Security δημόσια
[search 0]
Περισσότερα
Download the App!
show episodes
 
Artwork
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
SecurityMetrics Podcast

SecurityMetrics

Unsubscribe
Unsubscribe
Μηνιαία
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Artwork

1
Open Source Security Podcast

Josh Bressers & Kurt Seifried

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
  continue reading
 
Artwork

1
Web security news (ベライゾン)

ベライゾンジャパン

Unsubscribe
Unsubscribe
Μηνιαία
 
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。 企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Solutions Executive Security 森マークがお届けします。 みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message 2024年interfm「The Dave Fromm Show」初出演は2月16日(金)16:30頃~です。 是非お聴きください!
  continue reading
 
Artwork

1
The SecurityANGLE

SiliconANGLE

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
In this episode of The #SecurityANGLE, Shelly Kramer, managing director and principal analyst at #theCUBEResearch, is joined by Jo Peterson, VP of cloud and security services at #Clarify360 and a member of #theCUBECollective community of independent analysts. Check out theCUBE for the latest in enterprise tech https://siliconangle.com/category/cube-event-coverage/
  continue reading
 
Artwork

1
Application Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Artwork

1
Business Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Artwork

1
The 443 - Security Simplified

Secplicity

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
  continue reading
 
Artwork

1
Security This Week

Carl Franklin

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
  continue reading
 
Artwork

1
Ubuntu Security Podcast

Ubuntu Security Team

Unsubscribe
Unsubscribe
Μηνιαία+
 
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
Artwork

1
Security Today Podcast

Security Today Podcast

Unsubscribe
Unsubscribe
Μηνιαία+
 
Security Today is a podcast centered around physical security and the security industry. From articles to philosophies to trending topics, Baer leads you down the info hole of Security Today. @unclebaer_ on IG and Twitter @securitytodaypodcast on IG Brought to you by @sprinterdatacom on IG
  continue reading
 
Artwork
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

Unsubscribe
Unsubscribe
Μηνιαία+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
Artwork

1
Security Unfiltered

Joe South

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

Unsubscribe
Unsubscribe
Μηνιαία
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

Unsubscribe
Unsubscribe
Μηνιαία
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
Mostly Security

Jon King and Eric Wuehler

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
Jon and Eric have worked in the security space as developers, architects and leaders for more years than they care to count. From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Εβδομαδιαία
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Security-Insider

Peter Schmitz und Dirk Srocke

Unsubscribe
Unsubscribe
Μηνιαία
 
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
  continue reading
 
Loading …
show series
 
This week, Tyler and Adrian discuss Cyera's $300M Series C, which lands them a $1.4B valuation! But is that still a unicorn? Aileen Lee of Cowboy Ventures, who coined the term back in 2013, recently wrote a piece celebrating the 10th anniversary of the term, and revisiting what it means. We HIGHLY recommend checking it out: https://www.cowboy.vc/ne…
  continue reading
 
In this deep and incisive study, General David Petraeus, who commanded the US-led coalitions in both Iraq, during the Surge, and Afghanistan and former CIA director, and the prize-winning historian Andrew Roberts, explore over 70 years of conflict, drawing significant lessons and insights from their fresh analysis of the past. Drawing on their diff…
  continue reading
 
You've decided it's time to level up your security by using 1Password. Listen now to learn a few key principles to make that journey smoother. If you run into troubles, please let us help. We'd also love to hear your victories. Come join us inside the IHP Academy! You can sign up for notifications of new podcast episodes by clicking here. 1Password…
  continue reading
 
Overview This week we cover the recent reports of a new local privilege escalationexploit against the Linux kernel, follow-up on the xz-utils backdoor from lastweek and it’s the beta release of Ubuntu 24.04 LTS - plus we talk securityvulnerabilities in the X Server, Django, util-linux and more. This week in Ubuntu Security Updates 76 unique CVEs ad…
  continue reading
 
Palo Alto Networks fixes several DoS vulnerabilities in PAN-OS operating system Sisense breach exposes customers to potential supply chain attack Threat actors gaming GitHub Search Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for…
  continue reading
 
BatBadBut: You can't securely execute commands on Windows https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/ FortiClient Linux Remote Code Execution https://www.fortiguard.com/psirt/FG-IR-23-087 Apple Threat Notifications and Protecting Against Mercenary Spyware https://support.apple.com/en-us/102174 New Tech…
  continue reading
 
This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Troy Hunt. Troy is an Australian Microsoft Regional Director and MVP for Developer Security. He's known for his expertise in web security, as well as his creation of 'Have I Been Pwned?' He's a prolific author for Pluralsight, a sought-after speaker at glo…
  continue reading
 
In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more …
  continue reading
 
Jim joins the Security Weekly crew to discuss all things supply chain! Given the recent events with XZ we still have many topics to explore, especially when it comes to practical advice surrounding supply chain threats. Ahoi new VM attacks ahead! HTTP/2 floods, USB Hid and run, forwarded email tricks, attackers be scanning, a bunch of nerds write s…
  continue reading
 
This week, Alan and Quinta were joined again by Brookings Senior Fellow and Lawfare Senior Editor Molly Reynolds to talk over the week’s national security news, including: “The 702nd Time’s the Charm?” Section 702 of the Foreign Intelligence Surveillance Act was originally set to expire on December 31, 2023. But somehow, Congress has managed to kee…
  continue reading
 
The good, the bad and the ugly of mobile device security in the expanding OT attack landscape. Included in the challenges associated with securing an ever-expanding OT attack surface is the role played by the increasing use of mobile devices – at both the enterprise and individual level. In fact, according to a recent report from Imprivata, only 46…
  continue reading
 
"The Room Where it Happens" is a Security Today Podcast segment where industry leaders share their history, their insights and their predictions of the future of security! This episode was a fun one! Where we got to sit down with Lindsay Martin-Nez. She has been in security for quite a while and managed to display her value by being the CEO of Badg…
  continue reading
 
It’s undeniable today that 9/11 had changed the global geopolitical scene, and the constant churn of complex threats coming inside and outside the U.S. is creating new physical and cyber threats manufacturers must start accounting for. Fred Burton, Executive Director of Protective Intelligence at Ontic and one of the world’s foremost authorities on…
  continue reading
 
Out-of-support DLink NAS devices contain hard coded backdoor credentials Privnote is not so "Priv" Crowdfense is willing to pay millions Engineers Pinpoint Cause of Voyager 1 Issue, Are Working on Solution SpinRite Update Minimum Viable Secure Product Show Notes - https://www.grc.com/sn/SN-969-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download …
  continue reading
 
What is it like to build a successful business based on risk? In this episode Ashish spoke to Fredrick Lee, CISO at Reddit. FLee shared his deep insights into the essential role of risk in driving business success and innovation. With a career that spans across notable tech giants like Square (now Block), Twilio, and Gusto, Lee brings a wealth of e…
  continue reading
 
In this episode of The Security Repo podcast, we dive deep into the evolving landscape of security within software development with our guest, Rachel Stephens, a senior analyst at RedMonk. Rachel sheds light on the broader implications of the "shift left" movement, emphasizing the integration of security practices throughout the entire software dev…
  continue reading
 
We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software devel…
  continue reading
 
In this episode of the Blue Security Podcast, Andy Jaw and Adam Brewer discuss two main topics: the importance of managed devices for improving security posture and the bundling of security solutions in Microsoft licensing. They highlight the shift towards requiring Intune and Azure AD joined devices for improved device management and security. The…
  continue reading
 
In this week’s Memory Safe episode, Sherrod DeGrippo of Microsoft talks about her first experiences with hacker culture, why a Stanley Kubrik movie shows a glimpse of what AI is, and how she makes sure that “threat intelligence hits the right note.”Από τον Decipher
  continue reading
 
In this discussion, we focus on vendor/tool challenges in infosec, from a security leader's perspective. To quote our guest, Ross, "running a security program is often confused with shopping". You can't buy an effective security program any more than you can buy respect, or a black belt in kung fu (there might be holes in these examples, but you ho…
  continue reading
 
Die in den xz-Tools platzierte Backdoor hat entlarvt, auf welch wackeligen Füßen digitale Infrastrukturen und IT-Security tatsächlich stehen. Ähnlich gelagerte Manipulationen sind lediglich eine Frage der Zeit und „Open-Source“-Lösungen per se kein Allheilmittel gegen Angriffe auf die Software-Lieferkette. Was das in Zukunft für Zulieferer und Anwe…
  continue reading
 
When Shauli stepped out of the army and into the world of engineering, little did he know that his love for math and physics would catapult him into the tech stratosphere. Our latest episode features Shauli's riveting journey as he navigates from algorithms engineering to the forefront of cybersecurity and beyond. His experiences reveal how a mix o…
  continue reading
 
Josh and Kurt talk about a new FCC program to provide a cybersecurity certification mark. Similar to other consumer safety marks such as UL or CE. We also tie this conversation into GrapheneOS, and what trying to claim a consumer device is secure really means. Some of our compute devices have an infinite number of possible states. It's a really wei…
  continue reading
 
Eric gets back home from vacation and Jon (tries to) defy range anxiety in his new car. Google has a proposed settlement for their harvesting of incognito browsers and the big AT&T breach has 'encrypted' PINs but are easily reversed. The first Neuralink transplant recipient pulls an all nighter playing Civ6, and we (may) have a record number of bee…
  continue reading
 
Today’s episode is all about writing reports in Sysreptor. It’s awesome! Main takeaways: The price is free (they have a paid version as well)! You can send findings and artifacts directly to the report server using the reptor Python module Warning: Sysreptor only exports to PDF (no Word version option!) Sysreptor has helped us write reports faster …
  continue reading
 
In this episode of the SecurityANGLE, host Shelly Kramer, managing director and principal analyst at theCUBE Research, is joined by fellow analyst, engineer, and member of theCUBE Collective community for a conversation exploring generative AI, security, and law firm readiness for Microsoft 654 Copilot with Jason Thomas. Thomas is the CIO at Cole, …
  continue reading
 
https://youtu.be/0860ZmM1vgEThis week on the podcast, we cover a software supply chain attack years in the making that was days away from a devastating global impact. After that, we cover Facebook's Project Ghostbusters and its impact on user privacy before ending with another software supply chain attack that successfully compromised developers in…
  continue reading
 
On this gripping episode of Security on Tap, we undertake a detailed exploration of the recent, impactful cybersecurity incident at Change Healthcare. We outline the events that unfolded on February 21st when Change Healthcare became the latest casualty of Black Cat/Alf V's sinister ransomware service. We shed light on the monumental repercussions …
  continue reading
 
ランサムウェア被害にあった場合、かかるお金は身代金だけではありません。 今回はハッカー集団の身代金の決め方や、実際の被害事例を交えて解説していきます。 大切なのは、企業の「報・連・相」! メッセージメッセージフォームからご意見、ご質問ぜひお待ちしております。 https://form.audee.jp/websecurity/messageΑπό τον ベライゾンジャパン
  continue reading
 
In this exclusive fireside chat, SecurityWeek editor-at-large Ryan Naraine interviews Abhishek Arya, Director of Engineering on Google’s open source and supply chain security teams. We cover the evolving landscape of Software Supply Chain security, highlighting key advancements, challenges, research priorities, and much more. Session recoredef for …
  continue reading
 
(NSFW) Three AI-generated guests rank cryptography things into a tier list. Play along at home and make your own tier list: https://tiermaker.com/create/cryptography-15683166 This episode is definitely not safe for work and definitely a parody. Do not base your decision in the 2024 election off of this podcast episode. No campaigns have endorsed th…
  continue reading
 
Loading …

Οδηγός γρήγορης αναφοράς