Information Security สาธารณะ
[search 0]
เพิ่มเติม

ดาวน์โหลดแอปเลย!

show episodes
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Principal Security Consultant at FRSecure and a 20+ year veteran of the industry. Hosting things ...
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
 
I
Information Security Podcast

1
Information Security Podcast

Information Security Summit

Unsubscribe
Unsubscribe
รายเดือน
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
Pwned is a weekly information and cyber security podcast addressing real-world security challenges. Occasionally funny, always informational, and driven by those who live and breathe security. Each episode we dive into the latest and greatest in technology, security frameworks, best practices, and how-tos. We’ll chat with industry leaders to learn how they got to where they are, what they see coming, and how they learned from their mistakes.
 
I
ISF Podcast

1
ISF Podcast

Information Security Forum Podcast

Unsubscribe
Unsubscribe
รายเดือน+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
BASIC is the only peace and security non-governmental organization that is British-American in composition and focus. With programs that address diplomacy and decision-making around nuclear weapons, we work on both sides of the Atlantic to encourage sustainable transatlantic security policies and to develop the strategies that can achieve them. We have charitable status in the United Kingdom and in the United States. We operate with offices in London and Washington, a small but committed sta ...
 
N
New Security Broadcast

1
New Security Broadcast

Environmental Change and Security Program

Unsubscribe
Unsubscribe
รายเดือน
 
Tune in to our podcast to hear expert speakers on the links between global environmental change, security, development, and health. The Environmental Change and Security Program is a part of the Woodrow Wilson International Center for Scholars, the living, national memorial to President Wilson established by Congress in 1968 and headquartered in the District of Columbia. It is a nonpartisan institution, supported by public and private funds, engaged in the study of national and world affairs ...
 
H
Hackers Con Calle

1
Hackers Con Calle

Hackers World

Unsubscribe
Unsubscribe
รายวัน+
 
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
 
T
The Cognitive Crucible

1
The Cognitive Crucible

Information Professionals Association

Unsubscribe
Unsubscribe
รายสัปดาห์
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
 
B
BizSec Podcast

1
BizSec Podcast

bizsecpodcast.com

Unsubscribe
Unsubscribe
รายเดือน
 
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
 
i
infosecireland

1
infosecireland

infosecireland

Unsubscribe
Unsubscribe
รายวัน+
 
Information Security in Ireland is a new podcast covering information security and related issues such as privacy, data protection, online safety and technology policy. This podcast is produced by 3 leading Irish security experts: - Paul Rochford, a volunteer leader with ISSA Ireland, the Irish chapter of the Information Systems Security Association - Owen O'Connor, managing director of Cernam, an Irish digital investigations company - Mark McDonagh, Chief Technology Officer with Netfort Tec ...
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
 
C
CISO Stories Podcast

1
CISO Stories Podcast

Todd Fitzgerald

Unsubscribe
Unsubscribe
รายสัปดาห์
 
The Cybersecurity Collaborative — in conjunction with Cybereason — is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.sec ...
 
I
InfoSec Daily Podcast

1
InfoSec Daily Podcast

Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z

Unsubscribe
Unsubscribe
รายเดือน
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
If you want to learn building automation then you are in the right place. My name is Phil Zito and I am the CEO of Smart Buildings Academy. If you are a technician, operator, salesperson, or engineer the Smart Buildings Academy podcast is for you. Each week I tap into my vast experience in Building Automation and teach you the things no one else teaches. You will learn about BAS, HVAC, IT, Energy Management, Sales, Operations, Project Management, Cyber Security and so much more. Prior to fou ...
 
FactFruit is a U.S. focused daily news show that brings you the top stories and information without the political noise. Leading news stories are followed by discussions with guests who are experts in their industries. Our guests are not political pundits or talking heads whose agenda is to politically sway the listener, but rather, discussions are focused on how things work. New technology, how congressional committees function, cyber security, events leading to foreign conflict, and how st ...
 
N
NACUBO In Brief

1
NACUBO In Brief

NACUBO Distance Learning

Unsubscribe
Unsubscribe
รายเดือน
 
What economic trends today will set the stage for the future? How will legislative actions impact student financial aid? What accounting policy or reporting changes are on the horizon? Navigating the business of higher education institutions requires knowledge about a variety of issues—from finance to campus security. In this podcast series, hear colleagues, experts, and industry leaders explore issues, provide best practices, offer solutions to new questions that may not have been asked bef ...
 
B
Black Hat Webcasts RSS Feed

1
Black Hat Webcasts RSS Feed

Black Hat Briefings

Unsubscribe
Unsubscribe
รายเดือน
 
Security news doesn't always wait for conference season. That's the guiding principle behind the Black Hat Webcasts – a regular series of live web events focusing on what's hot in the infosec space all year long. On the third Thursday of every month, we'll bring together Black Hat speakers, independent researchers and leading security experts from the government to the underground to answer your questions live.
 
On August 13, 2018, Section 1051 of the Fiscal Year 2019 John S. McCain National Defense Authorization Act (P.L. 115-232) established the National Security Commission on Artificial Intelligence as an independent Commission "to consider the methods and means necessary to advance the development of artificial intelligence, machine learning, and associated technologies to comprehensively address the national security and defense needs of the United States."Learn more about the Commission's work ...
 
Loading …
show series
 
The latest edition of the ISMG Security Report features an analysis of best practices for negotiating a ransom payment. Also featured: Busting Zero Trust myths and the dangers of mythologizing defenders.โดย BankInfoSecurity.com
 
TA551 (Shathak) Pushes IcedID (Bokbot) https://isc.sans.edu/forums/diary/TA551+Shathak+pushes+IcedID+Bokbot/28092/ pip-audit scanning Python packages for known vulnerabilities https://pypi.org/project/pip-audit/ Wifi Router Flaws https://www.iot-inspector.com/blog/router-security-check-2021/ SANS Holiday Hack Challenge https://www.sans.org/mlp/holi…
 
ORIGINALLY AIRED ON NOVEMBER 22, 2021 Articles discussed in this episode: Story # 1: Chinese Team Up With Russia To Launch US Cybersecurity Assault – https://hothardware.com/news/chinese-hackers-team-up-with-russian-ransomware-gang Story # 2: The FBI Got Hacked Over a Beef With a Guy Named Vinny? – https://www.thedailybeast.com/was-fbi-email-hack-j…
 
In this week's episode, Brad and Evan are joined by FRSecure's Lori Blair, a seasoned veteran of the cyber security industry! With Lori's help, they dive into some of the most important client relationships a CISO can build when working with a company to develop or mend existing security practices.โดย InfoSec Missionaries
 
This week's tools, tips, and tricks episode talks about a free wi-fi scanner you can use to help improve your network performance. Download - Acrylic Wi-Fi Home Scanner - https://www.acrylicwifi.com/en/downloads-free-license-wifi-wireless-network-software-tools/download-wifi-scanner-windows/ Be aware, be safe. Get ExpressVPN, Secure Your Privacy An…
 
The BAS Service Technician is one of the most challenging roles due to the diversity of skills and tasks required. So how do you become a service technician and why would you want to? In this episode we discuss: The three types of service roles How to gain the skills required of a service technician How to get a job as a BAS service technician…
 
The latest edition of the ISMG Security Report features an analysis of best practices for negotiating a ransom payment. Also featured: Busting Zero Trust myths and the dangers of mythologizing defenders.โดย CareersInfoSecurity.com
 
The latest edition of the ISMG Security Report features an analysis of best practices for negotiating a ransom payment. Also featured: Busting Zero Trust myths and the dangers of mythologizing defenders.โดย GovInfoSecurity.com
 
The latest edition of the ISMG Security Report features an analysis of best practices for negotiating a ransom payment. Also featured: Busting Zero Trust myths and the dangers of mythologizing defenders.โดย CUInfoSecurity.com
 
The latest edition of the ISMG Security Report features an analysis of best practices for negotiating a ransom payment. Also featured: Busting Zero Trust myths and the dangers of mythologizing defenders.โดย HealthcareInfoSecurity.com
 
In this episode of the National Security Podcast, Australian Electoral Commissioner Tom Rogers joins Head of ANU National Security College Professor Rory Medcalf in conversation. In the latest instalment of the Security Summit series on the National Security Podcast, Professor Rory Medcalf and Australian Electoral Commissioner Tom Rogers discuss th…
 
This week, we kick off the show with an interview featuring Shailesh Athalye, Senior Vice President of Product Management at Qualys joins to discuss why Cybersecurity is an Unfair Game! Then, we jump straight into the Security News for this week: Stop hiding your secrets in plain sight, Detecting Wildcard DNS Abuse, $5 setup that hacks biometrics, …
 
The Tigray War in Ethiopia, which began in November of last year, has killed thousands, displaced millions, and has fueled a devastating humanitarian crisis in the region. This week, co-hosts Elisa and Yvette are joined by Cameron Hudson of the Atlantic Council to discuss the latest developments in this ongoing civil war. How does Ethiopia’s politi…
 
Twitter announced a new policy where they will begin removing media that is deemed private. This episode goes into the details and some curious wording on what Twitter considers sensitive or not. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee ***…
 
Info-Stealer Using webhook.site to Exfiltrate Data https://isc.sans.edu/forums/diary/InfoStealer+Using+webhooksite+to+Exfiltrate+Data/28088/ Mozilla NSS Library Vulnerability https://bugs.chromium.org/p/project-zero/issues/detail?id=2237 EwDoor Botnet is Attacking AT&T Customers https://blog.netlab.360.com/warning-ewdoor-botnet-is-attacking-att-cus…
 
In the drive to transform and modernize, cloud continues to be the critical foundation for success. But, for some organizations, obstacles have stalled the progression of key business imperatives. In this podcast, we speak with industry experts to understand how a managed cloud service provider can help organizations secure the strategic benefits o…
 
A school district in Texas is going to start scanning all the student's district-provided devices. They will be looking at all communications, use and email for flag that might be indicative of cyber-bullying and potential mental health issues. This episode talked about this and what piece is missing that could be done. Source - https://www.gaggle.…
 
Project managers can make or break a BAS project and ultimately the financials of a BAS company. But how do you effectively manage BAS projects? In this episode we discuss: The three types of BAS project management How to learn BAS project management skills How to get a role as a BAS project manager
 
BAE Systems contracts with the U.S. Department of Defense. It’s in the difficult business of handling military and intelligence secrets. And while there is a lot the company can’t talk about, there are plenty of useful insights they can share, which will help leaders across different industries. In this podcast segment with Dr. Nandish Mattikalli, …
 
Hunting for PHPUnit Installed via Composer https://isc.sans.edu/forums/diary/Hunting+for+PHPUnit+Installed+via+Composer/28084/ Microsoft Defender Scares Admins with Emotet False Positivies https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-scares-admins-with-emotet-false-positives/ Printing Shellz HP Printer Vulnerabilities https://…
 
Are you reporting the same risks each year to management? This may be indicative of a lack of incentive or buy-in from senior management to fund the investments. Join this podcast to learn how to show senior management that funding these initiatives is more than risk avoidance and a cost to the bottom line. To view the article from the CISO COMPASS…
 
Online shopping is on the increase this time of year and so are the scams. This episode goes through some of the red flags and cautions you should take when buying from online deals. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Secu…
 
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Noah Komnick discusses his award-…
 
Today, ISF CEO Steve Durbin sits down with trust expert, author, and lecturer at Oxford University, Rachel Botsman. They discuss the nature of trust, how trust differs from transparency, and how to build a culture of trust within your organisation. Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Conn…
 
Wireshark 3.6.0 Released https://isc.sans.edu/forums/diary/Wireshark+360+Released/28076/ Google Cloud Security Report https://services.google.com/fh/files/misc/gcat_threathorizons_full_nov2021.pdf Zoom Patch https://explore.zoom.us/en/trust/security/security-bulletin/ Slack DNSSEC Experience Reports https://slack.engineering/what-happened-during-sl…
 
The Internet Of Things Strikes Again. This episode talks about a big first step the UK is taking to address poor security in internet-enabled devices. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you ca…
 
Our guest, is Dr. Ben Evans. Ben is an aeronautical engineer, and he’s applying his understanding of the forces at play, to the seemingly insurmountable challenge of conquering the breaking a world record at the Bloodhound Land Speed Project. Ben talks about the laws of science and engineering which help him to find the marginal opportunities for i…
 
In this episode of the National Security Podcast, The Hon Paul Fletcher MP – Minister for Communications, Urban Infrastructure, Cities, and the Arts, Member for Bradfield, and previously Director of Corporate and Regulatory Affairs at Optus – joins Professor Rory Medcalf in conversation. In the latest instalment of the Security Summit series on the…
 
Phishing Pages Hiding Itself Using Dynamically Adjusted IP Based Allow List https://isc.sans.edu/forums/diary/Phishing+page+hiding+itself+using+dynamically+adjusted+IPbased+allow+list/28070/ Trickbot Phishing Checks Screen Resolution to Evade Researchers https://www.bleepingcomputer.com/news/security/trickbot-phishing-checks-screen-resolution-to-ev…
 
In this episode of "Cybersecurity Unplugged," Dan Bowden, CISO at Sentara Health, discusses telemedicine, IoMT, and explains why we’re lagging so far behind in healthcare security. "It’s because of how the data is managed, data standards, data integrity."โดย GovInfoSecurity.com
 
In this episode of "Cybersecurity Unplugged," Dan Bowden, CISO at Sentara Health, discusses telemedicine, IoMT, and explains why we’re lagging so far behind in healthcare security. "It’s because of how the data is managed, data standards, data integrity."โดย BankInfoSecurity.com
 
In this episode of "Cybersecurity Unplugged," Dan Bowden, CISO at Sentara Health, discusses telemedicine, IoMT, and explains why we’re lagging so far behind in healthcare security. "It’s because of how the data is managed, data standards, data integrity."โดย CUInfoSecurity.com
 
In this episode of "Cybersecurity Unplugged," Dan Bowden, CISO at Sentara Health, discusses telemedicine, IoMT, and explains why we’re lagging so far behind in healthcare security. "It’s because of how the data is managed, data standards, data integrity."โดย HealthcareInfoSecurity.com
 
In this episode of "Cybersecurity Unplugged," Dan Bowden, CISO at Sentara Health, discusses telemedicine, IoMT, and explains why we’re lagging so far behind in healthcare security. "It’s because of how the data is managed, data standards, data integrity."โดย CareersInfoSecurity.com
 
The latest edition of the ISMG Security Report features an analysis of how organizations can reduce risk especially over holidays and weekends, when attackers are most likely to strike. Also featured: Highlights from Ireland's IRISSCON 2021 cybercrime conference; what's ahead for COVID-19 and the workplace?…
 
The latest edition of the ISMG Security Report features an analysis of how organizations can reduce risk especially over holidays and weekends, when attackers are most likely to strike. Also featured: Highlights from Ireland's IRISSCON 2021 cybercrime conference; what's ahead for COVID-19 and the workplace?…
 
The latest edition of the ISMG Security Report features an analysis of how organizations can reduce risk especially over holidays and weekends, when attackers are most likely to strike. Also featured: Highlights from Ireland's IRISSCON 2021 cybercrime conference; what's ahead for COVID-19 and the workplace?…
 
The latest edition of the ISMG Security Report features an analysis of how organizations can reduce risk especially over holidays and weekends, when attackers are most likely to strike. Also featured: Highlights from Ireland's IRISSCON 2021 cybercrime conference; what's ahead for COVID-19 and the workplace?…
 
The latest edition of the ISMG Security Report features an analysis of how organizations can reduce risk especially over holidays and weekends, when attackers are most likely to strike. Also featured: Highlights from Ireland's IRISSCON 2021 cybercrime conference; what's ahead for COVID-19 and the workplace?…
 
In this episode of the National Security Podcast, Shadow Minister for Foreign Affairs Senator The Hon Penny Wong delivers an address to the ANU National Security College entitled “Expanding Australia’s Power and Influence”. Following her remarks, she is joined in conversation by Professor Rory Medcalf. In this special event recording, Senator Penny…
 
Ransomware attacks have become the game changer in driving up security requirements, policy premiums and rejection rates for healthcare sector entities seeking new cyber insurance policies or renewals, says Doug Howard, CEO of privacy and security consultancy Pondurance.โดย GovInfoSecurity.com
 
Loading …

คู่มืออ้างอิงด่วน

Google login Twitter login Classic login