show episodes
 
O
OWASP 24/7
Monthly+
 
OWASP 24/7 is a recorded series of discussions with project leads within OWASP. Each week, we talk about the new projects that have come on board, updates to existing projects and interesting bits of trivia that come across our desk.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
P
Professionally Evil Perspective
Rare
 
This podcast contains random security topics discussed by the Secure Ideas team.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Loading …
show series
 
This week, we invited Ms. Jessy Irwin (@jessysaurusrex) on to discuss the issues Small and medium businesses and startups have with getting good training, training that is effective and what can be done to address these issues. We also go through several ideas for training subjects that should be addressed by training, and what maybe would be a ...…
 
This week, we invited Ms. Jessy Irwin (@jessysaurusrex) on to discuss the issues Small and medium businesses and startups have with getting good training, training that is effective and what can be done to address these issues. We also go through several ideas for training subjects that should be addressed by training, and what maybe would be a ...…
 
This week, we invited Ms. Jessy Irwin (@jessysaurusrex) on to discuss the issues Small and medium businesses and startups have with getting good training, training that is effective and what can be done to address these issues. We also go through several ideas for training subjects that should be addressed by training, and what maybe would be a ...…
 
On this weeks show we are joined by Colin Hardy to discuss all things Cyber Security.We start off by explaining what got him interested in this branch of computing, highlight what Cyber Security is, and define some of the common terminology.From here, we move on to discuss how he analyses Malware samples (using Automated, Behavioural and Static ...…
 
On this episode of the application security podcast, Robert and I jump over a wall. Just kidding. This isn’t Top Gear. This is our second episode of season two of the #AppSec PodCast. Robert and I talk about the OWASP Top 10 2017 release candidate. We walk through what is the OWASP Top 10, and what is some of the controversy that surrounds the ...…
 
On this episode of the application security podcast, Robert and I jump over a wall. Just kidding. This isn’t Top Gear. This is our second episode of season two of the #AppSec PodCast. Robert and I talk about the OWASP Top 10 2017 release candidate. We walk through what is the OWASP Top 10, and what is some of the controversy that surrounds the ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Datenschutz und technisch organisatorische Risiken, sowie mögliche Maßnahmen und ein bisschen neue DSGVO... about this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
Die OWASP Top 10 sind in einer neuen Version verfügbar. Was hat sich geändert? Wo gibt es Diskussionen und was ist das überhaupt?Top 10 Risiken in Web-Anwendungenabout this event: https://c3voc.de
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
 
In this episode: Alex interviews the Highlands Ranch High School CyberPatriots team, Robb and Alex re-cap the best RMISC yet, and news from Xcel Energy, Ping Identity, LogRhythm, and a breach in Larimer County. Full show notes here: https://www.colorado-security.com/news/2017/5/12/15-515-show-notesRMISC Recap - And meet some CyberPatriotsAhhhh. ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the ModSecurity Core Rule Set Project with project co-lead Christian Folini. The OWASP ModSecurity CRS Project's goal is to provide an easily "pluggable" set of generic attack detection rules that provide a base level of protecti ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the ModSecurity Core Rule Set Project with project co-lead Christian Folini. The OWASP ModSecurity CRS Project's goal is to provide an easily "pluggable" set of generic attack detection rules that provide a base level of protecti ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the OWASP Summit 2017 with conference organizer Sebastien (Seba) Deleersnyder. OWASP Summit 2017 is a 5-day participant driven event, dedicated to the collaboration of Development and Security professionals, with a strong focus o ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the OWASP Summit 2017 with conference organizer Sebastien (Seba) Deleersnyder. OWASP Summit 2017 is a 5-day participant driven event, dedicated to the collaboration of Development and Security professionals, with a strong focus o ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the WebGoat Project with project co-leads Jason White and Nanne Baars. WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons.…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the WebGoat Project with project co-leads Jason White and Nanne Baars. WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons.…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Vicnum Project with project lead Nicole Becher. The Vicnum Project is a collection of intentionally vulnerable web applications. Vicnum applications are commonly used in Capture the Flag exercises at security conferences.…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Vicnum Project with project lead Nicole Becher. The Vicnum Project is a collection of intentionally vulnerable web applications. Vicnum applications are commonly used in Capture the Flag exercises at security conferences.…
 
T
The Testing Show
 
Sometimes, you can find experts on topics in unusual places. This week we discuss security and privacy with Doug Traser, an Information Security Manager with Five9. He’s also the guitar player for Michael’s band, Ensign Red (or is Michael Doug’s singer? We’re never entirely sure). Regardless, if you have questions about security, OWASP, politie ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Defect Dojo Project with project lead Greg Anderson. The Defect Dojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-s ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Defect Dojo Project with project lead Greg Anderson. The Defect Dojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-s ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Virtual Village Project with project lead Evin Hernandez. The Virtual Village provides users with access to numerous operating system's Desktop as well as Servers. Users are able to create custom apps for other OWASP projects ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Virtual Village Project with project lead Evin Hernandez. The Virtual Village provides users with access to numerous operating system's Desktop as well as Servers. Users are able to create custom apps for other OWASP projects ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Juice Shop Project with project lead Bjoern Kimminich. The Juice Shop is an intentionally insecure webapp for security training, written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe secur ...…
 
This segment of the "Less than 10 Minutes" series was recorded live at AppSec EU 2017 in Belfast. It is an update of the Juice Shop Project with project lead Bjoern Kimminich. The Juice Shop is an intentionally insecure webapp for security training, written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe secur ...…
 
How do you prevent your app from shipping with preventable security vulnerabilities? This episode we talk to Martin Alderson of Codified Security about their automated Mobile App Security testing service. Hosts: Greg Shackles, Jon Dick Guests: Martin Alderson Links: Codified Security Xamarin App Security Testing OWASP Mobile Top 10 Thanks to ou ...…
 
L
La French Connection
 
Avril 2017 Shownotes and Links Siren de tornade ShadowBroker Déjà patché Exploit: Win XP to Win server 2008 Cpanel exploit! SWIFT - Russie - https://www.rt.com/business/382017-russia-swift-central-bank/ Tour cellulaire fantôme PunyCode Exemple Apple Exemple Emoji OWASP TOP 10, 2017 - Du nouveau! A7-Insufficient Attack Protection (wth!?!) A10-Un ...…
 
Introduction [1:13] Fedora Debian Computer Security[4:37] 2013 Singapore cyber-attacks SSL Threat Modeling Crown Jewels punycode Incident Response Elastic Search Kibana R Python We Build Live with Rahul Clustering Random Forest Machine Learning Adversarial Machine Learning Metasploit Penetration Testing Vulnerability Analysis Malware Reverse En ...…
 
La 44e émission des Chiens de garde, le podcast de Crypto.Québec sur la sécurité, la vie privée et la surveillance, est en ligne. L’épisode a été enregistré le mercredi 19 avril 2017. Type de fichier : OGG / MP3 – Taille : 84,83MB – Durée : 37:04 m (320 kbps 44100 Hz) Notes de l’émission Annonces: Sortie de Tor Browser 6.5.2 – il s’agit d’une m ...…
 
U
Unsupervised Learning with Daniel Miessler
 
Shadow Brokers, fingerprinting Netflix traffic, Magneto vuln, Juniper advisories, Amazon speaker tech, Facebook's 100Gbit optical switches, Google Hire, Minecraft currency, a solar-powered water harvester, OWASP Top 10 draft comments, remote SSH, EC2 and NAT firewalls, deep learning is a black box, discovered links, and more……
 
U
Unsupervised Learning with Daniel Miessler
 
Shadow Brokers, fingerprinting Netflix traffic, Magneto vuln, Juniper advisories, Amazon speaker tech, Facebook's 100Gbit optical switches, Google Hire, Minecraft currency, a solar-powered water harvester, OWASP Top 10 draft comments, remote SSH, EC2 and NAT firewalls, deep learning is a black box, discovered links, and more……
 
Feature interview about GDPR with James Keese, former Privacy Officer of Western Union, and Stephen Edmonds, Director of GRC for Ping Identity. Plus news from Optiv, LogRhythm, WebRoot, root9b, Managed Methods and much more! For full show notes: https://www.colorado-security.com/news/2017/4/13/podcast-11-417-show-notesDATES IN MAY 2018 ARE CLOS ...…
 
E
Exploring Information Security - Timothy De Block
 
In this looking for more edition of the Exploring Information Security podcast, I've got two job postings and two people looking for an opportunity in infosec. Job postings The two postings I have are from my place of employment, Premise Health. We have a Jr. Pen Tester and Security Engineer role. Both positions will require you to relocate to ...…
 
C
Code Voyagers
 
This episode we talk to Stu and Oskar from our Security team about the work they do and trends they have seen recently in internet economy companies like Skyscanner.Topics include the OWASP Top 10 and some unusual Internet of Things hacksIf you like what you hear, why not apply to join the team. You can see our current open positions at www.sky ...…
 
Cale, Evan and Sujit get into an interesting discussion around containers in Docker, ACS and Service Fabric, their use-cases and container registries. Cale shares some of his experiences using them for his work. Media file: http://azpodcast.blob.core.windows.net/episodes/Episode172.mp3 Other updates: Azure DevTest Labs is now available in Korea ...…
 
"Why does OWASP even exist? Why do we even have this idea of understanding common issues, common problems. There are resources to help us do it better next time. I feel we are not learning at the curve where we should be, considering the resources available to us." -- Jaya BalooAs CISO of KPN, the largest telecom in the Netherlands, Jaya Baloo ...…
 
"Why does OWASP even exist? Why do we even have this idea of understanding common issues, common problems. There are resources to help us do it better next time. I feel we are not learning at the curve where we should be, considering the resources available to us." -- Jaya BalooAs CISO of KPN, the largest telecom in the Netherlands, Jaya Baloo ...…
 
For Show Notes with links that work: https://www.colorado-security.com/news/2017/3/11/podcast-6-313-show-notesTwo Feature Interviews and... what's a SNOWFROC?This Thursday Denver OWASP's annual conference (SnowFROC - Front Range OWASP Conference) hits the Cable Center, come see Robb deliver the opening keynote presentation. Registration for RMI ...…
 
Brian Fox and Shannon Lietz talk about the recent announcement of the struts 2 vulnerability: What is it, how can it affect you, what you can do about it. You can view this broadcast as video on YouTube:https://www.youtube.com/watch?v=EzRKOudJPtQ
 
Brian Fox and Shannon Lietz talk about the recent announcement of the struts 2 vulnerability: What is it, how can it affect you, what you can do about it. You can view this broadcast as video on YouTube:https://www.youtube.com/watch?v=EzRKOudJPtQ
 
E
Exploring Information Security - Timothy De Block
 
In this docked edition of the Exploring Information Security podcast, Rory McCune joins me to discuss how to secure Docker. Rory (@raesene) gave a talk over the summer at BSides London 2016 on the myths of Docker. Docker is a technology being used by more and more development teams. We're even starting to see security tools run on Docker, such ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login