Security 공개
[search 0]
Download the App!
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매일
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
  continue reading
 
Artwork

1
Security-Insider

Peter Schmitz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달
 
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

1
Security This Week

Carl Franklin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
Artwork

1
Browsing Security

LayerX Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달
 
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
  continue reading
 
Artwork

1
Mostly Security

Jon King and Eric Wuehler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork

1
Security Guy'd

Security Guy'd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달+
 
Welcome to The Security Guy’d — the podcast where safety meets strategy! With your host, Rafee, each week we dive deep into the world of security, leadership, and everything in between. Whether you’re running a company, managing a team, or just passionate about keeping people safe — this show is your guide to smarter, stronger security. Expect real talk, expert guests, and practical tips to help you stay ahead of the game. Let’s lock in and level up — This is The Security Guy’d
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Loading …
show series
 
A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
  continue reading
 
We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks. Additionally, honing in on the human element of cybersecurity is nothing new. We’ve spoken with numerous guests about getting buy-in, improving training, and how creating a cyber-receptive culture is key i…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Nudge Security Nudge Security discovers new apps, accounts, and data-sharing in real-time and helps guide employees toward secure behaviors. Instead of trying t…
  continue reading
 
Today’s kind of a “story time with your friend Brian” episode: a tale of how my neighbor almost got scammed out of $13k. The story has a lot of red flags we can all keep in mind to keep ourselves (as well as kids/friends/parents/etc.) safer from these types of shenanigans.
  continue reading
 
Sanctions have become the go-to foreign policy tool for the United States. Coercive economic measures such as trade tariffs, financial penalties, and export controls affect large numbers of companies and states across the globe. Some of these penalties target nonstate actors, such as Colombian drug cartels and Islamist terror groups; others apply t…
  continue reading
 
Helpful episodes to listen to first Episode on Safe Website Checklist Item #1 Questions we answer in this episode What is Trustpilot? How did they help Makani identify a highly enticing scam? How can you use Trustpilot to help you stay safe while shopping online? When does Makani use Trustpilot? Episode summary Trustpilot helped me avoid a scam for…
  continue reading
 
New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
  continue reading
 
We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications? In the security news: Google Sues Badbox operators Authenticated or Unauthenticated, big difference and my struggle to get LLMs to create exploits for me Ring cameras that were not hacked Malicou…
  continue reading
 
In this episode of The Security Guy’d, we sit down with Christopher Klassen, a seasoned Security Executive, entrepreneur, and community leader. Christopher takes us on an honest, no-holds-barred journey through his early days in the security industry — from entry-level posts to leadership positions — and what it took to eventually start his own sec…
  continue reading
 
In this episode, Graham warns why it is high time we said goodbye to 2G - the outdated mobile network being exploited by cybercriminals with suitcase-sized SMS blasters. From New Zealand to London, scammers are driving around cities like dodgy Uber drivers, spewing phishing texts to thousands at once. Meanwhile, Carole unpacks a painfully awkward t…
  continue reading
 
In this episode of the Security Repo Podcast, we meet Christian Pinkston, a cybersecurity student and car culture enthusiast who's become a recognizable figure in the hacker community. Christian shares his unique journey into cybersecurity—from early experiments with hacking tools to volunteering at major conferences and running mesh networks with …
  continue reading
 
Send us a text "I spent 10 years living in the shadows — now I stand in the light to lead, and to show others it’s possible." — Hayley Elvins on the journey from covert roles to visible leadership Episode Summary: In this episode of The Security Circle, we sit down with Hayley Elvins — Managing Director of Sloan Risk Group, Director at the Security…
  continue reading
 
How do we get security right? The answer varies by many factors, including industry, what you're trying to protect, and what the C Suite and Board care about. Khaja Ahmed, Advisor at CISO Forum, joins Business Security Weekly to discuss how to get consensus on your security program. CISOs, executives, and the Board need to be aligned on the risks a…
  continue reading
 
Bypassing all passkey protections. The ransomware attacks just keep on coming. Cloudflare capitulates to the MPA and starts blocking. The need for online age verification is exploding. Microsoft really wants Exchange Servers to subscribe. Russia (further) clamps down on Internet usage. The global trend toward more Internet restrictions. China can i…
  continue reading
 
Episode 315 is available for our patreon donors and will be posted for everyone else on Monday, July 28. Going forward, episodes will be released to our patreon donors shortly after recording and will be released to everyone else a week later. If you want to become a patreon donor, you can do so here: https://www.patreon.com/defensivesec Also, our …
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the vulnerabilities in solar technology, particularly focusing on smart inverters and their implications for power grids. They delve into the cybersecurity landscape, emphasizing China's role in technology transfer and its impact on national security. The conversation…
  continue reading
 
In this episode of Socializing Security, Brian and Milou delve into the critical distinctions between IT disaster recovery and cyber attack recovery. They explore the definitions, planning strategies, recovery processes, and the varying impacts of each type of incident on organizations. The conversation emphasizes the importance of having well-defi…
  continue reading
 
Scott recorded this week’s special episode live from the 2025 Aspen Security Forum, where he sat down with a panel of top national security journalists—including co-host emeritus Shane Harris of The Atlantic, Mark Goldberg of the Global Dispatches podcast, and Alex Ward of the Wall Street Journal—to talk about some of the issues that have emerged a…
  continue reading
 
Implmenting new technologies for the business is already a daunting task. Cloud and SaaS have made some of the implementation easier, but it also makes it easier to not fully comprehend the risks you're taking on. All it can take is a company credit card. Organizations struggle with shadow IT, misconfigurations, and unauthorized access across multi…
  continue reading
 
Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there’s a hall-of-fame for cybersecurity books? Over the past decade, the Cybersecurity Canon has published reviews on dozens of cybersecurity books and established a hall of fame. Hall of fame books are defined as titles that all cybersecurity profession…
  continue reading
 
Eric gets new doors (almost) and Jon gets A/C. Amazon launches more Kuiper satellites with the help of SpaceX. You can use Passkeys to encrypt files and Android get's Gemini whether the user wants it or not. GPS is not the only location game in town and lots of mammals evolved into ant eaters? 0:00 - Introduction 12:22 - Kuiper Satellites 14:56 - P…
  continue reading
 
When Ryan Schonfeld began his security career as a D.C. law enforcement officer, he quickly became frustrated with traditional security methods. Tired of operational inefficiencies and determined to close longstanding security gaps, Schonfeld opted to drag the security industry into the modern day. Join host Steve Lasky on this episode of SecurityD…
  continue reading
 
------------------------------------------------------------To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of o…
  continue reading
 
Sie beschäftigen Gerichte, Sicherheitsdienstleister und den deutschen Verfassungsschutz: Nordkoreanische Akteure, die auf dem IT-Arbeitsmarkt ihr Unwesen treiben und sich für Kim Jong-Uns Volksrepublik (DPRK) an Gehaltstöpfen oder Daten westlicher Unternehmen bedienen wollen. Welche Gefahr von den potentiellen Schläfern ausgeht, klären wir in unser…
  continue reading
 
最近のサイバー関連のニュースから気になるトピックを、 マークさんの視点でいくつか解説してきます。 ・情報セキュリティ10大脅威 個人篇 https://www.ipa.go.jp/security/10threats/eid2eo0000005231-att/kaisetsu_2025_kojin.pdf ・160億件のログイン情報流出 https://news.yahoo.co.jp/articles/301d83ae61b352a823182842fe908bffe791ade2 ・電話を使用したフィッシング詐欺 https://xtech.nikkei.com/atcl/nxt/column/18/00989/042200175/…
  continue reading
 
Send us a text Eddie Miro joins us as a guest on the Security Chipmunks podcast, a social engineer, cybersecurity pro and a community leader, Eddie shares tips and advice for cybersecurity newcomers, shares his past and talks about the competition Octopus Game. At the heart of Eddie's current work is his involvement with DEF CON, where he runs "Oct…
  continue reading
 
In Episode 10, we take an in-depth look at the latest report from cybersecurity researcher Francis Odum, uncovering the key insights behind the numbers. We discuss: How third-party and credential-based risks are evolving What the report reveals about attacker tactics and system intrusion trends The growing risk surface of browsers and unmanaged end…
  continue reading
 
In this episode, Michael, Sarah and Mark talk to Den Delimarksy about the current posture of Model Context Protocol. Den serves on the committee that oversees MCP. We also cover the latest security news about Azure Firewall, OpenTelemetry, Azure Front Door, Azure Database for PostgreSQL and Azure Kubernetes Service. https://aka.ms/azsecpod…
  continue reading
 
Loading …

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생