Novinky Magazín Security
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
…
continue reading
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job, there's always something fun to wrap up the show.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
…
continue reading
Podcasts on security, militancy, conflict, International Relations, and more.
…
continue reading
Just Security is an online forum for the rigorous analysis of national security, foreign policy, and rights. We aim to promote principled solutions to problems confronting decision-makers in the United States and abroad. Our expert authors are individuals with significant government experience, academics, civil society practitioners, individuals directly affected by national security policies, and other leading voices.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
Stay informed with Just Security: Out Loud. A selection of our written content, delivered daily, in a clear, automated voice for easy listening on the go. Each weekday, we bring you the Early Edition—your trusted, curated guide to the most important news and developments in national security, law, and global affairs over the past 24 hours. Plus, listen to select articles from Just Security’s expert authors. Whether you’re catching up on headlines or diving deeper into critical analysis, Just ...
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Learn how to think not what to think.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
CNA's experts understand today's complex and dynamic national security environments. On CNA Talks, you'll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today's national security landscape.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Stories from the world of hacking, ransomware, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten ...
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
Im Security News Podcast von Marktplatz IT-Sicherheit werden aktuelle Themen und Entwicklungen im Bereich der IT-Sicherheit behandelt. Der Podcast bietet in maximal zehn Minuten eine kompakte Übersicht über neue Bedrohungslagen, gesetzliche Änderungen und komplexe Lösungsansätze. Die Informationen stammen aus verschiedenen Quellen wie Politik, BSI, ENISA und Security-Konferenzen. Es werden neue IT-Sicherheitslösungen, Bedrohungen und Angriffsvektoren vorgestellt. Der Podcast richtet sich an ...
…
continue reading
1
"Much Work to Do and No Time to Waste: Mitigating Civilian Harm in an Asia-Pacific Conflict" by Jenny McAvoy
26:31
"Much Work to Do and No Time to Waste: Mitigating Civilian Harm in an Asia-Pacific Conflict" by Jenny McAvoy Published on November 17th, 2025 on Just Security, an essential resource for those shaping a just and secure world.Just Security
…
continue reading
On Nov. 13, the Trump administration took the unprecedented step of adding four groups in Europe to the U.S. government’s list of specially designated global terrorists (SDGTs). The administration also stated its intent to add each of these entities to the State Department’s list of designated Foreign Terrorist Organizations (FTOs), claiming that a…
…
continue reading
All links and images can be found on CISO Series. Modern application security has become a tangled mess of VPNs, proxies, DLP, CASBs, and remote browser tools—all creating friction for users and security teams alike. The root issue? Browsers were built for consumers, not enterprise security, forcing organizations to pile on complexity that undermin…
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:56:49Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
Microsoft warns of potential Windows 10 update failure China-backed hackers launch first large-scale autonomous AI cyberattack Feds fumbled Cisco patches requirements, says CISA Huge thanks to our episode sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security pla…
…
continue reading
1
SANS Stormcast Monday, November 17th, 2025: New(isch) Fortiweb Vulnerability; Finger and ClickFix
7:10
Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
…
continue reading
セキュリティ業界の男女比は一般的には非技術者を 含め女性が20~30%といわれています。 Verizon Japanはどうでしょうか? 今回は、Verizon Japanで活躍する女性スタッフをお招きしてお話をお伺いします。 ゲスト:ふじもとさん ミンさんベライゾンジャパン
…
continue reading
1
SANS Stormcast Monday, November 17th, 2025: New(isch) Fortiweb Vulnerability; Finger and ClickFix (#)
7:11
SANS Stormcast Monday, November 17th, 2025: New(isch) Fortiweb Vulnerability; Finger and ClickFix Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-t…
…
continue reading
1
PODCAST l Global review | Ep # 458 (Urdu)
1:33:04
1:33:04
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:33:04PODCAST l Global review | Ep # 458 (Urdu)
…
continue reading
Eric goes to Nateland and Jon goes flying. Another javascript worm, and automatic license plate reader records declared public in Washington. For fun we have a repo of annual security reports and Jon suffering memory loss and search ineptitude, but fig wasps are still cool. 0:00 - Intro 17:20 - Glassworm 21:50 - Conclusions of Law 28:55 - Nate Barg…
…
continue reading
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR DetectionCarl Franklin
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-529
…
continue reading
Hello friends! This week I'm talking about what I'm working on this week, including: Preparing a talk called Should You Hire AI to Run Your Next Pentest for the Minnesota GOVIT Symposium. Playing with Lithnet AD password protection (I will show this live on next week's Tuesday TOOLSday). The Light Pentest logo contest has a winner!…
…
continue reading
In this week's edition of Security Dilemma, A.J. Manuzzi and John Gay spoke with William Hartung and Ben Freeman of the Quincy Institute for Responsible Statecraft about their new book The Trillion Dollar War Machine: How Runaway Military Spending Drives America into Foreign Wars and Bankrupts Us at Home. You can buy the book here: https://www.amaz…
…
continue reading
CISSP, CGRC, ISSMP, ISSAP und, und, und. Zertifizierungen für den Bereich Cybersecurity und allem, was dazu gehört, gibt es viele. Doch welche davon sind wirklich für CISOs und Security-Fachkräfte relevant? Oder reicht vielleicht auch eine Weiterbildung? In dieser Folge des Security-Insider Podcasts sprechen wir mit Dr. Raphaela Schätz von der Frau…
…
continue reading
1
13.5 - John Holmwood
1:05:39
1:05:39
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:05:39In this episode, Claudia Radiven and Saeed Khan spoke with Professor John Holmwood about the UK’s Prevent policy, part of the Counter Terror Strategy concerned with radicalisation. We discussed the trajectory of Prevent from its beginnings where it focussed on community cohesion, to changes between 2011 and 2015 after the Trojan Horse Scandal in Bi…
…
continue reading
Episode summary This may be the fourth priority in our email workshop, but it’s truly #1 in importance: protecting your email account from takeover. Your email is the master key to all your online accounts. If you want to keep anything secure, you have to start here. The good news? It doesn’t take much. The first step is simple, but it’s something …
…
continue reading
In Folge 12 des Security News Podcasts werden wieder aktuelle Bedrohungen und Schutzmaßnahmen im Bereich Cybersicherheit vorgestellt. Thematisiert werden unter anderem neue Phishing-Methoden, die selbst Zwei-Faktor-Authentifizierung umgehen können, sowie die Empfehlung, Passkeys oder Security Keys zu nutzen. Außerdem wird über den Ermittlungserfolg…
…
continue reading
1
Going Around EDR - PSW #900
2:06:22
2:06:22
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:06:22This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading
https://www.youtube.com/watch?v=3BaNujBx62Y Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.theregister.com/2025/11/03/mit_sloan_updates_ai_ransomware_paper/ https://www.theregister.com/2025/10/29/ey_exposes_4tb_sql_database/ https://www.darkreading.com/cyber-risk/zombie-pr…
…
continue reading
1
The “Video Killed the Podcast Star” Edition
1:25:41
1:25:41
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:25:41This week, Scott sat down with his Lawfare colleagues Natalie Orpett, Eric Columbus, and Molly Roberts, to talk through the week’s big national security news stories, including: “I Don’t Think You’re Ready for the Shutdown.” The record-setting shutdown of the U.S. government is set to come to an end after eight Democratic senators agreed to a conti…
…
continue reading
Tinder has got a plan to rummage through your camera roll, and Warren Buffett keeps popping up in convincing deepfakes dishing "number one investment tips." Meanwhile, will agentic AI replace your co-hosts before you can say "EDR for robots"? and why you should still read books. All this, plus Lily Allen's new album and Claude Code come up for disc…
…
continue reading
1
From Military Intel to CISO: Navigating Security Leadership in the Age of AI – Darren Desmond
22:54
In this episode of the Security Repo Podcast, we sit down with Darren Desmond, a seasoned CISO with a background in UK military intelligence, to unpack his unconventional journey from fish and chips to threat intelligence. He shares how his military forensics experience shaped his InfoSec leadership and dives deep into the evolving role of the CISO…
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
SN 1051: Amazon sues Perplexity - Nevada's Ransomware Comeback
2:58:34
2:58:34
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:58:34Amazon is taking Perplexity AI to court over its agentic browser that shops on your behalf, raising urgent questions about who controls your online buying experience when bots do the heavy lifting. FFmpeg teaching assembly language for performance. The state of Nevada recovers after not paying ransom. A "rounding error" nets a clever attacker $128 …
…
continue reading
In the latest episode of Socializing Security, Milou Meier and Brian Knudtson embrace SYFI energy — Senior Year F-It — as they reflect on how far the podcast has come, from early audio hiccups to finding their flow as co-hosts. With their signature mix of humor and real-world insight, they explore the art of showing up consistently, balancing prep …
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricate relationship between privacy and security, particularly focusing on biometric data and the transition to passwordless technology. They discuss the security implications of various biometric methods, the privacy risks associated with popular web browse…
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
Start your week with a laugh. And yes, it’s work-relevant. Today’s guests, John Fokker, Head of Threat Intelligence, and Jambul Tologonov, Security Researcher at Trellix, have spent years monitoring the dark web and have quite a few stories to tell. They are joining Robby to talk about their concept "Dark Web Roast", a satirical look at cyber crimi…
…
continue reading
In a world where cyber risk is business risk, today's Chief Information Security Officers are not just defenders of data—they are strategic partners driving organizational resilience. Moderated by Gartner's Ash Ahuja, this candid conversation explores how security leaders are balancing innovation with risk management, influencing board-level decisi…
…
continue reading
#SecurityConfidential #DarkRhiinoSecurityMatthew Devost is a cybersecurity, risk management, and national security expert with over 25 years of experience. He is the CEO and Co-Founder of OODA LLC and Devsec previously founded the Terrorism Research Center and cybersecurity consultancy FusionX, which was acquired by Accenture. At Accenture, he led …
…
continue reading
What are the origins of the Australian Geospatial-Intelligence Organisation (AGO), and how has the organisation developed within the National Intelligence Community? How does AGO contribute to the broader remit of Australian statecraft, the work done by other NIC agencies, and the Five Eyes partnership? What makes innovation in the geospatial intel…
…
continue reading
Technology isn’t the only aspect of the security industry that’s evolving. The very definition of “security” is changing, so the way practitioners approach security must change with it. SecurityInfoWatch Associate Editor Samantha Schober brings Mary Gates, CEO of GMR Security Consulting Group, to the table to discuss the company’s rebranding effort…
…
continue reading
In this episode, we explore how the war in Ukraine has impacted Russian military thought on combined arms operations, naval surface warfare, and air dominance operations. Guest Biographies Michael Petersen is a principal research scientist in CNA's Russia Studies Program. He is an expert on Russian military strategy, operations, and net assessments…
…
continue reading
Apple announced its new suite of memory security improvements from the top of the stack all the way to the bottom, so we dug through what they did and how they did it (performantly). Watch on YouTube: https://www.youtube.com/watch?v=9FJwOI2PliU Transcript: https://securitycryptographywhatever.com/2025/10/31/apple-mie Links: - https://security.apple…
…
continue reading