Cyber Security 공개
[search 0]

Download the App!

show episodes
 
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cybersecurity Effectiveness Podcast.
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott and Garrett O'Hara will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get Cyber Resilient!
 
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more ab ...
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable. Join us as we get together for unscripted conversations about a broad range of topics and re ...
 
(CS)²AI is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 20,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education and directly support cyber security professional development in every way. Founder, Derek Harp interviews the Cybersecurity leaders and brings relevant insights to help any company ...
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Cyber Security doesn't have to be a daunting task. Everyone has the right to be more secure and enjoy some privacy while surfing the web. That's where we come in. We will give you simple yet effective ways of staying safe and private online. And we'll do it in a language you'll understand. Learn how to be Cyber Smart because Privacy Matters.
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
 
Drew Green (pentester and IT manager) and Sam Blevins (IT manager and security enthusiast) meet weekly to discuss the latest in security news, penetration testing, defensive security, best practices, hacking, and more. A podcast devoted to all aspects of information security, in a way that non-security pros can understand. Security TL;DR is sponsored by G-Factor Security, a security services firm headquartered in Raleigh, NC.
 
National Cyber Security, the only "Daily" Cyber Security news show in the world. The show is has been designed for the laymen person who may not be technical, but also informative enough for all of the computer geeks of the world. Think of it like the CNN Headline News of Cyber Security Our daily news includes the latest news in hacking, id theft, IT Jobs, Government Security, Risk Management and 60+ other categories. Execute Produced by one of the worlds most known and respected Ex-hacker G ...
 
We live in two worlds, the real world and the cyber world. Both worlds are interconnected and interdependent but very different. Different rules apply. We have no choice but to exist in both worlds. As innovation and digitalization accelerates, we need to understand the risks, consequences and safeguards necessary to safely protect businesses, people and society.Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force hosts the “Cyber Task Force” podcast. In each show, Paul ...
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
 
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
 
Welcome to the Cyber Coalface a fortnightly Purple Team Cyber Podcast covering the whole cyber threat, hosted by myself David Tyler and JayJay Davey two UK Military Veterans who ended up in Cyber Security.Join us today as we cover aspects affecting Cyber Security from the perspective of a Red Teamer and Blue Teamer. This podcast is ideal for anyone in the Cyber or Infosec field, come and listen to those on the Cyber front lines!
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
 
Loading …
show series
 
Security conferences set for in-person return Apple approves Parler’s return to the App Store Geico exposed driver’s license numbers for months Thanks to our episode sponsor, Palo Alto Networks In 1666, Sir Isaac Newton famously used a prism to disperse white light into colors. Today, cloud security professionals use Prisma Cloud from Palo Alto Net…
 
Hunting Phishing Websites with Favicon Hashes https://isc.sans.edu/forums/diary/Hunting+phishing+websites+with+favicon+hashes/27326/ Nagios XI Vulnerability Exploited by Cryptominers https://unit42.paloaltonetworks.com/nagios-xi-vulnerability-cryptomining/ XCSSET Malware Adapting to MacOS 11 and M1 https://www.trendmicro.com/en_us/research/21/d/xcs…
 
Today's podcast reports on a prison term for hacker group manager, email job offer campaigns against universities, a warning to software developers using Codecov and the latest security patches needed저자 ITWC
 
Our VMware server is offline. We’re missing a part we need to install the drives. While we track that down, we need something to do. Planning labs, learning Visio, and project management are on the todo list. LINKS 1. Project Management for the Unofficial Project Manager FIND US ON 1. Facebook 2. Twitter - DamienHull…
 
Karla Reffold is the COO for Orpheus, the founder of BeecherMadden, and a contributor at Forbes. Francesco and Karla discuss supply chain issues, the recent Solarwind attack and the consequences, recent security breaches, and privacy concerns while working from home. The episode is brought you by Security Phoenix Ltd with the AppSec Phoenix platfor…
 
We speak with Chris Althaus who was appointed as Chief Executive Officer of the Australian Mobile Telecommunications Association (AMTA) in 2005. AMTA is the peak industry organisation representing Australia’s mobile telecommunications sector and operates programs covering all aspects of the mobile ecosystem such as - telecommunications policy, mobi…
 
The CEO of Kenna Security, Mr. Karim Toubba, appears on Task Force 7 Radio to unpack the state of vulnerability management in the Cyber Security industry. Mr. Toubba breaks down how risk based vulnerability management has transformed how efficient and effective companies are in responding to critical vulnerabilities. He also discusses what winning …
 
Hacking for hire is a lucrative business. The SecurityLAH! team was divided on some things, but in general, there is consensus that Dark Basin's business could close and pack up, but it will likely pop up again somewhere. Interestingly this was the first episode recorded by SecurityLah last year! It took us a while to schedule and release this epis…
 
On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the big Facebook data leak that has made headlines around the world this week, as well as a cyber attack aimed at European Union institutions, and a cyber incident impacting Australia’s parliament. We also discuss warnings from authorities in the U.S. about attackers atte…
 
To say that Jo is heavily involved in the cyber security industry is an understatement. Jo has worked in security leadership positions with a host of of organisations, and has also has served in industry bodies such as AIIM and ISACA, and was a civil society member of the official delegation to the UN’s 62nd Session of the Commission on the Status …
 
Cloud computing was one of the last decade's most transformative technologies. It helped organizations launch exciting new applications and services, as well as innovate the way they operate. However, moving critical parts of IT infrastructure and operations outside of organizations' perimeters has significant security implications. The cloud is de…
 
This week in the AppSec News, Mike and John discuss Rust in Android and the Linux kernel, vuln disclosure policy changes from Project Zero, security and DevOps collaboration, XSS with NULL, & a BootHole follow-up! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw147…
 
This week, we welcome Doug Barbin, Managing Partner at Schellman & Company, LLC, to discuss Supply Chain Management! Supply chain security isn't new, despite the renewed attention from the Solar Winds attack. It has old challenges, like having an accurate asset or app inventory, and new opportunities, like Software Bill of Materials. From consequen…
 
To say that Jo is heavily involved in the cyber security industry is an understatement. Jo has worked in security leadership positions with a host of of organisations, and has also has served in industry bodies such as AIIM and ISACA. In this final part of our interview with Jo we dive into the topic of gender diversity. We talk about International…
 
Supply chain security isn't new, despite the renewed attention from the Solar Winds attack. It has old challenges, like having an accurate asset or app inventory, and new opportunities, like Software Bill of Materials. From consequences to code integrity, DevOps teams need to understand how to protect their own code from others' components. Additio…
 
Companies are turning to Virtual CISO and CISO as a Service providers for help as cybersecurity requirements continue to grow. Is hiring a vCISO always the right option? What are the pros and cons? How do you find a good one? This week the guys answer these common vCISO questions and more. Pick up your copy of Cyber Rants on Amazon. Looking to take…
 
Codecov discloses 2.5-month-long supply chain attack BazarLoader malware aims at Slack and BaseCamp users Windows 10 update causing DNS and shared folder issues Thanks to our episode sponsor, Palo Alto Networks Ralph Waldo Emerson famously wrote that "It's not the destination, it's the journey." For your cloud security journey, you need a reliable …
 
Decoding Cobalt Strike Traffic https://isc.sans.edu/forums/diary/Decoding+Cobalt+Strike+Traffic/27322/ Codecov Breach https://about.codecov.io/security-update/ Google Project Zero Tweaks Disclosure Rules https://googleprojectzero.blogspot.com EIPStackGroup OpENer Ethernet/IP https://us-cert.cisa.gov/ics/advisories/icsa-21-105-02 DNS Problems with W…
 
More Cobalt Stryike Decode; Codecov Breach; EIPStackGroup Vuln; MSFT Patch Problems Decoding Cobalt Strike Traffic https://isc.sans.edu/forums/diary/Decoding+Cobalt+Strike+Traffic/27322/ Codecov Breach https://about.codecov.io/security-update/ Google Project Zero Tweaks Disclosure Rules https://googleprojectzero.blogspot.com EIPStackGroup OpENer Et…
 
Is scraping the same as hacking or just an example of “zealous” use of a social media platform? And if it isn’t considered hacking…should it be? As more and more online platforms open their doors to API-based access, do we need more rules and oversight of how APIs are used to prevent wanton abuse? The post Episode 211: Scrapin’ ain’t Hackin’. Or is…
 
This podcast reports on warnings on the most common vulnerable devices Russian attackers go after, how a games company was hit by ransomware, and be careful with internet searches for certain business terms저자 ITWC
 
US pins SolarWinds attack on Cozy Bear, boots 10 Russian diplomats Second Google Chromium zero-day released on Twitter this week Google rolls out Chrome 90 with HTTPS by default Thanks to our episode sponsor, Sonatype With security concerns around software supply chains ushered to center stage in recent months, organizations around the world are tu…
 
Why and How You Should be Using an Internal Certificate Authority https://isc.sans.edu/forums/diary/Why+and+How+You+Should+be+Using+an+Internal+Certificate+Authority/27314/ Vulnerabilities Used By Russian Foreign Intelligence Service https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2573391/russian-foreign-intelligence-service-…
 
Internal CA; Top Vuln. Used By SVR; Insecure URL Handling; @sans_edu: Malware Deteciton in TLS Why and How You Should be Using an Internal Certificate Authority https://isc.sans.edu/forums/diary/Why+and+How+You+Should+be+Using+an+Internal+Certificate+Authority/27314/ Vulnerabilities Used By Russian Foreign Intelligence Service https://www.nsa.gov/N…
 
Link to Blog Post https://cisoseries.com/cyber-security-headlines-week-in-review-april-12-16-2021 This week’s Cyber Security Headlines - Week in Review, April 12-16, 2021, is hosted by Steve Prentice (@stevenprentice) with our guest, Davi Ottenheimer, vp, trust and digital ethics, Inrupt. Thanks to our episode sponsor, Sonatype With security concer…
 
FBI patches Exchange server backdoors IcedID looks to fill the Emotet malware void Draft plan to improve US power grid security Thanks to our episode sponsor, Sonatype Ask any software developer, and they’ll tell you the truth about two things: 1. Conventional code analysis and appsec tools are noisy and not well integrated into the dev workflow. 2…
 
April 2021 Forensics Quiz Solution https://isc.sans.edu/forums/diary/April+2021+Forensic+Quiz+Answers+and+Analysis/27308/ Adobe Patch Tuesday https://helpx.adobe.com/security.html Chrome 90 Released (and 0-Day Exploits) https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html https://github.com/avboy1337/1195777-chrom…
 
pcap challenge solution; Adobe, Chrome, SAP Patches; Linux/Mac npm Malware; @sans.edu NCL April 2021 Forensics Quiz Solution https://isc.sans.edu/forums/diary/April+2021+Forensic+Quiz+Answers+and+Analysis/27308/ Adobe Patch Tuesday https://helpx.adobe.com/security.html Chrome 90 Released (and 0-Day Exploits) https://chromereleases.googleblog.com/20…
 
Join Chad and special co-host Allan Alford for an enlightening conversation with Wil Klusovsky, Global Cybersecurity Strategy, Governance, Risk & Compliance (SGRC) Offering Lead at Avanade. The three of them take on the sometimes confusing realm of CISOs, Deputy CISOs, Business ISOs, and virtual CISOs. In this episode, hear about: How responsibilit…
 
In this epsiode of the UNSECURITY Podcast, Evan and Brad have a candid discussion about how important it is to understand world events and apply the understanding to our jobs as security professionals. Everyone’s perspective is valid, so all perspectives (especially ones differing from our own) should be considered in our view of both society and o…
 
Is your refrigerator running? If so, perhaps it's participating in a DDOS attack. This is the reality of the world we live in. There's a computer in just about everything, and in many cases those computers are compromised are part of a botnet. In this episode we sit down with our friend and industry expert Yacin Nadji and hear from him on what botn…
 
Today's podcast reports on more serious vulnerabilities found in on-prem Microsoft Exchange, a survey questions the effectiveness of cybersecurity training experts doubt a bomber's goal to cripple the internet would have worked저자 ITWC
 
Chrome Zero-Day exploit posted on Twitter April Patch Tuesday patches 114 bugs including NSA’s two at 9.8 severity Cyberattacks are the number-one threat to the global financial system, Fed chair says Thanks to our episode sponsor, Sonatype With security concerns around software supply chains ushered to center stage in recent months, organizations …
 
MSFT Patch Tuesday; Name:Wreck DNS Vulns; #PATCHEXCHANGEAGAIN Microsoft Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+April+2021+Patch+Tuesday/27306/ NAME:WRECK DNS Vulnerabilities https://www.forescout.com/research-labs/namewreck/ keywords: name:wreck; dns; microsoft; patches; exchange
 
In our latest news update the team discuss the latest cyber security attacks, hacks and trojans and how companies can better stay resilient. The GCR team explore the impact of the 9 Entertainment cyber attack, whether the 500M LinkedIn users data for sale is a hack or not, how a hacker almost poisoned the drinking water at a Kansas water utility, t…
 
Nvidia announces AI-powered tools for cybersecurity Biden announces nominations for cybersecurity positions Apple updates chip security mid-production Thanks to our episode sponsor, Sonatype Ask any software developer, and they’ll tell you the truth about two things: 1. Conventional code analysis and appsec tools are noisy and not well integrated i…
 
Loading …

빠른 참조 가이드

Google login Twitter login Classic login