Best Informationsecurity podcasts we could find (Updated March 2019)
Related podcasts: Security Tech Infosec Obama Web Technology Podcasting Business Potection Gdpr Whitelisting Transactionfraud Mobilesecurity Iotsecurity Breaches Carlgottlieb Computersecurity Firewall Cybersecurity European  
Informationsecurity public [search 0]
×
Join millions of Player FM users today to get Informationsecurity news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Security In 5 podcast brings you security news, tips, opinions in the area of Information, IT and general security...all in about five minutes. Easy to listen to, easy to understand and adding awareness to help you strengthen your personal and business security posture. Be aware, be secure.
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
T
The GDPR Guy
Rare
 
Information, insights and inspiration on the GDPR General Data Protection Regulation
 
A weekly discussion about politics, hosted by The New Yorker's executive editor, Dorothy Wickenden.
 
Loading …
show series
 
Mozilla continues their push to provide services for user's security and privacy protections. Thie tools, tips and tricks episode talks about Firefox Send. An end-to-end encrypted file transfer service. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTunes, TuneIn, iH ...…
 
A password vault is one of the easiest tools to greatly improve your security and safety for your accounts and data. Not everyone can or wants to invest money in one. This episode talks about the best free offerings for password managers. 10 Best Password Managers. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blo ...…
 
OWASP is far more than the popular Top 10. This epsiode talks about the OWASP Application Security Verification Standard and a listener project that created a score card for your applications. OWASP Project Page. Scorecard GIT page. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Pod ...…
 
In 2012, two young activists from the National Immigrant Youth Alliance went on an undercover mission to infiltrate the Broward Transitional Center, an Immigration and Customs Enforcement facility in Florida. NIYA had been contacted by the son of a man named Claudio Rojas, who was taken from his home by immigration agents and brought to Broward ...…
 
Artificial intellegence and machine learning isn't smart out of the box. Like any learning the more data it takes in the smarter it cam be. The internet has all the data any machine learning could want. However, creator of those machines can't just go around taking what they want. This episode talks about IBM doing just that. Check to see if yo ...…
 
Shout-out to Thomas… Tried to meetup while at SEA comic-con Patreon Log-MD Hacker’s Health - Ms. Roddie is at TROOPERS (Ms. Berlin?) 4 podcasts? SpecterOps Training / workshopCon - https://www.workshopcon.com/events Zach Ruble- @sendrublez C2 infra using Public WebApps TARCE - Teaching Assistant RCE(?) - they run your code every week, don’t che ...…
 
This week, a series of votes in the British House of Commons introduced a new chapter in the Brexit story and pushed parliamentary procedures to a breaking point. After Prime Minister Theresa May’s Brexit plan was voted down for a second time, the House voted to attempt to delay the U.K.’s exit from the E.U. Sam Knight joins Dorothy Wickenden t ...…
 
This week's tools, tips and tricks talk about the Microsoft Security Compliance Toolkit. If you are a Windows owner, sys admin or interested in learning to secure Windows 10 and Windows servers this toolkit is for you. Download the toolkit. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In ...…
 
Recently it was reported that Citrix was hacked by a state sponsored cyber criminal group. This hack was pulled off through a method called password spraying. This epsiode talks about the breach and what password spraying is. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Pa ...…
 
Facebook once again takes a dip into security but slides in serious privacy violations to do it. This time in their two factor authentication offering they are using your phone number against you. This epsiode talks about the details of what they did and what you can't do as a user to protect against this. Be aware, be safe. *** Support the pod ...…
 
The music sharing app TikTok, formerly Music.ly, got hit with a huge fine for children data privacy violations. This episode goes over wy they got fined and what you and others need to know about parenting around these child focused apps. Be aware, be safe. COPPA Law *** Support the podcast with a cup of coffee *** - Binary Blogger Website Secu ...…
 
Is Google using Chrome to get at your data? With the biggest share of the browser market, your shiny Chrome app could have a dark side that puts your confidential information in danger. For better or for worse, Google is everywhere and so is its Chrome software. But while Google has been beating the drum about making life easier for Chrome user ...…
 
Log-MD story (quick one) (you’ll like this one, Mr. Boettcher) SeaSec East meetup "Gabe" https://www.sammamish.us/government/departments/information-technology/ransomware-attack-information-hub/ New Slack Moderator (@cherokeeJB) Shoutout to “Jerry G” Mike P on Slack: https://www.eventbrite.com/e/adversary-tactics-red-team-operations-training-co ...…
 
Donald Trump has made no secret of his great admiration for Fox News—he tweets praise of it constantly—and his disdain for other, “fake news” outlets, which he regards as “enemies of the people.” But the closeness between Fox News and the White House is unprecedented in modern times, Jane Mayer tells David Remnick. In a recent article, Mayer, a ...…
 
If you use Google Chrome as your browser you need to update it immediately. This episode goes into the details and the urgency for this update. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTunes, TuneIn, iHeartRadio, Spotify,…
 
This week's tools, tips and tricks episode talks about the most popular network mapping tool, Nmap. Rather this introduces the GUI version of Nmap, Zenmap. This episode goes into details on what it is, what it can give you and why you should download it and run a scan against your own networks. You only know what you know. Download Zenmap. Be a ...…
 
This week, it was announced that a patient in the United Kingdom had been cured of H.I.V. The “London Patient” is only the second person with H.I.V. to be cured of the disease since its discovery, in 1981. The breakthrough comes weeks after President Trump announced a plan to eradicate the disease by 2030. Jerome Groopman joins Dorothy Wickende ...…
 
In 2018 it was reported that 74% of breaches started with privileged account abuse. If you are any business you should use a vault for your administrator accounts. This episode goes into why this is a must do practice. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iT ...…
 
The latest viral hoax is the Momo challenge. This episode is heavily opinionated to these ridiculous hoaxes but spins it on how you as a parent can use these as education for your kids. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTunes, TuneIn, iHeartRadio, Spotify,…
 
Facebook announced that sometime this year they will roll out a 'Clear History' feature for users. This episode talks about what the feature will allows users to do and what impacts it will have to your Facebook experience. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page ...…
 
Donald Trump boasts an approval rating among Republican voters of close to ninety per cent. But the former Massachusetts governor Bill Weld recently announced an exploratory committee to challenge Trump in the primary. It looks like a political suicide mission, but Weld sees a pathway to victory that runs through his neighboring state of New Ha ...…
 
Phishing is the most prevelant attack vector for hackers. This episode goes over the four main types of phishing attacks and talks about them in detail. BinaryBlogger Post Source Infographic From Inspired eLearning ` Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTun ...…
 
BrakeingDownIR show #10 GrumpySec appearance? https://support.microsoft.com/en-us/help/4482887/windows-10-update-kb4482887 https://techcommunity.microsoft.com/t5/Windows-Kernel-Internals/Mitigating-Spectre-variant-2-with-Retpoline-on-Windows/ba-p/295618 https://blogs.technet.microsoft.com/srd/2018/03/15/mitigating-speculative-execution-side-cha ...…
 
This week, in an open hearing before the House Oversight and Reform Committee, Michael Cohen, Donald Trump’s longtime consigliere, implicated the President in multiple felonies, and gave the world a hint of what to expect in investigations into the Trump campaign, the Trump Organization, and the Trump Administration. Adam Davidson joins Dorothy ...…
 
This week's tools, tips and tricks talks about one of my goto Windows utilities I have used for over 10 years, HiJackThis. This epsiodegoes through on why this is a must have utility in your Windows PC toolbox. Download HiJackThis. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podc ...…
 
The National Institute of Standards and Technology is celebrating the 5th anniversry of the Cybersecurity framework. This is one fo the best, free, guidelines for building a cybersecurity program. NIST Main Site Cybersecurity Framework v1.1 Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In ...…
 
This episode is a hypothetical explanation on how the beginning stage of social engineering works. This is to highlight how easy it is to start gathering informaiton about anyone from a simple name and phone number overheard at a coffee shop. Source. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Se ...…
 
It's tax season and you can't have too many shows helping people avoide tax scams. This is another episode that does just that. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTunes, TuneIn, iHeartRadio, Spotify,
 
In 1972, the I.R.A. abducted and “disappeared” Jean McConville, the mother of ten children, most of whom were teen-age or younger. Her case became one of the most notorious unsolved murders of the long period of unrest in Northern Ireland known as the Troubles. Patrick Radden Keefe wrote about McConville for The New Yorker in 2015. “On the one ...…
 
IoT Strikes Again! Goolge and their Nest products are in a little bit of hot water recently. Apparently Google released new funtionality for their Nest product that turned on Google Assistant like functionality. The problem was that in no documentation or any release did Google note that the products had a microphone. This epsiode goes into the ...…
 
Bsides Seattle recap (Bryan) New phishing technique to bypass email filters- https://www.helpnetsecurity.com/2019/02/20/phishers-new-trick-for-bypassing-email-url-filters/ https://en.wikipedia.org/wiki/Office_Open_XML_file_formats#Relationships Use after free in Linux kernel: https://securityboulevard.com/2019/02/linux-use-after-free-vulnerabil ...…
 
A common method to post URL links in emails and social sites is to shorten it using an URL shortener service. It's a conveinent way for the poster but dangerous for users as you don't know where those links actualyl go without clicking on them. This episode talk about CheckShortURL.com that allows you to see what the link does without clicking ...…
 
On Tuesday, the Vermont senator Bernie Sanders announced that he would once again run for President. When Sanders ran in 2016, he was viewed as an insurgent candidate challenging the Democratic mainstream from the left flank of the Party. This time, among Sanders’s opponents for the Democratic nomination are several other self-proclaimed progre ...…
 
In a mature security organization you will have a Red Team and Blue Team. This epsiode talks about the roles of the red and blue teams and also a new concept called the Purple Team. What is it and where does this team fit with the others? Source - https://danielmiessler.com/study/purple-team/ Be aware, be safe. *** Support the podcast with a cu ...…
 
We hear about personally identifiable information (PII) all the time in the security, but what is it? What makes data be considered personal and why is it important to protect it? This epsiode talks about what could make up PII and how cybercriminals gather PII and how it is used for malicious means. Be aware, be safe. *** Support the podcast w ...…
 
After the data dump known as Collection 1-5 I have been recommending to go and delete all your unused accounts. This can be a difficult task and every website does things a little different. I found a recource that can be helpful in your clean up called JustDeleteMe. This epside goes over the website and talks about the importance to get rid of ...…
 
When depictions of Virginia politicians in blackface surfaced this month, the New Yorker contributor Teju Cole was unsurprised. “A white man of a certain age in the U.S.,” he reflects, “is found to have done something racist in his past; well, yes.” As a photographer and photo critic, he is acutely aware that a photograph captures the thinnest ...…
 
security, infosec, information, podcast, internet, web, blog, twitter, facebook, privacy, google, apple, itA fresh Facebook phishing page is popping up and it's important that you are aware of it. This attack is one of the more convining looking pages that has been discovered. This episode talks about how to spot it and I urge you to watch the ...…
 
https://www.zdnet.com/article/google-working-on-new-chrome-security-feature-to-obliterate-dom-xss/ https://www.owasp.org/index.php/DOM_Based_XSS CSRF - confused deputy https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF) Google Cloud Platform - tip tricks, stuff ms. berlin learned Layer 8 conference - Rhode Island’’ I was wrong…..c ...…
 
Google released a quick and sleek phishing test web page. This shows you sample emails and you simply decide if it's real or a phishing fake. I highly recommend you go through this and send this to everyone you know to do the same. Be aware, be safe. Phishing Quiz Link - https://phishingquiz.withgoogle.com/ *** Support the podcast with a cup of ...…
 
In recent speeches defending his plan to build his border wall, President Trumphas repeatedly made reference to women who are kidnaped and trafficked over the U.S.-Mexico border. “Women are tied up, they’re bound, duct tape put around their faces, around their mouths,” he said during a speech, in the White House Rose Garden, in January. “They’r ...…
 
This epsiodecame in from a listener suggestion. The question was around the security risks and concerns with contactless credit and debit cards. This epsiode talks about how contactless and mobile device payments work and the risks associated with them. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website ...…
 
Voluntarily sending your DNA to a company to be 'tested' is the one of the most unsettling privacy trends today. This episode talks about this ridiculous service and how to delete your data from these sites. Reference article with instructions. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security ...…
 
The hack dump called Collection 1 contained over 700 million records. Now Collection 2-5 have been seen in the wild and have over 2.2 billion records. This episode talks about this situation and reminds you the importance of basic security practices you can be doing to keep you accounts safer. Be aware, be safe. *** Support the podcast with a c ...…
 
Last week, the House held hearings on gun violence, the first in eight years. In the 2018 elections, gun-reform groups outspent the N.R.A.—which appears to be in financial trouble. After years of greatly expanded gun rights, is the tide turning on gun reform? David Remnick talks with Lucy McBath, who ran for Congress as a gun reformer and won i ...…
 
Facebook's goal is to collect every little bit of data on you no matter how they can. This episode talks about Facebook secretly paying users to install an app that does just that. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Binary Blogger Website Security In Five Podcast Page - iTunes, TuneIn, iHeartRadio, Spotify,…
 
SpecterOps Class: https://www.eventbrite.com/e/adversary-tactics-red-team-operations-training-course-boston-june-2019-tickets-54970050902 https://www.secjuice.com/security-researcher-assaulted-ice-atrient/ https://www.csoonline.com/article/3338112/security/vendor-allegedly-assaults-security-researcher-who-disclosed-massive-vulnerability.html Tw ...…
 
This show covers some Security In Five podcast news and updates for things to come. From getting the heck out of Facebook to looking to expand Security In Five's offerings. Check out the new Reddit channel r/SecurityInFive. Thank you to all who listen. Be aware, be safe. Don't forget to subscribe to the Security In Five Newsletter. Send in your ...…
 
The Fox News host Tucker Carlson, a vigorous defender of President Trump, shocked many viewers recently with a sharp warning about the dangers of market capitalism. “Market capitalism is not a religion,” he said. “Any economic system that weakens and destroys families isn’t worth having.” A growing number of critics on both the left and the rig ...…
 
The current landscape of application development has fully embraced the open source community. It's speeds development, adds functionality instantly and add a complex security challenge with every 3rd party component you add. This episode talks about the growing importance and criticality of ensuring proper management and tracking of every 3rd ...…
 
Google login Twitter login Classic login