show episodes
 
The CyberPHIx is a regular audio podcast series that reports and presents expert viewpoints on data security strategy for organizations handling patient health or personal information in the delivery of health-related services. These timely programs cover trends and data security management issues such as cybersecurity risk management, HIPAA and OCR compliance strategy and vendor risk management. Meditology Services, the healthcare industry's leading security and compliance firm, moderates t ...
 
Join Matt Chapman, a Cybersecurity Expert, and intellectual phenom, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
 
New episodes come out every Thursday for free, with 1-week early access for Wondery+ subscribers. DNA science. Artificial intelligence. Smartphones and 3D printers. Science and technology have transformed the world we live in. But how did we get here? It wasn’t by accident. Well, sometimes it was. It was also the result of hard work, teamwork, and competition. And incredibly surprising moments. Hosted by bestselling author Steven Johnson (“How We Got To Now”), American Innovations uses immer ...
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
 
G
Getting Into Infosec

1
Getting Into Infosec

Ayman Elsawah (@coffeewithayman)

Unsubscribe
Unsubscribe
Monthly
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Every week on the DirtySecurity Podcast, we chat with Cylance’s best and brightest about what is happening in the world of cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center.
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
 
Loading …
show series
 
US and Russian talks over Ukraine conclude with an agreement to further exchanges next week. Western governments continue to recommend vigilance against the threat of Russian cyberattacks against critical infrastructure. The US Treasury Department sanctions four Ukrainian nationals for their work on behalf of Russia’s FSB and its influence operatio…
 
https://www.csoonline.com/article/3647209/why-you-should-secure-your-embedded-server-management-interfaces.html https://www.csoonline.com/article/3646613/cybercrime-group-elephant-beetle-lurks-inside-networks-for-months.html https://www.zdnet.com/article/when-open-source-developers-go-bad/ https://www.bleepingcomputer.com/news/microsoft/microsoft-r…
 
In today's top stories, Microsoft identifies malware on Ukranian government networks. The malware, designed to make computers inoperable if activated by an attacker, targets multiple organizations in Ukraine. In other news, Microsoft confirms they stopped building Xbox One consoles over a year ago. And finally, NASA Perseverance rover team is devis…
 
Welcome to the first Cyber Security Brief of 2022! In this week’s podcast, Dick O’Brien and Brigid O Gorman chat about some of the biggest news stories of the last couple of weeks. The topics up for discussion in this episode include: FIN7 BadUSB attacks return, an interesting new multi-platform backdoor, and the latest way attackers are attempting…
 
With the New Year firmly behind us, Dave, Jeff and Ahmed start to look at some of the more quirky stories of the last few days in the latest episode of the Transatlantic Cable. To kick things off, we look at the roller-coaster that is the price of bitcoin (and to a larger extent, crypto prices in general) and wonder how much further things can slid…
 
In this episode we will look at a growing threat facing the Mac world. While not attacked as much as Windows platform, the signs are showing Mac is indeed not unvulnerable Before we get into the main topic, lets have a look at a couple of trending security news. This will we briefly talk about Norton 360 which brings you a crypto-mining feature and…
 
Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Ch…
 
Experts at Symantec have finally discovered that the virus Stuxnet is designed to target nuclear facilities in Iran. But many questions remain. Who is responsible for the virus? How did it get out? As veteran New York Times reporter David Sanger delves into the origins of Stuxnet, he worries that it represents a new kind of cyber warfare, one witho…
 
Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (a…
 
As Russian forces remain in assembly areas near the Ukrainian border, the US and Russia prepare for tomorrow’s high-level talks in Geneva. NATO members look to their cyber defenses. US President Biden issues a Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. Notes on C2C mark…
 
Today we’re joined by Karianne Bergen, an assistant professor at Brown University. In our conversation with Karianne, we explore her work at the intersection of earthquake seismology and machine learning, where she’s working on interpretable data classification for seismology. We discuss some of the challenges that present themselves when trying to…
 
To start off this week’s episode of the Transatlantic Cable podcast, Ahmed, Dave, and I talk cryptocurrency. Unlike most of our chats on the digital currency, we focus on the criminal aspect of it. More accurately, our conversation centers on a new report of the nearly $400 million North Korea is alleged to have stolen in the past year. We have som…
 
For years, people didn't "get" QR codes. But when the world got COVID-19, this technology that let people do things without touching things got bigger. Bigger with business, bigger with government, and - no surprise - bigger with bad guys. We're talking avoiding QR code phishing scams with SecureMac's Nick Leon on Checklist 263 Check out our show n…
 
Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alternative to prevent clicking on those bonus phishing scams, Joe's story is about fake ticket scams for the Kansas City Chiefs NFL playoff game against the…
 
Ukraine confirms that it was hit by wiper malware last week, as tension between Moscow and Kyiv remains high. It remains high as well between Russia and NATO, as Russia continues marshaling conventional forces around Ukraine. CISA advises organizations to prepare to withstand Russian cyberattacks. Other cyberespionage campaigns are reported, as is …
 
Kubernetes, containers, and cloud-native technologies offer organizations the benefits of portability, flexibility and increased developer productivity but the security risks associated with adopting them continue to be a top concern for companies. In the recent State of Kubernetes Security report, 94% of respondents experienced at least one securi…
 
In today's top stories, Microsoft expands gaming and Xbox further, buying Activision Blizzard for $68.7 billion. In other news, SpaceX set to launch 2,000th Starlink satellite in three years, but researchers say the impact of Starlink satellites on astronomical observations is clear. And finally, Australia and 21 other countries added to US travel …
 
Picture of the Week "Hack the Pentagon" with Log4j Open Source Software Security Summit Microsoft's January Patch Tuesday Review: The GOOD News Microsoft's January Patch Tuesday Review: The Not So Good News Check Your Router Firmware Updates Chrome to Implement PNA Three High Severity Flaws in WordPress Add-ons Closing the Loop: Listener feedback S…
 
Picture of the Week "Hack the Pentagon" with Log4j Open Source Software Security Summit Microsoft's January Patch Tuesday Review: The GOOD News Microsoft's January Patch Tuesday Review: The Not So Good News Check Your Router Firmware Updates Chrome to Implement PNA Three High Severity Flaws in WordPress Add-ons Closing the Loop: Listener feedback S…
 
A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware …
 
After 222 days the social media platform is back up and running in Nigeria. The country suspended Twitter after it deleted a tweet by President Buhari and Nigerians have been accessing the platform via VPN, but now Twitter has agreed to the government's demands which include opening a local office, paying taxes, and being respectful of Nigerian law…
 
Today we’re joined by Arun Kumarm, an associate professor at UC San Diego. We had the pleasure of catching up with Arun prior to the Workshop on Databases and AI at NeurIPS 2021, where he delivered the talk “The New DBfication of ML/AI.” In our conversation, we explore this “database-ification” of machine learning, a concept analogous to the transf…
 
Introducing Tomorrow, an original, scripted series from Gen-Z Media, creators of the Peabody Award-winning The Unexplainable Disappearance of Mars Patel and the hit family podcast, Six Minutes. Taking place five years after “little orphan” Annie was adopted by billionaire Oliver Warbucks, Annie, now 15, is about to face the biggest test of her sign…
 
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference,…
 
Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content produ…
 
In this show I will have a look at the recent feature to Apple's ecosystem and in particular the Private Relay. In addition, we will recap other top trending security news which includes poisoned USB drives are sent to businesses and REvil ransomware gangs allegedly arrested by Russian agents. -https://therecord.media: FBI - FIN7 Hackers target US …
 
This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a numbe…
 
A large-scale cyberattack against Ukrainian websites looks like an influence operation, and Russian intelligence services are the prime suspects. The FSB raids REvil. The White House Open Source Software Security Summit looks toward software bills of materials. MuddyWater exploits Log4shell. The DPRK is working to steal cryptocurrency. Caleb Barlow…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login