Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Your occasional dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
S
Security Cryptography Whatever


1
Security Cryptography Whatever
Deirdre Connolly, Thomas Ptacek, David Adrian
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
In diesem Podcast sprechen wir über die Grundlagen von IT-Security. Ein praktischer Einstieg für alle, die an Software arbeiten.
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhino Security.
B
Black Hills Information Security


1
Black Hills Information Security
Black Hills Information Security
Weekly infosec news podcast with the pen testers and friends of Black Hills Information Security.
Global Security Briefing provides regular insights from leading international experts to help you make sense of the far-reaching changes affecting international security around the globe. Hosted by analysts from RUSI's International Security Studies team, the podcast looks at how the UK can best shape its foreign and security policies in an increasingly dynamic international environment. The views or statements expressed by guests are their own and their appearance on the podcast does not im ...
Podcasts on security, militancy, conflict, International Relations, and more.
T
The Azure Security Podcast


1
The Azure Security Podcast
Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2022 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
Enterprise Linux Security takes a look at security-related topics in enterprise IT, with a special focus on Linux. Join Jay and Joao as they discuss Linux security in the ever-changing world of technology.
Host Jon Olson, US Navy (Ret.) Interviews different experts to learn about current and historical events with a focus on national security. Topic's include: the economy, climate change, cyber security, nuclear weapons, intelligence operations, and more. New episodes released Wednesdays.
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
The State of Security podcast hosted by Laila Mohammed, Dominick Wabala and Mary Wambui unravels all things National Security. Dissecting what was, what is and what will be of our National security in the years to come.
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Hosted by Edward Walton, Andrea Fisher, Rod Trent, and Brodie Cassell, the Microsoft Security Insights show provides information, news, tips on the Microsoft Security Solutions including Microsoft Sentinel, Microsoft 365 Defender, and Azure.
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
The straight up security news in 20 minutes or less! Links to all news articles are included here.
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
T
The National Security Law Podcast


1
The National Security Law Podcast
Bobby Chesney and Steve Vladeck
Unpacking the Legal Issues Behind the Headlines
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
S
SANS Internet Storm Center's Daily Network Security News Podcast


1
SANS Internet Storm Center's Daily Network Security News Podcast
Johannes B. Ullrich
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
Security Today is a podcast centered around physical security and the security industry. From articles to philosophies to trending topics, Baer leads you down the info hole of Security Today. @unclebaer_ on IG and Twitter @securitytodaypodcast on IG Brought to you by @sprinterdatacom on IG
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
Just when Elan Musk thought he was in control...Carl Franklin
P
Paul's Security Weekly TV


In the enterprise security news, early stage startup funding stays constant, but late stage is nowhere to be found. Cisco, XM Cyber, and Mastercard make acquisitions. YouTube channels keep getting hacked. Microsoft fails to use Azure securely. Organizations are making progress on zero trust, but slowly. Finally, more discussion on AI threats, conce…
C
Cyber Security Headlines


Link to Blog Post This week’s Cyber Security Headlines – Week in Review, March 27-31, is hosted by Rich Stroffolino with our guest, Brett Conlon, CISO, American Century Investments Thanks to today’s episode sponsor, Trend Micro Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigating a new era of cyber r…
S
Security Weekly News (Video)


Flappy TREX lips, WooCommerce, 3CX, Zimbra, OneNote, ChatGPT, ProPump, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn285
P
Paul's Security Weekly


Flappy TREX lips, WooCommerce, 3CX, Zimbra, OneNote, ChatGPT, ProPump, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://sec…
PODCAST | March 31st, 2023 | Ep # 342 (Urdu)
Overview Ubuntu gets pwned at Pwn2Own 2023, plus we cover security updates for vulns inGitPython, object-path, amanda, url-parse and the Linux kernel - and we mentionthe recording of Alex’s Everything Open 2023 presentation as well. This week in Ubuntu Security Updates 91 unique CVEs addressed [USN-5968-1] GitPython vulnerability [00:46] 1 CVEs add…
Ok, I know we say this every time, but it is true this time yet again: this is our favorite tale of pentest pwnage. It involves a path to DA we've never tried before, and introduced us to a new trick that one of our favorite old tools can do!
T
The Microsoft Security Insights Show


1
Microsoft Security Insights Show Episode 146 - Elizabeth Stephens
1:07:27
1:07:27
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:07:27
Welcome to Women in Cybersecurity month! Join us for our last episode in the Women in Cybersecurity month series for 2023 as we chat with Elizabeth Stephens, Director Data Center Cyber Risk Intelligence. In this episode, hear Elizabeth talk about her passion in Cybersecurity that is driven by the needful things. Show links: Flight of the V-22 Ospre…
The White House is sending $25 million to Costa Rica, after providing Albania with similar aid following aggression by hackers linked to Iran.WIRED
Josh has 10 years of military experience, as an Air Force pilot and cyberwarfare officer. Currently, Josh is a Senior Technical Trainer for Neuvik Solutions, providing training, engagement management, penetration testing, risk assessments, and business consulting for clients00:00 Introduction00:22 Our Guest01:06 U.S Air Force Academy to Cyber07:28 …
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


Malicious 3CX Dekstop App Update Lifestream (Friday March 31st 1400 ET, 1800 UTC) https://www.youtube.com/watch?v=cCf3Km_j5bY 3CX Update: https://www.3cx.com/blog/news/desktopapp-security-alert/ SentinelOne: https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/ Objective-See Blog P…
S
SANS Internet Storm Center's Daily Network Security News Podcast


Malicious 3CX Desktop App Update; Reverse Engineering Obfuscated Powershell via Debugger Malicious 3CX Dekstop App Update Lifestream (Friday March 31st 1400 ET, 1800 UTC) https://www.youtube.com/watch?v=cCf3Km_j5bY 3CX Update: https://www.3cx.com/blog/news/desktopapp-security-alert/ SentinelOne: https://www.sentinelone.com/blog/smoothoperator-ongoi…
R
Rational Security


1
The “Tik Tik Tik” Edition
1:15:46
1:15:46
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:15:46
This week, Alan, Quinta, and Scott were joined once again by co-host emeritus and Lawfare Editor-in-Chief Benjamin Wittes to talk through national security news stories from the Holy Land to the Lone Star State, including: “Rebel Aviv.” Prime Minister Bibi Netanyahu’s efforts to dramatically reform Israel’s legal system hit a roadblock this past we…
RIP Gordon Moore, the more in Moore's Law. Photo cropping bugfix. DDoS honeypot. E-commerce patches. Apple 0-day and lots more.https://nakedsecurity.sophos.com/in-memoriam-gordon-moorehttps://nakedsecurity.sophos.com/microsoft-assigns-cve-to-snipping-tool-bughttps://nakedsecurity.sophos.com/cops-use-fake-ddos-serviceshttps://nakedsecurity.sophos.co…
Technological innovation is now one of the most consequential realms of geopolitical contestation. And in the era of big tech, the private sector has assumed power that once resided with governments. In response, we’ve seen a reassertion of industry policy, with governments trying to re-establish control. What happens to Australia’s national securi…
A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden's commercial spyware bill, and Utah gets tough on social media sites. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Register's I…
C
Cyber Security Weekly Podcast


The WA Cyber Security Innovation Hub is excited to be delivering the second CyberWest Summit, 10-11 May, 2023 at the Pan Pacific, Perth WA. CyberWest Summit is WA’s flagship event providing cyber security education and awareness to key sectors and highlighting WA cyber security capabilities. The conference will deliver three content streams: Critic…
E
Enterprise Linux Security


With the recent takeover of the “Linus Tech Tips” YouTube channel, what can we learn? In this episode, Jay and Joao will discuss some of the ways you can prevent such an event from happening to you (and it’s not just YouTube that’s a target). Download Links MP3 version MP3 version (lower bitrate, smaller size) Ogg version…
S
Security Circle

1
Security Circle Podcast Episode Thirteen with Global AI Influencer Gerhard Furter, Talks Chat GPT and AI - Can Humans Harness The Power Without Harm
34:24
Named 3rd in Top 10 IFSEC Global influencers in AI for 2022. Gerhard says, 'I'm paid to play with ideas, toys and possibilities all day while flipping the bird at the industry's concept of 'impossible'. He is the founder and CTO of Iris AL (Pty) Ltd. Specialising in Artificial Intelligence (AI), Machine Learning, Machine Vision, Deep Learning and S…
N
National Security This Week


1
National Security This Week with Professor Steve Andreasen, 3-29-23
1:02:52
1:02:52
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:02:52
Host Jon Olson talks with Humphrey School of Public Affairs professor Steve Andreasen about the US National Security Council and numerous crises around the world.Jon Olson | KYMN News
This week Baer gets right into it with talking some HID alternatives, giving you an excellent Product Highlight and whether it’s introducing or re-introducing, as always he hooks you up with the good news, to line those pockets and make that wallet purrrrrrrrr….s. ChitChat: https://ipvm.com/reports/alt-hid-mercury Product Highlight: https://www.cab…
S
Security Now (Audio)


1
SN 916: Microsoft's Email Extortion - Pwn2Own, Edge Crypto Wallet
1:37:30
1:37:30
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:37:30
Picture of the Week. Synacktiv wins this year's CanSecWest Pwn2Own GitHub: Mistakes happen DDoS for Hire. . .Or Not 144,000 malicious packages published No iPhones For Russian Presidential Staff I NUIT Edge Gets Crypto Microsoft's Email Extortion Show Notes: https://www.grc.com/sn/sn-916-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or sub…
B
Business Security Weekly (Video)


In the leadership and communications section, CISO, The Board, and Cybersecurity, How CISOs Can Work With the CFO to Get the Best Security Budget, Building Effective and Skilled Teams Through Networking, Connectivity, and Communication, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekl…
A
Application Security Weekly (Video)


Ferrari refuses ransomware, OpenAI deals with security issues from cacheing, video killed a crypto ATM, GitHub rotates their RSA SSH key, bypassing CloudTrail, terms and techniques for measuring AI security and safety Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw234…
We often see security as a thing that has definitive check boxes, end states and deliverables. Audits "end" and then start again, but if you are looking at security as a noun -- as in, a thing that gets done, you are falling short. Security must be a verb. You DO security, you do not HAVE security. Security weaves through every layer and goes beyon…
Cloud Security Podcast - This month we are talking about "Cloud Security - the Leadership View" and for the final episode in this series, we spoke to Guy Podjarny ( GuyPo's Linkedin). If you are working on building or securing Cloud resources, can you truly imagine solving the next log4j or AWS/Azure/GCP vulnerability without including the help of …
Josh and Kurt talk to Fiona Krakenbürger about the Sovereign Tech Fund. This is a fund created by Germany to fund important open source projects. Fiona has amazing insight into how this fund was created, what it's doing today to help fund open source. She discusses where we go from here and what the future will look like. The Sovereign Tech Fund is…
https://jongood.com/threat-intel-03-19-23-to-03-25-23-cyber-security-news/Jon Good
Real World Cryptography 2023 is happening any moment now in Tokyo. Also, some phone basebands are broken. Links https://rwc.iacr.org/2023/ https://googleprojectzero.blogspot.com/2023/03/multiple-internet-to-baseband-remote-rce.html Transcript: https://securitycryptographywhatever.com/2023/03/24/rwc-2023/ "Security Cryptography Whatever" is hosted b…
This week I provide several important updates including Android vulnerabilities, Mint Mobile acquisition, BreachForums disappearance, and many new OSINT tools. This is a full show.Direct support for this podcast comes from our privacy services, online training, and new books for 2023 Open Source Intelligence Techniques (10th Edition), and Extreme P…
In this episode Michael and Gladys talk with guests Sean Wesonga and Bojan Magusic about using Infrastructure as Code (IaC) with Microsoft Defender for Cloud. We also discuss Azure Security news about new Azure SQL Database migration abilities for authentication and Transparent Data Encryption (TDE).…
S
State of Security

1
Understanding the Military Gun salute
1:07:41
1:07:41
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:07:41
On this episode the trio dissects the Military gun salute honors, this comes after the President of Italy was honored by the military of Kenya. Who gets a 21 military gun salute? and why? The team also looks at the Military operations that have been ongoing in some six counties in Kenya.
This episode focuses on how global energy trends have shaped the geopolitics of the MENA for much of the past century, and how they will continue to do so. For over two decades, the region seemed to be losing a lot of its energy importance for the West. Both the US and European countries have sought to reduce their involvement in MENA geopolitics, …
N
New Books in National Security


1
Present at the Creation: Edward Mead Earle and the Depression-Era Origins of Security Studies
26:12
Edward Mead Earle was a historian, scholar, professor, and international relations expert; he was also a founding father of the field we know as Security Studies. Listen as David Ekbladh and International Security Editor Sean Lynn-Jones discuss Earle's contributions to the field, his views on what Security Studies should be, his seminar at the Inst…
Data privacy remains an ever-growing concern for both security leaders and governments. What regulations are being put in place? How should security leaders implement zero trust? Find out more in this Security podcast episode featuring Mark Ruchie, Chief Information Security Officer at Entrust. Mark started his security career in the Air Force and …
B
Browsing Security


1
The hacker's point of view on the browser
1:03:31
1:03:31
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:03:31
The browser is one of the easiest access points for cyber criminals. Exploiting browser vulnerabilities for account takeover and damaging environments does not require sophisticated technological capabilities. In fact, sometimes simple social engineering is enough. Yet, most users and organizations don’t take browser security into consideration. Or…
T
The National Security Law Podcast


1
Episode 235: A Drone Struck
1:09:11
1:09:11
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:09:11
We’re back with a Spring Break edition, featuring: ICC cases emerging against Russian defendants for (1) removing children from Ukraine to Russia and (2) attacking civilian infrastructure A UK drone strike in Syria, a US drone strike in Yemen, and a US drone struck (by the Russians) Renewal of Section 702 and the Rep. LaHood story TikTok, CFIUS, an…
B
Black Hills Information Security


1
Talkin’ About Infosec News – 3/16/2023
1:00:36
1:00:36
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:00:36
00:00 – PreShow Banter™ — Tossing Money at Problems00:58 – BHIS – Talkin’ Bout [infosec] News 2023-03-1301:41 – Story # 1: Silicon Valley Bank collapse: Treasury, Fed, and FDIC announce […] The post Talkin’ About Infosec News – 3/16/2023 appeared first on Black Hills Information Security.Black Hills Information Security