show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
S
Smashing Security

1
Smashing Security

Graham Cluley, Carole Theriault

Unsubscribe
Unsubscribe
Monthly+
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over seven million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
R
Reality 2.0

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Principal Security Consultant at FRSecure and a 20+ year veteran of the industry. Hosting things ...
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
T
The Host Unknown Podcast

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

Unsubscribe
Unsubscribe
Weekly
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
 
Join hacker maker Phillip Wylie and his guests as they discuss and unveil the “secrets” of professional hacking — a mysterious, intriguing, and often misunderstood occupation, even by those in the field of cybersecurity. With the rising need for professional hackers, those entering the infosec world are drawn to it, and understandably so — it is an exciting and fascinating career. Still, it sure has nothing to do with magic. Join these conversations to discover what the role entails, the dif ...
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
T
ThinkstScapes

1
ThinkstScapes

Jacob Torrey, research@thinkst.com, haroon meer, marco slaviero

Unsubscribe
Unsubscribe
Daily+
 
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
Loading …
show series
 
In part two of this series, Heather chats with some of Hurricane Labs' security analysts about the Log4Shell vulnerability. Also, make sure to check out some of the articles and resources mentioned during this episode: Log4j: Letting the JNDI out of the bottle blog post by Tony Robinson 6 Practical Fraud Prevention Tips blog post by Roxy FTC warns …
 
https://www.csoonline.com/article/3647209/why-you-should-secure-your-embedded-server-management-interfaces.html https://www.csoonline.com/article/3646613/cybercrime-group-elephant-beetle-lurks-inside-networks-for-months.html https://www.zdnet.com/article/when-open-source-developers-go-bad/ https://www.bleepingcomputer.com/news/microsoft/microsoft-r…
 
Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (a…
 
US and Russian talks over Ukraine conclude with an agreement to further exchanges next week. Western governments continue to recommend vigilance against the threat of Russian cyberattacks against critical infrastructure. The US Treasury Department sanctions four Ukrainian nationals for their work on behalf of Russia’s FSB and its influence operatio…
 
The pandemic has had its ups and downs, and positivity is more important than ever. The InfoSec world has one such positive person that has shined through and brightened our days. That person is the BSD Bandit. _______________________ Guest Charles Shirer aka BSD Bandit On Twitter | https://twitter.com/bsdbandit On LinkedIn | https://www.linkedin.c…
 
The IRS is going to force you to submit a selfie for facial recognition to access your taxes in the future. This epsiode breaks it down. Source - https://ID.me Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Whe…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, Jan 17-21, is hosted by Rich Stroffolino with our guest, Julie Tsai, Cybersecurity Leader Thanks to our episode sponsor, Datadog Join Datadog in their upcoming webinar to learn how to dissect the anatomy of an attack vector in the cloud with the use of their unified Cloud Secu…
 
This Week in InfoSec (06:23) With content liberated from the “Today in InfoSec” twitter account and further afield 19th January 1999: The Happy99 worm first appeared. It invisibly attached itself to emails, displayed fireworks to hide the changes being made, and wished the user a happy New Year. It was the first of a wave of malware that struck Mic…
 
Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data. Reality 2.0 around the web: Site/Blog/Newsletter FaceBook Twitter YouTube Mastodon Special Guest: Dave Huseby. Support Reality 2.0 Links: Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Commu…
 
NATO and Ukraine sign deal to boost cybersecurity Microsoft Sees Log4j attacks exploiting SolarWinds Serv-U bug Large-scale cyberattack hits the Red Cross Thanks to our episode sponsor, Datadog Join Datadog in their upcoming webinar to learn how to dissect the anatomy of an attack vector in the cloud with the use of their unified Cloud Security Pla…
 
In this episode Jenny chats with Sam Humphries of Exabeam. They talk about Sam's career in cyber via doubting headmasters and travel agency politics, as well as her involvement in Bsides Newcastle. Thanks to Sam for an awesome interview! To follow Sam on Twitter, click here for the link. To follow Sam on LinkedIn, click this link here. Thank you to…
 
Have you ever been on an investigation and thought to yourself "I can't wait to explain this to someone else!"?.... The information you collect during an investigation is only as useful as your ability to communicate its meaning and value. In this episode we sit down with professional pentester and *spoiler alert* professional report writer Brian K…
 
As Russian forces remain in assembly areas near the Ukrainian border, the US and Russia prepare for tomorrow’s high-level talks in Geneva. NATO members look to their cyber defenses. US President Biden issues a Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. Notes on C2C mark…
 
What do you picture when you read the word “hacker?” I always see Cereal, Matthew Lillard’s character, from the movie Hackers. A dude with weird hair, intense need to make information free, and copies of 2600 magazine scattered around his dank apartment. That image is, and always was, a fantasy. What hackers are, and what they’ve become, is complic…
 
The Red Cross recently announced they were victim to a sophisticated cyber-attack that compromised over 500,000 records. The Red Cross has made a plea to the hackers to not release the date and destroy it. This episode explain why they are making this public push, don't forget the human elements behind the data. Source - https://www.icrc.org/en/doc…
 
To start off this week’s episode of the Transatlantic Cable podcast, Ahmed, Dave, and I talk cryptocurrency. Unlike most of our chats on the digital currency, we focus on the criminal aspect of it. More accurately, our conversation centers on a new report of the nearly $400 million North Korea is alleged to have stolen in the past year. We have som…
 
Security operations center (SOC) analysts are responsible for analyzing and monitoring network traffic, threats and vulnerabilities within an organization’s IT infrastructure. This includes monitoring, investigating and reporting security events and incidents from security information and event management (SIEM) systems. SOC analysts also monitor f…
 
CISA warns of data-wiping attacks EU working on its own DNS service Biden expands the NSA’s cybersecurity purview Thanks to our episode sponsor, Datadog In Datadog's upcoming webinar, you’ll learn how to best utilize the suite of Datadog Cloud Security products to identify the root cause of an attack and how a unified platform provides real-time th…
 
Carole's still on jury service, but the show must go on! We take a look at how some Tesla owners are at risk of having their expensive cars remotely hijacked, and why YouTubers are up in arms over NFTs. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and C…
 
Interview Links Read GitHub’s blog on the Log4j vulnerability, and the follow-up. Check out GitHub’s Dependabot. Find out Why Johnny Can’t Encrypt. Learn about GitHub’s Sponsor Program. Read about the work going on at OpenSSF. Delve into Mike’s blog post on GitHub’s exploit code policy. Rapid Rundown Links Get the info on Microsoft’s emergency fixe…
 
Ukraine confirms that it was hit by wiper malware last week, as tension between Moscow and Kyiv remains high. It remains high as well between Russia and NATO, as Russia continues marshaling conventional forces around Ukraine. CISA advises organizations to prepare to withstand Russian cyberattacks. Other cyberespionage campaigns are reported, as is …
 
In part one of this two-part series, Heather chats with two of Hurricane Labs' pentesters about the Log4Shell vulnerability. Also, make sure to check out some of the articles and resources mentioned during this episode: Log4Shell Everywhere Log4Shell Detection with ZAP Two Nmap NSE scripts: NSE Log4Shell Other NSE Hurricane Labs' SOC Talk: IoT and …
 
The Olypmics are around the corner and athletes were advised to not use their primary phones while in China. This episode talks about the warnings and why everyone traveling to Bejing should take this caution seriously. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The ShowBecome A Patron! Patreon Page *** Support the podcast w…
 
Beijing 2022 Winter Olympics app loaded with privacy risks Europol shuts down cybercriminals' VPN service of choice Newspaper accuses Israeli police of spying on its own citizens Thanks to our episode sponsor, Datadog Join Datadog in their upcoming webinar to learn how to dissect the anatomy of an attack vector in the cloud with the use of their un…
 
A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware …
 
This week, Brad and Evan sit down to discuss the on-premise security landscape and how it’s changed now that we’re headed into another year of employers keeping staff home due to the pandemic. Give episode 161 a listen or watch and send any questions, comments, or feedback to unsecurity@protonmail.com. Don't forget to like and subscribe!…
 
Oracle released patches for their suite of products with close to 500 security fixes. This episode talks about the importance of patching and why it should not be underestimated to the importance or efforts with them. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The ShowBecome A Patron! Patreon Page *** Support the podcast wit…
 
All links and images for this episode can be found on CISO Series CISOs agree that multi-factor authentication is the one security control that once deployed has the greatest impact to reduce security issues. Yet with all that agreement, it’s still so darn hard to get users to actually use it. This week’s episode is hosted by me, David Spark (@dspa…
 
Ukraine points fingers in recent cyber attacks Another dark web marketplace calls it quits Renewable energy targeted for cyber espionage Thanks to our episode sponsor, Datadog In Datadog's upcoming webinar, you’ll learn how to best utilize the suite of Datadog Cloud Security products to identify the root cause of an attack and how a unified platfor…
 
Ai Ho (mostly known as j3ssie) is a self-taught security engineer with a computer science background who loves automation. He got Interested in responsible disclosure/bug bounty nearly three years ago and have been building some of my own tools to do it. He wrote Osmedeus, Jaeles and Metabigor to help his bug bounty efforts and made these projects …
 
Infosec’s Principal Security Researcher, instructor and cybersecurity renaissance man Keatron Evans returns to the show for the first in a series of once-quarterly episodes breaking down big stories in the news and cybersecurity trends for the future! We talk Solarwinds, Colonial Access Pipeline, Oldsmar, Keatron’s origin story and why, just like p…
 
Microsoft discloses malware attack on Ukraine government networks New unpatched Apple Safari browser bug allows cross-site user tracking Now you can get your vulnerability alerts by phone Thanks to our episode sponsor, Datadog Join Datadog in their upcoming webinar to learn how to dissect the anatomy of an attack vector in the cloud with the use of…
 
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference,…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login