InfoSec public
[search 0]
More

Download the App!

show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
 
Join hacker maker Phillip Wylie and his guests as they discuss and unveil the “secrets” of professional hacking — a mysterious, intriguing, and often misunderstood occupation, even by those in the field of cybersecurity. With the rising need for professional hackers, those entering the infosec world are drawn to it, and understandably so — it is an exciting and fascinating career. Still, it sure has nothing to do with magic. Join these conversations to discover what the role entails, the dif ...
 
S
Smashing Security

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
 
R
Reality 2.0

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Alias Secure AF Cybersecurity Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cybersecurity topics with coworkers and special guests. No matter where you are on the cybersecurity knowledge ladder, there's an episode here for you.
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
T
ThinkstScapes

1
ThinkstScapes

Jacob Torrey, research@thinkst.com, haroon meer, marco slaviero

Unsubscribe
Unsubscribe
Monthly
 
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
T
The Host Unknown Podcast

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Weekly
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over 8 years of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
 
Welcome to the Ivanti Security Insights podcast: Where best-practice cybersecurity meets real-world workplaces and roadblocks. Join Chris Goettl, Amanda Wittern, Daniel Spicer and Ashley Stryker as they review the security news, research and tactics that truly matter to the infosec and security teams protecting organizations and businesses like yours.
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
S
Simply Security: an ES2 Podcast

1
Simply Security: an ES2 Podcast

Simon Carabetta, Eduardo Gallardo, Aaron Kelder, Frederic Drouin.

Unsubscribe
Unsubscribe
Monthly+
 
Simply Security is a podcast focusing on different topics within cyber security. The premise is easy: make cyber simple.Our audience is the general public, people who don't know much about cyber security, yet want to learn how they can protect themselves, their families and even their businesses. Simply Security aims to make the complex accessible and help our audience achieve a better understanding of the threats, vulnerabilities and security behaviours they can employ to protect themselves.
 
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
 
Loading …
show series
 
Security Advisor at Office of the CISO and Co-Host of Google's Cloud Security Podcast, Dr. Anton Chuvakin, chats with Caroline about the past, present and future: how a hacked computer shifted his interest from physics to security, how threats from the 80s still plague orgaizations, and how cybersecurity will continue to spill out of the digital re…
 
In this episode of the Cybersecurity Defenders Podcast, Matt Bromiley opens up the Adversary Toolbox and tells us all about PaExec. We also sit down to chat with Eric Capuano, Founder and CEO of Recon Infosec. During the conversation with Eric, we talk about many different things including the OpenSoc Network Defense Range and their new Thursday De…
 
An online prophet that claims to be god. A murder in the Alabama woods. A child holding a shotgun in the middle of a camp. Reptilians. Urine therapy. The American South. Police violence. Conspiracy. Robot birds. The uniquely American black esoteric tradition. This episode of Cyber is a big and surreal story about a New Age movement that’s spread th…
 
A Chinese cyberespionage campaign is believed to be active in the Middle East. Poor quality control turns ransomware into a wiper, and a typo crashes a cryptojacker. A large DDoS attack is reported to have hit a Russian state-owned bank. Privateers compromise Western infrastructure to stage cyberattacks. Cyber operations against national morale. A …
 
Doc Searls and Katherine Druckman talk to Kyle Rankin about hardware supply chains, building the only USA-made mobile phone, trust, open standards, and much more. Site/Blog/Newsletter FaceBook Twitter Mastodon Special Guest: Kyle Rankin. Support Reality 2.0 Links: Why The U.S. Fell Behind In Phone Manufacturing - YouTube JMP: Your phone number on e…
 
All links and images for this episode can be found on CISO Series. It appears we're not providing security awareness training fast enough. That's because hackers are specifically targeting brand new employees who don't yet know the company's procedures. Illicit hackers are discovering they're far easier to phish. This week’s episode is hosted by me…
 
Vulnerabilities found in popular baseboard software Chinese threat group stole COVID-19 relief funds The question of AI generated code Thanks to today's episode sponsor, PlexTrac The Plextrac platform is your offensive security team’s secret weapon. Build better reports in half the time, centralize your data, maximize your reusable content, and bec…
 
Wiper malware hits Russian targets. Microsoft sees an intensification of Russian cyber operations against Ukraine. State policy, privateering, or an APT side-hustle? The US Cyber Safety Review Board will investigate the Lapsu$ Group. Rackspace works to remediate a security incident. The Schoolyard Bully Trojan harvests credentials. Grayson Milbourn…
 
Guests Major Vineet Kumar Founder of NAG (National Anti-Hacking Group) [@anti_hacking] and Founder and Global President of CyberPeace Foundation [@cyberpeacengo] On Twitter | https://twitter.com/cybervineet On LinkedIn | https://www.linkedin.com/in/cybervineet/ On YouTube | https://www.youtube.com/user/cyberpeacefoundation On Facebook | https://m.f…
 
Ameesh Divatia, CEO of Baffle, Inc., talks about data privacy, data security, cloud security and how a skillset in the middle of that triangle will be your best asset in the years to come. All that, and a little bit of local-focused philanthropy. – Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free – View Cyber Wo…
 
Until recently, AI-generated synthetic content has been more commonly used for gaming and art creation, where the tech is still relatively new, and pixel perfection is unnecessary. However, with the tech rapidly advancing in complexity and speed, it's probably only a matter of time before it's genuinely challenging to determine if something is fake…
 
Open source software host Fosshost shutting down, CEO unreachable DHS Cyber Safety Review Board to review Lapsus$ attacks Rackspace rocked by ‘security incident’ that has taken out hosted Exchange services Thanks to today's episode sponsor, PlexTrac The best pentesting teams trust PlexTrac. PlexTrac can improve efficiency and effectiveness at every…
 
In this episode I talk with Peter Dyson who is the Head of Data Analytics from Kovrr. We had a fascinating conversation and I hope you enjoy it! If you enjoy it please leave a review and share the podcast! Peter's Links: https://www.linkedin.com/in/pjdyson/ https://www.kovrr.com/ All Business. No Boundaries. A collection of supply chain stories by …
 
Our guest for the show is Tal Zamir, Tal was previously the Founder & CTO of Hysolate; has a 20-year software industry leader with a track record of solving urgent business challenges by reimagining how technology works. To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podca…
 
Rohit Dhamankar from Fortra’s Alert Logic sits down with Dave Bittner to share his experiences as he navigates the industry. Rohit has over 15 years of security industry experience across product strategy, threat research, product management and development, and customer solutions. Before Alert Logic he served in Product roles for Live Oak Venture …
 
Cybersecurity and IT are ever-evolving career fields. Hear from some of the people trying to break in and what they are seeing happen within the industry. Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors w…
 
Guest Mclee Kerolle Mentorship Coordinator, Space Court Foundation [@spacecourtfdn] On Twitter | https://twitter.com/ynggeorgejetson On LinkedIn | https://www.linkedin.com/in/yourfriendlyneighborhoodspacelawyer/ On Facebook | https://www.facebook.com/mclee.kerolle/ On YouTube | https://www.youtube.com/@mcleekerolle3705 Host | Matthew S Williams On …
 
Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a…
 
In this standalone episode we’re doing a sponsored interview with Erkang Zheng of Jupiter One. So JupiterOne is a special company to me. I just built a vuln management program at Robinhood based around them, and I believe so much in their vision that I’m looking to actually become an advisor. I mention this because when I fanboy for something, like…
 
Cybersecurity certifications can make or break SOME careers. Watch and listen as we discuss some of the issues at hand. Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and disc…
 
Guest Gina Yacone CISO (Advisory) at Trace3 [@trace3] On Twitter | https://twitter.com/gina_yacone On LinkedIn | https://www.linkedin.com/in/ginayacone/ Host Alyssa Miller On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alyssa-miller ________________________________ Sponsors Are you interested in sponsoring an ITSPma…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, November 28-December 2, is hosted by Rich Stroffolino with our guest, Terrance Cooley, CISO, Air Force JADC2 R&D Center. Thanks to our show sponsor, Automox Are you ready to ditch manual patching and all the complexity and hassle that comes with it? With Automox, you can autom…
 
Cuba ransomware pulls in $60 million. CISA releases three ICS advisories. DDoSing the Vatican. Andrea Little Limbago from Interos on the implications of Albania cutting off diplomatic ties with Iran. Our space correspondent Maria Varmazis speaks with Brandon Bailey about Space Attack Research and Tactic Analysis matrix. And how Google supports Ukra…
 
Guest Brendan Dell Founder @ B2H On LinkedIn | https://www.linkedin.com/in/brendandell/ Host Brendon Rod On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/brendon-rod ____________________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the…
 
This episode of Cyber is an action packed double feature that feels like it’s been pulled directly from a Cyberpunk novel. That’s right, today is all about railway strikes and killer robots. It’s hard to be a railway worker in America. The schedules are a nightmare, the kind of working conditions that can make someone sick. Just don’t try to use yo…
 
Guest Tennisha Martin Executive Director, Chairwoman of the Board at BlackGirlsHack [@blackgirlshack] On LinkedIn | https://www.linkedin.com/in/tennisha/ On Twitter | https://twitter.com/misstennisha Host Phillip Wylie On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie ______________________ Episode Sponso…
 
Guest Tennisha Martin Executive Director, Chairwoman of the Board at BlackGirlsHack [@blackgirlshack] On LinkedIn | https://www.linkedin.com/in/tennisha/ On Twitter | https://twitter.com/misstennisha Host Phillip Wylie On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie ______________________ Episode Sponso…
 
As we all know training and certification costs pose a huge obstacle for many getting into the cyber industry. In an effort to change that, there are many companies out there disrupting this cycle. Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the p…
 
This week in InfoSec (06:17) With content liberated from the “today in infosec” twitter account and further afield 27th November 1995: Microsoft Shipped Internet Explorer 2.0 Microsoft Corp. shipped Internet Explorer 2.0, starting a browser war with the popular Netscape Navigator. Netscape Communications Corp. had had a virtual monopoly on World Wi…
 
Episode 278 of the Transatlantic Cable kicks off with news that the previous Twitter hack, back in 2021 is now much larger than initially suspected. Not great news for the already troubled social media site. From there, the team discuss recent news that nightclub owners in Miami are struggling with slumping sales after the recent crypto-crash – it …
 
Intruders gain access to user data in LastPass incident Sirius XM flaw unlocks smart cars thanks to code flaw Medibank hackers announce ‘case closed’ and dump huge data file on dark web Thanks to this week's episode sponsor, Automox And now a word from our sponsor, Automox. Are you ready to ditch manual patching and all the complexity and hassle th…
 
Hosts Jax Scott On ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jaclyn-jax-scott Erika McDuffie On ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/erika-mcduffie __________________________ Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/spon…
 
A new backdoor, courtesy of the DPRK. The Medibank breach is all over but the shouting (or, all over but the suing and the arresting). Risks and opportunities in telecom’s shift to cloud. Cyber risk in healthcare. An assessment of Russian cyber warfare. Robert M. Lee from Dragos assesses the growing value of the ICS security market. Our guest is Ce…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login