show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Co tydzień
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Co tydzień
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Co tydzień
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Miesięcznie
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
ITSPmagazine Podcast Network

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Codziennie
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
The Packet Pushers Podcast Network offers continuous professional development for IT professionals. Keep up with networking, security, cloud, career, and more. We bring the IT community together--engineers, architects, vendors, developers, educators, etc. In this feed, listen to every conversation we record!
  continue reading
 
Artwork

1
web3 with a16z crypto

a16z crypto, Sonal Chokshi, Chris Dixon

Unsubscribe
Unsubscribe
Miesięcznie
 
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users -- whether artists, coders, creators, developers, companies, organizations, or communities -- now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. Fro ...
  continue reading
 
Artwork

1
Entangled Things

Entangled Things

Unsubscribe
Unsubscribe
Miesięcznie+
 
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
  continue reading
 
Artwork
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

Unsubscribe
Unsubscribe
Miesięcznie
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
  continue reading
 
Artwork

1
Over The Edge

Caspian Studios

Unsubscribe
Unsubscribe
Miesięcznie+
 
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork

1
Surveillance Report

Techlore & The New Oil

Unsubscribe
Unsubscribe
Co tydzień+
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Adam Pearce and Adam Wignall from Strawberry7 are here to bring you the latest updates about everything that’s happening around Google Workspace. This podcast is also available in video form on our YouTube channel - youtube.com/strawberry7
  continue reading
 
A show that brings you closer to the cutting edge in computer architecture and the remarkable people behind it. Hosted by Dr. Suvinay Subramanian, who is a computer architect at Google in the Systems Infrastructure group, working on designing Google’s machine learning accelerators (TPU), and Dr. Lisa Hsu who is a Principal Engineer at Microsoft in the Azure Compute group, working on strategic initiatives for datacenter deployment.
  continue reading
 
Uncle Marv’s IT Business Podcast is a show designed for IT professionals and Managed Service Providers. The podcast aims to provide actionable advice and tips that help IT businesses grow and thrive in the competitive tech industry. Each episode covers various topics, from technology updates to marketing strategies, business best practices, and interviews with industry experts.
  continue reading
 
Artwork
 
Hosted by Rick from DALY Computers (www.daly.com), the Technology Pulse podcast takes a look at new and existing technologies that will benefit the SLED (state/local government, education) sector in Maryland and Virginia. Episodes will feature guests from innovative product/service providers, the DALY team, and strategic partners.
  continue reading
 
Loading …
show series
 
A Texas operator of rehab facilities faces multiple lawsuits after a ransomware attack. Microsoft warns Android developers to steer clear of the Dirty Stream. The Feds warn of North Korean social engineering. A flaw in the R programming language has been patched. Zloader borrows stealthiness from ZeuS. The GAO highlights gaps in NASA’s cybersecurit…
  continue reading
 
The future has arrived: 800 gig Ethernet is here. Amit Bhardwaj and Dmitry Shokarev from today’s sponsor, Juniper Networks, join the show to tell us all about Juniper’s 800 gig Ethernet and what we need to know as engineers: use cases, transition plans, fiber and power needs (a lot less than you’d think). We also... Read more »…
  continue reading
 
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Build…
  continue reading
 
The White House’s top cyber official is keen to set minimum cybersecurity standards for industry, put contingencies in place in case cyberattacks are successful, and start looping ordinary people into an effort to make products secure by design.Autor: Recorded Future News
  continue reading
 
Unveiling the Origin Story In a recent brand story episode, Sean Martin and Marco Ciappelli engaged in a compelling conversation with Dror Liwer, shedding light on the inception of CORO. Dror's background as a former CIO of the Israeli military police paved the way for the founding of Coro in 2014, with a mission to bridge the gap in cybersecurity …
  continue reading
 
Wouter Groeneveld, author of The Creative Programmer and PhD researcher at KU Leuven, discusses his research related to programming education with host Jeremy Jung. Topics include evaluating projects, constraints, social debt in teams, common fallacies in critical thinking, maintaining flow state, documenting and retaining knowledge, and creating e…
  continue reading
 
Scans for Stupid Router Vuln; npm xml-crypt Vuln; Cuddlefish; ArubaOS Vuln; https://isc.sans.edu/diary/Scans%20Probing%20for%20LB-Link%20and%20Vinga%20WR-AC1200%20routers%20CVE-2023-24796/30890 Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796 Buffer Overflow Vulnerabilities in ArubaOS https://www.arubanetworks.com/support-servic…
  continue reading
 
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
  continue reading
 
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
  continue reading
 
Guest: Christina Stokes, Host, On Cyber & AI Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast On ITSPmagazine | https://www.itspmagazin…
  continue reading
 
Dropbox’s secure signature service suffers a breach. CISA is set to announce a voluntary pledge toward enhanced security. Five Eyes partners issue security recommendations for critical infrastructure. Microsoft acknowledges VPN issues after recent security updates. LockBit releases data from a hospital in France. One of REvil’s leaders gets 14 year…
  continue reading
 
Today organizations have a large part of their environment outside of their control. They have authentication, email, data, code—some organizations have the majority of their most important assets in cloud and SaaS applications. And yet the security team does not have effective tooling to investigate across this surface. So when a complex breach un…
  continue reading
 
As part of our ongoing series on IPv6 basics, today we cover the differences you should be aware of between ICMPv4 and ICMPv6. Internet Control Message Protocol (ICMP) is the protocol that lets you test reachability: Pings, echoes, TCP connections, etc. We explain what you need to know and why you need to know it,... Read more »…
  continue reading
 
Aembit is the first Workload Identity and Access Management Platform. It discovers, enforces, and audits workload access. By using native identities and short-lived credentials, we eliminate the need for secrets scanning and credential rotation. We let your teams focus on building your software, without worrying about sharing API keys or misusing v…
  continue reading
 
Guests: Edna Conway, CEO, EMC ADVISORS On LinkedIn | https://www.linkedin.com/in/ednaconway On Twitter | https://twitter.com/Edna_Conway At RSAC | https://www.rsaconference.com/experts/edna-conway Andrea Little Limbago, Senior Vice President, Research & Analysis, Interos On LinkedIn | https://www.linkedin.com/in/andrea-little-limbago/ At RSAC | htt…
  continue reading
 
On this episode of Embedded Insiders, Alexander Kain, Skyworks Solutions’ Senior Principal Artificial Intelligence Systems Engineer joins the podcast to discuss his company’s advanced AI noise suppression, designed to reduce noise in a variety of environments and applications. Next, Rich and Vin are back with another Dev Talk joined by Ron Konezny,…
  continue reading
 
Guests: Ed Skoudis, President at SANS Technology Institute [@SANS_EDU] On LinkedIn | https://www.linkedin.com/in/edskoudis/ At RSAC | https://www.rsaconference.com/experts/ed-skoudis Heather Mahalik Barnhart, Faculty Fellow & DFIR Curriculum Lead at SANS, Sr Dir of Community Engagement at Cellebrite [@Cellebrite] On LinkedIn | https://www.linkedin.…
  continue reading
 
Host Paul Roberts speaks with Jim Broome, the CTO and President of MSSP DirectDefense about the evolution of cybersecurity threats and how technologies like AI are reshaping the cybersecurity landscape and the work of defenders and Managed Security Service Providers (MSSP). The post Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape …
  continue reading
 
Guest: Dave DeWalt, Founder & CEO, NightDragon [@nightdragon] On LinkedIn | https://www.linkedin.com/in/ddewalt/ At RSAC | https://www.rsaconference.com/experts/dave-dewalt ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | htt…
  continue reading
 
The show begins with a commercial for the NetAlly EtherScope NXG, a network analyzer that supports Wi-Fi 6 and 6E. Uncle Marv then introduces the episode, mentioning that he has exclusive news to share. However, he quickly realizes that the news he had - Kaseya's announcement of their new Kaseya 365 subscription service - had already been announced…
  continue reading
 
Sean Lardo, the program manager for Pitch It, shares that this year's application process saw a record number of submissions, with a diverse group of vendors applying from various business sectors. While there were concerns about an influx of AI-focused applicants, Lardo notes that the program still attracted a healthy mix of solutions, with AI, cy…
  continue reading
 
The UK Government takes aim at IoT devices shipping with weak or default passwords, an identity thief spends two years in jail after being mistaken for the person who stole his name, and are you au fait with the latest scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graha…
  continue reading
 
Linux Trojan; Denial of Wallet Attack; EU iOS Appstore User Tracking; BentoML Vuln; Linux Trojan - Xorddos with Filename eyshcjdmzg https://isc.sans.edu/diary/Linux%20Trojan%20-%20Xorddos%20with%20Filename%20eyshcjdmzg/30880 AWS S3 Denial of Wallet Amplification Attack https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bil…
  continue reading
 
Guests: Ondrej Nekovar, Director of Cyber Security, Board Member, SPCSS s.p. [@csirtspcss] On LinkedIn | https://www.linkedin.com/in/onekovar/ At RSAC | https://www.rsaconference.com/experts/Ondrej%20Nekovar Jan Pohl, Analyst, SPCSS s.p. [@csirtspcss] On LinkedIn | https://www.linkedin.com/in/jan-pohl-89231a264/ At RSAC | https://www.rsaconference.…
  continue reading
 
A breach at J.P. Morgan Chase exposes data of over 451,000 individuals. President Biden Signs a National Security Memorandum to Strengthen and Secure U.S. Critical Infrastructure. Verizon’s DBIR is out. Cornell researchers unveil a worm called Morris II. A prominent newspaper group sues OpenAI. Marriott admits to using inadequate encryption. A Finn…
  continue reading
 
Today we chat with the maintainers of Nautobot, the open source network source of truth and network automation platform. Jason Edelman, Ken Celenza, John Anderson explain how their day jobs at professional services company, Network to Code, informs their work on Nautobot. They walk us through Nautobot’s core, out-of-the-box capabilities as well as …
  continue reading
 
with @SuccinctJT @samrags_ @moodlezoup @rhhackett Welcome to web3 with a16z, a show about building the next era of the internet by the team at a16z crypto. That includes me, host Robert Hackett. Today's all new episode covers a very important and now fast developing area of technology that can help scale blockchains, but that also has many uses bey…
  continue reading
 
Hey, everyone. Ethan here with a behind-the-scenes administrative request. Several thousand of you subscribe to the Packet Pushers’ Fat Pipe. In the Fat Pipe, we’ve been stuffing every single podcast we produce. The problem is that we produce way too many shows–one almost every weekday–for the average podcast client to absorb them all. We can... Re…
  continue reading
 
Q&A175: Would we recommend Portmaster or NextDNS? Dominos or Papa John's pizza? What are our thoughts on Windows package managers? What are the considerations for third-party Android keyboards? Do we have a favorite Studio Ghibli movie? How do we measure our progress in our privacy journeys and stay on track? Join our next Q&A on Patreon: https://w…
  continue reading
 
Loading …

Skrócona instrukcja obsługi