show episodes
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
Every week on the DirtySecurity Podcast, we chat with Cylance’s best and brightest about what is happening in the world of cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center.
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
 
Keeping you up to date with the latest trends and best performing architectures in this fast evolving field in computer science. Selecting papers by comparative results, citations and influence we educate you on the latest research. Consider supporting us on Patreon.com/PapersRead for feedback and ideas.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Loading …
show series
 
PwnedPiper Threatens Hospitals, Meteor Malware Causes a Train Disruption, and BlackMatter is the new DarkSide! All that coming up now on ThreatWire. #threatwire #hak5 Links: Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is a weekly news journalism show covering security and privacy topics for network admins and users…
 
This week I wanted to take a break from Windows forensics and talk about Linux malware triage. The Linux platform offers forensic analysts the opportunity to do a very decent job performing malware triage. What I mean by this is that you do not need any special tools installed, all you essentially need is the knowledge of a handful of commands in t…
 
Vultur bank-fraud malware infects thousands of devices Will the U.S. Government ban ransomware payments? President Biden's $65 billion broadband deal What is the future of Microservices? The top 30 most exploited vulnerabilities - what do they have in common? Brad Hintze, Executive Vice President of Marketing of Crestron talks about workgroup colla…
 
This week Dr. Doug talks: Patching, PetitPotam, Elon, Microsoft Defender, Ransomware rules, Meteor, and more, on this edition of the Security Weekly News Wrap up Show! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn138
 
This week Dr. Doug talks: Patching, PetitPotam, Elon, Microsoft Defender, Ransomware rules, Meteor, and more, on this edition of the Security Weekly News Wrap up Show! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn138
 
Delivering malware covertly and detection-evadingly is critical to advanced malware campaigns. In this paper, we present a method that delivers malware covertly and detection evadingly through neural network models. Neural network models are poorly explainable and have a good generalization ability. By embedding malware into the neurons, malware ca…
 
https://therecord.media/using-vms-to-hide-ransomware-attacks-is-becoming-more-popular/ https://blog.erratasec.com/2021/07/ransomware-quis-custodiet-ipsos-custodes.html?m=1 https://www.databreachtoday.com/how-mespinoza-ransomware-group-hits-targets-a-17086 https://krebsonsecurity.com/2021/07/dont-wanna-pay-ransom-gangs-test-your-backups/ https://ars…
 
A global consortium of media outlets blew the lid off a huge surveillance scandal revealing how the hacking tool Pegasus has been used by governments around the world to spy on dissidents and journalists via their mobile phones.Contributors:Rohini Singh - Reporter, The WireBradley Hope - Co-founder, Project BrazenLaurent Richard - Founder, Forbidde…
 
In the Enterprise News, SafeBreach adds support for new advanced attacks to the Microsoft Defender for Endpoint evaluation lab, Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks, Bugcrowd Awarded U.S. Patents for Crowd-Enabled Vulnerability Detection, Microsoft puts PCs in the cloud with Windows 365, some funding an…
 
This week on South Africa’s most accessible consumer technology podcast Gavin and Lindsey reflect on the violence in KZN, the Astrofica leadership team turn Lindsey on to the virtues of a manned Mars mission, we give you the heads up on mobile scams that are stealing money from consumers, We prime you for the future of mobile desktop computing, Nok…
 
Picture of the Week The "PrintNightmare Continues" Kaseya - Not nearly as bad as it could have been Ransomwhere site Microsoft Office Users: There's a new malware-protection bypass Ransomware negotiators are now in high demand Microsoft seemingly enforces the new Windows 11 Start menu Stay tuned for SpinRite v6.1 beta REvil's Clever Crypto We invit…
 
Check out Team Triple Jump: https://tripleju.mp/ Be part of Tiny Teams: https://www.yogscast.games/tiny-teams Follow us: @ptchplspod Ever had a great idea for a game? Us, too. Luckily, we also have a room full of devs to tell us why it wouldn't work. Let's see how this goes. Pitch, Please is a Yogscast Games podcast. Learn more about your ad choice…
 
Picture of the Week. Mozilla's Firefox Monthly Active Users (MAU) slowly but steadily drops. Google to finally assume HTTPS. The evolution of "Initial Access Brokers". DarkSide Returns. "A Microsoft July 2021 Recap" Tailscale. Closing the Loop. SpinRite. The BlackMatter Interview. We invite you to read our show notes at https://www.grc.com/sn/SN-83…
 
Picture of the Week. Mozilla's Firefox Monthly Active Users (MAU) slowly but steadily drops. Google to finally assume HTTPS. The evolution of "Initial Access Brokers". DarkSide Returns. "A Microsoft July 2021 Recap" Tailscale. Closing the Loop. SpinRite. The BlackMatter Interview. We invite you to read our show notes at https://www.grc.com/sn/SN-83…
 
This week in the Security Weekly News: The NSA, The NSO, Microsoft, Sonic Screwdrivers, regulating cryptocurrency, a mysterious NPM, All this and Jason Wood's legendary Expert Commentary! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn139…
 
This week in the Security Weekly News: The NSA, The NSO, Microsoft, Sonic Screwdrivers, regulating cryptocurrency, a mysterious NPM, All this and Jason Wood's legendary Expert Commentary! Show Notes: https://securityweekly.com/swn139 Visit https://www.securityweekly.com/swnfor all the latest episodes! Follow us on Twitter: https://www.twitter.com/s…
 
This week we’re reporting from Jersey, somewhere that’s at the forefront of development for digital technology. Known for its financial tech it’s also leading the way in ecological and medical technology too. This digital innovation is supported by a commitment to connectivity on the Island. Every home and almost every commercial property in Jersey…
 
This week, we welcome Maggie Jauregui, Offensive Security Researcher at Intel, to discuss Platform Firmware Security! Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. In the AppSec News: PunkSpi…
 
Zero day brokers are people who make or sell malware that’s sold to people who will use that malware to exploit people. It’s a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for the NY Times, dove in head first which resulted in her writing a whole book on it. Affiliate link for …
 
We present an approach to enhancing the realism of synthetic images. The images are enhanced by a convolutional network that leverages intermediate representations produced by conventional rendering pipelines. The network is trained via a novel adversarial objective, which provides strong supervision at multiple perceptual levels. We also introduce…
 
A global cyber-surveillance scandal - spyware developed in Israel - has put the government there under the media microscope, and its story does not add up.Contributors:Jonathan Klinger - Cyberlaw lawyerMarc Owen Jones - Assistant professor, Hamid Bin Khalifa UniversityOmer Benjakub - Tech & Cyber Reporter, HaaretzMarwa Fatafta - Policy Analyst, Al …
 
This week, we kick off the show with an interview featuring Alyssa Miller, BISO at S&P Global, to talk about the how the “B” in BISO is for Business! Next up, we welcome Michael Welch, Managing Director at Morgan Franklin, to discuss Cyber-Physical Attacks!! In the Security News, From a stolen laptop to inside the company network, the essential too…
 
The proposed framework contains two important ingredients: Smoothness regularization and Bregman proximal point optimization. Our experiments show that the proposed framework achieves new state-of-the-art performance on a number of NLP tasks including GLUE, SNLI, SciTail and ANLI. 2020: Haoming Jiang, Pengcheng He, Weizhu Chen, Xiaodong Liu, Jianfe…
 
This week, in our first segment, we welcome Da-Wyone Haynes, Consultant in Data Analytics at Aegon & Transamerica, to talk about The Need for CyberSecurity Training Programs and the Role Cyber Professionals Play! Then we welcome Stephanie Aceves, Senior Director of Threat Response & SME Lead at Tanium, to discuss Tanium for Incidents! In the Enterp…
 
Xiaomi is relaunching in South Africa with actual in country representatives. Gavin and Lindsey are always looking for more value in the market and Xiaomi's vast product catalogue is very hard to beat for diversity and value for money. Nicola fills us in on the brand strategy as it now tries to carve out a place in the South African market.…
 
This week in the Enterprise News: Aqua Security Introduces new Aqua Platform, Decryption Tools, Security Summit 2021: Google expands Trusted Cloud, Clearview AI raises $30M to accelerate growth in image-search technology, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw236…
 
On this week’s Cyber Security Brief, we discuss some recent ransomware stories, as well as giving a sneak peek into some research we have been doing into ransomware. We also talk about recent announcements from U.S. authorities that attributed some recent cyber attacks, including the Microsoft Exchange Server campaign, to Chinese actors, and we als…
 
This week on Checklist 241 - Israel is investigating NSO Group, the outfit behind the spyware “Pegasus.” We’ll hear about that, plus the scary state of affairs, as told by The Next Web. Plus - one week after updates for Apple gear, more updates for Apple gear. And how do you AirDrop? We’ll look at a story that may have you reconsidering settings. G…
 
Priya Chaudhry joins us today as co-host and we are eager to catch up with her and get her legal perspective on recent litigations and proposed legislation that impacts our world of security and compliance. Hear ye, Hear ye! The court is now in session. Show Notes: https://securityweekly.com/scw81 Visit https://www.securityweekly.com/scw for all th…
 
Security starts before detection, it starts before investigations. Mature security teams understand the importance of good hygiene and take proactive measures to secure themselves against the ever-increasing threat landscape. Join us this week as Stephanie Aceves, Threat Response SME Lead, talks through a holistic approach to security using the Tan…
 
This week South Africa's most accessible consumer technology podcast unpacks the Apple earnings, Lindsey is very excited for the Huawei P50 Pro, Gavin lost R3000 trying to set up an Azure virtual machine cloud computer, there's a Samsung Unpacked folding phone preview and we finally figure out why tech reviews have become so poor. There's also the …
 
Brief chat around the rise in Ransomware attacks, campaigns against our Infrastructure, the deficit in Cyber Talent, and how we could address the issue by extending Corporate Cyber Training programs to extend past the Corporate boundary. Segment Resources: https://www.aegon.com/home/ https://talklou.com/ https://www.infragardnational.org/ https://i…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login