Security công khai
[search 0]
Thêm

Download the App!

show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Loading …
show series
 
Is scraping the same as hacking or just an example of “zealous” use of a social media platform? And if it isn’t considered hacking…should it be? As more and more online platforms open their doors to API-based access, do we need more rules and oversight of how APIs are used to prevent wanton abuse? The post Episode 211: Scrapin’ ain’t Hackin’. Or is…
 
This week I discuss the offense (investigations) and defense (privacy tactics) surrounding the aftermath of the Capitol siege, plus the latest privacy news.Direct support for this podcast comes from sales of my books and the online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorseme…
 
This week's tools, tips and tricks episode talks about a password vault. KeePass is a free, open-source password vault for your local PC. The time is now to stop using static text files or excel spreadsheets to track your accounts. KeePass Website - https://keepass.info Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a…
 
Sophos cybersecurity expert Chester Wisniewski provides excellent, topical and timely commentary on the FBI’s recent use of a malware-like method to forcibly clean up hundreds of servers still infected in the Hafnium aftermath.With Paul Ducklin and Chester Wisniewskihttps://nakedsecurity.sophos.com/fbi-hacks-into-hundreds-of-infected-us-servershttp…
 
Our democracies repeatedly fail to safeguard the future. From pensions to pandemics, health and social care through to climate, biodiversity and emerging technologies, democracies have been unable to deliver robust policies for the long term. In Can Democracy Safeguard the Future? (Polity Press, 2021), Graham Smith, a leading scholar of democratic …
 
Overview This week we look at a reboot of the DWF project, Rust in the Linux kernel,an Ubuntu security webinar plus some details of the 45 CVEs addressedacross the Ubuntu releases this last week and more. This week in Ubuntu Security Updates 45 unique CVEs addressed [LSN-0075-1] Linux kernel vulnerability [01:01] 8 CVEs addressed in Trusty ESM (14.…
 
The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends.…
 
Why and How You Should be Using an Internal Certificate Authority https://isc.sans.edu/forums/diary/Why+and+How+You+Should+be+Using+an+Internal+Certificate+Authority/27314/ Vulnerabilities Used By Russian Foreign Intelligence Service https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2573391/russian-foreign-intelligence-service-…
 
Welcome to Software Security Gurus with Matias Madou. In episode 19, he chats to Bankim Tejani, Chief Security Architect and Distinguished Engineer at the Charles Schwab Corporation. They discuss his experience with big data breaches, as well as how secure coding can speed up remediation, and drive quality, performance, and scalability. Want to nom…
 
We continue the discussion about the importance of effective security awareness programs and what that would actually look like. We'll also examine how to move beyond "bare minimum" check-box mentality about meeting security awareness training requirements and imagine building a culture of security aware employees in the organization. Visit https:/…
 
Should insurance companies be banned from helping companies pay ransomware demands? How has malware messed with motorcars in the United States? And how are cybercriminals exploiting alcohol drinking during the pandemic? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Gr…
 
President Biden announces that all U.S. military forces will be out of Afghanistan by Sept. 11. A blackout at an Iranian nuclear facility is widely attributed to Israeli sabotage, complicating negotiations over a new nuclear deal. And we finally know the company that helped the FBI hack a notorious shooter’s phone. See acast.com/privacy for privacy…
 
Today we are going to take a look at security awareness training programs in organizations. We are joined to day by Kelley Bray and Stephanie Pratt who will help facilitate the discussion. We'll start with the history and evolution of security awareness programs; what has worked, or more precisely what hasn't worked. We'll also touch on how most se…
 
Im RZ10 Update spreche ich über aktuelle Themen und News in der Welt von SAP Basis & Security. Die Themen vom 14.04.2021: Security Patch Day April, CISA Warnung zu verschleppten SAP Updates und BSI Kampagne IT Sicherheit Ganzer Beitrag mit allen Links: https://rz10.de/1-noch/rz10-update-20210414/ Viel Spaß euch allen mit dieser Folge! Vielen lieben…
 
In our latest episode of Security Nation, we talk to Philip Reiner about his work with the Ransomware Task Force. Stick around for our Rapid Rundown, where Tod talks about a recently released bulletin from CISA about APT exploiting both new and old SAP vulnerabilities.Bởi Bri Hand, Jen Ellis, Tod Beardsley, Phil Reiner
 
In the last two episodes of this series (#449 and #450) we've been diving into how to not only speed up the process of spinning up a DIY pentest dropbox, but how to automate nearly the entire build process! In today's episode we talk specifically about how to streamline the Windows 10 build process. As previously mentioned, this article is awesome …
 
Originally Aired on April 12, 2021 Articles discussed in this episode: https://threatpost.com/azure-functions-privilege-escalation/165307/ https://www.theverge.com/2021/4/8/22374464/linkedin-data-leak-500-million-accounts-scraped-microsoft https://news.linkedin.com/2021/april/an-update-from-linkedin https://www.bbc.com/news/world-middle-east-567087…
 
This is a reassessment of British and Italian grand strategies during the First World War. Dr. Stefano Marcuzzi, Max Weber Fellow at the European University Institute, tries to shed new light on a hitherto overlooked but central aspect of Britain and Italy's war experiences: the uneasy and only partial overlap between Britain's strategy for imperia…
 
We speak with Chris Althaus who was appointed as Chief Executive Officer of the Australian Mobile Telecommunications Association (AMTA) in 2005. AMTA is the peak industry organisation representing Australia’s mobile telecommunications sector and operates programs covering all aspects of the mobile ecosystem such as - telecommunications policy, mobi…
 
Picture of the week. The Slips keep Streaming. Are You FLoC'ed? The PHP GIT Hack, revisited. CISCO abandons old routers having problems. Failure to Patch. PwnIt And OwnIt. We invite you to read our show notes at https://www.grc.com/sn/SN-814-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/se…
 
Today we are going to take a look at security awareness training programs in organizations. We are joined to day by Kelley Bray and Stephanie Pratt who will help facilitate the discussion. We'll start with the history and evolution of security awareness programs; what has worked, or more precisely what hasn't worked. We'll also touch on how most se…
 
Prologue This week, the show is back after a brief spring break, and we have with us Dmitri Alperovitch - who has taken on a new venture in his latest role. We discuss cybersecurity policy, government's role in private enterprise defense, and why you should probably never run your own MS Exchange Server. Lots of great content from the always inform…
 
One of the Mayhem for API’s guiding principles is to provide information where developers are. For instance, our CLI runs on your dev machine and can scan local APIs. The central tool to develop software as a team is a Source Code Management system like GitHub. The post Mayhem for API ❤️ GitHub: Seamless DevSecOps for your REST APIs appeared first …
 
Eintrittskarten im Netz BruteForce Passwort Cracker John the ripper und Hashcat ';--have i been pwned? und Pwned Passwords Timing-Angriffe beim String Vergleich fail2ban Unsere Podcast-Folgen zu OpenID und OAuth-Folgen Vortrag: Password123! Pepper hat bei Dropbox eine andere Bedeutung als sonst üblich scrypt im Vergleich zu BCrypt und PBDKF2 Argon2…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/what-to-expect-when-youre-expecting-a-network-breach/ Are you expecting a little intrusion into your network any day now? You better be prepared. Are there some vulnerabilities you should have managed, but didn't? Don't worry, first time security professionals …
 
In this week’s episode, co-hosts Steve Vladeck and Bobby Chesney discuss and debate: The proposed Domestic Terrorism Prevention Act (and DOJ’s January 2021 response to an earlier version of the DTPA) A pair of recent federal prosecutions involving attempt/conspiracy to provide material support to the Islamic State–and corresponding lessons about th…
 
Recorded Future’s Insikt Group recently published a research report titled, The Business of Fraud: An Overview of How Cybercrime Gets Monetized. The report describes the types of fraud methods and services currently used by threat actors to facilitate their campaigns. It provides an overview of some notable recent developments, lists some of the to…
 
In this episode of the Social-Engineer podcast, Chris Hadnagy and Maxie Reynolds are joined by Dr. Ida Ngambeki, an Assistant Professor of Computer and Information Technology at Purdue University. Listen in as they discuss importance of empathy and the best ways to teach social engineering. April 12, 2021 Download Ep. 143- Empathetic Hugs with Ida …
 
Josh and Kurt talk to Emil Wåreus from Debricked about the future of security scanners. Debricked is doing some incredibly cool things to avoid relying on humans for vulnerability identification and cataloging. Learn what the future of security scanning is going to look like. Show Notes Debricked Emil's Linkedin…
 
This week in the Security News, Polish blogger sued after revealing security issue in encrypted messenger, The Facebook dump and Have I Been Pwned, LinkedIn and more_eggs, APTs targeting Fortinet, SAP Applications Are Under Active Attack again, Is your dishwasher trying to kill you?, Ubiquiti All But Confirms Breach Response Iniquity, Cyber Threat …
 
This week, Lennart Koopmann, the CTO of Graylog, Inc, joins us for an interview to talk about Nzyme, a Free and Open WiFi Defense System. Then, Dutch Schwartz, Principal Security Specialist at Amazon Web Services, joins us for a discussion on the Lessons Learned When Migrating from On Prem to Cloud! In the Security News, Polish blogger sued after r…
 
This week, Elon visits an audio-only virtual bar, Ubiquity denies, Accellion, ToadSuck.gov, and more, plus show wrap-ups! Show Notes: https://securityweekly.com/swn114 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secwe…
 
Newly appointed Executive Editor at VentureBeat Fahmida Rashid joins the show to talk about her introduction to computer networking in school, her winding path into cybersecurity journalism, the security stories worth telling, the venture capital ecosystem, and the surge in unicorn cybersecurity startups. Links: Follow Fahmida on Twitter Fahmida Ra…
 
This week, In the first segment, Ryan Noon from Material Security join us for a discussion on Zero Trust! Next up, John Loucaides joins for an interview on firmware attacks, and what enterprises need to do! In the Enterprise Security News:Cyble raises $4M, ThreatQuotient raises $22.5M, OneTrust acquires Convercent, Digital Shadows announces new thr…
 
This week in the Enterprise News, Cyble raises $4M, ThreatQuotient raises $22.5M, OneTrust acquires Convercent, Digital Shadows announces new threat intelligence capabilities, Rapid7 Announces Kubernetes Open Beta in InsightVM, LogRhythm Releases Version 7.7, Imperva unveils new data security platform built for cloud, Acronis releases a new version…
 
On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the big Facebook data leak that has made headlines around the world this week, as well as a cyber attack aimed at European Union institutions, and a cyber incident impacting Australia’s parliament. We also discuss warnings from authorities in the U.S. about attackers atte…
 
Cloud computing was one of the last decade's most transformative technologies. It helped organizations launch exciting new applications and services, as well as innovate the way they operate. However, moving critical parts of IT infrastructure and operations outside of organizations' perimeters has significant security implications. The cloud is de…
 
Der Security-Rückblick für März 2021 Security-Insider Podcast - Folge 35: Wie Abkürzungen vor Angriffen schützen Der Security-Rückblick für März 2021 In unserem Monatsrückblick für März geht es um sprachliche Abkürzungen und sicherheitsrelevante Angriffe. Aufmerksame Zuhörer können dabei ihr Security-Wissen prüfen, Kommunikationsstrategien für die …
 
In this show I interview Phil and Ian about the Ever Given Ship being stuck in the Suez canal, Ice Breaker ships and the northern passage. We also discuss the reallocation of funds for the UK military, the new ranger force and the significance of the changing of the guard in the White House to the new administration. To follow Philip, click the lin…
 
Loading …

Hướng dẫn sử dụng nhanh

Google login Twitter login Classic login