Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the N2K editorial team.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading
1
Dr. Jessica Barker: Cybersecurity has a huge people element to it. [Socio-technical] [Career Notes]
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40
Enjoy this encore episode where we are joined by Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, as she shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was a…
…
continue reading
1
Dr. Jessica Barker: Cybersecurity has a huge people element to it. [Socio-technical]
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40
Enjoy this encore episode where we are joined by Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, as she shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was a…
…
continue reading
1
Podcast bait, malware switch. [Research Saturday]
22:44
22:44
Play later
Play later
Lists
Like
Liked
22:44
Joshua Miller from Proofpoint is discussing their work on "Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset." Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before send…
…
continue reading
Our guest today is Astronomer Kat Troche. Kat participates in sidewalk astronomy, setting up her telescope in New York City to make space for everyone. She recently had the opportunity to learn more about astronomy and dark skies in Chile and shared her story with us. You can follow Kat’s outreach program on Instagram. Remember to leave us a 5-star…
…
continue reading
Joshua Miller from Proofpoint is discussing their work on "Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset." Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before send…
…
continue reading
Interpol arrests eight in an international cybercrime crackdown. A MedusaLocker variant targets financial organizations. Cloudflare mitigates a record DDoS attempt. Insights from the Counter Ransomware Initiative summit. Fin7 uses deepnudes as a lure for malware. Researchers discovered critical vulnerabilities in DrayTek routers. CISA issues urgent…
…
continue reading
1
Second cert flight for ULA’s Vulcan Centaur.
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19
United Launch Alliance’s (ULA) Vulcan Centaur successfully lifts off for its second certification launch for the US Space Force. NASA is establishing an entirely new mission class for astrophysics, filling a gap in the Explorers Program between major flagship operations and small-scale missions. Impulse Space has secured $150 million in Series B fu…
…
continue reading
It's October, and that means it’s Cybersecurity Awareness Month. This feels like a good moment to review how to keep our personal and professional worlds secure, because it is not just one department's job, it's really up to each and every one of us to do our bit to keep our important stuff safe from cybercriminals. Remember to leave us a 5-star ra…
…
continue reading
1
The Global Race for the 21st Century [Special Edition]
42:11
42:11
Play later
Play later
Lists
Like
Liked
42:11
In this episode, Dmitri Alperovitch discusses his book World on the Brink: How America Can Beat China in the Race for the Twenty-First Century with host Ben Yelin. Alperovitch highlights the rising tensions between the U.S. and China, focusing on Taiwan as a critical flashpoint that could ignite a new Cold War. He shares insights on the strategies …
…
continue reading
1
Election Propaganda Part 1: How does election propaganda work? [CSO Perspectives]
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. References: David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. Jeff Berman, Renée DiResta, 2023. Disinformat…
…
continue reading
In this episode, Dmitri Alperovitch discusses his book World on the Brink: How America Can Beat China in the Race for the Twenty-First Century with host Ben Yelin. Alperovitch highlights the rising tensions between the U.S. and China, focusing on Taiwan as a critical flashpoint that could ignite a new Cold War. He shares insights on the strategies …
…
continue reading
T-Minus Producer Alice Carruth participated in the NASA Social Media event ahead of the Crew 9 launch from Florida. She shares her experience with the tour and launch. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a…
…
continue reading
1
Election Propaganda Part 1: How does election propaganda work? [CSO Perspectives]
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. References: David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. Jeff Berman, Renée DiResta, 2023. Disinformat…
…
continue reading
1
Election Propaganda Part 1: How does election propaganda work?
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. References: David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. Jeff Berman, Renée DiResta, 2023. Disinformat…
…
continue reading
1
ULA’s Vulcan Centaur rolled out to the pad.
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57
United Launch Alliance’s Vulcan Centaur rocket rolled out to Space Launch Complex 41 at Cape Canaveral ahead of its scheduled Friday launch. The Deep Space Network (DSN) managed by NASA’s Jet Propulsion Laboratory successfully completed end-to-end test communications with Astrobotic’s Griffin lunar lander. The China Manned Space Agency has shared t…
…
continue reading
A global news agency suffers a cyberattack. CISA and the FBI provide guidance on cross site scripting attacks. A Texas health system diverts patients following a ransomware attack. Western Digital patches a critical vulnerability in network attached storage devices. California passes a law protecting domestic abuse survivors from being tracked. Ver…
…
continue reading
1
non-fungible tokens (NFT) (noun) [Word Notes]
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34
Enjoy this encore of Word Notes. Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.By N2K Networks
…
continue reading
1
The Dark Arts of cyber. [Only Malware in the Building]
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46
Welcome, witches, wizards, and cybersecurity sleuths! You’ve entered, Only Malware in the Building. Join us each month to brew potions of knowledge and crack the curses of today’s most intriguing cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building …
…
continue reading
Enjoy this encore of Word Notes. Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
1
THE FAIK FILES | Chapter 2: New Frontiers of Deception: AI and Synthetic Media
28:41
28:41
Play later
Play later
Lists
Like
Liked
28:41
This is Part Two of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry…
…
continue reading
1
THE FAIK FILES | Chapter 1: The Eternal Battle for the Mind
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07
This is Part One of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry…
…
continue reading
A critical vulnerability has been discovered in the NVIDIA Container Toolkit. Representatives from around the world are meeting in Washington to address ransomware. The Pentagon shoots down the notion of a separate cyber service. A genetic testing company leaves sensitive information in an unsecured folder. A public accounting firm breach affects 1…
…
continue reading
1
SpaceX’s Falcon 9 under investigation, again.
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23
SpaceX Dragon “Freedom” carrying the two-man Crew 9 team docked to the International Space Station on Sunday. SpaceX’s Falcon 9 is once again grounded pending investigation after it experienced an off-nominal deorbit burn. A new report on NASA’s Management of Risks to Sustaining ISS Operations through 2030 has shared that the leak rate on the orbit…
…
continue reading
1
Funding Friday and Starlink’s fantastic future.
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09
D-Orbit completes their Series C round. Agile Space locks in new funding, too. Starlink subscriptions continue to balloon. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on Linke…
…
continue reading
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Rick Doten, the VP of Information Security at Centene and one of the original contributors to the N2K CyberWire Hash Table. He makes the case to invigorate the automation first principle cybersecurity strategy. In this case, he is specifically addre…
…
continue reading
1
Security remediation automation. [CSO Perspectives]
18:56
18:56
Play later
Play later
Lists
Like
Liked
18:56
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Rick Doten, the VP of Information Security at Centene and one of the original contributors to the N2K CyberWire Hash Table. He makes the case to invigorate the automation first principle cybersecurity strategy. In this case, he is specifically addre…
…
continue reading
1
Steve Blank, national security, and the dilemma of technology disruption. (Part 2 of 2) [Special Edition]
37:21
37:21
Play later
Play later
Lists
Like
Liked
37:21
In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption. Listen to part 1 here. In this series, Steve Blank, a renowned expert in national security innovati…
…
continue reading
1
Jason Clark: Challenge the way things are done. [Strategy]
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42
Enjoy this encore episode where we are joined by the Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service.…
…
continue reading
1
Jason Clark: Challenge the way things are done. [Strategy] [Career Notes]
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42
Enjoy this encore episode where we are joined by the Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service.…
…
continue reading