show episodes
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
  continue reading
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

Unsubscribe
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Monthly
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
  continue reading
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Welcome to 'AI Unplugged,' the podcast where we dive deep into the world of Artificial Intelligence. Join us as we explore cutting-edge advancements, ethical considerations, and real-world applications of AI. Whether you're a tech enthusiast, a professional in the field, or just curious about how AI is shaping our future, this podcast offers insightful discussions with experts, industry leaders, and innovators. Tune in to stay informed and inspired by the limitless potential of AI.
  continue reading
 
Artwork

1
ITSPmagazine Podcast Network

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Artwork

1
We think we know

Pentest-Tools.com

Unsubscribe
Unsubscribe
Monthly+
 
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
  continue reading
 
Artwork
 
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
  continue reading
 
Artwork
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Artwork
 
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Ages ago, elves and dwarves unknowingly migrated between Universes via a Junction. Jenneva and Egam believe they have found a Junction and plan a trip with Alexander to test the theory and investigate the origins of the elves and dwarves. Because they believe that the perennial animosity between the two races is due to misunderstandings about their histories, the mages include the prince of elves and the prince of dwarves in the group. Trouble begins at the very start of the journey as Egam ...
  continue reading
 
File photo by Portra Images via Getty Images Donna Nickerson spent her last working years as the activity and social services director at a Turlock, Calif., nursing home. But when she developed Alzheimer’s disease and needed that kind of care herself, she and her husband couldn’t afford it: A bed at a nearby home cost several thousand dollars a month. “I’m not a wealthy man,” said Nickerson’s husband Mel, a retired California State University-Stanislaus professor. “There’s no way I could pay ...
  continue reading
 
Artwork
 
Blue Fox Group, a technology company that specializes in supporting customers with the best infrastructure, live support, and communications technology available. Supporting your business objectives and improving your bottom line.
  continue reading
 
Artwork

1
Hacker Talk

Firo Solutions LTD

Unsubscribe
Unsubscribe
Monthly
 
Every second week, Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
  continue reading
 
Cybersecurity and data privacy is a requirement for any good business. So how can a CISO, CTO or compliance manager stay on top of where the industry is heading? Infosec veteran and former lead auditor, Blaise Wabo discusses the intersection of security, privacy and compliance. Topics include: Guest interviews with industry experts, framework updates, the business implications of compliance (and non-compliance), and discussions about compliance challenges, tips and tricks.
  continue reading
 
Loading …
show series
 
Welcome to Breakfast Bytes with Felicia King. Today, we delve deep into the often-misunderstood realm of penetration testing. As business owners grapple with the necessity and costs associated with these tests, Felicia demystifies the process, drawing from her three decades of cybersecurity expertise. In this episode, discover why traditional penet…
  continue reading
 
Breaking In to Stay Secure: The Penetration Testing Deep Dive You Can't Miss Ever wondered how ethical hackers protect your business? Our intern Alexander takes us on a journey from tech-curious kid to cybersecurity pro, revealing: Why your network is like your home (and how to lock it down) The #1 vulnerability you're probably overlooking How AI i…
  continue reading
 
In 7 Minutes on ITSPmagazine Short Brand Story recorded on location during Black Hat USA 2024, Sean Martin had a fascinating conversation with Snehal Antani, CEO and Co-Founder of Horizon3.ai. The discussion revolved around the innovative strides Horizon3.ai is making in autonomous penetration testing and continuous security posture management. Sne…
  continue reading
 
Explore our latest podcast episode where we dive into essential tools for effective Vulnerability Assessment and Penetration Testing. Learn about OpenVAS, a key tool for security testing, and discover strategies to enhance your security protocols. Tune in for expert insights and practical advice!
  continue reading
 
Today on IT Unplugged, we're sharing game-changing insights for anyone navigating the complex world of nonprofit technology. I had the privilege of speaking with Abby, Executive Director of Jackie Nitschke Center, about how forward-thinking nonprofits are using IT to amplify their impact. Here's what you'll learn: · Innovative approaches to IT on a…
  continue reading
 
Text us feedback! Let's talk about cyber risk classification in this episode of The Cyber Threat Perspective. Brad and Tyler provide a high-level overview of various types of cyber risk encountered in penetration testing. -Reputational Risk -Financial Risk -Operational Risk -Direct Risk -Indirect Risk -Lateral Risk -Strategic Risk -Compliance Risk …
  continue reading
 
Guests: Fred Heiding, Research Fellow, Harvard On LinkedIn | https://www.linkedin.com/in/fheiding/ On Twitter | https://twitter.com/fredheiding On Mastodon | https://mastodon.social/@fredheiding On Instagram | https://www.instagram.com/fheiding/ Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast On IT…
  continue reading
 
Michael Howard, Senior Director at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Michael shares his journey at Microsoft, starting from his early days in New Zealand as part of a small team of ten. He discusses his extensive career, his contributions to cybersecurity, and his role in the development of essential secu…
  continue reading
 
Two years ago Jennifer Lopez and Ben Affleck got married, more than a decade after dating and splitting up once before. Their smiles and PDA were contagious and rooting for their romance to last. But this week J.Lo filed for divorce, leaving many to wonder, what happened? The Atlantic staff writer Faith Hill interviewed couples who reunited a few y…
  continue reading
 
Gwen and Yasir weren't the type of couple that liked to run marathons, at first. As hardships pulled their lives in unexpected directions, running became their best— and sometimes only— way of remembering what really mattered.If you want to leave the StoryCorps Podcast a voicemail, call us at 702-706-TALK. Or email us at podcast@storycorps.org.Lear…
  continue reading
 
In this hour, stories of testing one's own limitations and discovering new wells of strength and resolve. This episode is hosted by Moth Senior Director Meg Bowles. The Moth Radio Hour is produced by The Moth and Jay Allison of Atlantic Public Media. Storytellers: Living on the 44th floor, Lucy Danser has to face her fear of elevators. Albert Fox C…
  continue reading
 
A new documentary investigates the disappearance and reexamines the legacy of the woman who helped people worldwide learn to type. "Seeking Mavis Beacon” director Jazmin Renée Jones and producer Olivia McKayla Ross join us to discuss their exploration of the application software program released in 1987 and the woman whose face was on the package.…
  continue reading
 
Guest: Christine Bejerasco, CISO of WithSecure On LinkedIn | https://www.linkedin.com/in/christinebejerasco/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist ______________________ Episode Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspm…
  continue reading
 
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes Could it be tha…
  continue reading
 
Guest: Steve Corrick, Director, Cybertech New York On LinkedIn | https://www.linkedin.com/in/stevecorrick/ On Twitter | https://x.com/scorrick On Facebook | https://www.facebook.com/stephen.corrick ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyb…
  continue reading
 
Robots on the Hill On a bright spring day, some schoolchildren on a field trip passed near the Observatory on the Hill. The large, gleaming building was an architectural wonder, with tall towers reaching toward the sky, silver domes shining in the sun, and gigantic telescopes protruding like curious eyes, always ready to explore the universe. It wa…
  continue reading
 
Today we’re talking pentesting – specifically some mini gems that can help you escalate local/domain/SQL privileges: Check the C: drive! If you get local admin and the system itself looks boring, check root of C – might have some interesting scripts or folders with tools that have creds in them. Also look at Look at Get-ScheduledTasks Find ids and …
  continue reading
 
Three Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misat…
  continue reading
 
In this riveting episode of Breakfast Bytes, host Felicia sits down with Crystal Redmann, the inquisitive Operations Director from Redmann Farms, to dive into the intricacies of network security. Crystal brings forth compelling questions about network segmentation, shedding light on how this fundamental security measure can protect even the smalles…
  continue reading
 
February, 1976. A flight out of California turned catastrophic when it crashed into a farm in rural Nebraska. What happened that night at the local hospital, and crucially, what went wrong, would inspire a global sea-change in how emergency rooms operate and fundamentally alter the way doctors think in a crisis. Special thanks to Jody and Jay Uprig…
  continue reading
 
Guest: Ian Thornton Trump, CISO at Cyjax Limited and the CTO at Octopi Managed Services LinkedIn | https://www.linkedin.com/in/ian-thornton-trump-cd-77473a26/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist ______________________ Episode Sponsors Are you interested in spons…
  continue reading
 
[REBROADCAST FROM Jun 27, 2024] In the play "N/A," Holland Taylor stars as N, a longtime Democratic Representative and former Speaker of the House, who spars with A, played by Ana Villafañe. A is an ambitious and progressive newly elected Representative from New York, who thinks it's time for a new generation to take control. The play follows their…
  continue reading
 
Inspired by the book by historian Donald Bogle, a new four-part docuseries reveals the stories of Black actors, writers, directors, and producers in Hollywood from the silent era through "Black Panther." Director Justin Simien joins us to discuss "Hollywood Black" now available on MGM+. *This segment is guest hosted by Kousha Navidar.…
  continue reading
 
One day over a decade ago, photographer Andrew Garn looked at a pigeon -- really LOOKED at one -- and was stunned. The iridescent feathers. The fan-like sweep of their wings. Their luminous eyes. He realized he would never look at them the same way again and began photographing them. Then he started volunteering for a bird rescue organization and r…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Meg Wolitzer presents three stories in which plans go awry, or alter completely. In Ben Loory’s “Dandelions,” read by Wyatt Cenac, a suburb is invaded, and experiences a change of heart. Edwidge Danticat imagines an ultimate act and its consequences in “Cane and Roses,” read by Anika Noni Rose. And a romance with comic underpinnings changes course …
  continue reading
 
Guests: Trevor Vaughn On LinkedIn | https://www.linkedin.com/in/trevor-vaughn-2165a661/ Hunter Buffington On LinkedIn | https://www.linkedin.com/in/hunter-buffington-co/ Hosts: Alejandro Juárez Crawford On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford Miriam Plavin-Masterman On ITSPmagazine 👉…
  continue reading
 
We go back almost 100 years, to the beginning of women's inclusion in elite sports. It turns out that men had an odd variety of concerns about women athletes. Some doubted these athletes were even women at all. And their skepticism resulted in the first policies requiring sex testing. Tested is a six-part series, you can binge all the episodes now …
  continue reading
 
Guests: Trevor Vaughn On LinkedIn | https://www.linkedin.com/in/trevor-vaughn-2165a661/ Hunter Buffington On LinkedIn | https://www.linkedin.com/in/hunter-buffington-co/ Hosts: Alejandro Juárez Crawford On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford Miriam Plavin-Masterman On ITSPmagazine 👉…
  continue reading
 
New from NPR's Embedded podcast and CBC in Canada: Would you alter your body for the chance to compete for a gold medal? That's the question facing a small group of elite athletes right now. Last year, track and field authorities announced new regulations that mean some women can't compete in the female category unless they lower their body's natur…
  continue reading
 
The exposed and public nature of application programming interfaces (APIs) come with risks including the increased network attack surface. Zero trust principles are helpful for mitigating these risks and making APIs more secure. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconiers-Hasan, a solu…
  continue reading
 
Guest: Amar Sonik, Organizer, BSides Singapore On LinkedIn | https://www.linkedin.com/in/amarjitsonik/ Hosts: Hutch On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/hutch Len Noe, Technical Evangelist / Whitehat Hacker at CyberArk [@CyberArk] On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/…
  continue reading
 
Remi Wolf is a singer and songwriter originally from Palo Alto, California. She’s been releasing music since 2019. She performed at Coachella in 2023, and has toured with Olivia Rodrigo, Lorde, and Paramore. Her second album, Big Ideas, came out in July 2024. I talked to Remi about how she and her collaborators wrote and produced the song “Soup.” H…
  continue reading
 
Join us for an insightful episode of IT Unplugged as we sit down with Stephen, M2 Technology's newest IT consultant. With a passion for technology that started at age eight, Stephen shares his journey from fixing computers for snacks to becoming a seasoned IT professional. In this episode, we explore: Stephen's unique path into IT, starting with a …
  continue reading
 
Text us feedback! In this episode Brad and Spencer discuss Attack Surface Monitoring, what it is, and why it's important for defending against cyber-attacks. They give into the difference between attack vectors and attack surface and share a high-level overview on how to go about monitoring your own attack surface. Finally, they share tools and tec…
  continue reading
 
In a new dramatic comedy, a cantor, played by Jason Schwartzman, experiences a crisis of faith but finds a new sense of purpose when his grade school music teacher, played by Carol Kane, becomes his adult bat mitzvah student. Schwartzman and Kane join us alongside filmmaker Nathan Silver to discuss the film, "Between the Temples" which is in theate…
  continue reading
 
Loading …

Quick Reference Guide