show episodes
 
H
Hacked

1
Hacked

Sticks & Stones

Unsubscribe
Unsubscribe
Monthly
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
S
Smashing Security

1
Smashing Security

Graham Cluley, Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
The Packet Pushers Podcast Network offers continuous professional development for IT professionals. Keep up with networking, security, cloud, career, and more. We bring the IT community together--engineers, architects, vendors, developers, educators, etc. In this feed, listen to every conversation we record!
 
It takes a lot to solve complex data problems securely. A sandbox is the perfect space to discover new approaches. In season two of Security Sandbox, Relativity CSO & CIO Amanda Fennell chats with guests about maximizing security's greatest asset—people—through meaningful use of technology and process, creative and compassionate training, and the conviction that there is room for taking risk in security.​
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
“In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened." I am Alberto and this podcast is about my story, cybersecurity and hackers. https://podcast.darkweb.today/ https://twitter.com/ADanielHill https://twitter.com/Darkwebtoday https://darkweb.today http ...
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Meher Roy, Sunny Aggarwal, and Friederike Ernst. Since 2014, episodes have been downloaded over 4 million times.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
 
Are you a professional developer, or do you want to be? Worried that your computer science theory is not enough, or is outdated? We'll talk about which parts are useful, which aren't, and why/where. Every week you'll get an informed opinion from a professional developer about a specific part of computer science and when/where/whether it's useful. We cover algorithms, analysis, data structures and all sorts of theory, here on Comp Sci: Just the Useful Bits.
 
The Exascale Computing Project (ECP) is accelerating delivery of a capable exascale computing ecosystem to provide breakthrough solutions that will address America's most critical challenges in scientific discovery, energy assurance, economic competitiveness, and national security. Let’s Talk Exascale explores Application Development, Software Technology, and Hardware and Integration—focus areas of the ECP.
 
Loading …
show series
 
This week in the AppSec News: Lessons learned from fuzzing, OT:ICEFALL report on insecure designs, CSA's Top Threats to Cloud Computing, Twitter apologizes for misusing data collection, & State of Open Source Security report! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw202…
 
Picture of the week. Chrome's fourth zero-day of 2022. Mozilla's new Firefox privacy-enhancing feature. HackerOne discloses a malicious insider incident. Closing the loop. The ZuoRAT. We invite you to read our show notes at https://www.grc.com/sn/SN-878-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit…
 
Picture of the week. Chrome's fourth zero-day of 2022. Mozilla's new Firefox privacy-enhancing feature. HackerOne discloses a malicious insider incident. Closing the loop. The ZuoRAT. We invite you to read our show notes at https://www.grc.com/sn/SN-878-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit…
 
How do you keep Windows devices updated? Richard talks to Arianna Carley about Microsoft's array of update services, including Windows Update for Business, Windows Server Update Services, Intune, Configuration Manager, and more! The host of products can be intimidating, but Aria lays out their role in your organization in a triangle of cost, time, …
 
EternalBlue Retrospective; OpenSSL Update; Keystroke Logging NPM Packages EternalBlue 5 Years After WannaCry and NotPetya https://isc.sans.edu/forums/diary/EternalBlue+5+years+after+WannaCry+and+NotPetya/28816/ OpenSSL Patches Two Vulnerabilities https://www.openssl.org/news/secadv/20220705.txt Iconburst NPM Software Supply Chain Attack https://blo…
 
Cyberattack hits a Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Royal Army accounts are hijacked. A hacktivist group claims to have hit Iranian sites. A very very large database of PII is for sale on the dark web. Chase Snyder from ExtraHop has a look back at WannaCry, 5 years on. Ben Yel…
 
This episode, in the first segment Matt McGuirk, Solution Architect at Source Defense, joins to discuss Understanding Web Application Client-Side Risk! Then, we are joined by Ian Glazer, the SVP of Product Management, Identity at Salesforce, to talk about Salesforce's Journey Towards Complete Customer MFA! Finally, in the Enterprise Security News, …
 
We’re going back in time, or is it forward?, as we continue learning about Google’s automation evolution, while Allen doesn’t like certain beers, Joe is a Zacker, and Michael poorly assumes that UPSes work best when plugged in. The full show notes for this episode are available at https://www.codingblocks.net/episode188. Survey Says Anonymous Vote …
 
7-Zip and MotW; Session Manager Backdoor; Chrome 0Day Patch 7Zip Mark of the Web For Office Files https://isc.sans.edu/forums/diary/7Zip+MoW+For+Office+files/28812/ SessionManager Backdoor Seen with IIS https://securelist.com/the-sessionmanager-iis-backdoor/106868/ Googe Chrome Stable Channel Update https://chromereleases.googleblog.com/2022/03/sta…
 
In this episode, Marc and Patrick Morley, former CEO of Carbon Black, get nostalgic as they discuss Patrick's journey of coming up through the start up scene in the 90s—from working with VCs to taking companies public—and compare it to running cyber companies today. Along with the early career experience that helped form Patrick's leadership philos…
 
While many of us prefer order in our lives, at least most of the time, we sometimes need a little chaos. Specifically, we need a source of true randomness in order to properly drive many of our cryptographic systems – to secure our digital communications, for example. And while computers are very good at doing what we tell them to do, they suck at …
 
I barely know how to summarise this one. It's one of my favourites. Andrew is from dot-NET rather than Ruby. He was raised by missionaries, and is thus extremely literate about cultures and how to introduce yourself into a new one. He sees a lot of what I see from a very enlightened outsider's perspective. Which is like catnip to me, just so we're …
 
The day the celebrity showed up in my twitter space and ... "everything can happen in my spaces..." More details: https://alberto.hacker1337.club/reality-drama-on-twitterspaces/ Also available at: https://darkw3b.firstory.io/ Content by @ADanielHill from the #HACKER1337 Club @hacker1337club https://hacker1337.club --- Send in a voice message: https…
 
Over the past year, we’ve seen more buzz develop around attack surface management. In fact, major analyst firms Forrester and Gartner recently released research about this topic. But what exactly is it? In this segment, join Mark St. John, LookingGlass’s SVP of Product, to learn more about how to define your attack surface, how to manage it, and ho…
 
Für diese Ausgabe ihres Podcasts verlegen Linus Neumann und Tim Pritlove ihr Studio live auf unsere Bühne und präsentieren: Eine erlesene Selektion tagesaktueller netz- und digitalpolitischer Ereignisse und Fakten, eingeordnet in die richtigen Kontexte und vertieft durch die Expertise ihrer illustren Gäste. Dieses Mal mit an Bord: Katharina Nocun u…
 
Feminizide, die traurige Spitze des Eisbergs einer immer noch patriarchal strukturierten und sexistischen Gesellschaft. Morde an Frauen, weil sie Frauen sind: Das passiert immer noch und immer mehr, überall. In Deutschland bringt alle 3 Tage ein Mann seine (Ex-)Frau oder Partnerin um. Wir sagen: NiUnaMenos! NichtEineMehr soll sterben! Die Aktivisti…
 
In 1950, physicist Enrico Fermi posed the question that launched a thousand explanations. "Where is Everybody?" Where are the extraterrestrial civilizations that are supposed to be out there? Addressing that question requires immense research, further studies, and (above all) that we confront how little we know about life and intelligence in the Un…
 
In einer spannenden Runde diskutieren wir Aktivismus in Deutschland aus drei verschiedenen Blickwinkeln. Ob es für frauengeführte Aktivistinnengruppen schwieriger ist, deren Botschaft in die Gesellschaft einzubrin-gen, erzählen uns die Radikalen Töchter. Ob Aktivismus mit Museum vereinbart werden kann, erzählt uns Salma aus dem Projekt Multaka. Chr…
 
Es geht um rassistische Stereotype. Nach erfolgreichem Aufenthalt in Deutschland als Migrant*in, kommt die neue Situation als „Einheimische*r“ auf die Pfanne. Im Schritt 2 geht‘s nun um bürokratische Umwandlung, jetzt haste nen deutschen Pass... und nu? Biste selbst Deutsche*r. Wie geht‘s weiter? Was wird erwartet? ...viele offene Fragen zur Integr…
 
Extortion, business disruption, and monumental payouts. We’ll cover trends in attacker “innovation” and role of identities and credentials. This segment is sponsored by CyberArk. Visit https://securityweekly.com/cyberark to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekl…
 
Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well a…
 
PCI DSS v4.0 was released on March 31st, 2022 and we've got Jeff Man joining us today to discuss some of the more notable changes that folks should be aware of. Some great resources from Jeff and his employer on PCI 4.0: https://info.obsglobal.com/pci-4.0-resources And the PCI Council's own summary of changes between PCI 3.2.1 and 4.0: https://secu…
 
An update on the DDoS attack against Norway. NATO's resolutions on cyber security. North Korea seems to be behind the Harmony cryptocurrency heist. MedusaLocker warninga. Microsoft sees improvements in a gang's technique. Google blocks underworld domains. The Israeli-Iranian conflict in cyberspace. Chris Novak from Verizon with his take on this yea…
 
Kim shares her passion for helping others through her volunteer efforts in numerous cybersecurity organizations helping the under-represented. Kim not only volunteers in multiple cybersecurity organizations, she also founded her own non profit. Not only does she focus on helping people gain skills in cybersecurity, she wants to educate people at al…
 
Inwiefern strukturiert das Patriarchat noch immer unsere Sexualität? Was kann sexuelle Befreiung aus queerfeministischer Perspektive bedeuten und wo ist sie bereits Realität? Carolin Wiedemann hat Antworten und liest das Kapitel über “Sex ohne Sexismus” aus ihrem Buch „Zart und frei. Vom Sturz des Patriarchats“. Danach gibt es Raum zur Diskussion.T…
 
Moment mal... Homo* - WTF?! Homo – hŏmō [ˈhɔmoː] ist das lateinische Wort für „Mensch“ und wird mit einem Adjektiv kombiniert, wie bspw. Homo oeconomicus, Homo deus oder Homo faber, zu einem sogenannten „Menschenbild“ und damit zu dem, wie wir die Welt – implizit oder explizit – wahrnehmen. Mächtig also. Und was ist er für Dich/ für Uns/ für Alle? …
 
Have a listen as Alyssa and Liz entertain each other and their audience. ________________________________ It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube. Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later. Our ability to …
 
Klima, Gesundheit und Gerechtigkeit – ein gewichtiger Dreiklang, ein elementarer Zusammenhang, den wir euch mit diesem Workshop präsentieren. Kluge Klimapolitik bedeutet nicht Verzicht, sondern Zugewinn an Lebensqualität und Gesundheit. Nicht nur das Wissen, sondern vor allem ein Verständnis für diegesellschaftlich benötigte Transformation wird ver…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login