Deception, influence, and social engineering in the world of cyber crime.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. If you want more stories like Click Her ...
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
Your occasional dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
Hosted by former covert CIA intelligence officer Andrew Bustamante, Everyday Espionage gives you practical, powerful spy skills you can use to get ahead in your everyday life.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
B
Black Hills Information Security


1
Black Hills Information Security
Black Hills Information Security
Penetration testing for Fortune 50 companies since 2008.
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
D
Digital Forensic Survival Podcast


1
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
Hackers
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
T
The Azure Security Podcast


1
The Azure Security Podcast
Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2022 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec


1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
The State and Popular Culture
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
T
To The Point - Cybersecurity


1
To The Point - Cybersecurity
Forcepoint | Global Cybersecurity Leader | Security. Simplified.
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government and world at large.
Just two people trying to do IT and Security the right way.
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Produced with the support of Policy Forum. Hosted on Acast. See acast.com/privacy for more information.
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
B
Brakeing Down Security Podcast


1
Brakeing Down Security Podcast
Bryan Brake, Amanda Berlin, Brian Boettcher
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
A podcast about security for developers, covering tools and best practices.
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
A Podcast on Computer Security & Privacy for Non-Techies
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Larry and Kerry talk about parenting issues during Covid-19 isolation period
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
S
ShadowTalk Threat Intelligence by Digital Shadows


1
ShadowTalk Threat Intelligence by Digital Shadows
Digital Shadows
Digital Shadows' ShadowTalk discusses the latest threat intelligence and cybersecurity news with our panel of threat intelligence experts, security engineers, security researchers, and more.
W
WIRED Security: News, Advice, and More


1
Congress Has a Lo-Fi Plan to Fix the Classified Documents Mess
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30
As unsecured docs pile up, a bipartisan group of lawmakers is itching to overhaul the nation’s secret secret-sharing operation.
C
Cybersecurity Today


1
Cyber Security Today, Feb. 8, 2023 - Toyota supplier website hacked, ransomware gang partner pleads guilty, and more
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49
This episode reports on ransomware, supply chain attacks and the latest consumer scamsBy ITWC
C
Cyber Security Headlines


1
Tech firms race to integrate AI, FAA needs until 2030 to fix safety system, Biden addresses children’s online safety
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29
ARMO, Microsoft, Google race to integrate AI into their products FAA needs until 2030 to fix its safety system Biden’s State of the Union addresses children’s online safety and privacy… again Thanks to today's episode sponsor, US, yes, CISO Series "I value Cyber Security Headlines early every morning as it provides me advance notice of what I might…
S
Security Now (Audio)


1
SN 909: How ESXi Fell - EU Internet Surveillance, QNAP returns, .DEV is always HTTPS
2:13:05
2:13:05
Play later
Play later
Lists
Like
Liked
2:13:05
Picture of the Week. The European Union's Internet Surveillance Proposal. 30,000 patient records online? .DEV is always HTTPS! Google changes Chrome's release strategy. Russia shoots the messenger. A fool and his Crypto... QNAP is back. CVSS severity discrepancy. Closing the Loop. How ESXi Fell. Show Notes: https://www.grc.com/sn/SN-909-Notes.pdf H…
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
ISC StormCast for Wednesday, February 8th, 2023
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32
A Survey of Bluetooth Vulnerabilities Trends https://isc.sans.edu/diary/A%20Survey%20of%20Bluetooth%20Vulnerabilities%20Trends%20%282023%20Edition%29/29522 OpenSSL Vulnerabilities / Patches https://www.openssl.org/news/secadv/20230207.txt Packet Tuesday: Most Frequent DNS Query ID / DNS Notify https://www.youtube.com/watch?v=QgCuE_zKyMY GoAnywhere …
P
Paul's Security Weekly


1
SWN #272 - Chinese Androids, ERNIE, Bard, Fortra, Sunlogin, Dingo, Google, Jason Wood, and More
33:46
33:46
Play later
Play later
Lists
Like
Liked
33:46
Chat-GPT fails, Ernie, Bard, Chinese Androids, Fortra, Sunlogin, Dingo Token, Google Ads, Jason Wood and More on this edition of Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: …
This week on the podcast we cover the Common Vulnerability Scoring System (CVSS) including how it works and some of its limitations. Before that though, we discuss a recent survey on the risks of ChatGPT's usage in cyberattacks and the latest activity from Lazarus, the North Korean government hacking operation.…
7
7 Minute Security


1
7MS #558: How to Build a Vulnerable Pentest Lab - Part 2
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04
Today we continue part 2 of a series we started a few weeks ago all about building a vulnerable pentesting lab. Check out the video above, and here are the main snippets of code and tips to get you going: Use Youzer to import a bunch of bogus users into your Active Directory: sudo python ./youzer.py --generate --generate_length 20 --ou "ou=Contract…
N
Naked Security Podcast


1
S3 Special: Tracers in the Dark with Andy Greenberg
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40
Do we really need a "war against cryptography" - codes and ciphers that the government can easily crack if it thinks there's an emergency - to cement our collective online security?Hear renowned cybersecurity author Andy Greenberg's thoughtful commentary on this and many other vital issues, including anonymity and privacy, as we talk to him about h…
T
The Secure Developer


1
Ep. 126 What is Software Supply Chain Security and why it is important?
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38
In this episode we are defining the key pillars of software supply chain security. This episode is part 1 of a 4 part software supply chain series where our hosts Guy Podjarny and Simon Maple combine their analysis of this space of supply chain security with a series of interviews that we’ve had a chance to do with other supply chain security exper…
By Jerry Bell and Andrew Kalat
C
Cyber Security Weekly Podcast


DigiCert, Inc., a leading global provider of digital trust, have releases DigiCert® Trust Lifecycle Manager, a comprehensive digital trust solution unifying CA-agnostic certificate management and public key infrastructure (PKI) services. Trust Lifecycle Manager tightly integrates with DigiCert’s best-in-class public trust issuance for a full-stack …
C
CyberWire Daily


1
Yasmin Abdi: Find your community. [Security Engineer] [Career Notes]
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58
Yasmin Abdi, a Security Engineering Manager at Snapchat and the CEO and Founder of NoHack, sits down to share her story on how she got to be in her amazing current roles. From a young age, Yasmin was fascinated by the overlap of cybersecurity and crime and law. In her time in college, she was able to intern at big tech companies like Snapchat, Goog…
B
Black Hills Information Security


1
Talkin’ About Infosec News – 2/3/2023
1:00:55
1:00:55
Play later
Play later
Lists
Like
Liked
1:00:55
00:00 – PreShow Banter™ — Woke Up Like This03:20 – BHIS – Talkin’ Bout [infosec] News 2023-01-3005:04 – Story # 1: GoTo says hackers stole customers’ backups and encryption keyhttps://www.bleepingcomputer.com/news/security/goto-says-hackers-stole-customers-backups-and-encryption-key/09:48 […] The post Talkin’ About Infosec News – 2/3/2023 appeared …
T
The Azure Security Podcast


1
Episode 69: Secured Supply Chain and Software Bill of Materials (SBOM)
27:20
27:20
Play later
Play later
Lists
Like
Liked
27:20
In this episode, Michael and Mark talk to Adrian Diglio about Software Bill of Materials and its role in helping secure the software supply chain. We also have news items about SQL Server, Azure SQL DB, Azure Database for PostgreSQL, Azure Database for MySQL and Application Secure Groups and Private Endpoints. Mark goes over MCRA, Immutable Laws of…
I
ISACA Podcast


1
ISACA Live_Critical Infrastructure Security
26:48
26:48
Play later
Play later
Lists
Like
Liked
26:48
ISACA's Chris Dimitriadis and the US GAO's Nick Marinos discuss the current state of critical infrastructure security, escalating threats and how to better prepare. For more information check out www.isaca.org/heightened-threatsBy ISACA Podcast
Willie Hicks, Federal Chief Technologist from Dynatrace, sits down to discuss accelerated adoption and use of secure cloud infrastructure and services by the federal government. Ben’s story is on a new academic paper on the terms of service documents provided by different internet providers, and whether they alter Fourth Amendment rights. Dave disc…
T
The National Security Podcast


1
National resilience in a changing world: lessons from Europe
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39
In this episode of the National Security Podcast, Sweden’s Ambassador to Australia His Excellency Mr Pontus Melander and Latvia’s Ambassador to Australia His Excellency Mr Marģers Krams join Dr Will Stoltz in conversation. They discuss how their countries approach building national resilience in response to a range of complex conventional and hybri…
S
Smashing Security


1
ChatGPT and the Minister for Foreign Affairs
52:48
52:48
Play later
Play later
Lists
Like
Liked
52:48
Could a senior Latvian politician really be responsible for scamming hundreds of "mothers-of-two" in the UK? (Probably not, despite Graham's theories...) And should we be getting worried about the AI wonder that is ChatGPT? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham C…
S
Security Management Highlights


1
February 2023: Robbery Recovery, Reputation Risks, and Supply Chain Upsets
32:51
32:51
Play later
Play later
Lists
Like
Liked
32:51
How can security teams help support employees’ mental health and resilience following a major incident, such as a bank robbery? Brian Ishikawa, CPP, from the Bank of Hawaii, walks us through how training, documents, and procedures clear the way for recovery. Michael Gips, CPP, joins the SM Highlights podcast to discuss how reputational issues cross…
In this episode, I discuss the latest Privacy & Security news, and present several new OSINT Techniques.Direct support for this podcast comes from our privacy services, online training, and new book for 2023 Open Source Intelligence Techniques (10th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free.…
B
Brakeing Down Security Podcast


1
Layoff discussions, another TMO breach, OneNote Malware, and more!
1:23:04
1:23:04
Play later
Play later
Lists
Like
Liked
1:23:04
Lots of Layoffs (meta, Microsoft, Amazon, Sophos, Alphabet, Google) talk about the future effects of that, did it affect security? Attack surface management is risk management, Breaches and the TSA no-fly list leaked, and more! Full youtube video: https://www.youtube.com/watch?v=1Dgq8FpnWPw Questions and/or potential sub-topics (5 minimum): Layoffs…
Seth and Ken dig into a topic that was raised by a member of our Slack community. The initial half of the show reviews both the risks and dynamic or static review items associated with microservices. This is followed by a discussion that starts by asking the question "what are the must-have security features for a web application?"…
T
To The Point - Cybersecurity


1
StateRAMP: The Easy Button for Security Innovation with Joe Bielawski and Leah McGrath
45:35
45:35
Play later
Play later
Lists
Like
Liked
45:35
Joining us on the podcast this week is Joe Bielawski – founding member of StateRAMP and President of Knowledge Services – as well as StateRamp Executive Director Leah McGrath. If the name sounds somewhat familiar – like FedRAMP – it should because StateRAMP helps to meet the growing need in state and local government to manage third party risk and …
C
Cyber Work


1
ISACA CISM changes: Less focus on management, more on security | Cyber Work Hacks
11:20
11:20
Play later
Play later
Lists
Like
Liked
11:20
Infosec Skills author Leighton Johnson talks about major changes to CISM in 2022. CISM has shifted qualitatively from the “Manager” side of the cert name to the “Security” side. 0:00 - Changes to CISM's focus 2:21 - Why did CISM's focus change? 3:43 - How to study for the new CISM changes 6:47 - Important CISM skills to know 8:28 - Find Leighton Jo…
S
Security Conversations


1
Paul Roberts on wins and losses in the 'right to repair' battle
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32
Episode sponsors: Binarly (https://binarly.io) FwHunt (https://fwhunt.run) SecuRepairs.org co-founder Paul Roberts joins the show to discuss his passion for the right to repair consumer electronic devices, the big-ticket lobbyists working to undermine the movement, and how changing consumer spending patterns are helping to rack up regulatory wins. …
All links and images for this episode can be found on CISO Series. "When the asset discovery market launched, every single company that offered a solution used the line, “You can’t protect what you don’t know.” Everyone agreed with that. Problem is, “what you don’t know” has grown… a lot." Check out this post for the discussion that is the basis of…