Security 公開
[search 0]
もっと

Download the App!

show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over four million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Loading …
show series
 
EPISODE 193-Credit Cards & Campaign DataThis week I call Citi to confirm their new option for alias names on credit cards, offer a Secure Communications Comparison chart update, and briefly discuss voter & campaign contribution data.Support for this show comes directly from sales of my books. More details can be found at https://inteltechniques.com…
 
Today's guest is Sharka an amazing social engineer and speaker. She and Jenny discuss physical infiltrations, psychological social engineering, what NOT to do on a job and why Sharka is the pirate queen of Security. Thanks Sharka for an amazing interview. To follow Sharka on LinkedIn, click here. To follow Sharka on Twitter, click here. To watch Sh…
 
Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix about one in ten of those vulnerabilities. But as a security practitioner you still need to keep your organization secure, so how do you do that when you can’t possibly fix ALL of your vulnerabilities? E…
 
Sysmon is a free endpoint monitoring tool published by Microsoft in their sysinternals suite. It generates process creations, network connections, file creations, DNS, and now clipboard monitoring with v12. We'll discuss what's in the events and how to easily visualize and search them with Gravwell's new Sysmon Kit. This segment is sponsored by Gra…
 
If the US is – in the words of former Secretary of State Madeleine Albright – the "indispensible nation" then the economic, democratic and institutional alliance between the US and the EU is the “essential partnership”. So argues Tony Gardner, Barack Obama’s ambassador to the EU and advisor to Joe Biden’s campaign for president in his new book Star…
 
The latest edition of the ISMG Security Report analyzes the U.S. indictment against Russian hackers who were allegedly behind NotPetya. Also featured: A discussion of nation-state adversaries and how they operate; an update on Instagram privacy investigation.GovInfoSecurity.com による
 
Firefox testing 'Site Isolation' feature Cisco patches DoS bugs in network security products Proposed German legislation authorizes access to encrypted messages Thanks to our episode sponsor, AuthSafe. Are online frauds a concern for your organization? Is it a hurdle for progress? Timely predictions and detections with cognitive engines, should do …
 
BazarLoader Phishing Lures https://isc.sans.edu/forums/diary/BazarLoader+phishing+lures+plan+a+Halloween+party+get+a+bonus+and+be+fired+in+the+same+afternoon/26710/ Stalled Reviews for Secure Boot Shim https://github.com/rhboot/shim-review/issues/120 https://github.com/rhboot/shim-review/issues/102#issuecomment-698963751 Cisco Advisories https://to…
 
This week, first we talk Enterprise News, discussing how Palo Alto Networks announces cloud native security platform, Akamai launches new API security tool, SentinelOne secures patent for unique approach to uncovering exploits in their initial payload stage, Splunk helps security teams modernize and unify their security operations in the cloud, and…
 
This week, Dr. Doug wraps up all the shows from this week, and talks about Twitter hacks, Oracle patches, Sandworm, Singapore facial recognition, and Donald Trump says we don't need security! Show Notes: https://securityweekly.com/swn76 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.c…
 
This week: the DOJ's attempt to reignite the Battle to Break Encryption; the story of the Russian hackers behind the Sandworm Team; a zero-day bug just patched in Chrome; and (oh no!) why your vocabulary needs the word "restore" even more than it needs "backup".With Kimberly Truong, Doug Aamoth and Paul Ducklin.https://nakedsecurity.sophos.com/us-d…
 
deepwatch formally launched its Lens Score app on October 20th. Corey joins us to discuss the app, its future, and how it helps CISOs achieve their security outcomes. Corey will also discuss the deepwatch Series B and how we plan to invest the funds. This segment is sponsored by deepwatch. Visit https://securityweekly.com/deepwatch to learn more ab…
 
North Carolina is the first in the country to open a hotline to report cybercrimes. This episode goes through the details of this hotline and what it could mean for the industry as a whole moving forward on the fight against cybercriminals. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Sec…
 
On this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman are joined by Symantec threat researchers Vikram Thakur and Alan Neville. Vikram discusses Symantec’s role in the cross-industry initiative to disrupt the Trickbot botnet. Symantec was part of a global partnership that secured a court order directing hosting providers to take dow…
 
And we’re back, after a(nother) week off! What do we have to show for it? Tune is as co-hosts Steve Vladeck and Bobby Chesney as they review: Steve’s Supreme Court argument in Briggs — more military justice at SCOTUS! Speaking of the Court: whither the role of the Chief once he’s not obviously the fifth vote? Who will be the new swing justice? And …
 
The Darkside ransomware gang thinks it's a modern-day Robin Hood when it donates extorted Bitcoins to charity, the micro-targeted ad industry could pop like a bubble, and would you trust a burger-flipping robot? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Clu…
 
Rudy Giuliani finds himself at the center of a misbegotten effort to interfere in the 2020 election. American diplomats and intelligence officers complain they’re being left in the cold after mysterious attacks. And the Trump administration sends an unusual envoy to Syria to discuss U.S. hostages.Rational Security による
 
Yay - I'm a PCIP now! I welcome you to check out our past episodes on PCIP, but in some ways this will be the be all, end all episode on the topic. Today I cover: Study materials that helped me prepare: PCIP book by Linda Jones (I couldn't actually get this one in time but it looks awesome!) Flashcards from Cram Flashcards from Quizlet My flashcard…
 
For more than two decades, Iranian human rights lawyer Nasrin Sotoudeh has fought for the rights of women, children and minorities in her country. Her work has won her international acclaim but also the wrath of the Iranian government. She has been arrested several times and is currently serving a 38-year sentence in prison. Her family has been det…
 
Zoom end-to-end encryption, Windows 10 god mode, Manifest v3. Last Wednesday, Zoom announced that THIS week their 30-evaluation of end-to-end encrypted video conferencing would begin How to enable Windows 10 "God Mode" Edge to be updated with browser extensions "Manifest v3" Last Tuesday Microsoft issued fixes for 87 security vulnerabilities - so, …
 
This week, we welcome Taylor McCaslin, Security Product Manager at GitLab, to discuss current trends in the application security testing industry! In the Application Security News, Patch Your Windows - “Ping of Death” bug revealed, 800,000 SonicWall VPNs vulnerable to remote code execution bug, T2 Exploit Team Creates Cable That Hacks Mac, Zoom Rol…
 
With Brad out this week, Evan is joined by the founder of the PsyberReslience Project, Neal O’Farrell. The PsyberReslience Project is an "ongoing effort to address the prevalence and impact of stress, burnout, and mental health challenges in the cybersecurity workforce." Evan and Neal chat about what mental health is like in the information securit…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/can-a-robot-be-concerned-about-your-privacy/) I want AI to be efficient, but I also want my space. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our sponsored guest is…
 
Prologue This week on DtSR my long-time friend and pragmatic alter-ego, Chris Abramson, joins me to give a sneak peek at what you can expect on the new podcast we're launching together in a few weeks... and also to discuss the "budget before breach/budget after breach" meme going around LinkedIn. We discuss security, budget, process, threat modelin…
 
The US Federal Bureau of Investigation, the FBI, has taken an increasingly prominent role in the day to day cyber defense of organizations and institutions here in the U.S., and globally as well. Through the establishment of the IC3, the Internet Crime Complaint Center, the FBI provides an invaluable public resource for prevention, response, and mi…
 
This week we connected Jitibt to 365, found hidden licensing and learned how to be a SOC analyst. You can now contact us by sending email to support@section9.us. LINKS 1. Black Hills Information Security Youtube Channel 2. CIS Benchmarks 3. Jitbit FIND US ON 1. Facebook 2. Twitter - DamienHullSECTION 9 による
 
Josh and Kurt talk about Network Time Security (NTS) how it works and what it means for the world (probably not very much). We also talk about Singapore's Cybersecurity Labelling Scheme (CLS). It probably won't do a lot in the short term, but we hope it's a beacon of hope for the future. Show Notes Network Time Security NTP and the University of Wi…
 
Executive Editor Chris Cubbage speaks with Abigail Bradshaw CSC, Head of the Australian Cyber Security Centre (ACSC). A year or so on from the ACSC becoming part of the Australian Signals Directorate (ASD), we speak with Abigail Bradshaw about some of the challenges and benefits, with an updated overview of the ACSC as it is today and more generall…
 
This week I present a new secure communications comparison project which may help you identify the best private messenger products for email, text, voice, and video communications.Support for this show comes directly from sales of my books. More details can be found at https://inteltechniques.com/books.html.Listen to ALL episodes at https://intelte…
 
“Every cloud conversation should be also a security conversation,” says Anna Van Wassenaer, Cloud Business Development Leader, Europe, for IBM Security Services.Abhijit Chakravorty, Partner & Cloud Security Competency Leader for IBM Security, joins Van Wassenaer for a conversation about why cloud strategy should go hand-in-hand with a security stra…
 
The tables are finally turned, as Sam finds himself in the hot-seat. We join Sam’s brother, Red Curry, as he interviews Sam to find out more about their childhood, Sam’s journey into security, and his inspirations. What’s the significance we put on stories? What does it mean to “take in the strays”, and taking care of others? The post Special Inter…
 
In this episode, Chris Hadnagy and Ryan MacDougall are joined by distinguished professor: Elizabeth Loftus. Listen in to understand the vulnerabilities in human memories and how they are sometimes exploited. Learn to defend against attacks on your memory and how this info can be applied in the information security industry. – Oct 12, 2020 Download …
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login