SecurityGen
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
S
Security Cryptography Whatever


1
Security Cryptography Whatever
Deirdre Connolly, Thomas Ptacek, David Adrian
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
Your occasional dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte This show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5634794/advertisement
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
Podcasts on security, militancy, conflict, International Relations, and more.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhino Security.
…
continue reading
Global Security Briefing provides regular insights from leading international experts to help you make sense of the far-reaching changes affecting international security around the globe. Hosted by analysts from RUSI's International Security Studies team, the podcast looks at how the UK can best shape its foreign and security policies in an increasingly dynamic international environment. The views or statements expressed by guests are their own and their appearance on the podcast does not im ...
…
continue reading
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Host Jon Olson, US Navy (Ret.) Interviews different experts to learn about current and historical events with a focus on national security. Topic's include: the economy, climate change, cyber security, nuclear weapons, intelligence operations, and more. New episodes released Wednesdays.
…
continue reading
Hosted by Edward Walton, Andrea Fisher, Rod Trent, and Brodie Cassell, the Microsoft Security Insights show provides information, news, tips on the Microsoft Security Solutions including Microsoft Sentinel, Microsoft 365 Defender, and Azure.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
…
continue reading
If you're looking for a bunch of us security nerds to get together and talk shop, then Paul’s Security Weekly is for you. This show features interviews with folks in the security community; technical segments, which are just that, very technical; and security news, which is an open discussion forum for the hosts to express their opinions about the latest security headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more. The topics vary greatly and the ...
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
…
continue reading
S
SANS Internet Storm Center's Daily Network Security News Podcast


1
SANS Internet Storm Center's Daily Network Security News Podcast
Johannes B. Ullrich
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Security Today is a podcast centered around physical security and the security industry. From articles to philosophies to trending topics, Baer leads you down the info hole of Security Today. @unclebaer_ on IG and Twitter @securitytodaypodcast on IG Brought to you by @sprinterdatacom on IG
…
continue reading
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Security teams have their hands full. Building relationships across the entire organization is vital for success. In Champions of Security, I interview passionate individuals with unique stories. Each guest shares their honest opinions about what’s working (and what isn’t) in the security world. Tune in to learn valuable insights about keeping your customers safe.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
D
DARKWEB.TODAY - Hackers & Cyber SECURITY


1
DARKWEB.TODAY - Hackers & Cyber SECURITY
Alberto Daniel Hill
“In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened." I am Alberto and this podcast is about my story, cybersecurity and hackers. https://podcast.darkweb.today/ https://twitter.com/ADanielHill https://twitter.com/Darkwebtoday https://darkweb.today http ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
The straight up security news in 20 minutes or less! Links to all news articles are included here.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
C
Contain This: The Latest in Global Health Security


1
Contain This: The Latest in Global Health Security
Indo-Pacific Centre for Health Security: Department of Foreign Affairs and Trade
Produced for the Australian Government's Indo-Pacific Centre for Health Security, this fortnightly podcast will bring you insightful information and updates on what is shaping the future of global health.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
P
Paul's Security Weekly TV


1
Phrenology, Barracuda, MoveIt, Lazarus, Minecraft, ChatGPT, Adrian Sanabria, and More - SWN #303
37:26
Phrenology, Barracuda, MoveIt, Lazarus, Minecraft, ChatGPT, Adrian Sanabria, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-303
…
continue reading
P
Paul's Security Weekly


1
Phrenology, Barracuda, MoveIt, Lazarus, Minecraft, ChatGPT, Adrian Sanabria, & More - SWN #303
37:21
Phrenology, Barracuda, MoveIt, Lazarus, Minecraft, ChatGPT, Adrian Sanabria, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly…
…
continue reading
Hey friends! Today we're taking a second look at ADHD - Active Defense Harbinger Distribution - a cool VM full of tools designed to annoy/attribute/attack pesky attackers! The tools covered today include: PHP-HTTP-TARPIT A tool to confuse and waste bot/scanner/hacker time. Grab it here and check out our setup instructions: sudo git clone https://gi…
…
continue reading
S
Security Confidential


This is part 1 of our discussion. Bec McKeown is a Chartered Psychologist with twenty years’ experience of researching and evaluating human performance in high-risk, high-stakes organizations, including the UK Ministry of Defence. She is an expert on the ways humans behave when working in complex, uncertain and ambiguous environments and human perf…
…
continue reading
T
The Microsoft Security Insights Show


1
Microsoft Security Insights Show Episode 156 - Yuri Diogenes- Principal PM
1:02:24
1:02:24
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:02:24
Join us as we endeavor to tap into Yuri Diogenes' vast knowledge and expertise in navigating the landscape of building a career in cybersecurity. Show links: Microsoft Defender in the Field all episodes: https://aka.ms/MDFCInTheField Yuri's Overcome podcast: http://overcomepodcast.us/ Defender for Cloud labs: https://aka.ms/MDCLabs Cloud Security P…
…
continue reading
New testimony from defectors reveals pervasive surveillance and monitoring of limited internet connections. For millions of others, the internet simply doesn't exist. Read this story here.WIRED
…
continue reading
P
Paul's Security Weekly TV


1
How to Enable Generative AI in Enterprise While Mitigating the Most Common Risks - Alex Babin - ESW #320
49:02
Generative AI is taking the world by storm. Naturally, enterprises are looking for ways to integrate the innovative technology into their techstack, boost productivity of the knowledge workers and overall increase their ROI. The question is, how to do it without compromising data privacy and security standards of the enterprises. Segment Resources:…
…
continue reading
Overview This week we investigate the mystery of failing GPG signatures for the 16.04 ISOimages, plus we look at security updates for CUPS, Avahi, the Linux kernel, FRR,Go and more. This week in Ubuntu Security Updates 58 unique CVEs addressed [USN-6128-1, USN-6128-2] CUPS vulnerability (00:56) 1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM…
…
continue reading
C
Cyber Security Headlines


New PowerDrop malware targets U.S. aerospace defense industry Zipper giant YKK confirms cyberattack targeted U.S. networks Barracuda urges customers to replace vulnerable appliances immediately Thanks to this week's episode sponsor, Trend Micro Hybrid work, cloud adoption, and shadow IT have introduced new cybersecurity risks to organizations. Secu…
…
continue reading
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


Geoserver Scans https://isc.sans.edu/diary/Ongoing%20scans%20for%20Geoserver/29926 Barracuda Recommends Replacing Compromised Devices https://www.barracuda.com/company/legal/esg-vulnerability Google improves Chrome Password Manager https://www.msn.com/en-us/news/other/chrome-adds-windows-biometric-logins-to-its-password-powers/ar-AA1ciCCf Minecraft…
…
continue reading
PODCAST | Pakistan political situation | Ep # 359 (Urdu)
…
continue reading
S
SANS Internet Storm Center's Daily Network Security News Podcast


Geoserver Scans; Barracuda ESG Replacement; Google Chrome Password Manager; Minecraft Mods; Trend Micro Patch Geoserver Scans https://isc.sans.edu/diary/Ongoing%20scans%20for%20Geoserver/29926 Barracuda Recommends Replacing Compromised Devices https://www.barracuda.com/company/legal/esg-vulnerability Google improves Chrome Password Manager https://…
…
continue reading
Baer breaks it down this week Hanwha changing the vidoe surveillance game, the TKW community and giving you the frisk on Access Control right now! Check it out, like, subscribe and follow on IG and Twitter! ChitChat: teknowledgeww.org Product Highlight: https://www.securityinfowatch.com/video-surveillance/cameras/product/53062240/hanwha-vision-hanw…
…
continue reading
R
Rational Security


1
The “Air Quality Fuchsia” Edition
1:06:28
1:06:28
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:06:28
This week, Alan, Quinta, and Scott braved the haze to talk through the week’s (very) big national security news stories, including: “Downstream Effects.” The destruction of the Kakhovka Dam in Ukraine promises a new wave of suffering and environmental devastation for Ukrainians living along the Dnipro River. Who is responsible? And what could the r…
…
continue reading
N
New Books in National Security


1
Lawrence Freedman, "Command: The Politics of Military Operations from Korea to Ukraine" (Oxford UP, 2022)
47:39
Command in war is about forging effective strategies and implementing them, making sure that orders are appropriate, well-communicated, and then obeyed. But it is also an intensely political process. This is largely because how wars are fought depends to a large extent on how their aims are set. It is also because commanders in one realm must posse…
…
continue reading
C
Contain This: The Latest in Global Health Security


1
What is the current status of the malaria epidemic? A conversation with Dr James Kelley from WHO’s Regional Office for the Western Pacific
34:56
Our guest this week is Dr James Kelley, Team Lead for Malaria and Vector-borne Diseases in the World Health Organization’s Western Pacific Regional Office. In honour of World Malaria Day 2023, Dr Kelley describes the status of the epidemic globally and in the Indo-Pacific Region. We also discuss: Getting the Global Technical Strategy target of redu…
…
continue reading
Australia's signal intelligence agency calls upon an Eighties popstar to fight terrorism, and a simple act of kindness leads to a woman being scammed for thousands. All this and much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Plus - don't miss our featured…
…
continue reading
T
The Security Circle

Bio: Carolyn is the CEO and founder of maiden-voyagage.com. Carolyn launched Maiden Voyage in 2008 after leading technology teams and travelling extensively for companies such as the BBC, ITV, easyJet and Sony Music. She combined her tech and entrepreneurial skills, coupled with her experience as a solo woman traveller to create a company that is n…
…
continue reading
Credential harvesting, backdoor attacks and staying on top of who or what is logging into your networks. While more connection points can create more security soft spots for industrial enterprises, it’s no surprise that hackers would generally prefer to log in, as opposed to break in. It’s rumored that credential theft via phishing schemes is how a…
…
continue reading
C
CNA Talks: A National Security Podcast


For decades, competition between the United States and Russia has defined strategic deterrence. But as China emerges as the greatest rival to the United States, it is worth examining how Beijing views the concept. In this episode we examine how China’s military and civilian analysts are writing about strategic deterrence, and how new technologies a…
…
continue reading
P
Paul's Security Weekly (Podcast-Only)


1
L0pht Heavy Industries Panel - PSW Vault
1:02:15
1:02:15
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:02:15
Check out this interview from the PSW VAULT, hand picked by main host Paul Asadoorian! This segment was originally published on October 18, 2015. L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. We learn about the history of the L0pht and the future. Visit https://www.securit…
…
continue reading
N
National Security This Week


1
National Security This Week with Professor Christopher Tounsel from the University of Washington, 6-7-23
1:03:16
1:03:16
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:03:16
This week, Jon Olson's guest is Professor Christopher Tounsel from the University of Washington and they discuss the ongoing crisis and civil war in Sudan.Jon Olson | KYMN News
…
continue reading
Öffentlich zugängliche Quellen zur Suche nach Sicherheitslücken nutzen (OSINT) ist ein guter Weg, um einen Schritt schneller zu sein, als die Hacker. Aber was ist erlaubt und was nicht? Die Toleranz der Aufsichtsbehörden kennt jedenfalls Grenzen. Im Gespräch mit Rechtswissenschaftler Prof. Gerrit Hornung stecken wir den Rechtsrahmen um Datenschutz …
…
continue reading
C
Champions of Security

1
How to Ensure Secure Governance for Generative AI w/ Walter Haydock, Founder & CEO of StackAware
49:00
In Episode 9 of Champions of Security, Jacob Garrison interviews Walter Haydock, Founder & CEO of StackAware, a cybersecurity risk management and communication platform. Walter is also the author of the blog Deploying Securely. Previously, he was a Director of Product Management at Privacera - a data governance startup backed by Accel and Insight P…
…
continue reading
S
Security Now (Audio)


1
SN 926: Windows Platform Binary Table - OWASP, Tor anti-DoS protection, Mandatory SMB Signing on Win 11
2:15:00
2:15:00
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:15:00
Picture of the Week. Another week of silence from HP. Mandatory "SMB Signing" coming to Windows 11. OWASP. Did Apple help the NSA attack the Kremlin? Kaspersky's analysis of this iPhone attack and compromise. The Trifecta Jackpot! Who wrote that? Tor gets anti-DoS protection. Cybersecurity at Educational institutions. Civilian Surveillance Cameras …
…
continue reading
S
Security Weekly News (Video)


Ducking AI, Kimsuky redux, SMB signing, MoveIt, Gigabyte, Splunk, Chrome Extensions, AI, Jason Wood and more on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-302
…
continue reading
S
Security Weekly News (Audio)


Ducking AI, Kimsuky redux, SMB signing, MoveIt, Gigabyte, Splunk, Chrome Extensions, AI, Jason Wood and more on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Note…
…
continue reading
Russia's invasion of Ukraine changed the entire geopolitical landscape. For this episode, we were on-site at SPHERE23 with security and foreign policy analyst Jessica Berlin, and threat intelligence analyst Stephen Robinson, to discuss the use of cyber attacks and disinformation as policy instruments in the wake of the invasion.…
…
continue reading
B
Business Security Weekly (Video)


1
Cybersecurity and the Board, Achieve More with Less, & Authentic Leadership is Hard - BSW #308
30:42
In the leadership and communications section, Cybersecurity Starts with the Board and C-Suite, How CISOs can achieve more with less during uncertain economic times, Why Authentic Leadership Is So Hard, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-308…
…
continue reading
S
SecurityGen's Podcast


Experience the unparalleled power of 5g security with the assurance of rock-solid security by joining our revolutionary security program. At SecurityGen, we recognize the immense potential that 5G holds for transforming industries, enabling seamless communication, and driving innovation. However, we also understand the critical need to establish ro…
…
continue reading
C
Cloud Security Podcast by Google


1
EP124 Safe Browsing: Lessons from How Google Secures Five Billion Devices at Low False Positive Rates
25:03
Guest: Panos Mavrommatis, Senior Engineering Director at Google Cloud Topics: Could you give us the 30 second overview of our favorite “billion user security product” - SafeBrowsing - and, since you were there, how did it get started? SafeBrowsing is a consumer and business product – are you mitigating the same threats and threat models on each sid…
…
continue reading
S
Security Clearance Careers Podcast


Tune in to How Having the Freedom to Fail Makes the US Cyber Threat Ready What does the future of the cyber threat landscape look like in the next year? Or decade? We don’t know for sure how consequential it is, but we know the implications are heave with adversarial threats like China and Russia. To comment, ClearanceJobs welcomes ex-employee of t…
…
continue reading
Josh and Kurt talk about namespaces. They were a topic in the last podcast, and resulted in a much much larger discussion for us. We decided to hash out some of our thinking in an episode. This is a much harder problem than either of us expected. We don't have any great answers, but we do have a lot of questions. Show Notes Not Red Hat NPM hash pac…
…
continue reading
Amazon to pay over $30 million in FTC settlements over Ring, Alexa privacy violations This show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5634794/advertisementCarl Franklin
…
continue reading
This week I begin the conversation about self-hosting everything, plus offer the latest privacy news.Direct support for this podcast comes from our privacy services, online training, and latest books. More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free.Listen to PAST episodes at https://inteltechniques.com/podc…
…
continue reading
Cloud Security Podcast - Tanya Janca and Caroline Wong were on a panel with @AshishRajan at @RSAConference 2023. The Topic for the panel discussed what's the space of application security with cloud security or is it more they need to be separate camps. Episode YouTube Video - https://www.youtube.com/watch?v=WSIykXAy6Z4 Cloud Security Podcast Websi…
…
continue reading
S
Security Masterminds


1
Security Awareness by Blending Entertainment and Education for Engaging Employees, with Special Guest, Rob McCollum
40:14
Check us out on our new LinkedIn Page! - https://www.linkedin.com/company/security-masterminds-podcast/ Are you struggling to raise cybersecurity awareness despite following the same old advice? Discover the power of storytelling and engagement in transforming cybersecurity training and arming your workforce against message fatigue and over-relianc…
…
continue reading
As Recep Tayyip Erdoğan emerges as the winner of Turkey’s presidential elections, we examine what this means for the country, the region and the world. Erdoğan’s victory hardly came as a surprise. He had almost won in the first round, gaining 49.51% of the vote compared to 44.8% for Kemal Kılıçdaroğlu, the 74-year-old retired civil servant leading …
…
continue reading
In the latest Ask Me Anything (AMA) episode from Security magazine, Todd Jones, Director of Campus Safety at the Minneapolis College of Art and Design, discusses how to best utilize the summer to improve campus security programs; partnering with external and internal stakeholders on safety; and more.…
…
continue reading
Are Twitter’s new encrypted DMs unreadable even if you put a gun to Elon’s head? We invited Matthew Garrett on to do a deep decompiled dive into what kind of cryptography actually shipped. Transcript: https://securitycryptographywhatever.com/2023/05/29/elons-encrypted-dms-with-matthew-garrett/ Links: https://mjg59.dreamwidth.org/66791.html https://…
…
continue reading
HACKINGHACKATONS294523acde44ab212960cf58df4de5b0 --- Send in a voice message: https://podcasters.spotify.com/pod/show/darkwebtoday/message
…
continue reading
S
SecurityMetrics Podcast


Early detection of unauthorized access to electronic Protected Health Information (ePHI) is critical to preventing breaches and meeting HIPAA requirements. The co-founders of SPHER, Inc., Raymond Ribble, CEO, and Robert Pruter, Chief Revenue Officer, sit down with Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) to discuss: -W…
…
continue reading
Generative AI is introducing a new set of product development and data analytics opportunities that were previously inaccessible. Enterprises can leverage Generative AI across different lines of business to gain insights into human interactions and to identify anomalies, while also cutting costs. In cyber security, for example, Generative AI can be…
…
continue reading