show episodes
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Software Defined Talk

Software Defined Talk LLC

Unsubscribe
Unsubscribe
Weekly
 
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
  continue reading
 
Artwork
 
If you’re looking to understand the business of cybersecurity, then Business Security Weekly is your show! Matt Alderman, Jason Albuquerque, and Ben Carr cover cybersecurity for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your cybersecurity program, solve real problems, learn leadership ...
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema and John Kinsella on a journey through modern cybersecurity practices for applications, clouds, containers, and more.
  continue reading
 
Artwork

1
Legacy Code Rocks

Andrea Goulet and M. Scott Ford

Unsubscribe
Unsubscribe
Monthly
 
Legacy Code Rocks explores the world of modernizing existing software applications. Hosts Andrea Goulet and M. Scott Ford of Corgibytes are out to change the way you think about legacy code. If you’re like a lot of people, when you hear the words “legacy code” it conjures up images of big mainframes and archaic punch card machines. While that’s true — it only tells a small part of the story. The truth is, the code you leave behind is your legacy, so let's make it a good one.
  continue reading
 
Twice a week, this podcast will take you on a smart, direct, sometimes scary, sometimes profane, sometimes hilarious tour of the inner workings of American power and of the impact of our leaders and their policies on our standing in the world. Hosted by noted author and commentator David Rothkopf and featuring regulars Rosa Brooks of Georgetown Law School, Kori Schake of Stanford University and Ed Luce of the Financial Times, the program will be the lively, smart dinner table conversation on ...
  continue reading
 
Artwork
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

Unsubscribe
Unsubscribe
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
Artwork
 
If you’re looking to understand the business of cybersecurity, then Business Security Weekly is your show! Matt Alderman, Jason Albuquerque, and Ben Carr cover cybersecurity for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your cybersecurity program, solve real problems, learn leadership ...
  continue reading
 
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
  continue reading
 
Artwork
 
Listen to our daily radio program, Sekulow for issues that matter most to you - national security, protecting America's families, and protecting human life. The reports are brought to you by the American Center for Law & Justice (ACLJ), a nonprofit organization specializing in constitutional law and based in Washington, D.C. You can learn more about our work by visiting our website at www.aclj.org.
  continue reading
 
AM is Australia's most informative morning current affairs program. With key political interviews and stories about the Australian way of life, AM sets the agenda for the nation’s daily news and current affairs coverage.
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork

1
Connect

Axis Communications

Unsubscribe
Unsubscribe
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
  continue reading
 
This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century.
  continue reading
 
Sharyl Attkisson is a nonpartisan investigative journalist, five-time Emmy Award winner and recipient of the Edward R. Murrow award for investigative reporting. She is the New York Times bestselling author of "The Smear," "Stonewalled," "Slanted," and "Follow the Science." She is managing editor of the Sun. morning national TV news program “Full Measure with Sharyl Attkisson.” Find out why her podcasts and Tedx talks have received many millions of views. Do your own research. Make up your ow ...
  continue reading
 
Spirited discussions of government, politics, and current events without predictable left/right bias. The Smerconish Podcast is for Independent Minds. The Michael Smerconish Program airs live on SiriusXM's POTUS Channel 9AM-12PM ET and replays 9PM-12AM East, Monday-Friday.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
AM

ABC News

Unsubscribe
Unsubscribe
Daily
 
AM is Australia's most informative morning current affairs program. With key political interviews and stories about the Australian way of life, AM sets the agenda for the nation’s daily news and current affairs coverage.
  continue reading
 
A podcast about developer tools and the people who make them. Join us as we embark on a journey to explore modern developer tooling and interview the people who make it possible. We love talking to the creators front-end frameworks (React, Solid, Svelte, Vue, Angular, etc), JavaScript and TypeScript runtimes (Node, Deno, Bun), Languages (Unison, Elixor, Rust, Zig), web tech (WASM, Web Containers, WebGPU, WebGL), database providers (Turso, Planetscale, Supabase, EdgeDB), and platforms (SST, A ...
  continue reading
 
Loading …
show series
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Dennis Pickett, vp, CISO, Westat. In this episode: Not all educat…
  continue reading
 
Arsen Kourinian is a Partner in Mayer Brown’s AI Governance and Cybersecurity & Data Privacy practices. He advises clients on data privacy and AI laws and frameworks. Arsen has published numerous articles regarding nuanced issues in these fields, including a forthcoming book entitled Implementing a Global Artificial Intelligence Governance Program.…
  continue reading
 
Send us a text Can API gateways really be the ultimate shield against cyber threats? Prepare to uncover the secrets of API security as we dissect CISSP Domain 8.5 in this episode of the CISSP Cyber Training Podcast. We'll walk you through practice questions that decode the most common API vulnerabilities and why denial of service isn't always the p…
  continue reading
 
We ask 'chopsticks or fork?' as we tour some of Australia' best country Chinese restaurants, discuss if it's time Australia had a ministry of food, hear about the joys of a medicinal garden, and learn about the history of comfort in a new series by Colin Bisset.By Australian Broadcasting Corporation
  continue reading
 
Donald Trump is a crummy candidate, but he’s certainly not the only example of rot in the Republican Party. With so much of the Trump campaign focused on hate and division, we have to ask: how low can the Republican Party really go? The Washington Post’s Jen Rubin and Words Matter host Norm Ornstein join David Rothkopf for an examination of how far…
  continue reading
 
IPv6 Buzz welcomes back Nick Buraglio, a frequent guest, to discuss RFC 9637. We get into the details of RFC 9637, which describes the new documentation prefix space for IPv6. We also explore the process of how RFCs go from idea to standard in the IETF. (Cue the “I’m Just a Bill” song from Schoolhouse... Read more »…
  continue reading
 
The US government disrupts China’s Raptor Train botnet. A phishing campaign abuses GitHub repositories to distribute malware.Ransomware group Vanilla Tempest targets U.S. healthcare providers.Hackers demand $6 million for stolen airport data. The FCC opens applications for a $200 million cybersecurity grant program. GreyNoise Intelligence tracks my…
  continue reading
 
As Israel conducts one of the most impressive kinetic intelligence operations of our time, former DoD official Alex Plitsas joins Marc to discuss the technical aspects of the operation, and what may come next as Israel “escalate to de-escalate." Also, Alex and Marc review a recent CT conference that discussed the threat landscape, both from externa…
  continue reading
 
In this episode of the Breakeven Brothers podcast, hosts Bennett and Bradley discuss their recent life updates, including Bradley's job offer at ____ and their experiences at various conferences. They delve into the challenges of job searching, the importance of networking, and the evolving landscape of marketing and AI in the tech industry. The co…
  continue reading
 
The Teamsters union just broke a decades-long tradition of presidential endorsements, choosing not to endorse Vice President Kamala Harris or President Donald Trump. How will this lack of labor union support affect the 2024 presidential election polls? The Sekulow team discusses the Teamsters declining to endorse VP Harris, the Federal Reserve cutt…
  continue reading
 
Michael talks to Richard Clarke about the sophisticated attack of exploding pagers by Israel against Hezbollah. And, would Clarke ever return to the White House? Richard A. Clarke served for thirty years in national security policy roles in the US Government, first in the Pentagon, then the State Department, and finally for an unprecedented decade …
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
Send us a text How can we effectively bridge the cybersecurity skills gap and protect sensitive data in the cloud? In this action-packed episode of the CISSP Cyber Training Podcast, we kick things off by analyzing insights from a recent UK international cyber skills conference. We discuss the UK's innovative initiatives to enhance cybersecurity edu…
  continue reading
 
Every day, we post a thought-provoking poll question for you to vote on at Smerconish.com. Michael explains it here to give you some insight behind the question, and then asks you to cast your ballot. Today Michael asks you, Do the communication device attacks, presumably by Israel, make us more or less safe? Listen to him discuss now, then vote, a…
  continue reading
 
At a rally in Michigan this week, Donald Trump unleashed a strange monologue about how we should only build gas-powered cars in the future, because we have lots of gasoline and China doesn’t. Translation: China has a huge lead in electric vehicles, so we shouldn’t even try to compete. Why isn’t all this more central in the presidential race? We cha…
  continue reading
 
A new swing state poll shows Harris in the lead as a major Federal Reserve interest rate cut could give another boost to the vice president. Plus, Springfield, Ohio is rocked by new bomb threats after Trump’s false claim about Haitian migrants eating pets. Also, journalist Connie Chung joins to discuss Barbara Walters, Dan Rather, and more. Learn m…
  continue reading
 
The pager explosions throughout Lebanon shocked the region and the world. As more details come to light, it’s clear that the attack was the result of an extensive and unprecedented Israeli intelligence operation. So how did they do it, and what comes next? Former CIA officer Marc Polymeropoulos and regional expert Kim Ghattas join Kori Schake, Ed L…
  continue reading
 
Exploding pagers in Lebanon are not a cyberattack. Europol leads an international effort to shut down the encrypted communications app Ghost. Microsoft IDs Russian propaganda groups’ disinformation campaigns. California’s Governor signs bills regulating AI in political ads. A multi-step zero-click macOS Calendar vulnerability is documented. A new p…
  continue reading
 
AI is everywhere. So are questions about AI’s value, how it really works, and how it will affect technology. Hannah Foxwell aims to demystify AI via a new conference, AI for the Rest of Us, taking place October 24-25, 2024 in London. Hannah hopes to create a collaborative learning environment. In today’s Day Two DevOps... Read more »…
  continue reading
 
The ACLJ has a major update in its election interference case at the U.S. Supreme Court. We're fighting to ensure all Americans have the right to vote for the candidate of their choice. The Democrat Party had Green Party candidate Jill Stein removed from the Nevada presidential election ballot, so they asked the ACLJ to legally represent them after…
  continue reading
 
Every day, we post a thought-provoking poll question for you to vote on at Smerconish.com. Michael explains it here to give you some insight behind the question, and then asks you to cast your ballot. Today Michael asks you, Which of the following do you wish was never invented? Facebook, Instagram, Smart Phones, Snapchat, The Internet, TikTok, X/T…
  continue reading
 
For the first time, Kamala Harris’ favorability rating has crossed into positive territory in FiveThirtyEight’s latest polling averages. That’s a crucial threshold, as Harris is introducing herself to votes within a highly compressed timetable. But there’s still work to do: Harris has not yet fully rebuilt the coalition that ousted Donald Trump in …
  continue reading
 
Vice President Harris is not holding back, slamming Trump for his divisive rhetoric as Trump and Vance put the blame on the attempted assassination squarely on Harris and Democrats. Plus, investigative reporters uncover the truth about Trump’s finances. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
The US charges a Chinese national for spear-phishing government employees. The feds impose new sanctions on the makers of Predator spyware. Dealing with fake data breaches. Researchers discover a critical vulnerability in Google Cloud Platform. D-Link has patched critical vulnerabilities in three popular wireless router models. Snowflake ups their …
  continue reading
 
The core ideals of America are in peril, and the problem goes beyond just this election cycle. Despite all the doom and gloom, there is a path forward to get the country back on track. PoliticsGirl Leigh McGowan joins David Rothkopf to discuss her new book, A Return to Common Sense, and outline the ways to fix America before we really blow it. Lear…
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
Today on Packet Protector we look at cloud firewall architectures. If you’ve deployed firewalls in the campus or a data center, it’s useful to know that there are differences in the public cloud. We’ll dive into what you need to know, including deployment options, the role of high availability in public cloud, selecting the right... Read more »…
  continue reading
 
From Charlottesville to Springfield, Donald Trump has been spewing language and misinformation that has incited real world violence. How have the candidates been using or abusing language in their campaigns? Norm and Kavita are back to break down this flurry of language in the media and show that words really do matter. Bonus content for members al…
  continue reading
 
In today’s episode, guest Cheryl Connell joins host Keith Parsons to talk about the eduroam Visitor Access (eVA) system. Cheryl explains that eVA is a free add-on for institutions with an existing eduroam setup, allowing them to create temporary usernames and passwords for guests without needing a separate guest network. They discuss the challenges…
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
Loading …

Quick Reference Guide