InfoSec public
[search 0]
More

Download the App!

show episodes
 
Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security experts, Caroline Wong and Vanessa Sauter, as they focus on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Cybersecurity made simple. Come on a journey with our host Darnley G, to bring you through the rollercoaster of information security. We will discuss topics about any cybersecurity trending news, how to's, facts, who's been hacked, and even some tips to protect your business from cybercrime. Grab a cup of caffeine and enjoy!
 
Intrusion Diversity System (IDS) is a Cyber Security podcast hosted by O'Shea Bowens, Doug Bryant Jr and Sienna Delvasto. Doug, O'Shea and Sienna weigh in on their experiences as minorities within the Cyber Security space. By telling stories, sharing experiences, giving career advice and demonstrating security tips, tricks & tools O'Shea, Doug, and Sienna hope to inspire others to see how exciting and valuable a career in Cyber Security could be.
 
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the CyberWire editorial team.
 
Security Conversations is a cybersecurity podcast series curated by journalist and security strategist Ryan Naraine. These conversations with security practitioners cover a wide range of topics, including threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted threat activity. Connect with Ryan on Twitter (Open DMs). Disclosure: Ryan is a security strategist at Intel Corp. Ryan produces this podcast in hi ...
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over four million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
Eric Strom is the Unit Chief of the Mission Critical Engagement Unit, Cyber Division. In this role, Mr. Strom oversees the FBI Cyber Division’s private sector outreach efforts to the 16 critical infrastructure sectors, forging partnerships with companies in those sectors to develop and share threat intelligence related to activities by sophisticate…
 
This week Hakluke shares some mindset tweaks and tactical advice on how to improve your bug bounty hunting. My 3 main takeaways were 1) why the abundance mindset is so important 2) what we can learn from the similarities between the music industry and bounty hunting and 3) why collaboration is so important. For more information, including the show …
 
Episode 6 - Security, Privacy, and a lot of ** with Tazin Khan Norelius. In episode 6, we're chatting with our first guest to the show, cybersecurity specialist, empath, and critical thinker Taz (@techwithtaz). With over 10 years in the security space, Taz works to bring mindfulness into Cyber Security while making noise around the lack of consumer…
 
For the 50th episode of Humans of InfoSec, we’re excited to feature Larkin Ryder, Slack’s head of product security and former interim chief security officer. Larkin has held engineering roles at high tech companies for more than 25 years, including more than five years as a senior security engineer at Twitter. While Larkin has a proven track record…
 
Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma shares how his interest in how things worked shaped his career path in nuclear power and computers, Being introduced to computers in high school and learning about the Chernobyl event led Sal to study nuclear engineering followed by time in the Navy as a su…
 
With all that humans know about the diversity that makes our world so unique, we still assume that everyone thinks, learns, and lives in the same way. Cybersecurity training is not different: perspectives matter a lot. Most of the time, we expect that technology and processes will solve the problems that poorly-implemented technology and processes …
 
Ben-Gurion University researchers have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled …
 
Energetic Bear is back, and maybe getting ready to go berserk in a network near you, Mr. and Mrs. United States. Someone’s selling publicly available voter and consumer information on the dark web. Sanctions against the GRU for the Bundestag hack. The US sanctions Qods Force and associated organizations for disinformation efforts. Johannes Ullrich …
 
This week's tools, tips and tricks talks about Microsoft Attack Surface Analyzer. This IT Admin took can help identify any security gaps as you build out or install new sofware on PCs. Source - https://github.com/Microsoft/AttackSurfaceAnalyzer/tree/release/v2.2 Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of …
 
Doc Searls, Katherine Druckman, and Petros Koutoupis talk social media regulation and its relationship to journalism and the threat to Section 230. Special Guest: Petros Koutoupis. Support Reality 2.0 Links: FCC chairman says he'll seek to regulate social media under Trump's executive order - CNN — The Federal Communications Commission (FCC) will d…
 
Welcome to Episode 90 Main Topic What can you learn from participating in a CTF? What the heck is a ctf? Why would an OPS person care? Where can I participate in a CTF? Check out the sans holiday hack! https://holidayhackchallenge.com DC610 Pubcrawl (if you’re in the area) Hack The Box https://www.hackthebox.eu/ Announcements Patreon Update $84/mon…
 
Many people are envisioning a better world and a higher quality of life. They know that technology can help us achieve what we want. But what do we want? Why do we want it? How can we achieve it? These are the questions. Long passed is the time when observers and scientists believed that the earth is flat, the sun and planet rotate around planet ea…
 
Emailed election threats to US voters are identified as an Iranian influence operation, disruptive, and so more in the Russian style. Both Iran and Russia appear to be preparing direct marketing influence campaigns. Cyber criminals are also exploiting US election news as phishbait. Seedworm is said to be ‘retooling.” Caleb Barlow from Cynergistek o…
 
North Carolina is the first in the country to open a hotline to report cybercrimes. This episode goes through the details of this hotline and what it could mean for the industry as a whole moving forward on the fight against cybercriminals. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Sec…
 
Casting from the deep depths of Halloween, this is the client from hell! In this special episode, Darnley talks about his run-in with a very interesting ex-client who took the team through some technological and psychological nightmares. He will discuss what not to do when taking over an account that is undergoing a cybersecurity incident, what not…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-leaked-secrets-in-code-repositories/) Secrets, such as passwords and credentials, are out in the open just sitting there in code repositories. Why do these secrets even exist in public? What's their danger? And how can they be found and remove…
 
The Darkside ransomware gang thinks it's a modern-day Robin Hood when it donates extorted Bitcoins to charity, the micro-targeted ad industry could pop like a bubble, and would you trust a burger-flipping robot? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Clu…
 
Join Limor and Diana as they kick off their podcast that will take you through an exploration of everyday cyber and how you can make better choices to secure yourself, your family, and all the activity you do online. Using internet-based services is part of our everyday lives. Nowadays, that’s also known as ‘cyber’. Whether we're shopping online, t…
 
TrickBot came back, but so did its nemesis from Redmond--Microsoft and its partners have taken down most of the new infrastructure the gang reestablished. CISA publishes election rumor control. The Cyberspace Solarium Commission has a white paper on supply chain security. Japan says it will take steps to secure next summer’s Olympics. Joe Carrigan …
 
British Airways was hit with a huge fine from a breach that they had in 2018. The size of the fine was actually reduced but still significant from how the breach happened. This epsiode goes into the security failures that let the hackers walk away with credit card details. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast wit…
 
America’s NSA reviews twenty-five vulnerabilities under active exploitation by Chinese intelligence services. The UK’s NCSC accuses the GRU of more international cyberattacks. The US Justice Department brings its long-expected anti-trust suit against Google. Ben Yelin examines overly invasive company Zoom policies. Our guest is Jessica Gulick from …
 
With Brad out this week, Evan is joined by the founder of the PsyberReslience Project, Neal O’Farrell. The PsyberReslience Project is an "ongoing effort to address the prevalence and impact of stress, burnout, and mental health challenges in the cybersecurity workforce." Evan and Neal chat about what mental health is like in the information securit…
 
Who would have thought that we would start an episode of this podcast talking about Robin Hood? Well, you don’t have to go far as that is EXACTLY where we kick off this episode of the Transatlantic Cable Podcast. Our first story of the week takes a look at some “Robin Hood” types who steal from corporations via ransomware and then donate a small fr…
 
This episode talks about research from Check Point on the most impersonated brands used in phishing attacks. Know what the hackers are using most can help you add a little more caution when seeing emails and ads around these brands. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/can-a-robot-be-concerned-about-your-privacy/) I want AI to be efficient, but I also want my space. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our sponsored guest is…
 
In this episode, we talk to James Goepel about the Cybersecurity Maturity Model Certification (CMMC). He discusses this important new certification for supply chain security within the U.S. Department of Defense (DoD) system, addressing the following: • Why was the CMMC created? • Who needs the CMMC? • How will the CMMC work? • Will the CMMC spread…
 
Millions of students are growing up without business and computer science education. Our friends at Elevate The Future are leading a movement with a simple mission: change this, right now, and across the globe. Maybe—for sure—the older generations haven't always kept the ball rolling for those who come next and looked out for the new generation's f…
 
Updates on influence ops and campaign hacking show that the opposition has its troubles, too. TrickBot operators seem to have returned to business. Schools’ remote learning programs are providing attractive targets for cybercriminals. Iranian news outlets say ports were the targets of last week’s cyberattacks. David Dufour explains how phishing cam…
 
The Internet of Things Strikes Again. This episode talks about a hacking group that is selling access and footage from home security cameras and what you can do if you have these in your home. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security…
 
The TinFoilHatClub is a lighthearted review of security news and general conspiracies. Hosted by people hacker Jenny Radcliffe the show is available on YouTube and in audio format on your usual podcast sites. This week Jenny is joined by guests Cary Hendricks, Quentin Taylor and Stuart Coulson. To follow Cary on Twitter, click the link here. To fol…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login