Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
…
continue reading
NO BS SEO SHOW -- Google secrets, SEO interviews, experiments, case studies, and more! ---------------------------------------- *** Any SEO questions just ASK! joshbachynski@gmail.com***
…
continue reading
Security news doesn't always wait for conference season. That's the guiding principle behind the Black Hat Webcasts – a regular series of live web events focusing on what's hot in the infosec space all year long. On the third Thursday of every month, we'll bring together Black Hat speakers, independent researchers and leading security experts from the government to the underground to answer your questions live.
…
continue reading
HACKERS COMMUNITY
…
continue reading
Welcome to Girl Tawk! hosted by Melissa Ann. Girl Tawk! is THAT show which discusses the real issues black women face being a mom, a dad, a wife, a girlfriend, a sister, a co-worker, a therapist or whatever choice of hat black women wear on any particular day. Why? Because black women are just dope!
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Europe was held March 27-30 at the Moevenpick Amsterdam Centre Hotel. Twdays, four different tracks. Roger Cumming, Head of Device Delivery and Knowledge at CPNI (Center for the Protection of National Infrastructure), spoke on "How can the Security Researcher Community Work Better for the Common Good." A post convention wrap up can be found at http://www.blackhat.com/html/bh-europe-07/bh-e ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washi ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings in Japan 2006 was held October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/b ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Join Junebug, Mr. Haunted, Tracy, and Kyle as they look into all aspects of the unknown, ranging from cryptids to UFOs, and everything in between.
…
continue reading
Join us for our conversations and interviews with some of the best hackers and security teams in the world. This feed features our ongoing "Big Bugs" podcast, interviews from events like Black Hat & DEFCON, and other conversations we have throughout the year.
…
continue reading
The Free Thought Project is an alternative media platform that has reached millions through the years with our articles and social media pages. We offer a perspective outside of the left right paradigm that values peace, freedom and truth.
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
…
continue reading
A genuine and informative podcast about data privacy and security. Your reliable place for best practices, interviews, belly laughs, and real stories.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
In this episode of The #SecurityANGLE, Shelly Kramer, managing director and principal analyst at #theCUBEResearch, is joined by Jo Peterson, VP of cloud and security services at #Clarify360 and a member of #theCUBECollective community of independent analysts. Check out theCUBE for the latest in enterprise tech https://siliconangle.com/category/cube-event-coverage/
…
continue reading
Reviews of game reviews by gamers who aren’t writers by podcasters who aren’t critics.
…
continue reading
A Podcast For Jamf Employees And Customers
…
continue reading
Ride the cyber trails with one CISO (Allan Alford) and a diverse group of friends and experts who bring a human perspective to cybersecurity.
…
continue reading
Drink up me hearties! MARC GUNN puts on a pirate hat as Captain Black Jack Murphy, Pirate Extraordinaire and Irish piratanical vocalist for Irish Stout presents a weekly podcast featuring Irish songs, seafaring music, sea shanties, pirate music and sometimes rude indecency from across the seven seas.
…
continue reading
Spooked features true-life supernatural stories, told firsthand by people who can barely believe it happened themselves. Be afraid. Created in the dark of night, by Snap Judgment Studios, in partnership with KQED & PRX. It is hosted by Glynn Washington.Episodes drop every week on Friday! Spooked is available for free on ALL podcast platforms. Featuring brand NEW stories -- along with episodes previously available only by subscription.For Luminary subscribers, previously released episodes are ...
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
The Gestalt IT Rundown is a weekly look at the IT news of the week. Hosted by Tom Hollingsworth and Stephen Foskett. Brought to you by Gestalt IT, http://GestaltIT.com
…
continue reading
Security Boulevard Chats is the companion podcast to SecurityBoulevard.com. Hosted by long time cyber insiders, Techstrong CEO Alan Shimel and Techstrong CTO and GM Mitch Ashley discuss cyber-related topics making tomorrows headlines.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
…
continue reading
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
…
continue reading
Sermons, lectures and teachings from Christ Church Jerusalem, founded 1849 as a center of prayer for all nations with worship reflecting the Jewish context of the gospel.
…
continue reading
American singer/songwriter Moot Davis, interviews people he crosses paths with, in a slightly inebriated and laid back setting.
…
continue reading
Redefining Society and Technology Podcast | Musing On Society and Technology | Hosted by Marco Ciappelli | Let's face it: the future is now. We live in a Hybrid Analog Digital Society, and it's time to stop ignoring the profound impact technology has on us. The line between the physical and virtual worlds is no longer real—it's a figment of our imagination. We're constantly juggling convenience, privacy, freedom, security, and the very future of humanity in a precarious balancing act. There’ ...
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
1
From Semiconductors to Co-founding Black Hat Arsenal | Rachid Harrando | Be Fearless Podcast EP 14
14:51
14:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
14:51
Join Audrey from our Founder’s Office and Black Hat Arsenal Co-Founder in this DEF CON 32 special episode of the Be Fearless Podcast! Rachid, who transitioned from a semiconductor background to cybersecurity, shares his journey and insights into the current security landscape. He also explains his work with Black Hat Arsenal, curating open-source s…
…
continue reading
1
Episode 13: The Greatest Insights from Black Hat USA and DEF CON 2024
54:05
54:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
54:05
Are cybersecurity conferences just another industry event, or are they the driving force behind the next big leap in the field? When you think about the future of cybersecurity, do you consider the role of gatherings like Black Hat USA and DEF CON? In this episode of the Cyber Consulting Room podcast, host Gordon Draper explores the recent Black Ha…
…
continue reading
1
Security Journey Goes to Black Hat with Noah Morse
37:07
37:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
37:07
Noah Morse is an application security engineer at Security Journey focused on building vulnerable sandboxes for our Break/Fix lessons that teach developers how to secure applications. Noah joined the podcast to share his experience attending Black Hat USA 2024. They cover some of the most popular topics from the conference, the talks that Noah atte…
…
continue reading
1
Top Hat, Black Tie And Chains | Rev Canon Daryl Fenton
31:42
31:42
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
31:42
"The Church on Earth," otherwise known as "The Church Militant," is the historic idea of God's own people, spiritually prepared and armed, who will resist and eventually overcome evil. We find early instructions for Israel to live this reality in Moses' parting speech in Deuteronomy 4. Ephesians sees righteous living as a manifestation of these sam…
…
continue reading
1
Online Business Systems’ Jeff Man on Demystifying Cybersecurity Solutions (Black Hat Edition)
14:07
14:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
14:07
In our latest special episode of the Future of Threat Intelligence podcast, David chats with cybersecurity expert Jeff Man at the Black Hat conference. Jeff is the Sr. Information Security Consultant at Online Business Systems, and he shares his extensive insights on the evolving landscape of cybersecurity and the importance of fundamental security…
…
continue reading
1
HITRUST Announces Industry-Leading AI Security Certification | 7 Minutes on ITSPmagazine | A HITRUST Short Brand Innovation Story with Jeremy Huval
7:07
7:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:07
HITRUST will launch its AI Security Certification in December 2024, addressing the unique security risks of artificial intelligence systems. As AI reshapes the cybersecurity landscape, existing control frameworks, including HITRUST CSF, do not fully address new and evolving threats. The certification offers prescriptive controls to help secure AI d…
…
continue reading
When bagpiper Steve moved to York, England, he joined a local pipe band. Little did he know that he’d have a piper from the past join him from the other side. Thank you, Steve, for sharing your story with Spooked! If you’re ever in York, you can hear Steve’s Piper Tale in the flesh by joining The Original Ghost Walk of York. Want more tunes? Check …
…
continue reading
1
Hello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Ashley Jess | On Location ...
22:51
22:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:51
Guest: Ashley Jess, Senior Intelligence Analyst, Intel 471 [@Intel471Inc] At SecTor | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#ashley-jess-48633 ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | ht…
…
continue reading
1
Venable LLP’s David Patariu on Building Trust Through Effective Privacy Policies
31:16
31:16
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
31:16
In our latest episode of the Future of Threat Intelligence podcast, we welcome David Patariu, an Attorney focusing on Privacy, Artificial Intelligence, and Cybersecurity at Venable LLP. David shares his unique journey from engineering to law, highlighting the critical intersection of technology and legal frameworks. David sheds light on the challen…
…
continue reading
1
Hackers vs. Heroes: Cybersecurity Crisis Response Leadership Best Practices and Worst Fails with Lisa Forte | Cybersecurity Insights Podcast with Matthew Rosenquist
1:01:15
1:01:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:01:15
Guest: Lisa Forte, Partner at Red Goat Security, Cybersecurity Crisis Trainer On LinkedIn | https://www.linkedin.com/in/lisa-forte/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist ______________________ Episode Sponsors Are you interested in sponsoring an ITSPmagazine Chann…
…
continue reading
1
The Muscles We Build by Bridging | A conversation with Kate O'Neill | What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman
59:42
59:42
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
59:42
Guest: Kate O'Neill, Dean, College of Business, American University of Iraq-Baghdad On LinkedIn | https://www.linkedin.com/in/k-kathleen-oneill-phd-strategicleadership/ Hosts: Alejandro Juárez Crawford On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford Miriam Plavin-Masterman On ITSPmagazine 👉 …
…
continue reading
1
188 - UFOs, Aliens, And Implants
36:20
36:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:20
This week on the show I have stories about UFOs, aliens, and implants. Creepy stuff! https://www.youtube.com/watch?v=85lZR2gx9pU&t=353s https://kgradb.com/the-tracie-austin-show/ Email us! indarkplacespod@hotmail.com Facebook: https://www.facebook.com/indarkplacespodcast YouTube: https://www.youtube.com/channel/UCdrL6rsNSKeBA31NcU3reXA Rumble: http…
…
continue reading
1
Building Resilient Applications and APIs: The Importance of Security by Design to Ensure Data Protection | An Imperva Brand Story with Lebin Cheng
36:47
36:47
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:47
In this Brand Story episode, hosts Sean Martin and Marco Ciappelli welcome Lebin Cheng from Imperva to discuss the ever-important topic of API security. As the head of the API security team at Imperva, Lebin Cheng offers a nuanced view into the challenges and solutions involved in protecting sensitive data facilitated by APIs. A central theme of th…
…
continue reading
1
Qiskit and IBM's New Quantum Innovations | The Gestalt IT Rundown: September 25, 2024
36:41
36:41
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:41
We're happy to have Dr. Bob Sutor joining us this week on the Rundown, since he covers quantum and advanced computing for The Futurum Group. IBM made two important announcements in the quantum space this week. The first announcement was Qiskit, a quantum SDK that runs on Python for quantum computers. This promises to bring quantum compute to a more…
…
continue reading
1
The Case for Regulation with Tim Brown
37:10
37:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
37:10
Howdy, y’all, and welcome to The Cyber Ranch Podcast! Our guest today is Tim Brown. If you don’t’ know who Tim Brown is, he is the CISO at SolarWinds, and as such, is one of us. Or maybe in a way, he is all of us, really. Tim advises and has held various other roles in the past, including product roles, which our listeners know are well-respected s…
…
continue reading
1
What Did He Say? | Rev. David Pileggi
41:06
41:06
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
41:06
More than any other gospel writer Mark writes that Jesus was a teacher, yet unlike the others he records very little teaching. But what Jesus was teaching and how He taught can be recovered once we begin to understand the principles that guided First Century Jewish discipleship. That context is more than just historically interesting and remains re…
…
continue reading
1
Hacking EVs and Photovoltaic Systems | Vangelis Stykas | Be Fearless Podcast EP 13
8:45
8:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:45
In this DEF CON 32 special, Vangelis Stykas, CTO and co-founder of ATROPOS.ai, shares his research on hacking on ransomware panels, revealing how difficult they are to disrupt — in fact, ransomware groups are more secure than Fortune 500 companies! Hosted by Product Evangelist Dakshitaa Babu, he also discusses his fascinating research on how electr…
…
continue reading
1
Research is the Key - Shrey Modi and Rahul Vishwakarma's Innovation Journey at California State University | Off the Record with Saman — Student Abroad Podcast
1:01:23
1:01:23
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:01:23
Guests: Shrey Modi, Software Engineer Intern, Teladoc Health On LinkedIn | https://www.linkedin.com/in/shreymodi7/ Rahul Vishwakarma, Blue Ridge Labs, Robin Hood On LinkedIn | https://www.linkedin.com/in/rahulvishwakarma/ ________________________________ Host: Saman Fatima On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-ho…
…
continue reading
1
Hello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Ashley Jess | On Location ...
22:51
22:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:51
Guest: Ashley Jess, Senior Intelligence Analyst, Intel 471 [@Intel471Inc] At SecTor | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#ashley-jess-48633 ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | ht…
…
continue reading
1
Book | The Developer's Playbook for Large Language Model Security: Building Secure AI Applications | A Conversation with Steve Wilson | Redefining CyberSecurity with Sean Martin
34:35
34:35
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
34:35
Guest: Steve Wilson, Chief Product Officer, Exabeam [@exabeam] & Project Lead, OWASP Top 10 for Larage Language Model Applications [@owasp] On LinkedIn | https://www.linkedin.com/in/wilsonsd/ On Twitter | https://x.com/virtualsteve ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Cybe…
…
continue reading
1
AT&T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan
18:20
18:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
18:20
In this episode, Ron Eddings and Jen Langdon speak with Senthil Ramakrishnan, Assistant Vice President of Cybersecurity Product at AT&T Business. Senthil shares information about how a new product, AT&T Dynamic Defense™, helps protect customers by providing threat detection and mitigation at the network edge. They’ll discuss how it can address evol…
…
continue reading
1
AI and Automation in Pentesting | Phillip Wylie | Be Fearless Podcast EP 12
14:23
14:23
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
14:23
“You won't be replaced by AI, you'll be replaced by someone that uses AI.” At DEF CON 32, SquareX Product Evangelist Dakshitaa Babu talks to Offensive Security Expert Phillip Wylie about his cybersecurity journey, AI’s role in pentesting and more! 0:00 Introduction 0:41 Phillip’s journey from pro wrestling to cybersecurity 2:03 Phillip's work at Ho…
…
continue reading
1
DtSR Episode 620 - Cyber Security Has a Data Problem Part 1
39:20
39:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
39:20
Send the hosts a message - try it now! TL;DR: This week Jason Clark and Nathan Smolenski join Jim Tiller and I on part 1 of a 2-part series on data security. It's a topic whose time has come, and we're going to start in part 1 with fully analyzing the problem, how we got here, and just how ugly the beast is. YouTube vide: https://youtube.com/live/Q…
…
continue reading
1
IBM Security's Sam Hector Unpacking IBM's Cost of a Data Breach Report
41:12
41:12
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
41:12
In this episode of the SecurityANGLE, I'm joined by Global Strategy Leader for IBM Security Sam Hector for a deep dive into one of my favorite annual reports, the 19th annual IBM Cost of a Data Breach Report. This year’s report is based on insights from 604 organizations impacted by data breaches between March 2023 and February 2024. The research i…
…
continue reading
1
Supply Chain Sabotage: The Exploding Pager Incident, Instagram’s New Teen Privacy Measures
22:20
22:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:20
In Episode 347, we discuss the recent alarming incidents involving exploding pagers targeting Hezbollah operatives in Lebanon, which resulted in multiple casualties. We clarify why this is not a cyber attack and should not cause widespread panic about personal device safety. Additionally, we cover Instagram’s new policies to default teen accounts t…
…
continue reading
1
Supply Chain Sabotage: The Exploding Pager Incident, Instagram's New Teen Privacy Measures
22:20
22:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
22:20
In Episode 347, we discuss the recent alarming incidents involving exploding pagers targeting Hezbollah operatives in Lebanon, which resulted in multiple casualties. We clarify why this is not a cyber attack and should not cause widespread panic about personal device safety. Additionally, we cover Instagram's new policies to default teen accounts t…
…
continue reading
This week we're catching up on some of the news items that have slipped through the cracks. Email us! indarkplacespod@hotmail.com Facebook: https://www.facebook.com/indarkplacespodcast YouTube: https://www.youtube.com/channel/UCdrL6rsNSKeBA31NcU3reXA Rumble: https://rumble.com/user/InDarkPlaces Order Jimmy's book, Mr. Haunted Origins, here: https:/…
…
continue reading
1
CyberBellum’s Jim Tiller on Mastering the Role of a Fractional CISO
31:04
31:04
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
31:04
In our latest episode of The Future of Threat Intelligence podcast, Jim Tiller, CISO at CyberBellum and a veteran in the cybersecurity industry with over 25 years of experience joins us to explore the intricacies of working as a fractional CISO. He offers a unique perspective on the role's challenges and rewards and emphasizes the importance of und…
…
continue reading
1
S5, E 222 - Navigating Privacy Challenges and Future Tech with Aaron Weller from HP
41:13
41:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
41:13
Send us a text Unlock the secrets of privacy innovation and assurance with our enlightening conversation featuring Aaron Weller from HP. Aaron walks us through his fascinating journey of establishing a new privacy engineering function at HP and expanding into privacy assurance. You'll discover how his team is tackling significant challenges, such a…
…
continue reading
Aspiring filmmaker Chase finds the perfect place to shoot his horror film... the Arx Mortis Haunted House. But beware: inside this Halloween attraction, not all of the scares are fake. Thank you, Chase Barnett, for sharing your story with Spooked! Check out Chase’s podcast Holed Up. Produced by Erick Yáñez, original score by Nicholas Marks, artwork…
…
continue reading
1
Using LLMs for Offensive Cybersecurity | Michael Kouremetis | Be Fearless Podcast EP 11
9:46
9:46
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
9:46
In this DEF CON 32 special, Michael Kouremetis, Principal Adversary Emulation Engineer from MITRE discusses the Caldera project, research on LLMs and their implications for cybersecurity. If you’re interested in the intersection of AI and cybersecurity, this is one episode you don’t want to miss! 0:00 Introduction and the story behind Caldera 2:40 …
…
continue reading
1
With Bug Bounty Expert Niks | Be Fearless Podcast EP 10
11:30
11:30
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
11:30
"I found multiple demo versions available without any authentication. I went there, extracted all the requests, and fuzzed all the parameters for SQL injection. Then I changed the domain to the in-scope domain of the company I was hacking and ran SQL commands to dump their database." Hear from Nikhil “Niks” Srivastava bug bounty hunter and founder …
…
continue reading
1
Achieving a State of Cyber Resiliency is all about a Proactive Approach
27:20
27:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:20
In this episode of the SecurityANGLE our conversation revolves around cyber resiliency and how embracing a proactive security approach can not only help address gaps in visibility, but also ensure organizations the business resilience they seek, as well as help them keep up with the rapid pace of innovation that is our reality today. My guest today…
…
continue reading
1
$17M Series B Will Accelerate Growth As BlackCloak Further Strengthens Its Personal Cybersecurity Platform And Drives Innovative Products | 7 Minutes on ITSPmagazine | A BlackCloak Short Brand Innovation ...
7:03
7:03
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:03
In 7 Minutes on ITSPmagazine, Sean Martin chats with Chris Pierson, CEO and Co-founder of BlackCloak, about their latest milestone in digital executive protection. BlackCloak, a pioneer in protecting executives, senior leaders, high-net-worth individuals, and family offices, has secured $17 million in a Series B funding round led by Baird Capital, …
…
continue reading
1
Intel Foundry Business To Become a Subsidiary | The Gestalt IT Rundown: September 18, 2024
31:49
31:49
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
31:49
We have talked at length this year about Intel's efforts to turn the ship and add more profitability to the ledger. One of the crown jewels in that portfolio is the foundry business. It has been the recipient of a large amount of government funding through the CHIPS Act. But it is also playing catch up with TSMC and others. New broke yesterday that…
…
continue reading
1
You're Hiring Wrong! with 3 Guests New to the Industry
42:46
42:46
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
42:46
What can we established cybersecurity practitioners ACTUALLY do to help those new in the field besides blathering back and forth about the problem in the echo chamber that is LinkedIn? Drew got the clever idea of inviting three folks who are brand new to the field or barely started on their cyber journey, and, get this: ASKING them what they're exp…
…
continue reading
1
Believer vs Disciple | Bro. Eyal Friedman
27:04
27:04
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:04
Believer vs Disciple | Bro. Eyal Friedman by Christ Church JerusalemOleh Christ Church Jerusalem
…
continue reading
1
Indigenous Astronomy: The Legacy of the Aztecs | Stories From Space Podcast With Matthew S Williams
42:47
42:47
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
42:47
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes The Aztec Empir…
…
continue reading
1
DtSR Episode 619 - Aaron Bray The Complete Novice Guide to SBOM
41:50
41:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
41:50
Send the hosts a message - try it now! TL;DR: This week's episode features Aaron Bray, CEO of Phylum. We use this episode as a complete primer on SBOM (Software Bill of Materials). We cover the typical "lot of ground" but try to answer the question of what SBOMs are, how they're useful, and what you as practitioners can do now that you have them. Y…
…
continue reading