Information Security 公開
[search 0]
もっと

Download the App!

show episodes
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Pwned is a weekly information and cyber security podcast addressing real-world security challenges. Occasionally funny, always informational, and driven by those who live and breathe security. Each episode we dive into the latest and greatest in technology, security frameworks, best practices, and how-tos. We’ll chat with industry leaders to learn how they got to where they are, what they see coming, and how they learned from their mistakes.
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
BASIC is the only peace and security non-governmental organization that is British-American in composition and focus. With programs that address diplomacy and decision-making around nuclear weapons, we work on both sides of the Atlantic to encourage sustainable transatlantic security policies and to develop the strategies that can achieve them. We have charitable status in the United Kingdom and in the United States. We operate with offices in London and Washington, a small but committed sta ...
 
Eurotrash Security Podcast is a European focused information security podcast designed as a counterpoint to the myriad of North American infoSec podcasts present in the industry. Eurotrash is a technical podcast with a casual atmosphere (and often a tint of the NSFW). ** Several episodes are missing from the listing here due to copyright reasons. These can be access using the "Old Skool Eurotrash Episodes" link
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Crypto-Gram is a free monthly e-mail newsletter from security expert Bruce Schneier, with over 100,000 readers. Each issue is filled with interesting commentary, pointed critique, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news. This is the audio version of the Crypto-Gram Newsletter, and is read by Dan Henage.
 
A weekly conversation on cybersecurity law and policy, surveillance and digital privacy. Hosted by the CyberWire's Dave Bittner and Ben Yelin from the University of Maryland Center for Health and Homeland Security. They break down important current legal cases, policy battles, and regulatory matters along with the news headlines that matter most. It’s not just a podcast for lawyers and policymakers; security professionals, businesses, and anyone concerned about privacy and security in the di ...
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
 
If you want to learn building automation then you are in the right place. My name is Phil Zito and I am the CEO of Smart Buildings Academy. If you are a technician, operator, salesperson, or engineer the Smart Buildings Academy podcast is for you. Each week I tap into my vast experience in Building Automation and teach you the things no one else teaches. You will learn about BAS, HVAC, IT, Energy Management, Sales, Operations, Project Management, Cyber Security and so much more. Prior to fou ...
 
Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organ ...
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
 
The series: The “What Turns You On” COGA Energy podcast series, presented by CH2M, will introduce listeners to the men and women of the oil and gas industry and inform them of how oil and gas is changing the economic and national security future of the world. It will also explore how COGA is engaging with its neighbors and communities, why regulations and politics matter, and how the industry’s innovation represents a new frontier.
 
FactFruit is a U.S. focused daily news show that brings you the top stories and information without the political noise. Leading news stories are followed by discussions with guests who are experts in their industries. Our guests are not political pundits or talking heads whose agenda is to politically sway the listener, but rather, discussions are focused on how things work. New technology, how congressional committees function, cyber security, events leading to foreign conflict, and how st ...
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand. We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can kno ...
 
Each week we provide tech lessons, answer questions, and bring you interviews of the most successful engineers and thought leaders working in the IT space across technologies like datacenter, virtualization, cloud, networking, collaboration, and cyber security. Listen in as you will gain insights, strategies, tips and more to help you level up along your journey in becoming a Rockstar SE!
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
 
Loading …
show series
 
A few short years ago, penetration testers did not have to work too hard for their malware command channels to execute. Fast forward to today in the age of Endpoint Detection and Response, User Behavior Analytics, and advanced built-in O/S defenses, your standard toolkit for malware generation/execution does not work anymore. All is not lost! […] T…
 
Scans for DNS over HTTPs https://isc.sans.edu/forums/diary/Obfuscated+DNS+Queries/26992/ https://us-cert.cisa.gov/ncas/current-activity/2021/01/15/nsa-releases-guidance-encrypted-dns-enterprise-environments Netlogon Domain Controller Enforcement Mode Starting February 9th https://msrc-blog.microsoft.com/2021/01/14/netlogon-domain-controller-enforce…
 
The latest edition of the ISMG Security Report describes new details emerging from the SolarWinds supply chain hack investigation. Also featured: A discussion of why security education is so crucial in 2021 and tips on how to retain security and operations center analysts.CUInfoSecurity.com による
 
Thanks to Brad, FRSecure is now an official CMMC Registered Provider Organization (RPO). Given this, and the requirements beginning to trickle out to DoD service providers and supply chain, he and Evan chat about the upcoming requirements. Tune in to episode 114 to get an idea of what it looks like, what FRSecure is going to do for it, and what you…
 
Geez, I guess nothing is off limits. Vastaamo was first breached in 2018, but this…just…keeps…going. Vastaamo has been requested by attackers to pay half a million USD in Bitcoin. But to make it worse employees and patients are also targets of extortion. Check out NuHarbor Security for complete cybersecurity protection for your business and a secur…
 
Hey friends! We're continuing our series on pentest dropbox building - specifically playing off last week's episode where we started talking about automating the OS builds that go on our dropboxes. Today we'll zoom in a little closer and talk about some of the specific scripting we do to get a Windows 2019 Active Directory Domain Controller install…
 
The latest edition of the ISMG Security Report describes new details emerging from the SolarWinds supply chain hack investigation. Also featured: A discussion of why security education is so crucial in 2021 and tips on how to retain SOC analysts.HealthcareInfoSecurity.com による
 
The latest edition of the ISMG Security Report describes new details emerging from the SolarWinds supply chain hack investigation. Also featured: A discussion of why security education is so crucial in 2021 and tips on how to retain SOC analysts.BankInfoSecurity.com による
 
The latest edition of the ISMG Security Report describes new details emerging from the SolarWinds supply chain hack investigation. Also featured: A discussion of why security education is so crucial in 2021 and tips on how to retain security and operations center analysts.GovInfoSecurity.com による
 
The latest edition of the ISMG Security Report describes new details emerging from the SolarWinds supply chain hack investigation. Also featured: A discussion of why security education is so crucial in 2021 and tips on how to retain security and operations center analysts.CareersInfoSecurity.com による
 
Dynamically Analzying A Heavily Obfuscted Excel 4 Macro Malicious File https://isc.sans.edu/forums/diary/Dynamically+analyzing+a+heavily+obfuscated+Excel+4+macro+malicious+file/26986/ Odd Filename Corrupts NTFS Disks https://twitter.com/jonasLyk/status/1347900440000811010 Cisco Vulnerabilities https://tools.cisco.com/security/center/publicationList…
 
Originally aired on January 13, 2021 Articles discussed in this episode: https://www.theregister.com/2021/01/13/darkmarket_europol_shutdown/ https://www.theregister.com/2021/01/12/microsoft_linux_edr/ https://threatpost.com/mimecast-certificate-microsoft-supply-chain-attack/162965/ https://threatpost.com/hackers-leak-pfizer-covid-19-vaccine-data/16…
 
Hancitor Activity Resumes After a Holiday Break https://isc.sans.edu/forums/diary/Hancitor+activity+resumes+after+a+hoilday+break/26980/ Intel Hardware-Enabled Ransomware Protections https://www.cybereason.com/blog/cybereason-and-intel-introduce-hardware-enabled-ransomware-protections-for-businesses Making Clouds Rain: RCE in Microsoft Office 365 h…
 
Yan Grinshtein is an HCI and accessibility certified human-centered design leader, speaker, and mentor. Currently the head of design at HYPR, Yan has over 20 years of experience as a creative and design leader. He has worked on three different continents across four countries with companies ranging from Fortune 500 to startups, some of which have b…
 
On this week’s show, we've got Dave's conversation with David Forscey with the Aspen Institute on their new Cybersecurity Collaborative Network, Ben shares why we were late getting started recording Caveat for 2021, Ben's story covers the ongoing issues with facial recognition software, and Dave has the story of California upholding restrictions on…
 
MSFT January 2021 Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+January+2021+Patch+Tuesday/26978/ Adobe Patches https://helpx.adobe.com/security.html MimeCast Cert Stolen https://www.mimecast.com/blog/important-update-from-mimecast/ Leaking Silhouettes of Cross-Origin Images https://blog.mozilla.org/attack-and-defense/2021/01/11/leaking…
 
Dream Doxxed: Minecraft YouTuber Dream Doxxed Following Speedrun Controversy (screenrant.com) Def Noodles on Twitter: "STANS TAKING IT TOO FAR: Dream doxed after posting a picture of his kitchen on his 2nd Twitter account. Dream has not published statement about situation yet in his public accounts. https://t.co/QuKpIYRODQ" / Twitter Osint issues… …
 
Using the NVD Database API Part 3/3 https://isc.sans.edu/forums/diary/Using+the+NVD+Database+and+API+to+Keep+Up+with+Vulnerabilities+and+Patches+Tool+Drop+CVEScan+Part+3+of+3/26974/ Sysinternals Update https://docs.microsoft.com/en-us/sysinternals/ Ubiquiti Breach https://www.bleepingcomputer.com/news/security/networking-giant-ubiquiti-alerts-custo…
 
The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.CUInfoSecurity.com による
 
The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.HealthcareInfoSecurity.com による
 
The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.BankInfoSecurity.com による
 
The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.GovInfoSecurity.com による
 
The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.CareersInfoSecurity.com による
 
Amanda Berlin is the Lead Incident Detection Engineer for Blumira and the CEO and owner of the nonprofit corporation Mental Health Hackers. She is the author of a Blue Team best practices book called "Defensive Security Handbook: Best Practices for Securing Infrastructure” with Lee Brotherston through O'Reilly Media. She is a co-host on the Brakein…
 
Have you been struggling to troubleshoot building automation, HVAC, and IT systems? If so you're not alone. In this episode of the Smart Buildings Academy Podcast, we discuss how to effortlessly troubleshoot systems. In this episode you will learn: Our three-step troubleshooting process How to troubleshoot terminal units Server and network troubles…
 
Maldoc Strings Analysis https://isc.sans.edu/forums/diary/Maldoc+Strings+Analysis/26966/ CVSS Reliablity Survey https://user-surveys.cs.fau.de/index.php?r=survey/index&sid=248857 Fake Trump Video Malware https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/updated-qnode-rat-downloader-distributed-as-trump-video-scandal/ SMS Phishing (Smi…
 
This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends.HealthcareInfoSecurity.com による
 
This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends.BankInfoSecurity.com による
 
This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends.GovInfoSecurity.com による
 
This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends.CareersInfoSecurity.com による
 
This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends.CUInfoSecurity.com による
 
Using the NIST Database and API to Keep Up with Vulnerabilities https://isc.sans.edu/forums/diary/Using+the+NIST+Database+and+API+to+Keep+Up+with+Vulnerabilities+and+Patches+Part+1+of+3/26958/ Titan Security Key https://ninjalab.io/wp-content/uploads/2021/01/a_side_journey_to_titan.pdf The Great Suspender Google Chrome Extension https://www.theregi…
 
Happy new year! This episode continues our series on DIY pentest dropboxes with a focus on automation - specifically as it relates to automating the build of Windows 10, Windows Server 2019, Kali and Ubuntu VMs. Here's the resources I talk about in more detail on today's episode that helps make the automagic happen: Windows VMs This article from Wi…
 
Based on cyber insurance claims they file, small and midsized vendors potentially pose substantial security risks, so their customers should make them a third-party risk management priority, says consultant Mark Johnson, a former healthcare CISO.HealthcareInfoSecurity.com による
 
Based on cyber insurance claims they file, small and midsized vendors potentially pose substantial security risks, so their customers should make them a third-party risk management priority, says consultant Mark Johnson, a former healthcare CISO.CareersInfoSecurity.com による
 
Zyxel Exploitation Under Way https://isc.sans.edu/forums/diary/Scans+for+Zyxel+Backdoors+are+Commencing/26954/ Fortinet Patches https://www.fortiguard.com/psirt?date=01-2021 Foxit PhantomPDF Patches https://www.foxitsoftware.com/support/security-bulletins.html Firefox Android Updates https://www.mozilla.org/en-US/security/advisories/mfsa2021-01/…
 
Christian Rohrer is Senior Director, User Experience at McAfee, returning to the company after a 5-year hiatus during which he was Founder and Principal at XD Strategy, a UX strategy consultancy, and former Vice President of Design, Research and Enterprise Services at Capital One. He has also led UX teams at Realtor.com, eBay, and Yahoo!. Christian…
 
Ben shares a story about dressing for privacy, Dave has the tale of location data putting an innocent man at the scene of a crime, and later in the show our interview with Admiral James Stavridis. He is the former Supreme Allied Commander of NATO. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal …
 
Netfox Detective: An Alternative Open-Source Packet Analysis Tool https://isc.sans.edu/forums/diary/Netfox+Detective+An+Alternative+OpenSource+Packet+Analysis+Tool/26950/ ElectroRAT Drains Cryptocurrency Accounts https://www.intezer.com/blog/research/operation-ElectroRAT-attacker-creates-fake-companies-to-drain-your-crypto-wallets/ Chrome Will Pref…
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login