Security 公開
[search 0]
もっと

Download the App!

show episodes
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
P
Paul's Security Weekly

1
Paul's Security Weekly

paul@securityweekly.com

Unsubscribe
Unsubscribe
ウィークリー+
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
G
Global Security Briefing

1
Global Security Briefing

The Royal United Services Institute

Unsubscribe
Unsubscribe
月ごとの+
 
Global Security Briefing provides regular insights from leading international experts to help you make sense of the far-reaching changes affecting international security around the globe. Hosted by analysts from RUSI's International Security Studies team, the podcast looks at how the UK can best shape its foreign and security policies in an increasingly dynamic international environment.
 
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
 
T
The Azure Security Podcast

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

Unsubscribe
Unsubscribe
月ごとの+
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2022 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
 
S
Smashing Security

1
Smashing Security

Graham Cluley, Carole Theriault

Unsubscribe
Unsubscribe
ウィークリー
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
 
With the powers of enhanced vision (a.k.a. glasses) and impervious buns, Jim and A.Ron have teamed up to form the Department of Homelander Security, the only podcast dedicated to doing whatever it takes to monitor the notorious "supe" called Homelander in an effort to keep the public informed and safe. Join us each week immediately after the episode for a recap and analysis of Amazon's streaming hit, The Boys.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
 
This podcast series is brought to you by Lookout – the leader in mobile security. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
 
C
Cloud Security Podcast

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
ウィークリー
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
 
Security Today is a podcast centered around physical security and the security industry. From articles to philosophies to trending topics, Baer leads you down the info hole of Security Today. @securitybaer on IG and Twitter @securitytodaypodcast on IG Support this podcast: https://anchor.fm/security-today/support
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Loading …
show series
 
The Digital Supply Chain is broken and getting challenging to fix. In this "What to LookOut for in 2022" series - we interviewed experts at RSA and BSidesSF on the Broken Digital Supply Chain and ways in which we can fix it. Watch the video for this episode on You Tube - Fix the Broken Digital Supply Chain Episode ShowNotes, Links and Transcript on…
 
Over the past year, we’ve seen more buzz develop around attack surface management. In fact, major analyst firms Forrester and Gartner recently released research about this topic. But what exactly is it? In this segment, join Mark St. John, LookingGlass’s SVP of Product, to learn more about how to define your attack surface, how to manage it, and ho…
 
Overview From the deep-web to encryption we decode more cybersecurity buzzwords,plus we cover security updates for Squid, Vim, the Linux kernel, curl andmore. This week in Ubuntu Security Updates 16 unique CVEs addressed [USN-5491-1] Squid vulnerability [00:29] 1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 …
 
This week in the Security News Dr. Doug talks: Ant-Man Anal Attack, IOTAPTs, OpenSea, Microsoft, Jenkins, SFC, and Zuorat, as well as all the show Wrap Ups from this week! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn221
 
OT security has been at the center of the security conversation ever since the Colonial Pipeline attacks. Scott Flower, the founder of Pareto Cyber and a former global intelligence officer at FS-ISAC, discusses the challenges in OT security and where the industry needs to go.BankInfoSecurity.com による
 
This week I discuss the California CCW leak, release the latest issue of UNREDACTED Magazine, and answer several listeners' Linux questions.Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be…
 
Rory Meikle hosts this episode of Security Confidential with Erika Carrara. Erika is an influential, strategic, business-focused, and highly accomplished C-Suite executive. She has accomplished many things such as being a CISO, Director of Information Technology, Penetration Tester, an IT Security Specialist, and many more. Erika is also a Veteran …
 
In today's episode we talk about Purple Knight, a free tool to help assess your organization's Active Directory security. I stuck Purple Knight in our Light Pentest LITE pentest training lab and did an informal compare-and-contrast of its detection capabilities versus PingCastle, which we talked about in depth in episode #489.…
 
A critical look at how the US military is weaponizing technology and data for new kinds of warfare—and why we must resist. War Virtually: The Quest to Automate Conflict, Militarize Data, and Predict the Future (University of California Press, 2022) is the story of how scientists, programmers, and engineers are racing to develop data-driven technolo…
 
A new sophisticated malware is attacking SOHO routers New study shows over half of employees use prohibited apps Google battles bots, puts Workspace admins on alert Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to …
 
Case Study: Cobalt Strike Server Lives on After its Domain is Suspended https://isc.sans.edu/forums/diary/Case+Study+Cobalt+Strike+Server+Lives+on+After+Its+Domain+Is+Suspended/28804/ CVE-2022-28219: Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit Plus https://www.horizon3.ai/red-team-blog-cve-2022-28219/ CWE Top 25 Update …
 
What happens when you cross demented nursery rhymes and Empire Strikes Back? This episode of The Boys. With the members of the show living out different plot lines, it doesn’t quite feel like the boys are back in town. But that doesn’t stop the classic “Boys” antics of beating the living daylights out of each other. We’re seeing great characterizat…
 
In the Security News for this week: ICS training bill, 5 myths, VoIP devices and ransomware, miracle exploits, UnRAR and Zimbra, guess what the most common weakness is, security at the device level is NOT simple, keys to the kingdom, and HP says Destructive firmware attacks pose a significant threat to businesses! Visit https://www.securityweekly.c…
 
Why are supply chains increasingly vulnerable? Why are current security approaches not working? We sit down with Ev Kontsevoy, CEO and co-founder of Teleport, to discuss this complex problem, as well as how securing machine-to-machine communication can help keep supply chains safe.
 
Cybersecurity challenges are moving at cloud speed and leaving legacy approaches in the dust. On this week’s episode, host Hank Schless is joined by Ramy Houssaini, head of privacy and cyber risk at BNP Paribas, to discuss the top security considerations CISOs should be aware of in this rapidly changing security environment. --- Send in a voice mes…
 
In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman are joined by Symantec threat researcher Chris Kiefer to discuss our latest blog about the Bumblebee loader. We discuss this new malware’s place on the cyber crime landscape, its capabilities, and how it is being leveraged by ransomware actors. We also discuss the appearance of n…
 
ORIGINALLY AIRED ON JUNE 27, 2022 Articles discussed in this episode: 02:13 – Story # 1: The #1 Period Tracker on the App Store Will Hand Over Data Without a […] The post Talkin’ About Infosec News – 6/27/2022 appeared first on Black Hills Information Security.Black Hills Information Security による
 
Teslas, Ransomware und ethische Bedenken Security-Insider Podcast - Folge 56: Bot oder Bürgermeister Teslas, Ransomware und ethische Bedenken Die aktuelle Ausgabe des Security-Insider Podcast steckt wieder voller spannender Themen rund um Deep Fakes, Ransomware, den Datenschutz und vieles mehr. Zudem begrüßen wir Fachautor und IT-Consultant Götz Gü…
 
Während ich noch jedes Wort handverlesen in die Google Suchmaschine tippe, nutzen vermeintlich weniger digital native Menschen diese Dienste bereits mit natürlicher Sprache. Und kommen damit weiter, als ich es aktuell in manchen Science-Fiction-Romanen lese. Ganzer Beitrag mit allen Links: https://rz10.de/1-noch/perspektive-sap-it-juni-2022/ Viel S…
 
In this episode of the National Security Podcast, we bring you the fifth instalment of the Women in National Security mini-series, produced in collaboration with Accenture. In this episode of the National Security Podcast, hosts Gai Brodtmann, National Security College Futures Council member, and Meg Tapia, Principal Director for Defence and Nation…
 
Memories of the iPhone 1. Sextortion scams target LGBTQ+ daters. Yet another blockchain blunder. OpenSSL fixes the bug missed in the last bugfix. And what became of Little Bobby Tables?https://nakedsecurity.sophos.com/ftc-warns-of-lgbtq-extortion-scamshttps://nakedsecurity.sophos.com/harmony-blockchain-loses-nearly-100mhttps://nakedsecurity.sophos.…
 
A new version of the LockBit ransomware offers a bug bounty, women uninstall period-tracking apps in fear of how their data might be used against them, and Microsoft's facial recognition tech no longer wants to know how you're feeling. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer secu…
 
Look, this one get's a lil explicit. When your ole' unc starts gabber jawing about HIK he sounds like he's a bigoted 80yo man. But push past that because @securitybaer is here to help you. Baer goes over shorts, opens and grounds. Trying to help those who are newer to the game with a little bit of immediate deterrence highlight and like I said some…
 
This week, Alan, Quinta, and Scott were joined by star New York Times reporter Katie Benner to talk through some of this week's biggest national security news stories, including: “The Masked Ringer.” We’re about half way through the Jan. 6 committee’s public hearings—and, despite originally planning a weeks-long pause, the committee is now holding …
 
This episode considers the agenda for the NATO Madrid Summit as the organisation faces an unprecedented challenge in responding to the war against Ukraine and the wider threats that Russia, as well as China, present to the Alliance. In this episode, Dr Thierry Tardy, Director of the Research Division at the NATO Defence College, discusses with Dr N…
 
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing T…
 
Prologue As some of you know, I've been either in the AppSec space, or adjacent, since the fairly early days. I built a program at GE a million years ago, and worked selling dynamic web app testing software for many years. If you've been in the space, you can feel a little bit hopeless with all the different options, tools, and advice only to look …
 
Guests: Dave “Merk” Merkel, CEO @ Expel Peter Silberman, CTO @ Expel Topics: Many MDRs claim to be “security from the cloud”, but they actually don’t know much about cloud security. What does good looks like for MDR in the cloud (cloud being a full range from IaaS to SaaS)? What are the key challenges for clients picking an MDR for their cloud envi…
 
Unfair über die Seitenlinie Van-Eck-Phreaking GPG RSA-Schlüssel aus der Ferne mit dem Mobiltelefon rekonstruieren Abhören mittels Lampenflackern OpenSSL Fehlermeldungen ermöglichen Seitenkanalangriffe XBox360 Glitch Hack Meltdown und Spectre Spectre mittels JavaScript String-Vergleich gegen Timing-Angriffe härten INNOQ Security Podcast: Passwörter …
 
Zero trust vs. castle and the moat What does zero trust have to do with electric cars? For this episode, Robby is joined by Tony Fergusson CISO – EMEA at Zscaler. Tony has more than 25 years of experience in IT networking and security in Manufacturing, Information Technology and Financial Services, and even more importantly, he loves talking about …
 
Developers want bug-free code -- it frees up their time and is easier to maintain. They want secure code for the same reasons. Matias Madou joins to talk about how the definition of secure coding varies among developers and appsec teams, why it's important to understand those perspectives, and how training is just one step towards building a securi…
 
Interview Links Follow Steve on Twitter, and give the SpiderFoot official account a follow while you’re at it. Check out the SpiderFoot website and GitHub page, and learn more about the SaaS version, SpiderFoot HX. Learn about the latest SpiderFoot 4.0 release with YAML correlation rules. Read Steve’s blog, especially his posts on the 10 years deve…
 
In this week’s special episode, Dr. Heather Monthie sits down with Lester Godsey, CISO of Maricopa County, Arizona. Lester begins by explaining how he got into the cybersecurity field and shares a fun fact about himself. He then shares his role as a CISO, how security supports different departments, and the biggest risks he sees in critical infrast…
 
Side channels! Frequency scaling! Key encapsulation, oh my! We're talking about the new Hertzbleed paper, but also cryptography conferences, 'passkeys', and end-to-end encrypting yer twitter.com DMs. Transcript: https://share.descript.com/view/lPM4lsxha63 Links: Hertzbleed Attack | ellipticnews (wordpress.com) https://www.hertzbleed.com/hertzbleed.…
 
Philippe Humeau founded CrowdSec in 2020, where they got to work on their open-source massively multi-player firewall which utilises IP behaviour AND reputation to help tackle mass scale hacking. Listen in as he talks about the benefits of actual collaboration, the human side of security and some brilliant stories. To find out more about CrowdSec o…
 
Exclusive Networks has joined forces with security leaders in calling on the industry to take global action in a bid to end the recruitment crisis in cybersecurity, which is currently faced with an estimated shortfall of 2.7 million professionals. The Paris-headquartered global cybersecurity specialist is one of the founding partners supporting an …
 
Chat with Sandeep Lahane, CEO of Deepfence, on how ThreatStryker is changing the game for Cloud Workload Protection. We go deep in to the product's unique full SSL decryption and packet capture capability, identification of an organizations most vulnerable endpoints, and automated workflows to remediate compromised systems. Episode Show Notes: Sand…
 
https://www.csoonline.com/article/3660560/uber-cisos-trial-underscores-the-importance-of-truth-transparency-and-trust.html https://thehackernews.com/2022/06/conti-leaks-reveal-ransomware-gangs.html?m=1 https://www.bleepingcomputer.com/news/security/new-symbiote-malware-infects-all-running-processes-on-linux-systems/ https://doublepulsar.com/bpfdoor…
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login