show episodes
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
S
Smashing Security
Series avatar that links to series pageSeries avatar that links to series page

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
  continue reading
 
S
Shared Security
Series avatar that links to series pageSeries avatar that links to series page

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Weekly
 
Welcome to Shared Security, your premier weekly cybersecurity and privacy podcast. Dive deep into the world of digital trust, where we explore the critical bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnect ...
  continue reading
 
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
  continue reading
 
A
Adam Carolla Show
Series avatar that links to series pageSeries avatar that links to series page

1
Adam Carolla Show

PodcastOne / Carolla Digital

Unsubscribe
Unsubscribe
Daily
 
Welcome to the new home for Adam's rantings and ravings. This is the #1 Daily Downloaded Podcast in the World. GET IT ON as Adam shares his thoughts on current events, relationships, airport security, specialty pizzas, politics, and anything else he can complain about. Five days a week and completely uncensored, Adam welcomes a wide range of guests to join him in studio for in depth interviews and a front row seat to his unparalleled ranting. Let's not forget Bryan Bishop (Bald Bryan) on sou ...
  continue reading
 
The official podcast of the Georgetown Security Studies Review (GSSR), discussing all things national security, history, military, and foreign policy. GSSR is the official flagship publication of Georgetown University's Center for Security Studies, featuring both online commentary and a biannual academic journal. Find out more about GSSR here: https://georgetownsecuritystudiesreview.org/
  continue reading
 
Welcome to the Worship Security Academy Podcast – your go-to resource for church safety and security. Join host Simon Osamoh, an ex-UK detective and church security expert, as he connects with global security specialists to share practical tips and insights on managing risk in houses of worship. Stay protected and informed with our online training courses visit worshipsecurity.org.
  continue reading
 
I
ITSPmagazine
Series avatar that links to series pageSeries avatar that links to series page

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
  continue reading
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Security and cybersecurity are critical concerns for any modern business, and startups are no exception. In order to compete in the digital age, startups need to be aware of the latest security threats and have a plan to protect their data and systems. The Startuprad.io security and cybersecurity track is designed to help companies stay ahead of the curve. We interview entrepreneurs who are active in the space and bring you the latest news from the world of cyber security. Our goal is to hel ...
  continue reading
 
How would your life change if you reached Financial Independence and got to the point where working is optional? What actions can you take today to make that not just possible but probable. Jonathan & Brad explore the tactics that the FI community uses to reclaim decades of their lives. They discuss reducing expenses, crushing debt, tax optimization, building passive income streams through online businesses and real estate and how to travel the world for free. Every episode is packed with ac ...
  continue reading
 
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
  continue reading
 
G
Grumpy Old Geeks
Series avatar that links to series pageSeries avatar that links to series page

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

Unsubscribe
Unsubscribe
Weekly
 
As one of the longest-running podcasts, "Grumpy Old Geeks" discovers what went wrong on the Internet, and who's to blame. Every week they cut through the BS from big tech and tell you what's really going on. With wide-ranging topics, this show has something for everyone. There is a reason Elon Musk, Mark Zuckerberg, and that crowd all hate this podcast. Listen and find out for yourself!
  continue reading
 
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
  continue reading
 
N
NeedleStack
Series avatar that links to series page

1
NeedleStack

Matt Ashburn, Authentic8

Unsubscribe
Unsubscribe
Monthly+
 
Every Tuesday, NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights to the practice of digital research. Whether you’re an OSINT expert or online research just comes with the job, tune in to learn how to hone your skills, improve efficiency and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
  continue reading
 
C
Cyber Security Interviews
Series avatar that links to series pageSeries avatar that links to series page

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

Unsubscribe
Unsubscribe
Monthly
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
You've probably noticed that hackers are changing the world every day. Data breaches are putting you at risk. Privacy-invading apps are chasing your attention. And spies are treating the online world as their playground. Safe Mode is your weekly guide to everything cybersecurity and digital privacy — brought to you by CyberScoop. Every week we break down the most pressing issues in technology, provide you with the knowledge and tools to stay ahead of the latest threats and take you behind th ...
  continue reading
 
Loading …
show series
 
DHS council seeks to simplify cyber incident reporting rules UK passes the Online Safety Bill Finland and Europol take down PIILOPUOTI marketplace Huge thanks to our sponsor, Hyperproof We get it. You’re a risk manager or compliance professional, and you’re overworked. You’re trying to do the right thing by keeping your company safe and secure, but…
  continue reading
 
UK government appears to back down on demands to break encryption in Online Safety Bill Microsoft reveals how China-based hackers acquired secret key used to breach Outlook accounts Multiple flaws allowed key to improperly leave highly secure environment Mozilla research finds all major auto brands fail on privacy protection Evidence suggests LastP…
  continue reading
 
Phishing attacks and account hacks are a big problem. But how good are the so-called "advanced protection" programs available from Google, Facebook, Apple and Proton? Should you even use them? Trend Micro's Premium Security Suite offers complete device and identity protection for up to 10 devices. Check it out here: https://bit.ly/3PukkJK and use c…
  continue reading
 
Adam welcomes Tim Ballard to talk about his philanthropic work saving children from trafficking in the US and all over the world, which was the subject for the film ‘Sound of Freedom.’ Tim’s wife, Katherine, also joins to address the allegations against Tim and the recent Vice news articles disparaging him. Next Adam welcomes boxing commentator Jim…
  continue reading
 
Like what you hear? You can tip us here: https://www.buymeacoffee.com/Startuprad.io Our Sponsor Startupraven The best way to identify investors and cooperation partners for early-stage startups. Sign up for early access here: https://startupraven.com/ Find all options to follow us and subscribe here: https://linktr.ee/startupradio Welcome to our su…
  continue reading
 
Mix TikTok with facial recognition, and you've got a doxxing nightmare, T-Mobile users report bizarre behaviour in their accounts, and a Windows flaw provides a new means of infecting users. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault,…
  continue reading
 
Buck Sexton breaks down the latest headlines with a fresh and honest perspective! He speaks truth to power, and cuts through the liberal nonsense coming from the mainstream media. Subscribe to never miss an episode of The Buck Sexton Show. See omnystudio.com/listener for privacy information.By Premiere Networks
  continue reading
 
A Joint Advisory warns of Beijing's "BlackTech" threat activity. ShadowSyndicate is a new ransomware as a service operation. A Smishing Triad in the UAE. Openfire flaw actively exploited against servers. AtlasCross is technically capable and, above all, "cautious." Xenomorph malware in the wild. DDoS and API attacks hit the financial sector. In our…
  continue reading
 
🚀 This week on Privacy Please, we're about to drop some knowledge that's hotter than the school cafeteria's mystery meat! 🔥 Attention, parents and students: 📚✏️ It's back-to-school time, and while we can't promise to make algebra fun, we can guarantee you'll leave our episode with your privacy knowledge at the head of the class. We're serving up mo…
  continue reading
 
In this episode, Tudor and Rich Zeoli discuss the corruption allegations against Senator Bob Menendez and the broader issue of corruption in the US government. They question Menendez's actions and lack of accountability, as well as the potential widespread problem of corruption among politicians. The conversation then shifts to criticizing former P…
  continue reading
 
Adam welcomes comedian extraordinaire Roseanne Barr, where we learn about her unusual upbringing and her unexpected path to comedy. She recalls her violent father, to a young pregnancy that leads to adoption, and the unique path forward where years later she ends up one of the highest paid women on television. She addresses past scandals and curren…
  continue reading
 
Multiple threat actors lay claim to Sony hack Philippines health org struggling to recover from ransomware attack Canadian Flair Airlines leaked user data for months Thanks to today's episode sponsor, AppOmni If you think CASBs effectively secure your SaaS data… think again. CASBs lack visibility into your SaaS estate. Nor can they address and dete…
  continue reading
 
Apple has quietly removed support for Postscript in macOS Ventura over security concerns with the outdated interpreter language. China has formally accused the NSA of hacking and maintaining access to Huawei servers since 2009, based on documents from Edward Snowden. A misconfigured Azure Shared Access Signature token resulted in 38TB of sensitive …
  continue reading
 
Apple has quietly removed support for Postscript in macOS Ventura over security concerns with the outdated interpreter language. China has formally accused the NSA of hacking and maintaining access to Huawei servers since 2009, based on documents from Edward Snowden. A misconfigured Azure Shared Access Signature token resulted in 38TB of sensitive …
  continue reading
 
Your SharePoint is on-premises (at least for now), but you want to take advantage of some of those cool SharePoint Online features - is there a way? Richard talks with Sandy Ussia about her talk at the Thrive Conference in Slovenia about how on-premises SharePoint can use Power Automate and other tools to create powerful workflows. Sandy discusses …
  continue reading
 
Buck Sexton breaks down the latest headlines with a fresh and honest perspective! He speaks truth to power, and cuts through the liberal nonsense coming from the mainstream media. Subscribe to never miss an episode of The Buck Sexton Show. See omnystudio.com/listener for privacy information.By Premiere Networks
  continue reading
 
Guest: Chris Younger, CEO and Co-Founder @ Class VI Partners On LinkedIn | https://www.linkedin.com/in/chris-younger/ Host: Brendon Rod On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/brendon-rod ____________________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://w…
  continue reading
 
Supply chain has been a hot topic for a few years now, but so many things we need to do for a secure supply chain aren't new at all. We'll cover SBOMs, vuln management, and putting together a secure pipeline. Segment resources: https://www.solarwinds.com/assets/solarwinds/swresources/whitepaper/2111swiwhitepaper_nextgenbuild.pdf https://next.redhat…
  continue reading
 
Guests: Ken Underhill, Chief Strategy Officer at Cloud Underground On LinkedIn | https://www.linkedin.com/in/kenunderhill Christophe Foulon, Leadership Career Coach & Virtual Cyber Risk Advisor at CPF Coaching On Twitter | https://twitter.com/chris_Foulon On LinkedIn | https://www.linkedin.com/in/christophefoulon Tia (Yatia) Hopkins, Chief Cyber Re…
  continue reading
 
An advanced phishing campaign hits hospitality industry. An information-stealing campaign deploys ZenRAT. More MOVEit-related data breaches are disclosed. Mixin Network suspends deposits and withdrawals. The OpenSea NFT market warns of third-party risk to its API. Phishing for Ukrainian military drone operators. Mr. Security Answer Person John Pesc…
  continue reading
 
Guest: Theresa Payton, Chief Advisor and CEO of Fortalice®, LLC [@FortaliceLLC] and former White House Chief Information Officer (CIO) of the Executive Office of the President (EOP) from 2006-2008. She was the first woman to hold this position. On Twitter | https://twitter.com/TrackerPayton On LinkedIn | https://www.linkedin.com/in/theresapayton __…
  continue reading
 
In this Brand Story episode, hosts Marco and Sean have a thought-provoking discussion with Peter Klimek from Imperva about the concept of "shift left" in application security. Have we gone too far? The conversation revolves around the challenges and benefits of identifying vulnerabilities earlier in the software development lifecycle and the need f…
  continue reading
 
This week Dr. Doug talks: The Year 3000, Sandman, ShadowSyndicate, National Student Clearing House, Apple, Predator, Xenomorph, Mixin, More News, and Jason Wood on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://…
  continue reading
 
We talk to an OSINT professional about what he learned when he applied his daytime skills to a moonlighting hobby. On YouTube, Gary Ruddell shares 3-minute tips, geolocates scenes from movies and shares the OSINT discipline he learned from the U.K. military with hobbyists and practitioners just starting out. Key takeaways Applying the intelligence …
  continue reading
 
Our headline story for this episode of the Cyberlaw Podcast is the U.K.’s sweeping new Online Safety Act, which regulates social media in a host of ways. Mark MacCarthy spells some of them out, but the big surprise is encryption. U.S. encrypted messaging companies used up all the oxygen in the room hyperventilating about the risk that end-to-end en…
  continue reading
 
In this episode, we interview Jake Wilson, Western Governor University's Security Awareness Evangelist. We'll learn about how he built up and matured WGU's security awareness program, eliminating blind spots, and improving efficacy through data analysis and better reporting. This segment is sponsored by Living Security. Visit https://securityweekly…
  continue reading
 
Adam welcomes comedians Jonathan Kite and Jiaoying Summers to the show to share traveling trials and tribulations, especially concerning a recent work trip for Adam where a man snuck a gun past TSA and the resulting domino effect that wrecked Adam’s flight home. In the news for the day we hear about Taylor Swift attending the Chiefs’ game and leavi…
  continue reading
 
Mixin Network loses $200 million Kia and Hyundai exploit linked to massive car thefts Stress testing voting equipment Thanks to today's episode sponsor, AppOmni Are you confident in your organization’s SaaS security? AppOmni surveyed 600+ security practitioners globally and 71% answered yes. But 79% experienced SaaS cybersecurity incidents. What’s …
  continue reading
 
The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began descr…
  continue reading
 
This season, IRL host Bridget Todd meets people who are balancing the upsides of artificial intelligence with the downsides that are coming into view worldwide. Stay tuned for the first of five biweekly episodes on October 10! IRL is an original podcast from the non-profit Mozilla.By Bridget Todd
  continue reading
 
About the CISO Circuit Series Sean Martin and Michael Piacente will join forces roughly once per month to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and s…
  continue reading
 
Buck Sexton breaks down the latest headlines with a fresh and honest perspective! He speaks truth to power, and cuts through the liberal nonsense coming from the mainstream media. Subscribe to never miss an episode of The Buck Sexton Show. See omnystudio.com/listener for privacy information.By Premiere Networks
  continue reading
 
This summer, a movie called The Sound of Freedom took America by storm. The hero was Tim Ballard, the founder of an organization called Operation Underground Railroad. The movie depicted Ballard as an avenging hero who rescued trafficked children from a life of slavery. The truth, we’re all finding out, is something more complicated and a lot less …
  continue reading
 
Loading …

Quick Reference Guide