The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the N2K editorial team.
…
continue reading
Enjoy this encore of Word Notes. Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.Kirjoittanut N2K Networks
…
continue reading
1
The Dark Arts of cyber. [Only Malware in the Building]
32:46
32:46
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
32:46
Welcome, witches, wizards, and cybersecurity sleuths! You’ve entered, Only Malware in the Building. Join us each month to brew potions of knowledge and crack the curses of today’s most intriguing cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building …
…
continue reading
Enjoy this encore of Word Notes. Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind. Learn more about your ad choices. Visit megaphone.fm/adchoicesKirjoittanut N2K Networks
…
continue reading
1
THE FAIK FILES | Chapter 2: New Frontiers of Deception: AI and Synthetic Media
28:41
28:41
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
28:41
This is Part Two of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry…
…
continue reading
1
THE FAIK FILES | Chapter 1: The Eternal Battle for the Mind
31:07
31:07
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
31:07
This is Part One of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry…
…
continue reading
A critical vulnerability has been discovered in the NVIDIA Container Toolkit. Representatives from around the world are meeting in Washington to address ransomware. The Pentagon shoots down the notion of a separate cyber service. A genetic testing company leaves sensitive information in an unsecured folder. A public accounting firm breach affects 1…
…
continue reading
1
Security remediation automation.
18:56
18:56
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
18:56
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Rick Doten, the VP of Information Security at Centene and one of the original contributors to the N2K CyberWire Hash Table. He makes the case to invigorate the automation first principle cybersecurity strategy. In this case, he is specifically addre…
…
continue reading
1
Security remediation automation. [CSO Perspectives]
18:56
18:56
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
18:56
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Rick Doten, the VP of Information Security at Centene and one of the original contributors to the N2K CyberWire Hash Table. He makes the case to invigorate the automation first principle cybersecurity strategy. In this case, he is specifically addre…
…
continue reading
1
Steve Blank, national security, and the dilemma of technology disruption. (Part 2 of 2) [Special Edition]
37:21
37:21
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
37:21
In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption. Listen to part 1 here. In this series, Steve Blank, a renowned expert in national security innovati…
…
continue reading
Enjoy this encore episode where we are joined by the Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service.…
…
continue reading
Enjoy this encore episode where we are joined by the Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service.…
…
continue reading
1
Beyond the permissions wall. [Research Saturday]
17:47
17:47
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
17:47
We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the s…
…
continue reading
1
Beyond the permissions wall.
17:47
17:47
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
17:47
We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the s…
…
continue reading
1
Darknet dollars exposed.
34:50
34:50
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
34:50
International Law Enforcement Seizes Domains of Russian Crypto Laundering Networks. The real-world risk of a recently revealed Linux vulnerability appears low. Criminal Charges Loom in the Iranian Hack of the Trump Campaign. Meta is fined over a hundred million dollars for storing users’ passwords in plaintext. Delaware’s public libraries grapple w…
…
continue reading
1
Salt Typhoon’s cyber storm.
34:07
34:07
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
34:07
Salt Typhoon infiltrates US ISPs. Researchers hack the connected features in Kia vehicles.WiFi portals in UK train stations suffer Islamophobic graffiti. International partners release a joint guide for protecting Active Directory. A key house committee approves an AI vulnerability reporting bill. India’s largest health insurer sues Telegram over l…
…
continue reading
1
The devil IS in the details.
47:05
47:05
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
47:05
It's all in the details, folks. Pay attention to those and you can avoid unnecessary stress. Dave Bittner, Maria Varmazis, and Joe Carrigan swap stories on email password-stealing attacks, Google ads scams, and fake banks this week. The team shares follow up from listener Steven from the UK about the hazards of shoulder surfing when they received t…
…
continue reading
CrowdStrike’s Adam Meyers testifies before congress. The State Department is set to provide nearly $35 million in foreign aid to strengthen global cybersecurity. Foreign adversaries claim ongoing access to presidential campaign documents. Researchers warn of critical vulnerabilities in fuel tank monitoring systems. Hackers claim a Chrome 2FA featur…
…
continue reading
1
PIVOTT Act drafts the next wave of digital defenders.
33:47
33:47
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
33:47
The House Homeland Security Chair introduces a major cyber workforce bill. Google rolls out new Gmail security tools. Telegram makes a big shift in its privacy policy. Microsoft doubles down on cybersecurity. A Kansas water treatment facility suffers a suspected cyberattack. MoneyGram reports network outages. Kaspersky antivirus users get an automa…
…
continue reading
Enjoy this special encore episode. The use of two or more verification methods to gain access to an account.Kirjoittanut N2K Networks
…
continue reading
Enjoy this special encore episode. The use of two or more verification methods to gain access to an account. Learn more about your ad choices. Visit megaphone.fm/adchoicesKirjoittanut N2K Networks
…
continue reading
1
Can connected cars jeopardize national security?
37:05
37:05
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
37:05
The US is set to propose a ban on Chinese software and hardware in connected cars. Dell investigates a breach of employee data. Unit 42 uncovers a North Korean PondRAT and a red team tool called Splinter. Marko Polo malware targets cryptocurrency influencers, gamers, and developers. An Iranian state-sponsored threat group targets Middle Eastern gov…
…
continue reading
1
Resilience. (CSO Perspectives)
26:03
26:03
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
26:03
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Roselle Safran, the CEO and Founder of KeyCaliber and one of the original contributors to the N2K CyberWire Hash Table. She interviews Tia Hopkins, the eSentire Chief Cyber Resilience Officer, to make the business case for why resilience might be th…
…
continue reading
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Roselle Safran, the CEO and Founder of KeyCaliber and one of the original contributors to the N2K CyberWire Hash Table. She interviews Tia Hopkins, the eSentire Chief Cyber Resilience Officer, to make the business case for why resilience might be th…
…
continue reading
Enjoy this special encore episode, where we are jjoined by Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla int…
…
continue reading
1
Steve Blank, national security, and the dilemma of technology disruption. (Part 1 of 2)
40:25
40:25
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
40:25
In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption. In this series, Steve Blank, a renowned expert in national security innovation, explores the critic…
…
continue reading