Novinky Magazín Security
…
continue reading
Don't use what you learn from Buddhism to be a Buddhist. Use it to be a better whatever-you-already-are. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Braden Gall talks SEC football with experts from around the conference.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
Learn how to think not what to think.
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Hosted by SEC Mike Bratton and his Cousin Shane Follow them on Twitter @MichaelWBratton @BigOrangeVolz
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
International Conference of Secular Alcoholics Anonymous - atheists & agnostic in AA stories, panels, speakers, meetings... This is the podcast page for ICSAA recovery #addiction #recovery #atheism #ICSAA #secular #secularAA #alcohol #self-help #mutual-aid
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
Daily hard hitting opinions, insights and analysis on all things SEC sports. The beauty is in the banter as guests join the show to give their insight on all happenings around the Southeastern Conference. Simply put, the best SEC entity on the internet. Find every episode on Apple Podcasts, Spotify or YouTube. Be sure to subscribe to YouTube.come/@SECUnfiltered.
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
The International Supply Chain Protection Organization (ISCPO) podcast is for those interested in learning about security in the supply chain and upcoming events.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
One minute of national security with Frank Gaffney
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
The Securitization Podcast delivers real-world success stories, interesting investment strategies, and expert insights from industry leaders in securitization. Whether you're selecting assets, managing risk, or optimising performance, you'll gain actionable takeaways to refine your approach and drive results.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
#Cine, cine y más cine. Con la pasión y la "seriedad" que nos da nuestra cinefilia, Plano Secuencia es un espacio donde charlamos sobre películas de la cartelera mexicana actual, así como de temas de interés relacionados con el Séptimo Arte. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Robert And Amy yakk about news, culture, religion and whatever from a secular and atheist perspective. Join us for the weekly Mr Potter award or a yakking session. New episodes every Sunday!
…
continue reading
Join Ben (the Brew) and Darren (the Shavers) as they discuss all the things that make us love SEC sports so much!
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
This Line Isn’t Secure is an actual play Delta Green podcast blending high production value, immersive sound design, and slow-burning dread. Inspired by Archive 81 and Malevolent, it drags listeners into a world of conspiracies, cosmic horror, and paranoia. Nothing stays hidden forever.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading

1
THE WINDUP | Separation Begins For SEC Baseball At The Halfway Point
1:44:11
1:44:11
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:44:11"The Windup" returns as Chris Phillips and Harrison Fant talk all things SEC baseball including 5 of the 8 weekend series resulting in SWEEPS, Michael Earley vs. Nick Mingione, Chris' experience in Nashville, South Carolina players enjoying themselves despite recent losing streak, biggest takeaways at the halfway point of the 2025 regular season, m…
…
continue reading

1
2025 SEC Over/Under Win Totals Revealed & Final Four Set
1:19:43
1:19:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:19:43SEC Mike (@MichaelWBratton) & Cousin Shane (@BigOrangeVolz) are back to talk some SEC Football & Basketball Cousin Shane joins (2:00), NCAA Tournament update (7:00), 2025 SEC Over/Under Win Totals (16:00), Alabama (16:45), Oklahoma (20:15), Arkansas (23:30), Auburn (25:30), Florida (30:30), Georgia (35:15), Kentucky (40:45), LSU (42:45), Ole Miss (…
…
continue reading

1
Will the SEC Enforce America First Investing - or China First?
0:56
0:56
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
0:56For a dozen years, millions of U.S. investors have unwittingly had their pensions, college savings and other funds used to underwrite companies working for the Chinese military. That means they’ve helped our mortal enemy buy the weapons that may be used to kill them – and countless other Americans. President Trump has announced an America First Inv…
…
continue reading

1
SEC Spring Power Rankings 2025
1:02:40
1:02:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:02:40SEC Mike joins Braden Gall to rank all 16 teams heading into spring practice and magazine season. We put every team into one of five categories: The Bottom, Bowl Eligible Battles, The Good, Playoff Contenders and National Champions. Watch the show on YouTube. In Nashville? Be sure to check out M.L. Rose Craft Beer and Burgers. Music by The Wild Fea…
…
continue reading

1
SEC Sets New Sweet 16 Record. Hogs and Rebels Surge. Darren Finds Another Way to Irritate Vols Fans.
31:14
31:14
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:14It’s time for the Sweet 16 and the Elite 8! Ben and Darren make their picks and still find time to discuss West Virginia, the transfer portal, and new Texas head coachSean Miller. Plus, Ben makes wild accusationsabout Darren’s feeling toward Vol fans and his academic paper writing in college. Does Darren really irritate Vol fans? 0:00 – The tournam…
…
continue reading

1
FTC’s warning to 23andMe buyer, global phishing threats, Samsung breach
9:17
9:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
9:17FTC sends warning to future 23andMe buyer Global phishing threat targets 88 countries Samsung data breach tied to old stolen credentials Thanks to today's episode sponsor, Qualys "Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise TruRisk Management. Quantify your cyber risk in clear financial terms…
…
continue reading
Společnosti Rheinmetall a Lockheed Martin, partneři programu GMARS (Global Mobile Artillery Rocket System), uspořádaly summit pro mezinárodní zákazníky.
…
continue reading

1
SANS Stormcast Tuesday Apr 1st: Apache Camel Exploits; New Cert Authorities Requirements; Possible Oracle Breach
7:36
7:36
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
7:36Apache Camel Exploit Attempt by Vulnerability Scans A recently patched vulnerability in Apache Camel has been integrated into some vulnerability scanners, like for example OpenVAS. We do see some exploit attempts in our honeypots, but they appear to be part of internal vulnerablity scans https://isc.sans.edu/diary/Apache%20Camel%20Exploit%20Attempt…
…
continue reading

1
Defensive Security Podcast Episode 301
1:09:18
1:09:18
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:09:18In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss a range of cybersecurity topics, including the recent Oracle Cloud breach, the challenges of asset management in large environments, and the importance of prioritizing vulnerabilities. They also explore the findings from a pen test report, the implications …
…
continue reading

1
EP2066: Security Vocabulary - SMS vs CBS
9:39
9:39
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
9:39Sponsor by SEC Playground
…
continue reading

1
The toughest decisions CISOs have to make, MCP servers, Napster's comeback - ESW #400
55:15
55:15
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
55:15In this week's enterprise security news, Big funding for Island Is DLP finally getting disrupted? By something that works? We learn all about Model Context Protocol servers Integrating SSO and SSH! Do we have too many cybersecurity regulations? Toxic cybersecurity workplaces Napster makes a comeback this week, we’ve got 50% less AI and 50% more co-…
…
continue reading

1
IABs, Dark Web Fueling Ransomware Surge
39:58
39:58
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
39:58We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web co…
…
continue reading

1
Secure America’s “Pacific Heartland” Now!
0:57
0:57
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
0:57On Saturday, Defense Secretary Pete Hegseth marked the 80th anniversary of the battle of Iwo Jima, liberated from Imperial Japan in World War II at a cost of 26,000 killed. This occasion, like the rest of Pete’s travels across the Western Pacific last week, offered a most-needed reminder of the importance of the vast region’s strategic islands – an…
…
continue reading

1
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400
1:58:15
1:58:15
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:58:15A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
…
continue reading

1
The Top Trends Shaping Identity and Access Management in 2025 - Geoff Cairns - ESW #400
30:55
30:55
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:55In this interview, we feature some research from Geoff Cairns, an analyst at Forrester Research. This is a preview to the talk he'll be giving at Identiverse 2025 in a few months. We won't have time to cover all the trends, but there are several here that I'm excited to discuss! Deepfake Detection Difficult Zero Trust Agentic AI Phishing resistant …
…
continue reading

1
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400
1:58:15
1:58:15
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:58:15A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
…
continue reading

1
Document converter warning, Resurge exploits Ivanti, Blacklock hackers exposed
8:13
8:13
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:13FBI warns of increase in free online document converter scams Resurge malware exploits Ivanti flaw BlackLock hackers exposed through leak site vulnerability Thanks to today's episode sponsor, Qualys "Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise TruRisk Management. Quantify your cyber risk in c…
…
continue reading

1
SANS Stormcast Monday, March 31st: Comparing Phishing Sites; DOH and MX Abuse Phishing; opkssh
7:15
7:15
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
7:15A Tale of Two Phishing Sties Two phishing sites may use very different backends, even if the site itself appears to be visually very similar. Phishing kits are often copied and modified, leading to sites using similar visual tricks on the user facing site, but very different backends to host the sites and reporting data to the miscreant. https://is…
…
continue reading

1
EP2065: Soft Skill Day - Ichigo Inchie
4:00
4:00
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
4:00Sponsor by SEC Playground
…
continue reading

1
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Neil Desai - ESW #400
32:16
32:16
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:16A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
…
continue reading

1
Peder Anker, "For The Love of Bombs: The Trail of Nuclear Suffering" (Anthem Press, 2025)
44:31
44:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
44:31The truism that history is written by its winners reflects the literature about how the bomb came about, with apologetic books most often written by U.S. scholars. The physicist Robert Oppenheimer, the nuke’s ‘father’, is repeatedly centre stage, as in the case of the recent film about him. These are elitist stories that more often than not ignore …
…
continue reading
Od 28. do 30. května 2025 se na brněnském výstavišti po dvou letech uskuteční mezinárodní veletrh obranné a bezpečnostní techniky IDET.
…
continue reading

1
EP2064: Security News 22-29 March 2025
9:39
9:39
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
9:39Sponsor by SEC Playground
…
continue reading

1
Rhys Machold, "Fabricating Homeland Security: Police Entanglements Across India and Palestine/Israel" (Stanford UP, 2024)
40:47
40:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
40:47Homeland security is rarely just a matter of the homeland; it involves the circulation and multiplication of policing practices across borders. Though the term "homeland security" is closely associated with the United States, Israel is credited with first developing this all-encompassing approach to domestic surveillance and territorial control. To…
…
continue reading
Letošní veletrh Hannover Messe, který probíhá v hlavním městě Dolního Saska od 31. března do 4. dubna, se koná pod heslem „ENERGIZACE UDRŽITELNÉHO PRŮMYSLU“.
…
continue reading

1
FRIDAY NIGHT SPIKES | SEC Baseball MARCH MADNESS On A Friday Night
1:31:40
1:31:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:31:40Chris Phillips, Harrison Fant and Jake Mckeever react to the day that was across SEC baseball including Florida's continued struggles, A&M getting closer to their first SEC win, Chris' first experience at Hawkins Field in Nashville, LSU vs. Mississippi State and much more. Plus, the guys take your questions & comments as another electric SEC baseba…
…
continue reading
Sponsor by SEC Playground
…
continue reading

1
Mrtentacle, Morphing Meerkat, Tor, VMWare, Waymo, Oracle, Aaran Leyland, and more... - SWN #463
29:26
29:26
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:26Mrtentacle, Morphing Meerkat, Tor, VMWare, Waymo, Oracle, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-463
…
continue reading

1
Week in Review: Microsoft Trust abuse, 23andMe bankruptcy risks, NIST’s growing backlog
23:50
23:50
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
23:50Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jonathan Waldrop, CISO, The Weather Company Jonathan will be speaking at The CrowdStrike Crowd Tour, on Tuesday, April 15, 2025 in Atlanta – details here. He will also be speaking at the C Vision International Think Tank on April 24, …
…
continue reading

1
7MS #668: Tales of Pentest Pwnage – Part 69
30:22
30:22
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:22Hola friends! Today’s tale of pentest pwnage talks about abusing Exchange and the Azure ADSync account! Links to the discussed things: adconnectdump – for all your ADSync account dumping needs! Adam Chester PowerShell script to dump MSOL service account dacledit.py (part of Impacket) to give myself full write privileges on the MSOL sync account: da…
…
continue reading
El director surcoreano Bong Joon Ho continúa su exploración de la inequidad de clases sociales y la aplastante maquinaria capitalista aderezándola con el totalitarismo y las repercusiones de la muerte constante con Mickey 17 (2025), una estrafalaria comedia de ciencia ficción en la que seguimos a un atolondrado obrero espacial desechable que es clo…
…
continue reading
It’s a bad time for official Washington to be consumed with a Signal group chat involving top national security officials and a highly partisan journalist. After all, Russia and China appear poised for military aggression that, if not deterred, could prove catastrophic. Reportedly, there are multiple divisions worth of Russian troops massing in Bel…
…
continue reading

1
Checklist 417 - 23andMe Goes Bankrupt and a Crash Course in Signal
20:44
20:44
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
20:4423andMe has filed for chapter 11 bankruptcy protection. One California lawmaker says it’s time to have your DNA scrubbed from the company. We’ll tell you why and how to do it. Plus - What’s wrong with the end-to-end encrypted messaging app Signal? Nothing. But not everyone should use it. We’ll tell you more on this edition of The Checklist, brought…
…
continue reading

1
56. Home Network Attacks From Within
32:02
32:02
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:02Helpful episodes to listen to first Don't Answer the Phone Questions we answer in this episode What is a computer virus? How does a computer virus spread? How does patient (device) zero get infected? What protection do we NOT have against these attacks? Episode summary What happens if a device in your home gets infected with a computer virus? Just …
…
continue reading

1
JavaScript injection campaign, solar power vulnerabilities, SIM swap lawsuit
8:16
8:16
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:16150,000 sites compromised by JavaScript injection Vulnerabilities in numerous solar power systems found T-Mobile pays $33 million in SIM swap lawsuit Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ranso…
…
continue reading

1
SANS Stormcast Friday, March 28th: Sitecore Exploited; Blasting Past Webp; Splunk and Firefox Vulnerabilities
6:15
6:15
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
6:15Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks…
…
continue reading
When is a podcast not a podcast? Eric answers that question.Oleh Jon King and Eric Wuehler
…
continue reading

1
EP2062: Chill Chill Security - พรรคประชาชนเผยรายงาน Cyber Team กองทัพ หารหัสผ่านที่เคยรั่วไล่เจาะบัญชีเป้าหมาย
8:47
8:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
8:47Sponsor by SEC Playground
…
continue reading

1
The Set of All Sets | This Line Isn't Secure S1 E6 | Delta Green: Impossible Landscapes Actual Play
1:33:25
1:33:25
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:33:25New episodes premiere Thursdays at 6 PM EST. All Links and Social Media: https://linktr.ee/nullproj Support us on Patreon: https://www.patreon.com/thenullproject ---------- #DeltaGreen #ActualPlay #TTRPG #CosmicHorror #Lovecraftian #HorrorPodcast #TabletopRPG #RPGPodcast #Unnatural #NullProject #HorrorCommunity #RoleplayingGames #TabletopGames #Aud…
…
continue reading

1
SignalGate and How Not To Protect Secrets - PSW #867
2:07:11
2:07:11
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:07:11How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
…
continue reading

1
SignalGate and How Not To Protect Secrets - PSW #867
2:07:11
2:07:11
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:07:11How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
…
continue reading

1
THE WINDUP | Midweek Recap + SEC Baseball Conference Play Weekend #3 PREVIEW & PREDICTIONS
1:21:52
1:21:52
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:21:52"The Windup" returns as Chris Phillips and Harrison Fant talk all things SEC baseball including a full recap & breakdown of what went down in the midweek, a SNEAKY GOOD weekend slate including A&M & Florida both looking to get off the schneid, LSU/Alabama looking for a bounce back, UGA's bats looking to stay red hot, our trip to Nashville for Arkan…
…
continue reading

1
The "New Phone, Houthis?" Edition
1:32:37
1:32:37
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:32:37This week, Scott sat down with his Lawfare colleagues Benjamin Wittes and Roger Parloff to talk through the week of the most Rational Security-esque of national security news stories ever, including: “Oopsec.” In a strong contender for the most ridiculous national security story of the year, senior Trump administration officials appear to have plan…
…
continue reading

1
S16 E09 (VIDEO) Phishing, Encryption, and Cybersecurity Training
50:07
50:07
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
50:07Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a pos…
…
continue reading