Secure Podcast openbaar
[search 0]
Meer
Download the App!
show episodes
 
Artwork
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Hacked

Hacked

Unsubscribe
Unsubscribe
Maandelijks+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Artwork
 
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Wekelijks+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Ubuntu Security Podcast

Ubuntu Security Team

Unsubscribe
Unsubscribe
Maandelijks+
 
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
Artwork

1
Caveat

N2K Networks

Unsubscribe
Unsubscribe
Wekelijks
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Wekelijks
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
  continue reading
 
Artwork

1
EverydaySpy Podcast

Andrew Bustamante

Unsubscribe
Unsubscribe
Maandelijks+
 
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
  continue reading
 
Artwork

1
No Such Podcast

National Security Agency (NSA)

Unsubscribe
Unsubscribe
Wekelijks
 
No Such Podcast pulls back the curtain on the National Security Agency. NSA’s very existence used to be classified, leading to its nickname, “No Such Agency.” Now, we’ve got stories to tell, and they just might surprise you! Hear from everyone at NSA, from senior leaders down to new hires, talk about what it’s really like to work at one of the most secretive agencies in the government.
  continue reading
 
Sharyl Attkisson is a nonpartisan investigative journalist, five-time Emmy Award winner and recipient of the Edward R. Murrow award for investigative reporting. She is the New York Times bestselling author of "The Smear," "Stonewalled," "Slanted," and "Follow the Science." She is managing editor of the Sun. morning national TV news program “Full Measure with Sharyl Attkisson.” Find out why her podcasts and Tedx talks have received many millions of views. Do your own research. Make up your ow ...
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

Unsubscribe
Unsubscribe
Maandelijks
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2024 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Practical Positivity is a weekly podcast hosted by Sophie Cliff (aka The Joyful Coach). Each week she shares tips on how you can squeeze more joy out of your everyday, attitude hacks that will help you feel more confident and secure, and a whole load of practical positivity. Like what you hear? Don’t forget to subscribe!
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

Unsubscribe
Unsubscribe
Maandelijks
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

Unsubscribe
Unsubscribe
Dagelijks
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Open Source Security Podcast

Josh Bressers & Kurt Seifried

Unsubscribe
Unsubscribe
Wekelijks
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
  continue reading
 
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
  continue reading
 
Artwork
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Artwork

1
ITSPmagazine Podcasts

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Dagelijks
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
Artwork
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

Unsubscribe
Unsubscribe
Wekelijks
 
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
  continue reading
 
Welcome to The Secure Love Podcast: Real Time Couples Therapy with Julie Menanno. Julie Menanno is a licensed therapist dedicated to helping couples build secure, lasting connections using Emotionally Focused Therapy (EFT). In each episode, Julie works with a real couple in their 30s, Melissa and Drew, and just like many of us, they are navigating life's challenges, raising kids, managing busy careers, and working on their relationship. Join us to explore the depths of attachment theory and ...
  continue reading
 
Artwork
 
Forrest Hanson is joined by clinical psychologist Dr. Rick Hanson and a world-class group of experts to explore the practical science of lasting well-being. Conversations focus on the key insights from psychology, science, and contemplative practice that you need to build reliable inner strengths, overcome your challenges, and get the most out of life. New episodes every Monday.
  continue reading
 
Loading …
show series
 
Phishing Page Delivered Through a Blob URL https://isc.sans.edu/diary/Phishing%20Page%20Delivered%20Through%20a%20%20Blob%20URL/31350 Fortinet Fortigate CVE 2024-23113 deep dive https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/ This New Supply Chain Attack Technique Can T…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Windows PPTP and L2TP Deprecation https://techcommunity.microsoft.com/t5/windows-server-news-and-best/pptp-and-l2tp-deprecation-a-new-era-of-secure-connectivity/ba-p/4263956 BIG-IP LTM Systems Unencrypted Cookie Exploitation https://www.cisa.gov/news-events/alerts/2024/10/10/best-practices-configure-big-ip-ltm-systems-encrypt-http-persistence-cooki…
  continue reading
 
Josh and Kurt talk about the current Wordpress / WP Engine mess. In what is certainly a supply chain attack, the Advanced Custom Fields forking. This whole saga is weird and filled with chaos and stupidity. We have no idea how it will end, but we do know that the blog platform you use shouldn't be this exciting. The bad sort of exciting. Show Notes…
  continue reading
 
From September 14, 2023: It’s been another brutal summer with seemingly constant natural disasters precipitated by climate change. The United States and other countries have rightfully begun thinking of climate change as a security issue. But extreme weather is not the only challenge we must contend with. There’s also the problem of climate change’…
  continue reading
 
Episode 282: Exploiting Trust in Cybersecurity Practices In episode 282 of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kallett discuss several cybersecurity topics. They highlight a phishing attack outlined by Microsoft, where cybercriminals leverage file-hosting services like OneDrive and Dropbox to exploit trust and compromise ide…
  continue reading
 
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
  continue reading
 
It’s 3 a.m. A war has broken out halfway across the world. Someone needs to tell the President. Who provides the information that they need to know? The National Security Operations Center at NSA. Since its founding 50 years ago, NSOC has never closed. Every hour of every day, it monitors foreign developments and keeps our nation’s leaders informed…
  continue reading
 
Collective mobilisation is needed for an adequate response to climate change. How do we get there? How does climate change affect militaries? What role can technology play in mitigating the risks? What challenges does federalism pose in the effort to address climate change? In this episode, Tom Middendorp, Chris Barrie, Cheryl Durrant, and Sophie L…
  continue reading
 
In this episode of The Secure Love Podcast, Julie explores the challenges Melissa and Drew face during their anniversary trip. Despite overall enjoyment, the couple encounters difficulties in connecting, highlighting the complexities of transitioning from daily responsibilities to relaxation. Melissa struggles to unwind and feels disconnected from …
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Eduardo Ortiz, vp, global head of cybersecurity, Techtronic Industries. Joining us is Adam Fletcher, CSO, Blackstone. In this episode: Keeping our eyes on new risks The hiring disconnect Mental h…
  continue reading
 
In this episode Michael and Sarah talk to Nestori Syynimaa about Entra ID security and his purple-team tool, AADInternals. We also cover the latest security news about Secure Future Initiative (SFI), MFA for Azure Portal, Playright, WordPress, NSG, Bastion, Azure Functions, MS Ignite, App Service, Defender for Cloud, Containers, Azure Monitor, AKS,…
  continue reading
 
Overview For the first in a 3-part series for Cybersecurity Awareness month, LuciStanescu joins Alex to discuss the recent CUPS vulnerabilities as well as theevolution of cybersecurity since the origin of the internet. Get in contact security@ubuntu.com #ubuntu-security on the Libera.Chat IRC network ubuntu-hardened mailing list Security section on…
  continue reading
 
Guests: Dan Nutkis, Founder and Chief Executive Officer of HITRUST On LinkedIn | https://www.linkedin.com/in/daniel-nutkis-339b93b/ Robert Booker, Chief Strategy Officer at HITRUST On LinkedIn | https://www.linkedin.com/in/robertbooker/ Omar Khawaja, CISO, Client at Databricks On LinkedIn | https://www.linkedin.com/in/smallersecurity/ Cliff Baker, …
  continue reading
 
CJ Cox, Chief Operating Officer at Black Hills Information Security is our feature interview this week, interviewed by Frank Victory. News from Sundance Film, Valhallan, Red Canary, Optiv and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Col…
  continue reading
 
I decided to talk this week about the Importance of Secure Coding Knowledge for Security Incident Response Investigations. Knowing secure coding principles helps identify the root causes of vulnerabilities and recognize attack patterns. It facilitates effective communication and collaboration with developers, ensuring accurate incident reports and …
  continue reading
 
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
  continue reading
 
Loading …

Korte handleiding