Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Explore the minds of world-class web3 hackers, smart contract protocol developers, startup founders, and cybersecurity specialists with host DeGatchi as he takes you on a journey through the chaotic world of Ethereum Virtual Machine (EVM) blockchain cyberspace. Keywords: solo auditor, public auditing platforms, private audits, scalability, freedom, Scraping Bits podcast, blockchain technology, audit industry, flashbots, reverse engineering, cybersecurity, infosec, mev, mev bot, quant, defi, ...
…
continue reading
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Podcast by InfoSec Campus
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
…
continue reading
30-Day InfoSec, a monthly information security recap show for the latest news, stories, and happenings from around the cybersecurity community.
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
We need to talk about InfoSec is a podcast where we get real about the current state of Information Security. Join the talk with Laura Kankaala! Powered by Disobey.
…
continue reading
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity events and issues. The episode opens with discussion on the recent weather impacts affecting Asheville and lessons for disaster preparedness in the security industry. A significant portion of the episode is dedicated to CrowdStrike’s r…
…
continue reading
00:00 - PreShow Banter™ — Plane Talk 05:50 - BHIS - Talkin’ Bout [infosec] News 2024-09-23 06:16 - A SANS Difference Maker Award Finalist 09:47 - Story # 1: Pagers attack brings to life long-feared supply chain threat 24:08 - Story # 2: Recaptcha Phish - John Hammond 25:49 - Story # 2b: Clever ‘GitHub Scanner’ campaign abusing repos to push malware…
…
continue reading
What rules and regulations should govern AI? Would the application of Asimov's laws of robotics help? Regulators are queuing up to apply guidelines and good practices to the way organisations use AI tools. Policy experts and AI wranglers, Steve Dorward and Verona Johnstone-Hulse, join ISF analysts Lee Munson and Mark Ward to take a look at the ever…
…
continue reading
1
401 Access Denied Podcast Ep. 116 | Security by Design: A Risk Based Approach with Nathan Wenzler
40:34
40:34
Play later
Play later
Lists
Like
Liked
40:34
If you started viewing your cybersecurity program through a risk lens, rather than a technical lens, how would that change the conversations you have with business leadership? You might be asking questions like, “How valuable is the thing we’re trying to protect?” “What does it mean to the business?” “What would be the impact if it were compromised…
…
continue reading
1
#15 From Zero to Hero: How Anyone Can Succeed in Cybersecurity
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28
In this solo episode, Kyser Clark discusses the accessibility of cybersecurity careers, emphasizing that anyone can enter the field regardless of their background. He shares his personal journey from blue-collar jobs to becoming a penetration tester, highlighting the importance of certifications and continuous learning. Kyser provides actionable st…
…
continue reading
1
Behind the Scenes and Best Practices for Submitting to MSRC with Jim Hull
38:59
38:59
Play later
Play later
Lists
Like
Liked
38:59
Jim Hull, Program Manager at MSRC joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast to share insights into his role in reviewing vulnerability reports and managing cases. They dive into the submission process, detailing the types of reports accepted by MSRC and what happens after a researcher submits a potential vu…
…
continue reading
1
LockBit ties to Evil Corp, public records flaws, ransomware hits Texas hospital
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47
UK ties LockBit affiliate to Evil Corp Public records systems riddled with security flaws Ransomware disrupts emergency services at Texas hospital Huge thanks to our sponsor, SpyCloud Researchers at SpyCloud recently found that one in five individuals was infected with infostealer malware in the last year. Unfortunately, research now confirms that …
…
continue reading
1
Election Propaganda Part 1: How does election propaganda work?
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. References: David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. Jeff Berman, Renée DiResta, 2023. Disinformat…
…
continue reading
1
HITRUST Announces Continuous Assurance through the Proven HITRUST Ecosystem | Brand Story | 2 Minutes on ITSPmagazine
2:06
2:06
Play later
Play later
Lists
Like
Liked
2:06
HITRUST has announced the launch of HITRUST Continuous Assurance, a new strategic evolution aimed at enhancing security sustainability and outcomes through continuous control monitoring. This initiative builds upon the proven HITRUST ecosystem, providing organizations with an efficient way to manage security and compliance risks in the face of evol…
…
continue reading
1
AI Beyond the Hype: Lessons from Cloud on Risk and Security
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06
Send us a text On this episode of the MLSecOps Podcast, we’re bringing together two cybersecurity legends. Our guest is the inimitable Caleb Sima, who joins us to discuss security considerations for building and using AI, drawing on his 25+ years of cybersecurity experience. Caleb's impressive journey includes co-founding two security startups acqu…
…
continue reading
A global news agency suffers a cyberattack. CISA and the FBI provide guidance on cross site scripting attacks. A Texas health system diverts patients following a ransomware attack. Western Digital patches a critical vulnerability in network attached storage devices. California passes a law protecting domestic abuse survivors from being tracked. Ver…
…
continue reading
In this coffee break episode, Darnley briefly dives into the world of Deep AI that brings visual avatars to life using Microsoft's groundbreaking VASA-1 technology. We explore how this powerful tool is pushing boundaries, and even influencing the darker corners of the digital underworld. Is this the future of AI, or something far bigger? Grab a cof…
…
continue reading
1
Small Teams, Big Threats: Navigating Cybersecurity on a Budget | A Conversation with Lisa Plaggemier | The Soulful CXO Podcast with Dr. Rebecca Wynn
12:52
12:52
Play later
Play later
Lists
Like
Liked
12:52
Guest: Lisa Plaggemier, Executive Director, National Cybersecurity Alliance On LinkedIn | https://www.linkedin.com/in/lisaplaggemier On Twitter | https://twitter.com/lisaplaggemier Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ This Episode’s Spons…
…
continue reading
1
🚨 UMC Health System Ransomware, Ransomware Summit at White House, Deepfake attack on Senate
22:15
22:15
Play later
Play later
Lists
Like
Liked
22:15
🚨 UMC Health System Ransomware, Ransomware Summit at White House, Deepfake attack on Senate 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as UMC Health Systems targeted with Ransomware with more news below: Kia Cars Vulnerability UAE & Saudi Arab…
…
continue reading
Are the frequent stories about data breaches in the news making us desensitized? 🗞️ 📈 On today's episode, friend-of-the-show Troy Hunt reveals how we can combat data breach fatigue and reflects on how the landscape of cyberattacks has changed over the past 10 years of Have I Been Pwned. Plus, we lift the lid on all the latest security news in Watch…
…
continue reading
1
We’re Lowering the Requirement for Entry Level to Just 8 Years of Experience
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Steve Person, CISO, Cambia Health. In this episode: The changing CISO landscape Rethinking the cybersecurity talent shortage Sharpening …
…
continue reading
1
#107 - Justin Skycak: Proof Writing, Discovering Math, Expert Systems, Learning Math Like A Language
1:37:32
1:37:32
Play later
Play later
Lists
Like
Liked
1:37:32
Follow Scraping Bits on Twitter: https://x.com/scrapingbits Your Host, DeGatchi: https://x.com/DeGatchi Guest Speaker: https://x.com/justinskycak Please support this podcast by checking out our sponsors: https://x.com/ComposableFin https://x.com/mevdotio https://x.com/0xPFL Keywords: math, mathematics, solo audito…
…
continue reading
In Episode 20 of Darknet Diaries, we heard from Greg aka “mobman” who said he created the sub7 malware. Something didn’t sit right with a lot of people about that episode. It’s time to revisit that episode and get to the bottom of things. Sponsors This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail…
…
continue reading
1
T-mobile data breach fines, Iranian hackers charged, Deepfake scam hits U.S. senate
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26
T-Mobile data breaches cost company $31.5 million Iranian hackers charged for targeting 2024 U.S. election Deepfake scam hits U.S. senate Huge thanks to our sponsor, SpyCloud Did you know that infostealer malware can be a precursor to ransomware? Infostealers are a trending tactic used by cybercriminals to exfiltrate valuable identity data like cre…
…
continue reading
1
Building Resilient Cyber Defenses with Richard Cassidy
58:16
58:16
Play later
Play later
Lists
Like
Liked
58:16
Send us a text Ever wondered how a psychology degree can lead to a cybersecurity career? Join us as Richard Cassidy reveals his remarkable journey from a teenage computer enthusiast to a leading expert in IT and cybersecurity. Richard shares intimate stories from his early days, including how he transitioned from psychology to an apprenticeship at …
…
continue reading
1
Guardians of Academia: Battling Cyber Threats in Higher Education with Donna Kidwell | Cybersecurity Insights Podcast with Matthew Rosenquist
58:37
58:37
Play later
Play later
Lists
Like
Liked
58:37
Guest: Donna Kidwell, CISO of Arizona State University On LinkedIn | https://www.linkedin.com/in/dkidwell Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist ______________________ Episode Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmaga…
…
continue reading
1
#106 - MevQuant: Stochastic Differential Equations, HFT/MEV Machine Learning, Algebraic Topology
1:15:11
1:15:11
Play later
Play later
Lists
Like
Liked
1:15:11
Follow Scraping Bits on Twitter: https://x.com/scrapingbits Your Host, DeGatchi: https://x.com/DeGatchi Guest Speaker: https://x.com/mevquant Please support this podcast by checking out our sponsors: https://x.com/ComposableFin https://x.com/mevdotio https://x.com/0xPFL Keywords: math, mathematics, stochastic, solo auditor, public auditi…
…
continue reading
A critical vulnerability has been discovered in the NVIDIA Container Toolkit. Representatives from around the world are meeting in Washington to address ransomware. The Pentagon shoots down the notion of a separate cyber service. A genetic testing company leaves sensitive information in an unsecured folder. A public accounting firm breach affects 1…
…
continue reading
1
Book | Reimagining Education with Transcend: Insights from Extraordinary Learning for All | A Conversation with Author Jenee Henry Wood | Redefining Society Podcast With Marco Ciappelli
19:56
19:56
Play later
Play later
Lists
Like
Liked
19:56
Guest: Jenee Henry Wood, Chief Learning Officer, Transcend [@TranscendBuilds] On LinkedIn | https://www.linkedin.com/in/jenee-henry-wood-12ba9871/ _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast On ITSPmagazine | https://www.itspmagazine.c…
…
continue reading
1
Cybersecurity in the AI era: Busting myths and practical advice | Guest Alex Sharpe
58:44
58:44
Play later
Play later
Lists
Like
Liked
58:44
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=audio&utm_medium=podcast&utm_campaign=podcast Alex Sharpe, a cybersecurity expert with over 30 years of experience, joins the Cyber Work Podcast to discuss the realistic promises and limitations of AI and machine learn…
…
continue reading
1
Hacking Deepfake Image Detection System with White and Black Box Attacks | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Sagar Bhure | On Location Coverage with Sean Martin and Marco ...
22:40
22:40
Play later
Play later
Lists
Like
Liked
22:40
Guest: Sagar Bhure, Senior Security Researcher, F5 [@F5] On LinkedIn | https://www.linkedin.com/in/sagarbhure/ At SecTor | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#sagar-bhure-45119 ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@…
…
continue reading
1
🚨 AFP Data Breach, Linux Systems Vulnerabilities, NVIDIA Vulnerability, AI Bill Vetoed in CA
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14
🚨 AFP Data Breach, Linux Systems Vulnerabilities, NVIDIA Vulnerability, AI Bill Vetoed in CA 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as French AFP reports a data breach with more news below: California Governor Vetos AI Bill Linux Warning P…
…
continue reading
1
The Tribe of Wandering Shoes A Story Under the Stars in Four Parts. Just like the seasons! The Summer Adventure (Read In English) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The ...
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03
The Tribe of Wandering Shoes A Story Under the Stars in Four Parts. Just like the seasons! The Summer Adventure In a large clothing store downtown, among other items for sale, there were some rather peculiar sports shoes. In addition to being very comfortable, cheerful, and available in various colors, they would occasionally swap laces and positio…
…
continue reading
1
Recall redesigned again, Embargo attacks cloud, Dallas suburb cyberattack
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57
Recall redesign: reinforced and removable Embargo moves ransomware attacks to cloud environments Dallas suburb deals with ransomware attack Huge thanks to our sponsor, SpyCloud It turns out infostealer infections are a major contributing factor to a company’s ransomware risk, with some industries faring better than others. Get the new research from…
…
continue reading
1
Security remediation automation. [CSO Perspectives]
18:56
18:56
Play later
Play later
Lists
Like
Liked
18:56
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Rick Doten, the VP of Information Security at Centene and one of the original contributors to the N2K CyberWire Hash Table. He makes the case to invigorate the automation first principle cybersecurity strategy. In this case, he is specifically addre…
…
continue reading
1
Episode 180 - QR Code Scams, Kaspersky Deletes Itself and Scares Users, Browser Kiosk Phishing Attack, ZITRO
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27
Welcome to this week's episode of the PEBCAK Podcast! We’ve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast QR code scams https://www.darkreading.com/threat-intelligence/qr-phishing-scams-motorized-momentum-uk https://ww…
…
continue reading
1
Steve Blank, national security, and the dilemma of technology disruption. (Part 2 of 2) [Special Edition]
37:21
37:21
Play later
Play later
Lists
Like
Liked
37:21
In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption. Listen to part 1 here. In this series, Steve Blank, a renowned expert in national security innovati…
…
continue reading
1
Exploding beepers, critical CUPS flaws, Windows Recall rebuilt for security
1:19:07
1:19:07
Play later
Play later
Lists
Like
Liked
1:19:07
Three Buddy Problem - Episode 14: The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky's controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebano…
…
continue reading
1
Where is Everybody? The SETI Paradox | Stories From Space Podcast With Matthew S Williams
21:51
21:51
Play later
Play later
Lists
Like
Liked
21:51
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes What if the rea…
…
continue reading
1
Jason Clark: Challenge the way things are done. [Strategy] [Career Notes]
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42
Enjoy this encore episode where we are joined by the Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service.…
…
continue reading