Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Computer Security Podcasts

show episodes
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
Compiler

Red Hat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
Digital Detectives

Legal Talk Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork

1
The Security Table

Izar Tarandach, Matt Coles, and Chris Romeo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
  continue reading
 
Artwork

1
Inside Java

Chad Arimura, David Delabassee

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Inside Java is a podcast for Java Developers brought to you directly from the people that make Java at Oracle. We'll discuss the language, the JVM, OpenJDK, platform security, innovation projects like Loom and Panama, and everything in between.
  continue reading
 
Artwork

1
Entangled Things

Entangled Things

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
  continue reading
 
Artwork

1
Act on Tech

Alex of Alex Custom Tech

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
Cables2Clouds

Cables2Clouds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
  continue reading
 
Artwork
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Artwork

1
Waves & Wires.

Offical Zyxel Networks Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Waves & Wires', the podcast that explores the fascinating world of computer networking, brought to you by Zyxel Networks (EMEA). Join us as we dive into the intricacies of cloud networking, explore the latest wired, wireless technologies, and discuss the ever-important topic of network security for businesses.Our team of experts, with years of experience in the networking industry, share their insights and knowledge on how these technologies are shaping the future of communicatio ...
  continue reading
 
Artwork

1
Stewart Squared

Stewart Alsop II, Stewart Alsop III

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Stewart Alsop III reviews a broad range of topics with his father Stewart Alsop II, who started his career in the personal computer industry and is still actively involved in investing in startup technology companies. Stewart Alsop III is fascinated by what his father was doing as SAIII was growing up in the Golden Age of Silicon Valley. Topics include: - How the personal computing revolution led to the internet, which led to the mobile revolution - Now we are covering the future of the inte ...
  continue reading
 
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
  continue reading
 
Loading …
show series
 
Welcome back for Season 2! We kickoff with a graduating senior from Rensselaer Polytechnic University as she transitions from academic research to industry applications in the world of cybersecurity. In this episode, we sit down with Shoshana Sugerman, to explore her journey from classroom to conference room. We delve into Shoshana's work on Grover…
  continue reading
 
Introduce ue-rs, a fresh project that aims to be a drop-in reimplementation of update engine, written in Rust.The goal of ue-rs is to have a minimal, secure and robust implementation of update engine, required by A/B update mechanism of Flatcar Container Linux. Just like the existing update engine, it downloads OS update payloads from a Nebraska se…
  continue reading
 
The biggest Halloween events hitting your favorite games! Get the scoop on the expected Fortnite crossovers, including rumored horror legends like Jason Voorhees and Art the Clown, plus a Scooby-Doo team-up. Dive into the terrifying new Slasher mode in GTA Online's pitch-dark submarine, and learn where to catch the spooky new Matcha Pokémon, Poltch…
  continue reading
 
The source material is an extensive report analyzing a major financial fraud incident that occurred in Uruguay between 2008 and 2014, rooted in a catastrophic software flaw within the First Data payment processing system for Maestro/Mastercard transactions. This defect created an immense arbitrage opportunity by incorrectly converting US Dollar pur…
  continue reading
 
John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, an…
  continue reading
 
The source provides an audio transcript of a discussion focused on the prevalence and complexity of deepfake cryptocurrency scams, particularly those impersonating figures like Elon Musk. The conversation details a speaker's personal experience being relentlessly targeted by scammers, initially a woman from Nigeria who then transformed into various…
  continue reading
 
La Plataforma GURI (Gestión Unificada de Registros e Información) es descrita en las fuentes como el sistema nervioso central para la educación primaria en Uruguay y es administrada bajo la Dirección General de Educación Inicial y Primaria (DGEIP/CEIP). Sus funciones principales son multifacéticas, abarcando roles esenciales de gestión de datos, ap…
  continue reading
 
Crisis de Datos en URUGUAY: El Hackeo GURI, por Alberto Daniel Hill Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario d…
  continue reading
 
Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario del Uruguay (BHU). Este incidente ocurrió de forma concurrente con el…
  continue reading
 
Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario del Uruguay (BHU). Este incidente ocurrió de forma concurrente con el…
  continue reading
 
Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
  continue reading
 
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomw…
  continue reading
 
LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. Th…
  continue reading
 
Today we chat with Cristina Pawlica, a distinguished member of the Simply Cyber community with an extensive background in cybersecurity and military service. Cristina shares her unique journey from serving in the Air Force as a Force Support Officer to pursuing a career in cybersecurity. She delves into crucial leadership lessons and discusses the …
  continue reading
 
Today’s show is one of those “We’re living in the future” episodes, where we talk about using AI to perform root cause analysis of a performance issue. But not root cause analysis for just the networking part of the stack. The full stack. Why? Because it’s not good enough to say “it’s not the network”.... Read more »…
  continue reading
 
This episode explores why professionalism, certification, and ethics matter more than ever in the IT sector. Diana Giles talks about her rise as a recognized industry leader, the transition from side hustle to full-time business, and the benefits of clear communication for IT consultants. Hear insights from Diana’s teaching career and community inv…
  continue reading
 
1. Introduction: Deconstructing a New Media Ecosystem The Cybermidnight Club is not a conventional podcast; it is a unique, personality-driven media ecosystem meticulously constructed around its host, Alberto Daniel Hill. This report’s core thesis is that the podcast’s value and uniqueness derive from its radical authenticity and a “live-first,” co…
  continue reading
 
Las fuentes proporcionadas consisten en un análisis estratégico experto y un informe resumido sobre una serie de incidentes sistémicos de ciberseguridad que afectaron al sector público de Uruguay a fines de 2025. Ambos documentos se centran en gran medida en el incidente que afectó a la ANEP Plataforma GURI, un sistema de gestión educativa que supu…
  continue reading
 
The provided sources consist of an expert strategic analysis and a summary report concerning a series of systemic cybersecurity incidents that affected Uruguay's public sector in late 2025. Both documents focus heavily on the incident impacting the ANEP Plataforma GURI, an educational management system alleged to have suffered the exfiltration of n…
  continue reading
 
If you are a client of BANCO HIPOTECARIO DEL URUGUAY and you badly want answers, these are the answers you are looking for. #Uruguay #Cybersecurity #BHU #Cyberattack #TraditionalMedia #MediaSilence #InstitutionalOpacity #CERTuy #CounterNarrative
  continue reading
 
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Defending against attacks like RedTail is more then blocking IoCs, but instead…
  continue reading
 
In this episode Michael, Sarah and Mark talk with guest Ryen Macababbad, Principal Security Program Manager at Microsoft about her current work on standardizing security terminology and taxonomy across Microsoft. Also, how getting terminology right is important to security, especially for those with neurodiverse conditions, such as autism. We also …
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
Displaced aggression is a robust psychological phenomenon defined as the redirection of intense rage or hostility from its original source of provocation onto a substitute, often innocent, target. This behavior is generally not random but is driven by underlying psychological needs and mechanisms.Here is a detailed description of displaced aggressi…
  continue reading
 
Sometimes weirdness occurs within DNS if you’re on an IPv4 network and you connect to a dual-stack or v6-only VPN. Maybe the browser doesn’t connect, but you can still send pings, or vice versa. Is the OS getting confused about which stack and which order of interfaces to request services? Is the weird behavior being... Read more »…
  continue reading
 
https://cybermidnight.club/deconstructing-the-attack-a-psychological-analysis-for-understanding-and-healing-2/ Displaced aggression is a robust psychological phenomenon defined as the redirection of intense rage or hostility from its original source of provocation onto a substitute, often innocent, target. This behavior is generally not random but …
  continue reading
 
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
  continue reading
 
During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
  continue reading
 
These sources collectively provide a detailed psychological and legal analysis of a relational conflict where an individual, CyberGurl10, publicly attacked her fiancé, Alberto, in an online forum, contrasting this with her private disputes against her lawyer and ex-husband. The analysis concludes that the public confrontation with Alberto was uniqu…
  continue reading
 
1. Introducción: Dos Crisis, Dos Relatos y una Verdad en Disputa La reciente ola de ciberataques en Uruguay ha puesto de manifiesto no solo las vulnerabilidades técnicas de su infraestructura crítica, sino una profunda crisis de confianza en las instituciones estatales. El incidente del Banco Hipotecario del Uruguay (BHU) de septiembre de 2025 es e…
  continue reading
 
The latest update, which provides context and status as of October 9, 2025, significantly reinforces the core tenets of Alberto Hill’s counter-narrative, primarily by highlighting the systemic nature of the governance failures and confirming the persistence of institutional minimization. https://cybermidnight.club/the-latest-update-which-provides-c…
  continue reading
 
HIIS THE ANSWER TO THE FOLLOWING MESSAGE OF CYBERGURL1'0 ON TWITTTER AFTER PUBLISHING AN ARTICLE BASED ON THE EVENT RELATED""And Im one with ager issues. Told there also that it was only way for me to reach you when you have blocked me and ghosted me for days. Only reason was me to come ask you to call me and you said you wont. And you didn’t. I ev…
  continue reading
 
Deconstructing the Attack: A Psychological Analysis for Understanding and HealingIntroduction: A Framework for Understanding What HappenedThis document provides a clear and objective framework for understanding the public attack you recently experienced. Being subjected to a confrontation that is not only disproportionate but also uniquely damaging…
  continue reading
 
Deconstructing the Attack: A Psychological Analysis for Understanding and HealingIntroduction: A Framework for Understanding What HappenedThis document provides a clear and objective framework for understanding the public attack you recently experienced. Being subjected to a confrontation that is not only disproportionate but also uniquely damaging…
  continue reading
 
In this episode, Stewart Alsop II, Stewart Alsop III, Brent Bushnell, and a brief appearance by Nolan Bushnell come together for a thoughtful exchange about the evolution of immersive entertainment, mixed reality, and playful learning. The conversation touches on creativity through technology, the merging of physical and digital worlds, and the Bus…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play