Security відкриті
[search 0]
більше
Download the App!
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

Unsubscribe
Unsubscribe
Щотижня
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

Unsubscribe
Unsubscribe
Щотижня
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork

1
Web security news (ベライゾン)

ベライゾンジャパン

Unsubscribe
Unsubscribe
Щомісяця
 
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
  continue reading
 
Artwork

1
Security-Insider

Peter Schmitz und Dirk Srocke

Unsubscribe
Unsubscribe
Щомісяця
 
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

Unsubscribe
Unsubscribe
Щомісяця+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
Security This Week

Carl Franklin

Unsubscribe
Unsubscribe
Щотижня
 
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Щотижня
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Щотижня+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
  continue reading
 
Artwork

1
Mostly Security

Jon King and Eric Wuehler

Unsubscribe
Unsubscribe
Щотижня
 
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
  continue reading
 
Artwork

1
Cybersecurity Basement – der Podcast für echten Security-Content

suresecure GmbH, Michael Döhmen, Andreas Papadaniil

Unsubscribe
Unsubscribe
Щомісяця
 
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast spricht Michael Döhmen alle 14 Tage mit spannenden Gästen über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. Ehrlich auf ...
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

Unsubscribe
Unsubscribe
Щотижня
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Щомісяця+
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

Unsubscribe
Unsubscribe
Щомісяця
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Щотижня+
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

Unsubscribe
Unsubscribe
Щомісяця+
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Щотижня+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Щомісяця
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Щотижня+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Щотижня
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Loading …
show series
 
In this episode, we talk about downloading and analyzing partial ZIP files, how legitimate remote access tools are used in recent compromises and how a research found an SSRF vulnerability in Azure DevOps Partial ZIP File Downloads A closer look at how attackers are leveraging partial ZIP file downloads to bypass file verification systems and plant…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠
  continue reading
 
Just a few days before turning off the lights, the Biden administration dropped a huge cybersecurity executive order including a lot of good stuff, that hopefully [cross your fingers, knock wood, spin around three times and spit] will last into future administrations. We snagged some time with Carole House, outgoing Special Advisor and Acting Senio…
  continue reading
 
“Another day, another data breach.” In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense s…
  continue reading
 
Today's data landscape is undergoing a seismic shift with increasing regulatory pressures, rapid acceleration to the cloud, and AI adoption. Join BigID's CEO and Co-Founder, Dimitri Sirota, to learn how organizations can adopt a holistic approach to their data security and compliance strategy to keep up with the revolution in data, transforming the…
  continue reading
 
Tik Tok is back, with strings attached Noem promises to curtail CISA Label company Avery announces data breach Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time ch…
  continue reading
 
In this episode of the mnemonic security podcast, Robby is joined by Eirik Nordbø and Marius Kotlarz from Equinor, as well as Haakon Staff from mnemonic. Together, they discuss the world of Capture the Flag (CTF) competitions, exploring their origins, structure, and benefits. CTFs, as they explain, are “hacking” contests featuring challenges such a…
  continue reading
 
Eric finishes* painting, gets Paramount+ for "free" and construes adventures in 3D printing. Jon builds shields and drives a lot. TikTok's clock runs out while Scholastic entertains a bored hacker. Is it the Ad Industry or the Surveillance Industry or is there a difference? Here comes the Woolly Mammoth and Mars rises over the Moon.…
  continue reading
 
AIs in Love, UEFI, Fortinet, Godaddy, Juggalos, Aaran Leyland, and More. In this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-443
  continue reading
 
2024 saw a surge in cyberattacks alongside rapid tech advancements, making it clear that staying ahead in the digital world is more important than ever. In this week's session, we’ll explore the top cybersecurity predictions for 2025 — highlighting emerging threats, key trends, and the latest strategies for fortifying your defenses. Listen as our e…
  continue reading
 
Rob from ThreatLocker comes on the show to talk about how we can disrupt attacker techniques, including Zero Trust, privilege escalation, LOLbins, and evil virtualization. In the news we talk about security appliances and vulnerabilities, rsync vulnerabilities, Shmoocon, hacking devices, and more! This segment is sponsored by ThreatLocker. Visit ht…
  continue reading
 
What is the one key difference between a passkey and a password? How can I create an unforgeable digital signature? What are the 4 steps of logging in with a passkey? How is logging in with a passkey safer than with a password? Join us for free in the IHP Academy! https://ihpacademy.com/joinIHP Academy
  continue reading
 
The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware. We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detec…
  continue reading
 
Rob from ThreatLocker comes on the show to talk about how we can disrupt attacker techniques, including Zero Trust, privilege escalation, LOLbins, and evil virtualization. In the news we talk about security appliances and vulnerabilities, rsync vulnerabilities, Shmoocon, hacking devices, and more! This segment is sponsored by ThreatLocker. Visit ht…
  continue reading
 
7 Steps to Landing Your Dream Cyber Security Job | Fast Track Framework In this episode of the StationX Cyber Security Diaries, Nathan breaks down the Fast Track Framework, a proven seven-step methodology for landing your dream job in cyber security. Contrary to traditional advice, this systematic approach has helped thousands of complete beginners…
  continue reading
 
Tammy Klotz is a cybersecurity leader with over 20 years in IT and a decade as a CISO for global manufacturing firms. She has transformed cybersecurity programs, driven cultural change, and championed women in technology through mentorship and active involvement in groups like WiCyS and the Cloud Security Alliance. At Versum Materials, she develope…
  continue reading
 
The video game Path of Exile 2 suffers a security breach, we explore the issues of using predictive algorithms in travel surveillance systems, and the very worst IoT devices are put on show in Las Vegas. Oh, and has Elon Musk accidentally revealed he cheats at video games? All this and much much more is discussed in the latest edition of the "Smash…
  continue reading
 
In this episode of the Security Repo Podcast, we explore the fascinating and complex world of non-human identities (NHIs) with Jody Hunt from CyberArk. We discuss the challenges of authenticating machine workloads, delve into the "secret zero" problem, and consider how frameworks like SPIFFE are shaping the future of secure machine identity. Plus, …
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Roger Parloff, Renée DiResta, and Tyler McBrien to talk through the week’s big national security news, including: “The Art of the Heel.” As President-elect Donald Trump’s inauguration nears, the various legal cases against him are gradually winding down to their inevitable end. But Trump is not …
  continue reading
 
In the leadership and communications segment, New Year, New Cyber Threats: How Boards Are Stepping Up (or Not), Why CISOs should build stronger bonds with the legal function in 2025, New Managers: You Don’t Need to Know It All, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw…
  continue reading
 
Meta winds down 3rd-party content filtering. Is encryption soon to follow? Taking over abandoned Command & Control server domains (strictly for research purposes only). IoT devices to get the "Cyber Trust Mark" — Will anyone notice or care? "SyncThing" receives a (blessedly infrequent) update. Government email is not using encryption? Really? Email…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest cybersecurity trends, focusing on CISA's Scuba Project and its implications for federal agencies. They explore the transition to cloud-based passwordless authentication, the Binding Operational Directive 25-01, and provide prescriptive guidance f…
  continue reading
 
In this episode, AJ Nash, founder of Unspoken Security, discusses the challenges and rewards of podcasting in the security space. He emphasizes the importance of authenticity in conversations about security, the need to break the taboo surrounding these discussions, and the generational shift in attitudes towards privacy and security. The conversat…
  continue reading
 
There's a pernicious myth that developers don't care about security. In practice, they care about code quality. What developers don't care for is ambiguous requirements. Ixchel Ruiz shares her experience is discussing software designs, the challenges in prioritizing dev efforts, and how to help open source project maintainers with their issue backl…
  continue reading
 
At War with Women: Military Humanitarianism and Imperial Feminism in an Era of Permanent War (Cornell University Press, 2023) by Jennifer Greenburg reveals how post-9/11 politics of gender and development have transformed US military power. In the mid-2000s, the US military used development as a weapon as it revived counterinsurgency in Iraq and Af…
  continue reading
 
On the show floor at CES 2025, Security Business Editor-in-Chief Paul Rothman discusses the future of monitoring centers, the applications of AI automation, and SimpliSafe's Active Guard solution with SimpliSafe's CEO and High Tech Product Leader, Christian Cerda (L) and Hooman Shahidi (R).Endeavor Business Media
  continue reading
 
In dieser Podcastfolge sprechen Michael und Andreas über die Bedeutung einer umfassenden Cybersecurity-Strategie für Unternehmen. Sie erklären, warum es nicht ausreicht, einzelne Sicherheitslösungen zu implementieren, und zeigen, welche zentralen Aspekte eine erfolgreiche Strategie ausmachen. Erfahre, wie Unternehmen sich wirksam vor Cyberangriffen…
  continue reading
 
This episode covers how Taiwan applies lessons from the Ukraine War to prepare for a potential invasion from the People’s Republic of China. Guest Biographies April A. Herlevi is a Senior Research Scientist in CNA’s China Studies program. She is an expert on the People’s Republic of China (PRC) foreign and security policy, economic statecraft for t…
  continue reading
 
Wo eben noch drei Weise aus dem Morgenland grundsolide standen, schlittern heuer drei Redakteure des Security-Insider wild umher. Immer noch. Denn Momentum hierfür haben sie beim Rutsch ins neue Jahr genügend mitgenommen. Peter Schmitz bestätigt im Podcast: 2025 wird nahtlos da weitergehen, wo 2024 aufgehört hat. Hören Sie also schnell rein, bevor …
  continue reading
 
Richard Staynings, Chief Security Strategist at Cylera is our feature interview this week, interviewed by Frank Victory. News from NWSL, Red Rocks, Spekit, Fluid Trucks, Lumen, Red Canary, Swimlane and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on t…
  continue reading
 
Ivanti's Robert Waters welcomes Grand Bank CTO Robert Hanson for a wide-ranging conversation on the emerging field of exposure management and how you can proactively safeguard your organization, because every organization faces risk. What separates the vulnerable from the well-protected isn’t whether you have exposure — it’s how you manage it. Join…
  continue reading
 
Merry Christmas!🌲 2024年最後の配信は、ランサムウェアを始めとした1年間のサイバーセキュリティ事情を、 データを基に振り返っていきます。 キーワードは“180%” “300兆円”。 Web security newsリスナーなら何の数字か予想できますよね? 本編内に登場したKEVはこちらから。 (CISAが公開している実際に悪用が確認された脆弱性のリスト) https://www.cisa.gov/known-exploited-vulnerabilities-catalogベライゾンジャパン
  continue reading
 
Loading …

Короткий довідник

Слухайте це шоу, досліджуючи
Відтворити