show episodes
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
  continue reading
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
Artwork

1
Hacked Off

Secarma

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork
 
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
My name is Alex Fergus, and I'm a health and technology geek providing in-depth, independent product reviews on the latest red light therapy devices. With over seven years of experience studying light therapy and having used and tested dozens of hundreds of light therapy products, you can be sure that I'll have a video to help you with your educational or product-buying needs. Test, review, compare, and study all things Red Light Therapy. Whether you're seeking out the best Red Light Body Pa ...
  continue reading
 
Artwork

1
We think we know

Pentest-Tools.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
  continue reading
 
The Build+Revitalize podcast is an outgrowth of SME’s passion and commitment to solving problems and building better communities. We are proud to be your go-to source for insights on challenges and emerging trends in the AEC industry. In each episode, we will be joined by our partners and friends for in-depth conversations on overcoming obstacles in the AEC industry, opportunities we offer professional engineering consultants and students, and emerging technologies that optimize how we work. ...
  continue reading
 
Artwork
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
SecurityMetrics Podcast

SecurityMetrics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Ages ago, elves and dwarves unknowingly migrated between Universes via a Junction. Jenneva and Egam believe they have found a Junction and plan a trip with Alexander to test the theory and investigate the origins of the elves and dwarves. Because they believe that the perennial animosity between the two races is due to misunderstandings about their histories, the mages include the prince of elves and the prince of dwarves in the group. Trouble begins at the very start of the journey as Egam ...
  continue reading
 
Artwork

1
Blue Fox Group

Joshua Wendt

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Blue Fox Group, a technology company that specializes in supporting customers with the best infrastructure, live support, and communications technology available. Supporting your business objectives and improving your bottom line.
  continue reading
 
Artwork

1
Hacker Talk

Firo Solutions LTD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
  continue reading
 
Certify – CompTIA Security+ 701 Audio Course is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecu ...
  continue reading
 
Loading …
show series
 
A practical resource for mastering cybersecurity assessments. The text covers Nmap's versatile applications in network security, including penetration testing, red teaming, and purple teaming, detailing fundamental and advanced scanning techniques. It emphasizes setting up a lab environment for hands-on practice, mapping attack surfaces, identifyin…
  continue reading
 
🎙 Inside the World of Cybersecurity with Steve Stasiukonis Tune in to the latest episode of Cyber Security America as we explore real-world solutions for defending against today's ever-evolving cyber threats. Our guest, Steve Stasiukonis, President of Secure Network Technologies, brings over 29 years of experience in penetration testing, informatio…
  continue reading
 
Discuss Radio Frequency Identification (RFID) technology, exploring its evolution and applications across various industries, particularly supply chain management and retail. They examine the technical advancements in RFID, including printed electronics and silicon ink, highlighting their impact on cost reduction and performance. A significant port…
  continue reading
 
Provides an extensive overview of operational security (opsec) and anonymity in the digital and physical realms. It thoroughly explains the use of tools like Tor, Freenet, and various encryption methods (PGP, Truecrypt, Veracrypt) to protect digital footprints, communications, and data. The text also highlights the importance of physical security p…
  continue reading
 
Offers an in-depth look at security concerns surrounding Large Language Models (LLMs), drawing heavily from "The Developer’s Playbook for Large Language Model Security" by Steve Wilson. It presents endorsements highlighting the book's importance for AI developers and security professionals due to the novel risks LLMs introduce. The text outlines va…
  continue reading
 
A comprehensive overview of ransomware. It details the history and evolution of various malware types, with a specific focus on ransomware families like Ryuk, WannaCry, and Locky. The sources explore the methods of ransomware distribution, such as email phishing and exploit kits, and explain why traditional antivirus software struggles to detect th…
  continue reading
 
A technical guide published by Packt Publishing in 2021. It focuses on optimizing Python application performance by integrating Rust code. The book provides practical guidance on creating Python pip modules with Rust, managing dependencies using Cargo, and structuring Rust code for efficient integration. It explores advanced topics like concurrency…
  continue reading
 
A comprehensive overview of networking fundamentals. It covers essential network concepts, including devices, applications, protocols, and services, explaining their roles within the OSI model and discussing routing and switching characteristics. The text further explores IP addressing components, network topologies, and wireless technologies, alon…
  continue reading
 
Provides comprehensive information on deploying, upgrading, customizing, and configuring the Windows 10 operating system. It covers essential topics such as managing local users, groups, and devices, configuring permissions and file access, implementing local policies, and securing data and applications. The text also explores network configuration…
  continue reading
 
A comprehensive guide to leveraging Azure OpenAI. It details the fundamentals of Large Language Models (LLMs), their various applications, and how to integrate them within the Microsoft Azure ecosystem. The book explores advanced topics such as multimodal capabilities, function calling, and Assistants API, along with crucial aspects of privacy, sec…
  continue reading
 
A comprehensive guide to securing cloud-native applications and APIs, specifically focusing on OAuth and OpenID Connect standards. The book covers a wide range of topics, including API authorization, token design and management, secure client implementations for various application types (web, mobile, desktop), and the deployment and operational as…
  continue reading
 
This week your pal and mine Joe “The Machine” Skeen kept picking away at pwning Ninja Hacker Academy. To review where we’ve been in parts 1 and 2: We found a SQL injection on a box called SQL, got a privileged Sliver beacon on it, and dumped mimikatz info From that dump, we used the SQL box hash to do a BloodHound run, which revealed that we had ex…
  continue reading
 
https://offsec.blog/budget In this episode, we’re tackling an often-overlooked opportunity: using pentest results to secure more budget for security initiatives. Too many organizations run a pentest, file the report away, and move on without leveraging it for strategic value. We’ll break down how to translate findings into business language, influe…
  continue reading
 
A comprehensive guide for IT professionals on utilizing the Cisco ThousandEyes platform. The book covers deploying and configuring various ThousandEyes agents like Enterprise, Cloud, and Endpoint agents, and details different test types for network, DNS, and web layers, including sophisticated Transaction tests. It also explores alerting mechanisms…
  continue reading
 
A comprehensive guide to CompTIA A+ certification, focusing on hardware, networking, operating systems, and security. It details various display technologies like LCD, IPS, and OLED, along with connectivity standards such as USB-C and Thunderbolt. The text also covers printer types, maintenance, and common troubleshooting steps for issues ranging f…
  continue reading
 
A comprehensive guide for developers by Naga Santhosh Reddy Vootukuri, Taiseer Joudeh, and Wael Kdouh, with technical review by Tommaso Stocchi. It details the Azure Container Apps (ACA) platform, comparing it to other Azure services like App Services and Kubernetes Service (AKS), and covers deploying containerized applications. The text also expla…
  continue reading
 
A study companion for the Certified Kubernetes Administrator (CKA) exam, offering comprehensive guidance for professionals aiming to master Kubernetes. It covers fundamental concepts, architecture, and installation using tools like KinD and Kubeadm, progressing to advanced topics such as workloads, scheduling, storage, networking, and security. The…
  continue reading
 
An ethical hacker's guide to the unique challenges of analyzing, compromising, mitigating, and securing industrial processes. It offers a practical, hands-on approach to understanding and exploiting vulnerabilities in industrial control systems (ICS) and operational technology (OT) environments. The text covers setting up a virtual lab, open-source…
  continue reading
 
A comprehensive guide for creating secure and scalable applications on Microsoft Azure. It covers a wide array of topics crucial for modern development, including integrating Generative AI, leveraging serverless architectures, and implementing robust DevOps pipelines. The book instructs readers on setting up their development environment, managing …
  continue reading
 
A comprehensive academic text authored by Dr. Ramchandra Sharad Mangrulkar and Dr. Pallavi Vijay Chavan, with a technical review by Dr. Parikshit. The book serves as a guide for students and professionals seeking to enhance their understanding of predictive analytics. It explores core concepts, tools, and implementations across several key areas, i…
  continue reading
 
It argues that while AI tools can handle approximately 70% of coding tasks, such as boilerplate and routine functions, the remaining 30% requires crucial human expertise. The text categorizes AI usage into "bootstrapper" and "iterator" patterns, highlighting common pitfalls like the "70% problem" and the "demo-quality trap" when human oversight is …
  continue reading
 
A practical guide for programmers transitioning from quantum computing theory to application. It teaches readers to design, implement, and evaluate quantum algorithms using hands-on, project-based challenges. The text covers fundamental quantum concepts like state preparation, measurement, and unitary operations, demonstrating their application wit…
  continue reading
 
Offers comprehensive information for managing Windows 10 environments. Chapters 1-6 cover fundamental aspects like installation, user and group account management, file and folder security, and network connectivity, including detailed explanations of Active Directory and TCP/IP. Later chapters, 7-13, shift focus to system maintenance, security, and…
  continue reading
 
This comprehensive guide, "Ultimate Machine Learning with ML.NET," authored by Kalicharan Mahasivabhattu and Deepti Bandi and published by Orange Education Pvt Ltd, offers a thorough exploration of ML.NET. The book covers foundational machine learning concepts and terminology, detailing the framework's features, benefits, and applications across va…
  continue reading
 
Provides an in-depth look at functional programming principles, specifically using the Elixir language. It functions as a learning guide, explaining core concepts such as immutability, pure functions, pattern matching, recursion, and higher-order functions, while also addressing practical application design, error handling strategies (including try…
  continue reading
 
Outlines best practices for designing, documenting, and managing Web APIs, with a strong emphasis on RESTful principles and the use of OpenAPI (formerly Swagger) and JSON Schema. It covers fundamental concepts like resources, HTTP methods, and status codes, while also addressing crucial considerations such as security, efficiency, and user-friendli…
  continue reading
 
A comprehensive guide for anyone involved in creating, designing, or marketing AI products. It covers the entire lifecycle of AI product development, from identifying and prioritizing AI opportunities and exploring various AI approaches like predictive AI, language models, and agentic AI, to designing user experiences that manage AI's inherent unce…
  continue reading
 
Happy Friday! Today’s another hot pile of pentest pwnage. To make it easy on myself I’m going to share the whole narrative that I wrote up for someone else: I was on a pentest where a DA account would sweep the networks every few minutes over SMB and hit my box. But SMB signing was on literally everywhere. The fine folks here recommended I try rela…
  continue reading
 
In this episode, Brad and Spencer sit down with an experienced information security and risk manager to explore how they build and manage their security stack, choose the right tools, and win support from their team and leadership. We dig into the balance between technical defenses and business-driven risk management, from budgeting and vendor sele…
  continue reading
 
Explores practical object-oriented design (OOD), particularly within the context of Ruby programming, offering guidance for creating changeable and maintainable software. It covers fundamental principles such as single responsibility, managing dependencies, and designing flexible interfaces, emphasizing the importance of messages over classes and t…
  continue reading
 
Explore the multifaceted landscape of cybercrime, ranging from its definitions and various forms like malware, phishing, cyberbullying, and identity theft, to its impact on individuals, organizations, and national security. They discuss the technical aspects of cyberattacks, including how they are perpetrated and the role of technologies like AI an…
  continue reading
 
Focuses on utilizing the bash command line for cybersecurity tasks. It covers a broad range of topics, from foundational bash primer concepts like variables, regular expressions, and command-line basics to advanced cybersecurity applications. The book details data collection, processing, and analysis techniques, including log monitoring, file syste…
  continue reading
 
Focusing on digital forensic methodologies and tools. It covers a wide range of topics essential for investigators and cybersecurity professionals, including incident response, evidence acquisition and preservation, and the analysis of various digital artifacts. The text details the installation and practical application of Kali Linux for forensic …
  continue reading
 
A comprehensive approach to cybersecurity incident response, emphasizing the importance of a well-structured program and continuous improvement. It explores leadership qualities essential for effective teams, such as humility and decisiveness, and details how to organize and staff an incident response capability, including various team models and o…
  continue reading
 
Details the discovery and analysis of the Stuxnet malware, emphasizing its sophisticated design for sabotaging industrial control systems, particularly Siemens PLCs. It explores the history of cyberattacks against critical infrastructure, including early incidents like the Maroochy Shire sewage system hack, and examines vulnerabilities inherent in …
  continue reading
 
Step into a Cybersecurity Time Machine - Jeff Man Cybersecurity strategy is not the same as it was 40 years ago. In this episode, Jeff Man, Sr. Information Security Consultant at OBS, joins host Nabil Hannan to discuss his extensive career in cybersecurity. They explore Jeff’s invention of the cryptologic cipher wheel, becoming an expert in securit…
  continue reading
 
In our latest Cybersecurity America episode (42), I had the privilege of speaking with Jim Goepel, a true leader in cybersecurity and compliance — and someone who has helped shape the very ecosystem he now advises. Jim is the CEO of Fathom Cyber, a consulting firm in North Wales, PA specializing in: 🔹 CMMC assessment preparation 🔹 CUI education and…
  continue reading
 
Provides extensive practical exercises for IT hardware and software, focusing on CompTIA A+ Core certification topics. It includes detailed step-by-step laboratories covering various Windows operating systems (7, 8/8.1, 10), from basic usage and configuration to advanced tasks like managing memory, storage, and networking. The material also introdu…
  continue reading
 
A comprehensive educational text designed to introduce readers to the fundamental concepts of computer science. It covers a broad spectrum of topics essential for understanding computational problem-solving, starting with basic mathematical and logical principles such as counting, probability, and Boolean algebra, which are crucial for modeling pro…
  continue reading
 
A comprehensive guide for IT professionals preparing for Cisco's CCNP and CCIE Data Center Core (DCCOR 350-601) certification exam. It covers a wide array of data center technologies, including detailed explanations of networking protocols like OSPF and BGP, storage solutions such as Fibre Channel and FCoE, and virtualization concepts like VXLAN an…
  continue reading
 
Serves as a preparation resource for the CCNA certification. The material covers fundamental networking concepts, including Ethernet networking, data encapsulation, and the OSI and DoD models. It provides detailed explanations of TCP/IP, IP addressing, and subnetting, as well as practical guidance on configuring and troubleshooting Cisco devices us…
  continue reading
 
Provides a comprehensive guide to Windows Server 2025, covering everything from initial setup and configuration to advanced management and security features. It explores core networking concepts, storage solutions, Active Directory Domain Services (AD DS) enhancements, and security protocols like SMB over QUIC and TLS. The text also details virtual…
  continue reading
 
Serves as a comprehensive guide for IT professionals aiming to design, build, and maintain Zabbix setups. It covers a wide array of topics, from initial Zabbix server and frontend installation to advanced monitoring techniques for various systems like Linux, Windows, databases, and cloud environments (AWS, Azure, Docker). The text emphasizes practi…
  continue reading
 
Offers comprehensive guidance on establishing and operating an effective cybersecurity program. It addresses various facets of cybersecurity, including understanding cyber threats and attackers, implementing cyber risk management, and deploying robust cyber defenses. The text also examines the organizational aspects of cybersecurity, such as progra…
  continue reading
 
Provides an extensive guide to Wi-Fi 7 (802.11be protocol), detailing its technical aspects and deployment strategies. It covers the evolution of Wi-Fi standards, including physical layer enhancements like 320 MHz bandwidth and multi-link operation, and discusses critical aspects such as security, quality of service (QoS), and roaming. The text als…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play