show episodes
 
C
Crypto-Gram Security Podcast
Monthly
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
C
Crypto-Gram Security Podcast
Monthly
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
C
Crypto-Gram Security Podcast
Monthly
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
S
Security Radio
Weekly
 
Welcome to Security Radio.
 
B
Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
 
B
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
 
Loading …
show series
 
Wolfgang Goerlich is using encryption frameworks. Show Notes: Wolfgang's blog at jwgoerllich.com Some terms discussed in the podcast just in case you aren't familiar: SQL injection Password cracker (programs that can assist in figuring out a password by enumerating / guessing) OAuth TLS / HTTPS SFTP SecureString in the .NET framework Companies ...…
 
C
Code of Character | ACTIONS HONOR VISION | Building a Better Society by Building Great Men
 
Show notes: Kyle Tyrrell is a retired special forces soldier in the Australian army. He is currently the CEO of Vanguard Global, a security and risk consultancy. He is well versed in global both from a theoretical and a practical level. Kyle talks with Code of Character about how we can better secure ourselves and our families, both at home and ...…
 
This seminar, sponsored by the Carnegie UK Trust as part of a study tour on the future of public libraries, explores privacy and the role that libraries can play in this arena. Keynote speaker Bruce Schneier paints a bleak picture of the erosion of privacy, since we are all constantly creating a data trail. Yet he declares that none of this is ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure from the May 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure from the May 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure from the May 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and In ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and In ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and In ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts" from the March 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts" from the March 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts" from the March 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
H
HARAJUKU DATA LAKE
 
This week Morris and Sergio discuss Google's announcement of a successful collision attack on the SHA-1 cryptographic hash function. Show Notes Cloudbleed and SHA-1 Collision with Max Burkhardt An excellent discussion of the topic on Software Engineering Daily. Shattered.it The branded marketing site for this research result. The actual paper i ...…
 
T
The Drive at Five with Curtis Sliwa
 
Security Guru Bruce Schneier joins Curtis to talk the Wikileaks drop Vault 7.
 
Scott reviews fellow cybersecurity expert Bruce Schneier's book on big data entitled Data and Goliath. What does he think about it?By scott@scottschober.com (Scott Schober).
 
Mike Mimoso talks to Bruce Schneier, CTO of IBM Resilient, at RSA 2017 about the early days of the conference, his campaign for IoT regulation, and how the technical community needs to get involved with policy.By chris@threatpost.com (Mike Mimoso, Chris Brook).
 
C
Crypto-Gram Security Podcast
 
In this issue: Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things from the February 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things from the February 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things from the February 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
Or you could just use noseprints Heartbeat Could Be Used as Password to Access Electronic Health Records Bruce Schneier says: My guess is that there isn't nearly enough entropy in the reproducible biometric, but I might be surprised. The article's suggestion to use it as a password for health records seems especially problematic. "I'm sorry, bu ...…
 
Digitalsamtal kan inte runda USA:s nya president. I veckans avsnitt pratar vi om den nya presidenten utifrån poddens utgångspunkt: I första hand en diskussion om hur tekniken används för att hantera att den nya ledningen börjat styra vilken vetenskaplig information som myndigheter får kommunicera. Verktyg som normalt sett används för att skydda ...…
 
What does your phone know about you? And what can you do about it? Welcome to the first day of our week-long series of podcasts and action-steps designed to help you take back your digital identity. We’re starting with trimming your digital exhaust - your metadata. Many of your apps track your location even when you’re not using them. Others li ...…
 
Tim Junio is the Co-Founder and CEO @ Qadium, the startup that creates and organizes knowledge about the world's devices. They are backed by some of the best in the business including the likes of Founders Fund (Peter Thiel), NEA (Scott Sandell) and our good friends at Susa Ventures. Prior to Qadium, Tim started his career at the Central Intell ...…
 
T
The Human Factor
 
Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is an Enterprise Security Consultant at Sword and Shield Enterprise Security in Knoxville, TN. Joe also maintains his own blog and podcast called Advanced Persistent Security. He is also in the SANS Instructor D ...…
 
Anders har sent omsider läst Bruce Schneiers bok Data & Goliath, utgiven 2015. Veckans avsnitt blir en bokrecension i poddutförande – för Schneiers tankar om datainsamling och dess konsekvenser för samhället är inte utdaterade. För att hålla fortsatt koll på vad Bruce Schneier tänker om samhällsutvecklingen ur ett teknik- och integritetsperspek ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier from the January 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage…
 
C
Crypto-Gram Security Podcast
 
In this issue: Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier from the January 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage…
 
C
Crypto-Gram Security Podcast
 
In this issue: Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier from the January 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage…
 
In this Marketing Over Coffee: Learn About How to Start the Year Right, Augmented Reality, Influencers and more! Direct Link to File Brought to you by our sponsors: Templafy and Toptal 2017 Tune Up Clean up your email, work on your influencer lists, fix errors, do a responsive check, AMP, Keywords and Topics Chris’ open source tag manager check ...…
 
In this Marketing Over Coffee: Learn About How to Start the Year Right, Augmented Reality, Influencers and more! Direct Link to File Brought to you by our sponsors: Templafy and Toptal 2017 Tune Up Clean up your email, work on your influencer lists, fix errors, do a responsive check, AMP, Keywords and Topics Chris’ open source tag manager check ...…
 
M
Marketing Over Coffee
 
In this Marketing Over Coffee: Learn About How to Start the Year Right, Augmented Reality, Influencers and more! Direct Link to File Brought to you by our sponsors: Templafy and Toptal 2017 Tune Up Clean up your email, work on your influencer lists, fix errors, do a responsive check, AMP, Keywords and Topics Chris' open source tag manager check ...…
 
T
The Human Factor
 
Quentyn Taylor is Director of Information Security for Canon Europe. He has a wealth of experience in both the IT and information security arenas and, in recent years, has focused his attention on building business relationships across the world. Quentyn has driven Canon’s strategy to highlight the importance of document security and help busin ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: My Priorities for the Next Four Years Hacking and the 2016 Presidential Election Dumb Security Survey Questions from the December 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: My Priorities for the Next Four Years Hacking and the 2016 Presidential Election Dumb Security Survey Questions from the December 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: My Priorities for the Next Four Years Hacking and the 2016 Presidential Election Dumb Security Survey Questions from the December 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
What did two cybersecurity luminaries study to get into the industry? Turns out, Bruce Schneier, CTO of Resilient Systems and Hugh Thompson, a member of the RSA Conference Program Committee, took very different paths to where they are today. Thompson came from the world of math, and Schneier moved through rolls in startups and government and ha ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login