show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Inside Wall Street with Morris Sachs. Your trip is short. Recommended viewing: The Sting Trading Places Groundhog Day YouTube: Charlie DiFrancesca Full Length Speech 1989 Recommended Reading: 1.Modern Times - Paul Johnson 2. Atlas Shrugged- Ayn Rand 3. *redacted* 4. Reminiscences of a Stock Operator- Edwin Lefevre 5. Lessons of History - Will Durant Daily Reading : 13D, Grant’s, GaveKal, Macro Tourist, Daily Shot, Anthony Peters, David Zervos, John Authors, FT, WSJ, NYT, SCMP, Chicago Tribun ...
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warnings signs of trouble, take quick action, and lower the risk of becoming a victim.
 
The Helping Friendly Podcast (HFPod) explores the music and fan experience of Phish, through interviews and deep dives on shows and tours. Since 2013, we’ve aimed to bring the fan voice into discussions about Phish, and with the help of our guests, we’re still discovering new angles of appreciation for the band. And when the band is on tour, we provide a review of every show the following day with a fan who was there. As one of our listeners said, “this show has impeccable analysis, stats, c ...
 
Welcome to the Ivanti Security Insights podcast: Where best-practice cybersecurity meets real-world workplaces and roadblocks. Join Chris Goettl, Amanda Wittern, Daniel Spicer and Ashley Stryker as they review the security news, research and tactics that truly matter to the infosec and security teams protecting organizations and businesses like yours. Returning January 19!
 
A
Analyze Phish

1
Analyze Phish

Earwolf & Harris Wittels, Scott Aukerman

Unsubscribe
Unsubscribe
Monthly
 
Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
 
P
Pod Ween Satan

1
Pod Ween Satan

Jay Hunter and Dave Massey

Unsubscribe
Unsubscribe
Weekly
 
Ween is The Greatest Band in The World. This is the Greatest Podcast in The World about The Greatest Band in The World....Ween. We will introduce you to Ween in all their grandness and splendor. We shall take you on a tour of the entire Ween Catalogue...One album at a time...One song at a time...Until the end of time. Together we will listen to each and every Ween song. Together we will spread the good word of The Boognish. Buckle up Bitch. Step inside this spaceship and take a ride straight ...
 
T
The New Dad Rock

1
The New Dad Rock

Steve Nelson & Keith Nottonson

Unsubscribe
Unsubscribe
Monthly
 
Two college radio DJs during the 90s, hosts Keith and Steve helped expose bands like Nirvana, Pavement and PJ Harvey. They went to shows, interviewed musicians and reviewed albums for various zines and papers. They worked security at concerts and once, even did load-in for Phish. Now they’re dads. Whether you want to explore lesser-known music or take a trip down memory lane, tune in to The New Dad Rock. Join hosts Keith and Steve as they navigate the ages together, sharing their love of mus ...
 
8
8th Layer Insights

1
8th Layer Insights

Perry Carpenter | CyberWire Inc.

Unsubscribe
Unsubscribe
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
 
New episodes on Monday, Wednesday, and Friday! Sign up for Osiris Premium on Apple for ad-free episodes released a day early! Phish’s Fall 1997 tour is one of the most celebrated in Phish history. To mark the tour’s 25th anniversary, Undermine will look at every show of the Fall 1997 tour, and 25 key shows of the 1990s that led up to this legendary tour. Hosted by Tom Marshall, each episode will focus on one Phish show, and will feature an interview with a notable guest from the Phish commun ...
 
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
 
Geared towards Deadheads, Phishheads and the jam band community, The Sound Podcast is a music discovery interview style podcast, hosted by Ira Haberman. Featuring Jam Bands and more... much more. Rooted in Americana, Blues, Bluegrass, Country, Folk, Funk, Jazz, Reggae, Rock, Soul but mostly Jam Band music. New episodes of The Sound Podcast are available Wednesday and Friday (and more if we can). The Wednesday episode is exclusively a live music playlist called LIVEFIVE powered by nugs.net. H ...
 
Chris and Tim will provide their commentary about songs that weren’t hits. Each episode examines just one studio album, and they’ll give you their top 3 non hits from that album. Chris has been a huge Rush fan for most of his life, and Tim could say the same about Phish. They’re both motivated to learn more about bands/artists by listening more closely to deeper cuts from albums they’ve either overlooked or are familiar with but dismissed for whatever reason. “This evolved from a music club ...
 
In an increasingly complex and hostile climate the battlefield has been set around cyber security. Cyber Security Uncut brings you the key influencers, their stories, and the emerging technology that’s contributing to Australia’s resilience, security and growth. Discover how business, government and our defence force are combating the rising threat of cyber attacks as Australia drives forward in its transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national secu ...
 
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
 
On Phemale-Centrics we discuss all things Phish from a woman's point of view. Join us as we interview Phish's community members, play games like "Market Price" and discuss the latest goings on in the Phish scene, both on-line and on Lot! Your host is Dawneebee! Co-hosts are a rotating cast of her phriends including Jillian, Kristie, Merry, Baker & Lauren and her husband Jason "Snakey". Hosted on Acast. See acast.com/privacy for more information.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Loading …
show series
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: Google’s search results have become a malware-riddled sh*tshow Ransomware payment values dropped by 40% YoY in 2022 Kraken takes over Solaris the old school way Grand Theft Auto RCE is wreaking havoc ManageEngine customers are all getting owned So you kno…
 
Link to Blog Post This week’s Cyber Security Headlines - Week in Review, January 16-20, is hosted by Rich Stroffolino with our guest, George Finney, CISO, Southern Methodist University Thanks to our show sponsor, Cerby Did you know that over 60% of the cloud applications used by your company don’t support identity standards like single sign-on? And…
 
Ransomware hits Costa Rican government systems, again. A Chinese threat actor deploys the BOLDMOVE backdoor against unpatched FortiOS. Credential stuffing afflicts PayPal users. T-Mobile discloses a data breach. A cyberattack hits a remote Canadian utility. The Wagner Group sponsors a hackathon. Malek Ben Salem from Accenture describes prompt injec…
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: A look at the Hive takedown UK’s Royal Mail still struggling GitHub’s code signing certificates stolen TSA misses the point on no-fly list theft Much, much more This week’s show is brought to you by Remediant, which is now a part of Netwrix. Tim Keeler is…
 
Some perspective on the cybercriminal labor market. DocuSign is impersonated in a credential-harvesting campaign. Social engineering pursues financial advisors. Killnet is active against the US healthcare sector. Mr. Security Answer Person John Pescatore has thoughts on cryptocurrency. Ben Yelin and I debate the limits of section 230. And, hey, who…
 
We're going to Goddard College today for 10/31/86! Please consider subscribing to Osiris Premium on Memberful, or to Osiris Premium on Apple Podcasts. Thanks for your support. The Helping Friendly Podcast is hosted and produced by Jonathan Hart, Brian Brinkman, RJ Bee, and Megan Glionna. Brought to you by Osiris Media. Hosted on Acast. See acast.co…
 
Gootloader's evolution. Yandex source code leaked (and Yandex blames a rogue insider). New GRU wiper malware is active against Ukraine. Latvia reports cyberattacks by Gamaredon. Russia and the US trade accusations of malign cyber activity. A hacktivist auxiliary's social support system. Deepen Desai from Zscaler describes the Lilithbot malware. Ric…
 
Venafi solutions architect Steve Judd talks about the recent directive from the Pentagon that a zero-trust policy be implemented at the Department of Defense in the next four years. Is this a workable deadline? What are the hurdles to be jumped? Judd also tells me what a solutions architect does and why he thinks it’s the most fun job in cybersecur…
 
Over the years, I’ve mentioned the Mother Hips several times on this podcast and we’ve had both principle songwriters Tim Bluhm and Greg Loaicono on this show. The band, who have roots in Northern California, have been at their craft for some 30 years now, and When We Disappear marks their 12th album to date. While the Mother Hips aren’t a typical …
 
Charter Communications says vendor breach exposed some customer data Russia’s Sandworm hackers blamed in fresh Ukraine malware attack Experts plans to release VMware vRealize log RCE exploit this week Thanks to this week's episode sponsor, Hunters Hunters is a complete SOC platform, built for your security team. By providing unlimited ingestion and…
 
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social …
 
In episode 44 of Hooked on Creek, Korre Johnson talks with Willy Ackerman (Psilly Way-Out Willy) about his appreciation for Max Creek. Willy is a huge fan of Max Creek and has been part of the Creek scene for 30 years. In this episode, Willy talks about his favorite memories seeing Max Creek over the years and his love of the Creek family that supp…
 
Our guest, Charlie Moore, is a recently retired USAF Lieutenant General who sits down to share his story from flying high in the air to becoming a bigwig in the cyber community. He was most recently the Deputy Commander of the United States Cyber Command, and also spent part of his career as a human factors engineer working on human interfaces for …
 
Cybersecurity interview with ChatGPT. In part one of CyberWire’s Interview with the AI, Brandon Karpf interviews ChatGPT about topics related to cybersecurity. Rick Howard joins Brandon to analyze the conversation and discuss potential use cases for the cybersecurity community. ChatGPT is a chatbot launched by OpenAI and built on top of OpenAI’s GP…
 
Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X. The research states "By abusing…
 
Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X. The research states "By abusing…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, January 23-27, is hosted by David Spark with our guest, Kathleen Mullin, CISO, Cancer Treatment Centers of America Thanks to our show sponsor, SafeBase If a prospective customer asked about your trust program or security policies, where would you send them? Chances are, you’d …
 
An update on the takedown of the Hive ransomware gang, plus insights from CrowdStrike’s Adam Meyers. If you say you’re going to unleash the Leopards, expect a noisy call from Killnet. Our guest is ExtraHop CISO Jeff Costlow talking about nation-state attackers in light of ongoing Russian military operations. CISA has released eight ICS advisories, …
 
FBI seizes Hive ransomware group infrastructure after lurking in servers for months Layoffs come to IBM - Kyndryl, Watson and Russia to blame Microsoft says services have recovered after widespread outage Thanks to this week's episode sponsor, SafeBase If a prospective customer asked about your trust program or security policies, where would you se…
 
Today on the Social-Engineer Podcast: The Security Awareness Series, Ryan and I will have a special discussion of the 2023 security landscape. [Jan 27, 2023] 00:00 – Intro 00:27 – Intro Links: Social-Engineer.com- http://www.social-engineer.com/ Managed Voice Phishing- https://www.social-engineer.com/services/vishing-service/ Managed Email Phishing…
 
Joint advisory warns of remote monitoring and management software abuse. Iranian threat actors reported active against a range of targets. UK's NCSC warns of increased risk of Russian and Iranian social engineering attacks. A look at trends, as seen by CIOs. Carole Theriault ponders health versus privacy with former BBC guru Rory Cellan Jones. Kyle…
 
CISA, NSA, and the MS-ISAC are releasing this alert to warn network defenders about malicious use of legitimate remote monitoring and management software. AA23-025A Alert, Technical Details, and Mitigations For a downloadable copy of IOCs, see AA23-025.stix Silent Push uncovers a large trojan operation featuring Amazon, Microsoft, Geek Squad, McAfe…
 
You didn’t get a chance to clean your vendor master file quarter – or maybe last year. Now it’s January that’s filled with preparation for distributing 1099s to your payees and the related 1099 filing with the IRS and some states. But you still have time to do the minimum to avoid fines and penalties…and you also have time to get help. Keep listeni…
 
A look at North Korean crypto stealing tactics Russia saw record DDoS attacks China leads in facial recognition tech exports Thanks to this week's episode sponsor, SafeBase These days, customer trust can be an organization’s strongest competitive advantage. But how can you develop and maintain customer trust over the long term? The answer is SafeBa…
 
King Gizzard and the Lizard Wizard Live at Red Rocks October 10, 2022 A concert nearly three years in the making, featuring a microtonal mini-set, The Lord of Lightning vs. Balrog suite and Keith's favorite song of 2022: Ice V. Set Two: 1) Rattlesnake 2) Automation 3) Honey 4) Sleepdrifter 5) Ataraxia 6) Evil Death Roll 7) Ice V 8) The Reticent Rac…
 
King Gizzard and the Lizard Wizard Live at Red Rocks October 10, 2022 A concert nearly three years in the making, featuring an epic 20-minute version of The River. Set One: 1) Mars for the Rich 2) Hell 3) Magenta Mountain 4) Inner Cell 5) Loyalty 6) Horology 7) O.N.E. 8) Nuclear Fusion 9) All Is Known 10) Straws in the Wind 11) Garden Goblin 12) Th…
 
How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shouldn't get cocky. DevSecOps survey results show tension between innovat…
 
Today we are joined by Robert Kerbeck. Robert is the founder of the Malibu Writers Circle, a lifetime member of the Actors Studio, and a graduate of the University of Pennsylvania. His true crime memoir about his secret career as a corporate spy, RUSE: Lying the American Dream from Hollywood to Wall Street, has received praise from Frank Abagnale a…
 
Millions have been impacted by data breaches. Many of us know how fraudsters work and how they utilize this information. But our parents and children become victims because of their fear or urgency inflicted by the scammers. Today’s guest is Mike Cook. Mike is an entrepreneur with over 30 years of experience working and serving in the financial ser…
 
Loading …

Quick Reference Guide

Copyright 2023 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login