Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join your host Selena Larson, along with her N2K Network partners-in-crime, Dave Bittner and Rick Howard, as they delve into the mysteries behind notable cyberattacks. This segment focuses on the most impactful and intriguing malware stories. Its aim is to distill complex cybersecurity information into digestible, insightful episodes for tech profess ...
…
continue reading
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the N2K editorial team.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading
Enjoy this Word Notes encore. The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.Bởi N2K Networks
…
continue reading
Enjoy this Word Notes encore. The process of converting plain text into an unrecognizable form or secret code to hide its true meaning. Learn more about your ad choices. Visit megaphone.fm/adchoicesBởi N2K Networks
…
continue reading
1
T-Minus Overview- Engineering Space Structures.
29:39
29:39
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
29:39
Welcome to the T-Minus Overview Radio Show. In this program we’ll feature some of the conversations from our daily podcast with the people who are forging the path in the new space era, from industry leaders, technology experts and pioneers, to educators, policy makers, research organizations, and more. Remember to leave us a 5-star rating and revi…
…
continue reading
1
Solution Spotlight: A first look at ISC2's 2024 Cybersecurity Workforce Study. [Special Edition]
31:15
31:15
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:15
In this special edition of Solution Spotlight, join us for an exclusive conversation between ISC2's Executive Vice President of Corporate Affairs, Andy Woolnough, and N2K's Simone Petrella. Together, they take a deep dive into ISC2's 2024 Cybersecurity Workforce Study, offering a first look at the most pressing findings. Discover insights from a su…
…
continue reading
1
Billy Wilson: Translating language skills to technical skills. [HPC] [Career Notes]
7:07
7:07
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:07
Enjoy this special encore episode, where we are joined by a High Performance Computing Systems Administrator at Brigham Young University. Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed thi…
…
continue reading
1
Billy Wilson: Translating language skills to technical skills. [HPC]
7:07
7:07
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:07
Enjoy this special encore episode, where we are joined by a High Performance Computing Systems Administrator at Brigham Young University. Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed thi…
…
continue reading
1
Ransomware on repeat. [Research Saturday]
28:35
28:35
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
28:35
In this episode, Trevor Hilligoss, VP of SpyCloud Labs, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for ransomware opera…
…
continue reading
1
The youngest woman to reach the Kármán line.
40:15
40:15
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
40:15
Karsen Kitchen is the youngest woman to travel to space. As part of Blue Origin’s NS-26 crew, Karsen made history as the youngest woman ever to cross the Kármán line. She turned a childhood dream into reality and she hopes that she is leading the way for other women to follow. You can connect with Karsen on LinkedIn, and find out more about Orbitel…
…
continue reading
In this episode, Trevor Hilligoss, VP of SpyCloud Labs at SpyCloud, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for rans…
…
continue reading
A Colorado health system’s patient portal has been compromised. Malicious uploads to open-source repositories surge over the past year. Octo2 malware targets Android devices. A critical vulnerability in Veeam Backup & Replication software is being exploited. The U.S. and U.K. team up for kids online safety. The European Council adopts the Cyber Res…
…
continue reading
Vast unveils their design for their commercial space station Haven-1. Volta Space emerges from stealth and shares plans to collect power and transmit it via lasers to spacecraft on the lunar surface. China launches a Long March-3B carrier rocket with a new high-orbit internet services satellite into space, and more. Remember to leave us a 5-star ra…
…
continue reading
The Internet Archive gets breached and DDoSed. Dutch police arrest the alleged proprietors of an illicit online market. Fidelity Investments confirms a data breach. Marriott settles for $52 million over a multi-year data breach. Critical updates from Mozilla, FortiNet, Palo Alto Networks, VMWare, and Apple. Mongolian Skimmer targets Magento install…
…
continue reading
The US Space Force’s X-37B Orbital Test Vehicle is executing a series of novel maneuvers, called aerobraking, to change its orbit around Earth and safely dispose of its service module components. NASA’s Low-Cost Optical Terminal ground station transmitted its first laser communications uplink to the TBIRD (TeraByte Infrared Delivery). ispace and th…
…
continue reading
1
A nice-to-have turns into a must-have.
54:16
54:16
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
54:16
Josh Rosenzweig, Senior Director of AI & Innovation at Morgan Lewis, joins to discuss tackling security and compliance in the age of genAI. Ben has the story of California Governor Gavin Newsom vetoing a bill that would have regulated artificial intelligence. Dave looks at a Virginia court shutting down the use of license plate readers. While this …
…
continue reading
1
The e-commerce scam you didn’t see coming!
46:28
46:28
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
46:28
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of a South Carolina couple, and how they were devastated to discover their vacant land in Concord, Massachusetts was fraudulently sold by thieves who posed as them, with the new owners already building a home on the property, prompting a lawsuit and an FBI…
…
continue reading
Hackers target Russia’s court information system. Patch Tuesday rundown. GoldenJackal targets government and diplomatic entities in Europe, the Middle East, and South Asia.Cybercriminals are exploiting Florida’s disaster relief efforts. Australia introduced its first standalone cybersecurity law. CISA and the FBI issue guidance against Iranian thre…
…
continue reading
Momentus has been selected by NASA to provide launch services for future agency missions through its Venture-Class Acquisition of Dedicated and Rideshare (VADR) contract. XDLINX, Argo Space Corp. and Fortius have raised new funding and announced the closing of seed rounds. Advanced Space’s Cislunar Autonomous Positioning System Technology Operation…
…
continue reading
1
Election Propaganda: Part 2: Modern propaganda efforts. [CSO Perspectives]
50:31
50:31
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
50:31
In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz,…
…
continue reading
1
Election Propaganda: Part 2: Modern propaganda efforts. [CSO Perspectives]
50:31
50:31
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
50:31
In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz,…
…
continue reading
1
Election Propaganda: Part 2: Modern propaganda efforts.
50:31
50:31
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
50:31
In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz,…
…
continue reading
1
PLD outlines plans for future space access.
26:55
26:55
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
26:55
PLD Space also announced that its working on a family of large reusable launchers called the MIURA Next, as well as Europe's first private manned capsule, the LINCE. Starship's fifth flight test could launch as soon as this Sunday, October 13, pending regulatory approval. Earth Observation company BlackSky has been awarded a contract to deliver non…
…
continue reading
1
Key player unmasked in global ransomware takedown.
34:02
34:02
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
34:02
Western authorities I.D. a key member of Evil Corp. A major U.S. water utility suffers a cyberattack. ODNI warns of influence campaigns targeting presidential and congressional races. A California deepfakes law gets blocked. Europol leads a global effort against human trafficking. Trinity ransomware targets the healthcare industry. Qualcomm patches…
…
continue reading
Please enjoy this encore episode of Word Notes. Software or hardware that records the computer keys pressed by a user.Bởi N2K Networks
…
continue reading
Please enjoy this encore episode of Word Notes. Software or hardware that records the computer keys pressed by a user. Learn more about your ad choices. Visit megaphone.fm/adchoicesBởi N2K Networks
…
continue reading
1
THE FAIK FILES | Chapter 3: The Mindset and Tools of a Digital Manipulator
30:41
30:41
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
30:41
This is Part Three of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Per…
…
continue reading
Chinese hackers breach U.S. telecom wiretap systems. A third-party debt collection provider exposes sensitive information of Comcast customers. Homeland Security’s cybercrime division chronicles their success. Google removes Kaspersky antivirus from the Play store. Ukrainian hackers take down Russian TV and Radio channels. A crypto-thief pleads gui…
…
continue reading
SpaceX launches Europe’s Hera mission. NASA and SpaceX are standing down from the October 10, launch attempt of the agency’s Europa Clipper mission due to anticipated hurricane conditions in the area. Crew 8’s return has been delayed until Thursday at the earliest. Rocket Lab has been selected by NASA to complete a study for retrieving rock samples…
…
continue reading
1
Making security decisions around AI use. [CSO Perspectives]
18:13
18:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:13
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, has a free-wheeling conversation with Merritt Baer, Reco AI’s CISO, about how infosec professionals should think about AI, Machine Learning, and Large Language Models (LLMs). Learn more about your ad choices. Visit megaphone.fm/adchoicesBởi N2K Networks
…
continue reading
1
Making security decisions around AI use. [CSO Perspectives]
18:13
18:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:13
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, has a free-wheeling conversation with Merritt Baer, Reco AI’s CISO, about how infosec professionals should think about AI, Machine Learning, and Large Language Models (LLMs). Learn more about your ad choices. Visit megaphone.fm/adchoicesBởi N2K Networks
…
continue reading