SEC publik
[search 0]
Lebih
Unduh Aplikasinya!
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Security-Insider

Peter Schmitz

icon
Unsubscribe
icon
Unsubscribe
Bulanan
 
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
  continue reading
 
Artwork

1
Rational Security

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Mingguan
 
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Harian
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
Unsubscribe
Mingguan
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork
 
International Conference of Secular Alcoholics Anonymous - atheists & agnostic in AA stories, panels, speakers, meetings... This is the podcast page for ICSAA recovery #addiction #recovery #atheism #ICSAA #secular #secularAA #alcohol #self-help #mutual-aid
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork

1
SEC Unfiltered

Blue Wire, SEC Unfiltered

icon
Unsubscribe
icon
Unsubscribe
Harian
 
Daily hard hitting opinions, insights and analysis on all things SEC sports. The beauty is in the banter as guests join the show to give their insight on all happenings around the Southeastern Conference. Simply put, the best SEC entity on the internet. Find every episode on Apple Podcasts, Spotify or YouTube. Be sure to subscribe to YouTube.come/@SECUnfiltered.
  continue reading
 
Artwork

1
Mostly Security

Jon King and Eric Wuehler

icon
Unsubscribe
icon
Unsubscribe
Mingguan
 
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Mingguan
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Mingguan+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
Unsubscribe
Mingguan
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
The Securitization Podcast delivers real-world success stories, interesting investment strategies, and expert insights from industry leaders in securitization. Whether you're selecting assets, managing risk, or optimising performance, you'll gain actionable takeaways to refine your approach and drive results.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
Unsubscribe
Bulanan+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

icon
Unsubscribe
icon
Unsubscribe
Bulanan+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
Artwork

1
Plano Secuencia

Plano Secuencia

icon
Unsubscribe
icon
Unsubscribe
Mingguan
 
#Cine, cine y más cine. Con la pasión y la "seriedad" que nos da nuestra cinefilia, Plano Secuencia es un espacio donde charlamos sobre películas de la cartelera mexicana actual, así como de temas de interés relacionados con el Séptimo Arte. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
This Line Isn’t Secure is an actual play Delta Green podcast blending high production value, immersive sound design, and slow-burning dread. Inspired by Archive 81 and Malevolent, it drags listeners into a world of conspiracies, cosmic horror, and paranoia. Nothing stays hidden forever.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Mingguan+
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
Unsubscribe
Mingguan
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
Unsubscribe
Bulanan
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Loading …
show series
 
"The Windup" returns as Chris Phillips and Harrison Fant talk all things SEC baseball including 5 of the 8 weekend series resulting in SWEEPS, Michael Earley vs. Nick Mingione, Chris' experience in Nashville, South Carolina players enjoying themselves despite recent losing streak, biggest takeaways at the halfway point of the 2025 regular season, m…
  continue reading
 
SEC Mike (@MichaelWBratton) & Cousin Shane (@BigOrangeVolz) are back to talk some SEC Football & Basketball Cousin Shane joins (2:00), NCAA Tournament update (7:00), 2025 SEC Over/Under Win Totals (16:00), Alabama (16:45), Oklahoma (20:15), Arkansas (23:30), Auburn (25:30), Florida (30:30), Georgia (35:15), Kentucky (40:45), LSU (42:45), Ole Miss (…
  continue reading
 
For a dozen years, millions of U.S. investors have unwittingly had their pensions, college savings and other funds used to underwrite companies working for the Chinese military. That means they’ve helped our mortal enemy buy the weapons that may be used to kill them – and countless other Americans. President Trump has announced an America First Inv…
  continue reading
 
SEC Mike joins Braden Gall to rank all 16 teams heading into spring practice and magazine season. We put every team into one of five categories: The Bottom, Bowl Eligible Battles, The Good, Playoff Contenders and National Champions. Watch the show on YouTube. In Nashville? Be sure to check out M.L. Rose Craft Beer and Burgers. Music by The Wild Fea…
  continue reading
 
It’s time for the Sweet 16 and the Elite 8! Ben and Darren make their picks and still find time to discuss West Virginia, the transfer portal, and new Texas head coachSean Miller. Plus, Ben makes wild accusationsabout Darren’s feeling toward Vol fans and his academic paper writing in college. Does Darren really irritate Vol fans? 0:00 – The tournam…
  continue reading
 
FTC sends warning to future 23andMe buyer Global phishing threat targets 88 countries Samsung data breach tied to old stolen credentials Thanks to today's episode sponsor, Qualys "Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise TruRisk Management. Quantify your cyber risk in clear financial terms…
  continue reading
 
Apache Camel Exploit Attempt by Vulnerability Scans A recently patched vulnerability in Apache Camel has been integrated into some vulnerability scanners, like for example OpenVAS. We do see some exploit attempts in our honeypots, but they appear to be part of internal vulnerablity scans https://isc.sans.edu/diary/Apache%20Camel%20Exploit%20Attempt…
  continue reading
 
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss a range of cybersecurity topics, including the recent Oracle Cloud breach, the challenges of asset management in large environments, and the importance of prioritizing vulnerabilities. They also explore the findings from a pen test report, the implications …
  continue reading
 
In this week's enterprise security news, Big funding for Island Is DLP finally getting disrupted? By something that works? We learn all about Model Context Protocol servers Integrating SSO and SSH! Do we have too many cybersecurity regulations? Toxic cybersecurity workplaces Napster makes a comeback this week, we’ve got 50% less AI and 50% more co-…
  continue reading
 
We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web co…
  continue reading
 
On Saturday, Defense Secretary Pete Hegseth marked the 80th anniversary of the battle of Iwo Jima, liberated from Imperial Japan in World War II at a cost of 26,000 killed. This occasion, like the rest of Pete’s travels across the Western Pacific last week, offered a most-needed reminder of the importance of the vast region’s strategic islands – an…
  continue reading
 
A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
  continue reading
 
In this interview, we feature some research from Geoff Cairns, an analyst at Forrester Research. This is a preview to the talk he'll be giving at Identiverse 2025 in a few months. We won't have time to cover all the trends, but there are several here that I'm excited to discuss! Deepfake Detection Difficult Zero Trust Agentic AI Phishing resistant …
  continue reading
 
A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
  continue reading
 
FBI warns of increase in free online document converter scams Resurge malware exploits Ivanti flaw BlackLock hackers exposed through leak site vulnerability Thanks to today's episode sponsor, Qualys "Overwhelmed by noise in your cybersecurity processes? Cut through the clutter with Qualys Enterprise TruRisk Management. Quantify your cyber risk in c…
  continue reading
 
A Tale of Two Phishing Sties Two phishing sites may use very different backends, even if the site itself appears to be visually very similar. Phishing kits are often copied and modified, leading to sites using similar visual tricks on the user facing site, but very different backends to host the sites and reporting data to the miscreant. https://is…
  continue reading
 
A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
  continue reading
 
The truism that history is written by its winners reflects the literature about how the bomb came about, with apologetic books most often written by U.S. scholars. The physicist Robert Oppenheimer, the nuke’s ‘father’, is repeatedly centre stage, as in the case of the recent film about him. These are elitist stories that more often than not ignore …
  continue reading
 
Homeland security is rarely just a matter of the homeland; it involves the circulation and multiplication of policing practices across borders. Though the term "homeland security" is closely associated with the United States, Israel is credited with first developing this all-encompassing approach to domestic surveillance and territorial control. To…
  continue reading
 
Chris Phillips, Harrison Fant and Jake Mckeever react to the day that was across SEC baseball including Florida's continued struggles, A&M getting closer to their first SEC win, Chris' first experience at Hawkins Field in Nashville, LSU vs. Mississippi State and much more. Plus, the guys take your questions & comments as another electric SEC baseba…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jonathan Waldrop, CISO, The Weather Company Jonathan will be speaking at The CrowdStrike Crowd Tour, on Tuesday, April 15, 2025 in Atlanta – details here. He will also be speaking at the C Vision International Think Tank on April 24, …
  continue reading
 
Hola friends! Today’s tale of pentest pwnage talks about abusing Exchange and the Azure ADSync account! Links to the discussed things: adconnectdump – for all your ADSync account dumping needs! Adam Chester PowerShell script to dump MSOL service account dacledit.py (part of Impacket) to give myself full write privileges on the MSOL sync account: da…
  continue reading
 
El director surcoreano Bong Joon Ho continúa su exploración de la inequidad de clases sociales y la aplastante maquinaria capitalista aderezándola con el totalitarismo y las repercusiones de la muerte constante con Mickey 17 (2025), una estrafalaria comedia de ciencia ficción en la que seguimos a un atolondrado obrero espacial desechable que es clo…
  continue reading
 
It’s a bad time for official Washington to be consumed with a Signal group chat involving top national security officials and a highly partisan journalist. After all, Russia and China appear poised for military aggression that, if not deterred, could prove catastrophic. Reportedly, there are multiple divisions worth of Russian troops massing in Bel…
  continue reading
 
23andMe has filed for chapter 11 bankruptcy protection. One California lawmaker says it’s time to have your DNA scrubbed from the company. We’ll tell you why and how to do it. Plus - What’s wrong with the end-to-end encrypted messaging app Signal? Nothing. But not everyone should use it. We’ll tell you more on this edition of The Checklist, brought…
  continue reading
 
Helpful episodes to listen to first Don't Answer the Phone Questions we answer in this episode What is a computer virus? How does a computer virus spread? How does patient (device) zero get infected? What protection do we NOT have against these attacks? Episode summary What happens if a device in your home gets infected with a computer virus? Just …
  continue reading
 
150,000 sites compromised by JavaScript injection Vulnerabilities in numerous solar power systems found T-Mobile pays $33 million in SIM swap lawsuit Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ranso…
  continue reading
 
Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks…
  continue reading
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠⁠
  continue reading
 
New episodes premiere Thursdays at 6 PM EST. All Links and Social Media: https://linktr.ee/nullproj Support us on Patreon: https://www.patreon.com/thenullproject ---------- #DeltaGreen #ActualPlay #TTRPG #CosmicHorror #Lovecraftian #HorrorPodcast #TabletopRPG #RPGPodcast #Unnatural #NullProject #HorrorCommunity #RoleplayingGames #TabletopGames #Aud…
  continue reading
 
How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
  continue reading
 
How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
  continue reading
 
"The Windup" returns as Chris Phillips and Harrison Fant talk all things SEC baseball including a full recap & breakdown of what went down in the midweek, a SNEAKY GOOD weekend slate including A&M & Florida both looking to get off the schneid, LSU/Alabama looking for a bounce back, UGA's bats looking to stay red hot, our trip to Nashville for Arkan…
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Benjamin Wittes and Roger Parloff to talk through the week of the most Rational Security-esque of national security news stories ever, including: “Oopsec.” In a strong contender for the most ridiculous national security story of the year, senior Trump administration officials appear to have plan…
  continue reading
 
Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a pos…
  continue reading
 
Loading …

Panduan Referensi Cepat

Dengarkan acara ini sambil menjelajah
Putar