InfoSec public
[search 0]
More
Download the App!
show episodes
 
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
  continue reading
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
  continue reading
 
T
ThinkstScapes
Series avatar that links to series pageSeries avatar that links to series page

1
ThinkstScapes

Jacob Torrey, research@thinkst.com, haroon meer, marco slaviero

Unsubscribe
Unsubscribe
Monthly
 
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
S
Smashing Security
Series avatar that links to series pageSeries avatar that links to series page

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
  continue reading
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
  continue reading
 
T
The Host Unknown Podcast
Series avatar that links to series pageSeries avatar that links to series page

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
R
Reality 2.0
Series avatar that links to series pageSeries avatar that links to series page

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
  continue reading
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for NORTH AMERICA by the 2021, 2022, and 2023 Cybersecurity Excellence Awards. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking with current leaders and experts in the IT and C ...
  continue reading
 
We're your daily briefing on the pulse of the cyber world. Each day, we decrypt the complex landscape of cyber threats, zero in on the latest hacks, and dissect the strategies that keep data defenders on their toes. Whether it's a deep dive into the latest enterprise breach, a spotlight on emerging threat vectors, or actionable intel from the cybersecurity trenches, 'DCTIB' is your essential source for the cyber news that matters. Join us in the loop, and stay one step ahead in the digital age
  continue reading
 
I
ITSPmagazine
Series avatar that links to series pageSeries avatar that links to series page

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
  continue reading
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at:Website: https://topcyberpro.com/Facebook: https://www.facebook.com/TopCyberPro/Instagram: https://www.instagram.com/topcyberpro/Twitter: https://twitter.com/TopCyberProTikTok: https://www.tiktok.com/@topcyberproLinkedIn: https://www.linkedin.com/company/topcyberpro/
  continue reading
 
Cybersecurity and data privacy is a requirement for any good business. So how can a CISO, CTO or compliance manager stay on top of where the industry is heading? Infosec veteran and former lead auditor, Blaise Wabo discusses the intersection of security, privacy and compliance. Topics include: Guest interviews with industry experts, framework updates, the business implications of compliance (and non-compliance), and discussions about compliance challenges, tips and tricks.
  continue reading
 
Loading …
show series
 
Join renowned cybersecurity experts Rob Lee and Jake Williams in a riveting livestream discussion as they delve into the complex world of offensive cyber operations amid ongoing nation-state conflicts. In this episode of Wait Just an Infosec, we’ll explore the critical role of cyber warfare in the Ukraine-Russia and other global conflicts, providin…
  continue reading
 
In this episode of InfoSec Battlefield, titled 'Hospitals & Healthcare Privacy: Defending the Lifeblood of the Medical Sector,' host Carl B. Johnson is joined by healthcare privacy expert Robert Asante, EdD, MBA, CISSP, HCISPP, and Chief Privacy Officer. As hospitals and healthcare institutions become increasingly digitized, the safeguarding of pat…
  continue reading
 
Reports of a Critical Vulnerability in ownCloud. Sites serving bogus McAfee virus alerts. Japan’s space agency reports a breach. Okta revises the impact of their recent breach. Cryptomixer gets taken down in an international law enforcement operation. "SugarGh0st" RAT prospects targets in Uzbekistan and South Korea. NATO cyber exercise runs against…
  continue reading
 
Join hosts Giles House and Abby Rodrigues along with their guest Mark Petry, Cyber Compliance and Risk Manager at GoodLeap, as they lend valuable insights about the importance of building a culture of security. Listen to learn why more organizations should phase out rubber stamp reports, seek high-quality audits, and position compliance as a value …
  continue reading
 
The Future Of Artificial Intelligence with David YoungbloodIn this episode, I discuss the future of AI, Sam Altman, Open AI, AI research, human values, AI risk mitigation, how AI will improve lives, AI augmentation, and the benefits of AI.References:CommonThread AI: A Customer Journey Mapping and Data Interpreter Platform for B2B Organizations leve…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our guest, Jerich Beason, CISO, WM. In this episo…
  continue reading
 
In this episode: Sinbad Crypto Mixer gets taken down by LEO, Dollar Tree gets breached and some interesting insights in the paths a few young men took on their cyber journey. Arm yourself with knowledge and join us at the vanguard of digital defense. Subscribe for a front-row seat to the ongoing battle in the binary world of zeros and ones. 💻⚔️🛡️ #…
  continue reading
 
All Okta customers exposed in breach JAXA hit by cyberattack OpenAI’s chatbots leak secrets Huge thanks to our sponsor, SpyCloud For some people ignorance is bliss – but that’s not an option for those of us in cybersecurity. SpyCloud has a free tool that lets you check your company’s darknet exposure, and you might find some things that are pretty …
  continue reading
 
In this episode: Okta reveals that the October hack had a much bigger impact, Identity service gets hijacked to steal americans credentials, and Qilin ransoms Yanfeng. Arm yourself with knowledge and join us at the vanguard of digital defense. Subscribe for a front-row seat to the ongoing battle in the binary world of zeros and ones. 💻⚔️🛡️ #Cyberse…
  continue reading
 
Guests: Shawn Butler, Co-Founder / VP - Architecture & Analytics at BNS UEP [@bnsuep1] On LinkedIn | https://www.linkedin.com/in/1kindword/ Kika Von Klück, VP - Research and Innovation at BNS UEP [@bnsuep1] On Linkedin | https://www.linkedin.com/in/kikavonkluck/ ____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPma…
  continue reading
 
Don't minimise your Teams Meeting video call too hastily, you might reveal your dirty secrets! Would you be prepared to pay for Facebook and Instagram? And who is being faked to promote cryptocurrency scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carol…
  continue reading
 
A major ransomware gang is taken down in an international sweep. CISA and the WaterISAC respond to the Aliquippa cyberattack. Attacks against infrastructure operators hit business systems. Qlik Sense installations are hit with Cactus ransomware. Researchers discover a Google Workspace vulnerability. A hacktivist auxiliary compromises a Russian medi…
  continue reading
 
Guest: Tyler Cohen Wood, CEO and Co-Founder Dark Cryptonite | Keynote Speaker | 2023 Top 30 Women in #AI | Cyber Woman of the Year Finalist 2021 and 2023 | Top 50 Global #Cybersecurity | Board Member | Fmr DIA Cyber Deputy Division Chief On LinkedIn | https://www.linkedin.com/in/tylercohen78/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.i…
  continue reading
 
The latest episode of the Transatlantic Cable podcast begins with news that General Electric are investigating claims of a data breach, found it was found that an attacker was selling access to the business for just $500. From there, the team discuss how U.S police forces are returning $9 million in seized crypto assets back to victims of ‘pig butc…
  continue reading
 
Join host Joseph Carson for a compelling discussion with Bugcrowd founder Casey Ellis on the evolution of coordinated vulnerability disclosure. Ellis’ pioneering work connects ethical hackers with organizations to enhance their cyber resilience. He shares his experiences and unique insights into disclosure trends, including how changing regulations…
  continue reading
 
Ransomware gang busted in Ukraine by international operation North Texas water utility hit with cyberattack Former Uber CISO speaks out after 6-year silence Huge thanks to our sponsor, SpyCloud SpyCloud has discovered that infostealer malware infections are an early warning signal for ransomware. In fact, nearly a third of ransomware victim compani…
  continue reading
 
Guest: Drew Ryder Smith, Artist/Songwriter On Twitter | https://twitter.com/drewrydersmith On Facebook | https://facebook.com/drewrydersmith On TikTok | https://tiktok.com/drewrydersmith On Instagram | https://instagram.com/drewrydersmith On YouTube | https://youtube.com/drewrydersmith _____________________________ Host: Marco Ciappelli, Co-Founder…
  continue reading
 
In this episode, co-hosts Badar Ahmed and Daryan Dehghanpisheh are joined by Drew Farris (Principal, Booz Allen Hamilton) and Edward Raff (Chief Scientist, Booz Allen Hamilton) to discuss themes from their paper, "You Don't Need Robust Machine Learning to Manage Adversarial Attack Risks," co-authored with Michael Benaroch. Thanks for listening! Fin…
  continue reading
 
Ransomware targets healthcare organizations. WildCard deploys SysJoker malware. DPRK cryptocurrency theft. The status of Ukraine's IT Army. A Russian news outlet unmasks Killmilk. Our Industry Insights guest today is Guy Bejerano, CEO and Co-Founder of SafeBreach, discussing risk reduction in action. And there’s discord on dark markets about large …
  continue reading
 
Guest: Andrew Strutt, Hacker and Defense Agency Contractor [@2600net] On Twitter | https://twitter.com/andrew_strutt On LinkedIn | https://www.linkedin.com/in/andrew-strutt-b457a252/ On Facebook | https://www.facebook.com/groups/2600net On YouTube | https://www.youtube.com/@HackerVideo Host: Deb Radcliff On ITSPmagazine 👉 https://www.itspmagazine.c…
  continue reading
 
Guest: Dr. Georgianna "George" Shea, Chief Technologist, Defense of Democracies [@FDD], Center on Cyber and Technology Innovation (CCTI) and Transformative Cyber Innovation Lab (TCIL) On LinkedIn | https://www.linkedin.com/in/drgeorgeshea Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-…
  continue reading
 
Should businesses be worried about the AI security threat? How do we protect our children's devices from malware? We dive into all that and more in Watchtower Weekly. Plus, we sat-down with Jason and Nimisha from Datadog to discuss some of the challenges of securing the cloud and why it's important to get cloud security right. We also unveil a new …
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and sponsored co-host Jason Sabin, CTO, DigiCert. Joining us is our guest, Alexandra Landegger, executive director of security, Collins Aerospace. In this episode: Are CISOs prepared for the legal su…
  continue reading
 
In this episode: Arm yourself with knowledge and join us at the vanguard of digital defense. Subscribe for a front-row seat to the ongoing battle in the binary world of zeros and ones. 💻⚔️🛡️ #CybersecurityUpdate #ransomware #InfoSec 🔗LINKS Threat Landscape Overview: https://www.theregister.com/2023/11/27/leader_of_prorussia_ddos_crew/ https://www.b…
  continue reading
 
International AI agreement PA water utility hit by cyberattack Ukraine claims cyber attack against Russian aviation Huge thanks to our sponsor, SpyCloud Our sponsor today, SpyCloud, wants us to pay attention to a ransomware precursor that’s not being talked about enough: infostealer malware. If you think you’re covered by endpoint protection and an…
  continue reading
 
Why were millions of baby data was stolen in Ontario Canada? MOVEit hack releases millions of personal medical information globally, threats of insurance fraud Is your data safe anymore? In this episode, Darnley discusses why cyber criminals are targeting your medical data, and is protecting your data impossible today? Also highlighting what you ca…
  continue reading
 
Guest: Allan Liska, Owner at Green Archer Comics On Linkedin | https://www.linkedin.com/in/allan2 On Twitter | https://twitter.com/uuallan ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/itspmagaz…
  continue reading
 
Guest: Dr. Valerie Lyons, Author On Linkedin | https://www.linkedin.com/in/valerielyons-privsec/ ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin ______…
  continue reading
 
Iranian hacktivists claim an attack on a Pennsylvania water utility. North Korea's increased attention to supply-chains. Rhysida's action against British and Chinese targets. Sandworm activity puts European power utilities on alert. Neanderthals and the Telekopye bot. Mirai-based botnet activity. Our guest is Chris Betz, the new CISO of AWS Securit…
  continue reading
 
This week in InfoSec (06:40) 23rd November 2011: KrebsonSecurity reported that Apple took over 3 years to fix the iTunes software update process vulnerability which the FinFisher remote spying Trojan exploited. Evilgrade toolkit author Francisco Amato had reported it to Apple in 2008. Apple Took 3+ Years to Fix FinFisher Trojan Hole https://twitter…
  continue reading
 
My Theory Of What Happened At OpenAI, A New Ransomware Tactic, Analysis Of What The SEC Case Will Do To Cybersecurity, Live David Attenborough Narration, And More… Read the episode here. 📢Sponsored by: Panoptica.app - Simplify container deployment, monitoring, and security Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/liste…
  continue reading
 
Ian Campbell, security operations engineer at DomainTools, is someone who has truly carved a niche out for himself in his organization and in the cybersecurity landscape as a whole. His blogs for the DomainTools website have provided paths for neurodiverse cybersecurity professionals and allies who want to make their organizations more friendly to …
  continue reading
 
The Ghost Squad Hackers, a hacking collective with origins in the Anonymous movement. Explore their motivations, notable cyber-attacks against government and corporate entities, and the broader implications of hacktivism in the digital age. Show Transcript Support us on Patreon! Shop Modem Mischief Merch Created, Produced & Hosted by Keith Korneluk…
  continue reading
 
London & Zurich, and Fidelity National Financial attacks Royal Family’s hospital and Vanderbilt University Med Center suffer cybersecurity incidents Gulf Air exposed to data breach Huge thanks to our sponsor, SpyCloud For some people ignorance is bliss – but that’s not an option for those of us in cybersecurity. SpyCloud has a free tool that lets y…
  continue reading
 
Join us on an inspiring adventure through the world of cybersecurity, as we share a cup of digital coffee with our guest, Emily Austin, a seasoned professional in the tech field. Prepare to be enlightened and intrigued by her unlikely journey into the world of cybersecurity, a detour from psychology to tech that not only shows there's no single pat…
  continue reading
 
The tensions between security and operations and developer teams are the stuff of legend. DevSecOps is trying to change that, and automation is a big part of making it possible. But automation alone can’t overcome entrenched behavior. Joylynn Kirui shares how Microsoft is helping teams prioritize security without bogging down development. Follow an…
  continue reading
 
This week, we invite our very own Chris Hare, N2K's Project Management Specialist Content Developer, to join and discuss her career. Growing up, Chris shares that she wanted to be a veterinarian, which slowly turned into her becoming a writer for the first part of her career. She shares that she started off writing marketing copy for the technology…
  continue reading
 
Loading …

Quick Reference Guide