Best data security breach podcasts we could find (Updated July 2017)
Related podcasts: Business Tech Society Defcon Breach Malware Data Network Hack Cyber Risk Virus Computer Management Security Hacking Software Development Trading Information Culture  
Data security breach public [search 0]
show episodes
 
T
The Standard Deviant Security Podcast | Bi-weekly show discussing cyber attacks, data breaches, malware, privacy issues, Internet culture and infosec
 
Are you ready for a completely different kind of information security podcast? The Standard Deviant Security Podcast is a bi-weekly show that takes an in-depth look at the people behind the cyber security stories you hear in the news. Each episode cuts through the noise and hype to deliver compelling and entertaining interviews with people that are challenging the status quo. Hosted by Tony Martin-Vegue -- www.thestandarddeviant.com
 
S
Solomon Success » Podcast
Monthly
 
The Solomon Success podcast is dedicated to the timeless wisdom of King Solomon and the Book of Proverbs in order to maximize one’s business and life. To our advantage, we can find King Solomon’s financial strategies in addition to many life philosophies documented in biblical scriptures. Focusing on these enduring fundamentals of success allows us to bypass the “get-rich-quick” schemes that cause many to stumble on their journey toward success. Our concern is not only spiritual in nature, b ...
 
V
Veritas News Network - Truth is Trending
 
Truth is trending on the Veritas News Network! VNN is an online publication featuring the news and is dedicated to in-depth investigative reporting with a consumer advocacy focus. Our Managing Editor is a veteran investigative journalist who has won dozens of awards. Several categories of news are featured on the Veritas News Network include Citizen Journalism, Consumer News, Ripoffs & Scams, Consumer Advocacy, World News, US News, Crime, Economic News, Editorial & Opinion, Education, Health ...
 
Loading …
show series
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Oracle Quarterly Critical Patch Update http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html Cisco WebEx Plugin Update https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex https://bugs.chromium.org/p/project-zero/issues/detail?id=1324&desc=2 Node.JS DoS Vulnerability https:// ...…
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Oracle Quarterly Critical Patch Update http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html Cisco WebEx Plugin Update https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex https://bugs.chromium.org/p/project-zero/issues/detail?id=1324&desc=2 Node.JS DoS Vulnerability https:// ...…
 
Erik and Bob tackle your computer questions. Erik and Bob explain Net Neutrality and what it means to you. Microsoft aims to improve rural Internet connectivity. Breach of Verizon data exposes millions of customer records. How to determine what security software (e.g., K9 Web Protection) is running on your computer. Setting up OpenDNS service i ...…
 
Erik and Bob tackle your computer questions. Erik and Bob explain Net Neutrality and what it means to you. Microsoft aims to improve rural Internet connectivity. Breach of Verizon data exposes millions of customer records. How to determine what security software (e.g., K9 Web Protection) is running on your computer. Setting up OpenDNS service i ...…
 
Chris Wray got a few tough questions, but Senate, again, is ready to confirm an FBI director without real examination….--lawmakers seem committed to let FBI continue to operate above the law; in our interview later in the hour, Bill Binney notes that one appeals court has ruled that FBI national security letters are illegal --transcript of Trum ...…
 
D
Data Doctors Tech Tips
 
Passwords are still likely to be the weakest link in your security and you have heard me constantly warn against using the same password everwhere online. While there's no shortage of options for password management, it can just be too much to manage for some of you. If you can't find a password management tool that works for you, I have a real ...…
 
W
WackSec Radio
 
Medicare to Be Reviewed After Recent Data Breach Medicare hack http://www.securityweek.com/sites/default/files/images/OWASP_Top10.jpg Avanti, a Self-Service Food Kiosk Vendor, Is Hacked Self service food vendor hack Reports Indicate up to 12 US Nuclear power plants were breached by Hackers Nuclear power plants breached Talk about amazon prime d ...…
 
With the 2017 RSA Asia Pacific and Japan Conference set to kick off in Singapore in just two weeks, now is the perfect time to take a look at the threat landscape in the Association of Southeast Asian Nations (ASEAN).In this podcast, IBM Executive Security Advisor Diana Kelley talks with Security Sales Specialist Liang Yang Loi about the securi ...…
 
dynamoDB auto-scaling dynamic dynamoDB aws docs on dynamo throughput changes james gosling @ AWS mary meeker internet trends 2017 Spinnaker onelogin security breach AWS credentials netflix aardvark and repokid nvth public EBS volumes chirp alexa integration alexa talking to google washington post audio articles aws chalice release 0.9.0 w/ bina ...…
 
R
RPPR Actual Play
 
A remote hypercorp research facility buried under the surface of Mars holds dark secrets and Firewall wants to know what they are. Before a team of sentinels can enter the base though, a Firewall hacker must open the door for them. The hacker has enlisted the aid of several random egos stored in the facility’s system as a last ditch effort to b ...…
 
YOU LOCK YOUR front door. You mash the button on your car’s key fob until the alarm beeps. You even have some overbearing anti­virus software making your computer run slower. But you probably don’t think about whether anyone’s trying to get into your phone.You should: It’s a gold mine of data, passwords, and secrets, all on the other side of a ...…
 
When something like this happens there can be a lot of panic the results. Today I wanted to clearly lay out what happened here, the circumstances that allowed it to happen and then give you some reassurance that these stories do not mean cryptocurrencies themselves are not secure. **Win a free copy of The Secrets Of The Bitcoin Triangle course ...…
 
T
The Future of Data Podcast | conversation with leaders, influencers, and change makers in the World of Data & Analytics
 
The security challenges of a particular business may often be proportional to the amount of data they need to capture, process, and interpret. As businesses grow their security needs become ever more complex and challenging as the volume, velocity, and variety of data increases. Forward thinking organizations using data science to better proces ...…
 
C
Contractor Success Map with Randal DeHart | Contractor Bookkeeping And Accounting Services
 
This Podcast Is Episode Number 0223 And It Will Be About Contractors Are In The Business Of Being In Business As A Contractor You Are Either Getting Paid, Paying Someone Or Both Contracting Is All About The Money And Taxes Which is better for you, Employees or 1099 Contractors? In the world of the State and Federal Agencies. Someone who works f ...…
 
What is hacking? Before listening to this podcast We recommend changing your email, banking & Apple ID passwords if you use them for anything else. Use a password generator to make unique, random new ones for each login. These accounts are central to unlocking your online life. Ideally never use duplicate passwords. Nothing is perfect, but let' ...…
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Catching up With Blank Slate https://isc.sans.edu/forums/diary/Catching+up+with+Blank+Slate+a+malspam+campaign+still+going+strong/22570/ Azure AD Connect Vulnerability https://technet.microsoft.com/library/security/4033453.aspx#ID0EN Exploit Available For Stack Clash Vulnerability https://www.qualys.com/research/security-advisories/ Paul Hersch ...…
 
S
SANS Internet Storm Center Daily Network/Cyber Security and Information Security Podcast
 
Catching up With Blank Slate https://isc.sans.edu/forums/diary/Catching+up+with+Blank+Slate+a+malspam+campaign+still+going+strong/22570/ Azure AD Connect Vulnerability https://technet.microsoft.com/library/security/4033453.aspx#ID0EN Exploit Available For Stack Clash Vulnerability https://www.qualys.com/research/security-advisories/ Paul Hersch ...…
 
As a real estate agent I see emails all the time that are from fake title companies asking me to open an attachment. I also see emails from fake agents or buyers asking me to open attachments as well. I am usually smart enough to spot the fake emails, but some can seem very real or even appear to be from someone I know. It is pretty easy for so ...…
 
M
Mike Fabarez Sermons on Focal Point
 
Pastor’s Note Job finds no comfort in his counselors who have wrongly diagnosed his situation and offered several inapplicable words. I trust this gives us pause when we consider how we speak to those who are suffering. Of course there are times that Eliphaz’ counsel may be just what is needed, but knowing when it is, and when it’s not, require ...…
 
M
Mike Fabarez Sermons on Focal Point
 
Pastor’s Note Job finds no comfort in his counselors who have wrongly diagnosed his situation and offered several inapplicable words. I trust this gives us pause when we consider how we speak to those who are suffering. Of course there are times that Eliphaz’ counsel may be just what is needed, but knowing when it is, and when it’s not, require ...…
 
Data is to our age as steam was to the industrial revolution, just rather more intimate as, in extremis, your data reveals you and your life. It needs to be kept secure and it needs to be kept private – few of us would be happy with a world where all our records were available. But what is privacy? Philosophically, politically, practically and ...…
 
Earlier this year, our neighbours down south were affected by a data breach at the Ministry of Defence in Singapore, executed by breaching the web-connected computer terminals, and together with the recent WannaCry episode, it has left enterprises in the region wondering about their organisation’s security. Building a zero-day threat defence is ...…
 
Earlier this year, our neighbours down south were affected by a data breach at the Ministry of Defence in Singapore, executed by breaching the web-connected computer terminals, and together with the recent WannaCry episode, it has left enterprises in the region wondering about their organisation’s security. Building a zero-day threat defence is ...…
 
In this episode We have a whole host of hosts as David, Jason, Simon and Aden are joined by Mariano Belinky and Jamie Campbell for the news. This week in a European-led section of the show the team discuss Swedish giant Klarna getting it’s official banking licence to begin delivering financial services, Spain’s first fully digital bank, Europea ...…
 
"If you exist on the Internet today, you are a target." This is the unfortunate but critical lesson that podcast guests Paul Ferrillo and Chris Veltsos draw from the present landscape of cyberattacks, including WannaCry in May and the exposure of a U.S. voter database even more recently.Cybercrime is now a full-fledged industry and, like any ot ...…
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
http://securityaffairs.co/wordpress/60243/data-breach/dra-data-leak.html https://www.wired.com/story/crash-override-malware/ https://threatpost.com/fin10-extorting-canadian-mining-companies-casinos/126382/ http://variety.com/2017/digital/features/netflix-orange-is-the-new-black-leak-dark-overlord-larson-studios-1202471400/amp/ https://arstechni ...…
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
http://securityaffairs.co/wordpress/60243/data-breach/dra-data-leak.html https://www.wired.com/story/crash-override-malware/ https://threatpost.com/fin10-extorting-canadian-mining-companies-casinos/126382/ http://variety.com/2017/digital/features/netflix-orange-is-the-new-black-leak-dark-overlord-larson-studios-1202471400/amp/ https://arstechni ...…
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
http://securityaffairs.co/wordpress/60243/data-breach/dra-data-leak.html https://www.wired.com/story/crash-override-malware/ https://threatpost.com/fin10-extorting-canadian-mining-companies-casinos/126382/ http://variety.com/2017/digital/features/netflix-orange-is-the-new-black-leak-dark-overlord-larson-studios-1202471400/amp/ https://arstechni ...…
 
Our guest, Ellen Nakashima, was coauthor of a Washington Post article that truly is a first draft of history, though not a chapter the Obama administration is likely to be proud of. She and Greg Miller and Adam Entous chronicle the story of Russia’s information operations attack on the 2016 presidential election. Want to know how it feels to ha ...…
 
S
Steptoe Cyberlaw Podcast
 
In our 171th episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, Maury Shenk, Jon Sallet, and Jennifer Quinn-Barabanov discuss: new developments in breach law; Justice Kennedy's gassy ode to the "Cyber Age"; DOJ's merger authority growing firmer?; Germany authorizes law enforcement hacking; Germany also admits spying on the U ...…
 
S
Steptoe Cyberlaw Podcast
 
In our 171th episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, Maury Shenk, Jon Sallet, and Jennifer Quinn-Barabanov discuss: new developments in breach law; Justice Kennedy's gassy ode to the "Cyber Age"; DOJ's merger authority growing firmer?; Germany authorizes law enforcement hacking; Germany also admits spying on the U ...…
 
Another security breach exposes the data of 200 million Americans, Uber’s embattled CEO finally resigns after a shareholder revolt; Leaked Samsung Galaxy Note 8 images reveal stunning new design; You’ll be shocked by how huge this 4K TV is – and it comes with a hefty price tag; A parent group in Colorado wants to ban smartphones from anyone und ...…
 
In this episode of The Florida Bar Podcast from the 2017 Annual Florida Bar Convention, hosts Christine Bilbrey and Jonathon Israel talk to Lawrence Kunin and Serge Jorgensen about data security breaches and the legal implications of such a breach. They also discuss the ethical obligations of an attorney in regards to data security, as well as ...…
 
Troy Hunt is a web security guru, Microsoft Regional Director, and author whose security work has appeared in Forbes, Time Magazine and Mashable. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications. In this podcast, we discuss the challenges of the industry, learn about his perspective ...…
 
198 million us voters data has been exposed, the US warns of north korean cyberattacks, a hacker pleads guilty to attacks on military, and the CIA hacks routers with CherryBlossom. All that coming up now on Threat Wire. ------------------------------- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www. ...…
 
Organizations can take steps in advance to help ensure that forensic investigations into data breaches and cyberattacks are successful, says security expert John "Drew" Hamilton, a professor at Mississippi State University.
 
Organizations can take steps in advance to help ensure that forensic investigations into data breaches and cyberattacks are successful, says security expert John "Drew" Hamilton, a professor at Mississippi State University.
 
Organizations can take steps in advance to help ensure that forensic investigations into data breaches and cyberattacks are successful, says security expert John "Drew" Hamilton, a professor at Mississippi State University.
 
Organizations can take steps in advance to help ensure that forensic investigations into data breaches and cyberattacks are successful, says security expert John "Drew" Hamilton, a professor at Mississippi State University.
 
Organizations can take steps in advance to help ensure that forensic investigations into data breaches and cyberattacks are successful, says security expert John "Drew" Hamilton, a professor at Mississippi State University.
 
Organizations can take steps in advance to help ensure that forensic investigations into data breaches and cyberattacks are successful, says security expert John "Drew" Hamilton, a professor at Mississippi State University.
 
Data breaches will continue to plague the healthcare sector until the security mindset among senior leadership radically changes, says security and privacy expert Kate Borten.
 
Data breaches will continue to plague the healthcare sector until the security mindset among senior leadership radically changes, says security and privacy expert Kate Borten.
 
Data breaches will continue to plague the healthcare sector until the security mindset among senior leadership radically changes, says security and privacy expert Kate Borten.
 
Data breaches will continue to plague the healthcare sector until the security mindset among senior leadership radically changes, says security and privacy expert Kate Borten.
 
Data breaches will continue to plague the healthcare sector until the security mindset among senior leadership radically changes, says security and privacy expert Kate Borten.
 
I
It's When Not If - 21st Century Resilience & Strategic Crisis Management
 
In this episode I review Warnings: Finding Cassandras to Stop Catastrophes In Greek mythology Cassandra foresaw calamities, but was cursed by the gods to be ignored. Modern-day Cassandras clearly predicted the disasters of Katrina, Fukushima, the Great Recession, the rise of ISIS, and many more. Like the mythological Cassandra, they were ignore ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login