Novinky Magazín Security
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
The Security Matters Podcast is published monthly and hosted by the magazine’s Editor Brian Sims. In each episode, Brian reports on and analyses the latest UK security industry news and also interviews leading professionals from the sector. The Security Matters Podcast is sponsored by The Security Event, which takes place on 8-10 April 2025 at the NEC in Birmingham. To register for your free pass to the show visit www.thesecurityevent.co.uk For all the latest security industry news and opini ...
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
…
continue reading
Learn how to think, not what to think.
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
1
Cybersecurity Basement – der Podcast für echten Security-Content
suresecure GmbH, Michael Döhmen, Andreas Papadaniil
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast spricht Michael Döhmen alle 14 Tage mit spannenden Gästen über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. Ehrlich auf ...
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
1
SANS ISC Stormcast, Jan 30th 2025: Python vs. Powershell; Fortinet Exploits and Patch Policy; Voyager PHP Framework Vuln; Zyxel Targeted; VMWare AVI Patch
5:33
From PowerShell to a Python Obfuscation Race! This information stealer not only emulates a PDF document convincingly, but also includes its own Python environment for Windows https://isc.sans.edu/diary/From%20PowerShell%20to%20a%20Python%20Obfuscation%20Race!/31634 Alleged Active Exploit Sale of CVE-2024-55591 on Fortinet Devices An exploit for thi…
…
continue reading
What happens when eager computer enthusiasts unknowingly download a trojanized hacking tool and find themselves on the wrong side of cybersecurity? A former employee's actions led to chaos and raise urgent questions about the security of cultural treasures. And join us as we explore the alarming trend of social media influencers staging fake kidnap…
…
continue reading
In the leadership and communications segment, How CISOs can elevate cybersecurity in boardroom discussions, Nearly half of CISOs now report to CEOs, showing their rising influence, Steve Jobs Shared 1 Crystal Clear Way You'll Spot an Exceptional Leader, and more! Show Notes: https://securityweekly.com/bsw-380…
…
continue reading
1
Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee
30:59
In this episode of the Security Repo Podcast, we explore the intersection of observability and security with special guest Josh Lee, a developer advocate at Altinity and expert on Clickhouse and OpenTelemetry. We discuss the evolving definition of observability, how context and tagging enhance both security and observability practices, and how data…
…
continue reading
1
The “Don’t Cry for Me, Lawfare” Edition
1:15:33
1:15:33
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:15:33
This week, Scott was joined by his colleagues Kevin and Eugenia—in what is sadly her last episode before leaving Lawfare—as well as special guest Peter Harrell for a deep dive into the week’s national security news, including: “Tariff or Takeoff.” The Trump administration got into what is arguably its first major international spat this week when C…
…
continue reading
The last five weeks have seen a flurry of news on Artificial Intelligence, especially this last week. It started on December 17, 2024 when the Bipartisan House Task Force on Artificial Intelligence (AI) released a report on “[g]uiding principles, forward-looking recommendations, and policy proposals to ensure America continues to lead the world in …
…
continue reading
Episode 33 of the Security Matters Podcast includes Brian interviewing David Scott (managing director at national training provider Skills for Security) and Christian Have, CTO at Logpoint (the dedicated European provider of a converged cyber security platform that empowers organisations to thrive by delivering threat detection and incident respons…
…
continue reading
Most ransomware victims shut down operations shutdowns EU sanctions GRU members for Estonia cyberattacks Lynx ransomware runs a tight ship Huge thanks to our sponsor, Conveyor Tired of herding cats to complete customer security questionnaires? Your team probably spends hours daily juggling the back and forth of completing these security requests. T…
…
continue reading
eM Client CAN be purchased outright. An astonishing 5-year-old typo in MasterCard's DNS. An unwelcome surprise received by 18,459 low-level hackers. DDoS attacks continue growing, seemingly without any end in sight. Let's Encrypt clarifies their plans for 6-day "we barely knew you" certificates. SpinRite uncovers a bad brand new 8TB drive. Listener…
…
continue reading
DeepSeek, AIDs, Sex Crime, Microsoft, PayPal, GetHub, Joshua Marpet and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-446
…
continue reading
What threats do security leaders need to worry about? Answer this question and more with Corey Nachreiner, CISO at WatchGuard.
…
continue reading
1
Cryptanalyzing LLMs with Nicholas Carlini
1:20:42
1:20:42
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:20:42
'Let us model our large language model as a hash function—' Sold. Our special guest Nicholas Carlini joins us to discuss differential cryptanalysis on LLMs and other attacks, just as the ones that made OpenAI turn off some features, hehehehe. Watch episode on YouTube: https://youtu.be/vZ64xPI2Rc0 Transcript: https://securitycryptographywhatever.com…
…
continue reading
1
Microsoft Industry Solutions Delivery with Special Guest Brodie Cassell
1:04:01
1:04:01
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:04:01
Summary In this episode of the Blue Security Podcast, host Andy Jaw and co-host Adam Brewer welcome Brodie Cassell, a principal security consultant at Microsoft. Brodie shares his journey from various IT roles to his current position at Microsoft, discussing the importance of adapting to new technologies and the challenges of data security in the a…
…
continue reading
In this episode, Nathanael Iverson, Chief Evangelist at Zentera, discusses the concept of Zero Trust in cybersecurity. He emphasizes the importance of incremental progress, understanding core principles, and the historical context of Zero Trust. The conversation explores the need for organizational change, executive support, and the business case f…
…
continue reading
In this episode, our guest Francis Odom, founder of Software Analyst Cyber Research, brings his wealth of expertise to the conversation. With a following of over 60,000 cybersecurity and technology professionals, Francis specializes in emerging security markets, including identity, data, and AI security. As organizations embrace digital transformat…
…
continue reading
1
Security the AI SDLC - Niv Braun - ASW #315
1:08:34
1:08:34
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:08:34
A lot of AI security boils down to the boring, but important, software security topics that appsec teams have been dealing with for decades. Niv Braun explains the distinctions between AI-related and AI-specific security as we avoid the FUD and hype of genAI to figure out where appsec teams can invest their time. He notes that data scientists have …
…
continue reading
Sponsor by SEC Playground
…
continue reading
1
AI Red Teaming Comes to Bug Bounties - Francis Dinha, Michiel Prins - ESW #391
2:07:23
2:07:23
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:07:23
HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming. At the same time enterprises are globally trying to figure out how to QA and red team generative AI models like LLMs, early adopters are challenged to scale these tests. Crowdsourced bug bounty platforms are a natural place to turn for …
…
continue reading
1
IPOs are back, AI jumps the shark, NGFWs have some serious security issues - ESW #391
1:01:02
1:01:02
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:01:02
In this week's enterprise security news, the first cybersecurity IPO in 3.5 years! new companies new tools the fate of CISA and the cyber safety review board things we learned about AI in 2024 is the humanless SOC possible? NGFWs have some surprising vulnerabilities what did generative music sound like in 1996? All that and more, on this episode of…
…
continue reading
Ivanti's Chris Goettl and Robert Waters take on four big questions facing cybersecurity today, namely: Who gets the upper hand from AI, cyber adversaries or the legitimate organizations looking to stop them? What's going to win out, Everywhere Work or RTO? Exposure Management: sea change, or passing fad? And what's the bigger security risk, IoT dev…
…
continue reading
1
Defensive Security Podcast Episode 294
1:04:21
1:04:21
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:04:21
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a hidden backdoor in Juniper routers, PayPal’s recent data breach settlement, the exploitation of older Ivanti bugs, the PowerSchool data breach affecting millions, and CISA’s new software security recommendations. Th…
…
continue reading
Eric tidies the nest and Jon putters about. Stackoverflow down to 2009 question volume and Texas sues Allstate for their data collection and use practices. Hubble's 10 year compilation of the Andromeda galaxy, and regenerative agriculture restoring arid lands in Africa. 0:00 - Intro 12:19 - Stack Overflow Decline 21:08 - (Illegal?) Insurance Analyt…
…
continue reading
Millions of Accounts Vulnerable due to Google’s OAuth FlawCarl Franklin
…
continue reading
Dr. Ethan Heilman, CTO of Bastion Zero, joins us to discuss the latest advancements in secure access technology and the ethical implications of AI systems. Dr. Heilman explains how Bastion Zero provides secure, passwordless access to servers, databases, and Kubernetes clusters without the need for VPNs or SSH keys. Key features include session reco…
…
continue reading
Today I’m excited about some tools/automation I’ve been working on to help shore up the 7MinSec security program, including: Using Retype as a document repository Leveraging the Nessus API to automate the downloading/correlating of scan data Monitoring markdown files for “last update” changes using a basic Python script…
…
continue reading
Where can I store my passkeys? What are 3 big downsides to browser based password managers? What are Makani's 3 trusted password managers? How many bugs can you find in Makani's code? Get started with 1Password Get started with ProtonPass Get started with Bitwarden Google Password Manager official information Microsoft Edge Password Manager officia…
…
continue reading
1
Vulnerability Prioritization In The Real World - PSW #858
2:19:16
2:19:16
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:19:16
Andy Jaquith joins us to discuss how to prioritize vulnerabilities and remmediation in the real-world, including asset management and more! In the security news: ESP32s in the wild and security, Google oAuth flaw, DDoS targets, Ban on auto components, Bambu firmware updates, Silk Road founder is free, one last cybersecurity executive order, US Trea…
…
continue reading
Sandra has over 25 years of experience in Cybersecurity, IT, and Data Privacy. She transformed her personal nightmare of identity theft into inspiration, helping individuals and businesses protect what matters most from hackers, scammers, and Cybermonsters®. She is a TEDx speaker, podcast host, corporate trainer, and international bestselling autho…
…
continue reading
In dieser Folge von Cybersecurity Basement spricht Michael mit Maximilian Moser vom VDMA über die größten Herausforderungen der Cybersicherheit in der Industrie: OT-Security, den Cyber Resilience Act (CRA) und Supply Chain Security. Wie können produzierende Unternehmen ihre OT-Systeme besser absichern? Was bedeutet der CRA für bestehende Produkte u…
…
continue reading
This episode covers the fall of the Assad regime and what it means for Syria, Russia, Iran, and Turkey. Guest Biographies Michael Connell is a specialist in Russia and the Middle East in CNA’s Russia Studies Program. His primary area of expertise is the armed forces of Iran and Russia, and he has published extensively on these topics both inside an…
…
continue reading
In this week's episode of Security DNA, Rebel Global Security CEO Mark Freedman joins host Steve Lasky in a timely discussion about online radicalization, social media, and rising threats of violence from both sides of the political aisle. Mark Freedman is the Principal and CEO of Rebel Global Security, a leading advisory firm specializing in natio…
…
continue reading
In the lead up to Zero Trust World 2025 we speak with Rob Allen, Chief Product Officer, ThreatLocker. ThreatLocker protects endpoints and data from zero-day malware, ransomware, and other malicious software, and provides solutions for easy onboarding, management, and eliminates the lengthy approval processes of traditional solutions. Visit https://…
…
continue reading
The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware. We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detec…
…
continue reading
7 Steps to Landing Your Dream Cyber Security Job | Fast Track Framework In this episode of the StationX Cyber Security Diaries, Nathan breaks down the Fast Track Framework, a proven seven-step methodology for landing your dream job in cyber security. Contrary to traditional advice, this systematic approach has helped thousands of complete beginners…
…
continue reading
1
Jennifer Greenburg, "At War with Women: Military Humanitarianism and Imperial Feminism in an Era of Permanent War" (Cornell UP, 2023)
46:05
At War with Women: Military Humanitarianism and Imperial Feminism in an Era of Permanent War (Cornell University Press, 2023) by Jennifer Greenburg reveals how post-9/11 politics of gender and development have transformed US military power. In the mid-2000s, the US military used development as a weapon as it revived counterinsurgency in Iraq and Af…
…
continue reading
Wo eben noch drei Weise aus dem Morgenland grundsolide standen, schlittern heuer drei Redakteure des Security-Insider wild umher. Immer noch. Denn Momentum hierfür haben sie beim Rutsch ins neue Jahr genügend mitgenommen. Peter Schmitz bestätigt im Podcast: 2025 wird nahtlos da weitergehen, wo 2024 aufgehört hat. Hören Sie also schnell rein, bevor …
…
continue reading
1
270 - 1/6 - Richard Staynings, Chief Security Strategist at Cylera
1:02:28
1:02:28
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:02:28
Richard Staynings, Chief Security Strategist at Cylera is our feature interview this week, interviewed by Frank Victory. News from NWSL, Red Rocks, Spekit, Fluid Trucks, Lumen, Red Canary, Swimlane and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on t…
…
continue reading