Security відкриті
[search 0]
більше

Download the App!

show episodes
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
G
Global Security Briefing

1
Global Security Briefing

The Royal United Services Institute

Unsubscribe
Unsubscribe
Щомісяця+
 
Global Security Briefing provides regular insights from leading international experts to help you make sense of the far-reaching changes affecting international security around the globe. Hosted by analysts from RUSI's International Security Studies team, the podcast looks at how the UK can best shape its foreign and security policies in an increasingly dynamic international environment. The views or statements expressed by guests are their own and their appearance on the podcast does not im ...
 
T
The Azure Security Podcast

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

Unsubscribe
Unsubscribe
Щомісяця+
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2022 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
 
S
Smashing Security

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Щотижня
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
 
T
The Security Podcasts

1
The Security Podcasts

www.securitymagazine.com

Unsubscribe
Unsubscribe
Щомісяця+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
 
S
Security-Insider

1
Security-Insider

Peter Schmitz und Dirk Srocke

Unsubscribe
Unsubscribe
Щомісяця
 
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
 
C
Cloud Security Podcast

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
Щотижня
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
 
S
Security Circle

1
Security Circle

Yolanda Hamblen (Yoyo)

Unsubscribe
Unsubscribe
Щотижня
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
 
Loading …
show series
 
In the enterprise security news, early stage startup funding stays constant, but late stage is nowhere to be found. Cisco, XM Cyber, and Mastercard make acquisitions. YouTube channels keep getting hacked. Microsoft fails to use Azure securely. Organizations are making progress on zero trust, but slowly. Finally, more discussion on AI threats, conce…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, March 27-31, is hosted by Rich Stroffolino with our guest, Brett Conlon, CISO, American Century Investments Thanks to today’s episode sponsor, Trend Micro Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigating a new era of cyber r…
 
Flappy TREX lips, WooCommerce, 3CX, Zimbra, OneNote, ChatGPT, ProPump, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn285
 
Flappy TREX lips, WooCommerce, 3CX, Zimbra, OneNote, ChatGPT, ProPump, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://sec…
 
Overview Ubuntu gets pwned at Pwn2Own 2023, plus we cover security updates for vulns inGitPython, object-path, amanda, url-parse and the Linux kernel - and we mentionthe recording of Alex’s Everything Open 2023 presentation as well. This week in Ubuntu Security Updates 91 unique CVEs addressed [USN-5968-1] GitPython vulnerability [00:46] 1 CVEs add…
 
Ok, I know we say this every time, but it is true this time yet again: this is our favorite tale of pentest pwnage. It involves a path to DA we've never tried before, and introduced us to a new trick that one of our favorite old tools can do!
 
Welcome to Women in Cybersecurity month! Join us for our last episode in the Women in Cybersecurity month series for 2023 as we chat with Elizabeth Stephens, Director Data Center Cyber Risk Intelligence. In this episode, hear Elizabeth talk about her passion in Cybersecurity that is driven by the needful things. Show links: Flight of the V-22 Ospre…
 
Josh has 10 years of military experience, as an Air Force pilot and cyberwarfare officer. Currently, Josh is a Senior Technical Trainer for Neuvik Solutions, providing training, engagement management, penetration testing, risk assessments, and business consulting for clients00:00 Introduction00:22 Our Guest01:06 U.S Air Force Academy to Cyber07:28 …
 
Malicious 3CX Dekstop App Update Lifestream (Friday March 31st 1400 ET, 1800 UTC) https://www.youtube.com/watch?v=cCf3Km_j5bY 3CX Update: https://www.3cx.com/blog/news/desktopapp-security-alert/ SentinelOne: https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/ Objective-See Blog P…
 
Malicious 3CX Desktop App Update; Reverse Engineering Obfuscated Powershell via Debugger Malicious 3CX Dekstop App Update Lifestream (Friday March 31st 1400 ET, 1800 UTC) https://www.youtube.com/watch?v=cCf3Km_j5bY 3CX Update: https://www.3cx.com/blog/news/desktopapp-security-alert/ SentinelOne: https://www.sentinelone.com/blog/smoothoperator-ongoi…
 
This week, Alan, Quinta, and Scott were joined once again by co-host emeritus and Lawfare Editor-in-Chief Benjamin Wittes to talk through national security news stories from the Holy Land to the Lone Star State, including: “Rebel Aviv.” Prime Minister Bibi Netanyahu’s efforts to dramatically reform Israel’s legal system hit a roadblock this past we…
 
RIP Gordon Moore, the more in Moore's Law. Photo cropping bugfix. DDoS honeypot. E-commerce patches. Apple 0-day and lots more.https://nakedsecurity.sophos.com/in-memoriam-gordon-moorehttps://nakedsecurity.sophos.com/microsoft-assigns-cve-to-snipping-tool-bughttps://nakedsecurity.sophos.com/cops-use-fake-ddos-serviceshttps://nakedsecurity.sophos.co…
 
Technological innovation is now one of the most consequential realms of geopolitical contestation. And in the era of big tech, the private sector has assumed power that once resided with governments. In response, we’ve seen a reassertion of industry policy, with governments trying to re-establish control. What happens to Australia’s national securi…
 
A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden's commercial spyware bill, and Utah gets tough on social media sites. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Register's I…
 
The WA Cyber Security Innovation Hub is excited to be delivering the second CyberWest Summit, 10-11 May, 2023 at the Pan Pacific, Perth WA. CyberWest Summit is WA’s flagship event providing cyber security education and awareness to key sectors and highlighting WA cyber security capabilities. The conference will deliver three content streams: Critic…
 
With the recent takeover of the “Linus Tech Tips” YouTube channel, what can we learn? In this episode, Jay and Joao will discuss some of the ways you can prevent such an event from happening to you (and it’s not just YouTube that’s a target). Download Links MP3 version MP3 version (lower bitrate, smaller size) Ogg version…
 
Named 3rd in Top 10 IFSEC Global influencers in AI for 2022. Gerhard says, 'I'm paid to play with ideas, toys and possibilities all day while flipping the bird at the industry's concept of 'impossible'. He is the founder and CTO of Iris AL (Pty) Ltd. Specialising in Artificial Intelligence (AI), Machine Learning, Machine Vision, Deep Learning and S…
 
This week Baer gets right into it with talking some HID alternatives, giving you an excellent Product Highlight and whether it’s introducing or re-introducing, as always he hooks you up with the good news, to line those pockets and make that wallet purrrrrrrrr….s. ChitChat: https://ipvm.com/reports/alt-hid-mercury Product Highlight: https://www.cab…
 
Picture of the Week. Synacktiv wins this year's CanSecWest Pwn2Own GitHub: Mistakes happen DDoS for Hire. . .Or Not 144,000 malicious packages published No iPhones For Russian Presidential Staff I NUIT Edge Gets Crypto Microsoft's Email Extortion Show Notes: https://www.grc.com/sn/sn-916-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or sub…
 
In the leadership and communications section, CISO, The Board, and Cybersecurity, How CISOs Can Work With the CFO to Get the Best Security Budget, Building Effective and Skilled Teams Through Networking, Connectivity, and Communication, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekl…
 
Ferrari refuses ransomware, OpenAI deals with security issues from cacheing, video killed a crypto ATM, GitHub rotates their RSA SSH key, bypassing CloudTrail, terms and techniques for measuring AI security and safety Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw234…
 
We often see security as a thing that has definitive check boxes, end states and deliverables. Audits "end" and then start again, but if you are looking at security as a noun -- as in, a thing that gets done, you are falling short. Security must be a verb. You DO security, you do not HAVE security. Security weaves through every layer and goes beyon…
 
Cloud Security Podcast - This month we are talking about "Cloud Security - the Leadership View" and for the final episode in this series, we spoke to Guy Podjarny ( GuyPo's Linkedin). If you are working on building or securing Cloud resources, can you truly imagine solving the next log4j or AWS/Azure/GCP vulnerability without including the help of …
 
Josh and Kurt talk to Fiona Krakenbürger about the Sovereign Tech Fund. This is a fund created by Germany to fund important open source projects. Fiona has amazing insight into how this fund was created, what it's doing today to help fund open source. She discusses where we go from here and what the future will look like. The Sovereign Tech Fund is…
 
Real World Cryptography 2023 is happening any moment now in Tokyo. Also, some phone basebands are broken. Links https://rwc.iacr.org/2023/ https://googleprojectzero.blogspot.com/2023/03/multiple-internet-to-baseband-remote-rce.html Transcript: https://securitycryptographywhatever.com/2023/03/24/rwc-2023/ "Security Cryptography Whatever" is hosted b…
 
This week I provide several important updates including Android vulnerabilities, Mint Mobile acquisition, BreachForums disappearance, and many new OSINT tools. This is a full show.Direct support for this podcast comes from our privacy services, online training, and new books for 2023 Open Source Intelligence Techniques (10th Edition), and Extreme P…
 
In this episode Michael and Gladys talk with guests Sean Wesonga and Bojan Magusic about using Infrastructure as Code (IaC) with Microsoft Defender for Cloud. We also discuss Azure Security news about new Azure SQL Database migration abilities for authentication and Transparent Data Encryption (TDE).…
 
On this episode the trio dissects the Military gun salute honors, this comes after the President of Italy was honored by the military of Kenya. Who gets a 21 military gun salute? and why? The team also looks at the Military operations that have been ongoing in some six counties in Kenya.
 
This episode focuses on how global energy trends have shaped the geopolitics of the MENA for much of the past century, and how they will continue to do so. For over two decades, the region seemed to be losing a lot of its energy importance for the West. Both the US and European countries have sought to reduce their involvement in MENA geopolitics, …
 
Edward Mead Earle was a historian, scholar, professor, and international relations expert; he was also a founding father of the field we know as Security Studies. Listen as David Ekbladh and International Security Editor Sean Lynn-Jones discuss Earle's contributions to the field, his views on what Security Studies should be, his seminar at the Inst…
 
Data privacy remains an ever-growing concern for both security leaders and governments. What regulations are being put in place? How should security leaders implement zero trust? Find out more in this Security podcast episode featuring Mark Ruchie, Chief Information Security Officer at Entrust. Mark started his security career in the Air Force and …
 
The browser is one of the easiest access points for cyber criminals. Exploiting browser vulnerabilities for account takeover and damaging environments does not require sophisticated technological capabilities. In fact, sometimes simple social engineering is enough. Yet, most users and organizations don’t take browser security into consideration. Or…
 
We’re back with a Spring Break edition, featuring: ICC cases emerging against Russian defendants for (1) removing children from Ukraine to Russia and (2) attacking civilian infrastructure A UK drone strike in Syria, a US drone strike in Yemen, and a US drone struck (by the Russians) Renewal of Section 702 and the Rep. LaHood story TikTok, CFIUS, an…
 
00:00 – PreShow Banter™ — Tossing Money at Problems00:58 – BHIS – Talkin’ Bout [infosec] News 2023-03-1301:41 – Story # 1: Silicon Valley Bank collapse: Treasury, Fed, and FDIC announce […] The post Talkin’ About Infosec News – 3/16/2023 appeared first on Black Hills Information Security.Black Hills Information Security
 
Loading …

Короткий довідник