show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
Mostly Security

Jon King and Eric Wuehler

Unsubscribe
Unsubscribe
Weekly
 
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
  continue reading
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Artwork
 
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
  continue reading
 
Artwork

1
ITSPmagazine Podcasts

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

Unsubscribe
Unsubscribe
Monthly
 
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
Artwork
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Artwork

1
Technology Now

Hewlett Packard Enterprise

Unsubscribe
Unsubscribe
Weekly
 
HPE news. Tech insights. World-class innovations. We take you straight to the source — interviewing tech's foremost thought leaders and change-makers that are propelling businesses and industries forward.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with CyberRes, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
  continue reading
 
Artwork
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
Artwork

1
The Register Kettle

Chris Williams, The Register, Nicole Hemsoth Prickett, Tobias Mann, Iain Thomson, Brandon Vigliarolo, Tom Claburn

Unsubscribe
Unsubscribe
Monthly+
 
What's a kettle, you ask? Why a group of vultures in flight, of course. News, insights, analysis, and overall chatter around what's happening in the broader world of IT. With hosts Iain Thomson, Chris Williams, Brandon Vigliarolo, Nicole Hemsoth Prickett, and more....
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
  continue reading
 
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Artwork

1
The Watchers

Sentinel Blue

Unsubscribe
Unsubscribe
Monthly+
 
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
  continue reading
 
Artwork
 
We're a couple of geeks discussing whatever comes to mind. We may talk about systems administration, public speaking, conventions, security news,...it's hard to tell what we're going to rant about next.
  continue reading
 
Leo Laporte brings some of the most interesting personalities in technology together to talk about the most important issues. Fun, relaxed, informative and always entertaining, count on TWiT for the best tech podcasts in the world.
  continue reading
 
Loading …
show series
 
In this bonus special episode of the Technology and Security podcast, host Dr Miah Hammond-Errey was joined in conversation by Dr. Simon Longstaff and Major General Paul Symon. It is a lightly edited panel conversation about ethics, technology and intelligence held at the ethics Centre in Sydney in February this year. Ostensibly to launch Miah’s ne…
  continue reading
 
At War with Women: Military Humanitarianism and Imperial Feminism in an Era of Permanent War (Cornell University Press, 2023) by Jennifer Greenburg reveals how post-9/11 politics of gender and development have transformed US military power. In the mid-2000s, the US military used development as a weapon as it revived counterinsurgency in Iraq and Af…
  continue reading
 
Cybersecurity 2025: Predictions, Challenges, and AI Impacts Welcome to Cybersecurity Today with your host, Jim Love! In this special episode, our expert panel looks ahead to 2025, discussing potential cybersecurity threats and emerging themes. Featuring Laura Payne from White Tuque, Daina Proctor from IBM, and David Shipley, CEO and culture critic …
  continue reading
 
Navigating AI's impact on work, the rise of transnational threats, a grim new reality in air travel, and how to harness the chaos of 2025 for personal and professional growth. Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiess…
  continue reading
 
Andrea Jones-Rooy is a data scientist, a standup comedian, and a circus performer. Andrea delves into the realms of data science, its significance, and how it is often misunderstood in mainstream narratives. Andrea begins by reflecting on their journey to becoming a data scientist. Andrea was a professor of data science at NYU Center for […] The po…
  continue reading
 
Coming into 2025, we have six flights of SpaceX's Starship behind us, with a possibility for as many as 25 tests supported by the FAA license for this year. This is also the year we need to see an orbital test, payloads carried, orbital refueling, and hopefully catches of both the Booster and Ship, and progress toward an uncrewed test landing on th…
  continue reading
 
t's that time of the year again and the tech world heads to Las Vegas for the Consumer Electronics Show. It's been a bit subdued this year, since Trump's tariff plans could drastically raise the cost of hardware from China and elsewhere, but the usual suspects unveiled this year's kit. Chip vendors and laptop slingers have been out in force hoping …
  continue reading
 
US Supreme Court oral arguments on TikTok ban begin, The Linux Foundation backs Chromium support, Automattic reduces contributions to WordPress core project. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what you see you can support the s…
  continue reading
 
🚀 Kickstart 2025 with Cybersecurity Resolutions! 🔐 In our latest podcast episode, Todd and Jonathan discuss crucial strategies for a secure year ahead. Tune in for more insights and make this year your most secure yet! 🎧✨ #Cybersecurity #AI #Secure2025 Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://b…
  continue reading
 
Cybersecurity Alert: Free VPN Risks, Packers' Data Breach, and SonicWall Vulnerability In this episode, host Jim Love delves into critical cybersecurity issues including the hidden dangers of free VPNs, a payment skimmer attack on the Green Bay Packers’ online pro shop, and a severe vulnerability in SonicWall’s SonicOS firmware. Learn why 90% of fr…
  continue reading
 
Bret and Nirmal reunite for their traditional annual Holiday Special episode of breaking down the most significant developments in cloud native from 2024 and sharing predictions for 2025. 💥 This episode is brought to you by our valued sponsor and friends at Aikido!💥 Aikido is a no-nonse platform that helps developers get security done. It consolida…
  continue reading
 
This week on Tech News Weekly, host Mikah Sargent is joined by guest co-host Dan Moren to discuss Siri privacy concerns and how Apple could leverage AI to improve the user experience. Jason Hiner of ZDNET.com reports on CES 2025 on the latest TV displays, NVIDIA's AI innovations, and more. Then Imran Ahmed, CEO of the Center for Countering Digital …
  continue reading
 
Meta agrees to offer eBay listings in Facebook Marketplace, Apple denies using Siri recordings for advertising, is Radio Shack… back? MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what you see you can support the show on Patreon, Thank yo…
  continue reading
 
New Year, New Role: 3 Key Strategies for Cyber Leaders Listen to the latest Agent of Influence episode with Bindi Davé, Deputy CISO at DigiCert, as she discusses the Golden Triangle approach when entering a new company, focusing on asset discovery, defining acceptable risk, and fostering a comprehensive cybersecurity culture. + + + Find more episod…
  continue reading
 
How can states use military force to achieve their political aims without triggering a catastrophic nuclear war? Among the states facing this dilemma of fighting limited wars, only China has given information-age weapons such a prominent role. While other countries have preferred the traditional options of threatening to use nuclear weapons or fiel…
  continue reading
 
The How We Need Now: A Capacity Agenda for 2025: The how we need now: a capacity agenda for 2025 - Niskanen Center Jennifer Pahlka Substack: Eating Policy | Jennifer Pahlka | Substack REALIGNMENT NEWSLETTER: https://therealignment.substack.com/ PURCHASE BOOKS AT OUR BOOKSHOP: https://bookshop.org/shop/therealignment Email Us: realignmentpod@gmail.c…
  continue reading
 
In this episode we are taking a behind-the-scenes look at connectivity in one of the most exciting and immersive sporting organizations in the world: Tottenham Hotspur FC. The Tottenham Hotspur Stadium, opened in 2019, has a capacity of almost 63,000 people - and is popular not just for matches, but events and conferences too. A modern, huge capaci…
  continue reading
 
Meta is ending its fact-checking program in favor of a 'community notes' system similar to X (30+) kottke.org: "oh shit new logo just dropped" Masnick: The Good, The Bad, And The Stupid In Meta's New Content Moderation Policies Social-Media Companies Decide Content Moderation Is Trending Down I watched the Nvidia keynote; can summarize -jj The Bitt…
  continue reading
 
The Honey tool has been exposed as a scam, after dozens of YouTube influencers heavily promoted it. Honey was supposed to save online shoppers money by finding discount codes, but how could it make money doing that? By stealing from its own advertisers, of course! Find out how Honey did it, how they got exposed, and what the future holds for Honey'…
  continue reading
 
We heard you missed us. We're back. Windows Microsoft declares 2025 the "year of the Windows 11 PC refresh." As likely as "year of the Linux desktop" The theory: Windows 10 EOL, AI PCs, lingering security fears from CrowdStrike The issue: Windows 10 has 63 usage share right now. At this point in time, Windows 7 had only 25 percent usage share (and …
  continue reading
 
Samsung’s Subscription Club expands beyond Korea, Google announces local control on Matter devices, Microsoft releases its Phi-4 14-billion parameter AI model. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what you see you can support the…
  continue reading
 
In the shadow of the Cold War, whispers from the cosmos fueled an unlikely alliance between the US and USSR. The search for extraterrestrial intelligence (or SETI) emerged as a foundational field of radio astronomy characterized by an unusual level of international collaboration—but SETI’s use of signals intelligence technology also served military…
  continue reading
 
Cybersecurity Updates: New US Cyber Trust Mark & Rising Threats In this episode of Cyber Security Today, host Jim Love discusses the launch of the US Cyber Trust Mark, a new cybersecurity safety label for smart devices. The episode also covers increasing Mac OS attacks by North Korean hackers, including the discovery of the Spectral Blur backdoor, …
  continue reading
 
The consequences of Internet content restriction. The measured risks of 3rd-party browser extensions. The consequences of SonicWall's unpatched 9.8 firewall severity. The incredible number of still-unencrypted email servers. SonicWall vulnerability patching Shadowserver Foundation & eMail Encryption Salt Typhoon Evicted HIPAA gets a long-needed cyb…
  continue reading
 
The consequences of Internet content restriction. The measured risks of 3rd-party browser extensions. The consequences of SonicWall's unpatched 9.8 firewall severity. The incredible number of still-unencrypted email servers. SonicWall vulnerability patching Shadowserver Foundation & eMail Encryption Salt Typhoon Evicted HIPAA gets a long-needed cyb…
  continue reading
 
The consequences of Internet content restriction. The measured risks of 3rd-party browser extensions. The consequences of SonicWall's unpatched 9.8 firewall severity. The incredible number of still-unencrypted email servers. SonicWall vulnerability patching Shadowserver Foundation & eMail Encryption Salt Typhoon Evicted HIPAA gets a long-needed cyb…
  continue reading
 
The MacBreak Weekly crew celebrates the 25th anniversary of Mac OS X, discusses Apple's $95 million settlement over Siri privacy concerns, and shares their thoughts on new gaming capabilities coming to the Vision Pro headset. The hosts also debate the future of Google search in light of the US government's antitrust case and touch on the possibilit…
  continue reading
 
In this episode of Reimagining Cyber, host Rob Aragao welcomes Dr. Andrew Reeves, a cyber psychology expert from the University of New South Wales Institute for Cybersecurity. They discuss Andrew's groundbreaking national study on mental well-being in the cybersecurity sector and the high burnout rates among cybersecurity professionals. Dr. Reeves …
  continue reading
 
Bart, Norma and Voretaq discuss radiation and kitchen decor, drug development costs vs. subsidies from taxpayers, the kitten likes getting attention before having to go to the vet for surgery, and Tesla vehicles are remotely controlled and spy on their drivers...but don't worry, it's only used for GOOD THINGS by someone who may possibly very likely…
  continue reading
 
Meta will phase in community notes to replace third-party fact-checking, Dell changes its laptop branding to Dell, Dell Pro, and Dell Pro Max, and Samsung announced its next Galaxy Unpacked event will be held at 1 PM Eastern in San Jose, California, on January 22. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all …
  continue reading
 
The prevalence of ransomware and the security concerns associated with AI have made the role of cybersecurity professionals vital for enterprise success. The complex security landscape can make cybersecurity jobs stressful, but enterprises can take steps to retain cybersecurity talent and ensure enterprise assets are protected. In this podcast, Jus…
  continue reading
 
Guest: Debra Benton, President, Benton Management Resources Website: https://www.debrabenton.com/ LinkedIn: https://www.linkedin.com/in/debrabenton/ Twitter: https://twitter.com/debrabenton Facebook: https://www.facebook.com/DebraBentonManagement Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Yabing Wang, VP and CISO, Justworks. In this episode: Building a path to action Cracking the EOL conundrum The burning platform question…
  continue reading
 
All appsec teams need quality tools and all developers benefit from appsec guidance that's focused on meaningful results. Greg Anderson shares his experience in bringing the OWASP DefectDojo project to life and maintaining its value for over a decade. He reminds us that there are tons of appsec teams with low budgets and few members that need tools…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play