Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
T
The Ransomware Files


1
The Ransomware Files
Jeremy Kirk, Executive Editor, Information Security Media Group
The Ransomware Files podcast tells the harrowing stories of IT pros who have fought back against ransomware, the greatest crime wave the Internet has ever seen. It features in-the-trenches stories about how organisations recovered from ransomware and what tips they would pass onto others. It has in-depth technical detail and frank human reflections from those who have faced file-encrypting malware, the potent tool used by shadowy cybercriminals.
The biggest stories in tech from the BBC’s technology team.
A critical look at new technologies, new approaches and new ways of thinking, from politics to media to environmental sustainability.
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://anchor.fm/amplifiedandintensified/support
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news.
Deception, influence, and social engineering in the world of cyber crime.
True crime. Real prosecutors. Expert analysis. Experienced prosecutors from San Diego, CA discuss the latest crime news, interview criminal justice leaders, and bring you their expert analysis.
Dramas for English language learners from BBC World Service. Improve your English with retellings of stories classic and new. Each episode is between 6 and 10 minutes long.
Each week on pm73media, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On pm73media, we meet the people who do one or the other… and sometimes both.
The award-winning WIRED UK Podcast with James Temperton and the rest of the team. Listen every week for the an informed and entertaining rundown of latest technology, science, business and culture news. New episodes every Friday.
Tech News Briefing is your guide to what people in tech are talking about. Every weekday, we’ll bring you breaking tech news and scoops from the pros at the Wall Street Journal, insight into new innovations and policy debates, tips from our personal tech team, and exclusive interviews with movers and shakers in the industry. Hosted by Zoe Thomas
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
T
The CyberPHIx: Meditology Services Podcast


1
The CyberPHIx: Meditology Services Podcast
Brian Selfridge: Healthcare IT Thought Leader
The CyberPHIx is a regular audio podcast series that reports and presents expert viewpoints on data security strategy for organizations handling patient health or personal information in the delivery of health-related services. These timely programs cover trends and data security management issues such as cybersecurity risk management, HIPAA and OCR compliance strategy and vendor risk management. Meditology Services, the healthcare industry's leading security and compliance firm, moderates t ...
Technologists and crypto-enthusiasts Joel Comm and Travis Wright attempt to demystify the world of bitcoin, blockchain, litecoin, ethereum, alt-coins, token generation events, and ICOs in this podcast for cryptocurrency newbies.
The a16z Podcast discusses tech and culture trends, news, and the future – especially as ‘software eats the world’. It features industry experts, business leaders, and other interesting thinkers and voices from around the world. This podcast is produced by Andreessen Horowitz (aka “a16z”), a Silicon Valley-based venture capital firm. Multiple episodes are released every week; visit a16z.com for more details and to sign up for our newsletters and other content as well!
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Former acting Director of the CIA Michael Morell speaks with top leaders of the U.S. intelligence community as they reflect on their life, career and the critical roles they play in shaping national security policies. As a central figure in the most significant U.S. counter-terror efforts of the past two decades and a former CIA intelligence analyst, Morell is uniquely skilled at taking industry leading knowledge to make connections that provide deep insight into complex security events – he ...
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
C
Cybersecurity with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001


https://petronellatech.com presents Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware pay ...
Discussions about trends, insights and emerging issues impacting the accounts payable function
TOP SECRET Personal Attention, SpyCast Listeners Known to be the podcast real spies listen to -(STOP)- eavesdrop on conversations with high level sources from around the world -(STOP)- spychiefs molehunters defectors covert operators analysts cyberwarriors and researchers debriefed by SPY Historian Hammond -(STOP) stories secrets tradecraft and technology discussed -(STOP)- HUMINT SIGINT OSINT IMINT GEOINT and more -(STOP)- rumored to be professional education internal communication and publ ...
Welcome to Between The Lines, a podcast brought to you by Greyline. Join Darren Mooney, Sean Wilke, and others as they explore new territory and bring a relatable, refreshing spin on compliance and finance. Thank you for your support!
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
The ‘Known Good’ Podcast is where Glasswall discusses key cybersecurity topics. Each episode, we ask experts to share their thoughts around everything from ransomware and zero-day exploits to best practice, regulation and how to build a proactive cybersecurity strategy.
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. Click Here. From The Record by Recorded ...
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
StorageReview.com is a leading provider of news and reviews throughout the entire IT stack - from the datacenter to the edge, and all points in between.
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today. 213656
Listen to your long form article at your leisure
Every week on the DirtySecurity Podcast, we chat with Cylance’s best and brightest about what is happening in the world of cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center.
Three guys get together and discuss the things that are interesting to them or otherwise important. Current events, music, movies, culture, and more will be discussed!
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
T
The Internet of Things Podcast - Stacey On IoT


1
The Internet of Things Podcast - Stacey On IoT
Stacey Higginbotham, tech journalist
Stacey Higginbotham (formerly Sr. Editor at Fortune) and co-host Kevin Tofel discuss the latest news and analysis of the Internet of Things. Covers Consumer IoT, Industrial IoT and Enterprise IoT. Guests include Vint Cerf, Om Malik, and people from Amazon.com, AT&T, IBM Watson and more.
F
Five Minutes With Andy


1
Five Minutes With Andy
Professional Association Management Company | Virtual Inc.
Innovative practice and technologies for small and mid-size businesses
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Where timely and relevant security news meets ninja jokes and sit down comedy. Our goal is to keep network defenders apprised of pertinent news and trends in under thirty minutes.
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
S
Symantec Cyber Security Brief Podcast


1
Symantec Cyber Security Brief Podcast
Security Response Team
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
Thinking Reimagined® is a podcast series dedicated to 𝘤𝘩𝘢𝘯𝘨𝘪𝘯𝘨 𝘵𝘩𝘦 𝘮𝘪𝘯𝘥𝘴𝘦𝘵 𝘧𝘰𝘳 𝘢 𝘣𝘦𝘵𝘵𝘦𝘳 𝘨𝘭𝘰𝘣𝘢𝘭 𝘴𝘰𝘤𝘪𝘦𝘵𝘺.
Hackers. Viruses. Malware. There must be more than 50 ways to lose your crypto. But one of the ways is when you voluntarily hand it over to criminals demanding a ransom. This can be the result of Ransomware. What is this insidious method of extracting money from people, how did it come to be and how are you and your data at risk? Today we are joine…
C
CyberWire Daily


1
Notes from the cyber phases of the hybrid war against Ukraine. Conti retires its brand, and LockBit 2.0 is now tops in ransomware. Extortion skips the encryption. Cyber exercise in the financial sector ...
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15
Lithuania sustains a major DDoS attack. Lessons from NotPetya. Conti's brand appears to have gone into hiding. Online extortion now tends to skip the ransomware proper. Josh Ray from Accenture on how social engineering is evolving for underground threat actors. Rick Howard looks at Chaos Engineering. US financial institutions conduct a coordinated …
C
Cybersecurity Today


1
Cyber Security Today, June 24, 2022 -Unpatched VMware applications are still being exploited, ransomware used as a decoy, and a COVID text scam
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51
This episode reports on successful attacks exploiting the Log4Shell hold in two unpatched VMware applications, and moreBy ITWC
The latest edition of the ISMG Security Report investigates the reboot of ransomware group Conti, which supports Russia's invasion of Ukraine. It also discusses why paying ransomware actors is a "business decision" and how to respond to the talent shortage in the financial sector.By BankInfoSecurity.com
Original Article: How to Negotiate with Ransomware Hackers Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- Minder soon found more work. Sometimes it was a prominent company facing a multimillion-dollar ransom demand, and the negotiation took weeks. Sometimes it was a small business or a nonprof…
A
APNow


1
Ransomware Attack Explained: Insights from A Former FBI Agent
22:50
22:50
Play later
Play later
Lists
Like
Liked
22:50
Ransomware explained; what ransomware is, it how ransomware works and how to protect against a ransomware attack. That’s what we’re here to discuss. The topis is of such broad interest that John Oliver discussed ransomware on Last Week Tonite a number of months ago. A #ransomewareattack can do serious financial damage to an organization. A ransomwa…
Ransomware struck global currency exchange and remittance company Travelex on New Year's Eve 2019. Security Architect Don Gibson was DJing at a friend’s place when the first alerts came in. That night kicked off turbulent period for Don that lasted throughout the rest of the year. His name became publicly linked with the Travelex incident, and the …
S
Symantec Cyber Security Brief Podcast


1
BlackCat ransomware, Follina vuln used by Russian actors, and a new version of Metasploit
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10
In this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss how Russian espionage actors are exploiting the Follina vulnerability, the release of the latest version of Metasploit, and a new phishing campaign that’s been underway on Facebook. We also discuss ransomware extensively, including what authorities were able to find when …
W
WIRED Security: News, Advice, and More


1
Conti's Attack Against Costa Rica Sparks a New Ransomware Era
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47
A pair of ransomware attacks crippled parts of the country—and rewrote the rules of cybercrime.
W
WSJ Tech News Briefing


1
Ransomware Groups Break Up Into Smaller Cells to Skirt Sanctions
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54
Hacking groups with ties to Russia are changing their approach to cyber attacks amid an increase in sanctions and pressure from U.S. law enforcement. WSJ Pro Cybersecurity reporter David Uberti joins host Zoe Thomas to discuss why the change in strategy is making it hard for hacking victims and Washington to say who is behind the attacks and how to…
C
Carolina Social Club


1
Episode 26 - Ransomware, Cannibalism, and Deserted Islands?!
1:15:46
1:15:46
Play later
Play later
Lists
Like
Liked
1:15:46
Eddie and Josh are on the mic tonight as we discuss a range of things, including how NOT to handle a ransomware attack, whether or not cannibals still call human meat "long pig", various actors and actresses, and who would eat who first on a deserted island. Yeah, it's a wild one, folks. Enjoy!
P
Paul's Security Weekly (Video-Only)


1
Charitable Ransomware, Year of Linux Malware, Follina MSDT, Twitter Fines, & Bounties - PSW #743
1:51:20
1:51:20
Play later
Play later
Lists
Like
Liked
1:51:20
This week in the Security News: Analyzing chat logs with Python, consumer reports for IoT, hypothetically BS, the year of the Linux desktop and the year of Linux malware are the same, do you trust Google to tell you open-source software is secure?, Twitter fines, WSL attack vector, Follina, UK Government still won't pay a bounty, and ransomware tha…
Original Article: Swamps Can Protect Against Climate Change, If We Only Let Them Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- It can be hell finding one’s way across an extensive boggy moor—the partially dry, rough ground and the absence of any landmarks let the eye rove helplessly into the …
S
SpyCast


1
“Intelligence & the World’s Largest Democracy” – Former Indian Intelligence Director Vikram Sood [from the vault]
59:12
59:12
Play later
Play later
Lists
Like
Liked
59:12
Summary Vikram Sood (Twitter, Blog) joins Andrew (Twitter; LinkedIn) to discuss intelligence in the world’s largest democracy. He was the chief of India’s Research & Analysis Wing (R&AW). What You’ll Learn Intelligence The intelligence landscape in India China, Pakistan, and the intelligence challenges in the region The founding and evolution of th…
Original Article: Roe’s Final Hours in One of America’s Largest Abortion Clinics Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- At seven o’clock on Friday morning, Ivy turned on the lights of the Houston Women’s Clinic, the largest abortion provider in the state, where she has worked as a supe…
S
SendToPod


1
Cocaine, class and me: everyone in this town takes drugs, all the time – they’re part of the civic culture
Original Article: Cocaine, class and me: everyone in this town takes drugs, all the time – they’re part of the civic culture Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- A man walks into a chicken shop. This sounds like the beginning of a joke. Perhaps it is. For 18 months, I have worked in …
Original Article: We’re Not Going Back to the Time Before Roe v. Wade. We’re Going Somewhere Worse Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- In the weeks since a draft of the Supreme Court’s decision in Dobbs v. Jackson Women’s Health Organization—a case about a Mississippi law that bans …
S
SendToPod


Original Article: Fatal Distraction: Forgetting a child in the backseat is a horrifying mistake. Is it a crime? Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- The defendant was an immense man, well over 300 pounds, but in the gravity of his sorrow and shame he seemed larger still. He hunched f…
A set of services for managing identity and access management, or IAM across all of an organization's data islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric Audio reference link: “Leadership Compass Identity Fabrics - Analyst Chat 126,” by KuppingerCole, YouTube, 30 May 2022.…
The Conti ransomware group appeared to be on ropes earlier this year when its internal chat logs went public –revealing the inner workings of a hacking cartel . Then, the gang surprised everyone by launching a cyber attack against Costa Rica aimed at overthrowing its government. Plus, what happens when a company actually wants to talk about being t…
W
WSJ Tech News Briefing


1
Do Kwon Tries Again After $40 Billion Crypto Crash
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01
Algorithmic stablecoin TerraUSD was supposed to maintain its value at $1 with the help of its sister-crypto, Luna. But TerraUSD’s price collapsed to pennies in May, while Luna plunged by more than 99%, wiping out around $40 billion in value. Their creator Do Kwon has been attempting a comeback by relaunching Luna. WSJ markets reporter Alexander Osi…
Original Article: Half Life: The Decay of Knowledge and What to Do About It - Farnam Street Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- Understanding the concept of a half-life will change what you read and how you invest your time. It will explain why our careers are increasingly specializ…
Original Article: Friction: The Hidden Force Holding You Back - Farnam Street Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- How is it that two people delivering the same value to organizational outcomes, in the same role at the same pay, can have a massively different value to the organizatio…
Original Article: Reducing Inflation Will Come at a Great Cost: Stagflation Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- For me, hearing supposed “experts” talk about what’s now happening in the markets and economy is like listening to nails scratch against a chalkboard because they are typi…
W
WIRED Security: News, Advice, and More


1
Here’s Why You’re Still Stuck in Robocall Hell
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44
Despite major progress fighting spam and scams, the roots of the problem go far deeper than your phone company’s defenses.
Yeah, we said it. We talk about the Supreme Court's decision to overturn Roe v Wade to kick off this episode because... wow. We also have a palate cleanser if you need one and we do dumb what if questions. Abort the Court.
C
Cybersecurity Today


1
Cyber Security Today, June 27, 2022 - A warning to firms using VoIP systems, malicious files in an open source Python registry, and more
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59
This episode reports on how a vulnerability in a VoIP system, nearly led to a ransomware attack, why files in open source registries should be handled with care, and a hacker is selling access to compromised Atlassian Confluence servers
W
WSJ Tech News Briefing


1
VR Tech to Combat Social Isolation Among Seniors
13:34
13:34
Play later
Play later
Lists
Like
Liked
13:34
To tackle social isolation among seniors, some caregivers have turned to virtual reality. One company developing that technology is Rendever. At The Wall Street Journal's recent Future of Everything Festival, personal tech columnist Nicole Nguyen spoke with Rendever’s co-founder and CEO about where this tech stands today and how it can be leveraged…
C
CyberWire Daily


1
Richard Melick: Finding the right pattern to solve the problem. [Threat reporting] [Career Notes]
9:11
9:11
Play later
Play later
Lists
Like
Liked
9:11
Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he's been in the business of solving unique cybersecurity problems for so long that he has found his own path that works very well for him. He says, "if I go to a unique problem and try to…
Today’s Soap Box guest is an industry legend – Metasploit creator HD Moore. He’s here to tell us more about what’s happening with his latest creation, Rumble Network Discovery. If you’re not familiar with Rumble, well, you should be. It’s a network scanner that you just set loose and it will go and find all the devices on your network. It has a fre…
C
CyberWire Daily


1
Lazarus Targets Chemical Sector With 'Dream Job.' [Research Saturday]
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17
Alan Neville, a Threat Intelligence Analyst from Symantec Broadcom, joins Dave to discuss their research "Lazarus Targets Chemical Sector." Symantec has observed the North Korea-linked threat group known as Lazarus conducting an espionage campaign targeting organizations operating within the chemical sector. The campaign appears to be a continuatio…
C
CyberWire Daily


1
Lithuania warns of DDoS. Some limited Russian success in cyber phases of its hybrid war. Spyware infestations in Italy and Kazakstan. Tabletop exercises. Ransomware as misdirection
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06
Lithuania's NKSC warns of increased DDoS threat. Limited Russian success in the cyber phases of its hybrid war. Another warning of spyware in use against targets in Italy and Kazakhstan. Hey, critical infrastructure operators: CISA’s got tabletop exercises for you. Kevin Magee from Microsoft has advice for recent grads. A look back the year since C…
C
Cybersecurity Today


1
Cyber Security Today, Week in Review for Friday, June 24, 2022
17:33
17:33
Play later
Play later
Lists
Like
Liked
17:33
This episode features a discussion on Cloudflare's service outage, a U.S. bank's discovery of a second cyber attack and moreBy ITWC
Original Article: The Code That Controls Your Money | Wealthsimple Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- Wealthsimple makes powerful financial tools to help you grow and manage your money. Learn more When Thomas first started programming, it was 1969. He was a kid just out of high sch…
Original Article: Bloomberg - Are you a robot? Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- Why did this happen? Please make sure your browser supports JavaScript and cookies and that you are not blocking them from loading. For more information you can review our Terms of Service and Cookie …
Original Article: Escape from Auschwitz: the most extraordinary Holocaust story you’ve never heard Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- Escape was lunacy, escape was death. To attempt it was suicide. That much had been taught to Walter Rosenberg early, within a week of his arrival in…
Original Article: To infinity and back: Inside Axie’s disastrous year Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- At 1 a.m. on March 29, Jiho Zirlin, a co-founder of the Vietnamese crypto gaming company Sky Mavis, received a text from his fellow co-founder Aleksander Larsen. Zirlin, who is …
T
The WIRED Podcast


1
The Almighty Squabble Over Who Gets to Name Microbes
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21
Coming up today: we speak to the people picking up the slack after their colleagues quit and get stuck into a messy argument about microbe names. The stories we talked about this week: The Almighty Squabble Over Who Gets to Name Microbes https://www.wired.com/story/microbe-names-fight/ They Quit. Now You're Picking Up the Slack https://www.wired.co…
W
WIRED Security: News, Advice, and More


1
Brave Now Lets You Customize Search Results—for Better or Worse
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37
The privacy-focused company's new Goggles tool allows users to weed out the noise—whatever that might mean.
B
BBC Learning English Drama


1
Frankenstein: Episode 4: Creature meets creator
7:20
7:20
Play later
Play later
Lists
Like
Liked
7:20
Viktor Frankenstein meets the Creature at last. Will they be friends or have a fight?By BBC Radio
Original Article: On the Etymologies and Linguistic Evolutions of “Family” Convert your long form article to podcast? Visit SendToPod Follow me on Twitter to find out more. ---- The etymology of a word isn’t necessarily interchangeable with the way the word is used by a culture. But looking at the etymology may reveal the meaning that went into the…
T
Tech Tent


1
The graphic content missed by Meta's moderators
22:58
22:58
Play later
Play later
Lists
Like
Liked
22:58
On Tech Tent this week, a BBC investigation into so-called "up-skirting" on Facebook - and Thomas Hughes from Meta's Oversight Board on its first year as an arbiter on disputes on Facebook and Meta. Dr Andrew Hundt on why AI mimicks the prejudice of human beings. Shiona McCallum has been to the Teen Tech awards. And Glastonbury Festival is back - w…
W
WSJ Tech News Briefing


1
Why Amazon’s CEO Is Working to Undo A Bezos-Led Overexpansion
13:40
13:40
Play later
Play later
Lists
Like
Liked
13:40
Andy Jassy took over as Amazon CEO nearly a year ago. Since then the company’s stock price has fallen, online shopping demand has shrunk and the e-commerce giant has been left with excess warehouse space. As a result, Jassy has been forced to reverse course on some initiatives started by founder Jeff Bezos. WSJ reporter Dana Mattioli joins host Zoe…
The latest edition of the ISMG Security Report investigates the reboot of ransomware group Conti, which supports Russia's invasion of Ukraine. It also discusses why paying ransomware actors is a "business decision" and how to respond to the talent shortage in the financial sector.By DataBreachToday.com
P
Paul's Security Weekly (Video-Only)


1
Plastic Bags, NSA Playsets, Megs Insecure, PHP Strikes Back, & Gamification - PSW #745
1:57:23
1:57:23
Play later
Play later
Lists
Like
Liked
1:57:23
In the Security News for this week: appliances with holes, gamification and its pitfalls, false rocket sirens, PHP strikes again, new laws we may actually agree with, hacking jacuzzis, Icefall and the state of ICS security, Adobe is blocking anti-virus, Mega is Mega insecure, Microcorruption CTF and DIY NSA playset! Visit https://www.securityweekly…
C
CyberWire Daily


1
Reviewing Russian cyber campaigns in the war against Ukraine. Ukraine's IT Army is a complex phenomenon. Take ICEFALL seriously. CISA has updated its cloud security guidance.
29:12
29:12
Play later
Play later
Lists
Like
Liked
29:12
Reviewing Russian cyber campaigns in the war against Ukraine, and the complexity of Ukraine's IT Army. ICEFALL advice and reactions. Carole Theriault looks at Hollywood’s relationship with VPNs. Podcast partner Robert M. Lee from Dragos provides a rundown on Pipedream. And CISA updates its Cloud Security Technical Reference Architecture. For links …
The Good Girl Syndrome is a mindset imposed on girls and women to the detriment of their sense of Self, success and overall well-being. It is masked as socially acceptable norms - from behaviour to presentation and how to interact amongst others, to name a few. Often girls are told not to climb trees or to sit in a less suggestive manner because it…