Information Security 公开
[search 0]
更多

Download the App!

show episodes
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
Pwned is a weekly information and cyber security podcast addressing real-world security challenges. Occasionally funny, always informational, and driven by those who live and breathe security. Each episode we dive into the latest and greatest in technology, security frameworks, best practices, and how-tos. We’ll chat with industry leaders to learn how they got to where they are, what they see coming, and how they learned from their mistakes.
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
 
Join us as our host Brian Semrau (a full time digital forensics investigator and part time owner of Infosec Chicago) talks about the latest issues plaguing information security. Rather than recapping what thousands of new stories are already talking about, Brian will be discussing the issues behind incidents in the news, techniques organizations can use to stay safe, and the changes the industry needs to make in order to stay a step ahead of the threat-actors.
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
 
BASIC is the only peace and security non-governmental organization that is British-American in composition and focus. With programs that address diplomacy and decision-making around nuclear weapons, we work on both sides of the Atlantic to encourage sustainable transatlantic security policies and to develop the strategies that can achieve them. We have charitable status in the United Kingdom and in the United States. We operate with offices in London and Washington, a small but committed sta ...
 
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).Did you know that employees with security clearances make up to 15% more than their counterparts? But many people don't apply for security clearance jobs because they are worried about their past and others don't apply because they don't understand the process.Insider's Guide to Security Clearances answers your question ...
 
Take a step outside the echo chamber - gain some perspective and context. Welcome to Cybersecurity: An immature industry where we mandate impossible-to-remember complex passwords that change every 30 days - and call that security. It's an industry where everyone is an expert, but no one's actually solved anything... weird right? This show is focused on the many aspects of cybersecurity - from professional to leadership, technical to abstract. We look to entertain you while filling your brain ...
 
If you want to learn building automation then you are in the right place. My name is Phil Zito and I am the CEO of Smart Buildings Academy. If you are a technician, operator, salesperson, or engineer the Smart Buildings Academy podcast is for you. Each week I tap into my vast experience in Building Automation and teach you the things no one else teaches. You will learn about BAS, HVAC, IT, Energy Management, Sales, Operations, Project Management, Cyber Security and so much more. Prior to fou ...
 
Security Endeavors is geared for people looking to learn about, or get involved with, the field of Computer Information Security. Originally offered as a series of interviews offering real-life insight to help the curious find or make their own path, the format now includes weekly headlines. As time permits we'll include conversations with professionals to learn what holds their interest and pursuing the work they're passionate about.
 
Expert perspectives on global issues. Sound Discussion podcast offers analysis and commentary by leaders, policymakers and scholars to help inform audiences and shape policy considerations to address pressing political, economic, cyberspace and security issues in regions such as Russia, Asia Pacific, South Asia, the Middle East and the Balkans. EWI is a global network of influential stakeholders committed to and engaged in building trust and preventing conflict around the world.
 
Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organ ...
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
RTI International’s Center for Forensic Science presents Just Science, a podcast for forensic science professionals and anyone with an interest in learning more about how real crime laboratories are working to do their job better, produce more accurate results, become more efficient, and solve more crimes. This podcast deals with a range of issues, including leadership in the crime lab, new technologies, sexual assault response, and broader challenges for science and public security. We cove ...
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
 
Loading …
show series
 
The acquisition of the SAFE Identity consortium and its trust framework by DirectTrust, best known for creating and maintaining trust frameworks for secure email messaging in healthcare, will help facilitate new secure health information exchange use cases, says DirectTrust CEO Scott Stuewe.由GovInfoSecurity.com
 
Jordan and Kent have heard from a lot of people that the past Black Hills Information Security (BHIS) webcasts: “Group Policies That Kill Kill Chains” and “Active Directory Best Practices to Frustrate Attackers” have changed their business models for the better. And since they’ve been offered the BHIS soapbox again, they thought it was time […] The…
 
A First Look at Apple's iOS 15 "Private Relay" feature https://isc.sans.edu/forums/diary/A+First+Look+at+Apples+iOS+15+Private+Relay+feature/27858/ macOS Finder Security Feature Bypass Leads to Possible RCE https://ssd-disclosure.com/ssd-advisory-macos-finder-rce/ VMWare vCenter Advisory https://blogs.vmware.com/vsphere/2021/09/vmsa-2021-0020-what-…
 
OMIGOD Exploits Captured in the Wild. https://isc.sans.edu/forums/diary/OMIGOD+Exploits+Captured+in+the+Wild+Researchers+responsible+for+half+of+scans+for+related+ports/27852/ Apple iOS/iPadOS/tvOS 15 Updates (and WatchOS, Xcode, Safari) https://support.apple.com/en-us/HT201222 ManageEngine ADSelfService Plus Exploited https://us-cert.cisa.gov/ncas…
 
In episode 147, Brad and Evan discuss the general busyness in their lives lately, as well as accountability and negligence in the security world. As always, they review some news articles including recent patches from major companies like Microsoft, Apple, and Google, 3 former U.S. intelligence officers who admitted to hacking for a U.A.E. company,…
 
ORIGINALLY AIRED ON SEPTEMBER 13, 2021 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2021-09-13 02:59 – Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/ 04:43 – Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-…
 
Ben Webb is an information security risk analyst in the financial sector. He’s also heavily involved in SecKC, the largest hacker meetup in the world. If you’re in the Kansas City area and would like to join the next meetup, which happens to be SecKC’s 10th anniversary, go to https://seckc.org.由SpiderOak
 
The acquisition of the SAFE Identity consortium and its trust framework by DirectTrust, best known for creating and maintaining trust frameworks for secure email messaging in healthcare, will help facilitate new secure health information exchange use cases, says DirectTrust CEO Scott Stuewe.由CareersInfoSecurity.com
 
The acquisition of the SAFE Identity consortium and its trust framework by DirectTrust, best known for creating and maintaining trust frameworks for secure email messaging in healthcare, will help facilitate new secure health information exchange use cases, says DirectTrust CEO Scott Stuewe.由HealthcareInfoSecurity.com
 
This week, Alan, Quinta and Scott were joined by special guest Lawfare executive editor (and first-time podcaster) Natalie Orpett! They sat down to discuss: The AUKUS Awkwardness: Why does a new U.S.-U.K.-Australia agreement over submarines have France (and China) up in arms? Not Like on J6: What does the "Justice for J6 Rally" flop tell us about t…
 
How to identify deceptive behaviors based on what people say and do. Is their #deception lying or is it something else? #situationalawareness of conversations will help us identify the based way to get more information before becoming confrontational or dismissive. #grayman #podcast In this episode: Detecting deception Word habits of deceptive beha…
 
In our fifth episode of "CISO Platform Security Show", our host and Founder of CISO Platform Bikash Barai spoke with Igors Konovalovs, Director Global Solution Specialist, Mandiant, on Reference Architecture For Intelligence-Led BAS And Control Validation: Gaps in testing and validation What is BAS (Combining Intelligence with BAS) Reference Archit…
 
In our fourth episode of "CISO Platform Security Show", our host and Founder of CISO Platform Bikash Barai spoke with Anthony Ng, VP Systems Engineering, APAC; Agnidipta Sarkar CISO Biocon; Rejo Thomas CISO, Exide Life Insurance; Prasenjit Das CISO TCS; Sudarshan Singh CISO, Capgemini & A V S Prabhakar Chief Risk & Compliant Officer Zeta, on How To…
 
Prologue I have no excuses, and no ideas, how this show has made it so far without having the one and only JJ as a guest. She's been doing network security and architecture for a long time, in addition to being a force for good. Her focus on NAC (Network Access Control) shines through in this discussion too. Hilarity ensues. Guest Jennifer ("JJX") …
 
Data breaches and other security incidents have become a frequent, severe problem for organizations. But with incident responders in short supply, there are fewer professionals available to help organizations in their hour of need. We're joined this episode by F-Secure incident response consultant Eliza Bolton, who successfully transitioned to cybe…
 
Malicious Calendar Subscriptions Are Back https://isc.sans.edu/forums/diary/Malicious+Calendar+Subscriptions+Are+Back/27846/ Simple Analysis of a CVE-2021-40444 (MSHTML) Document https://isc.sans.edu/forums/diary/Simple+Analysis+Of+A+CVE202140444+docx+Document/27848/ Mirai Botnet Hunting OMIGOD https://twitter.com/1ZRR4H/status/1438580885142507528 …
 
Reviewing the results of the open source challenge I discuss how to use the information more effectively. These tips will assist you with increased efficiently while improving the accuracy of assessments. #grayman #podcast #osint In this episode: OSINT Challenge Winners PI Magazine subscription giveaway Send me an audio question: https://anchor.fm/…
 
In episode ten of our Research and Considerations for Sexual Assault Cases season, Just Science sat down with Dr. Rachel Lovell, researcher and professor at Cleveland State University, and Mary Weston, Assistant Prosecuting Attorney and Director of the Cold Case Unit at the Cuyahoga County Prosecutor’s Office, to discuss the complexities surroundin…
 
In this episode we discuss how to sell very complex integrations. We discuss the importance of identifying your vertical market and stakeholders, we also discuss how to tailor integrated solutions to meet your customer's needs. We then cover how to address the risk of selling access control to building automation integrations.…
 
The latest edition of the ISMG Security Report features an analysis of the state of the Biden administration's efforts to disrupt ransomware attackers, as well as how a newly patched Apple iMessage flaw was being targeted by Pegasus spyware to effect zero-click exploits.由HealthcareInfoSecurity.com
 
Phishing 101: why depend on one suspicious message subject when you can use many https://isc.sans.edu/forums/diary/Phishing+101+why+depend+on+one+suspicious+message+subject+when+you+can+use+many/27842/ PrintNightmare Fix Breaks Network Printing https://www.bleepingcomputer.com/news/security/new-windows-security-updates-break-network-printing/ Malwa…
 
A cleared contractor can help reduce expenses with by preparing ahead of time. This is where an experience FSO can anticipate expenses, perform risk assessment while implementing NISPOM and advise on ways to reduce costs while being compliant. The more money saved on overhead expenses, the greater the overall company profit. The earlier into the pr…
 
Intro to my upcoming year long bug out planning and off grid living while traveling and providing training across the country. I address some preparedness and survival questions as they relate to my upcoming adventure. #grayman #podcast In this episode: My Berkey water filter https://amzn.to/3tO47mw Esbit Stove https://amzn.to/39diBCOSawyer Stove F…
 
Why is blockchain security important? Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where they would otherwise be absent from a centralized system. The ecosystem surrounding blockchain technology is large, complex, and has many movin…
 
Hancitor Campaign Abusing Microsoft's OneDrive https://isc.sans.edu/forums/diary/Hancitor+campaign+abusing+Microsofts+OneDrive/27838/ "Secret"Agent Exposes Azure Customers To Unauthorized Code Execution https://www.wiz.io/blog/secret-agent-exposes-azure-customers-to-unauthorized-code-execution由Johannes B. Ullrich, Ph.D.
 
Many if not most workers began working from home in March of 2020, and while the numbers have shifted since, a significant portion are still doing at least some remote work. But according to a survey, neither the remote workers or their company IT staff are too happy about the cybersecurity of it all. For our featured topic this episode, we dive in…
 
On this week’s episode, Alan, Quinta, and Scott are joined by the fourth member of their Lawfare senior editor quartet, Brookings Institution Senior Fellow (and first-time Rational Security guest) Molly Reynolds! They sit down to discuss: the legacy of 9/11 and whether we’ve really done everything wrong since (including in Congress); the last tragi…
 
Loading …

快速参考指南

Google login Twitter login Classic login