One question to wake up to every weekday morning. One story from Africa, for Africa. Alan Kasujja takes a deep dive into the news shaping the continent. Ready by early morning, five days a week, Monday to Friday.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
…
continue reading
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
…
continue reading
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Featuring interviews with GAO officials on significant issues and new reports, the Watchdog Report is recorded, hosted, and produced by GAO staff.
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
What’s happening right now on the frontlines of tech? From the C-Suite and Capitol Hill to AI and quantum computing, Niki breaks down trending tech to help savvy listeners get even smarter. A zippy conversation about emerging technology hosted by industry veteran Niki Christoff. Guests include experts, enthusiasts, regulators, policymakers, CEOs, and reporters. New episodes bi-weekly.
…
continue reading
Visit PodSights.ai to create your own podcast episode. Ask any question, get the answer as a PodSights podcast.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
ABC News Daily is the podcast that helps you understand the issues affecting your world. Every episode, host Samantha Hawley walks through one story with the help of an ABC colleague or expert in under 15 minutes. When you want coverage you can trust, listen to ABC News Daily. Key topics of recent episodes include the US presidential election, Donald Trump, Kamala Harris, polling, charges against Sean ‘Diddy’ Combs, coal power, renewable energy, Chinese EVs, cybersecurity, BYD, electric vehi ...
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Where business & technology meet. Covering topics as diverse as cybersecurity, enterprise software, hardware, data centers, blockchain, AI, cloud, 5G and IIoT.
…
continue reading
AI, ChatGPT, CPaaS, UC, UCaaS, Cloud Communications, Collaboration, 5G and Mobility: We report on how the world communicates.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
1
Gamification: Transforming Cybersecurity Awareness and Changing User Behavior, Hacker Rangers Podcast
While people are often viewed as the number one threat in cybersecurity, they can also serve as your strongest defense when properly trained. As the last line of defense against cyberattacks, users want more than passive training and checking off “cybersecurity training” from a to-do list. No one enjoys the monotonous “next > next > finish” course …
…
continue reading
Enjoy this Word Notes encore. The process of converting plain text into an unrecognizable form or secret code to hide its true meaning. Learn more about your ad choices. Visit megaphone.fm/adchoicesتوسط N2K Networks
…
continue reading
Before you listen to this episode, please be warned we will be discussing incidents that are highly distressing. Some of the explanations could upset some listeners. Abortion laws vary across Africa, leading to many cases of unsafe abortions. Sub-Saharan Africa records over 6 million unsafe abortions annually according to the African Institute for …
…
continue reading
1
Canadian Quantum computing used in Chinese researcher's early advances to break military level encryption: Cyber Security Today for Tuesday, October 14, 2024
7:30
Cybersecurity Today: Wayback Machine Read-Only, AI-Driven Phishing, and Quantum Computing Breakthroughs In this episode of Cybersecurity Today, host Jim Love discusses the recent cyber incident with the Internet Archive's Wayback Machine, which is now back online in read-only mode. He outlines sophisticated AI-driven Gmail phishing schemes that are…
…
continue reading
1
Books | Redefining Society and Technology in the Age of “Virtual Natives” and “Interconnected Realities” | A conversation with Author Leslie Shannon | Redefining Society Podcast With Marco Ciappelli
42:49
Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever (Book): https://amzn.to/4egYeVm Virtual Natives: How a New Generation is Revolutionizing the Future of Work, Play, and Culture (Book): https://amzn.to/4eh4NqL Guest: Leslie Shannon, Head of Trend and Innovation Scouting, Nokia [@nokia] On LinkedIn | …
…
continue reading
1
Books | “Kilimanjaro and Beyond” & ”The Secret Truth" | A Conversation with Author Barry Finlay | Audio Signals Podcast With Marco Ciappelli
39:08
The Secret Truth: A Jake Scott Mystery (Book): https://amzn.to/3BVs9Uo Kilimanjaro and Beyond: A Life-Changing Journey (Book): https://amzn.to/3Noyk64 Guest: Barry Finlay, Author On LinkedIn | https://www.linkedin.com/in/barry-finlay-01484825/ Website | https://www.barry-finlay.com/ Facebook | https://www.facebook.com/AuthorBarryFinlay/ Goodreads |…
…
continue reading
1
FBI Day In the Life. How FBI Fights Cybercrime.
1:02:39
1:02:39
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:02:39
We delve into the world of cybercrime with special guest Darren Mott, a former FBI agent who transitioned from teaching to law enforcement. He shares his journey into the FBI, the evolution of cyber investigations, and the challenges faced in tackling digital piracy. Mott discusses the creation of Operation Sudden Urge, an undercover operation aime…
…
continue reading
1
Road to Product Management - Ridhima Raina's UC Irvine Journey | Off the Record with Saman — Student Abroad Podcast
1:09:56
1:09:56
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:09:56
Guest: Ridhima Raina, MBA Leadership Development Program and Experian On LinkedIn | https://www.linkedin.com/in/ridhima-raina/ ________________________________ Host: Saman Fatima On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/saman-fatima ________________________________ This Episode’s Sponsors Are you interested in…
…
continue reading
In this edition of Between Two Nerds Tom Uren and The Grugq talk about how criminals are using deepfakes… but it is not the end of the world. Show notes OpenAI's October 2024 Influence and cyber operations update report Rest of World's 2024 AI election tracker A UN report on the adoption of technology by transnational organised crime…
…
continue reading
1
iconectiv sounds warning on election year scams to steal donor money, identity and more, MWC Podcast
16:27
There’s no question that AI is a weapon for the fraudster, says Chris Drake of iconectiv. AI enables fakes that are more realistic, personal, and convincing. State players and private parties engage in fraudulent practices to influence political outcomes. But politically based cams can also be a way to defraud people out of money. A simple appeal t…
…
continue reading
1
eSIM Go powers new opportunities for enterprises and partners to deliver better mobility experiences, MWC Podcast
7:47
A way to help customers avoid steep roaming charges Mitchell Fordham at eSIM Go at MWC 2024 LasVegas tells us about mobility opportunities from eSIM Go‘s ability to deliver mobility experiences to customers. We learn about roaming and how roaming charges can represent significant government revenue in popular tourist venues. eSIM Go enables compani…
…
continue reading
In just three weeks, Americans will choose whether they want Donald Trump or Kamala Harris in the White House and the contest is incredibly close. More than a hundred thousand eligible voters are living here in Australia, although not all will cast a ballot. Today, we meet an Australian-based Harris voter and a Trump voter, to talk about what’s dri…
…
continue reading
1
🚨 Iran Exploit Windows Flaw & OpenAI, China’s Salt Typhoon Attack Fears, Ransomware Costs Soar
16:34
🚨 Iran Exploit Windows Flaw & OpenAI, China’s Salt Typhoon Attack Fears, Ransomware Costs Soar 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Iran’s cyber activates with more news below: F5 Big-IP Abuse Fidelity Investment Data Breach Veeam RCE…
…
continue reading
From March 8, 2023: A few weeks ago, Human Rights Watch released a report on the forced expulsion of the Chagossian people, whom the United Kingdom deported from their island homes in the Indian Ocean about 60 years ago to make way for the United States to build a military base called Diego Garcia. The report recommends reparations for the Chagossi…
…
continue reading
1
Solution Spotlight: A first look at ISC2's 2024 Cybersecurity Workforce Study. [Special Edition]
31:15
In this special edition of Solution Spotlight, join us for an exclusive conversation between ISC2's Executive Vice President of Corporate Affairs, Andy Woolnough, and N2K's Simone Petrella. Together, they take a deep dive into ISC2's 2024 Cybersecurity Workforce Study, offering a first look at the most pressing findings. Discover insights from a su…
…
continue reading
Iranian hackers exploit Windows flaw to elevate privileges Microsoft deprecates PPTP and L2TP VPN protocols in Windows Server NATO’s ‘most experienced expert on cyber rotated out of cyber section Thanks to today’s episode sponsor, Conveyor What’s the ultimate jumpscare? That moment when the security questionnaire in the portal didn’t auto-save all …
…
continue reading
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here. Show notes Risky Biz News: Pro-Kremlin disinfo cluster disrupted ahead of Moldova's election
…
continue reading
Before you listen to this episode, please be warned we will be discussing incidents that are highly distressing. Some of the explanations are graphic and could upset some listeners. Today Mpho Lakaje sits down with Gaopalelwe Phalaetsile who had a horrifying experience when she went for an abortion facility in Johannesburg. It came after she was ra…
…
continue reading
Oasis is coming to Australia, but many fans will have already accepted they either won’t manage to get a ticket or if they do it’s going to cost a lot of money. So, what goes on behind the scenes with the big ticketing companies that control our live music scene? Today, Avani Dias on her Four Corners investigation into dynamic pricing and how Austr…
…
continue reading
From September 14, 2023: It’s been another brutal summer with seemingly constant natural disasters precipitated by climate change. The United States and other countries have rightfully begun thinking of climate change as a security issue. But extreme weather is not the only challenge we must contend with. There’s also the problem of climate change’…
…
continue reading
In this Risky Business News sponsored interview, Tom Uren talks to Dan Guido, CEO of Trail of Bits, about post-quantum cryptography. The pair dive into what it is, why it is needed now and how organisations are dealing with its adoption.
…
continue reading
Enjoy this special encore episode, where we are joined by a High Performance Computing Systems Administrator at Brigham Young University. Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed thi…
…
continue reading
This is the true cyber crime story of Lamborghini Carjackers Lured by a $243M Cyber heist, a dive into crypto fraud cases and how cyber crime turns violent. This episode explores the dramatic rise and fall of Ray Diaz, a young man entangled in a world of cybercrime, luxury, and violence. It delves into the consequences of doxxing, the ruthless natu…
…
continue reading
1
Lawfare Daily: Trump Trials and Tribulations Weekly Round-up (October 10, 2024)
1:10:04
1:10:04
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:10:04
This episode of “Trump’s Trials and Tribulations,” was recorded on Oct. 10 in front of a live audience on YouTube and Zoom. Lawfare Editor-in-Chief Benjamin Wittes spoke with Harvard Law School professor Jack Goldsmith and Lawfare Senior Editors Anna Bower and Roger Parloff. They discussed Jack’s recent op-ed in the New York Times—in which he argue…
…
continue reading
In this episode, Trevor Hilligoss, VP of SpyCloud Labs, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for ransomware opera…
…
continue reading
1
Tech Trends for 2025 with Brian Jackson, Principal Research Director for Info-Tech: Cyber Security Today Weekend for October 12, 2024
40:12
Exploring IT Trends and AI Opportunities with Brian Jackson In this crossover episode of Hashtag Trending, host Jim Love interviews Brian Jackson, Principal Research Director at InfoTech Research Group, to discuss emerging IT trends and their intersection with cybersecurity. The conversation covers AI advancements, quantum computing, and digital hu…
…
continue reading
In this episode, Trevor Hilligoss, VP of SpyCloud Labs, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for ransomware opera…
…
continue reading
1
Week in Review: Neuberger’s insurance warning, instant identification sunglasses, Salt Typhoon dangers
30:43
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Quincy Castro, CISO, Redis. Thanks to our show sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, sec…
…
continue reading
A Colorado health system’s patient portal has been compromised. Malicious uploads to open-source repositories surge over the past year. Octo2 malware targets Android devices. A critical vulnerability in Veeam Backup & Replication software is being exploited. The U.S. and U.K. team up for kids online safety. The European Council adopts the Cyber Res…
…
continue reading
1
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421
30:25
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-421
…
continue reading
1
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421
30:25
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
…
continue reading
Gen. H.R. McMaster has written a memoir about his action-packed 13 months serving as national security advisor to the 45th president of the United States. It’s titled “At War With Ourselves,” and it focuses on the widening divisions among Americans — divisions not just between the major political parties but very much within them. H.R. is an histor…
…
continue reading
Following the devastation of Hurricane Helene in western North Carolina, rumors and conspiracy theories about the disaster quickly began spreading online—some of them outrageous and bizarre, and some of them legitimate efforts to make sense of a confusing and frightening situation. With Hurricane Milton moving through Florida, the confusion seems u…
…
continue reading
White House prioritizes secure internet routing, using memory safe languages Federal Trade Commission and CISA warn of hurricane-related scams Mozilla warns of Firefox zero day: patch now Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security re…
…
continue reading
We re-visit our conversation with Analyst1 senior researcher Jon DiMaggio about how hackers settle their disputes – think People’s Court without all the robes.توسط Recorded Future News
…
continue reading
1
North Korean sponsored hackers target tech job seekers with phoney job interviews. Cyber Security Today for Friday, October 11, 2024
8:00
Cybersecurity Today: Data Breaches and Malware Threats In this episode of Cybersecurity Today, host Jim Love discusses the hacking incidents involving the Internet Archive and Fidelity, exposing millions of users' data. Highlights include the Internet Archive breach attributed to the Black Meta Hacktivist group, affecting 31 million users, and Fide…
…
continue reading