show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
Mostly Security

Jon King and Eric Wuehler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
The Cyberlaw Podcast

Stewart Baker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
Off The Hook

2600 Enterprises

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @[email protected]
  continue reading
 
Artwork

1
ISACA Podcast

ISACA Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Technology and Security

Dr Miah Hammond-Errey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
Artwork

1
Covert Operations and National Security

Circle Of Insight Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
Artwork

1
The Realignment

The Realignment

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
Artwork

1
Geeking After Dark

Bart Silverstrim

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We're a couple of geeks discussing whatever comes to mind. We may talk about systems administration, public speaking, conventions, security news,...it's hard to tell what we're going to rant about next.
  continue reading
 
Leo Laporte brings some of the most interesting personalities in technology together to talk about the most important issues. Fun, relaxed, informative and always entertaining, count on TWiT for the best tech podcasts in the world.
  continue reading
 
Artwork

1
Stop the World

Australian Strategic Policy Institute (ASPI)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
  continue reading
 
Loading …
show series
 
Dr Miah Hammond-Errey is joined by Dr Johnny Ryan, Director of Enforce at the Irish Council for Civil Liberties and a leading authority on surveillance, data rights, and privacy. Drawing on his extensive experience in the ad tech industry and digital rights advocacy, Dr Ryan explains how real-time bidding (RTB)—the backbone of online advertising—ro…
  continue reading
 
On today's episode, Lawfare Executive Editor Natalie Orpett discussed the ongoing hostilities between Israel and Iran with Suzanne Maloney, Director of the Foreign Policy Program at the Brookings Institution, and Joel Braunold, Managing Director of the S. Daniel Abraham Center for Middle East Peace. They talked about how the conflict is unfolding, …
  continue reading
 
Please note, this episode was filmed as a video interview and is available on ASPI's YouTube channel here: https://youtu.be/z3V_t8znuIM On 4 June, ASPI was pleased to host Hon Dr Billy Joseph MP in Canberra for our 2025 Defence Conference 'Preparedness and Resilience.' Dr Joseph is Papua New Guinea's Minister for Defence, and the Deputy Party Leade…
  continue reading
 
In this episode, host Jim Love delves into recent cybersecurity threats and breakthroughs. The notorious Scattered Spider hacker group has shifted its focus to US insurance companies after attacking UK retailers earlier this year. Microsoft's urgent security updates address active zero-day vulnerabilities that allow complete system control. Researc…
  continue reading
 
In this episode of Hashtag Trending, host Jim Love discusses a new campaign encouraging users to switch from Windows 10 to open source Linux and LibreOffice ahead of Windows 11's costly upgrades. A TD Bank survey reveals a surprising confidence gap among Canadians in their AI skills. Cultural institutions are overwhelmed by AI bots harvesting data,…
  continue reading
 
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
  continue reading
 
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
  continue reading
 
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
  continue reading
 
This week's episode dives deep into the post-WWDC hangover, exploring Apple's remarkable software improvements across platforms. The hosts examine the first third-party immersive video production using Blackmagic's new camera, celebrate major Vision Pro persona upgrades, and discuss Apple's complete re-architecture of iPad windowing. The conversati…
  continue reading
 
Security Business Editor-in-Chief Paul Rothman is live at ESX 2025 with David Morgan of Security Dealer Marketing for a show floor snapshot about AI and changing marketing strategies for security integrators. Security Dealer Marketing provides security dealers with the strategies they need to market their brands. David Morgan, Vice President and co…
  continue reading
 
This one was pretty much in limited topic, moreso than usual. We focused on educational shortcomings and protest. Because that's the highlight of the weekend. Idiots, and people protesting idiots. I'm betting Trump is going to be bigly mad that his big boy birthday parade was a giant f@&king flop, and we're going to feel the brunt of his tantrum...…
  continue reading
 
On this episode of Coffee Break with Jake, we dive into one of the most pressing issues for integrators and service providers: getting paid on time. Jake and several industry professionals tackle the tough realities of customer payment terms, from managing receivables with Fortune 50 companies to navigating the unpredictable world of production hom…
  continue reading
 
In this episode of Code and Country, host Ian Paterson is joined by Robert Young Pelton, renowned war correspondent and author of Licensed to Kill and The World's Most Dangerous Places. Pelton shares firsthand accounts from his time embedded with the Taliban, Special Forces in Afghanistan, and rebel groups in Chechnya. He discusses the evolution of…
  continue reading
 
Greg Rosen, now an attorney at Rogers Joseph O’Donnell, spoke with James Pearce, Lawfare Legal Fellow, about his time prosecuting federal crimes in the U.S. Attorney’s Office for the District of Columbia. He focused mostly on the investigation and prosecution that followed the attack of the U.S. Capitol on January 6, 2021. He discussed how the U.S.…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
In today's episode of Hashtag Trending, host Jim Love explores the rapidly evolving world of AI and digital technology. ChatGPT has enhanced its search capabilities, offering real-time web search for plus subscribers by leveraging Bing, but still faces competition from Google's comprehensive and proprietary search tools. On a surprising note, the T…
  continue reading
 
Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
  continue reading
 
Text the ATB Team! We'd love to hear from you! Found over 4,000 meters below the ocean’s surface, polymetallic nodules may hold the key to powering the future. In this episode, Dr. Mark Luther, Director of the Ocean Monitoring and Prediction Lab at USF and President Elect of the International Marine Mineral Society, joins us to explore how deep sea…
  continue reading
 
In a live conversation on June 13, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Legal Fellow James Pearce and Lawfare Senior Editors Anna Bower, Quinta Jurecic, and Roger Parloff to discuss the legality of President Trump federalizing the California National Guard to send them to L.A., the pretrial detention hearing of Kilmar Abreg…
  continue reading
 
In this episode of hashtag Trending, host Jim Love covers several significant tech developments. A new Linux Foundation study has found that 89% of companies using AI are adopting open-source models, with smaller businesses leading the trend due to cost benefits. Google's recent major outage, caused by an invalid automated quota update, highlights …
  continue reading
 
Host David Shipley discusses several critical cybersecurity incidents and developments. WestJet, Canada's second-largest airline, faced a cybersecurity breach impacting its mobile app and internal systems. The airline is working with law enforcement to investigate while emphasizing the integrity of its flight operations. Additionally, the Anubis ra…
  continue reading
 
Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure. We discuss the inherent vulnerabilities that come with these advancements, including cybersecurity threats and real-life incidents such as hacked crosswalk signals fea…
  continue reading
 
In this episode: the inside story of Danabot, the malware-as-a-service platform that thrived in the shadows for nearly a decade—until a critical mistake exposed its creators. Just last week, U.S. prosecutors unsealed charges against sixteen alleged operators, using evidence pulled not from a takedown, but from Danabot’s own infection logs. Plus: a …
  continue reading
 
Opinionated Design: Early Reactions to Apple's Liquid Glass Design Language Big Tech Is Dealing Flat Design a Death Blow Apple gets over its hang-ups, and the iPad enters a new era Apple Targets Spring 2026 for Release of Delayed Siri AI Upgrade Apple's de-chatbot-ification of AI is nearly complete Google launches Android 16, rolling out now to Pix…
  continue reading
 
Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is bei…
  continue reading
 
Hi, this is Allison Sheridan of the NosillaCast Apple Podcast, hosted at Podfeet.com, a technology geek podcast with an EVER so slight Apple bias. Today is Sunday, June 15, 2025, and this is show number 1049. mp3 download Road to Macstock My nemesis, Chuck Joiner of MacVoices, does a series every year leading up to […] The post NC #1049 Augmental M…
  continue reading
 
Join us for an insider’s view at why and how we built Tresorit Engage — our latest solution designed to streamline external collaboration with clients and partners.We’ll walk you through the journey that led to Engage Rooms and how it helps businesses run projects at full speed and collaborate with full confidence. We’ll look into how to spin up da…
  continue reading
 
From December 26, 2023: The Supreme Court during World War II issued some of the most notorious opinions in its history, including the Japanese exclusion case, Korematsu v. United States, and the Nazi saboteur military commission case, Ex parte Quirin. For a fresh take on these and related cases and a broader perspective on the Supreme Court during…
  continue reading
 
Bart Busschots joins me to talk about his trials and tribulations finding a good bookmark manager to replace Pocket, which he never really liked in the first place. He tells us everything he loves about Raindrop.io. Unlike most Chit Chat Across the Pond episodes, there’s a full blog post below if you’d rather read than […] The post CCATP #816 — Bar…
  continue reading
 
Rich recapped the major announcements from Apple’s WWDC 2025. Dario asks how to colorize an old black-and-white photo. Rich recommended apps like MyHeritage, Remini, and Photomyne for affordable and easy photo restoration. Anker is recalling its popular PowerCore 10000 (model A1263) due to fire and burn risks — stop using it and check for a free re…
  continue reading
 
Summer is here. WWDC has ... liquid glass? And many android features, evidently. Vibe coding is the "remarkably insecure" inevitable future, and a simple (dumb?) github policy bypass. For fun there's a new season of Phineas and Ferb on Disney+, and researchers discover a way to fully expose HIV in white blood cells. 0:00 - Intro 8:09 - WWDC 13:08 -…
  continue reading
 
From June 21, 2023: Carolyn Cole, a Pulitzer-Prize winning staff photographer for the Los Angeles Times, has covered wars and other conflicts in Afghanistan, Iraq, Israel, Kosovo, Liberia, Sudan, Nicaragua, Haiti, and the U.S.-Mexico border. Over the course of her 30 year career, she has been seriously injured on the job precisely once—when members…
  continue reading
 
In this episode of 'Cybersecurity Today,' hosts John Pinard and Jim Love introduce their unique show, 'The Secret CISO,' which aims to dive deep into the lives and thoughts of CISOs and similar roles, beyond the usual interview-style format. The guest for this episode is Priya Mouli, CISO at Sheridan College, who shares her journey from engineering…
  continue reading
 
In this episode of Hashtag Trending, titled 'The Inflection Point: AI's Gentle Singularity and the Security Conundrum', the hosts grapple with planning their show amidst rapid technological changes and delve into a blog post by Sam Altman on the 'Gentle Singularity.' The discussion touches on concepts from astrophysics and AI, explaining the singul…
  continue reading
 
🔐 Inside the SOC 🔐 Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle today’s top cyber threats ⚔️. Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house 💼. 🎧 Tap in and get cyber-smart with the experts. #Cybe…
  continue reading
 
This week we speak to Jen Persson, Director of Defend Digital Me, about the technologies being deployed in schools in England and Wales. Links: Read more from Defend Digital Me: https://defenddigitalme.org/research/ PI's work on Securitising Education: https://privacyinternational.org/campaigns/securitising-education 25 Years old - The Database Sta…
  continue reading
 
The Chinese Communist Party (CCP) is widening its influence over private companies. Since Xi Jinping took office as party and state leader, the CCP has increased its control over the private economy by guiding capital, controlling shares and engaging in corporate governance. In this episode, Kasper Ingeman Beck, Postdoc at the Copenhagen Business S…
  continue reading
 
By J. Overton Dr. Ben Zweibelson joins the program to talk about his new book, Reconceptualizing War. Dr. Zweibelson has over three decades of service to the U.S. Department of Defense, retiring as an Infantry Officer with 22 years combined service, multiple combat deployments to Iraq and Afghanistan, and awarded four Bronze Stars. Author of … Cont…
  continue reading
 
For today's episode, Lawfare Senior Editor and General Counsel Scott R. Anderson sat down with three leading legal experts on domestic military deployments: William Banks of Syracuse University College of Law, Laura Dickinson of the George Washington University Law School, and Chris Mirasola of the University of Houston Law Center. They discussed t…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses critical AI-related security issues, such as the Echo Leak vulnerability in Microsoft's AI, MCP's universal integration risks, and Meta's privacy violations in Europe. The episode also explores the dangers of internet-exposed cameras as discovered by BitSight, highlighting the urgent n…
  continue reading
 
In this episode of #Trending, hosted by Dr. Hamma sitting in for Jim Love, we explore the longest ChatGPT outage ever, which lasted over 12 hours and exposed our growing dependency on AI. We also discuss Wikipedia's paused AI summary experiment due to negative feedback from editors, and the growing privacy concerns as nearly 15% of 23andMe customer…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play