Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Classic tales of supernatural horror and suspense are brought to life in this series of audiobooks featuring the works of E.F.Benson, Saki, H.P. Lovecraft, Bram Stoker, and more. Fans of the creepiest, spookiest podcasts will thrill to the immersive retellings of these nightmarish short stories from the vaults of terror, complete with compelling narration, sound effects and music. As told by the mysterious Jasper L'Estrange, EnCrypted: The Classic Horror Podcast is your new home for scary st ...
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
Music and Words but mostly Bass.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
Welcome to Uncanny Valley—an insider look at the people, power, and influence of Silicon Valley. Join hosts Lauren Goode, Michael Calore, and Zoë Schiffer as they break down new stories or phenomena bubbling up in Silicon Valley. Whether it’s a pivotal decision made inside a tech company, a quirky, new habit of a CEO, or the overwhelming expansion of generative AI, we’ll explain why these matter and how they affect you. Share your thoughts on Uncanny Valley. As a token of our appreciation, y ...
…
continue reading
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
…
continue reading
The officially unofficial podcast for Mr. Robot on USA. Each week we hack into the episode with a full recap and listener feedback.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
⭐A Home For Copyright Free EDM. 🎉www.outertone.com 🤖https://discord.gg/outertone 💿https://www.labelradar.com/labels/outertone/portal
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
…
continue reading
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
The history of the universe, brought to you by Persistence of Vision Publishing. With your hosts L.B. Deyo and Lance ”Fever” Myers.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
A weekly Bitcoin podcast focused on mining, energy, and proof-of-work - hosted by Rod @bitkite and @econoalchemist
…
continue reading
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Visiting her twin sister at her new home in the isolated backwater of Thrubend Edge, a woman becomes drawn into a sinister web of madness and local folklore.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “SHUCK” by Rebecca Lloyd (2008). Read by permission of the author. For more information about Rebecca…
…
continue reading
1
How Zama Plans to Encrypt the Internet End-to-End w/ Fully Homomorphic Encryption! | Enginears Podcast
26:29
26:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:29
If you're keen to share your story, please reach out to us! Guest: https://www.linkedin.com/in/agnes-leroy/ https://jobs.zama.ai/ Powered by Artifeks! https://www.linkedin.com/company/artifeksrecruitment https://www.artifeks.co.uk https://www.linkedin.com/in/agilerecruiter LinkedIn: https://www.linkedin.com/company/enginearsio Twitter: https://x.co…
…
continue reading
1
SN 998: The Endless Journey to IPv6 - AI-Driven Encryption, Session Messenger, IPv6
2:53:56
2:53:56
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:53:56
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerl…
…
continue reading
1
Encrypted - Radiance [Outertone Release]
4:41
4:41
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
4:41
Encrypted - Radiance is out now on all streaming platforms: https://push.fm/fl/enradianceFollow Outertone for new music, news & more: https://push.fm/fl/outertoneJoin us on Discord: https://discord.gg/outertone▼ Follow Encrypted:Spotify: https://open.spotify.com/artist/1wjNROnnq1Edjvmwh56LOVInstagram: https://www.instagram.com/encrypted.music/Sound…
…
continue reading
1
Our Current Hardware Architectures Are Often Not Fit For a World of ML and Homomorphic Encryption
3:48
3:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
3:48
Article: https://medium.com/asecuritysite-when-bob-met-alice/our-current-hardware-architectures-are-often-not-fit-for-a-world-of-ml-and-homomorphic-encryption-1df5a4a45a4dעל ידי Prof Bill Buchanan OBE FRSE
…
continue reading
1
Enter the matrix: How to run an encrypted communications platform
53:21
53:21
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
53:21
This week we're talking to Matthew Hodgson, one of the founders of Matrix - a network for secure, decentralised communication, and CEO/CTO of Element - a communications platform built using Matrix, about the regulatory environment matrix lives in, the difficulty of and the passion for interoperable communications at matrix, and the complications of…
…
continue reading
Enjoy this Word Notes encore. The process of converting plain text into an unrecognizable form or secret code to hide its true meaning. Learn more about your ad choices. Visit megaphone.fm/adchoicesעל ידי N2K Networks
…
continue reading
1
7. Encrypted History: The Indus Valley and Minoan Civilizations
52:00
52:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
52:00
The Indus Valley Civilization and the Minoan Civilization were both highly advanced, highly influential nations of the ancient world, yet our knowledge of them is obscured by our inability to decipher their writing systems (Indus Valley Script and Linear A). Hear Lance Fever Myers, William Gold, and L.B. Deyo struggle to draw deep knowledge from li…
…
continue reading
1
secure access service edge (SASE) (noun)
8:25
8:25
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
8:25
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
Episode 100: Quantum Milestones – Majorana Fermions, Cold Fusion, and Industry Game-Changers
45:07
45:07
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
45:07
EPISODE 100! In this milestone episode, Patrick and Ciprian are thrilled to welcome back Richard Campbell for a fascinating discussion that dives deep into the world of quantum advancements and scientific exploration. Together, they explore the mysterious Majorana Fermion, the allure of Cold Fusion, the lessons from refuted papers, and the solution…
…
continue reading
1
Soundstorm - SUBLIMINAL [Outertone Release]
3:28
3:28
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
3:28
Soundstorm - SUBLIMINAL is out now on all streaming platforms: https://push.fm/fl/sssubliminalFollow Outertone for new music, news & more: https://push.fm/fl/outertoneJoin us on Discord: https://discord.gg/outertone▼ Follow SOUNDSTORM:Spotify: https://open.spotify.com/artist/2Jt9b6rDdlnViRGOGp0ypSYouTube: https://www.youtube.com/@realsoundstorm/Sou…
…
continue reading
1
Static Analysis, LLMs, and In-The-Wild Exploit Chains
1:22:02
1:22:02
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:22:02
Methodology is the theme of this week's episode. We cover posts about static analysis via CodeQL, as well as a novel blackbox binary querying language called QueryX. Project Zero also leverages Large Language Models to successfully find a SQLite vulnerability. Finally, we wrap up with some discussion on Hexacon and WOOT talks, with a focus on Clem1…
…
continue reading
1
057. From Sweden to Silicon: Bitcoin's Global Journey
58:57
58:57
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
58:57
Summary: This episode was recorded in front of a live audience at Bitcoin Park on November 4, 2024. In this episode, we dive into a lively discussion with our guests who have traveled from far and wide, including a memorable visit from Calle from Sweden, who shared his insightful books on Bitcoin. We also engage in a humorous debate about the price…
…
continue reading
1
How SMEs can stay legal & efficient in the enterprise supplier network & pragmatically adopt NIS2
34:59
34:59
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
34:59
The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain?For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not re…
…
continue reading
1
Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password
13:22
13:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:22
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers responsible for major breaches. The episode also covers a notable Okta vulnerability that allowed so…
…
continue reading
1
Episode 96: Cookies & Caching with MatanBer
49:09
49:09
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
49:09
Episode 96: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with Matanber to hit some stuff we ran out of time on last episode. We talk about advanced cookie parsing techniques and exploitation methods, Safari's unique behaviors regarding cookie handling and debugging methods, and some of the writeups from the HeroCTF v6. Follo…
…
continue reading
1
Big Tech Wants You Back in the Office
35:47
35:47
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
35:47
Much of the tech workforce has become accustomed to remote or hybrid jobs over the last several years. But lately, we’ve seen big tech companies demanding their teams head back into the office. This week, we look at some of these return-to-office mandates and discuss their ripple effects. Plus, we ask the question on all of our minds: does working …
…
continue reading
1
SN 999: AI Vulnerability Discovery - RT's AI TV Hosts, Windows 10 Updates
1:53:05
1:53:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:53:05
Google's record-breaking fine by Russia. (How many 0's is that?) RT's editor-in-chief admits that their TV hosts are AI-generated. Windows 10 security updates set to end next October... or are they? When a good Chrome extension goes bad. Windows .RDP launch config files. What could possibly go wrong? Firefox 132 just received some new features. Chi…
…
continue reading
1
SN 999: AI Vulnerability Discovery - RT's AI TV Hosts, Windows 10 Updates
1:53:05
1:53:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:53:05
Google's record-breaking fine by Russia. (How many 0's is that?) RT's editor-in-chief admits that their TV hosts are AI-generated. Windows 10 security updates set to end next October... or are they? When a good Chrome extension goes bad. Windows .RDP launch config files. What could possibly go wrong? Firefox 132 just received some new features. Chi…
…
continue reading
1
Software-Defined Networking using Azure Firewall with Aidan Finn
40:05
40:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
40:05
How does Software-Defined Networking in Azure work? Richard chats with Aidan Finn about his experiences working with the suite of Azure networking products, including Firewall and Route Server. Aidan talks about the training available on Microsoft Learn to get up to speed with the power of Azure Firewall, including building policy rule sets. The co…
…
continue reading
Enjoy this encore episode. The practice of emulating known adversary behavior against an organization's actual defensive posture. Learn more about your ad choices. Visit megaphone.fm/adchoicesעל ידי N2K Networks
…
continue reading
1
How to Get the Most out of the Technology You Purchase
57:32
57:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
57:32
In this episode, host KJ Burke is joined by Adam Diallo, Senior Manager Customer Success, CDW Canada and Amanda Frank, Senior Manager Customer Success, CDW Canada to discuss how services organizations and technology providers continue to change they way they help customers, ensuring they have success throughout the full lifecycle of technology.To l…
…
continue reading
1
Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know
17:30
17:30
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
17:30
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin. We explore the implications of this significant breach and whether paying ransoms is a viable solu…
…
continue reading
1
Attacking Browser Extensions and CyberPanel
58:18
58:18
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
58:18
In this week's episode, we talk a little bit about LLMs and how they can be used with static analysis. We also cover GitHub Security Blog's post on attacking browser extensions, as well as a somewhat controversial CyberPanel Pre-Auth RCE that was disclosed. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/…
…
continue reading
https://youtu.be/CVeZfM0pVyU https://odysee.com/@NaomiBrockwell:4/Local-LLM:d AI chatbots are taking over the world. But if you want to guarantee your privacy when using them, running an LLM locally is going to be your best bet. In this video I collaborate with The Hated One to show you how, and to explain some AI terminology so that you understand…
…
continue reading
1
135: Rebuilding For the Last Time
57:29
57:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
57:29
From Nextcloud Breakup to Blissful Reunion: Chris's journey back to a smarter setup. Plus, Jellyfin's game-changing features and a beloved self-hosted app get the upgrade we've all been waiting for. Sponsored By: Tailscale: Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere.…
…
continue reading
1
Episode 95: Attacking Chrome Extensions with MatanBer - Big Impact on the Client-Side
1:56:23
1:56:23
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:56:23
Episode 95: In this episode of Critical Thinking - Bug Bounty Podcast In this episode, Justin is joined by MatanBer to delve into the intricacies of browser extensions. We talk about the structure and threat models, and cover things like service workers, extension pages, and isolated worlds. Follow us on twitter at: @ctbbpodcast We're new to this p…
…
continue reading
1
Mark Zuckerberg’s Midlife Crisis
31:40
31:40
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:40
For years, Mark Zuckerberg’s style could be summed up in a look: the hoodie. But now, he’s entered a new style era. One that involves gold chains and oversized tees of his own creation (with a little help from a high-end designer). In this episode of Uncanny Valley, we look into Zuckerberg’s style evolution, how it aligns with the future of Meta, a…
…
continue reading
1
How Xapo Bank Helps You Avoid Contributing to $484 Billion in Lost BTC! | Enginears Podcast
44:23
44:23
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
44:23
If you're keen to share your story, please reach out to us! Guest: https://www.linkedin.com/in/dziublinski/ https://www.xapobank.com/en/careers Powered by Artifeks! https://www.linkedin.com/company/artifeksrecruitment https://www.artifeks.co.uk https://www.linkedin.com/in/agilerecruiter LinkedIn: https://www.linkedin.com/company/enginearsio Twitter…
…
continue reading
1
SN 998: The Endless Journey to IPv6 - AI-Driven Encryption, Session Messenger, IPv6
2:53:56
2:53:56
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
2:53:56
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerl…
…
continue reading
1
Updating Windows on ARM with Aria Hanson
40:07
40:07
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
40:07
ARM for Windows is here in the form of the Snapdragon Copilot+ PCs - how do you update them? Richard talks with Aria Hanson about how Windows Updates treat ARM like just another Windows device - all the updates! Aria talks about the transition time with Windows 24H2 update, which has some specific Copilot+ PC features. But when looking at ARM-based…
…
continue reading