Best computer security podcasts we could find (Updated October 2017)
Related podcasts: Security Hacking Technology Computer Software Development Information Tech Cloud Infosec Computers Malware Cybersecurity Computersecurity Cyber Privacy Computing Featured FM Defcon Threats  
Computer security public [search 0]
show episodes
 
S
Security and Forensic Computing (iPod Version)
 
Security and Forensic Computing module from Edinburgh Napier University
 
T
The CyberWire - Your cyber security news connection.
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
T
The Threatpost Podcast
Weekly
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
E
Exploring Information Security - Timothy De Block
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
I
In-Security
Rare
 
Computer security from the ground up.
 
S
SecuraBit
Monthly
 
SecuraBit Before It Bytes!
 
S
Security and Forensic Computing (iPod Version)
 
Security and Forensic Computing module from Edinburgh Napier University
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
T
The Standard Deviant Security Podcast | Bi-weekly show discussing cyber attacks, data breaches, malware, privacy issues, Internet culture and infosec
 
Are you ready for a completely different kind of information security podcast? The Standard Deviant Security Podcast is a bi-weekly show that takes an in-depth look at the people behind the cyber security stories you hear in the news. Each episode cuts through the noise and hype to deliver compelling and entertaining interviews with people that are challenging the status quo. Hosted by Tony Martin-Vegue -- www.thestandarddeviant.com
 
P
Paul's Security Weekly
Weekly+
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
E
Eye on Security
Monthly
 
The latest on cybersecurity threats and news from FireEye.
 
C
Connected Social Media
Weekly+
 
Connected Social Media works with the world's most innovative companies to tell the stories behind their press releases and their products. Whether you're a blogger, a journalist, an investor or an engaged consumer, you'll get valuable insights and information from the people behind the people behind the projects that drive modern life - everything from microchips to microfinance, from wifi to disaster recovery. Brilliant, hard-working and dedicated executives, engineers, analysts and entrep ...
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
D
DEFCON 15 [Audio] Speeches from the hacker conventions
 
Past speeches and talks from DEF CON hacking conferences in an iTunes friendly Mp4 format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you didn't make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want. Video, audio and supporting materials from past conferences will be posted here, starting with the newest ...
 
N
Naked Security
Daily+
 
Computer Security News, Advice and Research
 
D
DEF CON 24 [Audio] Speeches from the Hacker Convention
 
The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Audio, audio and supporting materials from past conferences are available on our new media server at: https://media.defcon.org
 
P
Paul's Security Weekly (Podcast-Only)
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Note: This is only Paul's Security Weekly, recording once per week and typically 2 hour shows.
 
H
Hoover Institution: Security by the Book
 
A podcast series features monthly interviews with authors of important, new national security-oriented books and publications. Interviews are conducted by Jack Goldsmith or Benjamin Wittes, the cochairs of Hoover’s Working Group on National Security, Technology, and Law, and take place before a live audience.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
V
VR Hacks
Rare
 
Thought Exercises
 
T
The Security Ledger Podcast
Monthly
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
 
C
Cloud Computing – Connected Social Media
 
The most innovative companies want to tell you something
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy.Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
T
Tech It Out
Weekly
 
Making sense of technology by breaking down “geek speak into street speak."
 
H
High Tech Low Tech
Rare
 
Please join Roger as he talks about the High Tech/Low Tech point of view each week with special guests from our local and national communities.Above all else enjoy what you do and enjoy everyone around you for you never know where tommorow will bring you...Best wishes in your life walk,Roger SwansonComputer Network Enterprises,Inc.Summerville, SC
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy. Follow the show on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
U
UBM Radio
Weekly+
 
UBM Radio is the audio home of Interop, InformationWeek, Dark Reading, Network Computing, Bank Systems & Technology, EETimes, and more. Several times each week, the various channels of UBM Radio will present interviews and panel discussions with enterprise technology leaders and experts, all designed to help CIOs boost the efficiency of their IT operations and investments, freeing resources for innovation.Best of all, each show will feature live chat on the channel's home page, where you can ...
 
T
The Engineer Podcast
Rare
 
The Engineer team talk you through the latest technology news, discuss the most important issues in engineering today and find out more about some of the fascinating stories featured on theengineer.co.uk.
 
C
CyberSpeak's Podcast
Rare
 
Computer forensics, cybercrime, and computer security; Two former federal agents discuss the latest in cyber crime fighting and forensic techniques.
 
G
Going Linux
Monthly+
 
Once you become aware that there is a dependable, secure, capable, and modern computer system that rivals all others in popularity and actual use, you will want to try the Linux operating system on your computer. Perhaps you've been using a member of the Unix/Linux family - Linux, Android, ChromeOS, BSD or even OSX - for quite a while. If so, you are likely looking for new ways to optimize your technology for the way you work. Going Linux is for computer users who just want to use Linux to g ...
 
L
Liquidmatrix Security Digest
Daily+
 
Bringing Fire To The Village: Your Source For Computer, Network & Information Security News
 
M
MIT Press Journals Podcast
Rare
 
Editors and authors discuss topics covered in MIT Press journals.
 
T
Threat Monitor
Monthly
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
 
B
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy. Follow the show on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
T
Tech Overlords
Monthly+
 
Tech Overlords is brought to you by Brayden Schulze, Nathanael Kramer, and David Montgomery. We're just a few geeks/nerds who like to hang out and talk about all things tech, games, movies, tv shows, and lots of other random things that pop into our minds. If you enjoy what you hear please subscribe on iTunes Like us on facebook.com/techoverlordspodcast Tweet us on Twitter @tekoverlords
 
C
Computer Guys Podcast
Monthly+
 
The Computer Guys are on live @ 1450 WHTC AM radio Wednesday Afternoons from 4:30 to 5:00pm EST. Call in with your questions at 616-395-1450 during that time for free advice on your computer, or email computerguys@whtc.com. It's a half hour a week of tech talk and everyday life from Dave and Kevin of Macatawa Technologies in Holland, MI.
 
P
Paul's Security Weekly
Weekly+
 
For the latest in computer security news, hacking, and research! We sit around, drink cocktails, and talk security.
 
V
Virtualization Security Roundtable
 
The Virtualization Security Round Table Podcast provides an open forum to discuss all things related to Virtualization, Virtual Environment, and Cloud Computing Security. The podcast is hosted by Talkshoe, with the after podcast write-ups and notes are hosted on The Virtualization Practice (http://www.virtualizationpractice.com)This Podcast was created using www.talkshoe.com
 
D
Digital Detectives
Monthly
 
Hosted by two leaders in the cyber-security industry, Sharon D. Nelson, Esq. and John W. Simek, Digital Detectives is for listeners who are interested in digital forensics, e-discovery, and information security issues. Nelson and Simek invite digital forensic and computer security experts to enlighten listeners on the latest technology, cyber threats, and necessary security measures to keep online data secure.
 
B
BizSec Podcast
Monthly
 
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
 
G
Going Linux
Monthly+
 
Once you become aware that there is a dependable, secure, capable, and modern computer system that rivals all others in popularity and actual use, you will want to try the Linux operating system on your computer. Perhaps you've been using a member of the Unix/Linux family - Linux, Android, ChromeOS, BSD or even OSX - for quite a while. If so, you are likely looking for new ways to optimize your technology for the way you work. Going Linux is for computer users who just want to use Linux to g ...
 
P
PaulDotCom Espanol
Rare
 
For the latest in computer security news, hacking, and research in Spanish!
 
M
McAfee's 2Minute Warning ™ Daily Security Briefing
 
A daily news service that keeps you up-to-date on security issues, new threats and steps to defend networks against cyber attacks
 
W
Whitelist - The BCS Security Podcast
 
Whitelist is the BCS security podcast covering the latest security issues with expert analysis
 
S
SAHAsays
Monthly+
 
SAHAsays is an Information Security related commentary program that pulls from recent headlines around the web. We offer four distinct voices from the Computer Security community: applied business, a software reverse engineer, a doctoral seeking, practicing academic, and the journeyman getting in the front door in the industry. These "voices" may represent our general perspectives, but we're all friends who meet at the San Antonio Hacker's Association (SAHA) on the 6th of every month at the ...
 
N
Network Broadcast Storm
Monthly
 
Information Technology podcast around computing, networking and security
 
S
Security Conversations - A SecurityWeek Podcast
 
Ryan Naraine is the host of the SecurityWeek podcast series "Security Conversations". He is the head of Kaspersky Lab's Global Research & Analysis team in the USA and has extensive experience in computer security user education, specializing in operating system and third-party application vulnerabilities, zero-day attacks, social engineering and social networking threats.
 
B
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
 
B
Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
Loading …
show series
 
In this episode we talk about how Capterra can help you find the right software solution to manage your business. BBP : Episode 56 - Capterra Tech News Windows 10 Fall Creators Update released on Oct 17 As always, running updates has certain risks, as talked about on last week's podcastMake sure you have plenty of time to run the updates, possi ...…
 
Http://RichardChancy.com/Register Don’t forget to Subscribe to Recurring Revenue Radio Host: Richard Chancy Questions? http://RichardChancy.com/askme About Kim Ades Kim Ades is president and founder of Frame of Mind Coaching and JournalEngineTM Software. Author, speaker, entrepreneur, coach, and mother of 5, Kim is one of North America's foremo ...…
 
We’ve already talked quite a bit about the Algorithms, Machines, and People lab at U.C. Berkeley (AMPLab) — all about making sense of big data — so what happens when the entire world moves towards artificial intelligence — and the need to make intelligent decisions on that data? That’s where the new RISElab (Real-time Intelligence Secure Execut ...…
 
In the first of a two-part interview, activist and author Cory Doctorow explains how copyright law has failed to keep up with the realities of the modern digital world, potentially exposing consumers and researchers to crushing lawsuits and generally stifling innovation. Unlike physical books and LP records, every song or movie you stream, ever ...…
 
Welcome, to the fifth installment of the podcast of the film of the book of the story of the idea of the matchbook cover of the cafe by the same name! It's history, cave man style, photography, iPhone style, silhouettes, wild animal style, and Leonardo, Vinci style. Plus, a short conversation after a long drive and the host's son says some nice ...…
 
W
WELSTech Video
 
This week on WELSTech, as part of our month of video for ministry focus, we look at all the many tools available for editing video. For us geeks the tech behind video is as much fun as seeing the content spring to life. There are tools for beginners and pros, those who use PCs and Macs, those who prefer working on tablets or Chromebooks. Martin ...…
 
W
WashingTECH Tech Policy Podcast with Joe Miller
 
Bio Karan Chopra (@karchopra) a is Executive Vice President and Co-Founder of Opportunity@Work, where he provides leadership on strategic direction and execution of Opportunity@Work’s priorities and the TechHire initiative. He co-founded Opportunity@Work because he believes that meaningful work is not just a matter of economic wellbeing but of ...…
 
Auction professionals spend a lot of time working on their laptops and never know when disaster might strike. In this episode, host Aaron Traffas looks at preventative measures that can save both time and stress when, not if, a computer is broken or stolen. Subscribe on iTunes | Google Play | Stitcher Today’s SponsorsGlobal Auction Guide Episod ...…
 
Dave Balzer and Pat Toner sat down for an interview with Warner Moore at DogFoodCon in Columbus, Ohio. Warner Moore is a driven technology leader and architect with a background in web operations and information security. He has focused his career in working with high growth organizations where technology is their business and product. Within t ...…
 
It's been 40 years since Apple introduced the Apple II, a computer that remained in production until 1993. In June, frustration with a OneNote synchronization problem drove me to Evernote. Now Evernote's flaws have driven me back to OneNote. I'll explain. In Short Circuits: Google announced a bunch of new hardware this week and artificial intel ...…
 
Both Segments: Mike Cermak. Owner/Operator, Techguy.orgMike Cermak is the owner and operator of Techguy.org. Computer America’s recommended forum for computers and troubleshooting. Check it out if you have any need of help or would like to discuss topics related to technology. Forums for anything and everything computer related.Tune in today as ...…
 
Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robu ...…
 
SEC Investigation into the DAO’s Initial Cryptocurrency Offering (ICO)- On July 25, 2017, the SEC issued its Report on an investigation into an ICO and related activities by the DAO, an unincorporated entity, Slock.it UG, a German corporation, and various principals and participants. Although the report provides a platform for which the SEC can ...…
 
Gears learned that his Camaro has a unique and dangerous onboard computing AI during his trip to Chicago. But there was more mystery over the person who modified his car, and what he was trying to accomplish. The AI may also have some form of consciousness. Or, according to the records he’s found, the car may actually be possessed after all. >> ...…
 
Highlights from Microsoft Ignite 2017 roundup with guests Chris Jackson (Microsoft), Richard Hay (Winsupersite) and Freddy Fuentes (O-I) joining host Paul Spain. Including keynote highlights, Microsoft 365, Quantum Computing and Cyber Security.By paul@gorilla.co.nz (Paul Spain).
 
T
Tech Narratives Podcast
 
This is Episode 67 of the Tech Narratives Podcast, for September 29, 2017.If you're enjoying the podcast, you might also enjoy a subscription to the Tech Narratives site just as much (or possibly even more). There's a 30-day free trial, and after that it's $10/month. You can read more about what a subscription gets you at www.technarratives.com ...…
 
Part 1From smartphones & tablets, to dealing with malware & protecting your privacy, our resident expert, Fevzi Turkalp has all the tech advice you need to choose the best tech for your needs & keep your existing gadgets running smoothly. In this week’s tech phone-in, Fevzi advises listeners on… ○ Converting Hi8 video tapes○ Choosing a non-smar ...…
 
Part 2From smartphones & tablets, to dealing with malware & protecting your privacy, our resident expert, Fevzi Turkalp has all the tech advice you need to choose the best tech for your needs & keep your existing gadgets running smoothly. In this week’s tech phone-in, Fevzi advises listeners on… ○ Converting Hi8 video tapes○ Choosing a non-smar ...…
 
W
Watershed Cleveland
 
Photos: Seth Beattie, Justin Glanville, Angie Hayes A little more than two years ago, I moved into the Buckeye neighborhood for a month. The idea was to get an on-the-ground view of the place. Hear its everyday sounds, see its everyday sights. And talk to as many people as I could about their neighborhood and what they wanted for its future. Re ...…
 
AI Today Podcast #004 – Guest Expert: James Barrat author of “Our Final Invention: Artificial Intelligence and the End of the Human Era”. Show Notes: On today’s show we interview James Barrat, author of “Our Final Invention: Artificial Intelligence and the End of the Human Era”. We discuss why James wrote this book 3 years ago now, how far away ...…
 
M
Mercury Broadcasting
 
sign up at https://www.ssa.gov/myaccount/ Janet van Duinwyk Three weeks ago my HP 8710 printer was happily printing my reports and then it abruptly stopped. I tried rebooting but that didn’t help. 2 days ago I turned on my computer and my printer started spitting out reports. What happened and how do I fix it if it happens again? Andy Toth When ...…
 
T
Technology News Related Podcast on the Tech Podcast Network
 
Looks like a major Zero Day Bug for the new Mac OS and all prior versions. The safety net of running a mac is less secure today than it ever has been and you need to be careful out there. Those that live with a false sense of safety are in for a big surprise at some point. You have heard me talk about proximity beacons. I know now how to do it ...…
 
Looks like a major Zero Day Bug for the new Mac OS and all prior versions. The safety net of running a mac is less secure today than it ever has been and you need to be careful out there. Those that live with a false sense of safety are in for a big surprise at some point. You have heard me talk about proximity beacons. I know now how to do it ...…
 
Looks like a major Zero Day Bug for the new Mac OS and all prior versions. The safety net of running a mac is less secure today than it ever has been and you need to be careful out there. Those that live with a false sense of safety are in for a big surprise at some point. You have heard me talk about proximity beacons. I know now how to do it ...…
 
T
Tech News Today (Video-LO)
 
Another company in charge of protecting our valuable personal information reports that they've been hacked. Deloitte, dedicated to auditing, risk management and tax related services, says a cyberattack has exposed some customer information including passwords and personal emails from the company's blue chip clients. Microsoft says its new progr ...…
 
T
Tech News Weekly (Video-HD)
 
Another company in charge of protecting our valuable personal information reports that they've been hacked. Deloitte, dedicated to auditing, risk management and tax related services, says a cyberattack has exposed some customer information including passwords and personal emails from the company's blue chip clients. Microsoft says its new progr ...…
 
The cloud-based practice management software, Clio, was launched nine years ago. During the fifth annual Clio Cloud conference, Clio CEO Jack Newton introduced in his keynote speech new projects and a future philosophical roadmap for the software, the company, and the way lawyers practice law. In this report from On the Road, Bob Ambrogi interv ...…
 
C
College Football Fantasy Show
 
September 25, 2017: College Football Show: A RotoViz Podcast covering everything related to football on Saturdays. If you’re a listener of the show who isn’t subscribing yet to RotoViz, you can get a special 30% discount through the podcast homepage. HOSTS: Kyle Pollock (@KylePollockFF), contributor to RotoViz and Dynasty League Football Jordan ...…
 
If anyone can bridge the gap between technology and health, it just might be Amy Abernethy, oncologist and technologist, who has led the charge, first at Duke and now at Flatiron, for rethinking the way we collect and analyze clinical information. Born in Houston and raised by her mom in Orlando, Amy learned math by helping her mom write a text ...…
 
If anyone can bridge the gap between technology and health, it just might be Amy Abernethy, oncologist and technologist, who has led the charge, first at Duke and now at Flatiron, for rethinking the way we collect and analyze clinical information. Born in Houston and raised by her mom in Orlando, Amy learned math by helping her mom write a text ...…
 
Today's Flash Back Friday comes from Episode 111, October 2012. We have all had the experience of being taken advantage of at some point in our life. Con artists are often very friendly and charming. Jason Hartman is joined by author, Chris Hadnagy to discuss social engineering and framing, and how it relates to personal, business and national ...…
 
T
The Tech Fugitives Show
 
Welcome back to the Tech Fugitives podcast. Today Kyle and Mark talk about “Cleaners”, Sharks, Horses, and Pigs, well Bacon….but you get the idea. Everything tastes better when it’s wrapped in bacon…You’ll see! Snatch was wrong…It wasn’t zee Germans. It was zee Russians & Zuck! Now $100 Thousand Dollars is a LOT of money. But if you’re a Russia ...…
 
Over a billion people communicate through [f500link]Facebook[/f500link] Messenger every day. While Facebook says it takes measures to keep users' information private, how secure are those billions of messages really? Here, Facebook shares information on how some of its security works, while Vyas Sekar, a faculty member of CyLab at Carnegie Melo ...…
 
Over a billion people communicate through [f500link]Facebook[/f500link] Messenger every day. While Facebook says it takes measures to keep users' information private, how secure are those billions of messages really? Here, Facebook shares information on how some of its security works, while Vyas Sekar, a faculty member of CyLab at Carnegie Melo ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login