomware attack, as experienced by Travelex in 2019.By BankInfoSecurity.com
The latest edition of the ISMG Security Report describes why firewalls and VPNs don't belong in Zero Trust design. It also discusses cybercriminals' evolving ransomware tactics and the devastating price of responding to a ransomware attack, as experienced by Travelex in 2019.By CareersInfoSecurity.com
T
The National Security Podcast


1
Women in National Security: Julie-Ann Guivarra of the National Indigenous Australians Agency
42:25
42:25
Play later
Play later
Lists
Like
Liked
42:25
In this episode of the National Security Podcast, we bring you the fifth instalment of the Women in National Security mini-series, produced in collaboration with Accenture. In this episode of the National Security Podcast, hosts Gai Brodtmann, National Security College Futures Council member, and Meg Tapia, Principal Director for Defence and Nation…
S
SANS Internet Storm Center's Daily Network Security News Podcast


1
Network Security News Summary for Thursday June 30th, 2022
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45
Moving MFA; Managing Human Risk Report; Service Fabric PoC; Zimbra RCE; Deepfake Interviews; Its New Phone Day: Time to Migrate Your MFA https://isc.sans.edu/forums/diary/Its+New+Phone+Day+Time+to+migrate+your+MFA/28800/ Managing Human Risk Security Awareness Report https://go.sans.org/lp-wp-2022-sans-security-awareness-report Microsoft Azure Servi…