show episodes
 
T
The Ransomware Files

1
The Ransomware Files

Jeremy Kirk, Executive Editor, Information Security Media Group

Unsubscribe
Unsubscribe
Monthly
 
The Ransomware Files podcast tells the harrowing stories of IT pros who have fought back against ransomware, the greatest crime wave the Internet has ever seen. It features in-the-trenches stories about how organisations recovered from ransomware and what tips they would pass onto others. It has in-depth technical detail and frank human reflections from those who have faced file-encrypting malware, the potent tool used by shadowy cybercriminals.
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://anchor.fm/amplifiedandintensified/support
 
p
pm73media

1
pm73media

Matt Stephenson

Unsubscribe
Unsubscribe
Monthly+
 
Each week on pm73media, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On pm73media, we meet the people who do one or the other… and sometimes both.
 
Tech News Briefing is your guide to what people in tech are talking about. Every weekday, we’ll bring you breaking tech news and scoops from the pros at the Wall Street Journal, insight into new innovations and policy debates, tips from our personal tech team, and exclusive interviews with movers and shakers in the industry. Hosted by Zoe Thomas
 
The CyberPHIx is a regular audio podcast series that reports and presents expert viewpoints on data security strategy for organizations handling patient health or personal information in the delivery of health-related services. These timely programs cover trends and data security management issues such as cybersecurity risk management, HIPAA and OCR compliance strategy and vendor risk management. Meditology Services, the healthcare industry's leading security and compliance firm, moderates t ...
 
a
a16z Podcast

1
a16z Podcast

Andreessen Horowitz

Unsubscribe
Unsubscribe
Monthly+
 
The a16z Podcast discusses tech and culture trends, news, and the future – especially as ‘software eats the world’. It features industry experts, business leaders, and other interesting thinkers and voices from around the world. This podcast is produced by Andreessen Horowitz (aka “a16z”), a Silicon Valley-based venture capital firm. Multiple episodes are released every week; visit a16z.com for more details and to sign up for our newsletters and other content as well!
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Former acting Director of the CIA Michael Morell speaks with top leaders of the U.S. intelligence community as they reflect on their life, career and the critical roles they play in shaping national security policies. As a central figure in the most significant U.S. counter-terror efforts of the past two decades and a former CIA intelligence analyst, Morell is uniquely skilled at taking industry leading knowledge to make connections that provide deep insight into complex security events – he ...
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
https://petronellatech.com presents Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware pay ...
 
TOP SECRET Personal Attention, SpyCast Listeners Known to be the podcast real spies listen to -(STOP)- eavesdrop on conversations with high level sources from around the world -(STOP)- spychiefs molehunters defectors covert operators analysts cyberwarriors and researchers debriefed by SPY Historian Hammond -(STOP) stories secrets tradecraft and technology discussed -(STOP)- HUMINT SIGINT OSINT IMINT GEOINT and more -(STOP)- rumored to be professional education internal communication and publ ...
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
 
C
Click Here

1
Click Here

The Record by Recorded Future

Unsubscribe
Unsubscribe
Weekly
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. Click Here. From The Record by Recorded ...
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
Every week on the DirtySecurity Podcast, we chat with Cylance’s best and brightest about what is happening in the world of cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center.
 
Loading …
show series
 
Hackers. Viruses. Malware. There must be more than 50 ways to lose your crypto. But one of the ways is when you voluntarily hand it over to criminals demanding a ransom. This can be the result of Ransomware. What is this insidious method of extracting money from people, how did it come to be and how are you and your data at risk? Today we are joine…
 
Lithuania sustains a major DDoS attack. Lessons from NotPetya. Conti's brand appears to have gone into hiding. Online extortion now tends to skip the ransomware proper. Josh Ray from Accenture on how social engineering is evolving for underground threat actors. Rick Howard looks at Chaos Engineering. US financial institutions conduct a coordinated …
 
Original Article: How to Negotiate with Ransomware Hackers Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- Minder soon found more work. Sometimes it was a prominent company facing a multimillion-dollar ransom demand, and the negotiation took weeks. Sometimes it was a small business or a nonprof…
 
Ransomware explained; what ransomware is, it how ransomware works and how to protect against a ransomware attack. That’s what we’re here to discuss. The topis is of such broad interest that John Oliver discussed ransomware on Last Week Tonite a number of months ago. A #ransomewareattack can do serious financial damage to an organization. A ransomwa…
 
In this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss how Russian espionage actors are exploiting the Follina vulnerability, the release of the latest version of Metasploit, and a new phishing campaign that’s been underway on Facebook. We also discuss ransomware extensively, including what authorities were able to find when …
 
Hacking groups with ties to Russia are changing their approach to cyber attacks amid an increase in sanctions and pressure from U.S. law enforcement. WSJ Pro Cybersecurity reporter David Uberti joins host Zoe Thomas to discuss why the change in strategy is making it hard for hacking victims and Washington to say who is behind the attacks and how to…
 
This week in the Security News: Analyzing chat logs with Python, consumer reports for IoT, hypothetically BS, the year of the Linux desktop and the year of Linux malware are the same, do you trust Google to tell you open-source software is secure?, Twitter fines, WSL attack vector, Follina, UK Government still won't pay a bounty, and ransomware tha…
 
Original Article: Swamps Can Protect Against Climate Change, If We Only Let Them Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- It can be hell finding one’s way across an extensive boggy moor—the partially dry, rough ground and the absence of any landmarks let the eye rove helplessly into the …
 
Summary Vikram Sood (Twitter, Blog) joins Andrew (Twitter; LinkedIn) to discuss intelligence in the world’s largest democracy. He was the chief of India’s Research & Analysis Wing (R&AW). What You’ll Learn Intelligence The intelligence landscape in India China, Pakistan, and the intelligence challenges in the region The founding and evolution of th…
 
Original Article: Roe’s Final Hours in One of America’s Largest Abortion Clinics Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- At seven o’clock on Friday morning, Ivy turned on the lights of the Houston Women’s Clinic, the largest abortion provider in the state, where she has worked as a supe…
 
Original Article: Cocaine, class and me: everyone in this town takes drugs, all the time – they’re part of the civic culture Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- A man walks into a chicken shop. This sounds like the beginning of a joke. Perhaps it is. For 18 months, I have worked in …
 
Original Article: We’re Not Going Back to the Time Before Roe v. Wade. We’re Going Somewhere Worse Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- In the weeks since a draft of the Supreme Court’s decision in Dobbs v. Jackson Women’s Health Organization—a case about a Mississippi law that bans …
 
Original Article: Fatal Distraction: Forgetting a child in the backseat is a horrifying mistake. Is it a crime? Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- The defendant was an immense man, well over 300 pounds, but in the gravity of his sorrow and shame he seemed larger still. He hunched f…
 
Algorithmic stablecoin TerraUSD was supposed to maintain its value at $1 with the help of its sister-crypto, Luna. But TerraUSD’s price collapsed to pennies in May, while Luna plunged by more than 99%, wiping out around $40 billion in value. Their creator Do Kwon has been attempting a comeback by relaunching Luna. WSJ markets reporter Alexander Osi…
 
Original Article: Half Life: The Decay of Knowledge and What to Do About It - Farnam Street Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- Understanding the concept of a half-life will change what you read and how you invest your time. It will explain why our careers are increasingly specializ…
 
Original Article: Friction: The Hidden Force Holding You Back - Farnam Street Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- How is it that two people delivering the same value to organizational outcomes, in the same role at the same pay, can have a massively different value to the organizatio…
 
Original Article: Reducing Inflation Will Come at a Great Cost: Stagflation Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- For me, hearing supposed “experts” talk about what’s now happening in the markets and economy is like listening to nails scratch against a chalkboard because they are typi…
 
This episode reports on how a vulnerability in a VoIP system, nearly led to a ransomware attack, why files in open source registries should be handled with care, and a hacker is selling access to compromised Atlassian Confluence servers
 
To tackle social isolation among seniors, some caregivers have turned to virtual reality. One company developing that technology is Rendever. At The Wall Street Journal's recent Future of Everything Festival, personal tech columnist Nicole Nguyen spoke with Rendever’s co-founder and CEO about where this tech stands today and how it can be leveraged…
 
Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he's been in the business of solving unique cybersecurity problems for so long that he has found his own path that works very well for him. He says, "if I go to a unique problem and try to…
 
Today’s Soap Box guest is an industry legend – Metasploit creator HD Moore. He’s here to tell us more about what’s happening with his latest creation, Rumble Network Discovery. If you’re not familiar with Rumble, well, you should be. It’s a network scanner that you just set loose and it will go and find all the devices on your network. It has a fre…
 
Alan Neville, a Threat Intelligence Analyst from Symantec Broadcom, joins Dave to discuss their research "Lazarus Targets Chemical Sector." Symantec has observed the North Korea-linked threat group known as Lazarus conducting an espionage campaign targeting organizations operating within the chemical sector. The campaign appears to be a continuatio…
 
Lithuania's NKSC warns of increased DDoS threat. Limited Russian success in the cyber phases of its hybrid war. Another warning of spyware in use against targets in Italy and Kazakhstan. Hey, critical infrastructure operators: CISA’s got tabletop exercises for you. Kevin Magee from Microsoft has advice for recent grads. A look back the year since C…
 
Original Article: The Code That Controls Your Money | Wealthsimple Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- Wealthsimple makes powerful financial tools to help you grow and manage your money. Learn more When Thomas first started programming, it was 1969. He was a kid just out of high sch…
 
Original Article: Escape from Auschwitz: the most extraordinary Holocaust story you’ve never heard Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- Escape was lunacy, escape was death. To attempt it was suicide. That much had been taught to Walter Rosenberg early, within a week of his arrival in…
 
Original Article: To infinity and back: Inside Axie’s disastrous year Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- At 1 a.m. on March 29, Jiho Zirlin, a co-founder of the Vietnamese crypto gaming company Sky Mavis, received a text from his fellow co-founder Aleksander Larsen. Zirlin, who is …
 
Coming up today: we speak to the people picking up the slack after their colleagues quit and get stuck into a messy argument about microbe names. The stories we talked about this week: The Almighty Squabble Over Who Gets to Name Microbes https://www.wired.com/story/microbe-names-fight/ They Quit. Now You're Picking Up the Slack https://www.wired.co…
 
Original Article: On the Etymologies and Linguistic Evolutions of “Family” Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- The etymology of a word isn’t necessarily interchangeable with the way the word is used by a culture. But looking at the etymology may reveal the meaning that went into the…
 
On Tech Tent this week, a BBC investigation into so-called "up-skirting" on Facebook - and Thomas Hughes from Meta's Oversight Board on its first year as an arbiter on disputes on Facebook and Meta. Dr Andrew Hundt on why AI mimicks the prejudice of human beings. Shiona McCallum has been to the Teen Tech awards. And Glastonbury Festival is back - w…
 
Andy Jassy took over as Amazon CEO nearly a year ago. Since then the company’s stock price has fallen, online shopping demand has shrunk and the e-commerce giant has been left with excess warehouse space. As a result, Jassy has been forced to reverse course on some initiatives started by founder Jeff Bezos. WSJ reporter Dana Mattioli joins host Zoe…
 
In the Security News for this week: appliances with holes, gamification and its pitfalls, false rocket sirens, PHP strikes again, new laws we may actually agree with, hacking jacuzzis, Icefall and the state of ICS security, Adobe is blocking anti-virus, Mega is Mega insecure, Microcorruption CTF and DIY NSA playset! Visit https://www.securityweekly…
 
Reviewing Russian cyber campaigns in the war against Ukraine, and the complexity of Ukraine's IT Army. ICEFALL advice and reactions. Carole Theriault looks at Hollywood’s relationship with VPNs. Podcast partner Robert M. Lee from Dragos provides a rundown on Pipedream. And CISA updates its Cloud Security Technical Reference Architecture. For links …
 
The Good Girl Syndrome is a mindset imposed on girls and women to the detriment of their sense of Self, success and overall well-being. It is masked as socially acceptable norms - from behaviour to presentation and how to interact amongst others, to name a few. Often girls are told not to climb trees or to sit in a less suggestive manner because it…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login