Security 公開
[search 0]
もっと

Download the App!

show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Loading …
show series
 
Originally Aired on April 19, 2021 Articles discussed in this episode: https://www.theverge.com/2021/4/13/22382821/fbi-doj-hafnium-remote-access-removal-hack https://apnews.com/article/russia-safe-harbor-ransomeware-hacking-c9dab7eb3841be45dff2d93ed3102999 https://threatpost.com/critical-cloud-bug-vmware-carbon-black/165278/ https://www.theverge.co…
 
When the world went fully remote a year ago, many systems had to migrate from on-premise to the cloud. Now that we're starting to re-open offices, do we move these system back to on-premise or is cloud the new normal? Fleming Shi, CTO from Barracuda Networks, joins us to discuss the ongoing challenges of the hybrid workforce. In the Leadership and …
 
Today's podcast reports on the theft of driver’s licence numbers from insurer Geico, a U.s. energy company drained of customer account data, vulnerabilities in a Wi-Fi air fryer, the latest security patches and Canadian high schoolers in cybersecurity test finalITWC による
 
Pulse Secure VPN 0-Day Exploited https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/ SonicWall Vulnerabilities https://www.sonicwall.com/support/product-notification/security-notice-sonicwall-email-secur…
 
Club TWiT details. Picture of the Week. The Vivaldi Project's take on FLoC. Chrome continues to be THE high-value target. We're at Chrome v90. Exchange Server Web Shells removed, with DOJ Permission. WordPress joins the "FLoC No!" chorus. It's Humble Bundle Book Time. Closing the Loop. A quick SpinRite progress report. Homogeneity Attacks. We invit…
 
Prologue Chris Eng has been elbows deep in software security for a very long time. Times have changed over the last 20 years, as have tools, methods, and outcomes - what hasn't changed is how much security debt we keep amassing in our applications. How bad is the problem, and what can be done? Tune in and find out what we think. Guest Chris Eng Lin…
 
This week, Dr. Doug talks naughty vaccines, Air frying is not frying, BGP is leaking, Codecov, Lazarus, Google Alerts, Nitro Ransomware, & we're joined once more for expert commentary by Jason Wood! Show Notes: https://securityweekly.com/swn115 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.t…
 
Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs. He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors. Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about the stressful life of a …
 
Geico is the next company to announce they had sensitive customer data leaked. This episode talks about the leak and what fraudsters could do with the data that could have ended up in their hands. Be aware, be safe. Source: Geico Breach Notice - https://www.documentcloud.org/documents/20618953-geico-data-breach-notice Become A Patron! Patreon Page …
 
Today we’re thrilled to announce that Diffend, an innovative software supply chain security service, is now part of WhiteSource. At WhiteSource we believe that open source risk management is a pillar of software supply chain security, and Diffend helps us extend our capabilities in this area. While 99.999% of open source releases may be safe, our c…
 
Thanks so much to everyone who attended (virtually) tonight’s live recording of episode 200! It was a blast. We covered: The drawdown in Afghanistan and its legal implications (for the AUMF, detention, habeas litigation, the use of force, you-name-it) The latest developments in the Military Commissions The new round of sanctions against Russian ent…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/ok-i-get-it-youre-all-special-snowflakes/ This department manager thinks their data is the most important. But then this department manager thinks their data is the most important. Can there really be so many crown jewels in your company that are all equally im…
 
This week in the AppSec News, Mike and John discuss Rust in Android and the Linux kernel, vuln disclosure policy changes from Project Zero, security and DevOps collaboration, XSS with NULL, & a BootHole follow-up! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw147…
 
Supply chain security isn't new, despite the renewed attention from the Solar Winds attack. It has old challenges, like having an accurate asset or app inventory, and new opportunities, like Software Bill of Materials. From consequences to code integrity, DevOps teams need to understand how to protect their own code from others' components. Additio…
 
Our guest this week is Anjuli Shere. She’s an analyst, writer, and researcher, currently pursuing a doctorate in Cyber Security at the University of Oxford. Anjuli’s research centres on emerging threats to journalists from new internet-connected technologies. She is creating a framework for news organizations and journalists in democratic countries…
 
Weniger Kontrolle für mehr Sicherheit? Security-Insider Podcast - Folge 36: Managed Security Services (MSS) Weniger Kontrolle für mehr Sicherheit? Nutzer von Managed Security Services (MSS) geben Kontrolle ab und erhoffen sich dafür einen Sicherheitsgewinn. Ob diese Hoffnung immer aufgeht, das besprechen in der neuen Folge des Security-Insider-Podc…
 
In this episode of the SECurity Awareness Series of the SEPodcast, Chris Hadnagy and Ryan MacDougall are joined by Ashley Rose, the CEO of Living Security. Listen in as they discuss the best methods to teach cybersecurity awareness, as well as the unique advantages when using escape rooms to do so. April 19, 2021 Download Ep. 144- Adaptive Problem …
 
Our VMware server is offline. We’re missing a part we need to install the drives. While we track that down, we need something to do. Planning labs, learning Visio, and project management are on the todo list. LINKS 1. Project Management for the Unofficial Project Manager FIND US ON 1. Facebook 2. Twitter - DamienHull…
 
Is scraping the same as hacking or just an example of “zealous” use of a social media platform? And if it isn’t considered hacking…should it be? As more and more online platforms open their doors to API-based access, do we need more rules and oversight of how APIs are used to prevent wanton abuse? The post Episode 211: Scrapin’ ain’t Hackin’. Or is…
 
A proposed privacy framework from the eHealth Initiative & Foundation and the Center for Democracy and Technology aims to set standards for the collection, disclosure and use of health data that falls outside the protection of HIPAA, says attorney Andrew Crawford of CDT.HealthcareInfoSecurity.com による
 
This week I discuss the offense (investigations) and defense (privacy tactics) surrounding the aftermath of the Capitol siege, plus the latest privacy news.Direct support for this podcast comes from sales of my books and the online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorseme…
 
Sophos cybersecurity expert Chester Wisniewski provides excellent, topical and timely commentary on the FBI’s recent use of a malware-like method to forcibly clean up hundreds of servers still infected in the Hafnium aftermath.With Paul Ducklin and Chester Wisniewskihttps://nakedsecurity.sophos.com/fbi-hacks-into-hundreds-of-infected-us-servershttp…
 
Our democracies repeatedly fail to safeguard the future. From pensions to pandemics, health and social care through to climate, biodiversity and emerging technologies, democracies have been unable to deliver robust policies for the long term. In Can Democracy Safeguard the Future? (Polity Press, 2021), Graham Smith, a leading scholar of democratic …
 
Overview This week we look at a reboot of the DWF project, Rust in the Linux kernel,an Ubuntu security webinar plus some details of the 45 CVEs addressedacross the Ubuntu releases this last week and more. This week in Ubuntu Security Updates 45 unique CVEs addressed [LSN-0075-1] Linux kernel vulnerability [01:01] 8 CVEs addressed in Trusty ESM (14.…
 
Welcome to Software Security Gurus with Matias Madou. In episode 19, he chats to Bankim Tejani, Chief Security Architect and Distinguished Engineer at the Charles Schwab Corporation. They discuss his experience with big data breaches, as well as how secure coding can speed up remediation, and drive quality, performance, and scalability. Want to nom…
 
Should insurance companies be banned from helping companies pay ransomware demands? How has malware messed with motorcars in the United States? And how are cybercriminals exploiting alcohol drinking during the pandemic? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Gr…
 
President Biden announces that all U.S. military forces will be out of Afghanistan by Sept. 11. A blackout at an Iranian nuclear facility is widely attributed to Israeli sabotage, complicating negotiations over a new nuclear deal. And we finally know the company that helped the FBI hack a notorious shooter’s phone. See acast.com/privacy for privacy…
 
Im RZ10 Update spreche ich über aktuelle Themen und News in der Welt von SAP Basis & Security. Die Themen vom 14.04.2021: Security Patch Day April, CISA Warnung zu verschleppten SAP Updates und BSI Kampagne IT Sicherheit Ganzer Beitrag mit allen Links: https://rz10.de/1-noch/rz10-update-20210414/ Viel Spaß euch allen mit dieser Folge! Vielen lieben…
 
In our latest episode of Security Nation, we talk to Philip Reiner about his work with the Ransomware Task Force. Stick around for our Rapid Rundown, where Tod talks about a recently released bulletin from CISA about APT exploiting both new and old SAP vulnerabilities.Bri Hand, Jen Ellis, Tod Beardsley, Phil Reiner による
 
In the last two episodes of this series (#449 and #450) we've been diving into how to not only speed up the process of spinning up a DIY pentest dropbox, but how to automate nearly the entire build process! In today's episode we talk specifically about how to streamline the Windows 10 build process. As previously mentioned, this article is awesome …
 
This is a reassessment of British and Italian grand strategies during the First World War. Dr. Stefano Marcuzzi, Max Weber Fellow at the European University Institute, tries to shed new light on a hitherto overlooked but central aspect of Britain and Italy's war experiences: the uneasy and only partial overlap between Britain's strategy for imperia…
 
We speak with Chris Althaus who was appointed as Chief Executive Officer of the Australian Mobile Telecommunications Association (AMTA) in 2005. AMTA is the peak industry organisation representing Australia’s mobile telecommunications sector and operates programs covering all aspects of the mobile ecosystem such as - telecommunications policy, mobi…
 
Eintrittskarten im Netz BruteForce Passwort Cracker John the ripper und Hashcat ';--have i been pwned? und Pwned Passwords Timing-Angriffe beim String Vergleich fail2ban Unsere Podcast-Folgen zu OpenID und OAuth-Folgen Vortrag: Password123! Pepper hat bei Dropbox eine andere Bedeutung als sonst üblich scrypt im Vergleich zu BCrypt und PBDKF2 Argon2…
 
We are wrapping up our “Big Four” series with a country that has been one to watch for quite some time: Russia. And who better to join me for this episode than our Vice President for Mandiant Threat Intelligence, John Hultquist. We started off this episode discussing how Russian cyber threat activity evolved to what we know today, from the days of …
 
This week in the Security News, Polish blogger sued after revealing security issue in encrypted messenger, The Facebook dump and Have I Been Pwned, LinkedIn and more_eggs, APTs targeting Fortinet, SAP Applications Are Under Active Attack again, Is your dishwasher trying to kill you?, Ubiquiti All But Confirms Breach Response Iniquity, Cyber Threat …
 
This week, Lennart Koopmann, the CTO of Graylog, Inc, joins us for an interview to talk about Nzyme, a Free and Open WiFi Defense System. Then, Dutch Schwartz, Principal Security Specialist at Amazon Web Services, joins us for a discussion on the Lessons Learned When Migrating from On Prem to Cloud! In the Security News, Polish blogger sued after r…
 
This week, In the first segment, Ryan Noon from Material Security join us for a discussion on Zero Trust! Next up, John Loucaides joins for an interview on firmware attacks, and what enterprises need to do! In the Enterprise Security News:Cyble raises $4M, ThreatQuotient raises $22.5M, OneTrust acquires Convercent, Digital Shadows announces new thr…
 
This week in the Enterprise News, Cyble raises $4M, ThreatQuotient raises $22.5M, OneTrust acquires Convercent, Digital Shadows announces new threat intelligence capabilities, Rapid7 Announces Kubernetes Open Beta in InsightVM, LogRhythm Releases Version 7.7, Imperva unveils new data security platform built for cloud, Acronis releases a new version…
 
On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the big Facebook data leak that has made headlines around the world this week, as well as a cyber attack aimed at European Union institutions, and a cyber incident impacting Australia’s parliament. We also discuss warnings from authorities in the U.S. about attackers atte…
 
Cloud computing was one of the last decade's most transformative technologies. It helped organizations launch exciting new applications and services, as well as innovate the way they operate. However, moving critical parts of IT infrastructure and operations outside of organizations' perimeters has significant security implications. The cloud is de…
 
In this show I interview Phil and Ian about the Ever Given Ship being stuck in the Suez canal, Ice Breaker ships and the northern passage. We also discuss the reallocation of funds for the UK military, the new ranger force and the significance of the changing of the guard in the White House to the new administration. To follow Philip, click the lin…
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login