Download the App!
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

Unsubscribe
Unsubscribe
שבועי
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Ubuntu Security Podcast

Ubuntu Security Team

Unsubscribe
Unsubscribe
חודשי+
 
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
  continue reading
 
Artwork

1
Caveat

N2K Networks

Unsubscribe
Unsubscribe
שבועי
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork
 
Bestselling author, professor and entrepreneur Scott Galloway combines business insight and analysis with provocative life and career advice. On Mondays, Prof G Markets breaks down what’s moving the capital markets, teaching the basics of financial literacy so you can build economic security. Wednesdays, during Office Hours, Scott answers your questions about business, career, and life. Thursdays, Scott has a conversation with a blue-flame thinker in the innovation economy. And Scott closes ...
  continue reading
 
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 19:00 UTC.
  continue reading
 
Artwork

1
Business Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
שבועי
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Artwork

1
Off The Wall

2600 Enterprises

Unsubscribe
Unsubscribe
שבועי
 
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Application Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
שבועי
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Artwork
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
שבועי
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

Unsubscribe
Unsubscribe
יומי
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Adam Carolla Show

PodcastOne / Carolla Digital

Unsubscribe
Unsubscribe
יומי
 
Welcome to the new home for Adam's rantings and ravings. This is the #1 Daily Downloaded Podcast in the World. GET IT ON as Adam shares his thoughts on current events, relationships, airport security, specialty pizzas, politics, and anything else he can complain about. Five days a week and completely uncensored, Adam welcomes a wide range of guests to join him in studio for in depth interviews and a front row seat to his unparalleled ranting. Let's not forget Bryan Bishop (Bald Bryan) on sou ...
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Artwork
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

Unsubscribe
Unsubscribe
חודשי+
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 19:00 UTC.
  continue reading
 
Artwork
 
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
שבועי
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork
 
Weekly long-form conversations with fascinating people at the creative edges of national security. Unscripted. Informal. Always fresh. Chatter guests roll with the punches to describe artistic endeavors related to national security and jump into cutting-edge thinking at the frontiers where defense and foreign policy overlap with technology, intelligence, climate change, history, sports, culture, and beyond. Each week, listeners get a no-holds-barred dialogue at an intersection between Lawfar ...
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Loading …
show series
 
This episode features an interview with a cybersecurity and privacy lawyer about responding to cyber attacks Navigating Ransomware Response: Insights from Cybersecurity Expert Imran Ahmad In this episode features an interview between Howard Solomon and Imran Ahmad, a partner at Norton Rose Fulbright, discussing effective strategies for managing ran…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jim Bowie, CISO, Tampa General Hospital Thanks to our show sponsor, Prelude Security When executives ask the question, are we vulnerable to this threat? How long does it take you to get a confident answer? Prelude automatically transform…
  continue reading
 
Thoughts on shared responsibility models after the Snowflake credential attacks, looking at AI's current and future role in offensive security, secure by design lessons from Apple's Private Cloud Computer, and more! Show Notes: https://securityweekly.com/asw-289
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
In this interview, we speak with Mac Munsayac, Head of Customer Experience at Philippine Airlines, to explore the transformative role of AI in the aviation industry. Mac elaborates on the integration of generative AI and tools to enhance customer interactions by providing personalized, proactive, and frictionless experiences, especially in scenario…
  continue reading
 
Anoop Nannra, CEO and Co-Founder of Trugard, is an industry-recognized blockchain leader focused on improving cybersecurity and due diligence in Web3. He is also featured on our list of Cybersecurity Pundits. In this episode, Anoop joins host Paul John Spaulding to discuss the recent breach of Gala Games and the $22 million in crypto that hackers s…
  continue reading
 
Lakshmi Sharma is the Chief Product Officer at Hawcx. In this episode, she joins host Heather Engel to discuss going passwordless, including why passwordless authentication may be the future for secure logins, how effective this method is in preventing data breaches, and whether there are any drawbacks. • For more on cybersecurity, visit us at http…
  continue reading
 
Vinny Troia, a lifelong hacker, cybersecurity PhD, author of the book “Hunting Cyber Criminals”, and CEO of Night Lion Security, has developed a career in understanding and forming relationships throughout the dark web. He is also featured on our list of Cybersecurity Pundits. In this episode, Troia joins host Paul John Spaulding to discuss his bac…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Cassie Crossley, author of the book “Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware,” is the VP, Supply Chain Security, Cybersecurity & Product Security Office at Schneider Electric. In this episode, she joins host Steve Morgan to discuss software transparency. Supply Chain Q&A is sponsored…
  continue reading
 
Overview This week we deep-dive into one of the best vulnerabilities we’ve seen in a longtime regreSSHion - an unauthenticated, remote, root code-execution vulnerabilityin OpenSSH. Plus we cover updates for Plasma Workspace, Ruby, Netplan,FontForge, OpenVPN and a whole lot more. This week in Ubuntu Security Updates 39 unique CVEs addressed [USN-684…
  continue reading
 
Alan Rozenshtein, Associate Professor of Law at the University of Minnesota Law School and a Senior Editor at Lawfare; David Rubenstein, James R. Ahrens Chair in Constitutional Law and Director of the Robert J. Dole Center for Law and Government at Washburn University School of Law; and Dean Ball, Research Fellow at George Mason University's Mercat…
  continue reading
 
Senate leader demands answers from CISA re March Ivanti hack China’s Velvet Ant hackers exploiting new Cisco zero-day Europol law enforcement takes down Cobalt Strike servers Huge thanks to our sponsor, Demoed Buyers do 70% of their product research before talking to a company. That blew our minds. Why not give buyers as much information about your…
  continue reading
 
This week, a Scott-less Alan and Quinta sat down with Lawfare Tarbell Fellow Kevin Frazier and law school-bound Associate Editor Hyemin Han to talk over the week’s big national security news, including: “I will not make age an issue of this campaign. I am not going to exploit, for political purposes, my opponent's youth and inexperience.” Unlike Ro…
  continue reading
 
This week, a Scott-less Alan and Quinta sat down with Lawfare Tarbell Fellow Kevin Frazier and law school-bound Associate Editor Hyemin Han to talk over the week’s big national security news, including: “I will not make age an issue of this campaign. I am not going to exploit, for political purposes, my opponent's youth and inexperience.” Unlike Ro…
  continue reading
 
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individua…
  continue reading
 
The Cybercrime Magazine Podcast brings you our weekly alert, which provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with the latest breaking news stories we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Airs weekly on WCYB Digital Radi…
  continue reading
 
From March 22, 2021: Benjamin Wittes sat down on Lawfare Live with Seamus Hughes, the deputy director of the Program on Extremism at George Washington University, and Alan Rozenshtein, a Lawfare senior editor and professor at the University of Minnesota Law School, to talk about the group of cases that have been filed in connection with the January…
  continue reading
 
For a special holiday episode, Adam sits down for a live post-screening conversation at the Improv in Irvine, CA with the Cast & Crew behind the Angels Studio film Sound of Hope: The Story of Possum Trot. The roster of talent includes Director/Co-writer Joshua Weigel, co-writer Rebekah Weigel, cast members Demetrius Grosse, Nika King, and Diaana Ba…
  continue reading
 
George Tziahanas from Archive360 is talking about what happens when the information is no longer in boxes but could be anywhere in the world. Ben has the story of a raid on an independent journalist who leaked unaired clips from Fox News. Dave's got the story of a DC court ruling that AI generated content is not eligible for copyright protection. W…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Karen Freeman Worstell, CEO of W Risk Group and founder of MOJO Maker for Women in Tech, has been a cybersecurity trailblazer since the early 1990s. In this episode, she joins host Heather Engel to discuss board communications and the loss of confidence in cybersecurity strategies, including qualitative vs. quantitative risk, how security teams can…
  continue reading
 
Bastien Treptel, co-founder and chief product officer at CTRL Group, is a former criminal hacker who breached a major Australian bank as a teenager, granting him access to 40,000 credit card numbers and other sensitive customer data. These actions ultimately led Treptel to be apprehended by Australian Federal Police, though he was not charged. In t…
  continue reading
 
In this episode of ShadowTalk, hosts Chris and Kim, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include: TeamViewer compromise by APT29 in supply chain attack MOVEit in the headlines again, critical severity vulnerability disclosed Popular Content Delivery Network (CDN) providers compromised in…
  continue reading
 
John Pelton is the Senior Director of Managed Detection & Response at Optiv, and Steve Fielder is the Sr. Director of Managed Engineering at Optiv. In this episode, Pelton and Fielder join host Melissa O'Leary to discuss EPP and EDR solutions, including what businesses should consider when evaluating the vendor landscape, whether companies are bett…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Anupam Chander, Scott Ginsburg Professor of Law and Technology at Georgetown Law; Kyle Langvhardt, Assistant Professor at the Nebraska College of Law; and Alan Rozenshtein, Senior Editor at Lawfare and Associate Professor at Minnesota Law, join Kevin Frazier, Assistant Professor at St. Thomas University College of Law and a Tarbell Fellow at Lawfar…
  continue reading
 
Scott speaks about the defense tech industry, specifically why he believes it is a great business. He then discusses how greatness is in the agency of others, particularly in the context of the workplace. He wraps up with advice to a listener about how to act if your partner makes more money than you. Music: https://www.davidcuttermusic.com / @dcut…
  continue reading
 
Comedian Jesus Trejo makes his first visit to the show. They open by discussing Jesus’ upbringing in Long Beach, CA, the Latino comedy stars that inspired him as a kid and Adam’s early attempts to get into radio.Next, Mike Dawson joins to read the news including the uproar surrounding OJ Simpson being included in an awards show In Memoriam tribute …
  continue reading
 
Evolve Bank data breach is evolving Patelco Credit Union cyberattack disrupts services for nearly 500,000 members LockBit claims cyberattack on Croatia’s largest hospital Huge thanks to our sponsor, Demoed Did you know that Demoed is the first platform that allows you to watch a live product demo and ask questions without receiving a barrage of fol…
  continue reading
 
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news, including: Widely used polyfill javascript gets hijacked by its new owners MacOS supply chain disaster bullet dodged That OpenSSH remote code exec OH MY <3 Entrust gets its CA business kicked to the kerb by Google South Korean telco intentionally viruses 600k custo…
  continue reading
 
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news, including: Widely used polyfill javascript gets hijacked by its new owners MacOS supply chain disaster bullet dodged That OpenSSH remote code exec OH MY <3 Entrust gets its CA business kicked to the kerb by Google South Korean telco intentionally viruses 600k custo…
  continue reading
 
The regreSSHion Bug 50BTC moved Voyager 1 Update Email @ GRC SyncThing DNS queries Recall The End of Entrust Trust Show Notes - https://www.grc.com/sn/SN-981-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can …
  continue reading
 
As the Second World War started, an unsung cadre of US librarians and other information management professionals was making its way to Europe to acquire printed material that could help American analysts understand international threats. As the war went on, the mission of these experts expanded to also include an unprecedented effort to locate, pre…
  continue reading
 
Loading …

מדריך עזר מהיר