Security 공개
[search 0]

Download the App!

show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Loading …
show series
 
Today we talk about a cool product called Deep Freeze, which, as its name implies, can "freeze" your computer in a known/good/frozen state. Then you can do whatever the flip you want to the machine (install icky things, tamper with C:\windows, pack your browser full of shady plugins, and more!), and then just reboot to restore! Note: this is not a …
 
EPISODE 203-Lessons in RedundancyThis week I discuss the 24-hour outage of Signal and why we should use it as an opportunity to prepare for future disruptions from other services. Let's create redundant options for everything important in our digital lives. Plus, an OSINT tip to reveal home addresses from at least one major ISP.Direct support for t…
 
This week's tools, tips and tricks covers Azure AD Investigator. FireEye Mandiant released this tool as open source in response to the SolarWinds hack to help businesses analyze their Microsoft 365 environments for security issues that may lead to an attack. Azure AD Investigator GitHub - https://github.com/fireeye/Mandiant-Azure-AD-Investigator Wh…
 
Welcome to episode 16 of the Software Security Gurus podcast. In this interview, he chats with Leif Dreizler, Product Security Manager at Segment. They discuss his "people over tools" security approach, his team structure, as well as the fact that at Segment, cross-site scripting and SQL injection are extinct. Want to nominate a guru? Check out www…
 
Martin Müller ist langjähriger Presales Senior Expert Security bei der SAP und berichtet über die Ansätze, die SAP selbst intern im Bereich Security fährt, und wie auch Kunden von diesen Erkenntnissen profitieren können. Außerdem verrät er, warum die SAP Security Suite mittlerweile auch interessant für die normale IT Security ist. Link zum ganzen A…
 
The latest edition of the ISMG Security Report features an analysis of the cybersecurity challenges the Biden administration must address. Also featured: payments security advice from Verizon; the outlook for the lifting of restrictions tied to the COVID-19 pandemic.저자 HealthcareInfoSecurity.com
 
And then it was over. Wow. Here’s hoping we can focus on traditional national security law topics from now on! Today is a pretty good start. We’ve got: A new administration needs a welcoming gift…so, here’s a delightful basket of…military commission charges involving the Bali/Jakarta bombings??? A parting gift from Army Secretary McCarthy: AR 190-8…
 
Powershell Ropping REvil Ransomware https://isc.sans.edu/forums/diary/Powershell+Dropping+a+REvil+Ransomware/27012/ SAP Exploit Circulating https://onapsis.com/blog/new-sap-exploit-published-online-how-stay-secure Oracle Critical Patch Update https://www.oracle.com/security-alerts/cpujan2021.html RDP Used for DDoS https://www.netscout.com/blog/aser…
 
Lee Hyeon-ju and her husband Choi Kyu-ho have been helping out at her grandmother’s dried fish business on weekends. The couple married in 2019, and live in Pohang on South Korea’s east coast. They’re already making plans to travel overseas once the pandemic is over. Lee and Choi, both 29, have a secret that they are keeping from some members of th…
 
One unexpected consequence of the global pandemic is the acceleration of digital transformation across organizations of all sizes. With so many employees working from home, organizations realized they needed to upgrade to a cloud infrastructure to support everyone working remotely. As applications moved from on-premises to the cloud to support thes…
 
Your privacy may be at risk if you're on Fleek, hackers not only steal COVID-19 vaccine data but then tamper with it to spread mistrust, and the Bitcoin bungles keep on coming... All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined …
 
Anonymous and private, yet busted! We explain how darkweb sites sometimes keep your secrets... and sometimes don't. We help you improve your cybersecurity at home. And we tell you the tale of a company with the coolset name but allegedly with the creepiest habits coded into its browser extensions. https://nakedsecurity.sophos.com/europol-announces-…
 
2021's first Patch Tuesday, Titan Security Key side-channel attack, WhatsApp. When is Chrome not Chromium? A major DuckDuckGo milestone. Project Zero in the wild. First Patch Tuesday of 2021. ZeroLogon Drop Dead. NSA warns against outsourcing DoH services. A Side-Channel in Titan. The "PayPal Football" WhatsApp's decision to bring its data into Fac…
 
We thought locking up data and demanding a ransom to decrypt it was bad. But ransomware criminals have stooped even lower and now, threats of public data exposure on top of multimillion-dollar ransoms are routine tactics. What's next? Where's ransomware going in 2021? Joining us to give his take is F-Secure's chief research officer and CISO MAG's C…
 
Recurring guest and friend of the program, Amy McLaughlin, returns to the UNSECURITY Podcast this week to discuss her new book titled "Learning Continuity Planning: A Handbook for Schools, Colleges & Universities." With Evan and Brad in the process of co-authoring a book as well, the three of them discuss their new works in detail. They also touch …
 
Welcome to the Security Weekly News Wrap up for the the Week of 10 - Jan 2021. Government, the Effabeeeye, Mimecast, Ubquiti, Cisco, and the German Police, all this and show wrap ups on the Security Weekly News Wrap Up! Show Notes: https://securityweekly.com/swn94 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Tw…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/click-this-link-to-fail-a-phishing-test/) Our phishing tests are designed to make you feel bad about yourself for clicking a link. We're starting to realize these tests are revealing how insensitive we are towards our employees. This episode is hosted by me, D…
 
Prologue This week on DtSR, an old friend Jamison Utter joins Rafal to talk about medical IoT devices, and what makes them different -- and of course, how we can better protect them. Jamison's company, Medigate, is a healthcare security and medical analytics company - and it's an interesting discussion on how this type of IoT differs from others wi…
 
The ​International Spy Museum​ in Washington, D.C. is a private non-profit museum dedicated to the tradecraft, history, and contemporary role of espionage. It boasts the largest collection of international espionage artifacts currently on public display, and says “The Museum's mission is to educate the public about espionage and ​intelligence​ in a…
 
Vom Hacker zum Sicherheitsberater Security-Insider Podcast - Folge 30: Ein Cheater mit besten Absichten Vom Hacker zum Sicherheitsberater Wer Moritz Schraml bucht, der will seine dunkle Seite genießen, oder die IT eines Unternehmens auf sichere Füße stellen. Wir haben den geläuterten Hacker vor das Mikrofon geholt und über seine Karriere zum profes…
 
In our first Security Awareness episode, Chris Hadnagy and Ryan MacDougall are joined by industry professional, Marcus Sailler to discuss his experience as the red team information security manager at Capital Group. Marcus shares some great tips on creating a successful security team and how you can prevent it from becoming the “No Police”. They al…
 
To help tech professionals get a stronger grasp on the important technology and how to leverage it within their own organisations, ISACA has released two new resources: Blockchain Framework and Guidance and Blockchain: An Executive View. Available for download here Blockchain Framework and Guidance For our 2021 opening episode, we speak with the le…
 
In the Security News, How two authors became part of WRT54G hacking history, European police and German law enforcement have taken down the illegal "DarkMarket" online marketplace, 70 unpatched Cisco vulnerabilities and why these are not a big deal, Adobe is blocking Flash content, most containers still run as root, watching private videos on YouTu…
 
This week, in the Enterprise Security News, Beyond Security partners with Vicarius, Amazon’s Parler removal and what it means for cloud confidence, Kount sold to Equifax, McAfee vs Crowdstrike, Jumpcloud raises some funds, Red Hat Acquires StackRox, and SolarWinds warnings of weak security and more. In the second segment, we talk Asset Management, …
 
How can multiple theoretical approaches yield a better understanding of international political politics? In Understanding and Explaining the Iranian Nuclear 'Crisis': Theoretical Approaches (Lexington Books, 2020), Dr. Halit M. E. Tagma, assistant professor in the department of politics and international affairs at Northern Arizona University and …
 
The DBoM consortium is a Linux Foundation project to be able to share information with third parties safely, securely, and with control over the information, even after handing it over! Unisys has just open-sourced the code to make this possible, and Chris was a big part of their effort. Using a blockchain-based approach, DBoM works to share softwa…
 
A resilient enterprise is able to recover its key business services from a significant unplanned disruption, protecting its customers, shareholders and ultimately the integrity of the financial system. Avoiding disruption to a particular system that supports a business service contributes to operational resilience. Speaker Profile: Pranathi is an e…
 
This week, we welcome Andrei Serban, Co-Founder at Fuzzbuzz, to discuss Fuzz Testing! Fuzzing can be successful AppSec strategy for finding software bugs. And deploying a fuzzer no longer needs to be a cumbersome process. Find out how fuzzing can help secure software beyond just memory safety issues and what the future holds for making this strateg…
 
Loading …

빠른 참조 가이드

Google login Twitter login Classic login