show episodes
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

Unsubscribe
Unsubscribe
Havi+
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork

1
Adam Carolla Show

PodcastOne / Carolla Digital

Unsubscribe
Unsubscribe
Napi
 
Welcome to the new home for Adam's rantings and ravings. This is the #1 Daily Downloaded Podcast in the World. GET IT ON as Adam shares his thoughts on current events, relationships, airport security, specialty pizzas, politics, and anything else he can complain about. Five days a week and completely uncensored, Adam welcomes a wide range of guests to join him in studio for in depth interviews and a front row seat to his unparalleled ranting. Let's not forget Bryan Bishop (Bald Bryan) on sou ...
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
Heti
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

Unsubscribe
Unsubscribe
Havi+
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Artwork
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Former CIA Acting Director Michael Morell and former CIA Chief Operating Officer Andy Makridis interview top national security leaders -- intelligence officers, military leaders, and policymakers -- on the most critical security challenges of our time. Their interviews offer insights into the world's most pressing problems as well as the effectiveness of the U.S. policy response. They also delve into the biographies and careers of the individuals who have devoted their lives to protecting ou ...
  continue reading
 
Artwork
 
Twice a week, this podcast will take you on a smart, direct, sometimes scary, sometimes profane, sometimes hilarious tour of the inner workings of American power and of the impact of our leaders and their policies on our standing in the world. Hosted by noted author and commentator David Rothkopf and featuring regulars Rosa Brooks of Georgetown Law School, Kori Schake of Stanford University and Ed Luce of the Financial Times, the program will be the lively, smart dinner table conversation on ...
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Heti
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

Unsubscribe
Unsubscribe
Havi+
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
  continue reading
 
Listen to the latest happenings in Healthcare IT in this series of interviews with leading experts in healthcare technology. Whether you're trying to understand EMR and EHR, healthcare communications, security and privacy, analytics, telehealth and telemedicine, and much more, these interviews will dive into what's really happening on the front lines of healthcare. Learn more at: https://www.healthcareittoday.com
  continue reading
 
Artwork

1
DrZeroTrust

Dr. Chase Cunningham

Unsubscribe
Unsubscribe
Heti
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Heti
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Host Jill Schlesinger, CFP®, tackles sometimes uncomfortable and even controversial money and investing issues, without the financial jargon, to get to the heart of what’s important for anyone to know. Jill takes listener phone calls and interviews informative and entertaining guests each week to uncover surprising insights and provide actionable information so you can make the most of your money. Have a question? Email us at askjill at jillonmoney dot com.
  continue reading
 
Loading …
show series
 
Cybersecurity Today: Data Breaches and Malware Threats In this episode of Cybersecurity Today, host Jim Love discusses the hacking incidents involving the Internet Archive and Fidelity, exposing millions of users' data. Highlights include the Internet Archive breach attributed to the Black Meta Hacktivist group, affecting 31 million users, and Fide…
  continue reading
 
With market highs, how would you advise a 28-year-old with a large part of their net worth in cash to invest inside a brokerage account? Have a money question? Email us here Subscribe to Jill on Money LIVE YouTube: @jillonmoney Instagram: @jillonmoney Twitter: @jillonmoney "Jill on Money" theme music is by Joel Goodman, www.joelgoodman.com. To lear…
  continue reading
 
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Kim Jones, the Managing Director at Ursus Security Consulting. He takes a first principles look at the idea of identity. Check out Rick's 3-part election mini-series: Part 1: Election Propaganda Part 1: How Does Election Propaganda Work? In this epi…
  continue reading
 
In today's episode of Cyber Security Today, sponsored by CDW Canada Tech Talks, host Jim Love dives into the latest tech news and cybersecurity updates. Key stories include the FBI arrest of Eric Council Jr. for hacking the SEC's social media, the release of VulnHuntr, an AI tool designed to detect zero-day vulnerabilities in Python, and the arrest…
  continue reading
 
Stephen Sackur speaks to stand-up comedian, and broadcaster Frank Skinner, who also happens to be a writer on poetry, religion and much more. Football and sex were, and are, the staples of much of his humour, but he’s never been a one-trick pony. What unites the many facets of Frank Skinner?BBC World Service által
  continue reading
 
In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth hack and its broader cybersecurity implications. Additionally, the ‘Aware Much?’ segment reveals the world of hidden printer tracking d…
  continue reading
 
Original air date: October 27, 2023 With Russia conducting an unprecedented nuclear strike drill, China significantly expanding its arsenal, and the US unveiling a new nuclear weapon, we might just be witnessing the beginnings of a modern nuclear arms race. Heather Williams and Jeffrey Lewis join Jon Wolfsthal and David Rothkopf to dissect the intr…
  continue reading
 
A critical challenge for militaries is preparing for future, not past, wars. History shows that success often depends on accurately interpreting and harnessing technological and societal changes. In the Israel Defense Forces (IDF), this transformation process has been ongoing, with Brigadier General Eran Ortal as a key advocate for a new paradigm. …
  continue reading
 
This weekend we're sharing a snippet of our recent chat with real estate agent Tim Mullet and mortgage broker Mike Raimi, who joined us on the most recent webinar to break down all the ins and outs of the current housing market. Want more of Jill chatting with Tim and Mike? Subscribe to Jill on Money LIVE to watch the full chat. Have a money questi…
  continue reading
 
Enjoy this special encore episode where we are joined by the Head of Product for IBM Security Aarti Borkar, who shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer scienc…
  continue reading
 
Original air date: October 20, 2023 Senator Chris Murphy (D-Connecticut) chairs the Senate Foreign Relations Committee subcommittee on the Middle East. In this exclusive one-on-one conversation, he discusses the President's funding request for Ukraine and Israel, the recent trip of President Biden to Israel, the risks associated with the conflict b…
  continue reading
 
Finally, in the enterprise security news, HUMAN, Relyance AI, and watchTowr raise funding this week Alternative paths to becoming a CISO Vendor booths don’t have to suck (for vendors or conference attendees!) Budget planning guidance for 2025 CISOs might not be that great at predicting their own future needs Use this one easy trick to bypass EDR! A…
  continue reading
 
Over the last two decades, the United States has supported a range of militias, rebels, and other armed groups in Afghanistan, Iraq, and Syria. Critics have argued that such partnerships have many perils, from enabling human rights abuses to seeding future threats. Policy makers, however, have sought to mitigate the risks of partnering with irregul…
  continue reading
 
This weekend we're sharing a snippet of our recent chat with real estate agent Tim Mullet and mortgage broker Mike Raimi, who joined us on the most recent webinar to break down all the ins and outs of the current housing market. Want more of Jill chatting with Tim and Mike? Subscribe to Jill on Money LIVE to watch the full chat. Have a money questi…
  continue reading
 
On this new weekly bonus pod, Adam is joined by former UFC fighter turned ACS co-host, Jason “Mayhem” Miller, to talk all things MMA. They cover Jon Jones accidentally chopping off a piece of Steve-O’s ear, Donald “Cowboy” Cerrone unretiring so he can reach the 50-fight mark, Conor McGregor laying out his plan to return to the UFC, Dana White fumin…
  continue reading
 
This week we are joined by Chester Wisniewski, Global Field CTO from Sophos X-Ops team, to discuss their work on "Crimson Palace returns: New Tools, Tactics, and Targets." Sophos X-Ops has observed a resurgence in cyberespionage activity, tracked as Operation Crimson Palace, targeting Southeast Asian government organizations. After a brief lull, Cl…
  continue reading
 
Phishing and Cybersecurity: Evolution, Tactics, and Human Factors In this deep dive into the world of cybersecurity, join experts Jim Love and David Shipley as they unravel the ever-evolving landscape of phishing attacks and modern cyber threats. Through discussing the history and sophisticated evolution of phishing, including innovative methods li…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
Todays show: Cacheflow’s Sarika Garg joins Alex Wilhelm to discuss the challenges of B2B software sales (4:26), finding product-market fit (14:08), HubSpot's acquisition of Cashflow (17:32), and more! * Timestamps: (0:00) Cacheflow’s Sarika Garg joins Alex (2:25) Sarika Garg's startup journey and founding of Cashflow (4:26) Challenges in B2B softwa…
  continue reading
 
Implementing SASE can be tricky and onerous, but it doesn't have to be. Today, we discuss Unified SASE as a Service with Renuka Nadkarni, Chief Product Officer at Aryaka. Particularly, how can Unified SASE make both networking and security more flexible and agile? IT and security professionals need to ensure secure and performant applications and d…
  continue reading
 
Microsoft describes a macOS vulnerability. A trio of healthcare organizations reveal data breaches affecting nearly three quarters a million patients. Group-IB infiltrates a ransomware as a service operation. Instagram rolls out new measures to combat sextortion schemes. Updates from Bitdfender address Man-in-the-Middle attacks. An Alabama man is a…
  continue reading
 
Eliana Johns, Senior Research Associate with the Federation of American Scientists, joins Jon to discuss China’s latest ICBM tests and her recent geolocation project to locate them. What is the significance of these recent ICBM launches? What goes into open-source investigation projects? And how can one use mere images of bushes, dirt and blades of…
  continue reading
 
BreachLock is Recognized as a Prominent Vendor in both PTaaS and EASM Categories in the 2024 Gartner® Hype Cycle™ for Security Operations. Learn more about our sponsor BreachLock at https://www.breachlock.com. For more on cybersecurity, visit us at https://cybersecurityventures.comCybercrime Magazine által
  continue reading
 
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
  continue reading
 
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
  continue reading
 
Madison Horn is currently running for Congress representing Oklahoma’s 5th District. She started her career over a decade ago, working her way up to a global leadership position with Siemens Energy specializing in critical infrastructure protection. In 2022, she founded the RoseRock Advisory Group and still serves as the CEO. In this episode, Horn …
  continue reading
 
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individua…
  continue reading
 
Gary DeMercurio is the founder of Kaiju Security. In this episode, he joins host Paul John Spaulding, alongside co-hosts Sam White and Kyle Haglund, to discuss how games convince players to spend money, including some manipulative marketing tactics companies have used, the connection to traditional gambling, and more. • For more on cybersecurity, v…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Former CIA paramilitary officer, station chief, and senior DoD official Mick Mulroy joins Marc to discuss the demise of Hamas leader Yayah Sinwar. Responsible for the death of 46 Americans, Sinwar’s death will be celebrated by the US counterterrorism community. Will this energize the now stalled hostage negotiations? And bonus content on a string o…
  continue reading
 
On the DSR Daily for Friday, we breakdown the killing of Yahya Sinwar in Gaza, the US charging an ex-Indian intelligence official for involvement in an assassination plot, North Korea sending troops to aid Russia, and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesThe DSR Network által
  continue reading
 
This Fall I’ve been able to attend a wide variety of EHR user conferences. I can assure you that there’s no technology solution out there that healthcare organizations are more excited about than they are AI Medical Scribes. We’re excited as well and love how it helps relieve the documentation burden from clinicians. Of course, we’re just getting s…
  continue reading
 
Phillip Rogaway was a Professor at the University of California, Davis, and who has advanced so many areas of cryptography. He was the first to be awarded Levchin prize in 2016. Phillip has over 43,000 citations to his work, including classic papers on random oracles, symmetric key modes, garbled circuits, secure computation, and format-preserving …
  continue reading
 
Hey friends, today I’m putting my blue hat on and dipping my toes in incident response by way of playing with Velociraptor, a very cool (and free!) tool to find evil in your environment. Perhaps even better than the price tag, Velociraptor runs as a single binary you can deploy to spin up a server and then request endpoints to “phone home” to you b…
  continue reading
 
Lars and Kabir Mathur, CEO of Leen Data, discuss the concept of unified APIs for security data, emphasizing the need for normalization and integration of various security tools. Kabir explains how Lean Data differentiates itself by not only providing data connectors but also delivering data over an API, making it accessible for developers. They exp…
  continue reading
 
As president, Trump was known for his "bromance" with North Korean dictator Kim Jung Un, holding two summits in Singapore and Hanoi and engaging in a "love letter" correspondence with him that he took with him to Mar-A-Lago after he left office. But before that, journalist Zach Dorfman reminds us, Trump came perilously close to unleashing a nuclear…
  continue reading
 
Loading …

Gyors referencia kézikönyv