show episodes
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Every week on the DirtySecurity Podcast, we chat with Cylance’s best and brightest about what is happening in the world of cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center.
 
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
T
Tech Pulse

1
Tech Pulse

Tech Pulse Podcasters

Unsubscribe
Unsubscribe
Monthly
 
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
 
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you! Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: @NakedSecurity Instagram: @NakedSecurity
 
Intrusion Diversity System (IDS) is a Cyber Security podcast hosted by O'Shea Bowens, Doug Bryant Jr and Sienna Delvasto. Doug, O'Shea and Sienna weigh in on their experiences as minorities within the Cyber Security space. By telling stories, sharing experiences, giving career advice and demonstrating security tips, tricks & tools O'Shea, Doug, and Sienna hope to inspire others to see how exciting and valuable a career in Cyber Security could be.
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
Loading …
show series
 
An apparent cyberespionage campaign targets the Iranian diaspora. Babadeda is an emerging crypter seeing use against alt-coin and NFt speculators. RATDispenser is out in the wild, a malware-as-a-service operation. Proofs-of-concept published for Microsoft exploits. Apple sues NSO Group. Group-IB’s founder asks President Putin for clemency. Caleb Ba…
 
A reply-chain incident is reported at a major international furniture and housewares retailer. North Korean operators are phishing for South Korean marks using bogus Samsung recruiting emails as phishbait. Fancy Bear has been seen pawing at Gmail. A regional escalation to civilian targets in the cyber conflict between Iran and Israel. More organiza…
 
Giving Thanks For Jill's Treasure Hunt | Destination Linux 254 This week’s episode of Destination Linux, we are going on a TREASURE HUNT in Jill's Computer Museum because the community's most loved segment is back! Then we're going to discuss iconic open-source software. Plus we've also got our famous tips, tricks and software picks. All of this an…
 
Today we’re joined by Shayan Mortazavi, a data science manager at Accenture. In our conversation with Shayan, we discuss his talk from the recent SigOpt HPC & AI Summit, titled A Novel Framework Predictive Maintenance Using Dl and Reliability Engineering. In the talk, Shayan proposes a novel deep learning-based approach for prognosis prediction of …
 
Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. She began her career and remains at Raytheo…
 
Enjoy a peek into CyberWire Pro's Research Briefing as the team is off recovering from our Thanksgiving feasts. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: Iranian threat actors target the IT supply chain. North Korean …
 
Enjoy a peek into CyberWire Pro's Research Briefing as the team is off recovering from our Thanksgiving feasts. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: Iranian threat actors target the IT supply chain. North Korean …
 
Our team decided to extend our Thanksgiving holiday and thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalist…
 
The folks from The Checklist and SecureMac are spending time with family this week, and yet - we’d still like to be of service. So, we’ve gone back and gathered a few shows that seem ripe for these traveling/shopping/spending time with family days. Find them all in the notes for this week’s show: SecureMac.com/Checklist And get in touch with us: Ch…
 
Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Human…
 
Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Human…
 
Cybercsecurity tips for the holiday season and beyond. Exchange at risk from public exploit. GoDaddy loses passwords for 1.2m users. Longest-lived Windows version ever. Don't make your cookies public. And the day that umbrellas became an anti-DDoS tool. Original music by Edith Mudge Got questions/suggestions/stories to share? Email tips@sophos.com …
 
Cybersecurity tips for the holiday season and beyond. Exchange at risk from public exploit. GoDaddy loses passwords for 1.2m users. Longest-lived Windows version ever. Don't make your cookies public. And the day that umbrellas became an anti-DDoS tool.https://nakedsecurity.sophos.com/black-friday-and-cyber-monday-heres-whathttps://nakedsecurity.sop…
 
Today we’re joined by friend-of-the-show Nasrin Mostafazadeh, co-founder of Verneek. Though Verneek is still in stealth, Nasrin was gracious enough to share a bit about the company, including their goal of enabling anyone to make data-informed decisions without the need for a technical background, through the use of innovative human-machine interfa…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login