Novinky Magazín Security
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Security Today is a podcast centered around physical security and the security industry. From articles to philosophies to trending topics, Baer leads you down the info hole of Security Today. @unclebaer_ on IG and Twitter @securitytodaypodcast on IG Brought to you by @sprinterdatacom on IG
…
continue reading
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。 企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Solutions Executive Security 森マークがお届けします。 みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message 2024年interfm「The Dave Fromm Show」初出演は2月16日(金)16:30頃~です。 是非お聴きください!
…
continue reading
Daily update on current cyber security threats
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
…
continue reading
Digital security principles in tiny powerful packages that are easy to understand, no matter your skill level.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
In this episode of The #SecurityANGLE, Shelly Kramer, managing director and principal analyst at #theCUBEResearch, is joined by Jo Peterson, VP of cloud and security services at #Clarify360 and a member of #theCUBECollective community of independent analysts. Check out theCUBE for the latest in enterprise tech https://siliconangle.com/category/cube-event-coverage/
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
…
continue reading
The straight up security news in 20 minutes or less! Links to all news articles are included here.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
…
continue reading
In diesem Podcast sprechen wir über die Grundlagen von IT-Security. Ein praktischer Einstieg für alle, die an Software arbeiten.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
The Security Ledger: Cyber Security News & Analysis for The Internet of Things
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
1
Episode 429 - The autonomy of open source developers
32:06
32:06
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
32:06
Josh and Kurt talk about open source and autonomy. This is even related to some recent return to office news. The conversation weaves between a few threads, but fundamentally there's some questions about why do people do what they do, especially in the world of open source. This also is a problem we see in security, security people love to tell dev…
…
continue reading
1
Stuart A. Reid, "The Lumumba Plot: The Secret History of the CIA and a Cold War Assassination" (Knopf, 2023)
50:04
50:04
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
50:04
Today I talked to Stuart Reid about his new book The Lumumba Plot: The Secret History of the CIA and a Cold War Assassination (Knopf, 2023). It was supposed to be a moment of great optimism, a cause for jubilation. The Congo was at last being set free from Belgium—one of seventeen countries to gain independence in 1960 from ruling European powers. …
…
continue reading
Eric has superlative steak and Jon has ... pizza. Northern lights, concerts, and grafting bees oh my. Microsoft's security priorities, FCC designates Royal Tiger, and Ascension hospitals attacked with/by Black Basta. A Vampire Drone and Wallets everywhere. 0:00 - Intro 16:05 - Top Priority 23:15 - Royal Tiger 27:28 - Ascension Land 32:09 - Vampire …
…
continue reading
New WiFi Flaw Leaves All Devices Vulnerable to ‘SSID Confusion’ AttacksKirjoittanut Carl Franklin
…
continue reading
1
AI SOC Solutions, Revamp Your Cybersecurity, & Nightwing Introduction - Jon Check, Ricardo Villadiego, Jim McDonough - ESW #362
43:42
43:42
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
43:42
Artificial intelligence isn’t a magic wand… but could AI actually solve the alert triage problem every security operations center faces? In this interview with Jim McDonough from Intezer, we’ll talk about how 2023 was a tipping point for the maturity of AI tech, what these solutions actually bring to the table, how SOC teams in the real world are a…
…
continue reading
1
Week in Review: Okta chief speaks, Volt typhoon threat, FBI siezes BreachForums
30:53
30:53
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
30:53
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Ryan Bachman, evp and global CISO, GM Financial Thanks to our show sponsor, vanta.com/ciso Are lengthy security reviews pulling attention away from your security program? With the largest network of Trust Centers, Vanta can help you stre…
…
continue reading
1
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & More - SWN #387
32:04
32:04
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
32:04
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & more on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-387
…
continue reading
1
7MS #624: Tales of Pentest Pwnage – Part 57
29:04
29:04
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
29:04
Today’s tale of pentest pwnage is all about my new favorite attack called SPN-less RBCD. We did a teaser episode last week that actually ended up being a full episode all about the attack, and even step by step commands to pull it off. But I didn’t want today’s episode to just be “Hey friends, check out the YouTube version of this attack!” so I als…
…
continue reading
“Yahoo Boy” cybercriminals are openly running dozens of scams across Facebook, WhatsApp, Telegram, TikTok, YouTube, and more. Learn more about your ad choices. Visit podcastchoices.com/adchoicesKirjoittanut SpokenLayer
…
continue reading
1
15. Save Your Spot in the Security Dojo Today!
14:45
14:45
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
14:45
Are you ready to level up your digital defenses? Save your spot in the Security Dojo today! Questions? Talk to Makani. You can sign up for notifications of new podcast episodes by clicking here. Come join us inside the IHP Academy!Kirjoittanut IHP Academy
…
continue reading
COMING SOON! Socializing Security We like socializing with cool people and think security topics should be talked about in a more fun way. So we created a podcast to do both!Kirjoittanut Socializing Security
…
continue reading
Why yq? Adventurs in XML https://isc.sans.edu/diary/Why%20yq%3F%20%20Adventures%20in%20XML/30930 Black Basta Uses Quick Assist https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/ Various Chrome 0-Day Vulnerabilities https://chromereleases.googleblog.com/20…
…
continue reading
1
The “Active Listening Noises” Edition
1:16:33
1:16:33
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
1:16:33
This week, Alan, Quinta, and Scott were joined by Lawfare Executive Editor Natalie Orpett to go over the week’s big national security news, including: “Does NSM Stand for No Such Memo?” Last week, in a long-awaited report required by National Security Memorandum 20 that President Biden issued earlier this year, the Biden administration concluded th…
…
continue reading
1
Supply Chains Are a Hacker's Gateway
32:57
32:57
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
32:57
Many attacks on manufacturers are just the first step in going after even bigger targets. One of the inescapable truths about the industrial sector is that it is usually the ultimate proving ground for product performance. When we look at some of the technologies that have created seismic social shifts, tools like operational software, wireless con…
…
continue reading
1
Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk
35:42
35:42
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
35:42
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. The post Spotlight Podcast: CSO Chris Walcutt on..…
…
continue reading
1
The fake deepfake, and Estate insecurity
40:07
40:07
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
40:07
Remember when a US mother was accused of distributing explicit deepfake photos and videos to try to get her teenage daughter's cheerleading rivals kicked off the team? Well, there has been a surprising development. And learn how cybercriminals have been stealing boomers' one-time-passcodes via a secretive online service. All this and more is discus…
…
continue reading
1
EP 073 Peter Drissell: Director of Aviation Security in the UK tells the story of how the Civil Aviation Authority brought Monarch Airlines passengers back home after the airline went bust and other cool ...
50:39
50:39
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
50:39
The Director of Aviation Security talks about the really cool plans to rescue thousands of stranded passengers when Monarch and Thomas Cook went into administration. UK Civil Aviation Authority Appointed by the Civil Aviation Authority (CAA) as its first Director of Aviation Security on 1st April 2014, Peter is the Aviation Security Regulator for t…
…
continue reading
1
Taking action to safeguard IoT devices
11:19
11:19
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
11:19
Taylor Matthews, Director of IT/Network/Security at OptConnect, discusses the IoT threat landscape as well as best practices for protecting IoT devices.
…
continue reading
1
ST.60 "Evolv your thinking"
22:31
22:31
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
22:31
This week Baer goes professor on ya, trying to shift your thinking to the big picture. ChitChat: https://www.rrms.com/blog/rapid-response-is-the-first-third-party-monitoring-center-to-receive-ul-listing-for-avs-01/ Product Highlight: https://senstar.com/products/buried-sensors/omnitrax/ Meat: https://ipvm.com/reports/evolv-shareholder-suit?utm_sour…
…
continue reading
1
The Secrets behind GitGuardian: Building a security platform with Eric Fourrier
45:39
45:39
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
45:39
Join us this week as we host Eric Fourrier, co-founder and CEO of GitGuardian. Discover the journey of GitGuardian from a side project to a leading code security platform. Eric shares insights on the startup's growth, the integration of AI in security, and the future of protecting digital assets. Tune in for an engaging discussion on advancing code…
…
continue reading
1
SN 974: Microsoft's Head in the Clouds - 4-Digit Pins, Long Range Navigation, Microsoft
1:55:19
1:55:19
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
1:55:19
Picture of the Week. Most to least common 4-digit pins. Enhanced LORAN. Passkeys. Microsoft's Head in the Clouds. Show Notes - https://www.grc.com/sn/SN-974-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can s…
…
continue reading
1
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Josh Marpet... - SWN #386
37:01
37:01
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
37:01
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Windows, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-386
…
continue reading
1
Why Least Privilege Matters in Cloud Security?
26:45
26:45
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
26:45
What's the best way to navigate least privilege complexities in a multi cloud environment? And how is the role of identity management evolving? We spoke to Jeff Moncrief from Sonrai Security on why identity is the new network in the cloud-driven world. We speak about the challenges of implementing least privilege in cloud environments, the misconce…
…
continue reading
1
Inside the OWASP Top 10 for LLM Applications - Sandy Dunn, Mike Fey, Josh Lemos - ASW #285
1:06:40
1:06:40
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
1:06:40
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
…
continue reading
1
Devin Rudnicki -- Expanding AppSec
35:57
35:57
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
35:57
Devon Rudnicki, the Chief Information Security Officer at Fitch Group, shares her journey of developing an application security program from scratch and advancing to the CISO role. She emphasizes the importance of collaboration, understanding the organization's business, and using metrics to drive positive change in the security program. Elon Musk …
…
continue reading
1
MSRC Transparency and USB Threats
27:38
27:38
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
27:38
In this episode of the Blue Security Podcast, Andy and Adam discuss two important topics: Microsoft's pledge for greater transparency in identifying and determining root causes for security vulnerabilities, and the increasing sophistication of USB malware attacks in industrial organizations. They provide insights into Microsoft's Secure Future Init…
…
continue reading
1
Identity Resilience: The Next Frontier in Security - Hed Kovetz, Ray Zadjmool, Jeff Margolies - BSW #350
1:01:22
1:01:22
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
1:01:22
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
…
continue reading
1
Picking Secure Technologies
47:33
47:33
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
47:33
https://youtu.be/SF_42g-BYzMThis week on the podcast, we cover guidance from CISA and its international partners that guides organizations on the right questions to ask during the technology procurement process to make sure the products they buy are secure. Before that, we cover Microsoft's research into a common vulnerability impacting over 4 bill…
…
continue reading
1
どこよりも早い!IT業界の最重要レポート「DBIR2024(データ漏洩侵害調査報告書)」徹底解説
14:06
14:06
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
14:06
今年も「DBIR2024」が5/2にリリースされました。 企業が直面しているセキュリティ上の脅威についての現状をまとめたVerizonの報告書。 今年の傾向と概要をどこよりも早く解説します。 その中でもマークさんが注目したのはやっぱり“アレ”・・? 詳しくは音源をCheck! ご質問やコメント、ぜひお待ちしております。 https://form.audee.jp/websecurity/messageKirjoittanut ベライゾンジャパン
…
continue reading
1
S14 E10 Unf*ck your Secrets
48:57
48:57
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
48:57
This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Brian Vallelunga. Brian is the Founder and CEO of Doppler, which is the first secrets management platform for developers. Doppler empowers tens of thousands of engineering and devops teams to seamlessly orchestrate, govern, and manage their secrets across …
…
continue reading
1
Living, learning and building a security enterprise
37:05
37:05
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
37:05
Our guest on the SecurityDNA podcast this week is Steve Jones, Global Chairman and CEO of Allied Universal, an enterprise that has grown from $12 million in revenue to more than $20 billion with approximately 800,000 employees, making the firm the third-largest private employer in North American and seventh highest in the world. The author of the b…
…
continue reading
1
China's Economic Activities in Africa
24:01
24:01
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
24:01
Over the past 20 years, the People’s Republic of China has invested billions of dollars in African nations. But what impact have these investments had on the continent, and how have things changed in the wake of the dual global shocks of the COVID-19 pandemic and Russia’s invasion of Ukraine? Tim Ditter joins the show to answer these questions and …
…
continue reading
1
Ep. 121 - Evolving Ransomware: Unique Tactics for Payment
17:45
17:45
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
17:45
In this episode I talk about the evolving world of ransomware. I discuss a few examples of unique tactics the malicious actors are using to put pressure on organizations to pay the ransom. Referenced Articles: https://www.theregister.com/AMP/2024/04/30/finnish_psychotherapy_center_crook_sentenced/ https://www.darkreading.com/cyber-risk/hackers-weap…
…
continue reading
1
RSA Conference: Kelly Shortridge
23:52
23:52
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
23:52
At RSA Conference 2024, Kelly Shortridge, senior director of portfolio product management at Fastly, talks about the first steps organizations can take toward adopting a Secure by Design mindset and how businesses can approach the challenge of sustaining resilience in complex systems.Kirjoittanut Decipher
…
continue reading
1
A Dive into Software Supply Chain Security with Schneider Electric’s Cassie Crossley
48:08
48:08
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
48:08
In this episode of the SecurityANGLE, Shelley Kramer, managing director and principal analyst at theCUBE Research, is joined by fellow analyst, engineer and member of theCUBE Collective community, Jo Peterson, for a conversation with Cassie Crossley, VP of supply chain security, cybersecurity and product security office at Schneider Electric. Check…
…
continue reading
Overview Ubuntu 24.04 LTS is finally released and we cover all the new security featuresit brings, plus we look at security vulnerabilities in, and updates for,FreeRDP, Zabbix, CryptoJS, cpio, less, JSON5 and a heap more. This week in Ubuntu Security Updates 61 unique CVEs addressed [USN-6749-1] FreeRDP vulnerabilities (00:45) 7 CVEs addressed in F…
…
continue reading
1
STIR/SHAKEN with Paul Grubbs and Josh Brown
1:01:47
1:01:47
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
1:01:47
Josh Brown and Paul Grubbs join us to describe how those damned spam calls work, and how STIR/SHAKEN is supposed to try to stop them, but have other privacy and security implications as well. Transcript: https://securitycryptographywhatever.com/2024/04/30/stir-shaken/ Links: - https://iacr.org/submit/files/slides/2024/rwc/rwc2024/98/slides.pdf - ht…
…
continue reading