Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
The Financial Findings podcast discusses recent research on financial wellness, retirement, disability, and other key financial issues that American households face every day. Episodes contain interviews with researchers and evidence-based strategies that policy makers and practitioners can implement to strengthen financial well-being for individuals at all stages of life.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
Cloud Realities

Capgemini

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork

1
IFPRI Podcast

International Food Policy Research Institute

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The International Food Policy Research Institute (IFPRI) provides research-based policy solutions to sustainably reduce poverty and end hunger and malnutrition in developing countries. Established in 1975, IFPRI currently has more than 600 employees working in over 50 countries. It is a research center of CGIAR, a worldwide partnership engaged in agricultural research for development.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
Nature Podcast

Springer Nature Limited

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
The Nature Podcast brings you the best stories from the world of science each week. We cover everything from astronomy to zoology, highlighting the most exciting research from each issue of the Nature journal. We meet the scientists behind the results and provide in-depth analysis from Nature's journalists and editors. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
  continue reading
 
Artwork

1
Occupied Thoughts

Occupied Thoughts by FMEP

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
From the Foundation for Middle East Peace (FMEP), Occupied Thoughts amplifies the voices of FMEP grantees and partners, offers critical framing, and promote new ideas and new angles on the many issues connected to achieving justice, security, and peace for Palestinians and Israelis. FMEP works to defend and support Palestinian rights, end Israel’s occupation of the West Bank, Gaza Strip, and East Jerusalem, and ensure a just and secure future for Palestinians and Israelis. FMEP advances this ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork

1
Asia Insight

National Bureau of Asian Research

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Podcasts from The National Bureau of Asian Research (NBR) covering the critical issues that leaders need to understand – because the decisions they make matter and the stakes are high.
  continue reading
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
The Sound of Economics brings you insights, debates, and research-based discussions on economic policy in Europe and beyond. The podcast is produced by Bruegel, an independent and non-doctrinal think tank based in Brussels. It seeks to contribute to European and global economic policy-making through open, fact-based, and policy-relevant research, analysis, and debate.
  continue reading
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Senior Intelligence Analysts Chris Morgan and Kim Bromley bring together over 30 years of experience in threat intelligence across government, military, and telecommunications. Along with their guests, they provide practical perspectives on t ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork
 
This podcast features content produced by the Secure World Foundation (SWF), an endowed, private operating foundation that promotes cooperative solutions for space sustainability and the peaceful uses of outer space. The Foundation acts as a research body, convener and facilitator to promote key space security, and other related topics, and to examine their influence on governance and international development.
  continue reading
 
Through the course of this series we’ll bring in some of IDA's top experts to share their perspectives on cutting-edge research and issues of importance to the U.S national security and science policy community.
  continue reading
 
Artwork
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Mean Time To Insight

Enterprise Management Associates + APMdigest

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
  continue reading
 
Artwork

1
AnthroDish

Sarah Duignan

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
AnthroDish explores the intersections between our foods, cultures, and identities. Host Dr. Sarah Duignan sits down one-on-one with people in academia, hospitality, farming and agriculture, and more to learn about their food knowledge and experiences. If you're interested in the unique lives of everyday people who have been shaped by their relationship with food, this show is for you!
  continue reading
 
At this moment of inflection in technology, co-hosts Elad Gil and Sarah Guo talk to the world's leading AI engineers, researchers and founders about the biggest questions: How far away is AGI? What markets are at risk for disruption? How will commerce, culture, and society change? What’s happening in state-of-the-art in research? “No Priors” is your guide to the AI revolution. Email feedback to [email protected]. Sarah Guo is a startup investor and the founder of Conviction, an investment f ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Loading …
show series
 
Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
  continue reading
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
Updates from RSAC 2025. Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop high-level software exploits. An FBI official warns that China is the top threat to U.S. critical infrastructure. Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. France ac…
  continue reading
 
'War, sanctions and western disunity' As Russia’s invasion of Ukraine is in its fourth year and efforts to pause the conflict have both intensified and become more complex, David O’Sullivan, the EU’s Sanctions Envoy since January 2023, discusses the use of sanctions by the EU and others on Russia. Since the invasion in 2022, sixteen packages of san…
  continue reading
 
This week on No Priors, Elad and Sarah sit down with Eric Mitchell and Brandon McKinzie, two of the minds behind OpenAI’s O3 model. They discuss what makes O3 unique, including its focus on reasoning, the role of reinforcement learning, and how tool use enables more powerful interactions. The conversation explores the unification of model capabilit…
  continue reading
 
We're sharing a episode from another N2K show we thought you might like. It's the third episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber car…
  continue reading
 
Today’s guest is Raheel Retiwalla, Chief Strategy Officer at Productive Edge — a digital transformation consultancy focused on healthcare. Productive Edge works with payers, providers, and health tech firms to leverage AI, data, and modern platforms to streamline operations, cut costs, and improve outcomes. With two decades of experience in digital…
  continue reading
 
TechnoVision 2025 by Capgemini helps business leaders and technologists understand and prioritize emerging technologies. It provides a clear view of tech trends, guiding decision-makers to enhance organizational effectiveness. TechnoVision acts as a beacon in the evolving technology landscape. In this very special episode, Dave, Esmee, and Rob talk…
  continue reading
 
Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
  continue reading
 
In her address to the IIEA, Professor Marie Jull Sørensen discusses consumer protection in the digital age. Professor Sørensen discusses some of the risks that consumers face in the digital environment and considers some of the challenges relating to digital contracts and automated decision-making. Professor Sørensen also discusses the possible rol…
  continue reading
 
A keynote address by Dr Gloria de la Fuente, Undersecretary of Foreign Affairs of Chile.This event has been organised in conjunction with the Embassy of Chile, Ireland.About the Speaker: Dr Gloria de la Fuente is a Chilean Political Scientist with a Ph.D. in Social Science from the Universidad de Chile. She currently serves as Undersecretary for Fo…
  continue reading
 
DHS Secretary Kristi Noem justifies budget cuts in her RSAC keynote. The EFF pens an open letter to Trump backing Chris Krebs. Scattered Spider is credited with the Marks & Spencer cyberattack. Researchers discover a critical flaw in Apple’s AirPlay protocol. The latest CISA advisories. On our Industry Voices segment, we are joined by Neil Gad, Chi…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: ReliaQuest's Discovery of Critical SAP NetWeaver Vulnerability AI Upgrade for Darcula Phishing Kit DragonForce's New Cartel Business Model Maximum Severity Commvault flaw Kim Bromley: Senior Cyber Threa…
  continue reading
 
In this episode: 00:46 What will be left of US science after Trump 2.0? 100 days into his term, President Donald Trump and his administration have already caused the biggest shakeup in modern scientific history, slashing funding, bringing large swathes of US research to a standstill and halting many clinical trials. But many fear these actions are …
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
In this episode of The Sound of Economics, Yuyun Zhan sits down with Bruegel’s own Alicia García-Herrero and Finbarr Bermingham, EU correspondent of South China Morning Post to unpack the latest developments in the US-China trade war and what they mean for the European Union. With Trump’s volatile approach to tariffs, China’s charm offensive toward…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly …
  continue reading
 
Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
  continue reading
 
More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
  continue reading
 
Send us a text Dr. Michelle I. Cardel, PhD, MS, RD is Chief Nutrition Officer of WeightWatchers ( https://www.weightwatchers.com/us/science-center/team/michelle-cardel?srsltid=AfmBOooheyN06Ngdf86tF274AuTsCjebrDKN1ccjFWOsyMk8hZPs_IRw ), where she oversees the company’s academic research partnerships and clinical trials, nutrition portfolio, and scie…
  continue reading
 
In this conversation, Matthew Chavira, CEO of Profits of AI,discusses his journey in the AI industry, particularly focusing on the evolution of humanoid robots like Sophia. He explores the rapid advancements in humanoid robotics, the integration of AI capabilities, and the public's perception of these technologies. Chavira emphasizes the importance…
  continue reading
 
The political landscape across the island of Ireland has been changing over the past decade. Demographic changes, Brexit, polling data, and the realignment of traditional politics in the Oireachtas all point to the need to prepare for the increasing inevitability of substantial constitutional change in the future. Dialogue around the potential for …
  continue reading
 
Violence against women and girls is a persistent and escalating crisis and remains one of the most pervasive human rights violations worldwide. From femicide and domestic abuse to online harassment and conflict-related sexual violence, the scale and severity of gender-based violence continues to deepen across every region. Despite international com…
  continue reading
 
RSAC 2025 is well under way, and Kevin the Intern files his first report. Authorities say Spain and Portugal’s massive power outage was not a cyberattack. Concerns are raised over DOGE access to classified nuclear networks. The FS-ISAC launches the Cyberfraud Prevention Framework. Real-time deepfake fraud is here to stay. On today’s Threat Vector, …
  continue reading
 
Send us a text Neil Steinberg and Mark Jonathan Harris are both acclaimed filmmakers and through a partnership with Generation Entertainment, The John A. Hartford Foundation ( https://www.johnahartford.org/resources/view/new-pbs-documentary-film-release-and-screenings-aging-in-america---survive-or-thrive ) and PBS SoCal ( https://www.pbssocal.org/s…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation. What exact…
  continue reading
 
Perhaps now more than ever, there’s renewed appreciation for the intricacies of our food systems' deep dependence on a global supply chain. However, that also raises challenges around our relationships with producers and understanding of food value. My guest today, Colin Fontaine, is here to discuss how to reorient American concepts of food and cul…
  continue reading
 
On today’s episode, we’re joined by Shub Agarwal, author of Successful AI Product Creation: A 9-Step Framework available from Wiley and a professor of the University of Southern California teaching AI and Generative AI product management to graduate students. He is also Senior Vice President of Product Management for AI and Generative AI at U.S. Ba…
  continue reading
 
A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcases just how accessible and disruptive these tools have become. This lightweight Remote Access Trojan (RAT) uses Discord …
  continue reading
 
SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
  continue reading
 
Loading …
Listen to this show while you explore
Play