Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
Overcoming impostor syndrome - Practical tips for combating feelings of not belonging in the cyber workplace provided by distinguished guests within the cyber security field
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
…
continue reading
I started out wrapping burritos at Chipotle, dreaming of something bigger but not quite sure where to go. Over time, that drive to learn and grow led me into cybersecurity—an industry where the stakes are high and the stories are endlessly fascinating. K.O.’s Launchpad is my way of opening the door for anyone curious about how to break in, level up, and find purpose in a field that’s shaping our digital future. In every episode, we’ll chat with experts, share practical strategies, and explor ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Bare Metal Cyber Presents: Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF). Hosted by Dr. Jason Edwards, this series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Wh ...
…
continue reading
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading

1
EP2105: Forensic Day - Why Prompts Are the New IOCs You Didn’t See Coming
12:43
12:43
Play later
Play later
Lists
Like
Liked
12:43Sponsor by SEC Playground
…
continue reading

1
EP2104: Chill Chill Security - Known Exploited Vulnerabilities Intel
3:25
3:25
Play later
Play later
Lists
Like
Liked
3:25Sponsor by SEC Playground
…
continue reading

1
A New Performance Zone for Software for National Security
1:02:23
1:02:23
Play later
Play later
Lists
Like
Liked
1:02:23Today, we have seen our national security organizations working to adopt modern software practices, particularly Agile methods and DevSecOps practices, efforts challenged by a mismatch of tempos between operational needs and development processes. The newly mandated Software Acquisition Pathway helps to align those tempos. However, to sustain a com…
…
continue reading

1
EP2103: Chill Chill Security - AI vs Human CTF Challenge
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02Sponsor by SEC Playground
…
continue reading

1
What’s inside the mystery box? Spoiler: It’s a scam!
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13As Dave Bittner is at the RSA Conference this week, our hosts Maria Varmazis and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” …
…
continue reading

1
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Lenny Zeltser, Dr. Aleksandr Yampolskiy - BSW #394
1:04:40
1:04:40
Play later
Play later
Lists
Like
Liked
1:04:40In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
…
continue reading

1
EP2102: Chill Chill Security - TNI x Secure-D and SECPlayground
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Sponsor by SEC Playground
…
continue reading

1
14 - The Intersection of Business and Cybersecurity
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42What are the real costs of cybersecurity implementation? Spoiler alert: it’s far more complex than it appears on the surface. Cybersecurity is a people and process problem, not a technology problem. Most of implementation costs come in the form of time, effort and coordination throughout the organization. In this episode, we reach back to classroom…
…
continue reading

1
EP2101: Security Vocabulary - General Malware vs Polymorphic Malware
4:29
4:29
Play later
Play later
Lists
Like
Liked
4:29Sponsor by SEC Playground
…
continue reading

1
OWASP broken access control (noun) [Word Notes]
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.By N2K Networks
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading

1
Cloud career roadmap: Azure Administrator vs Security Engineer certs | Guest Wilfredo Lanz
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work Hacks, Infosec Boot Camp instructor Wilfredo Lanz discusses the importance of Microsoft Azure certifications for IT and security professionals. With over 9…
…
continue reading

1
EP2100: Soft Skill Day - 7 พฤติกรรม "ที่สังคมบอกว่าดี" แต่ ดูดเงินคุณไปโดยไม่รู้ตัว
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18Sponsor by SEC Playground
…
continue reading
Sponsor by SEC Playground
…
continue reading
Sponsor by SEC Playground
…
continue reading

1
EP2097: Chill Chill Security - Certificate และคนทำงาน
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50Sponsor by SEC Playground
…
continue reading
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
…
continue reading

1
EP2096: Chill Chill Security - การเข้าถึงข้อมูล NLRB โดยมิได้รับอนุญาตจากคนของ DOGE
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49Sponsor by SEC Playground
…
continue reading

1
EP2095: Chill Chill Security - ข้อมูลรั่วไหล อันเกิดจากการใช้งาน Microsoft Defender XDR + Any.run
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39Sponsor by SEC Playground
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
EP2094: Security Vocabulary - Eradication vs Remediation
3:59
3:59
Play later
Play later
Lists
Like
Liked
3:59Sponsor by SEC Playground
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading

1
EP2093: Soft Skill Day - 7 พฤติกรรมเล็ก ๆ ที่หัวหน้าควรเลิก ถ้าอยากให้ทีมเก่งขึ้น
7:05
7:05
Play later
Play later
Lists
Like
Liked
7:05Sponsor by SEC Playground
…
continue reading
Sponsor by SEC Playground
…
continue reading

1
EP2091: Forensic Day - NIST SP 800-61 Rev.2 vs Rev.3
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27Sponsor by SEC Playground
…
continue reading
An organization’s cyber risk management practices must be rooted in organizational goals to be truly effective. In this webcast, Matt Butkovic, Greg Crabbe and Beth-Anne Bygum explore how best to align business and resilience objectives.By Matt Butkovic, Greg Crabbe and Beth-Anne Bygum
…
continue reading

1
EP2090: Chill Chill Security - DOGE และความเสี่ยงด้านความปลอดภัยทางไซเบอร์
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50Sponsor by SEC Playground
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
…
continue reading

1
EP2089: Chill Chill Security - inetpub folder ถูกสร้างเพราะ patch จริงหรือ
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57Sponsor by SEC Playground
…
continue reading

1
ISO 42001 Certification, CIOs Struggle to Align Strategies, and CISOs Rethink Hiring - Martin Tschammer - BSW #392
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
…
continue reading

1
EP2088: Chill Chill Security - พ.ร.บ. อาชญากรรมทางเทคโนโลยี ปรับใหม่
7:05
7:05
Play later
Play later
Lists
Like
Liked
7:05Sponsor by SEC Playground
…
continue reading

1
From Nuke Operator to Cybersecurity Expert: MIKE MCPHEE Shows What’s Possible
1:41:54
1:41:54
Play later
Play later
Lists
Like
Liked
1:41:54In this episode, I sit down with Mike McPhee, a principal solutions engineer at Cisco, to explore his expansive career in cybersecurity. We delve into his early experiences in the US Navy, his journey through multiple degrees and certifications, including the prestigious GIAC Security Expert, and the lessons he learned from challenging roles in the…
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading
Sponsor by SEC Playground
…
continue reading

1
When AI Goes Rogue: API Security in the Age of AI Agents | Guest Sam Chehab
49:35
49:35
Play later
Play later
Lists
Like
Liked
49:35Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work, Sam Chehab, the head of security and IT at Postman, dives into API security and the intriguing concept of rogue AI agents. Chehab discusses the internal c…
…
continue reading

1
EP2086: Soft Skill Day - 5 พฤติกรรมที่บอกว่า คุณอาจเป็นผู้นำที่ต้องหันหลังกลับทันที
7:05
7:05
Play later
Play later
Lists
Like
Liked
7:05Sponsor by SEC Playground
…
continue reading
Sponsor by SEC Playground
…
continue reading

1
EP2084: Forensic Day - Cross Check EDR ด้วย Windows Event Log
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37Sponsor by SEC Playground
…
continue reading

1
EP2083: Chill Chill Security - CVE Foundation
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47Sponsor by SEC Playground
…
continue reading
This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words ab…
…
continue reading

1
EP2082: Chill Chill Security - ถ้าโลกนี้ไม่มี CVE
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49Sponsor by SEC Playground
…
continue reading

1
Deny By Default as CISOs Battle Platform Fatigue and Show Value to the Board - Danny Jenkins - BSW #391
1:05:34
1:05:34
Play later
Play later
Lists
Like
Liked
1:05:34Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all acti…
…
continue reading

1
EP2081: Chill Chill Security - พูดคุยหลังจบ Security Analyst - From Zero to Hero
16:04
16:04
Play later
Play later
Lists
Like
Liked
16:04Sponsor by SEC Playground
…
continue reading
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
…
continue reading