show episodes
 
Artwork

1
Africa Daily

BBC World Service

Unsubscribe
Unsubscribe
Harian
 
One question to wake up to every weekday morning. One story from Africa, for Africa. Alan Kasujja takes a deep dive into the news shaping the continent. Ready by early morning, five days a week, Monday to Friday.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

Unsubscribe
Unsubscribe
Harian
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
  continue reading
 
Artwork

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Mingguan+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Mingguan+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

Unsubscribe
Unsubscribe
Bulanan
 
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Mingguan+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Caveat

N2K Networks

Unsubscribe
Unsubscribe
Mingguan
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Bulanan
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Artwork

1
The cyber weekly

Deogratius Okello and Josephine Olok

Unsubscribe
Unsubscribe
Bulanan+
 
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Unsubscribe
Unsubscribe
Mingguan+
 
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
ITSPmagazine Podcasts

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Harian
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
Artwork
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
  continue reading
 
Artwork
 
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
  continue reading
 
Artwork

1
Technado

ACI Learning

Unsubscribe
Unsubscribe
Mingguan
 
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Mingguan
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
  continue reading
 
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork

1
Tech'ed Up

Niki Christoff

Unsubscribe
Unsubscribe
Bulanan+
 
What’s happening right now on the frontlines of tech? From the C-Suite and Capitol Hill to AI and quantum computing, Niki breaks down trending tech to help savvy listeners get even smarter. A zippy conversation about emerging technology hosted by industry veteran Niki Christoff. Guests include experts, enthusiasts, regulators, policymakers, CEOs, and reporters. New episodes bi-weekly.
  continue reading
 
ABC News Daily is the podcast that helps you understand the issues affecting your world. Every episode, host Samantha Hawley walks through one story with the help of an ABC colleague or expert in under 15 minutes. When you want coverage you can trust, listen to ABC News Daily. Key topics of recent episodes include the US presidential election, Donald Trump, Kamala Harris, polling, charges against Sean ‘Diddy’ Combs, coal power, renewable energy, Chinese EVs, cybersecurity, BYD, electric vehi ...
  continue reading
 
Loading …
show series
 
While people are often viewed as the number one threat in cybersecurity, they can also serve as your strongest defense when properly trained. As the last line of defense against cyberattacks, users want more than passive training and checking off “cybersecurity training” from a to-do list. No one enjoys the monotonous “next > next > finish” course …
  continue reading
 
Dozens of small acts of sabotage and arson have flared across Europe as part of Russia’s hybrid battle against the West. This week, we spoke with four experts on Europe and Russia at the Council on Foreign Relations in Washington, DC to try to make sense of the Russian campaign and what the West can do in response. (edited)…
  continue reading
 
Before you listen to this episode, please be warned we will be discussing incidents that are highly distressing. Some of the explanations could upset some listeners. Abortion laws vary across Africa, leading to many cases of unsafe abortions. Sub-Saharan Africa records over 6 million unsafe abortions annually according to the African Institute for …
  continue reading
 
Cybersecurity Today: Wayback Machine Read-Only, AI-Driven Phishing, and Quantum Computing Breakthroughs In this episode of Cybersecurity Today, host Jim Love discusses the recent cyber incident with the Internet Archive's Wayback Machine, which is now back online in read-only mode. He outlines sophisticated AI-driven Gmail phishing schemes that are…
  continue reading
 
Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever (Book): https://amzn.to/4egYeVm Virtual Natives: How a New Generation is Revolutionizing the Future of Work, Play, and Culture (Book): https://amzn.to/4eh4NqL Guest: Leslie Shannon, Head of Trend and Innovation Scouting, Nokia [@nokia] On LinkedIn | …
  continue reading
 
The Secret Truth: A Jake Scott Mystery (Book): https://amzn.to/3BVs9Uo Kilimanjaro and Beyond: A Life-Changing Journey (Book): https://amzn.to/3Noyk64 Guest: Barry Finlay, Author On LinkedIn | https://www.linkedin.com/in/barry-finlay-01484825/ Website | https://www.barry-finlay.com/ Facebook | https://www.facebook.com/AuthorBarryFinlay/ Goodreads |…
  continue reading
 
We delve into the world of cybercrime with special guest Darren Mott, a former FBI agent who transitioned from teaching to law enforcement. He shares his journey into the FBI, the evolution of cyber investigations, and the challenges faced in tackling digital piracy. Mott discusses the creation of Operation Sudden Urge, an undercover operation aime…
  continue reading
 
Guest: Ridhima Raina, MBA Leadership Development Program and Experian On LinkedIn | https://www.linkedin.com/in/ridhima-raina/ ________________________________ Host: Saman Fatima On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/saman-fatima ________________________________ This Episode’s Sponsors Are you interested in…
  continue reading
 
In this edition of Between Two Nerds Tom Uren and The Grugq talk about how criminals are using deepfakes… but it is not the end of the world. Show notes OpenAI's October 2024 Influence and cyber operations update report Rest of World's 2024 AI election tracker A UN report on the adoption of technology by transnational organised crime…
  continue reading
 
There’s no question that AI is a weapon for the fraudster, says Chris Drake of iconectiv. AI enables fakes that are more realistic, personal, and convincing. State players and private parties engage in fraudulent practices to influence political outcomes. But politically based cams can also be a way to defraud people out of money. A simple appeal t…
  continue reading
 
A way to help customers avoid steep roaming charges Mitchell Fordham at eSIM Go at MWC 2024 LasVegas tells us about mobility opportunities from eSIM Go‘s ability to deliver mobility experiences to customers. We learn about roaming and how roaming charges can represent significant government revenue in popular tourist venues. eSIM Go enables compani…
  continue reading
 
In just three weeks, Americans will choose whether they want Donald Trump or Kamala Harris in the White House and the contest is incredibly close. More than a hundred thousand eligible voters are living here in Australia, although not all will cast a ballot. Today, we meet an Australian-based Harris voter and a Trump voter, to talk about what’s dri…
  continue reading
 
🚨 Iran Exploit Windows Flaw & OpenAI, China’s Salt Typhoon Attack Fears, Ransomware Costs Soar 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Iran’s cyber activates with more news below: F5 Big-IP Abuse Fidelity Investment Data Breach Veeam RCE…
  continue reading
 
From March 8, 2023: A few weeks ago, Human Rights Watch released a report on the forced expulsion of the Chagossian people, whom the United Kingdom deported from their island homes in the Indian Ocean about 60 years ago to make way for the United States to build a military base called Diego Garcia. The report recommends reparations for the Chagossi…
  continue reading
 
In this special edition of Solution Spotlight, join us for an exclusive conversation between ISC2's Executive Vice President of Corporate Affairs, Andy Woolnough, and N2K's Simone Petrella. Together, they take a deep dive into ISC2's 2024 Cybersecurity Workforce Study, offering a first look at the most pressing findings. Discover insights from a su…
  continue reading
 
Iranian hackers exploit Windows flaw to elevate privileges Microsoft deprecates PPTP and L2TP VPN protocols in Windows Server NATO’s ‘most experienced expert on cyber rotated out of cyber section Thanks to today’s episode sponsor, Conveyor What’s the ultimate jumpscare? That moment when the security questionnaire in the portal didn’t auto-save all …
  continue reading
 
Before you listen to this episode, please be warned we will be discussing incidents that are highly distressing. Some of the explanations are graphic and could upset some listeners. Today Mpho Lakaje sits down with Gaopalelwe Phalaetsile who had a horrifying experience when she went for an abortion facility in Johannesburg. It came after she was ra…
  continue reading
 
Oasis is coming to Australia, but many fans will have already accepted they either won’t manage to get a ticket or if they do it’s going to cost a lot of money. So, what goes on behind the scenes with the big ticketing companies that control our live music scene? Today, Avani Dias on her Four Corners investigation into dynamic pricing and how Austr…
  continue reading
 
From September 14, 2023: It’s been another brutal summer with seemingly constant natural disasters precipitated by climate change. The United States and other countries have rightfully begun thinking of climate change as a security issue. But extreme weather is not the only challenge we must contend with. There’s also the problem of climate change’…
  continue reading
 
Enjoy this special encore episode, where we are joined by a High Performance Computing Systems Administrator at Brigham Young University. Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed thi…
  continue reading
 
This is the true cyber crime story of Lamborghini Carjackers Lured by a $243M Cyber heist, a dive into crypto fraud cases and how cyber crime turns violent. This episode explores the dramatic rise and fall of Ray Diaz, a young man entangled in a world of cybercrime, luxury, and violence. It delves into the consequences of doxxing, the ruthless natu…
  continue reading
 
This episode of “Trump’s Trials and Tribulations,” was recorded on Oct. 10 in front of a live audience on YouTube and Zoom. Lawfare Editor-in-Chief Benjamin Wittes spoke with Harvard Law School professor Jack Goldsmith and Lawfare Senior Editors Anna Bower and Roger Parloff. They discussed Jack’s recent op-ed in the New York Times—in which he argue…
  continue reading
 
In this episode, Trevor Hilligoss, VP of SpyCloud Labs, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for ransomware opera…
  continue reading
 
Exploring IT Trends and AI Opportunities with Brian Jackson In this crossover episode of Hashtag Trending, host Jim Love interviews Brian Jackson, Principal Research Director at InfoTech Research Group, to discuss emerging IT trends and their intersection with cybersecurity. The conversation covers AI advancements, quantum computing, and digital hu…
  continue reading
 
In this episode, Trevor Hilligoss, VP of SpyCloud Labs, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for ransomware opera…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Quincy Castro, CISO, Redis. Thanks to our show sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, sec…
  continue reading
 
A Colorado health system’s patient portal has been compromised. Malicious uploads to open-source repositories surge over the past year. Octo2 malware targets Android devices. A critical vulnerability in Veeam Backup & Replication software is being exploited. The U.S. and U.K. team up for kids online safety. The European Council adopts the Cyber Res…
  continue reading
 
Gen. H.R. McMaster has written a memoir about his action-packed 13 months serving as national security advisor to the 45th president of the United States. It’s titled “At War With Ourselves,” and it focuses on the widening divisions among Americans — divisions not just between the major political parties but very much within them. H.R. is an histor…
  continue reading
 
Following the devastation of Hurricane Helene in western North Carolina, rumors and conspiracy theories about the disaster quickly began spreading online—some of them outrageous and bizarre, and some of them legitimate efforts to make sense of a confusing and frightening situation. With Hurricane Milton moving through Florida, the confusion seems u…
  continue reading
 
White House prioritizes secure internet routing, using memory safe languages Federal Trade Commission and CISA warn of hurricane-related scams Mozilla warns of Firefox zero day: patch now Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security re…
  continue reading
 
Cybersecurity Today: Data Breaches and Malware Threats In this episode of Cybersecurity Today, host Jim Love discusses the hacking incidents involving the Internet Archive and Fidelity, exposing millions of users' data. Highlights include the Internet Archive breach attributed to the Black Meta Hacktivist group, affecting 31 million users, and Fide…
  continue reading
 
Loading …

Panduan Referensi Cepat