Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Firewall

Firewall

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork
 
In a world marked by wicked social problems, The Minefield helps you negotiate the ethical dilemmas, contradictory claims and unacknowledged complicities of modern life.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
  continue reading
 
Artwork
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork

1
Cyber Coffee Hour

Dr. Joseph J. Burt-Miller Jr. and Alfredzo Nash

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
  continue reading
 
An exploration of the UAP - UFO phenomenon and the associated "high strangeness" which accompanies it from the standpoint of analysts and researchers. Fortean Winds is a collective of data and research professionals who began a project in 2020 to better understand the UFO/UAP phenomenon from the perspective of existing research and evidence. After a few years study and note taking (which you can see at our website https://www.forteanwinds.com) , we're ready to discuss our notes and insights ...
  continue reading
 
We break down how events like Russia's war in Ukraine and European security shifts are shaping Germany - and the world. Whether you’re a student, journalist, or policymaker, hosts Nina Haase, Michaela Küfner, and Richard Walker deliver the insights you need to understand where Germany is headed and why it matters, with a hint of Berlin's distinct energy. Published every Friday. Find us also on YouTube: @dwnews. Subscribe to our newsletter: dw.com/berlinbriefing. Leave us a comment here: news ...
  continue reading
 
This podcast feed for The Minefield is closing soon because it's a duplication of our main program but you won't miss an episode. Search iTunes for The Minefield - ABC RN or use this RSS feed: http://www.abc.net.au/radionational/feed/6344904/podcast.xml
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
Keefer Brother's Wilder Minds

Casey Keefer and Chris Keefer

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The Keefer Brothers have spent over 20 years mastering the art of survival- not just in the wild, but in the world of storytelling, business and life. Now, these pioneers make Wilder Minds their new home. Each episode, epic stories collide with unfiltered truth and personal evolution- to uncover what it takes to live life against the grain. Awake your soul with Wilder Minds.
  continue reading
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
  continue reading
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
The Internet Explorer's Podcast is a comedy-ish, science-ish, history-ish, popculture-ish parody podcast where curiosity meets absurdity. Each week, self-proclaimed "internet explorer" Jimmy dives headfirst into the wildest, weirdest, and most questionable corners of the internet. He “researches” topics like DIY invisibility cloaks, medieval alchemy, and whether plants can feel pain—then confidently explains his findings to a real expert, who sets the record straight while humoring Jimmy’s m ...
  continue reading
 
Hi there! I'm Doug Noll, an award-winning author, speaker, and trainer. I am, among many other things, a lawyer-turned-peacemaker, mediator, and expert in deep, empathic listening. I left a 22-year career as a trial lawyer, earned my Masters Degree in Peacemaking and Conflict Studies, and have helped thousands of companies and organizations with internal conflicts and poor communication. I am the co-founder of the award-winning Prison of Peace Project. I have trained mediators and leaders in ...
  continue reading
 
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
  continue reading
 
Artwork

1
DIAF

Adequate.com

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
  continue reading
 
Artwork
 
What if your breath was as important as your interface design? A podcast at the crossroads of mindful movement and meaningful tech. Hosted by Eric Infanti — Marine Corps veteran, UX design leader, and spiritual practitioner — Human by Design explores what it means to build systems, bodies, and lives that support human flourishing. From samadhi to strongman, wireframes to warrior breathwork — Eric's episodes bridge ancient wisdom with modern design. Human by Design explores the terrain where ...
  continue reading
 
Loading …
show series
 
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the growing threat of bad bots in cybersecurity, particularly in the context of AI advancements. They explore the statistics surrounding bot traffic, the implications for consumer behavior, and the challenges of legislation in regulating bot activity. The conversation also dives into the …
  continue reading
 
In this eye-opening episode, we sit down with Heather Benwell, Chief Marketing Officer at Challengeword, to explore one of the fastest-growing threats in cybersecurity: social engineering. From phishing to deepfakes, and the evolving complexity of human-targeted attacks, Heather shares stories, statistics, and insights that highlight just how vulne…
  continue reading
 
The concept of “norm cascades” influences everything from why we wouldn’t eat at an empty restaurant to why Bradley’s son was unimpressed with the recent NFL draft. On this episode of Firewall, Bradley is joined by guest co-host Cory Epstein where they dive deeper into norm cascades, Trump’s plunging approval rating, and an intriguing new AI regula…
  continue reading
 
Your host, Doug Noll, talks with the Founder of Simple Salt, Dylan Evans. Dylan shares his journey in the security industry, emphasizing the critical role of human behavior alongside technical measures. He discusses the common misconceptions that cybersecurity is purely technical, highlighting the importance of training and developing personnel. Dy…
  continue reading
 
Helpful episodes to listen to first Episode 40 - Website and Email Filtering Episode 56 - Home Network Attacks From Within Episode 57 - How Firewalls Protect You And What You Might Be Missing Questions we answer in this episode What is a trojan horse? What are two ways an outbound firewall protects you? What is an outbound firewall's greatest frust…
  continue reading
 
Split across the map for spring break, Chris, Casey, and JB reunite with wild stories and even wilder takes. From thundersnow in Midland to Chris losing a phone, a mask, and possibly his sanity in Mexico. They pour one out for Val Kilmer, crown Doc Holliday the undisputed GOAT, and entertain the theory that Jim Morrison might still be breathing. Ad…
  continue reading
 
Send us a text In this week’s episode, Jimmy takes on the unexpected connection between ancient fortifications and modern cybersecurity. With his signature mix of humor, curiosity, and overconfidence, he explores how the Great Wall of China wasn’t just a wall—it was a symbol, a system, and a psychological statement. Drawing parallels to today’s fir…
  continue reading
 
In this episode of the Cyber Coffee Hour, we're joined by Avanna Huynh, whose journey from financial spreadsheets to security frameworks proves that the best hackers don't always come from traditional tech backgrounds! Avanna shares how her financial risk analysis skills gave her a unique edge in cybersecurity, leading to her selection as a Top 20 …
  continue reading
 
00:00 Introduction to Scott Sinclair and His Journey in Tech 03:04 The Evolution of IT and Sustainability in Technology 06:10 Foodtastic's Growth and Brand Acquisitions 09:00 Technology's Role in Enhancing Customer Experience 11:48 The Future of Dining: Automation vs. Human Interaction 14:55 The Impact of Internet Speed on Restaurant Operations 17:…
  continue reading
 
In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
  continue reading
 
This week, we take a look at Azure Review Checklists. Relatively unbeknownst to us, this interesting capability allows you to really supercharge the reviews on your Azure environments! (00:00) - Intro and catching up. (03:03) - Show content starts. Show links - Azure Review Checklists - Azure Resource Inventory - Give us feedback!…
  continue reading
 
Send us a text In this episode, Jimmy welcomes back John Fike, a podcaster and YouTuber who’s spent years immersed in the Bigfoot community, interviewing people who claim to have had encounters. But this isn’t a debate about whether Bigfoot exists—John already believes he does. Instead, we’re diving into something even bigger: the culture of Bigfoo…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
  continue reading
 
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people’s credentials. https://isc.…
  continue reading
 
So what does modern work look like today? Richard talks to Karoliina Kettukari about her new role as the Head of Modern Work for a financial services company in Finland, and what modern work has evolved. Karoliina talks about how the pandemic accelerated modern work, such as being able to work anywhere and collaborating with whomever you need to. P…
  continue reading
 
Your host, Doug Noll, talks with the CEO and Managing Partner of Axia Public Relations, Jason Mudd. Jason shares his journey from journalism to public relations, emphasizing the transformative impact of the internet and AI on communication. He discusses his early experiences with web development, the evolution of media, and the strategic use of AI …
  continue reading
 
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a significant data leak involving an employee monitoring app, Work Composer, which leaked 21 million screenshots of user activity. They explore the implications of such leaks, the shared responsibility model in cloud security, and the need f…
  continue reading
 
Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation. What exact…
  continue reading
 
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows’ System Resource Usage Monitor (SRUM). This database logs how much resources software used…
  continue reading
 
Tune into this episode for a deep dive into the UK government's Cyber Governance Code of Practice. This Code is a crucial resource designed specifically for boards and directors. Understanding it can significantly benefit your organisation. By listening, you will gain insights into: • Why cyber governance is essential for modern businesses and orga…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss alarming statistics regarding cybercrime, including a record loss of $16.6 billion in 2024. They highlight the vulnerability of older Americans to cyber scams and the potential underreporting of these crimes. The conversation also touches on…
  continue reading
 
In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
  continue reading
 
In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
  continue reading
 
SANS Stormcast Monday, April 27th: Image Steganography; SAP Netweaver Exploited Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use…
  continue reading
 
As tech billionaires infiltrate the White House, the question looms, “Who really rules us, the government or Silicon Valley?" This film examines the influence and ideology of technocrats over the last century, and asks whether they pose a threat to democracy. Contributors: Gil Duran – Tech journalist Siva Vaidhyanathan – Professor of Media Studies,…
  continue reading
 
From bench tech to business owner, Devrryn Jenkins brings his multifaceted journey in offensive security to this week's episode. We explore how his experience across organizations of all sizes shaped his unique approach to red team operations and his philosophy that being a "jack of all trades is oftentimes better than a master of one." Devrryn sha…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and weather experiences to media consumption, including movies and documentaries. They delve into the phenomenon of romantic scams and share insights on the film 'Sinners,' highlighting its c…
  continue reading
 
A throwback turkey hunt, TSS loads strong enough to deport a gobbler, and permission stories that sound like fever dreams—gangrene feet, dogs eating roofing nails, and three innings of Tigers baseball with an old dude in his undies. The 989 Gobbler Club is handing out its finest (and most shameful) awards, including a wooden gun you really don’t wa…
  continue reading
 
Is Crimea the key to peace in Ukraine? On today’s episode, we break down Donald Trump’s claim that President Zelenskyy is prolonging the war by resisting calls to cede the Ukrainian peninsula Crimea to Russia. Our guests have updates on a devastating attack in Kyiv and on Friedrich Merz' controversial Taurus missile hint.…
  continue reading
 
Questions we answer in this episode What is a DDoS attack? What social media platform was recently the target of a DDoS attack? How can your home network be impacted by one? What can you do to protect your home network? Episode summary DDoS attacks are growing faster than the squash in my garden - seriously, it's wild! The slaves in the army? Devic…
  continue reading
 
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Tel…
  continue reading
 
Next up on The Race to Gracie Mansion is Queens Assemblymember Zohran Mamdani, who shares his socialist vision for a fairer, faster, and more functional New York—starting with rent freezes, universal childcare, and fast, free buses. Real leadership, he argues, means empowering experts, not micromanaging. A reimagined, newly empowered public sector …
  continue reading
 
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP addr…
  continue reading
 
This year marks the 100th anniversary of the first federal election to be held in Australia after the passage of Senator Herbert Payne’s private member’s bill, which made voting compulsory. In 1922, only 57.95 per cent of registered voters turned out. Payne’s home state of Tasmania had the poorest showing (45.93 per cent), whereas Queensland — wher…
  continue reading
 
This year marks the 100th anniversary of the first federal election to be held in Australia after the passage of Senator Herbert Payne’s private member’s bill, which made voting compulsory. In 1922, only 57.95 per cent of registered voters turned out. Payne’s home state of Tasmania had the poorest showing (45.93 per cent), whereas Queensland — wher…
  continue reading
 
In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes discuss the intersection of cybersecurity and emerging trends in technology, particularly focusing on the risks associated with AI-generated action figures and the implications of social media on personal privacy. They explore how seemingly harmless fun c…
  continue reading
 
Loading …
Listen to this show while you explore
Play