Security відкриті
[search 0]
більше

Download the App!

show episodes
 
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte This show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5634794/advertisement
  continue reading
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
  continue reading
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
  continue reading
 
G
Global Security Briefing

1
Global Security Briefing

The Royal United Services Institute

Unsubscribe
Unsubscribe
Щомісяця+
 
Global Security Briefing provides regular insights from leading international experts to help you make sense of the far-reaching changes affecting international security around the globe. Hosted by analysts from RUSI's International Security Studies team, the podcast looks at how the UK can best shape its foreign and security policies in an increasingly dynamic international environment. The views or statements expressed by guests are their own and their appearance on the podcast does not im ...
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
S
Smashing Security

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Щотижня
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
  continue reading
 
T
The Security Podcasts

1
The Security Podcasts

www.securitymagazine.com

Unsubscribe
Unsubscribe
Щомісяця+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
If you're looking for a bunch of us security nerds to get together and talk shop, then Paul’s Security Weekly is for you. This show features interviews with folks in the security community; technical segments, which are just that, very technical; and security news, which is an open discussion forum for the hosts to express their opinions about the latest security headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more. The topics vary greatly and the ...
  continue reading
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
C
Cloud Security Podcast

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
Щотижня
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Security Today is a podcast centered around physical security and the security industry. From articles to philosophies to trending topics, Baer leads you down the info hole of Security Today. @unclebaer_ on IG and Twitter @securitytodaypodcast on IG Brought to you by @sprinterdatacom on IG
  continue reading
 
S
Security-Insider

1
Security-Insider

Peter Schmitz und Dirk Srocke

Unsubscribe
Unsubscribe
Щомісяця
 
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
  continue reading
 
Security teams have their hands full. Building relationships across the entire organization is vital for success. In Champions of Security, I interview passionate individuals with unique stories. Each guest shares their honest opinions about what’s working (and what isn’t) in the security world. Tune in to learn valuable insights about keeping your customers safe.
  continue reading
 
“In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened." I am Alberto and this podcast is about my story, cybersecurity and hackers. https://podcast.darkweb.today/ https://twitter.com/ADanielHill https://twitter.com/Darkwebtoday https://darkweb.today http ...
  continue reading
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
T
The Security Circle

1
The Security Circle

Yolanda Hamblen (Yoyo)

Unsubscribe
Unsubscribe
Щотижня
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Loading …
show series
 
Phrenology, Barracuda, MoveIt, Lazarus, Minecraft, ChatGPT, Adrian Sanabria, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-303
  continue reading
 
Phrenology, Barracuda, MoveIt, Lazarus, Minecraft, ChatGPT, Adrian Sanabria, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly…
  continue reading
 
Hey friends! Today we're taking a second look at ADHD - Active Defense Harbinger Distribution - a cool VM full of tools designed to annoy/attribute/attack pesky attackers! The tools covered today include: PHP-HTTP-TARPIT A tool to confuse and waste bot/scanner/hacker time. Grab it here and check out our setup instructions: sudo git clone https://gi…
  continue reading
 
This is part 1 of our discussion. Bec McKeown is a Chartered Psychologist with twenty years’ experience of researching and evaluating human performance in high-risk, high-stakes organizations, including the UK Ministry of Defence. She is an expert on the ways humans behave when working in complex, uncertain and ambiguous environments and human perf…
  continue reading
 
Join us as we endeavor to tap into Yuri Diogenes' vast knowledge and expertise in navigating the landscape of building a career in cybersecurity. Show links: Microsoft Defender in the Field all episodes: https://aka.ms/MDFCInTheField Yuri's Overcome podcast: http://overcomepodcast.us/ Defender for Cloud labs: https://aka.ms/MDCLabs Cloud Security P…
  continue reading
 
Generative AI is taking the world by storm. Naturally, enterprises are looking for ways to integrate the innovative technology into their techstack, boost productivity of the knowledge workers and overall increase their ROI. The question is, how to do it without compromising data privacy and security standards of the enterprises. Segment Resources:…
  continue reading
 
Overview This week we investigate the mystery of failing GPG signatures for the 16.04 ISOimages, plus we look at security updates for CUPS, Avahi, the Linux kernel, FRR,Go and more. This week in Ubuntu Security Updates 58 unique CVEs addressed [USN-6128-1, USN-6128-2] CUPS vulnerability (00:56) 1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM…
  continue reading
 
New PowerDrop malware targets U.S. aerospace defense industry Zipper giant YKK confirms cyberattack targeted U.S. networks Barracuda urges customers to replace vulnerable appliances immediately Thanks to this week's episode sponsor, Trend Micro Hybrid work, cloud adoption, and shadow IT have introduced new cybersecurity risks to organizations. Secu…
  continue reading
 
Geoserver Scans https://isc.sans.edu/diary/Ongoing%20scans%20for%20Geoserver/29926 Barracuda Recommends Replacing Compromised Devices https://www.barracuda.com/company/legal/esg-vulnerability Google improves Chrome Password Manager https://www.msn.com/en-us/news/other/chrome-adds-windows-biometric-logins-to-its-password-powers/ar-AA1ciCCf Minecraft…
  continue reading
 
Geoserver Scans; Barracuda ESG Replacement; Google Chrome Password Manager; Minecraft Mods; Trend Micro Patch Geoserver Scans https://isc.sans.edu/diary/Ongoing%20scans%20for%20Geoserver/29926 Barracuda Recommends Replacing Compromised Devices https://www.barracuda.com/company/legal/esg-vulnerability Google improves Chrome Password Manager https://…
  continue reading
 
Baer breaks it down this week Hanwha changing the vidoe surveillance game, the TKW community and giving you the frisk on Access Control right now! Check it out, like, subscribe and follow on IG and Twitter! ChitChat: teknowledgeww.org Product Highlight: https://www.securityinfowatch.com/video-surveillance/cameras/product/53062240/hanwha-vision-hanw…
  continue reading
 
This week, Alan, Quinta, and Scott braved the haze to talk through the week’s (very) big national security news stories, including: “Downstream Effects.” The destruction of the Kakhovka Dam in Ukraine promises a new wave of suffering and environmental devastation for Ukrainians living along the Dnipro River. Who is responsible? And what could the r…
  continue reading
 
Command in war is about forging effective strategies and implementing them, making sure that orders are appropriate, well-communicated, and then obeyed. But it is also an intensely political process. This is largely because how wars are fought depends to a large extent on how their aims are set. It is also because commanders in one realm must posse…
  continue reading
 
Our guest this week is Dr James Kelley, Team Lead for Malaria and Vector-borne Diseases in the World Health Organization’s Western Pacific Regional Office. In honour of World Malaria Day 2023, Dr Kelley describes the status of the epidemic globally and in the Indo-Pacific Region. We also discuss: Getting the Global Technical Strategy target of redu…
  continue reading
 
Australia's signal intelligence agency calls upon an Eighties popstar to fight terrorism, and a simple act of kindness leads to a woman being scammed for thousands. All this and much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Plus - don't miss our featured…
  continue reading
 
Bio: Carolyn is the CEO and founder of maiden-voyagage.com. Carolyn launched Maiden Voyage in 2008 after leading technology teams and travelling extensively for companies such as the BBC, ITV, easyJet and Sony Music. She combined her tech and entrepreneurial skills, coupled with her experience as a solo woman traveller to create a company that is n…
  continue reading
 
Credential harvesting, backdoor attacks and staying on top of who or what is logging into your networks. While more connection points can create more security soft spots for industrial enterprises, it’s no surprise that hackers would generally prefer to log in, as opposed to break in. It’s rumored that credential theft via phishing schemes is how a…
  continue reading
 
For decades, competition between the United States and Russia has defined strategic deterrence. But as China emerges as the greatest rival to the United States, it is worth examining how Beijing views the concept. In this episode we examine how China’s military and civilian analysts are writing about strategic deterrence, and how new technologies a…
  continue reading
 
Check out this interview from the PSW VAULT, hand picked by main host Paul Asadoorian! This segment was originally published on October 18, 2015. L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. We learn about the history of the L0pht and the future. Visit https://www.securit…
  continue reading
 
This week, Jon Olson's guest is Professor Christopher Tounsel from the University of Washington and they discuss the ongoing crisis and civil war in Sudan.Jon Olson | KYMN News
  continue reading
 
Öffentlich zugängliche Quellen zur Suche nach Sicherheitslücken nutzen (OSINT) ist ein guter Weg, um einen Schritt schneller zu sein, als die Hacker. Aber was ist erlaubt und was nicht? Die Toleranz der Aufsichtsbehörden kennt jedenfalls Grenzen. Im Gespräch mit Rechtswissenschaftler Prof. Gerrit Hornung stecken wir den Rechtsrahmen um Datenschutz …
  continue reading
 
In Episode 9 of Champions of Security, Jacob Garrison interviews Walter Haydock, Founder & CEO of StackAware, a cybersecurity risk management and communication platform. Walter is also the author of the blog Deploying Securely. Previously, he was a Director of Product Management at Privacera - a data governance startup backed by Accel and Insight P…
  continue reading
 
Picture of the Week. Another week of silence from HP. Mandatory "SMB Signing" coming to Windows 11. OWASP. Did Apple help the NSA attack the Kremlin? Kaspersky's analysis of this iPhone attack and compromise. The Trifecta Jackpot! Who wrote that? Tor gets anti-DoS protection. Cybersecurity at Educational institutions. Civilian Surveillance Cameras …
  continue reading
 
Ducking AI, Kimsuky redux, SMB signing, MoveIt, Gigabyte, Splunk, Chrome Extensions, AI, Jason Wood and more on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-302
  continue reading
 
Ducking AI, Kimsuky redux, SMB signing, MoveIt, Gigabyte, Splunk, Chrome Extensions, AI, Jason Wood and more on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Note…
  continue reading
 
Russia's invasion of Ukraine changed the entire geopolitical landscape. For this episode, we were on-site at SPHERE23 with security and foreign policy analyst Jessica Berlin, and threat intelligence analyst Stephen Robinson, to discuss the use of cyber attacks and disinformation as policy instruments in the wake of the invasion.…
  continue reading
 
In the leadership and communications section, Cybersecurity Starts with the Board and C-Suite, How CISOs can achieve more with less during uncertain economic times, Why Authentic Leadership Is So Hard, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-308…
  continue reading
 
Experience the unparalleled power of 5g security with the assurance of rock-solid security by joining our revolutionary security program. At SecurityGen, we recognize the immense potential that 5G holds for transforming industries, enabling seamless communication, and driving innovation. However, we also understand the critical need to establish ro…
  continue reading
 
Guest: Panos Mavrommatis, Senior Engineering Director at Google Cloud Topics: Could you give us the 30 second overview of our favorite “billion user security product” - SafeBrowsing - and, since you were there, how did it get started? SafeBrowsing is a consumer and business product – are you mitigating the same threats and threat models on each sid…
  continue reading
 
Tune in to How Having the Freedom to Fail Makes the US Cyber Threat Ready What does the future of the cyber threat landscape look like in the next year? Or decade? We don’t know for sure how consequential it is, but we know the implications are heave with adversarial threats like China and Russia. To comment, ClearanceJobs welcomes ex-employee of t…
  continue reading
 
Josh and Kurt talk about namespaces. They were a topic in the last podcast, and resulted in a much much larger discussion for us. We decided to hash out some of our thinking in an episode. This is a much harder problem than either of us expected. We don't have any great answers, but we do have a lot of questions. Show Notes Not Red Hat NPM hash pac…
  continue reading
 
Amazon to pay over $30 million in FTC settlements over Ring, Alexa privacy violations This show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5634794/advertisementCarl Franklin
  continue reading
 
This week I begin the conversation about self-hosting everything, plus offer the latest privacy news.Direct support for this podcast comes from our privacy services, online training, and latest books. More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free.Listen to PAST episodes at https://inteltechniques.com/podc…
  continue reading
 
Cloud Security Podcast - Tanya Janca and Caroline Wong were on a panel with @AshishRajan at @RSAConference 2023. The Topic for the panel discussed what's the space of application security with cloud security or is it more they need to be separate camps. Episode YouTube Video - https://www.youtube.com/watch?v=WSIykXAy6Z4 Cloud Security Podcast Websi…
  continue reading
 
Check us out on our new LinkedIn Page! - https://www.linkedin.com/company/security-masterminds-podcast/ Are you struggling to raise cybersecurity awareness despite following the same old advice? Discover the power of storytelling and engagement in transforming cybersecurity training and arming your workforce against message fatigue and over-relianc…
  continue reading
 
As Recep Tayyip Erdoğan emerges as the winner of Turkey’s presidential elections, we examine what this means for the country, the region and the world. Erdoğan’s victory hardly came as a surprise. He had almost won in the first round, gaining 49.51% of the vote compared to 44.8% for Kemal Kılıçdaroğlu, the 74-year-old retired civil servant leading …
  continue reading
 
In the latest Ask Me Anything (AMA) episode from Security magazine, Todd Jones, Director of Campus Safety at the Minneapolis College of Art and Design, discusses how to best utilize the summer to improve campus security programs; partnering with external and internal stakeholders on safety; and more.…
  continue reading
 
Are Twitter’s new encrypted DMs unreadable even if you put a gun to Elon’s head? We invited Matthew Garrett on to do a deep decompiled dive into what kind of cryptography actually shipped. Transcript: https://securitycryptographywhatever.com/2023/05/29/elons-encrypted-dms-with-matthew-garrett/ Links: https://mjg59.dreamwidth.org/66791.html https://…
  continue reading
 
Early detection of unauthorized access to electronic Protected Health Information (ePHI) is critical to preventing breaches and meeting HIPAA requirements. The co-founders of SPHER, Inc., Raymond Ribble, CEO, and Robert Pruter, Chief Revenue Officer, sit down with Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) to discuss: -W…
  continue reading
 
Generative AI is introducing a new set of product development and data analytics opportunities that were previously inaccessible. Enterprises can leverage Generative AI across different lines of business to gain insights into human interactions and to identify anomalies, while also cutting costs. In cyber security, for example, Generative AI can be…
  continue reading
 
Loading …

Короткий довідник