Security 公開
[search 0]
もっと

Download the App!

show episodes
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
S
Smashing Security

1
Smashing Security

Graham Cluley, Carole Theriault

Unsubscribe
Unsubscribe
ウィークリー
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over six million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, a ...
 
Discover the unique, inspiring, and often amusing stories behind what it takes to lead cybersecurity efforts in an organization. The Security Stories podcast features interviews with a diverse range of guests, each sharing their leadership experiences for the benefit of others in the cybersecurity industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
T
The Azure Security Podcast

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

Unsubscribe
Unsubscribe
月ごとの+
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2021 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Loading …
show series
 
A school district in Texas is going to start scanning all the student's district-provided devices. They will be looking at all communications, use and email for flag that might be indicative of cyber-bullying and potential mental health issues. This episode talked about this and what piece is missing that could be done. Source - https://www.gaggle.…
 
We cover a lot of articles about CISO leadership, communications, skills, and yes, transition. This week we discuss the CISO transition from a CISO's perspective. I will interview my co-hosts on why they made moves in 2021, what criteria did they use to analyze their next role, and what are their strategies for a successful transition. In the Leade…
 
This week in the Leadership & Communications section, 'They Said a CISO Does What?', 5 Tips to be an awesome CISO, 9 tips for an effective ransomware negotiation, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw242
 
Twitter bans sharing private images and videos without consent DNA testing firm discloses data breach affecting over 2 million people Critical ‘Printing Shellz’ bugs impact 150 HP printer models Thanks to our episode sponsor, Votiro Your users need to accept and open files to do their jobs. Keep them safe and productive with Votiro. With Votiro zer…
 
Hunting for PHPUnit Installed via Composer https://isc.sans.edu/forums/diary/Hunting+for+PHPUnit+Installed+via+Composer/28084/ Microsoft Defender Scares Admins with Emotet False Positivies https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-scares-admins-with-emotet-false-positives/ Printing Shellz HP Printer Vulnerabilities https://…
 
Picture of the Week. "Super Duper Secure Mode" 37% of the world's smartphones are vulnerable. The RAT Dispenser. The Entirely Predictable 0-Day Windows Exploit. "The Frontiers Saga: Fringe Worlds" Closing the Loop. Bogons Begone! We invite you to read our show notes at https://www.grc.com/sn/SN-847-Notes.pdf Hosts: Steve Gibson and Leo Laporte Down…
 
This week in the Security Weekly News: Tardigrade, Reaper, HP, Cannazon, Ikea, Cameras, The Virtual DMV Verse, and the Expert Commentary Jason Wood on this edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn171 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter…
 
We cover a lot of articles about CISO leadership, communications, skills, and yes, transition. This week we discuss the CISO transition from a CISO's perspective. I will interview my co-hosts on why they made moves in 2021, what criteria did they use to analyze their next role, and what are their strategies for a successful transition. Visit https:…
 
This week in the Security Weekly News: Tardigrade, Reaper, HP, Cannazon, Ikea, Cameras, The Virtual DMV Verse, and the Expert Commentary Jason Wood on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn171…
 
Today's guest is the brilliant Jarell Oshodi, currently Deputy Chief Privacy Officer for the Centre for Disease Prevention and Control. So she’s had an interesting few years.... Hazel and fellow data privacy advocate Tazin both interview Jarell, in what turned out to be a really fun chat. Jarell has spent 12 years honing her expertise in data compl…
 
All links and images for this episode can be found on CISO Series Don't look at me to explain zero trust to you, because I'm just as confused. I've heard plenty of definitions, and they all sound good. I just don't know which one is right, or maybe they're all right. This week's episode of CISO/Security Vendor Relationship Podcast was recorded in f…
 
In today’s session Chris Wysopal will address a number of topics with Mike, including systemic risk in software development and how developers and security teams can work together to meet common goals and solve the speed vs. security dilemma. Specifically, they’ll discuss processes for fixing more vulnerabilities faster and tools for ensuring devel…
 
Die diesjährige TechEd war wie eine Folge ZDF Traumschiff. CTO Jürgen Müller hat die Passagiere auf eine Reise mitgenommen, das Ziel dieser Reise ist dabei nichts weniger als die globale Wirtschaft mit Hilfe von SAP neu erfinden. Ganzer Beitrag mit allen Links: https://rz10.de/1-noch/best-of-november-2021/ Viel Spaß euch allen mit dieser Folge! Vie…
 
Prologue Folks, the video of this episode which was live-streamed to our YouTube channel is here: https://youtu.be/IYVB_LNhURQ - and if you can, watch it. Huge mega-thanks to Microsoft and Lightstream for bringing together Jeff and Mark on this one to deliver some truly phenomenal content. This week is Azure Security Benchmark (not baseline, oops) …
 
HOTP, TOTP oder doch lieber WebAuthn? Die RFCs für HOTP und TOTP. Die Fingerabdruckrekonstruktion von einem Foto aus 3m Entfernung war von Ursula von der Leyen, nicht von Wolfgang Schäuble. Dessen Fingerabdruck ist allerdings auch bekannt und veröffentlicht. Auch ein IRIS-Abbild von Angela Merkel konnte aus Fotos gewonnen werden. OATH und FIDO. Die…
 
In this episode of the National Security Podcast, The Hon Paul Fletcher MP – Minister for Communications, Urban Infrastructure, Cities, and the Arts, Member for Bradfield, and previously Director of Corporate and Regulatory Affairs at Optus – joins Professor Rory Medcalf in conversation. In the latest instalment of the Security Summit series on the…
 
Josh and Kurt talk about an article about how expertise has a limited lifetime. We are all experts in something, but some of us will find our expert knowledge to be outdated eventually. We discuss what that means in the context of security and tech and disagree about how to best keep your skills up to date. Show Notes Experts From A World That No L…
 
We speak with Jason Manar, Chief Information Security Officer, Kaseya. In October, 2021, Kaseya announced that it hired Jason Manar as Chief Information Security Officer (CISO). Manar, who was most recently named Assistant Special Agent in Charge for the Federal Bureau of Investigation (FBI) overseeing all cyber, counterintelligence, intelligence a…
 
ORIGINALLY AIRED ON NOVEMBER 22, 2021 Articles discussed in this episode: Story # 1: Chinese Team Up With Russia To Launch US Cybersecurity Assault – https://hothardware.com/news/chinese-hackers-team-up-with-russian-ransomware-gang Story # 2: The FBI Got Hacked Over a Beef With a Guy Named Vinny? – https://www.thedailybeast.com/was-fbi-email-hack-j…
 
In this episode of "Cybersecurity Unplugged," Dan Bowden, CISO at Sentara Health, discusses telemedicine, IoMT, and explains why we’re lagging so far behind in healthcare security. "It’s because of how the data is managed, data standards, data integrity."BankInfoSecurity.com による
 
The next world war is 13 years away—that is, if you live in the world envisioned by Elliot Ackerman and James Stavridis, 2034: A Novel of the Next World War (Penguin, 2021). When writing about the intersection of combat and diplomacy, the co-authors draw from experience. Ackerman has worked in the White House and served five tours of duty as a Mari…
 
Cybercsecurity tips for the holiday season and beyond. Exchange at risk from public exploit. GoDaddy loses passwords for 1.2m users. Longest-lived Windows version ever. Don't make your cookies public. And the day that umbrellas became an anti-DDoS tool.https://nakedsecurity.sophos.com/black-friday-and-cyber-monday-heres-whathttps://nakedsecurity.so…
 
Heating systems are left vulnerable to attack in the high courts, cybercrime unicorns have become a reality (but what are they?), over 15 Terabytes of NFTs are made available for anyone to download ... and Carole reveals her Pick of the Year. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by comput…
 
Interview Links Listen to Chris’s podcast, First Impressions. Check out the other, Jane Austen-themed First Impressions podcast. Learn more about MVSP at the official site and in this blog post from Google. Read up on the ETSI standard Jen mentioned. Revisit our previous episode on Disclose.io with Casey Ellis. Rapid Rundown Links Read about the Sk…
 
The topic of application security has never been more important. So how are companies approaching appsec? What should companies do to ensure appsec gets the attention it needs? Antti Tuomi, who works in Japan, and Antti Vaha-Sipila (known as AVS), from Finland, join the show to share their thoughts on changes in application security, shifting left,…
 
This week, Alan, Quinta and Scott were joined by special guest, Arbiters of Truth co-host Evelyn Douek! They sat down to discuss: — “Getting Rittenhoused”: A jury has recently decided to acquit 17-year-old Kyle Rittenhouse of all charges, including murder charges, for shooting two men in what he claimed was self-defense during last summer’s unrest …
 
Today's tale of pentesting has a bunch of tips to help you maximize your pwnage, including: The new Responder DHCP poisoning module All the cool bells and whistles from CrackMapExec which now include new lsass-dumping modules! Speaking of lsass dumping, here's a new trick that works if you have Visual Studio installed (I bet it will be detected soo…
 
Wir sprechen über Schlüssel aus verschiedenen Sichtweisen. Zum einen hat eine große Bundesbehörde einen geheimen Schlüssel veröffentlicht, zum anderen verlor eine Wohnungsgesellschaft einen Generalschlüssel und es errechnete auch jemand einen (zu kurzen) Schlüssel. Das ist natürlich eine gute Gelegenheit, um sich über Schlüssel und deren Verwaltung…
 
Jenny is joined by Tal Arad, the CISO at Carlsberg. They discuss Tal's journey into the industry, his views on recruiting and the progressive and innovative attitude that Carlsberg has as a company, including getting paid in BEER! To follow Tal on LinkedIn, please click this link here. Thank you to this episode's sponsor, Metacompliance, for suppor…
 
This week in the Enterprise Security News: NDR startup Netography raises a $45m Series A with Martin Roesch at the helm! Data Security startup Laminar comes out of stealth with a $32m Series A Threat Intel divestment SnapAttack spins out of Booz Allen Cloud Security startup Lacework raises $1.3bn in a single round, Lacework acquires Soluble, You ca…
 
This week Jason and I tackle your listener questions.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.Listen to ALL episodes at https://intelt…
 
ExtraHop VP, GM of International and Global Security Programs Mike Campfield joins Security Weekly for a retrospective on ransomware in 2021, shares his predictions on how it will evolve in 2022 and beyond, and what controls enterprises can put into place to build their resilience to the growing threat. Jeffrey then joins us today to guide us throu…
 
This week in the Security News: The FBI is spamming you, hacking exists in the mind, Beg Bounties, nasty top-level domains, MosesStaff, why own one npm package when you can own them all, how much is your 0day worth, upnp strikes again, when patches break exploits in weird ways, records exposed in stripchat leak, can we just block ICMP?, trojans in …
 
On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some recent attack campaigns aimed at critical infrastructure organizations in several countries around the world, the possible return of the Emotet botnet, and some law enforcement activity that has led to the arrest of people involved with both the REvil and Gandcrab ra…
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login