Best computer security podcasts we could find (Updated April 2018)
Related podcasts: Security Hacking Technology Computer Software Development Cloud Information Cybersecurity Computers Tech Infosec Computer Security Cyber Computing Audio Featured FM Defcon Information Security Threats  
Computer security public [search 0]
show episodes
 
Security and Forensic Computing module from Edinburgh Napier University
 
Stay up-to-date with what’s happening in the digital world the easy way! Digital expert, national radio host and USA Today columnist Kim Komando wastes no time and gets right to the top stories, scams, security alerts, product reviews and crazy happenings in the world of tech. Listen and you’ll be in the know with Kim Komando!
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
I
In-Security
Rare
 
Computer security from the ground up.
 
S
SecuraBit
Monthly
 
SecuraBit Before It Bytes!
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
Connected Social Media works with the world's most innovative companies to tell the stories behind their press releases and their products. Whether you're a blogger, a journalist, an investor or an engaged consumer, you'll get valuable insights and information from the people behind the people behind the projects that drive modern life - everything from microchips to microfinance, from wifi to disaster recovery. Brilliant, hard-working and dedicated executives, engineers, analysts and entrep ...
 
E
Eye on Security
Monthly
 
The latest on cybersecurity threats and news from FireEye.
 
Past speeches and talks from DEF CON hacking conferences in an iTunes friendly Mp4 format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you didn't make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want. Video, audio and supporting materials from past conferences will be posted here, starting with the newest ...
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
A podcast series features monthly interviews with authors of important, new national security-oriented books and publications. Interviews are conducted by Jack Goldsmith or Benjamin Wittes, the cochairs of Hoover’s Working Group on National Security, Technology, and Law, and take place before a live audience.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Note: This is only Paul's Security Weekly, recording once per week and typically 2 hour shows.
 
The most innovative companies want to tell you something
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
V
VR Hacks
Rare
 
Thought Exercises
 
The Engineer team talk you through the latest technology news, discuss the most important issues in engineering today and find out more about some of the fascinating stories featured on theengineer.co.uk.
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
Please join Roger as he talks about the High Tech/Low Tech point of view each week with special guests from our local and national communities.Above all else enjoy what you do and enjoy everyone around you for you never know where tommorow will bring you...Best wishes in your life walk,Roger SwansonComputer Network Enterprises,Inc.Summerville, SC
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
G
Going Linux
Monthly+
 
Once you become aware that there is a dependable, secure, capable, and modern computer system that rivals all others in popularity and actual use, you will want to try the Linux operating system on your computer. Perhaps you've been using a member of the Unix/Linux family - Linux, Android, ChromeOS, BSD or even OSX - for quite a while. If so, you are likely looking for new ways to optimize your technology for the way you work. Going Linux is for computer users who just want to use Linux to g ...
 
Editors and authors discuss topics covered in MIT Press journals.
 
A daily news service that keeps you up-to-date on security issues, new threats and steps to defend networks against cyber attacks
 
V
VR Hacks
Rare
 
Thought Exercises
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
 
T
Threat Monitor
Monthly
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
C
Computer Guys Podcast
Monthly+
 
The Computer Guys are on live @ 1450 WHTC AM radio Wednesday Afternoons from 4:30 to 5:00pm EST. Call in with your questions at 616-395-1450 during that time for free advice on your computer, or email computerguys@whtc.com. It's a half hour a week of tech talk and everyday life from Dave and Kevin of Macatawa Technologies in Holland, MI.
 
T
Tech Overlords
Monthly+
 
Tech Overlords is brought to you by Brayden Schulze, Nathanael Kramer, and David Montgomery. We're just a few geeks/nerds who like to hang out and talk about all things tech, games, movies, tv shows, and lots of other random things that pop into our minds. If you enjoy what you hear please subscribe on iTunes Like us on facebook.com/techoverlordspodcast Tweet us on Twitter @tekoverlords
 
D
Digital Detectives
Monthly
 
Hosted by two leaders in the cyber-security industry, Sharon D. Nelson, Esq. and John W. Simek, Digital Detectives is for listeners who are interested in digital forensics, e-discovery, and information security issues. Nelson and Simek invite digital forensic and computer security experts to enlighten listeners on the latest technology, cyber threats, and necessary security measures to keep online data secure.
 
The Virtualization Security Round Table Podcast provides an open forum to discuss all things related to Virtualization, Virtual Environment, and Cloud Computing Security. The podcast is hosted by Talkshoe, with the after podcast write-ups and notes are hosted on The Virtualization Practice (http://www.virtualizationpractice.com)This Podcast was created using www.talkshoe.com
 
B
BizSec Podcast
Monthly
 
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
 
G
Going Linux
Monthly+
 
Once you become aware that there is a dependable, secure, capable, and modern computer system that rivals all others in popularity and actual use, you will want to try the Linux operating system on your computer. Perhaps you've been using a member of the Unix/Linux family - Linux, Android, ChromeOS, BSD or even OSX - for quite a while. If so, you are likely looking for new ways to optimize your technology for the way you work. Going Linux is for computer users who just want to use Linux to g ...
 
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washi ...
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
Information Technology podcast around computing, networking and security
 
S
SAHAsays
Monthly+
 
SAHAsays is an Information Security related commentary program that pulls from recent headlines around the web. We offer four distinct voices from the Computer Security community: applied business, a software reverse engineer, a doctoral seeking, practicing academic, and the journeyman getting in the front door in the industry. These "voices" may represent our general perspectives, but we're all friends who meet at the San Antonio Hacker's Association (SAHA) on the 6th of every month at the ...
 
Whitelist is the BCS security podcast covering the latest security issues with expert analysis
 
The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Video, audio and supporting materials from past conferences are available on our new media server at: https://media.defcon.org
 
The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Video, audio and supporting materials from past conferences are available on our new media server at: https://media.defcon.org
 
C
CyberTalkRadio
Weekly
 
From the dark web to your radio dial - a weekly discussion on internet and computer security with San Antonio's Bret Piatt.
 
Information, news, and best practices from technology experts on emerging technologies for IT technology enthusiasts.
 
Ryan Naraine is the host of the SecurityWeek podcast series "Security Conversations". He is the head of Kaspersky Lab's Global Research & Analysis team in the USA and has extensive experience in computer security user education, specializing in operating system and third-party application vulnerabilities, zero-day attacks, social engineering and social networking threats.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
H
Head In The Cloud
Weekly
 
Security, DevOps and Life In the Cloud - A discussion about security as it relates to cloud computing and all the technology and process that comes with it.
 
G
Give Me Tech
Monthly+
 
Join hosts Sherri Smith and Michael Andronico as they look at the latest trends in technology. From cyberpunk like security breaches to $10,000 mobile phones they have you covered.
 
Loading …
show series
 
This week we take a closer look at a few of the downsides of the modern internet, and some of the security and privacy challenges that are becoming increasingly troublesome. Rachelle Saunders speaks with cyber security expert James Lyne about how modern hacking differs from the hacks of old, and how an internet without national boards makes it ...…
 
Support the show, consider donating: BTC: 1CD83r9EzFinDNWwmRW4ssgCbhsM5bxXwg (https://epicenter.tv/tipbtc)BCC: 1M4dvWxjL5N9WniNtatKtxW7RcGV73TQTd (http://epicenter.tv/tipbch)ETH: 0x8cdb49ca5103Ce06717C4daBBFD4857183f50935 (https://epicenter.tv/tipeth)With the advent of mature quantum technologies, many of the critical cryptographic protocols wh ...…
 
First Segment: Bomgar. Sam Elliot, Director of Security Product Management. Bomgar’s Secure Access solutions enable customers to easily support people, access and protect endpoints, and defend privileged credentials, in order to fight cyber threats and speed business performance. More than 13,000 organizations around the globe use Bomgar to del ...…
 
Be sure to visit the direct link to watch a full video of this podcast in High Definition: https://michaelmanicotti.com/podcast/2018/3/31/how-to-keep-your-business-in-check Running a business is not just about selling a product or pushing a service. It's all the admin bullshit and the infrastructure behind it that keeps it moving. If you want t ...…
 
This Week in Mobile is a weekly podcast produced by Atherton Research where we bring you up to speed on the top mobile news stories of the week. Joining me this week to discuss these top mobile news stories is tech veteran Eric Leandri, the co-founder and CEO of search-engine Qwant. Here's the summary for Week 14 (April 7, 2018): Huawei's new f ...…
 
Bill Hendricks: Well welcome to The Table podcast where we discuss issues of God and culture. I’m Bill Hendricks, Executive Director for Christian Leadership at the Hendricks Center. Today we want to look at really what is the dark side of culture and this is the whole topic of human trafficking. I want to get into this by telling a story. It’s ...…
 
Rails 5.2.0 RC2 Notes - http://weblog.rubyonrails.org/2018/3/20/Rails-5-2-RC2/Rails 5.2.0 Release Notes - http://edgeguides.rubyonrails.org/5_2_release_notes.html Active Storage With the new Active Storage framework in Rails 5.2, we’ve solved for the modern approach of uploading files straight to the cloud. Out of the box, there’s support for A ...…
 
Keith McCammon is the Chief Security Officer and Co-founder of Red Canary in Denver, CO. Keith runs Red Canary’s Security Operations Center and leads a group of expert analysts that monitor a continuous stream of potential attacks detected in their customers’ environments. Keith is a known expert in offensive cyber computing and defensive IT se ...…
 
THN Season 2, Episode 30 (Episode 75) Show Notes 3/21-3/29 Music by Bensound at http://www.bensound.com Rangers highlights courtesy of MSG Network. Bruins highlights courtesy of NESN. Hurricanes highlights courtesy of Fox Sports Carolinas. Other highlights and clips courtesy of NBC, NBC Sports Network, CBC, Sportsnet, and the National Hockey Le ...…
 
The platform of platforms. The internet, the basis for your web platform. When we say web platform, we mean the internet. This is what amounts to the largest virtual ecosystem. Essentially the foundation of the entire virtual world. But at its fundamental level it is a “web” of computers linked together. All search engines are trying to do is t ...…
 
If it seems like cybersecurity stories have started to pop up in the news more frequently, you’re not crazy. Although, headlines about cyber breaches, hacks and ransomware are still pushed off the front page by political gossip and other scandals, there is no doubt cybercrime is a topic of growing importance to business, elected officials and t ...…
 
Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet. Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more! Links: Uh Oh! Unified Logs in High Sierra (10.13) Show Plaintext Password ...…
 
WHERE TO FIND THE SHOW iTunes | Google Play | Stitcher | SoundCloud | YouTube | TuneIn “It was really disappointing to see someone attacking my credibility. That hurt more than anything. Trying to take away from the hard work I have put into the space. That really got to me” — Desiree Dickerson Twitter and specifically Crypto Twitter is a great ...…
 
After some news - about a 100TB SSD, storing data in DNA, and more - we discuss whether your smart speaker is spying on you, then examine what could happen if you delete your Facebook account. Could you still log in on all the websites where you used your Facebook profile? World's largest SSD capacity now stands at 100TB How DNA can be used to ...…
 
Transcript …there. How are you doing? All right. I am talking about, “A Theory of Functional Programming,” which is a book that I’m working on, and this is actually me working on it right now. I am going to talk about the topic, and hopefully, the transcript will turn into my book. I talked about a lot of things last time. That was last Friday, ...…
 
Do you believe in your goals and dreams?Are you confident in your capability and capacity to achieve success?Now, the answer to these questions may vary, but one thing is certain:Confidence and action go hand in hand, y’all!“How so?” you might ask.Well, we believe that:Confidence inspires us to take action, and taking purposeful action helps ma ...…
 
Goodbye Papercut Monster. Hello Electronic Personnel Files.Previously, we discussed records retention and how long employers need to hang on to all things having to do with hiring and retaining employees. As promised, we’ll now delve into best practices for storing that same information electronically. Take that, papercut monster!Know the Basic ...…
 
Why You Matter; And Why It Matters… By Edward Robinson It’s The EdRoboTech.com Podcast Series for Friday March 23, 2018. This is Episode 34. I’m Edward Robinson! Have you ever come to work, and solved a problem, that saved the day? Did you have people counting on you to perform, and looking to you for help, guidance, or support? That’s a good f ...…
 
Use this day planner to enjoy a perfect day at the Getty Center in Los Angeles, California, one of the world’s top art museums. Take the tram to the top of the hill and admire the Los Angeles skyline from the unique perspective of the Getty Center. Take a free tour of the highlights of the collections, including paintings by Van Gogh, Renoir, M ...…
 
Hanzai News for the week ending March 22, 2018 In this weeks news: Murder Marijuana Meth Minors Police Officers Arrested Public Prosecutor Prosecuted School Teachers Arrested School Explosion Drug Dealing Porn Star And More! Follow on Twitter @hanzaipodcast E-mail hanzaipodcast@gmail.com TRANSCRIPT BELOW: # Hanzai News for March 22, 2018 ## 1 A ...…
 
This week on Beyond The Badge, Law Enforcement and Security Analyst Vincent Hill talks about the Austin Bombings, Minneapolis officer charged with murder, and Maryland School Shooting. On the Austin bombings, which the fifth one happened on Tuesday morning, Vincent explains what police need to find the bomber. Up next, he gets into the Minneapo ...…
 
Oregon Trail is back! This time in full handheld mode so we can all die of dysentery before trying to ford the river! Jason has a great segment about his new adventures in the world of hackintosh and then it’s time to jump into some superhero movie talk including Nightwatch and Avengers : Infinity War. ----more---- Target Is Selling Handheld Or ...…
 
Cambridge Analytica's use of Facebook data was a 'grossly unethical experiment' coming to light thanks to a whistleblower. We'll play his story, and discuss what they did with the data. Plus Google, Target, and Walmart's unholy alliance to battle Amazon and Twitter's Cryptocoin crackdown. Sponsored By: Ting: Take $25 off a device, or earn $25 i ...…
 
Cambridge Analytica's use of Facebook data was a 'grossly unethical experiment' coming to light thanks to a whistleblower. We'll play his story, and discuss what they did with the data. Plus Google, Target, and Walmart's unholy alliance to battle Amazon and Twitter's Cryptocoin crackdown. Sponsored By: Ting: Take $25 off a device, or earn $25 i ...…
 
Episode 1: Welcome to The ChiroPractice Pro Podcast In each episode, you’ll find a free resource here. In future episodes we have SOAP note guidelines, example exams, and ways to dominate search results in your area. Look for it in this section in future episodes. Episode 2: SOAP Notes >> Dr. Joshua Eldridge: Welcome to episode one of the Chiro ...…
 
The Top Five Crypto Fails of All Time! Welcome back! We’ve got a treat for you here, or is it a trick? It’s hard to tell with some of these fail stories, and, of course, there were so many crazy tales from the cryptosphere that we couldn’t possibly write about them all. We’ve chosen five that the Cryptopulse team thought were pretty darn hilari ...…
 
This is the fourth and last episode of Crime Doesn’t Pay! This story is made for people who are learning English at a high intermediate to advanced level. Extensive listening means listening to English that is very easy to understand. Crime Doesn't Pay will be told in four parts, meaning that each week will tell a new part of the story. As you ...…
 
In this episode of Telekinesis, data to data conversions, we are pleased to have Nick Taylor from Google Cloud Platform. Nick is an experienced Program Manager and Architect with a demonstrated history of working across industries. Nick is especially skilled in security and privacy, identity & access management, and technical architecture. Nick ...…
 
Google login Twitter login Classic login