Information Security 공개
[search 0]

Download the App!

show episodes
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
 
Pwned is a weekly information and cyber security podcast addressing real-world security challenges. Occasionally funny, always informational, and driven by those who live and breathe security. Each episode we dive into the latest and greatest in technology, security frameworks, best practices, and how-tos. We’ll chat with industry leaders to learn how they got to where they are, what they see coming, and how they learned from their mistakes.
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
A war between cybercriminals and businesses is raging. The global pandemic only served to increase the volume of hacked and breached data. As everyone began working from home everyday resources like mobile phones and IoT devices became targets. In fact, data breaches exposed over 36 billion records in the first half of 2020 alone according to RiskBased.Additionally, recent security research suggests most companies have unprotected data and poor cybersecurity practices in place, making them v ...
 
BASIC is the only peace and security non-governmental organization that is British-American in composition and focus. With programs that address diplomacy and decision-making around nuclear weapons, we work on both sides of the Atlantic to encourage sustainable transatlantic security policies and to develop the strategies that can achieve them. We have charitable status in the United Kingdom and in the United States. We operate with offices in London and Washington, a small but committed sta ...
 
The Circuit is the number #1 source of information on protection matters and is the industry-leading magazine for all security professionals who want to stay ahead of the game. If you're new to the industry or an old-school veteran, the Circuit is the place for you. Through the podcast, we bring the stories and the contributors from the magazine to life. For more information on all things Circuit related, visit us at: https://circuit-magazine.com
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
America’s Leading Security Coach to Small Business, the FBI, Homeland Security, Department of Defense, Department of Energy, The Whitehouse, all major DoD contractors, including Raytheon, Boeing, Lockheed, BAE, and more. Dozens of US State, County, and City governments. School Districts, Hospitals, Doctors, and Clinics. All major financial institutions in the United States, including The Federal Reserve, Fidelity, Bank of America, Visa, M/C, etc. Providing Network Security since 1991.
 
Local business personalities on their successes, strengths, and perseverance in the marketplace to empower, inform and encourage the 80% of American micro to small businesses that tend to be family owned of 9 employees or less. Shows cover topics on business coaching, networking, health and fitness, criminal justice, cyber security, money, and veteran spotlights.
 
On August 13, 2018, Section 1051 of the Fiscal Year 2019 John S. McCain National Defense Authorization Act (P.L. 115-232) established the National Security Commission on Artificial Intelligence as an independent Commission "to consider the methods and means necessary to advance the development of artificial intelligence, machine learning, and associated technologies to comprehensively address the national security and defense needs of the United States."Learn more about the Commission's work ...
 
The Inquiry into the Role and Oversight of Private Security Contractors in Afghanistan, which reported in September 2010, was precipitated by events in August 2008, when US forces bombed the Afghan village of Azizabad. This gave rise to a public dispute between the US Government and the United Nations about the level of fatalities caused by the attack and about whether those killed had been civilians or Taliban-linked insurgents. Allegations soon emerged that the attack had been based on fal ...
 
If you want to learn building automation then you are in the right place. My name is Phil Zito and I am the CEO of Smart Buildings Academy. If you are a technician, operator, salesperson, or engineer the Smart Buildings Academy podcast is for you. Each week I tap into my vast experience in Building Automation and teach you the things no one else teaches. You will learn about BAS, HVAC, IT, Energy Management, Sales, Operations, Project Management, Cyber Security and so much more. Prior to fou ...
 
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott and Garrett O'Hara will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get Cyber Resilient!
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
 
Hello all! Welcome to the Pivot! The purpose of this podcast is to discuss in detail the geopolitical implications of the 21st century as we gravitate from a definite American unipolar international order to a nascent multi-faceted, multi-polar international system. This podcast looks to extensively address the question "how did we get to where we are now?" and the question, "where do we go from now?" In order to do this, we must understand the powers of history, civilization development, te ...
 
FactFruit is a U.S. focused daily news show that brings you the top stories and information without the political noise. Leading news stories are followed by discussions with guests who are experts in their industries. Our guests are not political pundits or talking heads whose agenda is to politically sway the listener, but rather, discussions are focused on how things work. New technology, how congressional committees function, cyber security, events leading to foreign conflict, and how st ...
 
RTI International’s Center for Forensic Science presents Just Science, a podcast for forensic science professionals and anyone with an interest in learning more about how real crime laboratories are working to do their job better, produce more accurate results, become more efficient, and solve more crimes. This podcast deals with a range of issues, including leadership in the crime lab, new technologies, sexual assault response, and broader challenges for science and public security. We cove ...
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand. We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can kno ...
 
The Security 101 show is a show that talks about computer security that everyone should know. We do not talk bits and bytes, decryption, unpacking, etc.... We talk in your language so that you and your family can understand. We feel that everyone needs to know some of the latest threats on the internet and how to protect yourself. Knowledge is power as the saying goes. With the internet and mobile exploding still you and your family are more at risk every day. With some knowledge you can kno ...
 
The Atlanta Personal Injury Lawyer Podcast features legal information for residents of Georgia who need help with their personal injury, car wreck, workers' compensation, rape, sexual assault, shooting, wrongful death, nursing home abuse, or social security disability claims. Each video podcast is an individual segment from the hit show "Do I Need a Lawyer?" and is hosted by Atlanta's own Gary Martin Hays. Gary is an experienced personal injury lawyer who is dedicated to serving the people o ...
 
A serial audio drama created by real inmates in a real maximum security prison. Over a period of three years, a team of a dozen inmates worked with university teachers to create a script for an unfolding audio drama -- one that would entertain their peers while confronting the health issues they all face. Then, using nothing but the most limited recording equipment, these men performed and recorded what they had written. The result is fiction -- but a story revealing the truth these men know ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
Big Ideas with Ben Weingarten features compelling long-form conversations with exceptional thinkers and doers on the most important ideas and issues of our time, and all time. Discussions focus on topics ranging from national security and foreign affairs, to economics and politics and philosophy and culture with a classical Liberal bent and a grounding in history. Big Ideas with Ben Weingarten challenges the prevailing progressive orthodoxy with a contrarian conservative/libertarian counter- ...
 
Loading …
show series
 
Hunting Phishing Websites with Favicon Hashes https://isc.sans.edu/forums/diary/Hunting+phishing+websites+with+favicon+hashes/27326/ Nagios XI Vulnerability Exploited by Cryptominers https://unit42.paloaltonetworks.com/nagios-xi-vulnerability-cryptomining/ XCSSET Malware Adapting to MacOS 11 and M1 https://www.trendmicro.com/en_us/research/21/d/xcs…
 
Decoding Cobalt Strike Traffic https://isc.sans.edu/forums/diary/Decoding+Cobalt+Strike+Traffic/27322/ Codecov Breach https://about.codecov.io/security-update/ Google Project Zero Tweaks Disclosure Rules https://googleprojectzero.blogspot.com EIPStackGroup OpENer Ethernet/IP https://us-cert.cisa.gov/ics/advisories/icsa-21-105-02 DNS Problems with W…
 
A proposed privacy framework from the eHealth Initiative & Foundation and the Center for Democracy and Technology aims to set standards for the collection, disclosure and use of health data that falls outside the protection of HIPAA, says attorney Andrew Crawford of CDT.저자 GovInfoSecurity.com
 
The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends.…
 
In this epsiode of the UNSECURITY Podcast, Evan and Brad have a candid discussion about how important it is to understand world events and apply the understanding to our jobs as security professionals. Everyone’s perspective is valid, so all perspectives (especially ones differing from our own) should be considered in our view of both society and o…
 
Originally Aired on April 12, 2021 Articles discussed in this episode: https://threatpost.com/azure-functions-privilege-escalation/165307/ https://www.theverge.com/2021/4/8/22374464/linkedin-data-leak-500-million-accounts-scraped-microsoft https://news.linkedin.com/2021/april/an-update-from-linkedin https://www.bbc.com/news/world-middle-east-567087…
 
Gar O’Hara speaks with Nigel Hedges, Head of Information Security at CPA and adjunct professor of cybersecurity at Deakin University. Nigel walks us through his journey and how that’s shaped his security thinking, his approach and mindset for building and iterating security strategies, his way of communicating cybersecurity to audit and risk commit…
 
To say that Jo is heavily involved in the cyber security industry is an understatement. Jo has worked in security leadership positions with a host of of organisations, and has also has served in industry bodies such as AIIM and ISACA. In this final part of our interview with Jo we dive into the topic of gender diversity. We talk about International…
 
Instagram is one of the most popular social media apps. Young people especially are heavy users of this app and you should know how to secure it. This episode talks about the importance of multi-factor authentication and why you should turn it on your kid's phones now. Instructions - https://securityinfive.com/you-should-enable-two-factor-on-your-k…
 
I've always worked on the outside of retrocommissioning projects as an advisor or a technician. That's why in this episode I'm going to join you in exploring how retrocommissioning works and how to best approach it. Along the way, we are going to analyze strategies, processes, and tips and tricks to effectively retrocommission buildings.…
 
Our VMware server is offline. We’re missing a part we need to install the drives. While we track that down, we need something to do. Planning labs, learning Visio, and project management are on the todo list. LINKS 1. Project Management for the Unofficial Project Manager FIND US ON 1. Facebook 2. Twitter - DamienHull…
 
A proposed privacy framework from the eHealth Initiative & Foundation and the Center for Democracy and Technology aims to set standards for the collection, disclosure and use of health data that falls outside the protection of HIPAA, says attorney Andrew Crawford of CDT.저자 HealthcareInfoSecurity.com
 
This week's tools, tips and tricks episode talks about a password vault. KeePass is a free, open-source password vault for your local PC. The time is now to stop using static text files or excel spreadsheets to track your accounts. KeePass Website - https://keepass.info Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a…
 
The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends.…
 
The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends.…
 
The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends.…
 
The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends.…
 
In a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance.저자 CareersInfoSecurity.com
 
In a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance.저자 HealthcareInfoSecurity.com
 
In a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance.저자 BankInfoSecurity.com
 
In a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance.저자 GovInfoSecurity.com
 
In a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance.저자 CUInfoSecurity.com
 
Why and How You Should be Using an Internal Certificate Authority https://isc.sans.edu/forums/diary/Why+and+How+You+Should+be+Using+an+Internal+Certificate+Authority/27314/ Vulnerabilities Used By Russian Foreign Intelligence Service https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2573391/russian-foreign-intelligence-service-…
 
The cyber threat to our nation's infrastructure is real. This episode talks about another security incident with a local water supply and what could have happened if they didn't catch the guy. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security…
 
In this Intel Conversations in the Cloud audio podcast: InstaDeep’s Karim Beguir joins host Jake Smith to talk about using AI to drive autonomous decision making at the enterprise level. Karim discusses utilizing reinforcement learning (RL) made popular by DeepMind in industrial environments and why the company’s RL relies on Intel CPUs. Karim also…
 
April 2021 Forensics Quiz Solution https://isc.sans.edu/forums/diary/April+2021+Forensic+Quiz+Answers+and+Analysis/27308/ Adobe Patch Tuesday https://helpx.adobe.com/security.html Chrome 90 Released (and 0-Day Exploits) https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html https://github.com/avboy1337/1195777-chrom…
 
Host Susan Hamilton talks with Rob Bliss, Chief Sales Guy at SmartOffice USA headquartered right here in Farmer's Branch, TX. Family owned businesses and local businesses make up 90% of American business, and this sector often struggles to keep up with marketing and technology. Rob shares how the VOip phone has come a long way since you first heard…
 
In episode one of our 2021 Sexual Assault Awareness Month mini season, Just Science sat down with author, non-profit founder, and sexual assault survivor Natasha Alexenko to discuss her book, A Survivor’s Journey, and the importance of Sexual Assault Awareness Month.Every survivor of sexual assault has their own story. Some have experienced success…
 
What's your password? If you can come up with just one off the top of your head for all your accounts, you're probably doing it wrong. We take a look at just how wrong some are doing passwords courtesy of a British survey (https://www.ncsc.gov.uk/news/national-pet-day-password-advice). But don't fret, we also offer tips on how to do your passwords …
 
In the last two episodes of this series (#449 and #450) we've been diving into how to not only speed up the process of spinning up a DIY pentest dropbox, but how to automate nearly the entire build process! In today's episode we talk specifically about how to streamline the Windows 10 build process. As previously mentioned, this article is awesome …
 
People hack all the time for many reasons. This story is unique because it's about a mother and daughter team but why they were hacking. This episode goes into how they did it and what happened to them. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can fin…
 
When you think of Mexico you think drugs, cartels, extortion, kidnapping, murder, but what’s really going on under the hood? Navigating a new country and learning to effectively operate in completely foreign surroundings can be challenging for any CPO. That’s why it’s crucial that we get local knowledge and atmospherics from the operators that are …
 
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.저자 CareersInfoSecurity.com
 
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.저자 HealthcareInfoSecurity.com
 
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.저자 BankInfoSecurity.com
 
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.저자 GovInfoSecurity.com
 
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.저자 CUInfoSecurity.com
 
In our latest news update the team discuss the latest cyber security attacks, hacks and trojans and how companies can better stay resilient. The GCR team explore the impact of the 9 Entertainment cyber attack, whether the 500M LinkedIn users data for sale is a hack or not, how a hacker almost poisoned the drinking water at a Kansas water utility, t…
 
Today we are going to take a look at security awareness training programs in organizations. We are joined to day by Kelley Bray and Stephanie Pratt who will help facilitate the discussion. We'll start with the history and evolution of security awareness programs; what has worked, or more precisely what hasn't worked. We'll also touch on how most se…
 
Prologue This week, the show is back after a brief spring break, and we have with us Dmitri Alperovitch - who has taken on a new venture in his latest role. We discuss cybersecurity policy, government's role in private enterprise defense, and why you should probably never run your own MS Exchange Server. Lots of great content from the always inform…
 
A variety of federal agencies, including the Department of Defense, NIH, HHS, and FDA have paid for “gain of function” research using federal tax dollars over the last two decades. “Gain of function” is a method of trying to increase the ability of a virus to infect and cause harm to people. This has made the virus more deadly and more contagious. …
 
In this Intel Conversations in the Cloud audio podcast: Cisco’s Brian Everitt and Cale Hilts join host Jake Smith to talk about why Cisco partnered with Intel to certify Cisco HyperFlex All Flash and All NVMe models as Intel Select Solutions, which can power any application from the data center to the edge. Brian and Cale talk more about the high-p…
 
Loading …

빠른 참조 가이드

Google login Twitter login Classic login