show episodes
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork
 
Daily analysis of the biggest global security developments, brought to you by military specialists and The Times' renowned foreign correspondents. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork
 
WAR ROOM: Pandemic is the first and most comprehensive program to bring the most up to the minute information on the news of the day. Stephen K. Bannon brings medical experts, politicians, business leaders, and those on the front lines for a comprehensive look at the latest news from all and provide their insider insights.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Artwork

1
Political Fix

Financial Times

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The Financial Times takes you into the corridors of power to unwrap, analyse and debate British politics with a regular lineup of FT correspondents and informed commentators. New episodes available every Friday. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
Battle Lines

The Telegraph

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Across the world, from Europe to Asia, the Americas to the Middle East, tensions are rising between nation states. Traditional alliances and alignments are constantly evolving in the 21st century. An understanding of defence and security policy and the tides of political, social and economic changes is crucial for any informed understanding of our world. 2024 sees war in Europe and Israel, and elections in major economies, including the US, the UK, Taiwan, South Africa, and many others. Insu ...
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Security Noise

TrustedSec

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
Sergei & the Westminster Spy Ring

Carole Cadwalladr & Peter Jukes with Ruth Abrahams

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
  continue reading
 
Artwork

1
Stop the World

Australian Strategic Policy Institute (ASPI)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
  continue reading
 
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
  continue reading
 
Artwork

1
Security Tech Talk

Steve Kenny, Axis Communications

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
  continue reading
 
Artwork

1
The DSR Daily

The DSR Network

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The DSR Daily is a daily news podcast cover the foreign policy and national security news. Each weekday morning, Riley Fessler, Minnah Stein, and David Rothkopf will bring you the latest as covered by the best media outlets from around the world. See acast.com/privacy for privacy and opt-out information.
  continue reading
 
Loading …
show series
 
Register for upcoming webcasts & summits - https://poweredbybhis.com 00:00 - PreShow Banter™ — A Monocle and a Glass of Wine 05:36 - The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21 06:43 - Story # 1: US agency extends support for cyber vulnerability database 29:08 - Story # 1b: CVE Foundation 32:35 - Story # 2: Former cybersecurity agency chi…
  continue reading
 
In this episode of the Unsecurity Podcast, hosts Brad Nigh and Megan Larkins are joined by Melissa Kjendle, Assessor Manager at FRSecure, to recap our recent HERoic Hacks event. Melissa spoke at the event, highlighting the significance of inclusive and diverse perspectives in cybersecurity—particularly focusing on the growing role of women in the f…
  continue reading
 
In this extended Frontline conversation writer and Russia analyst, Mark Galeotti, discusses the latest developments in the war in Ukraine. The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, diplomatic relations and cyber security from The Times' foreign correspondents and military specialists. Watch mo…
  continue reading
 
From April 11, 2022: The period after Watergate and President Nixon's resignation saw an unprecedented barrage of congressional efforts at reforming the executive branch. The period after Donald Trump's departure from office has seen no comparable spree of legislative action—at least not yet. In a recent Lawfare article, Quinta Jurecic and Andrew K…
  continue reading
 
In this extended Frontline conversation, Former British Army Officer Hamish de Bretton-Gordon discusses the latest developments in the war in Ukraine. The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, diplomatic relations and cyber security from The Times' foreign correspondents and military specialis…
  continue reading
 
- Cybersecurity in South Africa: How The Cell C and SABS Attacks Could Have Been Prevented. - Hackers Breach Morocco’s Social Security Database in an Unprecedented Cyberattack. - Kaspersky Flags Surge in Cyber Threats Across Africa in The GITEX Africa April 2025 Conference. - Google Says "Fibre Optic Should Be Considered 'Critical Infrastructure' i…
  continue reading
 
Jonathan was a professor in the Department of Computer Science at the University of Maryland. He is now a Senior Staff Research Scientist at Google, with a core focus on cryptography and cybersecurity. Jonathan received his BS degree in mathematics and chemistry from MIT in 1996, and, in 2002, completed a PhD in computer science from Columbia Unive…
  continue reading
 
From September 16, 2020: What is the proper relationship between the CIA director and the president? How should directors handle arguably illegal orders? How important is the director's role as the nation's honest broker of information during times of crisis? To get at these questions, David Priess sat down with Chris Whipple, a documentary filmmak…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO emeritus, The Carlyle Group Thanks to our show sponsor, Dropzone AI Alert investigation is eating up your security team’s day—30 to 40 minutes per alert adds up fast. Dropzone AI‘s SOC Analyst transforms this rea…
  continue reading
 
Today’s a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibe…
  continue reading
 
In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
  continue reading
 
Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national s…
  continue reading
 
In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
  continue reading
 
As Donald Trump’s envoy Steve Witkoff arrives in Moscow for talks to end the war in Ukraine, a car bomb has killed a high-ranking Russian general, Yaroslav Moskalik. After a string of similar bombings during the course of the war, defence analyst Nick Drummond examines how it was possible, and whether this is a shift to a new guerrilla campaign by …
  continue reading
 
Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
  continue reading
 
Maciej Zurawski is technology entrepreneur and blockchain specialist with over 25 years of experience in commercial software development, R&D and business leadership. He is currently the CEO at Redeem Technologies, and serves as the Executive Director of Blockchain Scotland - the principal industry association advancing commercial blockchain adopti…
  continue reading
 
Ahead of England’s local elections next week, the Political Fix team pick the races to watch and what’s at stake for the main parties, as voters head to the polls to elect 1,600-odd councillors, six mayors and one new MP. Host Lucy Fisher is joined by podcast regulars Miranda Green and Anna Gross, plus the FT’s Northern correspondent Jennifer Willi…
  continue reading
 
Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First appearing in builds released since November 2024, this bug is now hitting users across several update channels—including Current, Monthly Enterprise, and Insider—leading to power drain, sluggish perfor…
  continue reading
 
For today's episode, Lawfare Foreign Policy Editor Daniel Byman interviewed Michael Sulmeyer, who was the top Defense official for all aspects of cyber policy in the Biden administration. Sulmeyer discusses the cyber threat landscape, different roles and missions, how Artificial Intelligence might be leveraged, and the key role of allies in cyberde…
  continue reading
 
Russian army targeted by Android malware hidden in mapping app Attackers hit security device defects hard in 2024 Critical Commvault Command Center flaw warning Huge thanks to our sponsor, Dropzone AI Alert investigation is eating up your security team's day—30 to 40 minutes per alert adds up fast. Dropzone AI's SOC Analyst transforms this reality …
  continue reading
 
Donald Trump's defence secretary Pete Hegseth shared classified information on an unsecured group chat - not once but twice, according to new details that emerged this week. But the real turbulence shaking the Pentagon isn’t just about loose digital lips. It’s deeper: a toxic mix of internal rivalries, leadership clashes, and a crumbling sense of m…
  continue reading
 
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Tel…
  continue reading
 
The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
  continue reading
 
A newly discovered Android spyware campaign is targeting Russian military personnel by weaponizing a popular mapping app. Disguised as a cracked version of Alpine Quest Pro, this trojanized app delivers Android.Spy.1292.origin—a powerful surveillance tool that steals data, tracks location in real-time, and downloads secondary payloads to extract co…
  continue reading
 
Blue Shield of California has confirmed a data breach affecting 4.7 million members—caused not by hackers, but by a misconfigured Google Analytics setup. Sensitive health information was inadvertently exposed to Google’s ad platforms between April 2021 and January 2024. In this episode, we break down what went wrong, what data was leaked, and what …
  continue reading
 
The sacking of key officials and departure of others has left US Secretary of Defense, Pete Hegseth without key advisors in the Pentagon. At a time when a culture of leaks appears to have developed the department, The Times' former Pentagon correspondent, Michael Evans, digs into whether Hegseth is the real problem and whether the damage being done…
  continue reading
 
Cybercrime in the U.S. has reached new, record-breaking heights. In this episode, we dive deep into the FBI's 2024 Internet Crime Complaint Center (IC3) report — a comprehensive look at the economic and human toll of cybercrime in America. With $16.6 billion in reported losses, a 33% increase year-over-year, and 859,532 complaints filed, the data p…
  continue reading
 
🎙️ The Professional CISO Show – Episode 61 Guest: Nathan Wright, CISO at Textron Host: David Malicoat 🎧 Episode Summary: In this episode of The Professional CISO Show, host David Malicoat sits down with Nathan Wright, CISO at Textron, to explore one of the most unconventional — and inspiring — journeys to cybersecurity leadership. From Russian ling…
  continue reading
 
On today’s episode, Julia Rose Kraut, author of the book “Threat of Dissent: A History of Ideological Exclusion and Deportation in the United States,” joins Lawfare Managing Editor Tyler McBrien to talk about that book, originally published in 2020, and how it can help us make sense of the Trump administration’s recent immigration and deportation p…
  continue reading
 
Blue Shield of California shared private health data of millions with Google The FBI issues its 2024 IC3 report Ex-Army sergeant jailed for selling military secrets Huge thanks to our sponsor, Dropzone AI Security analysts need practical experience to build investigation skills, but getting expert guidance for every alert is impossible. That's why …
  continue reading
 
This week we are joined by Avani Desai, CEO of Schellman, who is talking about what we can expect now that Digital Operational Resilience Act (DORA) is in effect. Ben’s got the story of how a federal judge ruled that Google broke antitrust laws to maintain its dominance in online advertising, marking the second major legal blow in a year that could…
  continue reading
 
Security clearance holders - they're just like us! Working in national security holds individuals to a higher standard, but it doesn't mean their perfect. Legal run ins cause clearance holders a lot of anxiety, but the only thing worse than getting caught on the familiar side of a pair of handcuffs is trying to hide that arrest or police incident f…
  continue reading
 
In five minutes, we break down what HIPAA really expects from your organization in 2025. From your Security Risk Analysis to employee training, access controls, audit logs, and business associate agreements—this is the real-world checklist regulators are looking for. We’ll explain each core requirement, how enforcement is evolving, and offer practi…
  continue reading
 
Send us a text Sivan Tehila, CEO and founder of Onyxia Cyber, shares her journey from Israeli military CISO to innovative startup founder and cybersecurity educator, revealing how personal resilience shaped her multi-faceted career. • Started as a cybersecurity officer in the Israeli military for 10 years, serving as CISO of the Research and Analys…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play