show episodes
 
G
Getting Into Infosec

1
Getting Into Infosec

Ayman Elsawah (@coffeewithayman)

Unsubscribe
Unsubscribe
Monthly
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
We are a weekly podcast hosted by @ExiledAtraidez and @Understudy77 discussing Infosec, Blue Teaming, Detections, and interviews with community members. If your interested in catching the links to the show head on over to detections.org for the recap.
 
Every week on the DirtySecurity Podcast, we chat with Cylance’s best and brightest about what is happening in the world of cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center.
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
 
T
Tech Pulse

1
Tech Pulse

Tech Pulse Podcasters

Unsubscribe
Unsubscribe
Daily+
 
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
 
SecuraBit is an information security podcast that features some of the biggest names in the industry who come on to talk to us about what they're up to. We also engage in both light and heavy discussion on the latest news and goings on in the community. We aren't intended to be an authoritative source of information if you're writing a paper for some infoseec class inc ollege. Our goal is to bring the community closer together and to help people understand who the movers and shakers are in t ...
 
Loading …
show series
 
This week Dr. Doug talks: More Apple 0-Days, SnapMC, the NSA, Olympus, Brother, Android, Facebook, GTA Remakes, and the returning Expert Commentary of Jason Wood on the Security Weekly News! Show Notes: https://securityweekly.com/swn157 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.c…
 
This week’s episode of Destination Linux, we’re going to discuss the Linux Challenge that the hosts of the WAN Show from Linus Tech Tips are doing. We’ll give our thoughts on this news and offer a helping hand to the WAN Show team. Then we’re going to discuss security concerns as Malware seems to be popping up in WSL. Plus we’ve also got our famous…
 
This week’s episode of Destination Linux, we're going to discuss the Linux Challenge that the hosts of the WAN Show from Linus Tech Tips are doing. We'll give our thoughts on this news and offer a helping hand to the WAN Show team. Then we're going to discuss security concerns as Malware seems to be popping up in WSL. Plus we've also got our famous…
 
For the first time in 85 years, the Nobel Peace Prize has been awarded to two journalists. What does this tell us about the state of global journalism?Contributors:Rana Ayyub - JournalistAgnes Callamard - Secretary General, Amnesty InternationalJulie Posetti - Global director of research, International Center for JournalistsIlya Yablokov - Lecturer…
 
For the first time in 85 years, the Nobel Peace Prize has been awarded to two journalists. What does this tell us about the state of global journalism?Contributors:Rana Ayyub - JournalistAgnes Callamard - Secretary General, Amnesty InternationalJulie Posetti - Global director of research, International Center for JournalistsIlya Yablokov - Lecturer…
 
Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. …
 
This Week in the Security Weekly News Wrap Up Show: Juniper, Wastewater Attacks, South Korea, Phone Scanning, Acer, Android, and Journalists Under Fire as well as all the show Wrap-Ups for this week! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook…
 
This Week in the Security Weekly News Wrap Up Show: Juniper, Wastewater Attacks, South Korea, Phone Scanning, Acer, Android, and Journalists Under Fire as well as all the show Wrap-Ups for this week! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook…
 
This week, we kick off the show with an interview featuring Zach Wasserman, CTO & Co-Founder of Fleet, who joins us to discuss Open Source Endpoint Security with OSquery & Fleet! Then, Sven Morgenroth, Security Researcher at Invicti, joins us for a technical segment on GraphQL!! In the Security News: Following the ransomware money, the Mystery Snai…
 
This week, Adrian and Paul talk about why we need A Plea for Better Press Releases! In the second segment, we welcome Surag Patel, Chief Strategy Officer at Contrast Security, to discuss Why Less Is More for Static Application Scanning! In the Enterprise Security News: Wiz raises $250 million at a staggering $6 billion valuation, Gretel.ai, another…
 
Remember “illusionofchaos,” that security researcher Apple spent the summer ignoring? They’re doing it again - failing to give credit where credit is due. A look at that, plus the bad guys at mSpy are worse than we thought! Problems, Revisited on Checklist no. 251, brought to you by SecureMac. Don't forget to check out our show notes: SecureMac.com…
 
Tune in for this discussion on social engineering and its merits on being recognized as a legitimate component of cyber security. We'll also dive into the whole notion of motive and intent as it pertains to deliberately misrepresenting yourself, or simply lying to your customer in order to get them to be more secure. Show Notes: https://securitywee…
 
It is Cybersecurity Awareness Month, but security awareness is a lot tougher than just dedicating a month to awareness activities. Security awareness is a journey, requiring motivation along the way. Brian Reed, Cybersecurity Evangelist from Proofpoint, joins Business Security Weekly to discuss the security awareness journey and how the human eleme…
 
Picture of the week. Windows 11 Watch: "AllowUpgradesWithUnsupportedTPMOrCPU" AMD processors running some apps up to 15% slower. The Windows 10 taskbar on Windows 11. Microsoft is disagreeing... with themselves. We have an update on the Windows Explorer RAM leak I mentioned previously... VirtualBox and Windows HyperVisors don't get along. Dropped U…
 
Picture of the week. Windows 11 Watch: "AllowUpgradesWithUnsupportedTPMOrCPU" AMD processors running some apps up to 15% slower. The Windows 10 taskbar on Windows 11. Microsoft is disagreeing... with themselves. We have an update on the Windows Explorer RAM leak I mentioned previously... VirtualBox and Windows HyperVisors don't get along. Dropped U…
 
This week Dr. Doug talks: More Apple 0-Days, SnapMC, the NSA, Olympus, Brother, Android, Facebook, GTA Remakes, and the returning Expert Commentary of Jason Wood on the Security Weekly News! Show Notes: https://securityweekly.com/swn157 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.c…
 
Research by the World Wide Web Foundation has found that the gender gap for internet accessibility has cost countries billions of USD in lost GDP. In the 32 countries studied a third of women were connected to the internet compared to almost half of men. This digital gender gap, their report says, has cost low and lower middle income countries USD …
 
This week, we welcome Tom Gibson, Senior Staff Engineer at Cloudsmith, to talk about Modernizing the Management of Your Software Supply Chain! This week in the AppSec News, Mike and John talk: The Twitch breach, a path traversal in Apache httpd, Microsoft disables macros by default after almost 30 years, factors in a great cybersecurity program, & …
 
Today we chat with Shannon Morse. She is a content creator and influencer with a focus on infosec and privacy. We talk about her recommendations, how to factor physical security into your threat model, and lots more. You can learn more and see Shannon's videos on YouTube https://youtube.com/shannonmorse. She's also on Twitter, https://twitter.com/S…
 
This week’s episode of Destination Linux, we’re going to discuss the topic of Mozilla Firefox and whether we can stop it’s continued decline. Then we’re going to discuss the literal game changer, and the device that has everyone looking at Linux in a big way. Yes, its Steamy news about the Steam Deck, and there are some awesome videos and sneak pee…
 
This week’s episode of Destination Linux, we're going to discuss the topic of Mozilla Firefox and whether we can stop it's continued decline. Then we're going to discuss the literal game changer, and the device that has everyone looking at Linux in a big way. Yes, its Steamy news about the Steam Deck, and there are some awesome videos and sneak pee…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login