Best bruce schneier podcasts we could find (Updated May 2018)
Related podcasts: Security Schneier Newsletter Henage Cryptogram Bruce Information Dan Tech Social Sciences Science Bruce Schneier 911 Victims 911 Support 911 Hero 911 Attack Bullying Privacy 911 Software Development  
Bruce schneier public [search 0]
show episodes
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
S
Security Radio
Weekly
 
Welcome to Security Radio.
 
Loading …
show series
 
In this issue: Artificial Intelligence and the Attack/Defense Balance Can Consumers' Online Data Be Protected? from the March 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: Artificial Intelligence and the Attack/Defense Balance Can Consumers' Online Data Be Protected? from the March 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: Ethereum Hack Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers Measuring Vulnerability Rediscovery from the August 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: Ethereum Hack Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers Measuring Vulnerability Rediscovery from the August 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
Wolfgang Goerlich is using encryption frameworks. Show Notes: Wolfgang's blog at jwgoerllich.com Some terms discussed in the podcast just in case you aren't familiar: SQL injection Password cracker (programs that can assist in figuring out a password by enumerating / guessing) OAuth TLS / HTTPS SFTP SecureString in the .NET framework Companies ...…
 
Show notes: Kyle Tyrrell is a retired special forces soldier in the Australian army. He is currently the CEO of Vanguard Global, a security and risk consultancy. He is well versed in global both from a theoretical and a practical level. Kyle talks with Code of Character about how we can better secure ourselves and our families, both at home and ...…
 
In this issue: Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure from the May 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure from the May 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure from the May 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and In ...…
 
In this issue: The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and In ...…
 
In this issue: The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and In ...…
 
In this issue: WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts" from the March 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts" from the March 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts" from the March 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
This week Morris and Sergio discuss Google's announcement of a successful collision attack on the SHA-1 cryptographic hash function. Show Notes Cloudbleed and SHA-1 Collision with Max Burkhardt An excellent discussion of the topic on Software Engineering Daily. Shattered.it The branded marketing site for this research result. The actual paper i ...…
 
Security Guru Bruce Schneier joins Curtis to talk the Wikileaks drop Vault 7.
 
Scott reviews fellow cybersecurity expert Bruce Schneier's book on big data entitled Data and Goliath. What does he think about it?By scott@scottschober.com (Scott Schober).
 
Mike Mimoso talks to Bruce Schneier, CTO of IBM Resilient, at RSA 2017 about the early days of the conference, his campaign for IoT regulation, and how the technical community needs to get involved with policy.By chris@threatpost.com (Mike Mimoso, Chris Brook).
 
In this issue: Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things from the February 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things from the February 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
In this issue: Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things from the February 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
Or you could just use noseprints Heartbeat Could Be Used as Password to Access Electronic Health Records Bruce Schneier says: My guess is that there isn't nearly enough entropy in the reproducible biometric, but I might be surprised. The article's suggestion to use it as a password for health records seems especially problematic. "I'm sorry, bu ...…
 
Or you could just use noseprints Heartbeat Could Be Used as Password to Access Electronic Health Records Bruce Schneier says: My guess is that there isn't nearly enough entropy in the reproducible biometric, but I might be surprised. The article's suggestion to use it as a password for health records seems especially problematic. "I'm sorry, bu ...…
 
Digitalsamtal kan inte runda USA:s nya president. I veckans avsnitt pratar vi om den nya presidenten utifrån poddens utgångspunkt: I första hand en diskussion om hur tekniken används för att hantera att den nya ledningen börjat styra vilken vetenskaplig information som myndigheter får kommunicera. Verktyg som normalt sett används för att skydda ...…
 
Your Privacy Paradox challenges start today. What does your phone know about you? Too much, probably. And it’s even more than you think. Many apps track your location, even when you’re not using them. Others listen in via your microphone, even when you’re not talking to them. Maybe you want your apps to know what you’re up to. Or maybe want to ...…
 
Tim Junio is the Co-Founder and CEO @ Qadium, the startup that creates and organizes knowledge about the world's devices. They are backed by some of the best in the business including the likes of Founders Fund (Peter Thiel), NEA (Scott Sandell) and our good friends at Susa Ventures. Prior to Qadium, Tim started his career at the Central Intell ...…
 
Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is an Enterprise Security Consultant at Sword and Shield Enterprise Security in Knoxville, TN. Joe also maintains his own blog and podcast called Advanced Persistent Security. He is also in the SANS Instructor D ...…
 
Anders har sent omsider läst Bruce Schneiers bok Data & Goliath, utgiven 2015. Veckans avsnitt blir en bokrecension i poddutförande – för Schneiers tankar om datainsamling och dess konsekvenser för samhället är inte utdaterade. För att hålla fortsatt koll på vad Bruce Schneier tänker om samhällsutvecklingen ur ett teknik- och integritetsperspek ...…
 
In this issue: Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier from the January 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage…
 
In this issue: Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier from the January 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage…
 
In this issue: Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier from the January 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage…
 
In this Marketing Over Coffee: Learn About How to Start the Year Right, Augmented Reality, Influencers and more! Direct Link to File Brought to you by our sponsors: Templafy and Toptal 2017 Tune Up Clean up your email, work on your influencer lists, fix errors, do a responsive check, AMP, Keywords and Topics Chris’ open source tag manager check ...…
 
In this Marketing Over Coffee: Learn About How to Start the Year Right, Augmented Reality, Influencers and more! Direct Link to File Brought to you by our sponsors: Templafy and Toptal 2017 Tune Up Clean up your email, work on your influencer lists, fix errors, do a responsive check, AMP, Keywords and Topics Chris’ open source tag manager check ...…
 
In this Marketing Over Coffee: Learn About How to Start the Year Right, Augmented Reality, Influencers and more! Direct Link to File Brought to you by our sponsors: Templafy and Toptal 2017 Tune Up Clean up your email, work on your influencer lists, fix errors, do a responsive check, AMP, Keywords and Topics Chris' open source tag manager check ...…
 
Google login Twitter login Classic login