Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
A weekly podcast from AlertsUSA, Inc summarizing content from the National Threat and Incident Notification Service for Mobile Devices.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
World-renowned aviation-industry consultants and former NTSB investigators John Goglia and Greg Feith have 100 years of worldwide aviation safety experience between them. In this hard-hitting podcast series they talk about everything aviation -- from the behind-the-scenes facts on deadly air crashes to topics of interest such as tips and tricks for navigating through airports and security, traveling with infants and children, unruly passengers, and packing your bags to ease through security.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Discussion about Incident Response topics, Malware, Blue Team, Detection, Logging, Forensics, and catching the bad actors
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Bring Your Own Security Radio started in 2016 and has been going strong since. Hosted by Dave Howard, we dive into topics around IT Security. Backed by his CISSP, CEH, MCSE-Cloud, Incident Handling, Encryption and CCNA certifications and a 22 year (and still going) career in IT, you can be sure to find a wide range of topics.
…
continue reading
Loose Leaf Security is a podcast about making good computer security practice for everyone. We believe you don't need to be a software engineer or security professional to understand how to keep your devices and data safe. In every episode, we tackle a typical security concern or walk you through a recent incident.
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
The Forensic Lunch! The one hour, mostly, live digital forensics and incident response focused video cast and podcast.
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
An Emergency Management Podcast. I'm Daniel Jacobs. A work for the Washington State Department of Corrections. I teach Emergency Management in the Prison Division. I have a BA in Emergency and Disaster Management and I am currently working on my MA in Homeland Security. This podcast is only for fun and self-development/improvement. It's my new hobby.
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading
The Castlerea Cybercast, hosted by Austin Farrell and Josh Hawk, brings you the latest news and information from the world of cybersecurity. From ways to protect yourself and your business to news about upcoming changes in the world of cyber, and interviews with industry leaders we have it all right here.
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Roughly once every 37 seconds, someone on earth falls victim to Cyber Crime. At least, that's what our most recent google search indicated. It's difficult to rationalize just how large the internet is, and can be even harder to truly understand just how important it is to stay safe in such a hostile environment. If nothing else, The Incident Handler's Guide to the Galaxy aims to equip its listeners with tools and real-world stories, offering a deeper dive into current events, tips, tricks an ...
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
COMING SOON. A supernatural workplace comedy—no, really, we mean it this time—made by Three-Eyed Frog Presents. It's not easy being an Archivist, especially when your boss only speaks in cryptic monologues, but we're all one big happy family here. Right? Oh, put that tape recorder down. You don't want HR to have to write this up, and neither do they. New episodes every other Wednesday.
…
continue reading
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1785: Chill Chill Security - วิธีลดความเสี่ยงจาก Snowflake incident
10:25
10:25
Mais Tarde
Mais Tarde
Listas
Like
Curtido
10:25
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant
30:07
30:07
Mais Tarde
Mais Tarde
Listas
Like
Curtido
30:07
Guests: Omar ElAhdan, Principal Consultant, Mandiant, Google Cloud Will Silverstone, Senior Consultant, Mandiant, Google Cloud Topics: Most organizations you see use both cloud and on-premise environments. What are the most common challenges organizations face in securing their hybrid cloud environments? You do IR so in your experience, what are to…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 5 - NIST SP 800-61 Computer Security Incident Handling Guide (Post-Incident Activity)
31:45
31:45
Mais Tarde
Mais Tarde
Listas
Like
Curtido
31:45
Send us a Text Message. This is the biggest episode from a content perspective so far. I'm excited to share it with you. Episode Highlights: How to run post-incident debriefs and post-mortems. Involving external teams Using lessons learned to form actionable insights. Key questions to address in incident analysis. Effective report writing strategie…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Vinnie Liu on Offensive Security Testing During Incidents
29:30
29:30
Mais Tarde
Mais Tarde
Listas
Like
Curtido
29:30
Bishop Fox CEO and Cofounder Vinnie Liu joins the Nexus Podcast to discuss his team's role during security incidents in conducting offensive security testing alongside incident response activities. In healthcare environments where ransomware is the leading threat, red-teams and other offensive security specialists are called in, Liu said, to ensure…
…
continue reading
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Homeland Security Weekly Update - June 22, 2024
7:30
7:30
Mais Tarde
Mais Tarde
Listas
Like
Curtido
7:30
In this week's update, we look at a new mutual defense pact signed by Russia and North Korea pledging military assistance if either country faces "aggression." The world is changing, and not for the better. You can subscribe to our weekly Threat Journal newsletter by visiting https://www.ThreatJournal.com . A link to this issue will be sent to you …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Homeland Security Weekly Update - June 22, 2024
7:31
7:31
Mais Tarde
Mais Tarde
Listas
Like
Curtido
7:31
In this week's update, we look at a new mutual defense pact signed by Russia and North Korea pledging military assistance if either country faces "aggression." The world is changing, and not for the better. You can subscribe to our weekly Threat Journal newsletter by visiting https://www.ThreatJournal.com . A link to this issue will be sent to you …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1787: Forensic Day - Phishing Analysis (podcast)
7:54
7:54
Mais Tarde
Mais Tarde
Listas
Like
Curtido
7:54
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Mais Tarde
Mais Tarde
Listas
Like
Curtido
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Supporting Ukrainian Electrical Grid Resilience in Wartime
32:19
32:19
Mais Tarde
Mais Tarde
Listas
Like
Curtido
32:19
Joe Marshall is a Senior IoT Security Strategist at Cisco Talos Intelligence Group. When Russia invaded Ukraine in 2022, Joe helped coordinate a multinational, multi-company coalition of volunteers and experts to find a technological solution. Bryson and Joe sat down to discuss his efforts in Ukraine, how he got the go-ahead from Cisco leadership, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Mais Tarde
Mais Tarde
Listas
Like
Curtido
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Everything we know about denial-of-service attacks in 2024
10:10
10:10
Mais Tarde
Mais Tarde
Listas
Like
Curtido
10:10
You may think a DDoS attack is so early aughts. But some of the largest attacks of this type have occurred in just the past few years. Talos recently updated our advice for how to best mitigate and prepare for this threat, so Aliza Johnson from Talos' Threat Intelligence & Interdiction team joins the show this week to discuss her recent findings an…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1786: Chill Chill Security - GitHub Copilot Chat- From Prompt Injection to Data Exfiltration
5:44
5:44
Mais Tarde
Mais Tarde
Listas
Like
Curtido
5:44
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Mais Tarde
Mais Tarde
Listas
Like
Curtido
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo
24:50
24:50
Mais Tarde
Mais Tarde
Listas
Like
Curtido
24:50
Send us a Text Message. In this episode, we speak with Phil Ngo, a Primary Investigator in Accenture's global cyber response team. As a primary investigator, he is responsible for helping clients recover from major incidents as well as delivering proactive cyber services, such as threat hunting and tabletop exercises. Philip started his career as a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Dave Aitel - PSW Vault
1:29:24
1:29:24
Mais Tarde
Mais Tarde
Listas
Like
Curtido
1:29:24
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Missing Equipment and Inexperience Lead to Plane Crash - Episode 226
22:29
22:29
Mais Tarde
Mais Tarde
Listas
Like
Curtido
22:29
Missing equipment and inexperience led to a plane crash that killed 3. Precipitation, turbulence, and icing were factors in the crash of a Piper PA-30 Comanche in Oklahoma. The pilot did not have an instrument certification and was not able to handle the conditions. The pilot had a private pilot and multiengine rating but did not have instrument tr…
…
continue reading
In this interview, we speak with Mac Munsayac, Head of Customer Experience at Philippine Airlines, to explore the transformative role of AI in the aviation industry. Mac elaborates on the integration of generative AI and tools to enhance customer interactions by providing personalized, proactive, and frictionless experiences, especially in scenario…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1784: Chill Chill Security - CVE-2018-18778
4:46
4:46
Mais Tarde
Mais Tarde
Listas
Like
Curtido
4:46
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Back To School: Networking 101 - SWN Vault
26:29
26:29
Mais Tarde
Mais Tarde
Listas
Like
Curtido
26:29
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lift As You Climb with Adamaka Ajaelo from Self-eSTEM
56:19
56:19
Mais Tarde
Mais Tarde
Listas
Like
Curtido
56:19
How can we foster diversity and champion inclusivity in the cybersecurity industry? And how do we support and encourage more BIPOC women and girls to get into tech? Our final episode of the season invites Self-eSTEM founder, Adamaka Ajaelo, to have this important and inspiring conversation with 1Password Founder Sara Teare. 🗣 We also dissect what l…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1783: Security Vocabulary - BAU (Business As Usual)
2:43
2:43
Mais Tarde
Mais Tarde
Listas
Like
Curtido
2:43
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Zero Trust Is Not A SKU - Saša Zdjelar - BSW Vault
32:47
32:47
Mais Tarde
Mais Tarde
Listas
Like
Curtido
32:47
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Betania Allo: Using Cyber Policy to Mitigate Risk
37:56
37:56
Mais Tarde
Mais Tarde
Listas
Like
Curtido
37:56
Betania Allo is a distinguished expert in cybersecurity law and public policy and frequently presents at international forums and events. She boasts an impressive academic background with advanced degrees from Harvard University and Syracuse University. Currently, she is pursuing a doctorate in engineering with a focus on analytics at George Washin…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Decentralizing Decision Making with Shawna Martell & Dan Fike
38:43
38:43
Mais Tarde
Mais Tarde
Listas
Like
Curtido
38:43
In this episode, Thomas Betts talks with Shawna Martell and Dan Fike, about the Navigators program at Carta and how they are finding ways to decentralize decisions and empower individual contributors. The quality of technical decisions is improved, and decisions are reached more quickly because the people involved are close to the relevant context.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1782: Soft Skill day - เหตุผลทำไม GenZ และ Millenial ถึงยอมไม่เติบโต
4:26
4:26
Mais Tarde
Mais Tarde
Listas
Like
Curtido
4:26
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
As Vice President and CTO, Solutions, for Salesforce ASEAN, Gavin Barfield leads a team of Salesforce engineers across the region to develop and drive integrated technology solutions for Salesforce customers. Gavin works closely with customers in ASEAN on their digital transformations, bringing together the full value of the Salesforce platform to …
…
continue reading
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Homeland Security Weekly Update - June 15, 2024
7:30
7:30
Mais Tarde
Mais Tarde
Listas
Like
Curtido
7:30
In this week's update, we look at a new Islamic State (ISIS-K) propaganda poster calling for lone wolf attacks on infidels and apostates. We also look at a related story about the arrest of eight Tajik nationals across three US cities, each of whom entered the country illegally and is believed to have ties to ISIS-K. You can subscribe to our weekly…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Homeland Security Weekly Update - June 15, 2024
7:31
7:31
Mais Tarde
Mais Tarde
Listas
Like
Curtido
7:31
In this week's update, we look at a new Islamic State (ISIS-K) propaganda poster calling for lone wolf attacks on infidels and apostates. We also look at a related story about the arrest of eight Tajik nationals across three US cities, each of whom entered the country illegally and is believed to have ties to ISIS-K. You can subscribe to our weekly…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1780: Forensic Day - Ashley Madison Incident
13:31
13:31
Mais Tarde
Mais Tarde
Listas
Like
Curtido
13:31
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi - ESW #365
2:41:25
2:41:25
Mais Tarde
Mais Tarde
Listas
Like
Curtido
2:41:25
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Trust in Microsoft, Apple, and the Holy AI, Moonstone Sleet, Cheating, Joshua Marpet - SWN #393
34:13
34:13
Mais Tarde
Mais Tarde
Listas
Like
Curtido
34:13
Trust in Microsoft, Apple, and the Holy AI, Amen, Moonstone Sleet, Cheating, Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-393
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What is the future of security operations with AI in 2024?
23:09
23:09
Mais Tarde
Mais Tarde
Listas
Like
Curtido
23:09
How can AI impact Cloud Security Operations? Ashish sat down with Ely Kahn, VP of Cloud Security and AI at SentinelOne to talk about the evolving landscape of cloud security and the future of Security Operations Centers (SOC). Ely spoke about the shift from centralized to decentralized SOC operations, the increasing complexity in cloud security and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
GenAI, Security, and More Lies - Aubrey King - PSW #832
2:54:18
2:54:18
Mais Tarde
Mais Tarde
Listas
Like
Curtido
2:54:18
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
…
continue reading
Anna Bennett, one of Talos' threat hunters, joins the show this week to talk about one of her recent findings — the LilacSquid APT. This is a newly discovered threat actor that Talos found hiding on networks for months and years at a time, silently stealing sensitive information the entire time. Anna discusses LilacSquid's activities, potential mot…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1779: Chill Chill Security - Patch Tuesday - June 2024
4:18
4:18
Mais Tarde
Mais Tarde
Listas
Like
Curtido
4:18
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1778: Chill Chill Security - CVE-2024-4577
6:32
6:32
Mais Tarde
Mais Tarde
Listas
Like
Curtido
6:32
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Fourth Incident for Hughes 369 Helicopter Proves Fatal - Episode 225
30:32
30:32
Mais Tarde
Mais Tarde
Listas
Like
Curtido
30:32
The fatal crash of Hughes 369 helicopter being used to trim trees has a backstory that gives insight into what went wrong. This workhorse of a helicopter apparently had damage from previous incidents. The NTSB investigation found cracks in an engine mount that were likely present before the crash. John Goglia and Todd Curtis look beyond the fatal a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MSRC VP Tom Gallagher on 25 Years of Security at Microsoft
31:38
31:38
Mais Tarde
Mais Tarde
Listas
Like
Curtido
31:38
Tom Gallagher, VP of Engineering and head of MSRC, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. After nearly 25 years at Microsoft, Tom reflects on his early days at the company, where he started as a penetration tester on SharePoint, offering insights into the evolving landscape of cybersecurity since 1999. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1777: Chill Chill Security - Bypassing EDR NTDS.dit protection using BlueTeam tools
4:18
4:18
Mais Tarde
Mais Tarde
Listas
Like
Curtido
4:18
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Buzz Aldrin, the Gray Lady, Veeam, Microsoft squared, Nvidia, Josh Marpet... - SWN #392
32:23
32:23
Mais Tarde
Mais Tarde
Listas
Like
Curtido
32:23
Buzz Aldrin, the Gray Lady, Veeam, Microsoft squared, Nvidia, Hardware, Pentests, Josh Marpet, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-392
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Master Class: How to Spot AI-Generated Content | A Conversation with Michele Stuart | The Soulful CXO Podcast with Dr. Rebecca Wynn
31:01
31:01
Mais Tarde
Mais Tarde
Listas
Like
Curtido
31:01
Guest: Michele Stuart, CEO, Keynote Speaker, OSINT Trainer, JAG Investigations Website: https://www.jaginvestigations.com/ LinkedIn: https://www.https://www.linkedin.com/in/michele-stuart-jag Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ This Epis…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Microsoft Recall's Security & Privacy, Hacking Web APIs, Secure Design Pledge - ASW #288
38:36
38:36
Mais Tarde
Mais Tarde
Listas
Like
Curtido
38:36
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-288…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP1776: Security Vocabulary - PHP Type Juggling
10:00
10:00
Mais Tarde
Mais Tarde
Listas
Like
Curtido
10:00
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The State of the Cybersecurity Market, At Least According to Gartner - Vivek Ramachandran, Carl Froggett, Padraic O'Reilly - BSW #353
1:04:11
1:04:11
Mais Tarde
Mais Tarde
Listas
Like
Curtido
1:04:11
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP176 Google on Google Cloud: How Google Secures Its Own Cloud Use
27:00
27:00
Mais Tarde
Mais Tarde
Listas
Like
Curtido
27:00
Guest: Seth Vargo, Principal Software Engineer responsible for Google's use of the public cloud, Google Topics: Google uses the public cloud, no way, right? Which one? Oh, yeah, I guess this is obvious: GCP, right? Where are we like other clients of GCP? Where are we not like other cloud users? Do we have any unique cloud security technology that w…
…
continue reading