Best Ransomware podcasts we could find (Updated February 2019)
Related podcasts: Security Technology Cybersecurity Cyber Hacking Tech Software Development Business Phishing Malware Infosec News Business News Education Whitehat Cyber Criminals Wi-fi Cyberwarfare Computer Security Cybercrime  
Ransomware public [search 0]
×
Join millions of Player FM users today to get Ransomware news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
Defend your digital life! Cybersecurity and online privacy tactics for you and your family. https://DefendingDigital.comDefending Digital’s mission is to empower individuals and parents to increase their digital security and privacy. By increasing awareness and education, together we can reduce scams, malware infections, identity theft, ransomware, and other negative experiences.
 
S
Sophos Podcasts
Monthly+
 
Podcast by SophosLabs
 
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
 
Technology news and analysis for IT professionals delivered with a healthy dose of skepticism. Grab some coffee and a virtual donut, and keep up with everything that's happening in IT.
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018."Follow the podcast on Twitter at @SmashinSecurity, and subscribe in Castbox or your favourite podcast app. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
R
Risk & Repeat
Monthly+
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
Stay up-to-date with what’s happening in the digital world the easy way! Digital expert, national radio host and USA Today columnist Kim Komando wastes no time and gets right to the top stories, scams, security alerts, product reviews and crazy happenings in the world of tech. Listen and you’ll be in the know with Kim Komando!
 
Analysis and insights on cloud, big data and enterprise IT trends and developments.
 
Security awareness and IT training insight from the trenches
 
T
Tech2Ears
Monthly+
 
We talk about technology and professional development Become a supporter of this podcast:https://anchor.fm/melvin-williams0/support
 
Short shows of ~15 minutes or less sharing news from the vendor world. We keep it tight and on point to avoid wasting your time.
 
Technology news and analysis for IT professionals delivered with a healthy dose of skepticism. Grab some coffee and a virtual donut, and keep up with everything that's happening in IT.
 
Qlearly.com brings you the 'Startup World' podcast. Stay updated with what's happening in the tech industry with daily bite-size news read to you by our bot Alice! ✌️Daily Episodes: In these episode Alice will be reading to you a curated list of news. Tips & Tools: In these episodes Alice will be sharing certain tips and tools to help you grow your business, improve your productivity and much more.
 
R
Reboot It!
Monthly+
 
A frank discussion of technology, security, and privacy in plain language
 
The latest trends in medical practice management, marketing, and technology
 
I
ITSPmagazine
Weekly+
 
ITSPmagazine is free online publication that focuses on information technology, cybersecurity, data privacy, the InfoSec community and the influence that all this has on our everyday lives – as businesses, individuals and the society in which we live.Delivered through articles, podcasts, webcasts, webinars, live panels, event coverage and talk shows, our team of cybersecurity experts explores the topics that matter the most: the human element and its symbiotic effect on the latest in technol ...
 
Listen to Indy-based entrepreneurs and business-people, their experience and expertise. Have some laughs and learn along the way on this episode of Off the Circle. Your hosts are Douglas Karr and Ryan Grimes. We're sharing motivating stories, newly discovered businesses, exceptional leaders, and other topics associated with the great city of Indianapolis.
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
A
AT&T ThreatTraq
Monthly+
 
AT&T ThreatTraq is a roundtable discussion of current cyber security trends, observations, and recommendations from AT&T Security's Malware team. The full video of each discussion is available from the AT&T Tech Channel at http://techchannel.att.com/attthreattraq
 
A gumbo of insights and information about Data Protection
 
The South Carolina Business Review, with host Mike Switzer, focuses on news from South Carolina's business community with interviews of many small business owners and business leaders from around the state. South Carolina's nonprofits, including its colleges and universities are also regularly featured on the program, as well as many of the state's small business support organizations. The program is a production of South Carolina Public Radio.
 
A podcast for people who use English as a Second or Foreign Language (ESL/EFL) in their work environment and want to improve their overall language skills. In each episode, hosts Skip Montreux, Dez Morgan, and Samantha Vega discuss Business news making headlines around the world. Through their discussions, Skip, Dez and Samantha introduce English vocabulary & phrases related to business, review grammar, and identify cultural differences found in International business situations. An excellen ...
 
Here to solve your technology needs, while treating you like a person in the process.
 
At Cloudera, we believe data can make the impossible possible.The world’s leading organizations choose Cloudera to transform their businesses, improve lives, and advance human achievement. All through the power of data.
 
T
TechNation360
Daily+
 
 
B
B2B Nation: IT
Daily+
 
A podcast for IT professionals with expert opinions & advice on the most important topics in IT to help you evolve and push your information technology strategy forward.
 
Loading …
show series
 
In today’s podcast, we hear of a small flare in cyber conflict between India and Pakistan. Australian political parties as well as Parliament subjected to attempted cyberattacks. A new strain of malware is being distributed through messaging apps. Microsoft pulls cryptojacking Windows 10 apps from its store. Britain’s NCSC is rumored to have co ...…
 
OT, IoT and systems targeted by cryptominers - those are among the main network security concerns of Greg Young, VP of cybersecurity at Trend Micro. Which technology trends should security leaders follow to improve network security? Young shares his insight.
 
OT, IoT and systems targeted by cryptominers - those are among the main network security concerns of Greg Young, VP of cybersecurity at Trend Micro. Which technology trends should security leaders follow to improve network security? Young shares his insight.
 
Greg Silberman: Keep Ya Nose Out My Business Are the neighbors watching? Is the mail man watching me And I don't feel safe anymore Oh what a mess! I wonder who's watching me now Who? The I.R.S.?!?! -- Rockwell, Somebody’s Watching Me, 1984 Privacy is fundamentally about the ethical and responsible handling of personal data - from initial collec ...…
 
A daily look at the relevant information security news from overnight.Episode 87 - 19 February, 2019Google Earth maps military bases - https://www.zdnet.com/article/google-maps-update-accidentally-reveals-secret-military-sites/Russians are the fastest hackers - https://www.wired.com/story/russian-hackers-speed-intrusion-breach/China and Iran ra ...…
 
There are many factors involved in achieving financial independence, however our next guest says that a critical one is also one of the most misunderstood. He calls it the “Great Misunderstanding of Risk”. Mike Switzer interviews Bryan Ballentine, a certified financial planner in Greenville, SC.By scbr@scpublicradio.org (Mike Switzer).
 
In today’s chat, Selena Templeton and Marco Ciappelli connect with Jim Gordon, GM of Security Ecosystem Strategy & Development at Intel, to get a sneak peek into what he'll be discussing at Solving Our Cybersecurity Talent Shortage during RSA Conference 2019.All our RSA Conference coverage, including these chats on the road, is made possible by ...…
 
In today’s chat, Selena and I connect with Kyla Guru, 16-year-old founder and CEO of Bits N’ Bytes Cybersecurity Education, a non-profit organization dedicated to educating and equipping citizens — young and old — with the cybersecurity skills needed to help prevent future cyber-attacks.During our chat, Kyla shares with us her mission to democr ...…
 
As the use of artificial intelligence tools and robotics continues to grow, it's crucial for organizations to assess the potential security risks posed, says attorney Stephen Wu, who reviews key issues in an interview.
 
As the use of artificial intelligence tools and robotics continues to grow, it's crucial for organizations to assess the potential security risks posed, says attorney Stephen Wu, who reviews key issues in an interview.
 
A daily look at the relevant information security news from overnight.Episode 86 - 18 February, 2019More batched records hit dark web - https://www.zdnet.com/article/127-million-user-records-from-8-companies-put-up-for-sale-on-the-dark-web/AdventHealth records breached - https://healthitsecurity.com/news/42000-adventhealth-patients-impacted-in- ...…
 
This week, we welcome back Levi Gundert, Recorded Future’s vice president of intelligence and risk. In a wide-ranging conversation, we discuss Insikt Group’s research into APT10, the challenges of authentication at scale, the importance of framing communication in terms of quantifying risk, and what it means to be an ethical hacker. Levi also s ...…
 
CenturyLink suffered a major outage in December 2018 that affected services in large swathes of North America. On today's Tech Bytes episode, sponsored by ThousandEyes, we look at the causes of the outage and lessons learned, including the importance of ISP redundancy and why management networks are critical. The post Tech Bytes: Thousand Eyes ...…
 
Today's Network Break covers a brand new network OS from SnapRoute, new features in VMware's SD-WAN appliances, Carbonite's acquisition of Webroot, Cisco and Arista financial results, and more tech news. The post Network Break 222: SnapRoute Launches Network OS; Carbonite Buys Webroot appeared first on Packet Pushers.…
 
Today's Network Break covers a brand new network OS from SnapRoute, new features in VMware's SD-WAN appliances, Carbonite's acquisition of Webroot, Cisco and Arista financial results, and more tech news. The post Network Break 222: SnapRoute Launches Network OS; Carbonite Buys Webroot appeared first on Packet Pushers.…
 
John Rohe, CEO of HyCap Consulting, gives his advice on how to ensure a successful project rollout This issue (18:32); The #1 reason commercial integrations fail within an organization How to choose the assessment method that best fits your organization Adapting your project strategy amid changing needs and circumstances The benefits of holding ...…
 
A weekly update of the entrepreneurial activity in South Carolina. Mike Switzer interviews John Warner, co-founder of Accessible Diagnostics and the Swampfox Facebook page, based in Greenville, S.C.By scbr@scpublicradio.org (Mike Switzer).
 
The primary goal with this podcast discussion (which also available in webcast form) is to highlight the value of a SOAR (security orchestration automation and response) platform/model in order to help companies figure out how best to operationalize it as part of their security management programs.The key point here is “operationalize” … who sh ...…
 
Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil & gas facilities, NGOs, telecoms and IT firms. Al Cooley is director of product management at Symantec, and he joins us to share their findings. The origina ...…
 
Prevention Is Always Better Than Reaction When It Comes To Safety. Cybersecurity Is No Different, But What To Do If You Become A Victim Of Cybercrime?Guest: Kristin Judge | CEO/President of the Cybercrime Support NetworkHost: Marco CiappelliIt seems to me that we have a long way to go before the general population and small businesses become aw ...…
 
In today’s chat Selena and I connect with Ryan Louie, a board-certified Psychiatrist focusing on the psychiatry of entrepreneurship, and the mental health impact of cybersecurity. I was thrilled to meet Ryan during the recent Data Privacy Day event in San Francisco, where he told me about the work he is doing and also about the interactive sess ...…
 
In today’s podcast, we hear that GandCrab has been scuttling through unpatched holes. Independent testing as an alternative to banning specific vendors as security risks. Big Tech gets some Congressional scrutiny over content moderation. Facebook takes down inauthentic accounts working to influence the Moldovan elections. The Federal Trade Comm ...…
 
A daily look at the relevant information security news from overnight.Episode 85 - 15 February, 2019GandCrab hits via remote - https://www.zdnet.com/article/gandcrab-ransomware-gang-infects-customers-of-remote-it-support-firms/Emotet continues to evolve - https://threatpost.com/emotet-evasion-tactic-xml/141862/Proof of oncept for Intel flaw - h ...…
 
Business email compromise attacks are becoming far more common in the healthcare sector, says Rod Piechowski of the Healthcare Information and Management Systems Society, who discusses promising technologies to help address the threat.
 
Thousands of Android apps are tracking you, and there's not much you can do about it. Amazon and Google want to collect even more of your data through their smart speakers. A new viral internet challenge wants kids to go missing. A new study looks at the effect of video games on kids. A piece of artwork generated by artificial intelligence is g ...…
 
As you’ve heard us report recently, access to venture capital in our state is growing. And, as evidenced by our next guest’s organization, some of that funding is home grown. Mike Switzer interviews Agie Sundaram, CEO of SPAN Enterprises and co-founder of SecondBrick Ventures in Rock Hill, SC. SecondBrick is now part of the VentureSouth network.…
 
On this episode of the CyberSpeak with InfoSec Institute podcast, Kathleen Hyde, chair of cybersecurity programs at Champlain College online, discusses a topic that's a big part of InfoSec Institute's initiative for the coming years — finding new and innovative ways of closing the cyber skills gap.In the podcast, Hyde and host Chris Sienko disc ...…
 
The latest edition of the ISMG Security Report highlights how thieves can use "deep fake" photos in an attempt to steal cryptocurrency. Also featured: A discussion of the implications of "data gravity" and an analysis of whether the era of mega-breaches is ending.
 
The latest edition of the ISMG Security Report highlights how thieves can use "deep fake" photos in an attempt to steal cryptocurrency. Also featured: A discussion of the implications of "data gravity" and an analysis of whether the era of mega-breaches is ending.
 
In today’s podcast we hear that US prosecutors have unsealed the indictment of a former US Air Force counterintelligence specialist on charges she conspired to commit espionage on behalf of Iran. The US Treasury Department announces further sanctions on Iranian individuals and one organization named in that indictment. Two alleged members of Ap ...…
 
A daily look at the relevant information security news from overnight.Episode 84 - 14 February, 2019Credit agencies data exposed - https://www.scmagazine.com/home/security-news/image-i-nation-supply-chain-breach-exposes-data-of-major-credit-agencies-customers/Bank completely shuts down after attack - https://www.securityweek.com/cyber-attack-ma ...…
 
To celebrate Valentine's Day, we are sharing McKay's dating fails from college and high school. We also fangirl about our interview with Will. Next, we interview James English from Pattern and discuss side hustles.
 
Indiana University Health is evaluating the use of blockchain in two areas to improve healthcare information security, Mitch Parker, CISO, says in an interview at the HIMSS19 conference. He sizes up the potential risks and benefits.
 
Indiana University Health is evaluating the use of blockchain in two areas to improve healthcare information security, Mitch Parker, CISO, says in an interview at the HIMSS19 conference. He sizes up the potential risks and benefits.
 
While the solar industry has faced many challenges over the years, our next guest’s company has flourished, reaching the ranking of 2018’s fastest growing company in the large company category from SCBizNews . Mike Switzer interviews Steffanie Dohn, director of government relations with Southern Current in Charleston, SC.…
 
Is two factor authentication such a pain in the rear end that it's costing the economy millions? Do you feel safe having a Google Nest in your home? And don't get caught by a catfisher this Valentine's Day. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Clul ...…
 
Is two factor authentication such a pain in the rear end that it's costing the economy millions? Do you feel safe having a Google Nest in your home? And don't get caught by a catfisher this Valentine's Day. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Clul ...…
 
Conversations At The Intersection Of IT Security And SocietyGuests Georgia Weidman | Larry WhitesideHosts Selena Templeton | Sean Martin | Marco CiappelliThis episode:Bringing representation to the underrepresented. Let’s talk about mentors.By definition a mentor is a wise or trusted adviser or guide, a counselor or a teacher.The origin of the ...…
 
In today’s episode, I am joined by two InfoSec veterans who have held a variety of leadership roles and are now leading and managing a fund at ClearSky Ventures — Jay Leek and Patrick Heim.I am thrilled to get a slice of their time to ask some hard questions and to get a view of their world as they try to figure our which investments to make, w ...…
 
Proposed rules released this week by the Department of Health and Human Services aim to define and discourage inappropriate blocking of the secure sharing of health information, Elise Sweeney Anthony of the Office of the National Coordinator for Health IT explains in an interview at the HIMSS19 conference.…
 
In today’s podcast, we hear that China has denied involvement in the Australian Parliament hack. Patch Tuesday notes. A new strain of Shlayer malware is out. A look at GreyEnergy. Reactions to the destructive VFEmail attack. And thoughts on St. Valentine’s Day, with advice, admonition, and an excursus on credential-stuffing and holiday doughnut ...…
 
In today’s chat, Selena Templeton and Marco Ciappelli connect with Elaine Marino, Founder & CEO of Equili, to get a sneak peek into what she'll be discussing at Solving Our Cybersecurity Talent Shortage during RSA Conference 2019.All our RSA Conference coverage, including these chats on the road, is made possible by the generosity of our sponso ...…
 
The 2019 RSA Conference offers an opportunity to learn about new concepts across all aspects of cybersecurity. One such area is "data gravity," which will be the topic of a session featuring Microsoft's Diana Kelley and Sian John. They discuss the concept in a joint interview.
 
The 2019 RSA Conference offers an opportunity to learn about new concepts across all aspects of cybersecurity. One such area is "data gravity," which will be the topic of a session featuring Microsoft's Diana Kelley and Sian John. They discuss the concept in a joint interview.
 
A daily look at the relevant information security news from overnight.Episode 83 - 13 February, 2019New Trojan uses anti-virus - https://www.zdnet.com/article/this-new-malware-exploits-bugs-in-antivirus-software-to-steal-your-data/Critical Siemens flaw - https://threatpost.com/siemens-critical-remote-code-execution/141768/Phishing with long lin ...…
 
As more hospitals seek new methods for collecting payments from patients, they face the challenge of securing those transactions, says Dan Berger of AxiaMed, who describes HIPAA and PCI compliance issues in an interview at the HIMSS19 conference.
 
The next BriefingsDirect hybrid IT management strategies interview explores new ways that businesses should procure and consume IT-as-a-service. We’ll now hear from an IT industry analyst on why... Learn more about BriefingsDirect, Dana Gardner's blog, and other Interarbor Solutions services by visiting www.interarbor-solutions.com.…
 
The good news for security leaders: Because of SSL/TLS, nearly every bit of web data in transit is now encrypted. The bad news: Threat actors are now masking their attacks inside of encrypted traffic. Kevin Stewart of F5 Networks explains why network visibility is not enough to detect these attacks.
 
The good news for security leaders: Because of SSL/TLS, nearly every bit of web data in transit is now encrypted. The bad news: Threat actors are now masking their attacks inside of encrypted traffic. Kevin Stewart of F5 Networks explains why network visibility is not enough to detect these attacks.
 
Google login Twitter login Classic login