Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Daily update on current cyber security threats
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
The State and Popular Culture
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2023 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
The Liquidmatrix Security Digest Podcast - Information Security News and Commentary from Professionals.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: CDK Blacksuit developments, Criminal nuclear failures. U.S. Kaspersky ban
22:45
22:45
Play later
Play later
Lists
Like
Liked
22:45
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jim Bowie, CISO, Tampa General Hospital Thanks to our show sponsor, Prelude Security When executives ask the question, are we vulnerable to this threat? How long does it take you to get a confident answer? Prelude automatically transform…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MoveIT, Entrust, Fed Reserve, ISPs, Volt Typhoon & More - Chris Wolski - SWN #395
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Liquidmatrix Security Digest Podcast - Episode 7A
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51
Episode 0x7A 4-peat 4-peat! Turns out this is actually habit forming. The weekly venting/ranting is excellent for the spirit! Hope you're able to vent as well. Feel free to scream while listening - it's not weird at all. Upcoming this week... Lots of News Breaches SCADA / Cyber, cyber... etc. finishing it off with DERPs/Mailbag (or Deep Dive) And t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The TeamViewer Breach and a Busy Week for APT29
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07
Dennis Fisher and Lindsey O'Donnell-Welch dig into the news of the TeamViewer corporate breach, attributed to APT29/Midnight Blizzard, and news of more victims from the Microsoft intrusion by the same group earlier this year.By Decipher
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Surprise! The Latest ‘Comprehensive’ US Privacy Bill Is Doomed
10:22
10:22
Play later
Play later
Lists
Like
Liked
10:22
Gutted of civil rights protections by Democrats to woo pro-business Republicans, the American Privacy Rights Act was pulled from a key congressional hearing—and appears unlikely to receive a full vote. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy SpokenLayer
…
continue reading
Overview A look into CISA’s Known Exploited Vulnerability Catalogue is on our minds thisweek, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,Roundcube, the Linux kernel and more. This week in Ubuntu Security Updates 175 unique CVEs addressed [USN-6842-1] gdb vulnerabilities (01:10) 6 CVEs addressed in Xenial ESM (16.04 ESM), …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, June 28, 2024 - Cyber authorities remind developers to switch to memory-safe coding languages
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22
Are attacks cybercrime or hiding espionage? Researchers investigate in this episodeBy Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Risky Biz Soap Box: Why AI shouldn't really change your security controls
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29
This is a sponsored Soap Box edition of the Risky Business podcast. Abhishek Agrawal is the CEO and co-founder of Material Security, an email security company that locks down cloud email archives. Attackers have been raiding mailspools since hacking has existed, and with those mailspools now in the cloud with services like o365 and Google Workspace…
…
continue reading
What Setting Live Traps For Cybercriminals Taught Me About Security https://isc.sans.edu/diary/What%20Setting%20Live%20Traps%20for%20Cybercriminals%20Taught%20Me%20About%20Security%20%5BGuest%20Diary%5D/31038 TeamViewer Compromise https://www.teamviewer.com/en-us/resources/trust-center/statement/ Fortra File Catalyst Vulnerability and PoC https://s…
…
continue reading
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is our sponsored guest, Adam Bateman, CEO, Push Security. The SaaS a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Terrorism and extremism: a present and evolving threat
53:35
53:35
Play later
Play later
Lists
Like
Liked
53:35
Is terrorism becoming a more prevalent threat in Western societies, or are we getting better at identifying potential terrorists and extremists? How are terrorist and extremist groups taking advantage of a new, more connected world to further their objectives? Has there been a shift towards embracing the role of women in both terrorist organisation…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Julian Assange, inside a DDoS attack, and deepfake traumas
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12
Wikileaks's Julian Assange is a free man, deepfakes cause trouble in the playground, and we hear hot takes about ransomware and tales from inside a devastating denial-of-service attack. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, join…
…
continue reading
00:00 - PreShow Banter™ — Life is a Highway 04:28 - BHIS - Talkin’ Bout [infosec] News 2024-06-24 05:30 - Story # 1: Colorado Privacy Act Amended To Include Biometric Data Provisions 14:18 - Story # 2: Scathing report on Medibank cyberattack highlights unenforced MFA 24:30 - Story # 3: CDK suffered another data breach as it was attempting to recove…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 980: The Mixed Blessing of Lousy PRNG - Kaspersky Ban, EU vs. Google's Privacy Sandbox
2:03:44
2:03:44
Play later
Play later
Lists
Like
Liked
2:03:44
Expected follow-up on CVE-2024-30078 From Russia with Love An EU privacy agency complains about Google's Privacy Sandbox? Email @ GRC Security Now SPAM? Orange Tsai needs help! Recall and 3rd Party Leakage Errata The Mixed Blessing of a Crappy PRNG Show Notes - https://www.grc.com/sn/SN-980-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or …
…
continue reading
Tanya Janca (@shehackspurple on X) joins Ken Johnson (@cktricky) and Seth Law (@sethlaw) for a special episode of the Absolute AppSec podcast. Tanya is currently head of education and community at Semgrep, and is a prominent info security commenter and active contributor to improving the industry for everybody through helping spread values of diver…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
1:04:51
1:04:51
Play later
Play later
Lists
Like
Liked
1:04:51
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
https://youtu.be/Pxh2VhwkHrEThis week on the podcast we doscuss two issues from this month's Microsoft patch tuesday that deserve your attention. After that we discuss the recent data theft campain targeting Snowflake customers that has impacted over 100 organizations. We end the episode with an update on the hackers behind the MGM and Caesar's Ent…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
7MS #629: Interview with Stu Musil of Ambient Consulting
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23
Today we have a fun featured interview with my new friend Stu Musil of Ambient Consulting I had a great time talking with Stu about bashing come common misconceptions people have about working with recruiters, plus tackling some frequently asked questions: How do you properly vet a recruiter you don’t know, but who offers a job opportunity you’re i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ep1: The Microsoft Recall debacle, Brad Smith and the CSRB, Apple Private Cloud Compute
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55
Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week. Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 98: Secure Future Initiative and Rust at Microsoft
37:19
37:19
Play later
Play later
Lists
Like
Liked
37:19
In this episode Michael and Gladys talk with guest Dave Weston about Secure Future Initiative and the growing use of the Rust programming language at Microsoft. On the topic of Rust, Michael and Dave nerd out, and we make no apologies! https://aka.ms/azsecpod
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bonus: What AI Means for Security Professionals
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35
What opportunities and risks does artificial intelligence (AI) present to the security profession? In this special episode of SM Highlights, Brendan Howard speaks with two researchers behind Artificial Intelligence and Security: Opportunities and Implications, a report published in 2021 by the ASIS Foundation. Join us to break down the differences …
…
continue reading
In this interview, we speak with Mac Munsayac, Head of Customer Experience at Philippine Airlines, to explore the transformative role of AI in the aviation industry. Mac elaborates on the integration of generative AI and tools to enhance customer interactions by providing personalized, proactive, and frictionless experiences, especially in scenario…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Encore: Rosa Smothers: Secure the planet. [Intelligence] [Career Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17
Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spoc…
…
continue reading