Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Computer Security Podcasts

show episodes
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
Compiler

Red Hat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
Artwork

1
Data Revolution

Kate Carruthers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Conversations at the crossroads of data, AI, governance, cybersecurity, and digital transformation. Join Kate Carruthers as she dives into the world of data, AI, governance, cybersecurity, and digital transformation. Each episode explores how technology is changing business, society, and everyday life. From protecting privacy to powering innovation, this podcast breaks down the trends and ideas shaping the future of our digital world - all in clear, engaging conversations you’ll actually enj ...
  continue reading
 
Artwork

4
The Cognitive Crucible

Information Professionals Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
  continue reading
 
Artwork

1
Broken Silicon

Moore's Law Is Dead, Bleav

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
One brother is an Engineer, and the other is a Scientist. Both are hilarious and discuss the latest news, rumors, and developments going on in the Computer Hardware and PC Gaming Space. Broken Silicon is Brought to you by the Youtube Channel: Moore's Law Is Dead, and its creator Tom. Youtube Channel: https://www.youtube.com/channel/UCRPdsCVuH53rcbTcEkuY4uQ Patreon That Makes this Possible: https://www.patreon.com/MooresLawIsDead Music by SAHARA, who were awesome enough to give written permis ...
  continue reading
 
Artwork

1
Act on Tech

Alex of Alex Custom Tech

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
  continue reading
 
Artwork

1
Cables2Clouds

Cables2Clouds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
  continue reading
 
Artwork

1
Get Enabled Digitally

Cooperative Computing

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Expert insights on digital transformation, helping businesses leverage automation and data to accelerate growth and innovation. Featuring Cooperative Computing's Chief Revenue Officer Jim Barker, this podcast delivers actionable insights. Through relatable success stories and expert analysis, we explore how businesses can leverage hyper-personalization, hyper-automation, and data-driven decisions to gain competitive advantage. Whether you're a business leader modernizing legacy systems or im ...
  continue reading
 
Artwork
 
Hosted by Rick from DALY Computers (www.daly.com), the Technology Pulse podcast takes a look at new and existing technologies that will benefit the SLED (state/local government, education) sector in Maryland and Virginia. Episodes will feature guests from innovative product/service providers, the DALY team, and strategic partners.
  continue reading
 
Artwork

1
Inside Java

Chad Arimura, David Delabassee

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Inside Java is a podcast for Java Developers brought to you directly from the people that make Java at Oracle. We'll discuss the language, the JVM, OpenJDK, platform security, innovation projects like Loom and Panama, and everything in between.
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
  continue reading
 
Artwork

1
Waves & Wires.

Offical Zyxel Networks Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Waves & Wires', the podcast that explores the fascinating world of computer networking, brought to you by Zyxel Networks (EMEA). Join us as we dive into the intricacies of cloud networking, explore the latest wired, wireless technologies, and discuss the ever-important topic of network security for businesses.Our team of experts, with years of experience in the networking industry, share their insights and knowledge on how these technologies are shaping the future of communicatio ...
  continue reading
 
Artwork
 
Dr. Darren Pulsipher, Chief Enterprise Architect for Public Sector, author and professor, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Lea ...
  continue reading
 
Artwork

4
Next in Tech

S&P Global Market Intelligence

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what's new and what's next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
  continue reading
 
Artwork

1
The Security Table

Izar Tarandach, Matt Coles, and Chris Romeo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
  continue reading
 
Artwork

4
Loose Leaf Security

Liz Denys & Geoffrey Thomas

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Loose Leaf Security is a podcast about making good computer security practice for everyone. We believe you don't need to be a software engineer or security professional to understand how to keep your devices and data safe. In every episode, we tackle a typical security concern or walk you through a recent incident.
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Loading …
show series
 
Was hat sich im Jahr 2025 im Bereich IT-Sicherheit getan? Welche neuen Methoden, Buzzwords und Trends waren zu sehen? Was waren die fiesesten Angriffe und die teuersten Fehler?Wir wagen auch den IT-Security-Ausblick auf das Jahr 2026. Der ist wie immer mit Vorsicht zu genießen.Licensed to the public under http://creativecommons.org/licenses/by/4.0a…
  continue reading
 
Stolen Target source code looks real. CISA pulls the plug on Gogs. SAP rushes patches for critical flaws. A suspected Russian spy emerges in Sweden, while Cloudflare threatens to walk away from Italy. Researchers flag a Wi-Fi chipset bug, a long-running Magecart skimming campaign, and a surge in browser-in-the-browser phishing against Facebook user…
  continue reading
 
Please enjoy this encore of CISO Perspectives We're sharing an episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episod…
  continue reading
 
Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a five-year-old Fortinet vulnerability being freshly targeted by threat actors (despite a patch having been available for five years). We also dig into a clever, multi-stage attack against hotel operator…
  continue reading
 
Leaders may shy away from thinking about insider threats because it means assuming the worst about colleagues and friends. But technology executives do need to confront this problem because insider attacks are prevalent—a recent study claims that in 2024, 83% of organizations experienced at least one—and on the rise. Moreover, AI and deepfakes vast…
  continue reading
 
Euro Beinat is the Global Head of AI and Data Science at Prosus Group, working on scaling AI-driven tools and agent-based systems across Prosus’s global portfolio, deploying internal assistants like Toqan and generative AI platforms such as PlusOne, and building initiatives like AI House Amsterdam and interdisciplinary AI residencies to explore int…
  continue reading
 
We have new AMD & Nvidia leaks, and a lot to say about the CES announcements… [SPON: Discover Easy, Affordable, and Reliable PCB manufacturing with JLCPCB! New customers get $70 OFF, and existing customers get $33 OFF here: https://jlcpcb.com/?from=Moore2 ] [SPON: Shop Winter Savings: https://micro.center/aa30ba ] [SPON: Sign up for Micro Center’s …
  continue reading
 
Takeaways AI skills gap is a significant challenge for organizations. Skilling is essential for adapting to technological changes. Organizations must leverage AI tools to enhance productivity. A growth mindset is crucial for individual and organizational success. Continuous learning is necessary in the tech industry. AI should be seen as a co-pilot…
  continue reading
 
Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
  continue reading
 
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Anthony Vinci, author of The Four…
  continue reading
 
SANS Stormcast Tuesday, January 13th, 2026: n8n got npm'ed; Gogs exploit; telegram proxy links n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time…
  continue reading
 
The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia’s Fancy Bear targets energy research, defense collaboration, and government communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mob…
  continue reading
 
Take a Network Break! The virtual donut factory is back from hiatus, and we’ve got a fresh batch to pass around as we discuss the week’s tech news. We start with an emergency patch for Cisco ISE, then dig into a set of new product announcements from Arista including a new ability to deploy wireless... Read more »…
  continue reading
 
[email protected] In this episode, we explore the Palm Pilot not just as a retro gadget but as a pioneering example of human-centered technology that aligns closely with modern IT skills development. Discover how Palm’s approach to trust, speed, and minimal distraction offers valuable lessons for technology education and tech exam prep. Wheth…
  continue reading
 
[email protected] Windows troubleshooting can feel like guesswork, especially when preparing for your CompTIA exam. In this episode, we delve into the inner workings of the Windows OS and introduce a practical decision flow that reduces guesswork and strengthens your tech exam prep. Learn how to transform vague issues into precise, testable h…
  continue reading
 
AI has many problems, but also has promise. Today I’m going to focus on one particular problem that has some viable solutions: privacy. Chat bots like ChatGPT, Gemini and Claude all require your queries to be processed in the cloud. All the personal questions we ask are probably being logged against our identity and could be used to train future AI…
  continue reading
 
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segmen…
  continue reading
 
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches Malicious Process Environment Block Manipulation The process environment block contains metadata about particular processes, but can be manipulated. https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1…
  continue reading
 
Please enjoy this encore of Career Notes. Laura Hoffner, Executive Vice President at Concentric, shares her story about her time working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura has known since she was i…
  continue reading
 
This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy an…
  continue reading
 
The NSA reshuffles its cybersecurity leadership. A new report unmasks ICE’s latest surveillance system. CISA marks a milestone by retiring ten Emergency Directives. Trend Micro patches a critical vulnerability. Grok dials back the nudes, a bit. Cambodia extradites a cybercrime kingpin to China. Ghost Tap malware intercepts payment card data. Resear…
  continue reading
 
It’s been over a decade since the first Packet Pushers podcast on EVPN. Now, guest Jeff McAdams can legitimately suggest that we “EVPN all the things.” Hosts Ethan Banks and Drew Conry-Murray dig into Jeff’s stance on EVPN/VXLAN. They look at how VXLAN and EVPN work; talk about use cases in the data center, the... Read more »…
  continue reading
 
SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Se…
  continue reading
 
Ethan and Holly discuss the major differences between In-band and Out-of-band (OOB) management and the pros and cons of both. They explore how to implement a proper OOB network and critical use cases where OOB is required. They also explain the differences and roles of the data plane, the control plane, and the management plane.... Read more »…
  continue reading
 
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
  continue reading
 
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
  continue reading
 
The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing r…
  continue reading
 
Will Microsoft’s CLAT bring widespread adoption rates for IPv6? Will there be significant advancements in corporate and cloud adoption as well? Will this finally be the year we see the fix for the RFC 6724? Ed Horley, Tom Coffeen, and Nick Buraglio make their predictions for the new year in the first IPv6 Buzz of... Read more »…
  continue reading
 
Send us a text On this episode of Embedded Insiders, Ken sits down with Felix Galindo, a Principal Engineer at Digi International, to discuss the impending upgrade crisis for industrial facilities and legacy connectivity in Industrial IoT. Watch this segment: https://www.youtube.com/watch?v=ambwtKT63s0 The next segment is sponsored by Infineon Tech…
  continue reading
 
Send us a text Savinay Berry, CTO of OpenText, detailed his return to the company to lead AI integration, emphasizing OpenText’s extensive but often unseen role supporting essential systems for Fortune 5000 companies. He stressed the unique challenges of implementing AI in the enterprise, particularly concerning security and compliance. The discuss…
  continue reading
 
The rapid adoption of AI often means security is an afterthought. And let's face it—humans are not always great at assessing risk. But how has AI transformed the security landscape? What can the industry do to stay informed and ready to respond to threats? And what does this mean for product security? Jeff Crume, distinguished engineer at IBM, stop…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play