show episodes
 
Artwork
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Monthly
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
  continue reading
 
Artwork
 
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
  continue reading
 
Artwork

1
Cyber Cafe

Lesline Gilzene

Unsubscribe
Unsubscribe
Daily+
 
Embark on a riveting journey into the heart of the cybersecurity career with host Lesline Gilzene, as she immerses you in the exploration of data breaches, incident response, and captivating real-world cybercrime narratives, uncovering the thriving stories of those on the front line of digital defense.
  continue reading
 
Artwork

1
Cyber Defense Indonesia

Cyber Defense Indonesia

Unsubscribe
Unsubscribe
Monthly
 
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
  continue reading
 
Artwork

1
Garage Logic

PodMN | Hubbard Radio

Unsubscribe
Unsubscribe
Daily
 
Garage Logic is the seat of Gumption County, down the road from Diversityville, but not as far as Liberal Lakes. It's a place where common sense prevails, the 2-car garage is revered and cigar smoking is allowed (and lawyers aren't).
  continue reading
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
  continue reading
 
Artwork

1
Forensic Focus

Forensic Focus: Digital Forensics, Incident Response, DFIR

Unsubscribe
Unsubscribe
Monthly+
 
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

Unsubscribe
Unsubscribe
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

Unsubscribe
Unsubscribe
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
InSIGHT is a cybersecurity podcast from Arctic Wolf geared towards the cyber insurance, legal, and incident response communities. Hosted by Joseph Perry, Director of Education and David Kruse, Director of Insurance Alliances, the pair draw upon their years of experience within the insurance, cybersecurity, and incident response communities to share their perspective on the major issues, trends, and events impacting business leaders and practitioners in these industries.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Artwork

1
The Critical Channel

criticalchannel.io

Unsubscribe
Unsubscribe
Monthly
 
#critical, #incidents, #war-room, #sos. Every startup creates one at some point: a channel in which, whenever the fecal matter strikes the atmospheric propulsor, an attempt at coordination takes place. It's one of those ubiquitous inevitabilities of working in the tech scene today. Our very own Critical Channel, however, aims to highlight some different inevitabilities. From organisational culture in a high-growth situation, to personal mental health and work-life balance. From manipulating ...
  continue reading
 
Artwork
 
Smart Firefighting Podcast covers real-world deployments of smart technologies through conversations with technologists, innovators, companies, and forward-thinking public safety and government agencies. Learn from interviews with leaders as they share their insights and offer their expertise every week! ​ Host Kevin Sofen is a co-founding member of the Smart First Responder Community who loves to explore change management and technology in public safety.
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Artwork

1
Page it to the Limit

PagerDuty Community

Unsubscribe
Unsubscribe
Monthly+
 
Page It to the Limit is a podcast that focuses on what it means to operate software in production. Hosted by the PagerDuty Community Team, we cover the leading practices used in the software industry to improve both system reliability and the lives of the people responsible for supporting it.
  continue reading
 
Artwork

1
The 411 on 778

Local Lodge 778

Unsubscribe
Unsubscribe
Monthly+
 
A platform created by our members for our members to provide you news, education, and information within Lodge 778 and your community. To contact the Editor with ideas, questions, or comments, please email us at podcast@lodge778.org.
  continue reading
 
Artwork

1
Code4Couples

Cyndi Doyle, LPCS, NCC

Unsubscribe
Unsubscribe
Monthly+
 
Code4Couples is the premiere podcast for Law Enforcement relationships hosted by Cyndi Doyle, author of Hold the Line: The Essential Guide to Protecting Your Law Enforcement Relationship, psychotherapist, and a law enforcement spouse working to educate officers and spouse on the impact of law enforcement on their relationship for them to counter the impact and create connected and resilient relationships. She is the author and creator of Hold the Line products including a train the trainer p ...
  continue reading
 
Artwork
 
This podcast is intended for all audiences who love data science--veterans and newcomers alike, from any field, we’re all here to learn and grow our data science skills. New episodes monthly. Learn more about Klaviyo at www.klaviyo.com!
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Artwork

1
Soulful CXO Podcast

Soulful CXO, ITSPmagazine Soulful CXO, ITSPmagazine

Unsubscribe
Unsubscribe
Monthly+
 
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
  continue reading
 
Welcome to Disasterthon, the podcast where calamity takes center stage. Each episode, we dive deep into the most gripping and heart-wrenching disasters across history and around the globe. From harrowing building collapses to roller coaster tragedies, we uncover the stories behind the headlines. Join us as we explore the tumultuous world of natural disasters, oceanic accidents, and much more. Through expert interviews, survivor stories, and detailed analysis, we offer a unique perspective on ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Loading …
show series
 
As our team is offline taking an extended break for the July 4th Independence Day holiday in the US, we thought you'd enjoy an episode from one of N2K Network shows, Threat Vector. This episode of Threat Vector outlines a conversation between host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42, and Michael "Siko" Sikors…
  continue reading
 
Guests: Robin Shostack, Security Program Manager, Google Jibran Ilyas, Managing Director Incident Response, Mandiant, Google Cloud Topics: You talk about “teamwork under adverse conditions” to describe expedition behavior (EB). Could you tell us what it means? You have been involved in response to many high profile incidents, one of the ones we can…
  continue reading
 
Cybersecurity risks aren’t just a national concern. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), the CERT division’s Tracy Bills, senior cybersecurity operations researcher and team lead, and James Lord, security operations technical manager, discuss the SEI’s work developing Computer Security Incident R…
  continue reading
 
Dmitrijs Trizna, Security Researcher at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Dmitrijs explains his role at Microsoft, focusing on AI-based cyber threat detection for Kubernetes and Linux platforms. Dmitrijs explores the complex landscape of securing AI systems, focusing on the emerging challenges of Trustwor…
  continue reading
 
Artificial intelligence (AI) is having a moment… a really long moment. It’s been evolving for decades, but now it’s everywhere all at once. AI-powered digital assistants like Siri and Alexa, as well as generative AI tools like ChatGPT, Gemini and Copilot, have put AI at everyone’s fingertips, including cybercriminals.In cybersecurity, the race is o…
  continue reading
 
The UK’s NCSC highlights evolving cyberattack techniques used by Chinese state-sponsored actors.A severe cyberattack targets Frankfurt University of Applied Sciences. Russian government agencies fall under the spell of CloudSorcerer. CISA looks to Hipcheck Open Source security vulnerabilities. Avast decrypts DoNex ransomware. Neiman Marcus data bre…
  continue reading
 
All new Joe Biden theories that date back to the Easter Bunny incident of April 2022. Walz administration has found 400,000 children who are unusually hungry in the summer. Johnny Heidt with guitar news. Heard On The Show: State Trooper charged in Rochester crash that killed 18-year-old, injured others GALLERY: State Fair releases list of new foods…
  continue reading
 
Guest: Jack Leidecker, Chief Information Security Officer, Gong LinkedIn: https://www.linkedin.com/in/leidecker Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https…
  continue reading
 
Joe Soucheray and Patrick Reusse have solved one of the greatest debates of our time that has nothing to do with sports... IT'S BERYL, NOT BARREL. The Minnesota Twins remain hot. The boys know nothing about anybody from the John Deere Classic. Pat weighs in on the tragic death of Minnesota Vikings rookie, Khyree Jackson. Learn more about your ad ch…
  continue reading
 
Microsoft is phasing out Android use for employees in China. Mastodon patches a security flaw exposing private posts. OpenAI kept a previous breach close to the vest. Nearly 10 billion passwords are leaked online. A Republican senator presses CISA for more information about a January hack. A breach of the Egyptian Health Department impacts 122,000 …
  continue reading
 
7/8 It's Beryl, not Barrel. Our incompetent Minnesota Governor reaches a new low. A brief Authors Corner. With Biden it's not an age problem, it's an acuity problem. And, John Heidt news... HEARD ON THE SHOW Generational trauma??? 17-year-old jumps on AND stops runaway boat! Somali community leader on downtown fireworks issue Biden tells "Elites" t…
  continue reading
 
Guests: Mitchell Rudoll, Specialist Master, Deloitte Alex Glowacki, Senior Consultant, Deloitte Topics: The paper outlines two paths for SOCs: optimization or transformation. Can you elaborate on the key differences between these two approaches and the factors that should influence an organization's decision on which path to pursue? The paper also …
  continue reading
 
Send us a Text Message. In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget. Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security. Event log cleared: Event ID 1102 ACSC Sysmon: ht…
  continue reading
 
CEO and consultant Richard Clarke took his inspiration from President John F Kennedy and turned it into the first cybersecurity position in federal government. Determined to help change the mindset of war, Richard went to work for the Department of Defense at the Pentagon following college during the Vietnam War. From Assistant Secretary of the Sta…
  continue reading
 
Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (R…
  continue reading
 
Good morning, you're listening to Breakfast Bytes, and I'm Felicia King. Today's episode takes a deep dive into the world of artificial intelligence, offering a perspective that challenges the mainstream narrative. Instead of jumping on the AI bandwagon, we'll explore the importance of cautious engagement and risk management when dealing with this …
  continue reading
 
Blake Sawyer from Amped Software joins the Forensic Focus Podcast to discuss video and image forensics in the US. He shares insights on the challenges of working with low-quality CCTV footage and how Amped Software has grown and been adopted in the US market. The conversation delves into the role of the Scientific Working Group on Digital Evidence …
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
  continue reading
 
Sitting in the firehouse is Ex-Chief John Skelly. Born in Brooklyn, NY, in 1963, his family moved to Long Island in the early summer of 1964. John has been a lifelong resident of Uniondale for nearly 60 years, where he experienced many of his "firsts"—first friends, first school, first job, and countless cherished childhood memories. In early 2002,…
  continue reading
 
The Supreme Court overturning Chevron deference brings uncertainty to cyber regulations. Stolen credentials unmask online sex abusers. CISA updates online maritime resilience tools. Patelco Credit Union suffers a ransomware attack. Spanish and Portuguese police arrested 54 individuals involved in a vishing fraud scheme. Splunk patches critical vuln…
  continue reading
 
Loading …

Quick Reference Guide