show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
This Week in Tech is the top-ranked flagship tech podcast from TWiT.tv. Every Sunday, Leo Laporte and a roundtable of insiders explore the week's hottest tech news from AI to robots, and PCs to privacy. When it comes to tech, TWiT is IT. Records live every Sunday at 5:15pm Eastern / 2:15pm Pacific / 21:15 UTC.
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

Unsubscribe
Unsubscribe
Heti
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
  continue reading
 
Artwork
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Bestselling author, professor and entrepreneur Scott Galloway combines business insight and analysis with provocative life and career advice. On Mondays, Prof G Markets breaks down what’s moving the capital markets, teaching the basics of financial literacy so you can build economic security. Wednesdays, during Office Hours, Scott answers your questions about business, career, and life. Thursdays, Scott has a conversation with a blue-flame thinker in the innovation economy. And Scott closes ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
Heti
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork

1
Adam Carolla Show

PodcastOne / Carolla Digital

Unsubscribe
Unsubscribe
Napi
 
Welcome to the new home for Adam's rantings and ravings. This is the #1 Daily Downloaded Podcast in the World. GET IT ON as Adam shares his thoughts on current events, relationships, airport security, specialty pizzas, politics, and anything else he can complain about. Five days a week and completely uncensored, Adam welcomes a wide range of guests to join him in studio for in depth interviews and a front row seat to his unparalleled ranting. Let's not forget Bryan Bishop (Bald Bryan) on sou ...
  continue reading
 
Americast is the authoritative US news and politics podcast from the BBC. Each week we provide audiences with the best analysis from across the BBC, with on-the-ground observations and big picture insights about the stories which are defining America right now. The podcast is hosted by trusted BBC journalists including the BBC’s North America editor, Sarah Smith, BBC Radio 4 presenter, Justin Webb, the BBC’s disinformation and social media correspondent, Marianna Spring, and BBC North Americ ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
One of the most iconic brands in finance returns for today's issues and today's media world. David Westin hosts a new look at the financial stories that shape our world as seen through the eyes of people whose perspective we value. Each week, join David as he sits down with newsmakers and a rotating panel of influential voices including thought leaders, CEOs, policy makers and economists.
  continue reading
 
Twice a week, this podcast will take you on a smart, direct, sometimes scary, sometimes profane, sometimes hilarious tour of the inner workings of American power and of the impact of our leaders and their policies on our standing in the world. Hosted by noted author and commentator David Rothkopf and featuring regulars Rosa Brooks of Georgetown Law School, Kori Schake of Stanford University and Ed Luce of the Financial Times, the program will be the lively, smart dinner table conversation on ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Heti
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Loading …
show series
 
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
In the leadership and communications segment, Underfunding And Leadership Gaps Weaken Cybersecurity Defenses, A Self-Care Checklist for Leaders, Senate bill eyes minimum cybersecurity standards for health care industry, and more! Show Notes: https://securityweekly.com/bsw-366
  continue reading
 
This Week Again takes a look at the non-profit group Haitian Bridges Alliance files criminal charges against Donald Trump & JD Vance for their lies about immigrants in Springfield, Kamala Harris plan to secure our Southern Border, Trump declares himself women's protector after touting overturning Roe, Indiana abortion ban kills a 26 year old mother…
  continue reading
 
Cyber Security Week in Review: Data Breaches, MFA Bypassing, and Surveillance Insights Join host Jim Love along with an expert panel featuring Terry Cutler, David Shipley, and Laura Payne to discuss this week in cybersecurity. Topics include the latest methods of bypassing MFA, data breaches and how to deal with compromised information, the implica…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jason Elrod, CISO, Multicare Health System Missed the live show? Watch it on YouTube. And make sure to check out Jason’s book (coming soon) at CyberCISOmarksmanship.com, as well as his newsletter at LimitlessCyber.com. And huge thanks to…
  continue reading
 
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
  continue reading
 
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Shawn Bowen, VP, Deputy CISO - Gaming, Microsoft. Joining us is Patty Ryan, senior director, CISO, QuidelOrtho…
  continue reading
 
At the vice-presidential debate, the CBS News moderators fact-checked one of JD Vance’s lies—and that was all it took to trigger an epic attack on CBS from Donald Trump and his MAGA allies. Which highlights a larger story: The degree to which Trump’s campaign is built on an immense superstructure of endless, shameless lying. Bullying the media into…
  continue reading
 
Rory Stewart, the former UK Secretary of State for International Development and cohost of the popular podcast, The Rest is Politics, joins Scott to discuss geopolitics, the state of politics in the US and the UK, and his recent TEDTalk where he advocates for a radical way to address extreme poverty worldwide. Follow Rory, @RoryStewartUK. Scott ope…
  continue reading
 
Comedian Jay Pharoah visits to talk about his new standup special, “Jared”, as well as the “coochification” of America, how he started doing impressions and getting detained by LAPD. He also discusses the ongoing P. Diddy situation, his dealings with the powerful people of Hollywood, and how his Obama impression led to him auditioning for SNL.Then,…
  continue reading
 
In this episode, Dmitri Alperovitch discusses his book World on the Brink: How America Can Beat China in the Race for the Twenty-First Century with host Ben Yelin. Alperovitch highlights the rising tensions between the U.S. and China, focusing on Taiwan as a critical flashpoint that could ignite a new Cold War. He shares insights on the strategies …
  continue reading
 
Russian authorities arrest nearly 100 cybercriminals in raid Northern Ireland police fined for exposing officer identities Rackspace breach sparks vendor blame game Huge thanks to our sponsor, SpyCloud Stolen data is a hot commodity for cybercriminals. Using infostealer malware, bad actors can siphon valid session cookies from employee devices, sco…
  continue reading
 
Send us a text One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to att…
  continue reading
 
Scott Galloway and Jessica Tarlov discuss their takeaways from the vice president debate between Senator JD Vance and Minnesota Governor Tim Walz. Follow Jessica Tarlov, @JessicaTarlov. Follow Prof G, @profgalloway. Learn more about your ad choices. Visit podcastchoices.com/adchoicesVox Media Podcast Network által
  continue reading
 
The Middle East is at its most dangerous point in decades. With an Israeli retaliation against Iran imminent, what can the US do to prevent the situation from spiraling out of control? Noga Tarnopolsky, Barbara Slavin, and Rosa Brooks join David Rothkopf to assess the administration and what comes next for Israel and the region. Learn more about yo…
  continue reading
 
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
  continue reading
 
Cybersecurity News: Microsoft Patch Issues, Chrome Vulnerabilities, and T-Mobile Settlement In this episode of Cybersecurity Today, Jim Love discusses several pressing issues in the tech world. Early feedback on Microsoft's Windows 11 October Patch Tuesday update reveals significant stability issues. Google Chrome receives a second major security u…
  continue reading
 
With five weeks until Election Day, Donald Trump has decided to win over swing voters by rhapsodizing about police violence, threatening to prosecute anyone who displeases him, and unleashing disgusting insults toward his opponents. His latest? Raging that Tim Walz is a “moron” and “sick.” We talked to A.B. Stoddard, columnist at The Bulwark and au…
  continue reading
 
Scott discusses the state of the U.S. economy, specifically how it is both prosperous and unevenly distributed. He then speaks about ‘Founder Mode’ and the evolution of how founders are seen in Silicon Valley. He wraps up with a conversation on the high divorce rate in the military and whether benefits such as Basic Allowance for Housing (BAH) cont…
  continue reading
 
Dana Gould returns to the show and they open by discussing “model ex-president” Jimmy Carter, suicide pods, Pedif Isle, and a few terrible ‘70s movies. Then, they talk about the process of Adam preparing for & recording a clean comedy set for Dry Bar.Next, Jason “Mayhem” Miller reads the news including stories about a P. Diddy sex tape with an A-li…
  continue reading
 
UK ties LockBit affiliate to Evil Corp Public records systems riddled with security flaws Ransomware disrupts emergency services at Texas hospital Huge thanks to our sponsor, SpyCloud Researchers at SpyCloud recently found that one in five individuals was infected with infostealer malware in the last year. Unfortunately, research now confirms that …
  continue reading
 
Vice presidential candidates JD Vance and Tim Walz have taken part in their first, and likely only, debate of the 2024 US election. There were heated moments discussing January 6th, one muted microphone, and lots of policy ground covered: foreign policy, immigration and abortion rights. Will Vance and Walz’s performances help or hurt Donald Trump o…
  continue reading
 
Ohio Senator and Trump running mate JD Vance faced off with Minnesota Governor and Harris VP pick Tim Walz for the first Vice Presidential debate - and possibly the last debate of the 2024 election cycle. The candidates touched on key topics such as foreign policy, climate change, and immigration. Walz opened with sharp criticism toward Donald Trum…
  continue reading
 
The Linux remote code execution flaw The CRUCIAL importance of Domain Control Security Roskomnadzor strikes a discordant note VLC gets a security update Tor and Tails Merge Telegram changes its long-standing "zero cooperation" policy Enshittification Bobiverse book 5 Windows 10 notifications Experian woes Nuevomailer SpinRite Peter F. Hamilton Reca…
  continue reading
 
The Linux remote code execution flaw The CRUCIAL importance of Domain Control Security Roskomnadzor strikes a discordant note VLC gets a security update Tor and Tails Merge Telegram changes its long-standing "zero cooperation" policy Enshittification Bobiverse book 5 Windows 10 notifications Experian woes Nuevomailer SpinRite Peter F. Hamilton Reca…
  continue reading
 
In this edition of Snake Oilers we hear pitches from three security vendors: Sandfly Security: An agentless Linux security platform that actually sounds very cool Permiso: An identity security platform founded by ex FireEye folks Wiz: The cloud security giant is getting in on code security scanning You can watch this edition of Snake Oilers on YouT…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
Are the frequent stories about data breaches in the news making us desensitized? 🗞️ 📈 On today's episode, friend-of-the-show Troy Hunt reveals how we can combat data breach fatigue and reflects on how the landscape of cyberattacks has changed over the past 10 years of Have I Been Pwned. Plus, we lift the lid on all the latest security news in Watch…
  continue reading
 
Western North Carolina is enduring full-blown catastrophe. In the wake of Hurricane Helene, towns have been destroyed, roads have been washed out, people are frantically trying to locate loved ones, and dozens have died. Enter Donald Trump, who just declared that the federal government—and Democratic governor Roy Cooper—are deliberately neglecting …
  continue reading
 
Scott Galloway and Jessica Tarlov preview the much-anticipated VP debate between J.D. Vance and Tim Walz. They also break down Kamala Harris's recent trip to the U.S.-Mexico border and the federal indictment of NYC Mayor Eric Adams over bribery allegations. Then, former Maryland Governor Larry Hogan joins the show for a candid conversation on the R…
  continue reading
 
MMA star Israel Adesanya joins the show and they open by talking about how Adam won $10k betting on one of his fights, his path back to the UFC middleweight title, fighting Dricus Du Plessis, and optimizing his training diet. Then, they talk about the size of UFC purses, a man challenging him to a street fight in New Zealand, why Izzy would be a go…
  continue reading
 
T-Mobile data breaches cost company $31.5 million Iranian hackers charged for targeting 2024 U.S. election Deepfake scam hits U.S. senate Huge thanks to our sponsor, SpyCloud Did you know that infostealer malware can be a precursor to ransomware? Infostealers are a trending tactic used by cybercriminals to exfiltrate valuable identity data like cre…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
Loading …

Gyors referencia kézikönyv