Deception, influence, and social engineering in the world of cyber crime.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. If you want more stories like Click Her ...
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
Your occasional dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
Hosted by former covert CIA intelligence officer Andrew Bustamante, Everyday Espionage gives you practical, powerful spy skills you can use to get ahead in your everyday life.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
B
Black Hills Information Security


1
Black Hills Information Security
Black Hills Information Security
Penetration testing for Fortune 50 companies since 2008.
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
D
Digital Forensic Survival Podcast


1
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
Hackers
T
The Azure Security Podcast


1
The Azure Security Podcast
Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2022 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec


1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
Just two people trying to do IT and Security the right way.
The State and Popular Culture
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
T
To The Point - Cybersecurity


1
To The Point - Cybersecurity
Forcepoint | Global Cybersecurity Leader | Security. Simplified.
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government and world at large.
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Produced with the support of Policy Forum. Hosted on Acast. See acast.com/privacy for more information.
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
B
Brakeing Down Security Podcast


1
Brakeing Down Security Podcast
Bryan Brake, Amanda Berlin, Brian Boettcher
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
A podcast about security for developers, covering tools and best practices.
A Podcast on Computer Security & Privacy for Non-Techies
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Larry and Kerry talk about parenting issues during Covid-19 isolation period
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
S
ShadowTalk Threat Intelligence by Digital Shadows


1
ShadowTalk Threat Intelligence by Digital Shadows
Digital Shadows
Digital Shadows' ShadowTalk discusses the latest threat intelligence and cybersecurity news with our panel of threat intelligence experts, security engineers, security researchers, and more.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
ISC StormCast for Monday, February 6th, 2023
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26
Assemblyline as a Malware Analysis Sandbox https://isc.sans.edu/diary/Assemblyline%20as%20a%20Malware%20Analysis%20Sandbox/29510 GoAnywhere MFT zero-day Exploited https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/ Ransomware targeting VMware ESXi https://blog.ovhcloud.com/ransomware-targeting-vmware-e…
By Jerry Bell and Andrew Kalat
C
Cyber Security Weekly Podcast


DigiCert, Inc., a leading global provider of digital trust, have releases DigiCert® Trust Lifecycle Manager, a comprehensive digital trust solution unifying CA-agnostic certificate management and public key infrastructure (PKI) services. Trust Lifecycle Manager tightly integrates with DigiCert’s best-in-class public trust issuance for a full-stack …
C
CyberWire Daily


1
Yamsin Abdi: Find your community. [Security Engineer] [Career Notes]
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58
Yasmin Abdi, a Security Engineering Manager at Snapchat and the CEO and Founder of NoHack, sits down to share her story on how she got to be in her amazing current roles. From a young age, Yasmin was fascinated by the overlap of cybersecurity and crime and law. In her time in college, she was able to intern at big tech companies like Snapchat, Goog…
B
Black Hills Information Security


1
Talkin’ About Infosec News – 2/3/2023
1:00:55
1:00:55
Play later
Play later
Lists
Like
Liked
1:00:55
00:00 – PreShow Banter™ — Woke Up Like This03:20 – BHIS – Talkin’ Bout [infosec] News 2023-01-3005:04 – Story # 1: GoTo says hackers stole customers’ backups and encryption keyhttps://www.bleepingcomputer.com/news/security/goto-says-hackers-stole-customers-backups-and-encryption-key/09:48 […] The post Talkin’ About Infosec News – 2/3/2023 appeared …
C
Cyber Security Headlines


1
Week in Review: Charter Communications breach, ChatGPT grows stronger, Microsoft verifies phishers
22:23
22:23
Play later
Play later
Lists
Like
Liked
22:23
Link to Blog Post This week’s Cyber Security Headlines - Week in Review, January 30-February 3, is hosted by Rich Stroffolino with our guest, David Nolan, VP, Enterprise Risk & Chief Information Security Officer – Aaron’s Thanks to our show sponsor, Hunters Hunters is a complete SOC platform, purpose built for your Security Operations team. Hunters…
P
Paul's Security Weekly


1
SWN #271 - Chat-Gpt Seinfeld, Qnap, Google Fi, Headcrab, Banner, Goodrx, Oracle, & Goanywhere
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03
This week in the Security News Doug Chides: Chat-GPT, QNAP, Google FI, REDIS, Headcrab, Banner, GoodRx, Oracle, GoAnywhere, & more! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securitywee…
C
Cybersecurity Today


1
Cyber Security Today, Week in Review for Friday, February 3, 2023
28:26
28:26
Play later
Play later
Lists
Like
Liked
28:26
This episode features a discussion about a ransomware attack on a US school board, new data-wiping malware, a controversy the over KeePass password manager and the take-down of the Hive ransomware gang's IT infrastructureBy ITWC
W
WIRED Security: News, Advice, and More


1
Enter the Hunter Satellites Preparing for Space War
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42
True Anomaly, a startup backed by US senator JD Vance’s VC firm, plans to launch prototype pursuit satellites on a SpaceX flight later this year.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
ISC StormCast for Friday, February 3rd, 2023
4:58
4:58
Play later
Play later
Lists
Like
Liked
4:58
Rotating Packet Captures with pfSense https://isc.sans.edu/diary/Rotating%20Packet%20Captures%20with%20pfSense/29500 BEC Group Incorporates Secondary Impersonated Personas https://intelligence.abnormalsecurity.com/blog/firebrick-ostrich-third-party-reconnaissance-attacks MalVirt .Net Virtualization Thrives in Malvertising Attacks https://www.sentin…
T
The Azure Security Podcast


1
Episode 69: Secured Supply Chain and Software Bill of Materials (SBOM)
27:20
27:20
Play later
Play later
Lists
Like
Liked
27:20
In this episode, Michael and Mark talk to Adrian Diglio about Software Bill of Materials and its role in helping secure the software supply chain. We also have news items about SQL Server, Azure SQL DB, Azure Database for PostgreSQL, Azure Database for MySQL and Application Secure Groups and Private Endpoints. Mark goes over MCRA, Immutable Laws of…
N
Naked Security Podcast


1
S3 Ep120: When dud crypto simply won't let go
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29
The mighty CPU that wasn't. Hive ransomware takedown. Dutch data crime suspect busted. Samba finally gets rid of MD5. GitHub admits to an intrusion. Storing passwords securely.https://nakedsecurity.sophos.com/hive-ransomware-servers-shut-downhttps://nakedsecurity.sophos.com/dutch-suspect-locked-uphttps://nakedsecurity.sophos.com/serious-security-th…
I
ISACA Podcast


1
ISACA Live_Critical Infrastructure Security
26:48
26:48
Play later
Play later
Lists
Like
Liked
26:48
ISACA's Chris Dimitriadis and the US GAO's Nick Marinos discuss the current state of critical infrastructure security, escalating threats and how to better prepare. For more information check out www.isaca.org/heightened-threatsBy ISACA Podcast
Willie Hicks, Federal Chief Technologist from Dynatrace, sits down to discuss accelerated adoption and use of secure cloud infrastructure and services by the federal government. Ben’s story is on a new academic paper on the terms of service documents provided by different internet providers, and whether they alter Fourth Amendment rights. Dave disc…
T
The National Security Podcast


1
National resilience in a changing world: lessons from Europe
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39
In this episode of the National Security Podcast, Sweden’s Ambassador to Australia His Excellency Mr Pontus Melander and Latvia’s Ambassador to Australia His Excellency Mr Marģers Krams join Dr Will Stoltz in conversation. They discuss how their countries approach building national resilience in response to a range of complex conventional and hybri…
S
Smashing Security


1
ChatGPT and the Minister for Foreign Affairs
52:48
52:48
Play later
Play later
Lists
Like
Liked
52:48
Could a senior Latvian politician really be responsible for scamming hundreds of "mothers-of-two" in the UK? (Probably not, despite Graham's theories...) And should we be getting worried about the AI wonder that is ChatGPT? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham C…
S
Security Management Highlights


1
February 2023: Robbery Recovery, Reputation Risks, and Supply Chain Upsets
32:51
32:51
Play later
Play later
Lists
Like
Liked
32:51
How can security teams help support employees’ mental health and resilience following a major incident, such as a bank robbery? Brian Ishikawa, CPP, from the Bank of Hawaii, walks us through how training, documents, and procedures clear the way for recovery. Michael Gips, CPP, joins the SM Highlights podcast to discuss how reputational issues cross…
S
Security Now (Audio)


1
SN 908: Data Operand Independent Timing - Old Android apps, Kevin Rose, iOS 6.3 and FIDO, Hive hacked
1:44:48
1:44:48
Play later
Play later
Lists
Like
Liked
1:44:48
Android to start blocking old and unsafe apps. Microsoft to block Internet sourced Excel add-ins. An example of saying "no" even when it may hurt. Hacked Wormhole funds on the move. Kevin Rose Hacked. Facebook will be moving more users into E2EE. iOS 6.3 and FIDO. Scan thy Citizenry. The Hive ransomware organization takedown. Errata. Closing the Lo…
On today's episode, we cover a recent Department of Justice operation that resulted in taking down a major ransomware organization. After that, we cover two recent publications from CISA, the first on malicious use of legitimate RRM software and the second giving guidance to K-12 on how to address cybersecurity concerns.…
7
7 Minute Security


1
7MS #557: Better Passive Network Visibility Using Teleseer
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38
Today we're talking about Teleseer, which is an awesome service to give you better network visibility - whether you're on the blue, red or purple team! It all starts with a simple packet capture, and ends with gorgeous visuals and insight into what the heck is on your network and - from a pentester's perspective - delicious vulnerabilities that may…
In this episode, I discuss the latest Privacy & Security news, and present several new OSINT Techniques.Direct support for this podcast comes from our privacy services, online training, and new book for 2023 Open Source Intelligence Techniques (10th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free.…
B
Brakeing Down Security Podcast


1
Layoff discussions, another TMO breach, OneNote Malware, and more!
1:23:04
1:23:04
Play later
Play later
Lists
Like
Liked
1:23:04
Lots of Layoffs (meta, Microsoft, Amazon, Sophos, Alphabet, Google) talk about the future effects of that, did it affect security? Attack surface management is risk management, Breaches and the TSA no-fly list leaked, and more! Full youtube video: https://www.youtube.com/watch?v=1Dgq8FpnWPw Questions and/or potential sub-topics (5 minimum): Layoffs…
Seth and Ken dig into a topic that was raised by a member of our Slack community. The initial half of the show reviews both the risks and dynamic or static review items associated with microservices. This is followed by a discussion that starts by asking the question "what are the must-have security features for a web application?"…
T
The Secure Developer


1
Ep.125 2022 Recap and 2023 Predictions with Guy Podjarny and Simon Maple
1:05:50
1:05:50
Play later
Play later
Lists
Like
Liked
1:05:50
As we look forward into a new year 2023, we wanted to recap some of the most important developments we saw, and conversations we had during 2022. This episode features a look back at the key events and moments from the past twelve months before we share some of the expectations and predictions we have for the year ahead. Simon and Guypo sit down to…
T
To The Point - Cybersecurity


1
StateRAMP: The Easy Button for Security Innovation with Joe Bielawski and Leah McGrath
45:35
45:35
Play later
Play later
Lists
Like
Liked
45:35
Joining us on the podcast this week is Joe Bielawski – founding member of StateRAMP and President of Knowledge Services – as well as StateRamp Executive Director Leah McGrath. If the name sounds somewhat familiar – like FedRAMP – it should because StateRAMP helps to meet the growing need in state and local government to manage third party risk and …
C
Cyber Work


1
ISACA CISM changes: Less focus on management, more on security | Cyber Work Hacks
11:20
11:20
Play later
Play later
Lists
Like
Liked
11:20
Infosec Skills author Leighton Johnson talks about major changes to CISM in 2022. CISM has shifted qualitatively from the “Manager” side of the cert name to the “Security” side. 0:00 - Changes to CISM's focus 2:21 - Why did CISM's focus change? 3:43 - How to study for the new CISM changes 6:47 - Important CISM skills to know 8:28 - Find Leighton Jo…
S
Security Conversations


1
Paul Roberts on wins and losses in the 'right to repair' battle
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32
Episode sponsors: Binarly (https://binarly.io) FwHunt (https://fwhunt.run) SecuRepairs.org co-founder Paul Roberts joins the show to discuss his passion for the right to repair consumer electronic devices, the big-ticket lobbyists working to undermine the movement, and how changing consumer spending patterns are helping to rack up regulatory wins. …
All links and images for this episode can be found on CISO Series. "When the asset discovery market launched, every single company that offered a solution used the line, “You can’t protect what you don’t know.” Everyone agreed with that. Problem is, “what you don’t know” has grown… a lot." Check out this post for the discussion that is the basis of…
S
SECTION 9 Cyber Security


1
How do you roast a server to death? - 258
11:20
11:20
Play later
Play later
Lists
Like
Liked
11:20
Almost roasted our VMware server to death. Don’t do what I did. Enjoy! LINKS 1. VMware Server: Super Micro SYS-E300-9D-8CN8TP 2. Fans: Noctua NF-A4x20 PWM FIND US ON 1. Twitter - DamienHull 2. YouTubeBy SECTION 9