Security 공개
[search 0]

Download the App!

show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
Loading …
show series
 
Paul recently built a new PC for daily work and security-related tasks. It's a monster PC! The build was researched heavily, and in this segment, Paul will share all the tips and tricks to you can build the same or similar PC! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw685…
 
Phillip will discuss his passion for offensive cybersecurity education, mentoring, and getting started in pentesting. He co-authored a book based on his conference talk "The Pentester Blueprint: Starting a Career as an Ethical Hacker." He will also talk about his community involvement with the Innocent Lives Foundation, The Pwn School Project, and …
 
This week, In the Security News, Calling all people who know how to patch MS Exchange servers, we need you, Rockwell Automation PLC flaws and what you can't do about it, a book review I agree with, be careful what you expose at home, yet another Chrome 0day, jailbreak your iPhone, the cybersecurity consolidation, and taking back the term "Hacker", …
 
This week, we welcome Phillip Wylie, instructor at INE, to discuss Offensive Cybersecurity Education and Getting Started in Pentesting! In the second segment, I will personally be walking you through "How to Build a Kick-Ass PC"! Finally, In the Security News, Calling all people who know how to patch MS Exchange servers, we need you, Rockwell Autom…
 
Our people are our greatest asset and on the occasion of Employee Appreciation Day, we express our gratitude to them. We also want our people to know that we value their individual efforts that add up to make us a successful company Recognition lifts the morale of the employees, as it makes them feel appreciated […] The post Employee Appreciation D…
 
This week I discuss several new OSINT resources and strategies, including breach data and telephone number queries.Direct support for this podcast comes from sales of my books and the online video training. More details can be found on the Books and Online Training tabs at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements…
 
This week's tools, tips and tricks talk about a Windows Active Directory password auditing tool. Specops Password Auditor is a free analyzer to give you insight into your password policies and the security posture of your accounts. Source: https://specopssoft.com/product/specops-password-auditor/ Be aware, be safe. Become A Patron! Patreon Page ***…
 
From VBS, PowerShell, C Sharp, Process Hollowing to RAT https://isc.sans.edu/forums/diary/From+VBS+PowerShell+C+Sharp+Process+Hollowing+to+RAT/27168/ Cisco Patches Snort Related Vulnerabilities https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ethernet-dos-HGXgJH8n VMWare View Planner Update https://www.vmware.com…
 
This week, In the first segment, Matt Cauthorn & Sri Sundaralingam from ExtraHop join us to discuss why Traditional IDS is Dead! Kimberly Sutherland from LexisNexis Risk Solutions will discuss The New Cybercrime Landscape! In the Enterprise Security News Thycotic and Centrify join forces, Netwrix acquires Strongpoint, SentinelOne plans for IPO, Qom…
 
This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.…
 
This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.…
 
On this show Jenny welcomes back author and fraud expert Martina Dove. They discuss her new book “ The Psychology of Fraud, Persuasion and Scam Techniques” as well as the tactics and mechanics of many scams and how the pandemic has provided a rich hunting ground for criminal fraudsters. Thanks to Dr Dove for a wonderful and revealing interview. To …
 
This week, In the Enterprise Security News Thycotic and Centrify join forces, Netwrix acquires Strongpoint, SentinelOne plans for IPO, Qomplx plans to go public, and funding announcements from Axonius, HYAS, Armorblox and platform9. Attivo Networks Announces Continuous Assessment and Enforcement for AD, cPacket Networks announces cCloud, and more! …
 
Hi! This episode of pentest pwnage is a fun one because it was built for speeeeeeeeeeeeeeeed. Here's some of the things we're doing/running when time is of the essence: Get a cmd.exe spun up in the context of your AD user account: runas /netonly /user:samplecompany\billybob "C:\windows\system32\cmd.exe" Then get some important info in PowerView: Ge…
 
How to stop security-conscious apps from allowing unencrypted data to escape, and how scammers put social network users under pressure in order to steal their passwords.https://nakedsecurity.sophos.com/keybase-secure-messaging-fixes-photo-leaking-bughttps://nakedsecurity.sophos.com/naked-security-live-beware-copyright-scamsWith Doug Aamoth and Paul…
 
Overview This week we talk about more BootHole-like vulnerabilities in GRUB2, aSpectre exploit found in-the-wild, security updates for xterm, screen,Python, wpa_supplicant and more. This week in Ubuntu Security Updates 52 unique CVEs addressed [USN-4698-2] Dnsmasq regression [00:44] 8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal …
 
Actor, presenter and writer Robert Llewellyn, famous for playing the part of Kryten in the science-fiction comedy "Red Dwarf," joins us as we discuss robots gone rogue, electric vehicle nightmares, and creepy companions. All this and much much more can be found in the latest edition of the "Smashing Security" podcast by computer security veterans G…
 
Diskussion zur öffentlichen Anhörung zum IT-Sicherheitsgesetz 2.0 #33 Das IT-Sicherheitsgesetz 2.0Diskussion zur öffentlichen Anhörung zum IT-Sicherheitsgesetz 2.0Nach der öffentlichen Anhörung zum IT-Sicherheitsgesetz 2.0 am Montag haben wir mit Klaus Landefeld vom eco über die Kritik der Sachverständigen gesprochen. Im Podcast verrät der stellver…
 
A Brief Guide to Maritime Strategy (US Naval Institute Press, 2019), is a readable introduction to the world of maritime strategy. While Prof Holmes bases his narrative on the writings of Mahan and Corbett, he weaves in a wide-range of naval, political and philosophical thinkers who describe the universal importance of maritime strategy. His book g…
 
Well, it’s been a while, thanks to the ice/snow/power/water fiasco we recently underwent in Texas. But, though tired and not very prepared, we are back tonight! Tune in as co-hosts Steve Vladeck and Bobby Chesney discuss and debate: The domestic and international law grounds cited by the Biden administration for its recent airstrike in Syria An upd…
 
Seven Exchange 0-days, Firefox Enhanced Tracking Protection, SolarWinds Password. Chrome to default to trying HTTPS first when not specified. Firefox's "Enhanced Tracking Protection" just neutered 3rd-party cookies! As easy as "SolarWinds123". Rockwell Automation's CVE-2021-22681 is a CRITICAL 10 out of 10. VMware's vCenter troubles. SpinRite updat…
 
As the Biden administration reengages with the global community, it faces tough decisions about how to deal with the remnants of former President Donald Trump’s foreign policy, including sanctions imposed on staff of the International Criminal Court in The Hague. The sanctions were a response to the ICC’s investigation of possible war crimes by US …
 
This week, we welcome Ted Harrington, Executive Partner at Independent Security Evaluators, to discuss Hackable; How to do Application Security Right! In the Application Security News, Implementation pitfalls in parsing JSON, finding all forms of a flaw with CodeQL, more educational resources for hacking apps, engineering and product management pra…
 
In light of the SolarWinds attack (which you've more than likely heard of by now), the US Senate met about the events surrounding the attack and what can be done to prevent (or at least reduce the likelihood of) similar events in the future. There were some very interesting witness testimonials, but not all good. If policymakers draft policy based …
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/one-day-youll-grow-up-to-know-less-than-you-do-now We know so little when we're born. We're just absorbing information. But then we get older, and get the responsibility to secure the computing environment of a large company, we actually see that knowledge we a…
 
Prologue This week, DJ McArthur joins James and Rafal to talk shop about his career in defending healthcare IT. The Cliff's Notes version is that it's more complex, more under siege, and more critical than ever. No problem, right? This episode has been a long-time coming, and DJ is an honest-to-goodness expert in the field. He teaches classes on th…
 
On today’s program, a conversation with a pair of CEOs from leading companies in the cyber security industry. Joining us are Marten Mickos, CEO of bug bounty platform provider HackerOne, and Christopher Ahlberg, CEO at Recorded Future. They share their insights on what it takes to be a successful CEO in a rapidly changing cybersecurity field, the i…
 
Jane Lo, Singapore Correspondent speaks with Tommaso Gagliardoni, PhD, an Italian cryptographer, mathematician, and quantum security researcher. Tommaso obtained a degree in Mathematics at the University of Perugia, Italy, and a PhD at the Technical University of Darmstadt, Germany, with a dissertation on the quantum security of cryptographic primi…
 
In our latest episode of Security Nation, Ryan Weeks joined the podcast to discuss deploying thousands of assets into a hostile environment: the home offices of workers everywhere as they were forced remote amidst the pandemic. He’ll discuss how he balances privacy expectations with necessary regulations of workers’ computers and phones as they go …
 
Es ist Ende Februar und die Wintermüdigkeit ist anscheinend verflogen. S/4HANA Projekte sprießen wie Frühlingsblumen. Eine gute Gelegenheit sich endgültig von der SAP GUI zu verabschieden. Und so aufzuhören, die Arbeit für den Computer zu erledigen. Ganzer Beitrag mit allen Links: https://rz10.de/1-noch/best-of-februar-2021/ Viel Spaß euch allen mi…
 
On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman discuss some of the biggest cyber security stories of the last few weeks. Among the stories up for discussion are the bugs in Accellion’s 20-year-old FTA product, which led to multiple companies worldwide reporting breaches related to it. We also talk about the reports sa…
 
Infosec conferences give cybersecurity professionals a chance to network, hear the latest research, exchange ideas, and demo hacks and new tools. But with so many conferences, how do you decide which ones to attend? How can you get the most out of your experience? Are they worth your time and money? What's it like to be a presenter, or even an orga…
 
Loading …

빠른 참조 가이드

Google login Twitter login Classic login