Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Operations Podcasts

show episodes
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Ubuntu Security Podcast

Ubuntu Security Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
  continue reading
 
Artwork

1
Now in Android

Now in Android

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android's a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
We want to explore and dive deep into the world of Mysteries, Conspiracies, Scandals, Covert Operations, Folklore, Legends & More. We never claim to know everything, we never claim our opinion is correct, we simply put the evidence we have on the table and allow the audience to decide for themselves.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
Entry & Exit is a podcast about building, scaling, and exiting security and fire businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first compa ...
  continue reading
 
Artwork

1
The Guardian Way

Garrett Thomas

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Guardian Way is a weekly podcast from Guardian Protection Force that turns real-world security experience into practical guidance you can use today. Hosted by Garrett Thomas with co-host Terry MacAdam, each episode breaks down an operations-level topic like executive protection, protective intelligence, workplace violence prevention, campus security, remote guarding, and patrol program design. We focus on what works in the field, why it works, and how to implement it with clear steps, po ...
  continue reading
 
Artwork

1
Cyber Security America

Joshua R Nicholson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Artwork

1
Reality 2.0

Katherine Druckman and Doc Searls

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
Artwork
 
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
  continue reading
 
Artwork

1
Malicious Life

Malicious Life

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
  continue reading
 
Artwork

1
Acquisitions Anonymous - #1 for business buying, selling and operating

Bill D'Alessandro, Mills Snell, Heather Endresen, and Michael Girdley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Jump into the world of business acquisitions with hosts Bill D'Alessandro, Mills Snell, Heather Endresen, and Michael Girdley. We review real businesses for sale in each episode, providing expert insights, strategies, and tips to make savvy business moves like the pros. Perfect for entrepreneurs, investors, and anyone interested in buying and selling businesses.
  continue reading
 
Artwork

1
Mean Time To Insight

Enterprise Management Associates + APMdigest

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
America’s military operations are constantly evolving. From boot camp to boots on the ground, anchor Ryan Robertson provides in-depth coverage of international armed conflicts and the latest technological developments in weaponry worldwide.
  continue reading
 
Artwork

1
Building the Base

Building the Base

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
  continue reading
 
Loading …
show series
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
SANS Stormcast Thursday, November 20th, 2025: Unicode Issues; FortiWeb More Vulns; DLink DIR-878 Vuln; Operation WrtHug and ASUS Routers Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20tha…
  continue reading
 
In this episode the hosts critique a $4.28 million asking price for a Signal Security Franchise business in San Antonio earning ~$773K revenue—arguing it’s overpriced, under‑differentiated and risky. Business Listing – https://www.bizbuysell.com/business-opportunity/san-antonio-tx-highly-profitable-security-business-for-sale/2350661/ Welcome to Acq…
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
SANS Stormcast Tuesday, November 25th, 2025: URL Mapping and Authentication; SHA1-Hulud; Hacklore Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Co…
  continue reading
 
At 4 pm ET, Lawfare Executive Editor Natalie Orpett will sit down with Lawfare Senior Editor Roger Parloff and Lawfare Contributor James Pearce to discuss a judge dismissing the indictments against both former FBI Director James Comey and New York Attorney General Letitia James, ruling that Lindsey Halligan was not properly appointed to served as U…
  continue reading
 
CrowdStrike fires an insider who allegedly shared screenshots with hackers. Google agrees, it wasn’t Salesforce. Cox Enterprises confirms Oracle EBS breach. Alleged Transport for London hackers plead not guilty. Hackers exploit new WSUS bug to deploy ShadowPad backdoor. Iberia discloses breach of customer data. Harvard discloses voice-phishing brea…
  continue reading
 
Text the ATB Team! We'd love to hear from you! In this episode of the At The Boundary podcast, senior director of the GNSI, Jim Cardoso, sat down for a roundtable discussion with Mark Luther, an Associate Professor at USF and the Director for the Center of Maritime and Port Studies, Mark DuPont, the Executive Director of the National Maritime Law E…
  continue reading
 
In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Molly Roberts, Roger Parloff and Eric Columbus and Lawfare Public Service Fellow Loren Voss to discuss a judge ordering the Trump administration to end the National Guard deployment in D.C., updates in the prosecutions of Letitia James an…
  continue reading
 
The new Netflix movie A House of Dynamite, chronicles what happens when the unthinkable unfolds. How realistic is it? We ask the movie’s advisor and expert, Lieutenant General Daniel Karbler (Ret.). Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Want to hear your co…
  continue reading
 
SANS Stormcast Monday, November 24th, 2025: CSS Padding in Phishing; Oracle Identity Manager Scans Update; Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20…
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
It’s 2022 and Russia is preparing to invade Ukraine. But, for Putin, all is not going to plan. Enter: Yevgeny Prigozhin and the Wagner Group. Listen as David and Gordon tell the story of the disastrous first few months of the war in Ukraine and how Prigozhin’s force of cannibals and sex offenders were fed to the trenches in a desperate attempt to s…
  continue reading
 
From April 13, 2023: A few weeks ago, China made headlines for brokering a deal between Iran and Saudi Arabia to thaw diplomatic relations after seven years of cutting ties and even more years of tense relations. Since then, we've already begun to see some downstream effects of this deal, with significant movement on the war in Yemen and the reopen…
  continue reading
 
Please enjoy this encore of Career Notes. Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I h…
  continue reading
 
On this Special Edition podcast, we share a panel from DataTribe's Cyber Innovation Day 2025, "Cyber: The Wake of Tech Innovation." The podcast tech host panel included Dave Bittner, host of CyberWire Daily podcast, Maria Varmazis, host of T-Minus Space Daily podcast, and Daniel Whitenack, co-host of Practical AI podcast, sharing a wide-ranging dis…
  continue reading
 
From August 16, 2023: On July 18, Michigan Attorney General Dana Nessel unveiled criminal charges against 16 people—the “fake electors” from that state who featured in Trump’s effort to hold onto power in 2020. Just a few weeks later, a special counsel in Michigan announced additional charges related to the 2020 election, this time against three pe…
  continue reading
 
Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gai…
  continue reading
 
Top Democrat Sen. Jack Reed calls Trump threats “off the wall...” Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Karen Greenberg on Twitter https://x.com/KarenGreenberg3 Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on Substack https://…
  continue reading
 
Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy’s state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices.…
  continue reading
 
Ignite 2025 delivered major updates across Microsoft 365. In this episode, we discuss: Agent 365: Public preview now. Manage AI agents like identities with Entra Agent ID, renamed app registrations, and Teams app visibility. Copilot updates: Work IQ adds proactive personalization. Voice in Outlook Mobile for hands-free triage and scheduling (early …
  continue reading
 
Today Scott interviews Andy Lapteff. He opens up about his non-linear career path, starting from a working class background and his physical jobs in telecom to becoming a senior product marketing manager and podcaster. Join us as Andy shares candid stories of how he developed his resilience and the heartwarming origin story for the Art... Read more…
  continue reading
 
It is that time of year. Time to reflect… to look back… to realize how little we've learned, and shake our heads in sadness. 123456 is still the most used password according to a new study - and people still think that Taylor Swift is trying to sell them stuff on social media. We're looking at weak passwords and deepfake celebrities for 2025 on thi…
  continue reading
 
In this episode the hosts dissect a $23 million asking‑price acquisition of a Miami‑based specialty contractor with $41 M revenue, $4.7 M EBITDA, a $52 M backlog—and dig into its contract structure, accounting risks and deal suitability. Business Listing Link – https://businessesforsale.nuwireinvestor.com/business-opportunity/specialty-contractor-w…
  continue reading
 
For today’s episode, Lawfare Senior Editor Scott R. Anderson sits down with Joel Braunold, Managing Director of the S. Daniel Abraham Center for Middle East Peace and a Lawfare contributing editor, and Ambassador Jeffrey Feltman, the John C. Whitehead Visiting Fellow in International Diplomacy at the Brookings Institution, who previously served as …
  continue reading
 
In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group kno…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
*Declassified Club exclusive: ⁠⁠⁠SUBSCRIBE⁠⁠⁠⁠⁠⁠ to listen to the full series* Vladimir Putin has left Soviet East Germany and is now back in St Petersburg, dipping his toe in the world of organised crime. Listen as David and Gordon are once again joined by one of the world's leading experts on Russian organised crime, Mark Galeotti, to explore the…
  continue reading
 
SANS Stormcast Friday, November 21st, 2025: Oracle Idendity Manager Scans; SonicWall DoS Vuln; Adam Wilson (@sans_edu) reducing prompt injection. Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, ind…
  continue reading
 
The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API…
  continue reading
 
In this sponsored Soap Box edition of the podcast, Andrew Morris joins Patrick Gray to talk about how Greynoise can often get a 90 day heads up on serious vulnerabilities. Whether it’s malicious actors doing reconnaissance or the affected vendors trying to understand the scope of the problem, it seems that mass scanning activity lines up pretty nic…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play