show episodes
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
I
InfoSec Daily Podcast
Monthly+
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
RallySecurity is a weekly information security podcast that discusses news and breaches from both the red team and blue team perspectives. RallySec is part of the purple team. We stream live every Wednesday at 7pm on https://www.rallysecurity.com and twitch.tv/rallysecurity
 
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
I
Infosec Dojo
Monthly
 
Information Security Podcast
 
Straight Talk About Information Security
 
I
InfoSec ICU
Weekly
 
The Health Information Security podcast from the Medical University of South Carolina
 
The Hurricane Labs InfoSec Podcast features the clashing of swords and witty banter about the latest security topics. Listen in as we discuss headlines, hacks, tech tips, Splunk stuff, and more!
 
7
7 Minute Security
Weekly
 
A podcast where I audibly regurgitate what I'm learning about information security - in 7-minute chunks!
 
D
Drunk Infosec
Monthly+
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
The Liquidmatrix Security Digest Podcast. Learn more at http://www.liquidmatrix.org/blog/podcast
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
S
Security Nation
Monthly+
 
Rapid7 podcast series discussing all things security. Join us as we discuss information security with thought leaders in the space.
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
D
Darknet Diaries
Monthly
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are. #infosec #security #hacking #privacy #Internet #hackers #breaches #threats #security #malware #trojan #virus #crypto
 
Primal Security Podcast is a show for people who want to hear about the latest security news and hear about the security industry.
 
The Forensic Lunch! The twice a month podcast devoted to Digital Forensics and Incident Response!
 
Jay Schulman's goal is to help grow information security professionals and developers. As an industry, we're short quality professionals who understand how to communicate security to executives and other business people. Additionally, too few developers understand security and can help build it into their software. Through interviews with infosec professionals and developers, you'll learn how others have grown their careers in security.
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
Every week I spend 5-20 hours consuming books, articles, and podcasts in the areas of Sᴇᴄᴜʀɪᴛʏ, Tᴇᴄʜɴᴏʟᴏɢʏ, and Hᴜᴍᴀɴs. I then take that content and curate it into a concise, 30 minute summary that's ready for you every Monday morning.
 
S
Securit13 Podcast
Monthly
 
Первый украинский подкаст об информационной безопасности
 
Each week, the Kaspersky Lab team will break down some useful cybersecurity stories and offer usable tips in 20 minutes or less.
 
S
SpiderLabs Radio
Monthly+
 
Monthly DJ Mixes from Keith Swiat and Interviews with SpiderLabs security professionals. SpiderLabs is an advanced security team within Trustwave focused on forensics, ethical hacking, and application security testing for our premier clients. The team has performed hundreds of forensic investigations, thousands of ethical hacking exercises and hundreds application security tests globally.
 
T
The GDPR Guy
Rare
 
Information, insights and inspiration on the GDPR General Data Protection Regulation
 
Security In 5 podcast brings you security news, tips, opinions in the area of Information, IT and general security...all in about five minutes. Easy to listen to, easy to understand and adding awareness to help you strengthen your personal and business security posture. Be aware, be secure.
 
I
I Want to Hack
Monthly
 
I Want to Hack documents Eamonn's journey into the field of information security. Starting from a cursory knowledge of all things tech, Eamonn is following a newound intrigue into the world of cyber security. Who doesn't want to learn how to hack?
 
A podcast on the journey to discovery and decision making through data in information security by Bob Rudis and Jay Jacobs.
 
Security news doesn't always wait for conference season. That's the guiding principle behind the Black Hat Webcasts – a regular series of live web events focusing on what's hot in the infosec space all year long. On the third Thursday of every month, we'll bring together Black Hat speakers, independent researchers and leading security experts from the government to the underground to answer your questions live.
 
A podcast focused on current events in the information security space from Digital Guardian.
 
C
Cyentia Podcast
Rare
 
This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals.
 
I
IoT This Week
Monthly
 
The Latest from the Internet of Things, Tech and InfoSec!
 
This is a podcast where we explore the issues today with the insider threat, or human factor, of our organizations. We also talk about ways to tackle those issues through training, culture, and technology in order to help information security and business professionals reduce risks in their environments.We have a patreon page for the podcast, located at https://www.patreon.com/theinsiderthreat. I don't want to be too pushy for this, but a couple of you have asked about ways that you can supp ...
 
Infosec news and views featuring interviews with expert faculty from the Institute for Applied Network Security (IANS) hosted each week by IANS Director of Technology Research Chris Gonsalves.
 
T
The CyberJungle
Monthly
 
The CyberJungle is the nation's first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fast-paced and includes hard hitting news analysis. Formerly The Data Security Podcast.
 
Braxton Ehle and Sean Williams rant about the latest in information security news to help enterprises and mere mortals defend their information.
 
Experiments in Risk Science
 
S
ShadowCast
Monthly+
 
Hacking is Offensive. Welcome to ShadowCast. We cover the latest security news and have one main topic every episode.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
 
E
EurotrashSecurity
Rare
 
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
 
C
CYS Report
Monthly+
 
Latest in Cybersecurity News
 
S
Sysadministrivia
Monthly
 
We podcast all things system administration/engineering/infosec, with a strong focus on GNU/Linux. We use F/OSS software whenever possible in the production of these podcasts. Please be sure to view our show notes on the site!
 
S
SecTools Podcast
Monthly
 
Podcast by InfoSec Campus
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
 
Loading …
show series
 
In today's podcast, we hear that an evolved DarkHotel campaign is under way. A new malware dropper is out and about thanks to the Necurs botnet. Researchers demonstrate proof-of-concept exploits. Cyber espionage follows trade. Notes on election meddling. Google and Facebook encounter some regulatory and legal headwinds over data collection. Con ...…
 
Let's Encrypt, the free security certificate authority, got a big boost of support as it is now trusted by all the major root programs now. This episode goes into why this is a good thing to help expand HTTPS everywhere and available to a wider range of users, for free. The episode where I introduced Let's Encrypt: Episode 231 - Tools, Tips and ...…
 
Welcome to the IT Governance Periscope Podcast: This week’s episode is an investigation into reporting on staff training, awareness and IT Governance products and solutions for organisations that suffer a data breach
 
Welcome to the IT Governance Periscope Podcast: This week’s episode is an investigation into reporting on staff training, awareness and IT Governance products and solutions for organisations that suffer a data breach
 
Intro Welcome back! This isepisode 42 of The Insider Threat podcast, for the week of August 20th, 2018. Not going to hacker summer camp this year. Hope to catch up with you all later in the year at conferences in the DC area. Infosec Trivia Question It's time for yourInfosec Trivia Question, where Google is king and the prize isnonexistent! The ...…
 
In this refused episode of the Exploring Information Security podcast, Michael Kavka joins me to discuss how to handle call for presentation rejections. Michael (@SiliconShecky) wrote a blog post on his site at the beginning of the year titled, It is CFP season... So what. In the article he hit on rejections and I thought it'd make for a great ...…
 
Researchers at Bitdefender have been tracking a bit of complex rootkit malware called Zacinlo that they suspect has been operating virtually undetected for over six years. Bogdan Botezatu is a senior cyber security analyst with Bitdefender, and he describes what they've found. Research link: https://labs.bitdefender.com/2018/06/six-years-and-co ...…
 
In today's podcast we run through a brief guide to election risks, and the difference between hacking and influence operations. An Alaskan trade mission prompts a wave of Chinese industrial espionage. Misconfigured project management pages may have exposed Canadian and British Government information. Necurs flared up in a short-lived spam campa ...…
 
As an IT professional you will eventually have to work on a Linux machine at some point, it's inevitable. If you are a pure Windows person the switch to the Linux commands can be a learning curve. This episode talks about a great Linux Command Cheat sheet I use when I hop over to the other side. Download The Linux Cheat Sheet PDF Link to the co ...…
 
This week, we discuss a new flaw affecting Intel processors, a $13.5 million cyber attack on an Indian bank, the release of version 1.3 of the Transport Layer Security protocol and the highlights from this month's Microsoft patches.
 
This week, we discuss a new flaw affecting Intel processors, a $13.5 million cyber attack on an Indian bank, the release of version 1.3 of the Transport Layer Security protocol and the highlights from this month's Microsoft patches.
 
I'm putting together a general security awareness session aimed at helping individuals and businesses not get hacked. To play off the lucky number 7, I'm trying to broil this list down to 7 key things to focus on. Here's my list thus far: Passwords 2FA/MFA Wifi (put a good password on it, don't use WEP, don't use WPS Sign up for HaveIBeenPwned ...…
 
In today's podcast we hear that cyber threats to river traffic have intermodal implications. Nation state hacking, Presidential Policy Directive 20, and international norms of cyber conflict. The tragic consequences of overconfidence concerning communications security. Australia's new cyber laws are more legal hammer than required backdoor. A c ...…
 
In a business you may provide employees a laptop, mobile phone, uniforms and other equipment to performs their duties. Sometimes those can be thousands of dollars of expense for each person. Although you may educate employees that they need to take care and protect those assets are you holding them accountable if they aren't? This episode talks ...…
 
In today's podcast we hear some Patch Tuesday notes—both Microsoft and Adobe were busy yesterday. Foreshadow, a new speculative execution vulnerability, is reported. Malaysia gets attention from Chinese espionage services. Competition for jihadist mindshare. Influence operations as marketing. The US FBI gets a new cyber boss. The Kremlin thinks ...…
 
We continue with the mini-series, Top 10 OWASP Proactive Controls for Developers and we are at number 6. This one talk about Identity Management or Digital Identity. This one goes beyond just the code and into the security practice of ensuring unique users are identified and authorized properly within your applications. Be aware, be safe. ----- ...…
 
In this weeks episode, David and Jeff discuss how some police bodycams could actually be hackable, the FBI has issued warnings to banks, telling them about an impending ATM hack as well as how Google is actually tracking you, even if you tell it not to and a brief look at the Q2 spam and phishing report from Securelist.…
 
Gerry is back from BlackHat and he’s ready to tackle the oft-ignored member of the Confidentiality-Integrity-Availability triad as he digs into a new attack that tampers with medical device data to disastrous effect. While in Vegas, Gerry also had the opportunity to interview Jeremiah Grossman, CEO of BitDiscovery, to talk about the unique way ...…
 
Meet mobman. Chances are if you were downloading shady programs in the early 2000's, you were infected with malware he wrote called SubSeven. Hacking changed mobman's life. Hear how it happened by listening to this episode. Image for this episode created by dr4w1ngluc4s. Check out his Instagram to see some amazing artwork! Check out the podcast ...…
 
In today's podcast, we hear about the cryptowars down under. Major DDoS incident in Finland. Bears in the home routers, and concerns about IoT and power grid security prompt a US Senator to demand answers. Smart cities present big attack surfaces. Preliminary notes on patches. ZTE and Huawei devices formally disinvited from US Government networ ...…
 
Disaster Recovery and High Availability are used interchangeably at times, incorrectly. This episode goes through what each one is and how they are two different aspects of your IT and business plans. Be aware, be safe. ------------------------------------ Website - https://www.binaryblogger.com Podcast Page - http://securityinfive.libsyn.com P ...…
 
We promise to keep your identity private while we discuss the troubles of two-factor authentication. On this episode of the CISO/Security Vendor Relationship Podcast we discuss: Why don't more people use two-factor authentication? Does the UX still suck? Why can't we agree on a common model for how to authenticate? Will U2F be the saving grace ...…
 
In today's podcast, we hear about spyware in the guise of a missile attack warning app. New Dharma variant out. Android.Clipper redirects transactions to crooks' cryptowallets. DLink exploits rob Brazilian banking customers. Utilities prepare for grid hacks, but researchers say an appliance botnet could cycle demand enough to induce blackouts. ...…
 
The availability of home security systems, cameras, smart home controls doesn't mean your home is more secure. The security of your home still comes down to your other practices to keep your home secure. This episode goes over some non-technical practices you can do to keep your home and property secure. Be aware, be safe. --------------------- ...…
 
The Sysadministrivia PodcastBy admin@sysadministrivia.com (r00t^2).
 
In this expedition edition of the Exploring Information Security podcast, Chris Maddalena a senior security consultant joins me to discuss how to create a phishing email. Chris (@cmaddalena) joins me to discuss crafting a phishing email. This is something I've recently explored at work. Having little to no experience actually crafting a phish, ...…
 
“Living off the land” is a term well understood by both offensive and defensive teams. For offensive teams, it’s meant by using the technologies already present on the system, such as Powershell, Python, and even Perl for those who like a challenge (or are facing an older Unix system). On the defensive side, enhanced logging and locked down con ...…
 
Researchers at Symantec have been tracking a wide-ranging espionage operation that's targeting satellite, telecom and defense companies. Jon DiMaggio is a senior cyber intelligence analyst at Symantec, and he takes us through what they've discovered. The research can be found here: https://www.symantec.com/blogs/threat-intelligence/thrip-hits-s ...…
 
In today's podcast we hear that US-CERT is warning of a North Korean RAT. Researchers find vulnerable WPA2 handshake implementations. A sales call results in inadvertent data exposure. Notes on Black Hat: circumspection, hype, barkers, and artificial intelligence. Russia braces for US sanctions and promises retaliation. South Korea will reorgan ...…
 
This week's tools, tips and tricks episode goes over an overlooked feature within the Google Stack, Google Alerts. This episode goes into how Google Alerts work and how they can provide value to your security program and personal identity monitoring. Google Alerts - https://www.google.com/alerts Be aware, be safe. ------------------------------ ...…
 
This week, we discuss new research into attacks on industrial control systems, Reddit's recent breach, and an apparent crackdown on SIM swap fraud
 
This week, we discuss new research into attacks on industrial control systems, Reddit's recent breach, and an apparent crackdown on SIM swap fraud
 
In today's podcast we hear that Tehran seems ready to follow Pyongyang into state-sponsored theft to redress financial shortfalls: cryptocurrency ransomware looks like Iran's preferred approach. DarkHydrus uses commodity tool Phishery in Middle Eastern campaign. Jackpotting cryptocurrency ATMs. The US imposes sanctions on Russia. Reality Winner ...…
 
I had an exhilarating and terrifying experience this week doing my first ever live radio interview! As a quick bit of background, this interview was part of the 7MS radio marketing campaign that I've talked about my "How to Succeed in Business Without Really Crying" series (here's part 1, 2 and 3). The interview was conducted by Lee Michaels, a ...…
 
In order to process data and carry out business responsibilities you need to grant access to users. However, because access is granted does not give the user's free reign to use that access anyway they choose. Authorized use based on business need comes into play. This episode goes through this challenge of granting access required but ensuring ...…
 
Today’s podcast comes to you live from New York New York in sunny Las Vegas. In today’s episode, I recap the events of the first day of Black Hat. As usual, there were more talks than one could obviously get to, but in the sessions I did attend, the subject matter ranged from legal landmines to corruption, vulnerabilities in Cortona and much mo ...…
 
In today's podcast we hare that Oracle has warned of BGP exploits against payment processors. Check Point says it's found vulnerabilities in WhatsApp that could enable chat sessions to be intercepted and manipulated. Germany, Ukraine, and the US independently mull responses to hacking and influence operations. Anonymous announces it wants to ta ...…
 
Continuing with the mini-series OWASP Top 10 Proactive Security Controls we are at number 5, Validate All Inputs. This control is a vital component of protecting against injection and cross site scripting attacks. This episode goes through the importance and challenges with this control. Be aware, be safe. ------------------------------------ W ...…
 
Brandon is back in the co-pilot’s chair as we talk about the recent GAO report that HHS is failing to protect PHI. We also share our intrigue surrounding the PHI breach at Iowa Health Group that was actually a Business Email Compromise attack. There’s also good news for Boston Childrens’ Hospital, as the hacktivist charged with disrupting their ...…
 
In today's podcast we hear that chipmaker TSMC says the virus that shut it down in Taiwan was WannaCry. It appears to have been an incidental infection enabled by inattentive installation of software. OpenEMR fixes bugs that could have exposed millions of patient records. British authorities are said to be readying an extradition request for GR ...…
 
For the 49th edition of Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff start by discussing a potential downside of Fortnite coming to Android, high speed Internet possibly causing insomnia, the Reddit hack, and some highlights from our Q2 Malware report.
 
The terms junk, spam and phishing are used interchangeably when they are three different categorizations of mail. This episode goes through each one and breaks them down to help clarify security implications of each one. Be aware, be safe. ------------------------------------ Website - https://www.binaryblogger.com Podcast Page - http://securit ...…
 
Leaky API may have exposed Salesforce customers' data, TSMC reports a virus in its semiconductor plants. TCM Bank discloses a paycard application leak. Ransomware in Hong Kong. The US Census Bureau prepares to secure its 2020 "fully digital" census. The unbearable, irresistible urge to monetize data. Notes on automotive cybersecurity. Depending ...…
 
Just because you have a new salesperson, doesn't mean you have to restart the sales process. If you've been properly entering information into your CRM, you shouldn't have to. On this episode of the podcast we discuss: Are you ready for...Black Hat: Techniques to get the most value out of the conference. We've got some really good post-conferen ...…
 
Chances are you have a mobile phone, you may listening to this podcast on one right now. What if you set your phone down on the restaurant table for a second and when you look up it's gone. Stolen. This episode goes over the things you should do and not do if your phone is stolen. Be aware, be safe. ------------------------------------ Website ...…
 
In this expedition edition of the Exploring Information Security podcast, Chris Maddalena a senior security consultant joins me to discuss how to create a phishing email. Chris (@cmaddalena) joins me to discuss crafting a phishing email. This is something I've recently explored at work. Having little to no experience actually crafting a phish, ...…
 
Researchers at McAfee recently discovered code execution vulnerabilities in the default settings of the Cortana voice-activated digital assistant in Windows 10 systems. Steve Povolny is head of advanced threat research at McAfee and he shares their findings. The research can be found here: https://securingtomorrow.mcafee.com/mcafee-labs/want-to ...…
 
In today's podcast we hear that the US Intelligence Community warns of Russian threats, again. A criminal spearphishing campaign hits Russian industrial companies. A cryptojacking wave is installing CoinHive in MicroTik routers. Speakers at the Billington Automotive CyberSecuirty Summit stress collaboration, design for security, and the converg ...…
 
This week's tools, tips and tricks episode talks about how to see if your external hard drives have been compromised from the Internet. If you have setup a large hard drive at home to store and share files might be accidentally exposed to the whole Internet. This is a common router misconfiguration. This episode gives you a few things to look o ...…
 
This week, we discuss the 10 million affected by Dixons Carphone's 2017 data breach, the exposure of hundreds of thousands of clothes shoppers' details, Yale University's ten-year old data breach, and a return to typewriters for government workers in Matanuska-Susitna Borough in Anchorage.
 
Google login Twitter login Classic login