show episodes
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
I
InfoSec Daily Podcast
Monthly+
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
RallySecurity is a weekly information security podcast that discusses news and breaches from both the red team and blue team perspectives. RallySec is part of the purple team. We stream live every Wednesday at 7pm on https://www.rallysecurity.com and twitch.tv/rallysecurity
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
I
InfoSec ICU
Weekly
 
The Health Information Security podcast from the Medical University of South Carolina
 
I
Infosec Dojo
Monthly+
 
Information Security Podcast
 
Straight Talk About Information Security
 
The Hurricane Labs InfoSec Podcast features the clashing of swords and witty banter about the latest security topics. Listen in as we discuss headlines, hacks, tech tips, Splunk stuff, and more!
 
This "purple team" podcast will examine a mix of offensive "red team" and defensive "blue team" security issues and strategies. We will focus on stories, news, people, and tech from the East Coast of Canada as well as any major topic or news story worldwide that we find interesting. There is an abundance of talented people on the East Coast, and we want to showcase their abilities to the InfoSec world!
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
7
7 Minute Security
Weekly
 
A podcast where I audibly regurgitate what I'm learning about information security - in 7-minute chunks!
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
The Liquidmatrix Security Digest Podcast. Learn more at http://www.liquidmatrix.org/blog/podcast
 
S
Security Nation
Monthly+
 
Rapid7 podcast series discussing all things security. Join us as we discuss information security with thought leaders in the space.
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
D
Darknet Diaries
Monthly+
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
Each week, the Kaspersky Lab team will break down some useful cybersecurity stories and offer usable tips in 20 minutes or less.
 
Primal Security Podcast is a show for people who want to hear about the latest security news and hear about the security industry.
 
The Forensic Lunch! The twice a month podcast devoted to Digital Forensics and Incident Response!
 
Jay Schulman's goal is to help grow information security professionals and developers. As an industry, we're short quality professionals who understand how to communicate security to executives and other business people. Additionally, too few developers understand security and can help build it into their software. Through interviews with infosec professionals and developers, you'll learn how others have grown their careers in security.
 
Every week I spend 5-20 hours consuming books, articles, and podcasts in the areas of Sᴇᴄᴜʀɪᴛʏ, Tᴇᴄʜɴᴏʟᴏɢʏ, and Hᴜᴍᴀɴs. I then take that content and curate it into a concise, 30 minute summary that's ready for you every Monday morning.
 
S
Securit13 Podcast
Monthly+
 
Первый украинский подкаст об информационной безопасности
 
T
The GDPR Guy
Rare
 
Information, insights and inspiration on the GDPR General Data Protection Regulation
 
Security In 5 podcast brings you security news, tips, opinions in the area of Information, IT and general security...all in about five minutes. Easy to listen to, easy to understand and adding awareness to help you strengthen your personal and business security posture. Be aware, be secure.
 
S
SpiderLabs Radio
Monthly+
 
Monthly DJ Mixes from Keith Swiat and Interviews with SpiderLabs security professionals. SpiderLabs is an advanced security team within Trustwave focused on forensics, ethical hacking, and application security testing for our premier clients. The team has performed hundreds of forensic investigations, thousands of ethical hacking exercises and hundreds application security tests globally.
 
I
I Want to Hack
Monthly
 
I Want to Hack documents Eamonn's journey into the field of information security. Starting from a cursory knowledge of all things tech, Eamonn is following a newound intrigue into the world of cyber security. Who doesn't want to learn how to hack?
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals.
 
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
 
This is a podcast where we explore the issues today with the insider threat, or human factor, of our organizations. We also talk about ways to tackle those issues through training, culture, and technology in order to help information security and business professionals reduce risks in their environments. We have a patreon page for the podcast, located at https://www.patreon.com/theinsiderthreat. I don't want to be too pushy for this, but a couple of you have asked about ways that you can sup ...
 
Security news doesn't always wait for conference season. That's the guiding principle behind the Black Hat Webcasts – a regular series of live web events focusing on what's hot in the infosec space all year long. On the third Thursday of every month, we'll bring together Black Hat speakers, independent researchers and leading security experts from the government to the underground to answer your questions live.
 
A podcast focused on current events in the information security space from Digital Guardian.
 
C
Cyentia Podcast
Rare
 
This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.
 
B
BSidesLV Podcast
Monthly
 
Bi-weekly roundup of all things BSidesLV!
 
I
IoT This Week
Monthly
 
The Latest from the Internet of Things, Tech and InfoSec!
 
Infosec news and views featuring interviews with expert faculty from the Institute for Applied Network Security (IANS) hosted each week by IANS Director of Technology Research Chris Gonsalves.
 
T
The CyberJungle
Monthly
 
The CyberJungle is the nation's first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fast-paced and includes hard hitting news analysis. Formerly The Data Security Podcast.
 
Braxton Ehle and Sean Williams rant about the latest in information security news to help enterprises and mere mortals defend their information.
 
Experiments in Risk Science
 
S
ShadowCast
Monthly+
 
Hacking is Offensive. Welcome to ShadowCast. We cover the latest security news and have one main topic every episode.
 
S
Sysadministrivia
Monthly
 
We podcast all things system administration/engineering/infosec, with a strong focus on GNU/Linux. We use F/OSS software whenever possible in the production of these podcasts. Please be sure to view our show notes on the site!
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
E
EurotrashSecurity
Rare
 
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
 
C
CYS Report
Monthly+
 
Latest in Cybersecurity News
 
Listen to hackers and industry insiders give you important infosec tips and learn how to keep yourself safe and knowledgeable in the digital jungle. Our podcast is aimed at newcomers to information security and industry vets alike!
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
 
Loading …
show series
 
https://www.bankinfosecurity.com/nj-ag-smacks-practice-hefty-fine-for-vendor-breach-a-10774 https://www.bankinfosecurity.com/panera-bread-data-leak-persisted-for-eight-months-a-10760 http://www.eweek.com/security/best-buy-delta-sears-hit-by-third-party-chat-widget-breach http://www.baltimoresun.com/news/maryland/crime/bs-md-ci-hack-folo-2018032 ...…
 
Steve and Gerry dive headfirst into a recent indictment against 9 Iranian nationals accused of hacking universities worldwide (a majority in the US) for research capital; showing the value of academic research, they discuss a recently published paper from China outlining a technique for tricking facial recognition biometric information. Finally ...…
 
https://www.csoonline.com/article/3258817/data-breach/sec-guidance-on-it-security-would-you-report-security-risks-before-a-breach.html http://www.zdnet.com/article/hackers-are-selling-legitimate-code-signing-certificates-to-evade-malware-detection/ http://au.news.yahoo.com/a/39380423/equifax-expects-net-200-million-in-breach-related-costs-in-20 ...…
 
Security in Depth is Failing I’m back after fighting a cold for the past two weeks. I talk about how Security in Depth is Failing, and the reasons for that. I think this comes down to talent, training, and learning to communicate with our business leaders. This is a problem with most businesses today – we have to learn to grown our information ...…
 
A Peerlyst Peertalk podcast on Infosec Fiction with industry experts who are also fantastic fiction writers.Show notes.Partipants:Moderator: Brent Hutfless, Founder at Cannon ReefAmanda Price, Creative Director, Layer 8 LtdDavid Viaene, Strategic Director, UnicomplexDean Webb, Network Security Specialist, Networking-Forums.comEric Klein, COO, C ...…
 
Shannon Morse joins us to discuss her experience with infosec and hacker conventions and their efforts to implement a Code of Conduct and why it's something that anime cons, comic cons, and any other fan conventions should also implement. Additional Resources: Conference Code of Conduct Codes of Conduct 101 + FAQ…
 
The SHA-1Sum SHA-1Sum is a Linux that calculates and verifies SHA-1 hashes. It is commonly used to verify the integrity of files. The has values should be the same as long as the file hasn’t been modified. This is an effective way to check if system binaries have been tampered with or other files you download from the Internet. In Linux it’s as ...…
 
lsof and fuser commands in Linux – Episode 2 Show Notes lsof is a command in Linux that lists open files. running lsof gives you information such as Command, PID, TID, USER, FD, TYPE, DEVICE, SIZE/OFF, NODE, and NAME: The lsof command effectively shows you every file that’s open on the system, with the exception of a root kit that hides that in ...…
 
Network Security Logging Network Security Logging is one of the basic elements you should have for your infrastructure. Proper logging of your network devices will help you build an audit trail and understand the who, what, when, where, and how of a security event. Logging is also useful for troubleshooting, investigations, and understanding th ...…
 
A Peerlyst Peertalk podcast on API Security with industry experts.Show notes for this Peerlyst Information Security Peertalk:This podcast is about API Security, the participants were:Nicole Becher Pentester, Cyber Policy Enthusiast, Adjunct Faculty @ NYU, and member of the OWASP Brooklyn Chapter Leader, and New America Cyber FellowBernhard Harg ...…
 
How it's shortsighted and irresponsible for InfoSec professionals to fear-monger on IoT Security, and what we should be saying instead.
 
INFOSEC expert Michael Guy is back on the podcast, this time talking about the shady details surrounding the death of Seth Rich, the Democratic National Committee Voter Data Director who was shot in June 2016.Guy lays out the mounting evidence that suggests that Rich’s death was not likely a “botched robbery,” as the family believes. He explore ...…
 
In this week’s Security Ledger Podcast, we talk with Genevieve Southwick, CEO of the B-Sides Las Vegas hacker conference about the information security industry’s #metoo problem and what steps conference organizers are taking to stem sexual assault and harassment at information security events. Also: researcher Alec Muffet talks with... Read th ...…
 
https://www.theregister.co.uk/2017/11/09/chipzilla_come_closer_closer_listen_dump_ime/ https://www.bankinfosecurity.com/mayer-strengthened-defense-couldnt-stop-massive-breaches-a-10442 http://www.securityweek.com/phishing-poses-biggest-threat-users-google
 
This weeks episode is a bit different. For a while I’ve been avoiding inviting infosec professionals to the podcast(my industry of work and expertise). I wanted to try to do something different (on a personal level) with the podcast, that allowed me to take a break from information security.This week however, it was absolutely inevitable for me ...…
 
In today’s episode, we are joined by Windle Riles, former US Marine and now an information security risk and governance analyst at Deloitte, along with Stephan Tallent, Sr. Director of Managed Security Service Providers at Fortinet and the Founder and executive sponsor of the Fortinet Veterans Program - aka Fortivets. The 3 of us have a good ch ...…
 
In this episode: Mike Benjamin, VP of Threat Intel and Research at Level 3, is our feature guest this week. News from: Amazon, the City of Denver, Webroot, LogRhythm, CenturyLink, CableLabs, ProtectWise, Red Canary, Swimlane, SecureWorld, and a lot more! Full show notes here: https://www.colorado-security.com/news/2017/10/21/38-1023-mike-benjam ...…
 
Take a Network Break! This week we update the latest on the fallout from the Equifax breach, track Yahoo’s stunning revelation of losing every customer record, analyze a ruling to let class action lawsuits go forward against Yahoo, and examine news that an NSA contractor was the target of an exfiltration attack. Startup Barefoot Networks teams ...…
 
Dave Balzer and Pat Toner sat down for an interview with Warner Moore at DogFoodCon in Columbus, Ohio. Warner Moore is a driven technology leader and architect with a background in web operations and information security. He has focused his career in working with high growth organizations where technology is their business and product. Within t ...…
 
EPISODE 05 SUMMARY - CIARAN MCMAHON Director at Institute of Cyber Security // Research and Development Coordinator, CyberPsychology Research Centre // Ph.D., History and Philosophy of Psychology ———————————————— Award-winning academic psychologist Ciaran McMahon joins Bruce Hallas in episode 5 of Re-thinking the Human Factor. Hailing from the ...…
 
During the Structure Security conference in San Fransisco, CA, Sean Martin, ITSPmagazine's editor-in-chief, catches up with Rick McElroy, security analyst for Carbon Black, and Ashwin Krishnan, SVP product management, strategy, and technical marketing at HyTrust. Together they explore the idea that information security teams need to stop doing ...…
 
In this new episode of An InfoSec Life, Robert Feeney, a senior security consultant at Edgescan, speaks to fellow security researchers and security consultants about what they can do to differentiate themselves from the pack; how can they excel in the industry. In addition to speaking to his peers, Robert shares a lot of solid information that ...…
 
DevOpsDays Chicago 2017 - Automating myself out of a job - A pentesters guide to left shifting security testing by Jahmel HarrisThe security industry works best with a waterfall approach to development and has not keep up with modern methodologies. This talk will look at tools and techniques to shift security testing left so software can be rel ...…
 
DevOpsDays Chicago 2017 - Security, Don't Fear the DevOps by Bill WeissA lot of security people have a bad attitude about DevOps. Heck, sometimes it’s for good reasons. Lots of vendors are selling “DevOps in a box”, they’ll come in and “do the DevOps for you”, etc. What can you end up with? Lots of people with root access to servers with real d ...…
 
In the latest edition of the ISMG Security Report: a look at the former Equifax chief information security officer and whether her lack of academic credentials in IT or IT security is relevant to the massive breach at the credit reporting agency.
 
Surviving a Data Breach Equihax In A Few Words The Internet is still the Wild West, and that hasn’t been more apparent than it is right now, in the wake of the Equifax breach. You never know how safe you really are online, even with some of our most trusted companies. Yet, even with all the Internet outlaws, weaknesses, and chaos, there are thi ...…
 
In this special episode of An InfoSec Life, Sean Martin has the pleasure of speaking with Arleena Faith, a software security professional, an application security advocate, and active member of the ISSA and OWASP communities. During their chat, Arleena tells us about her journey into cybersecurity, touching on some of the key milestones she rea ...…
 
The event will start at 9am Central. The live streaming has to be started early for testing.DevOpsDays Chicago brings development, operations, QA, InfoSec, management, and leadership together to discuss the culture and tools to make better organizations and products. The 2017 event will be the fourth time we have held DevOpsDays Chicago, and it ...…
 
Panelists: Coraline Ada Ehmke | Astrid Countee | Janelle Klein Guest Starring: Aria Stewart: @aredridel Show Notes: 00:16 – Welcome to “The World is Upside Down. Can DevOps save us?” …we mean, “Greater Than Code!” 01:07 – Background and Superpowers 09:22 – Diagnostic Troubleshooting: “Expert Intuition Effect” 14:23 – Understanding Entire System ...…
 
In this Podcast: Welcome to a special series of the Global CISO Forum Podcast honoring the EC-Council Infosec Tech & Exec Awards Finalist! For the next three weeks we will be interviewing the best and brightest in infosec who have been named finalists for the CISO of the Year, Certified CISO of the Year, Most Improved Security Program of the Ye ...…
 
In this Podcast: Welcome to a special series of the Global CISO Forum Podcast honoring the EC-Council Infosec Tech & Exec Awards Finalist! For the next three weeks we will be interviewing the best and brightest in infosec who have been named finalists for the CISO of the Year, Certified CISO of the Year, Most Improved Security Program of the Ye ...…
 
In this Podcast: Welcome to a special series of the Global CISO Forum Podcast honoring the EC-Council Infosec Tech & Exec Awards Finalist! For the next three weeks we will be interviewing the best and brightest in infosec who have been named finalists for the CISO of the Year, Certified CISO of the Year, Most Improved Security Program of the Ye ...…
 
In this Podcast: Welcome to a special series of the Global CISO Forum Podcast honoring the EC-Council Infosec Tech & Exec Awards Finalist! For the next three weeks we will be interviewing the best and brightest in infosec who have been named finalists for the CISO of the Year, Certified CISO of the Year, Most Improved Security Program of the Ye ...…
 
This is it! The worldwide Internet debut of an original infosec-themed song called CryptoLocker'd, and as the name implies, it's about a CryptoLocker incident. Here's the quick back story: A few years ago a worked on an incident response where a user got phished with a promise of a free burrito from Chipotle but instead got a free order of Cryp ...…
 
Are you chasing the latest bugs and vulnerabilities, or does your small business have an IT security strategy? Listen in this week to get started on implementing a tried-and-true security strategy to protect your digital stuff. Links Best practices for passwords updated after original author regrets his advice (Verge) NIST’s new password rules ...…
 
On this bonus throwback episode of Blunt Force Truth, Chuck Woolery and Mark Young open with a rundown of the decisive actions President Trump has taken so far in office.Then they invite Michael Guy to the conversation, a musician turned tech guy who designed the world’s first anti-piracy system, helping take down Napster with his large-scale t ...…
 
Aaron Hnatiw joined the show to talk about being a security researcher, teaching application security with Go, and a deep dive on how engineers and developers can get started with infosec. Plus: white hat, black hat, red team, blue team...Aaron sorts it all out for us. Sponsors Linode – Our cloud server of choice. Get one of the fastest, most e ...…
 
In this inclusive episode of the Exploring Information Security podcast, Micah Hoffman, a certified SANS instructor, joins me to discuss how to join the infosec community. Micah (@WebBreacher) gave a talk at BSides DC last year on joining the infosec community. For Micah it took him a while to get involved. He jumped right into the deep end by ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-024-mental_health_podcast-with-Rand0h-and-tottenkoph.mp3 The infosec industry and the infosec culture is so diverse, with many different points of view, many different thoughts and opinions, and many of us deal with our own internal demons, like addictions, mental afflictions like dep ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-024-mental_health_podcast-with-Rand0h-and-tottenkoph.mp3 The infosec industry and the infosec culture is so diverse, with many different points of view, many different thoughts and opinions, and many of us deal with our own internal demons, like addictions, mental afflictions like dep ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-024-mental_health_podcast-with-Rand0h-and-tottenkoph.mp3 The infosec industry and the infosec culture is so diverse, with many different points of view, many different thoughts and opinions, and many of us deal with our own internal demons, like addictions, mental afflictions like dep ...…
 
In this week's podcast, we discuss another breach at Trump Hotels, a change in how Microsoft collects user data, and the GDPR Report 2017.
 
Google login Twitter login Classic login