show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
 
S
Smashing Security

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Join hacker maker Phillip Wylie and his guests as they discuss and unveil the “secrets” of professional hacking — a mysterious, intriguing, and often misunderstood occupation, even by those in the field of cybersecurity. With the rising need for professional hackers, those entering the infosec world are drawn to it, and understandably so — it is an exciting and fascinating career. Still, it sure has nothing to do with magic. Join these conversations to discover what the role entails, the dif ...
 
R
Reality 2.0

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues. In a virtual world Reality 2.0 unfolds Minds are expanded -ChatGPT
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Alias Secure AF Cybersecurity Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cybersecurity topics with coworkers and special guests. No matter where you are on the cybersecurity knowledge ladder, there's an episode here for you.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Data compliance is broken. Increasing regulations, high public expectations, and real business needs have made the data layer exceedingly complex. It’s not balanced with its surroundings anymore. We have to rethink the function and organisation of compliance — and in this podcast we invite you to join that conversation. Host: Jacob Høedt Larsen By: Wired Relations - www.wiredrelations.com
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
 
T
The Host Unknown Podcast

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Weekly
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Your hosts “D” Dehghanpisheh, President and Co-Founder of Protect AI, and Charlie McCarthy, MLSecOps Community Leader, explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. This is MLSecOps. Learn more at MLSecOps.com.
 
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
Security, Tech, and Society in 10 Minutes A weekly 10-minute update on the most critical stories in cybersecurity, technology, and society. Includes analysis, original ideas, and the best links from around the web. Part of the NEWS, ANALYSIS & DISCOVERY SERIES. Additional standalone episodes include: Conversations with one or more guests around a particular idea in the IDEA SERIES. Interviews with special guests to talk about a particular idea or topic, part of the INTERVIEW SERIES. Short, i ...
 
T
ThinkstScapes

1
ThinkstScapes

Jacob Torrey, research@thinkst.com, haroon meer, marco slaviero

Unsubscribe
Unsubscribe
Monthly
 
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9 AM EST Monday through Thursday on YouTube, LinkedIn and Twitter. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
 
Loading …
show series
 
Carving an unconventional path towards information security, Yael advises many a CISO, CIO and CRO. Leadership roles at BlackRock and JPMorgan during periods of crisis and growth have given her a unique technical and business perspective — instead of saying “Here’s why that won’t work.”, she asks “But what if we tried this?” In this episode you’ll …
 
00:00 – PreShow Banter™ — Tossing Money at Problems00:58 – BHIS – Talkin’ Bout [infosec] News 2023-03-1301:41 – Story # 1: Silicon Valley Bank collapse: Treasury, Fed, and FDIC announce […] The post Talkin’ About Infosec News – 3/16/2023 appeared first on Black Hills Information Security.By Black Hills Information Security
 
Guest: Jess Vachon, Chief Information Security Officer, Context Labs BV [@contextlabsbv] On Mastodon | https://infosec.exchange/@infosec_jess On Twitter | https://twitter.com/infosec_jess On LinkedIn | https://www.linkedin.com/in/jessvachon1/ ________________________________ Host: Alyssa Miller On ITSPmagazine 👉 https://www.itspmagazine.com/itspmag…
 
A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden's commercial spyware bill, and Utah gets tough on social media sites. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Register's I…
 
In America, no one can protect you from a transportation employee being paid off by the feds. The Drug Enforcement Agency has a single remit: to prosecute America’s long-failed war on drugs. Joseph Cox is on today’s episode of Cyber to talk about one its shadier practices and the senators who want answers from the Department of Justice. It turns ou…
 
Traffers and the threat to credentials. A newly discovered WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Ann Johnson from Afternoon Cyber Tea chats with EY principal Adam Malone. Our guest is Toni Buhrke from Mimecast with a look at the State of Email Security. And is piracy patriotic? For links to all of toda…
 
This episode of the Cybersecurity Defenders podcast is the first part in a two-part mini-series about the greatest cyber attack ever conceived: Stuxnet Joining to help us tell the story is Kim Zetter, Journalist and Author - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Stuxnet is a malicious computer worm first …
 
Microsoft unveils OpenAI-based chat tools to combat cyberattacks Google accused of willfully destroying evidence in antitrust battle A million pen tests show companies' security postures are getting worse Thanks to today's episode sponsor, Trend Micro Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigat…
 
Are you looking to break in to privacy? Or take your privacy career to the next level? Don't miss this privacy career advice from Michael Jared Coseglia of TRU Staffing Partners. He has placed over 5,000 privacy pros in jobs over the years. We talk about important skills for privacy professionals and Jared reveals THE most important one. Jacob Hoed…
 
Guest: Tara Lordi, President and CEO at WeeDoo Greenboat [@weedooworkboat] On LinkedIn | https://www.linkedin.com/in/tara-lordi-08286b153 On TikTok | https://www.tiktok.com/@chiefcxofficer On YouTube | https://www.youtube.com/channel/UC5yhuAVP7pdd7U0KxkRh1_w _____________________________ Hosts: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmaga…
 
ETH Zürich's Assistant Professor of Computer Science, Dr. Florian Tramèr, joins us to talk about data poisoning attacks and the intersection of Adversarial ML and MLSecOps (machine learning security operations). Thanks for listening! Find more episodes at MLSecOps.com.By Dr. Florian Tramèr
 
In this episode of The MLSecOps podcast, the co-hosts interview Pin-Yu Chen, Principal Research Scientist at IBM Research, about his book co-authored with Cho-Jui Hsieh, "Adversarial Robustness for Machine Learning." Chen explores the vulnerabilities of machine learning (ML) models to adversarial attacks and provides examples of how to enhance thei…
 
Security researcher, AI/ML architect, & former political operative, Disesdi Susanna Cox, talks with us about her research, some of which can be accessed via her website: anglesofattack.io. Thanks for listening! Find more episodes at MLSecOps.com.By Disesdi Susanna Cox
 
This week, Oscar and Brad sit down with the creators of Hack Space Con to discuss the mission behind the conference, the unique venue, how the event came to be, and more! Links: https://www.hackspacecon.com/ Send any questions, comments, or feedback to unsecurity@protonmail.com. Don't forget to like and subscribe!…
 
Twitter gets a subpoena for a source-code leaker’s information. The insider risk to data. Russian hacktivist auxiliaries target the French National Assembly. Recent trends in cyberattacks sustained by Ukraine. Ben Yelin unpacks the White House executive order on spyware. Mr. Security Answer Person John Pescatore ponders the permanence of ransomware…
 
Hosts: Kayla Williams On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/kayla-williams Taylor Parsons On ITSPmagazine | https://itspmagazine.com/itspmagazine-podcast-radio-hosts/taylor-parsons ________________________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://ww…
 
Cyber News: Outlook ZeroDay Exploit, Apple ZeroDay Patched, Tesla Hacked in Minutes & US Cyber Force Cybersecurity News CyberHub Podcast March 28th, 2023 Today's Headlines and the latest #cybernews from the desk of the #CISO: No-Interaction Outlook Zero Day Exploited Since Last April Apple fixes recently disclosed WebKit zero-day on older iPhones N…
 
Welcome to another exciting episode of our podcast, where we dive into the fascinating world of cybersecurity and explore the challenges faced by businesses and individuals alike. Today, we have an extraordinary story to share, one that sheds light on the ever-evolving landscape of cyber threats and the innovative solutions being developed to prote…
 
Katherine Druckman and Doc Searls talk to Kyle Rankin and Shawn Powers about Shawn's head's appearance at the recent SCaLE conference and 3D printing, all while having a little too much fun. Hit play if you always wondered about our Myers-Briggs types. Site/Blog/Newsletter FaceBook Twitter Mastodon Special Guests: Kyle Rankin and Shawn Powers. Supp…
 
All links and images for this episode can be found on CISO Series. In order to get any work done we try to shut out all possible distractions. That includes messaging apps. But those people who want to connect become annoyed that they can't reach you. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis…
 
Pinduoduo malware confirmed Binance sued by CFTC Twitter source code takedown Thanks to today's episode sponsor, Trend Micro Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigating a new era of cyber risk demands evolved strategies, new frameworks, and integrated tools to equip security teams to anticip…
 
Guests Allison A. Sakara, Executive Director, High Alert Institute [@High-Alert-Inst] On ITSPmagazine | http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/allison-a-sakara Dr. Maurice A Ramirez, Founder and President, High Alert Institute [@High-Alert-Inst] On ITSPmagazine | http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/dr-…
 
Guests Steve Luczynski, Senior Manager / Critical Infrastructure Security, Accenture Federal Services [@Accenture] and Chairman of the Board for the Aerospace Village [@secureaerospace] On LinkedIn | https://www.linkedin.com/in/steveluczynski/ On Twitter | https://twitter.com/cyberpilot22 Henry Danielson, Adjunct Professor/Lecturer, Cal Poly Colleg…
 
IcedID is evolving away from its banking malware roots. An Emotet phishing campaign spoofs IRS W9s. The FBI warns of BEC scams. A Fake booter service as a law enforcement honeypot. Phishing in China's nuclear energy sector. Reports of an OpenAI and a ChatGPT data leak. Does Iran receive Russian support in cyberattacks against Albania? My conversati…
 
Karen Worstell is a 25-year veteran of the tech, IT and security space; she’s a senior cybersecurity strategist at VMware and a chaplain. This episode goes to many fascinating places, from her days learning coding on a TRS-80 computer, how her extremely visual and right-brained approach to learning has influenced her security journey, her experienc…
 
Cyber News: Twitter Source Code Leaked, P&G Data Theft, ChatGPT Chrome Hack, & More Cybersecurity News CyberHub Podcast March 27th, 2023 Today's Headlines and the latest #cybernews from the desk of the #CISO: GitHub Suspends Repository Containing Leaked Twitter Source Code Emotet malware distributed as fake W-9 tax forms from the IRS Procter & Gamb…
 
UK bans TikTok from government mobile phones Microsoft pushes OOB security updates for Windows Snipping tool flaw Vice Society claims attack on Puerto Rico Aqueduct and Sewer Authority Thanks to today's episode sponsor, Trend Micro Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigating a new era of cyb…
 
Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, sits down with Director of the National Cryptologic Museum, Dr. Vince Houghton. The National Cryptologic Museum is the NSA's affiliated museum sharing the nation's best cryptologic secrets with the public. In this special episode, Rick interviews Dr. Houghton from within th…
 
In this episode I talk with Matthew Devost who built his career on hacking the U.S. Military. Did you ever wonder how to pen test an aircraft carrier? In this episode we talk about that and much more. If you enjoy this episode please leave a review & share the podcast! If you enjoy this podcast then please consider becoming a subscriber at the link…
 
Guest: Dr. Stephen J. Scotti, Distinguished Research Associate at NASA [@NASA] Langley Research Center [@NASA_Langley] and STEM Education Advisor for Brilliant Star Magazine On LinkedIn | https://www.linkedin.com/in/stephen-scotti-12a2056/ On Facebook | https://www.facebook.com/stephen.j.scotti ______________________ Host: Charlie Camarda Ph.D On I…
 
Tanya Janca, CEO and Founder of We Hack Purple, sits down to talk about her exciting path into the field of cybersecurity. Trying several different paths in high school, she soon found she was good at computer science. When it came to picking a college, she knew that was the field she wanted to get into. After college, she was able to use her skill…
 
Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive …
 
On this episode, Jérôme Segura, senior threat researcher at Malwarebytes, shares his team's work, "WordPress sites backdoored with ad fraud plugin." WordPress is an immensely popular content management system (CMS) powering over 43% of all websites. Many webmasters will monetize their sites by running ads and need to draw particular attention to se…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, March 20-24, is hosted by David Spark with our guest, Kurt Sauer, VP, Information security, Workday Thanks to today’s episode sponsor, Conveyor Does the thought of answering another security questionnaire make you want to beat the stuffing out of 32 pinatas? Then you might wan…
 
A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz Allen Hamilton on the DoD's zero trust journey. Analysis of the Nation…
 
America is thinking about banning the most popular social media app in the world. TikTok has exploded in the past few years and whether you love it or hate it, you can’t deny its huge influence. Legislators in America are concerned about that influence, especially because of TikTok’s connections to China. On Thursday, TikTok’s CEO testified before …
 
Loading …

Quick Reference Guide

Copyright 2023 | Sitemap | Privacy Policy | Terms of Service