Best computer security podcasts we could find (Updated June 2017)
Related podcasts: Security Digital Forensics Education  
Computer security public [search 0]
show episodes
 
S
Security and Forensic Computing (iPod Version)
 
Security and Forensic Computing module from Edinburgh Napier University
 
Loading …
show series
 
Emma Cape was the Campaign Manager of the Chelsea Manning Support Network. In this podcast, she shares her experiences over 3.5 years working with Courage to Resist and Chelsea Manning to build a campaign that would eventually lead to her release from prison 28 years early. Emma shared: “It was really an amazing grassroots effort, how we were a ...…
 
D
DABCC Virtualization Verbalization: Citrix, VMware, Microsoft, Cloud Computing News
 
In episode 282, Douglas Brown interviews Andre Leibovici, Field CTO and VP of Solutions and Alliances at Datrium. Douglas and Andre truly have a very lively discussion on everything from the future of EUC to Open-Convergence. Andrew also explains why he left Nutanix for startup Datrium. This is a fun conversation and you will leave laughing a b ...…
 
In this episode of WRLWND Radio, Marcello Sukhdeo talks about some key things to look for in a messenger app, a bendable laptop from Lenovo, Spotify toying with sponsored songs and Dropbox planning to move away from the Internet. Show Notes Messenger app With so many messenger apps out there, like WhatsApp, Messenger, Facetime, iMessage, Telegr ...…
 
The Entrepreneur Architect Series featuring Michael Kilkelly At EntreArchitect, you’re encouraged to share your knowledge. When we share with other architects, we all benefit. We are able to learn from one another and the profession will grow. One of the goals of EntreArchitect is to provide a platform for other entrepreneur architects to share ...…
 
S
Slate's Live at Politics and Prose
 
One of the Middle East’s most prominent women’s right activists, Manal al-Sharif grew up in a modest family in Mecca. Devout in her youth, she didn’t associate with non-Muslims and destroyed her brother’s cassettes of forbidden music. But by her twenties she was working as a computer security engineer for Aramco. Her professional status didn’t ...…
 
This week: More of the powerful new iOS 11 features you’ve never heard of. The talented app which will harnesses the power of Apple’s new augmented reality features Scott Forstall is back, and he’s sharing the bizarre story of how the original iPhone really came to be. Everything you need to know about HEIF, the JPEG-killing format Apple is ado ...…
 
T
The Donovan Radio Show
 
Air date: 6/22/17 In this episode, Donovan talks about how Trump throws shade at wind energy in the state that is the poster child for wind energy – Iowa, and they ain’t havin’ none of it. Hawaii takes a step on the right side of history by attempting basic financial security for all Hawaiians. Schools continue to crush free thought and speech, ...…
 
N
Network Marketing 2.0 With OLA Tux Abitogun
 
QUESTION/ANSWER VIDEO - How to Recruit Up in Network Marketing “Hello. Last Saturday at my company’s weekly meeting, we had a top earner couple and he gave some great nuggets. The couple suggested recruiting up (i.e recruit people that are well off.) My problem for the past 7 months is that I recruited 4 of the thirty something people I spoke t ...…
 
As part of a DARPA research program, Amit Ashok, Assistant Professor of Optical Sciences and of Electrical and Computer Engineering, has assembled a multi-disciplinary team of optical physicists, computer scientists, mathematicians, and engineers to explore new imaging techniques that exploit complex reflections of light to essentially look thr ...…
 
I am writing these notes, which I am certain that you will dispute, because I don’t want to replay the video conversation multiple times. That is all. If you want my perspective, you can have it here; if not, please skip this entry entirely because you know what you experienced, Liga, and you know what I want. Let’s start at the beginning. The ...…
 
Summary: This week Benjamin and Zac share brief 10.5-inch iPad Pro impressions, detail a few changes in iOS 11 beta 2, discuss the ironic Apple security leak, Apple's big Sony exec hires and what it means for TV, and Scott Forstall's major comeback to the public stage and what he has to say about the history of the iPhone. Hosts: Benjamin Mayo ...…
 
Manal al-Sharif grew up in Mecca as a member of a fundamentalist family. And when she went to work as a computer security engineer, her eyes were opened to the sexist policies of her homeland. She joins us to talk about being a feminist in a patriarchy, which she writes about in her memoir, “Daring to Drive: A Saudi Woman’s Awakening” (Simon & ...…
 
Manal al-Sharif grew up in Mecca as a member of a fundamentalist family. And when she went to work as a computer security engineer, her eyes were opened to the sexist policies of her homeland. She joins us to talk about being a feminist in a patriarchy, which she writes about in her memoir, “Daring to Drive: A Saudi Woman’s Awakening” (Simon & ...…
 
Manal al-Sharif grew up in Mecca as a member of a fundamentalist family. And when she went to work as a computer security engineer, her eyes were opened to the sexist policies of her homeland. She joins us to talk about being a feminist in a patriarchy, which she writes about in her memoir, “Daring to Drive: A Saudi Woman’s Awakening” (Simon & ...…
 
Amazon is looking to push organic kale with its purchase of Whole Foods, while also taking on clothing subscription services with a new apparel box service. Over at Apple, an internal meeting about secrecy leaked to the press. Oh, sweet irony. This episode of Download is sponsored by: Mailroute: a secure, hosted email service for protection fro ...…
 
Amazon is looking to push organic kale with its purchase of Whole Foods, while also taking on clothing subscription services with a new apparel box service. Over at Apple, an internal meeting about secrecy leaked to the press. Oh, sweet irony. This episode of Download is sponsored by: Mailroute: a secure, hosted email service for protection fro ...…
 
A story from Motherboard.Hacking air-gapped machines—computers that are not connected to the internet, so theoretically less vulnerable—is always pretty interesting. On Wednesday, Wikileaks published a series of alleged CIA documents that supposedly show how the intelligence agency's malware was designed to infect these sort of targets.Naturall ...…
 
In this episode of The Florida Bar Podcast from the 2017 Annual Florida Bar Convention, hosts Christine Bilbrey and Jonathon Israel talk to Lawrence Kunin and Serge Jorgensen about data security breaches and the legal implications of such a breach. They also discuss the ethical obligations of an attorney in regards to data security, as well as ...…
 
C
Complete Developer Podcast
 
In any field, there is a lot of hard-won knowledge that the more experienced attempt to impart to those with less experience. Depending on the field, these things may be expressed as old sayings, or laws. They typically aren’t really hard and fast rules, but rather are general tendencies that have been observed over time. Programming, like any ...…
 
C
Complete Developer Podcast
 
In any field, there is a lot of hard-won knowledge that the more experienced attempt to impart to those with less experience. Depending on the field, these things may be expressed as old sayings, or laws. They typically aren’t really hard and fast rules, but rather are general tendencies that have been observed over time. Programming, like any ...…
 
OpenSUSE makes XFCE pretty, Vivaldi gets personal, WPS Office returns from the dead, and Ubuntu for mobile receives a post mortem. Subscribe: //
 
OpenSUSE makes XFCE pretty, Vivaldi gets personal, WPS Office returns from the dead, and Ubuntu for mobile receives a post mortem. Subscribe: //
 
$50 million spent on Georgia congressional special election. 5 special elections in 5 states and 5 Democratic losses.Can invest tax-free out of foundations. A large portion of many foundation assets is spent on administrative costs, which can be funneled off to benefit family.Converting an asset into a security creates fictitious instruments of ...…
 
W
Wrestling Reality with Justin LaBar
 
This week Justin LaBar discusses the Carmella controversy - the feminist outrage to a MAN getting the briefcase for Carmella at Money In The Bank, plus The Miz being the most reliable heel in WWE, Roman Reigns is a star even being polarizing, and more... Justin talks with Ticket King's VP Drew Baydala about wheter Braun Strowman is the next org ...…
 
BeBizzy Break Podcast : Episode 43 - Facebook Groups Hosted by : Marv Dorner, owner of BeBizzy Consulting One of the best things about owning my own business(es) is I get to make all the decisions regarding business processes and what I want and don’t want to do. Well, almost all the decisions. Sometimes I still need to fire up the printer… lik ...…
 
O
O'Reilly Security Podcast - O'Reilly Media Podcast
 
The O’Reilly Security Podcast: How to approach asset management, improve user education, and strengthen your organization’s defensive security with limited time and resources. In this episode, I talk with Amanda Berlin, security architect at Hurricane Labs. We discuss how to assess and develop defensive security policies when you’re new to the ...…
 
After exploiting a system on a remote & unfamiliar network it is extremely important to gain situational awareness as quickly, and quietly as possible. This will help ensure success moving forward with other attacks. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) will show how to use PowerShell to query information about ...…
 
After exploiting a system on a remote & unfamiliar network it is extremely important to gain situational awareness as quickly, and quietly as possible. This will help ensure success moving forward with other attacks. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) will show how to use PowerShell to query information about ...…
 
06-20-2017(Photo:Designed to combat the threats of today as well as those of coming decades, these ships are equipped with numerous advanced technology and survivability systems.Zumwalt BackgroundThe U.S. Navy's newest warship, USS Zumwalt (DDG 1000) is the largest and most technologically advanced surface combatant in the world. Zumwalt is the ...…
 
06-20-2017(Photo:Designed to combat the threats of today as well as those of coming decades, these ships are equipped with numerous advanced technology and survivability systems.Zumwalt BackgroundThe U.S. Navy's newest warship, USS Zumwalt (DDG 1000) is the largest and most technologically advanced surface combatant in the world. Zumwalt is the ...…
 
From growing up as a devout woman from a modest family in Saudia Arabia to becoming an unexpected leader of a courageous movement to support women’s right to drive, Manal al-Sharif recounts her life’s journey in her ferociously intimate new memoir Daring to Drive: A Saudi Woman’s Awakening. When working in the male-dominated field of computer s ...…
 
S
Salamander Babies
 
Temporal Timekeeper Mario’s suggestion (Voyager season 5, episode 14, “Bliss”) is discussed at length by the crew. Or is it all a pitcher plant fever dream??? (Don’t worry, it’s real) Shownotes other shows that did unreliable reality Buffy the Vampire Slayer – Normal Again The X-Files – Field Trip SHOW ME WHAT YOU GOT sirens in The Odyssey your ...…
 
First Segment: SNDR. Shaun Murphy, CEO.“Our mission is simple: Provide easy, efficient and secure message and file sharing for businesses and individuals, without compromising control of their data. It’s a challenge to the status quo. sndr is more than a technology company, it’s a movement to restore our collective right to privacy.” – SNDR.com ...…
 
First Segment: SNDR. Shaun Murphy, CEO. "Our mission is simple: Provide easy, efficient and secure message and file sharing for businesses and individuals, without compromising control of their data. It's a challenge to the status quo. sndr is more than a technology company, it's a movement to restore our collective right to privacy." - SNDR.co ...…
 
Noticing a pattern emerge in the aftermath of some of the worst catastrophes in recent years—like Hurricane Katrina, Fukushima, and the formation of ISIS—global security experts Richard A. Clarke and R.P. Eddy wrote a book called Warnings: Finding Cassandras to Stop Catastrophes. It is an historical investigation and instructive framework that ...…
 
Small Business Cybersecurity (15:59)Scott Shackelford, an associate professor of business law and ethics at Indiana University. When we hear about a business having their computers hacked it is a big company like Target, Chick-Fil-A, or Sony. What you don't hear about are the small companies that suffer a data breach. The damage can be more dev ...…
 
M
Mercury Broadcasting
 
From ZDnet article on Firefox Lisa Toth: Recently updated my Microsoft account to reflect a new email address. When that seemed to be working, I deleted the old address. When I come directly here (to Microsoft) my new address. When I am trying to sign in to OneDrive it shows my old address and I can’t sign in. I’ve asked for a new pw and set it ...…
 
A malware that can disrupt power grids, a warning that Canada’s next federal election could be influenced by hackers, and the use of VR to ease patients pain and anxiety. All this on WRLWND Radio for today. Shownotes: Crash Override Last year a new strain of malware was responsible for a computer malfunction that triggered a power outage in Ukr ...…
 
The TSA is finally updating its decades-old security systems. On Thursday, it began testing a computed tomography (CT) scanner on carry-on luggage in Phoenix. Thanks to the CT scanner, passengers can now leave their technology and liquids in their bags when passing through airport security, meaning lines would speed up by up to 50 percent. In a ...…
 
The TSA is finally updating its decades-old security systems. On Thursday, it began testing a computed tomography (CT) scanner on carry-on luggage in Phoenix. Thanks to the CT scanner, passengers can now leave their technology and liquids in their bags when passing through airport security, meaning lines would speed up by up to 50 percent. In a ...…
 
We're sponsored this week by Watchman Monitoring, a favorite tool of ours that should be in every professional consultant's toolkit. Visit WatchmanMonitoring.com/cmdctrlpwr and sign up for your free trial to find out how Watchman Monitoring can keep an eye on your client machines and notify you of over 100 issues. Be sure to tweet @cmdctrlpwr # ...…
 
In our most recent episode of The Last Stand Podcast, we discuss the importance, uniqueness and threats to coral reef ecosystems with Sam Teicher, co-founder of Coral Vita. Founded in 2014, Coral Vita’s mission is to restore the planets damaged and dying coral reef environments by growing more resilient coral and transplanting them into threate ...…
 
In our most recent episode of The Last Stand Podcast, we discuss the importance, uniqueness and threats to coral reef ecosystems with Sam Teicher, co-founder of Coral Vita. Founded in 2014, Coral Vita’s mission is to restore the planets damaged and dying coral reef environments by growing more resilient coral and transplanting them into threate ...…
 
W
Wellness Force Radio | Discovering Physical & Emotional Intelligence To Live Life Well
 
For episode 117 we're learning from the best of the best companies that intersect at the crossroads for the future of health and wellness technology. This is a topic we’ve explored over the past 100+ shows on Wellness Force Radio, but for 117 we’re going the deepest we’ve ever gone to address the most important question around this type of tech ...…
 
A
Artificially Intelligent
 
Christian was recently interviewed on The Renaissance Man Podcast with Marco. They had a good discussion covering everything from the AI apocalypse, unemployment, what we mean by "AI", technical resources, and more! Links: The Renaissance Man Podcast Will AI Cause Mass Unemployment The AI Cargo Cult: The Myth of a Superhuman AI Georgia Tech Onl ...…
 
A
All Jupiter Broadcasting Shows
 
This week we're back in Grand Forks and we give you a deep dive on TAILS linux - the distro designed from the ground up to provide you with a secure computing environment. Plus we talk about universal installers, the security of messengers & your calls.By chris@jupiterbroadcasting.com (Jupiter Broadcasting).
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login