Security 공개
[search 0]
Download the App!
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork
 
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork

1
Security-Insider

Peter Schmitz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달
 
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매일
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Mostly Security

Jon King and Eric Wuehler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job, there's always something fun to wrap up the show.
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Just Security is an online forum for the rigorous analysis of national security, foreign policy, and rights. We aim to promote principled solutions to problems confronting decision-makers in the United States and abroad. Our expert authors are individuals with significant government experience, academics, civil society practitioners, individuals directly affected by national security policies, and other leading voices.
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Artwork

1
Security This Week

Carl Franklin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork
 
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
  continue reading
 
Artwork

1
Cybersecurity Basement – der Podcast für echten Security-Content

suresecure GmbH, Michael Döhmen, Andreas Papadaniil

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달+
 
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast spricht Michael Döhmen alle 14 Tage mit spannenden Gästen über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. Ehrlich auf ...
  continue reading
 
Artwork

1
Security Guy'd

Security Guy'd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달+
 
Welcome to The Security Guy’d — the podcast where safety meets strategy! With your host, Rafee, each week we dive deep into the world of security, leadership, and everything in between. Whether you’re running a company, managing a team, or just passionate about keeping people safe — this show is your guide to smarter, stronger security. Expect real talk, expert guests, and practical tips to help you stay ahead of the game. Let’s lock in and level up — This is The Security Guy’d
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Loading …
show series
 
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
  continue reading
 
It's the holidays, your defenses are down, your inbox is lying to you, and yes—you're gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won't save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They explore the current state of security practices, identifying areas where organizations may be behind the curve, on track, or ahead of the curve in their security measures. Key topics include the importan…
  continue reading
 
In this episode of the Security by Default podcast, host Joseph Carson welcomes Ian Murphy, a cybersecurity expert and stand-up comedian. They discuss Ian's unconventional journey into cybersecurity, his experiences at the MOD and Symantec, and his transition to self-employment and comedy. Ian shares insights on the importance of storytelling in bo…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
Spotify music library scraped DDoS disrupts France's postal and banking services Fake delivery websites hit holiday shoppers Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join…
  continue reading
 
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There's a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn't infringe on any individual organization's privacy. That's why we hear the i…
  continue reading
 
Sicherheitsrisiken beim Model Context Protocol Der INNOQ Security Podcast meldet sich mit einer neuen Folge zurück: Christoph spricht mit Dominik über die Sicherheit von MCP-Servern. Die beiden diskutieren über die Bedrohungen und Sicherheitsfallstricke, die beim Einsatz von MCP-Servern lauern. Sie fragen sich: welche Schutzmaßnahmen gibt es eigent…
  continue reading
 
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
  continue reading
 
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.theregister.com/2025/12/09/hypervisor_ransomware_attacks_increasing https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable https://www.infosecurity-magazine.com/…
  continue reading
 
Jon's car may or may not be fixed. Eric didn't go to Disneyland. Android is making in-call scam protection better. AI is creating a Blessing of Unicorns. Parked Domains keep scammers alive. Space is getting crowded. Word of the Year - Slop. 0:00 - Introduction 6:38 - In Call Scam Protection 10:21 - A Blessing of Unicorns 13:15 - Parked Domains are …
  continue reading
 
Hi everyone, It's Dwayne, host of the security repo podcast. The show is taking a 2-week break over the holidays to give you a chance to catch up on our backlog of security conversations. Our next new episode premieres January 7th, 2026. It's one to look forward to. And I wanted to say a huge thank you to each and every one of our listeners and sub…
  continue reading
 
I'm so excited to share today's tale of pentest pwnage, because it brings back to life a coercion technique I thought wouldn't work against Windows 11! Spoiler alert: check out rpc2efs, as well as the 7MinSec Club episode we did on the topic this week. Also, our January Light Pentest LITE:GOAD class is open for registration here!…
  continue reading
 
Send us a text In this episode, we break down one of the most misunderstood — and most critical — aspects of security training in South Africa: the Course Report. Many students believe that receiving a certificate means their training is complete. In reality, without a submitted course report, your grades are not uploaded, your registration cannot …
  continue reading
 
Episode summary You have an email account, but how did you pick your email provider? Do you use Gmail simply because that’s what everyone you know uses? I want your choice of email provider to be intentional, not accidental. Today is the first in a series of episodes where we’ll examine my most important considerations when picking an email provide…
  continue reading
 
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
  continue reading
 
The Combating Global Corruption Act marks a new chapter in how the U.S. approaches corruption abroad. For the first time, the State Department must publicly rank foreign governments based on their anti-corruption efforts–evaluations that may carry real consequences for foreign aid, diplomacy, and sanctions. Yet the rollout comes at a moment of cont…
  continue reading
 
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Tanya Janca, @shehackspurple. Tanya is a hacker, software developer, author, and educator. She is passionate about application …
  continue reading
 
In dieser Folge von Cybersecurity Basement sprechen Michael und Andreas über die wichtigsten Cybersecurity-Trends des Jahres 2025 und darüber, was Unternehmen 2026 wirklich erwartet. Gemeinsam ordnen sie ein, wie KI in der Cybersecurity Angriffe und Verteidigung verändert hat, warum NIS2 für viele Organisationen mehr als nur ein Gesetz ist und welc…
  continue reading
 
Think your Kindle is harmless? Think again! In this episode, Graham and special guest Danny Palmer unpack a Black Hat Europe talk revealing how a boobytrapped audiobook could exploit the Amazon eBook reader - potentially letting an attacker break into your account and seize control of your credit card. Plus a blast from 2021's "summer of ransomware…
  continue reading
 
This week, Scott down with his Lawfare colleagues Alan Rozenshtein and Ari Tabatabai to talk through a few of the week’s big national security news stories, including: “Once You Pop, You Can’t Stop.” The Trump administration has given a green light to Nvidia to export its powerful H200 chips to China, opening a potentially significant new market wh…
  continue reading
 
Send us a text It’s Not in the Manual: Michael Gips on Writing the Leadership Book Security Needed In this powerful and deeply human episode of The Security Circle Podcast, host Yolanda “Yoyo” Hamblen is joined by one of the most respected voices in global security leadership, Michael Gips, to explore why the security profession needed this leaders…
  continue reading
 
Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
  continue reading
 
Guest: Bruce Schneier Topics: Do you believe that AI is going to end up being a net improvement for defenders or attackers? Is short term vs long term different? We're excited about the new book you have coming out with your co-author Nathan Sanders "Rewiring Democracy". We want to ask the same question, but for society: do you think AI is going to…
  continue reading
 
Sie erfahren per E-Mail von einer vermeintlichen Sicherheitslücke in Ihrem Unternehmen – wie reagieren Sie? Genau das besprechen wir in unserer aktuellen Folge des Security-Insider Podcast mit Marco Di Filippo. Lernen Sie mit uns das nötige Grundvokabular, um im Ernstfall auf Augenhöhe zu kommunizieren. Als Ethical Hacker weiß der Senior Cyber Secu…
  continue reading
 
今回は、リスナーからのメッセージにお答えします。 ラジオネーム:ぱっちょさん ラジオネーム:Nelly the catさん クラウドサービスのOutageについて、エンドユーザーができることを、マークさんの視点で回答していきます。 日・米からの素敵なコメントありがとうございました。저자 ベライゾンジャパン
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityHusam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He’s the founder of Memory Forensic and the author of Captain Cyber and the Safe Surfing Adventure. Husam is also a global speaker featured at events like BlackHat MEA, …
  continue reading
 
What is intergenerational security and how does it intersect with traditional concepts of national security? How do intergenerational dynamics and differing interactions with technology, social media and AI impact security and resilience? What are the security issues that young Australians care about and how do these differ from the concerns of old…
  continue reading
 
In this episode of Socializing Security, Brian and Milou dive into the messy, often misunderstood reality of working through the holiday season. From cultural expectations to the pressure of Q4 deadlines, they break down why this time of year feels especially heavy for consultants, founders, and global teams. They unpack the importance of boundarie…
  continue reading
 
All links and images can be found on CISO Series. Traditional identity systems authenticate credentials and devices, but they can't verify who's actually behind them. Attackers use AI-generated IDs and deepfake videos to pass background checks, then clone voices to reset MFAs at the help desk. Identity has become the primary attack surface, and exi…
  continue reading
 
Loading …

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생