Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Computer Security Podcasts

show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
The Small Business Cyber Security Guy

The Small Business Cyber Security Guy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Host Noel Bradford teams up with cybersecurity experts to deliver essential tech insights for UK small businesses and consumers. Cutting through jargon with wit and authority, each episode tackles real-world cyber threats, updates, and digital security challenges that actually matter to your business. From patch management to data protection, get actionable advice that doesn't require a computer science degree.Where cybersecurity meets practicality.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Computer and Technology Radio

Marsha Collier and Marc Cohen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Consumer Technology News & Views About The Hosts: Marsha Collier is an award winning tech author who has sold over a million books. Learn about her at www.marshacollier.com. Marc Cohen Has Spent 30 Years Informing Southern Californians About Technology. Show Contact Info: [email protected] Twitter #techradio @MarshaCollier & @realmarccohen
  continue reading
 
Artwork

1
The Security Table

Izar Tarandach, Matt Coles, and Chris Romeo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
  continue reading
 
The Tech+ PrepCast is a complete audio study companion for the CompTIA Tech+ (FC0-U71) certification exam, designed to guide learners through every domain and objective. Each episode delivers clear explanations, practical examples, and exam-focused insights to help you build confidence and technical readiness. Whether you are new to IT or preparing for your first certification, this PrepCast provides structured support from start to finish.
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Artwork
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
Artwork

1
Act on Tech

Alex of Alex Custom Tech

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
Cables2Clouds

Cables2Clouds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
  continue reading
 
Artwork

1
Digital Detectives

Legal Talk Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
Artwork

1
Quantum Computing Now

Ethan Hansen, Shwetha Jayaraj

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a podcast all about quantum computing news, basic concepts, and what people in the field are doing. Quantum computing is serious stuff and we talk about serious science, but I try to not take myself too seriously. With that being said, quantum computing is rad as heck. Oh and here's the obligatory phrase " quantum computing podcast " so search engines pick this up. Follow me on Minds to get updates on what I'm working on: https://www.minds.com/1ethanhansen?referrer=1ethanhansen Shoot ...
  continue reading
 
Artwork

1
MamraMic

Mamram Alumni Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
MamraMic - Podcast by Mamram Alumni Association. For 4 years now we have been telling you the success stories of the graduates of the Mamram unit, the IDF’s first computer unit. Keep listening to stories about entrepreneurship, technology, good people, and everything in between. Have fun!
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Get exam-ready with the BareMetalCyber PrepCast, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
  continue reading
 
Artwork

1
Hot or Hype

Sakura Sky

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Hot or Hype, the podcast where hosts Olivia Storelli and Andrew Stevens break down the latest trends in cloud computing, data engineering, AI, and cybersecurity - and decide whether they're game-changing innovations or just industry buzz. In each episode, we dive into topics like AI-driven predictive analytics, cloud-native architectures, zero trust security, data mesh, and more, giving you real-world insights from practitioners who know what works and what doesn't. No fluff. No h ...
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
  continue reading
 
Artwork

1
Inside Java

Chad Arimura, David Delabassee

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Inside Java is a podcast for Java Developers brought to you directly from the people that make Java at Oracle. We'll discuss the language, the JVM, OpenJDK, platform security, innovation projects like Loom and Panama, and everything in between.
  continue reading
 
Artwork
 
This is daily Apple news. Monday through Friday, Ken Ray brings a short shot of tech happenings to your day. If it's Apple news, Apple-related news, or news related to Apple-related news, you'll hear about it here. News you'll like... this is Mac OS Ken.
  continue reading
 
Loading …
show series
 
Las fuentes presentan discusiones con un hacker llamado Gob.eth y otros participantes con respecto al arresto y encarcelamiento de un asociado de 18 años, Vlady , en Uruguay. Gob.eth afirma que Vlady está acusado erróneamente de múltiples delitos de piratería informática, alegando que sus acciones fueron principalmente desfiguraciones de sitios web…
  continue reading
 
This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware.…
  continue reading
 
Fully autonomous cars are here. In a handful of cities across the US and China, robotaxis are transporting human passengers around town, but with no human behind the wheel. Loyal Listener Amberish wrote in to More or Less to ask about a couple of safety statistics he’d seen regarding these self-driving cars on social media. These claimed that Waymo…
  continue reading
 
This episode covers the The Watchman Privacy podcast, hosted by Gabriel Custodiet, focusing on its mission to help listeners understand and escape the "Technocracy". It examines Custodiet's background in cybersecurity and finance, which underpins the podcast's credibility and consistent editorial focus. A significant portion of the report details t…
  continue reading
 
Los textos proporcionados ofrecen un examen multifacético del panorama de la ciberseguridad de Uruguay, destacando tanto sus ambiciones digitales como sus vulnerabilidades significativas. Una narrativa central se centra en Alberto Daniel Hill, un hacker ético que fue encarcelado injustamente, convirtiéndose en un ejemplo conmovedor de la desconexió…
  continue reading
 
Alberto Daniel Hill introduces and reflects on a publication titled "My Life in Anonymous: An Atonement" by a former hacktivist known as Dexer. The discussion traces Dexer's decade-long journey from an observer to an active member of Anonymous, detailing his group's efforts to legitimize themselves in information security. It highlights the movemen…
  continue reading
 
Los textos proporcionados describen el podcast Cyber Midnight Club, presentado por el experto uruguayo en ciberseguridad Alberto Daniel Hill, que explora temas como la piratería, el cibercrimen y la privacidad digital, a menudo con eventos del mundo real y su defensa de la justicia. Una parte significativa del contenido del podcast se centra en el …
  continue reading
 
Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
  continue reading
 
A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch p…
  continue reading
 
This briefing synthesizes information from "Cyber Midnight Club: Mexico's Digital Underbelly" and "Héctor López & Alberto Daniel Hill: Cybersecurity Collaboration" with the podcast "Jacobo Grinberg, El PENTAGONO Y CHINA; Hacker EXPONE VERDADES — Héctor López." It provides a detailed overview of the key themes, prominent figures, and critical insigh…
  continue reading
 
How might we get network traffic from Earth to a lunar base? Or Mars? Or to spaceships carrying astronauts or probes exploring space? And how do we get it back? The problem, among other things, is latency. The answer isn’t TCP/IP. The answer is…complicated. On today’s Heavy Networking we explore the challenges of getting packets... Read more »…
  continue reading
 
Vint Cerf, widely recognized as one of the fathers of the Internet, is today’s special guest on Total Network Operations. He currently serves as Vice President and Chief Internet Evangelist at Google. His pioneering work began back in the 1960’s when he was involved in the ARPANET project. Alongside Bob Kahn, Vint co-invented the TCP/IP... Read mor…
  continue reading
 
- Apple Warns Against EU-Style App Store and Hardware Regulations in UK - Eddy “the Buyer”? Cue Said to Champion M&A for A.I. Inside Apple - Apple Subsidiary Beats Teases Fall Launch for Powerbeats Fit Earbuds - BBC Picks Up First Three Seasons of Apple TV+ Comedy “Trying” - Sponsored by Insta360 Go Ultra - A tiny, hands-free 4K camera. Go Ultra to…
  continue reading
 
Matt Mulcahy shares the blueprint for launching MSP Cyber in 2025. We cover what it really costs, what tools matter, where MSPs are going wrong with value, and why combining IT with digital marketing is a game-changer. Why Listen: Learn the real startup costs of an MSP today Why Miami’s IT market is still wide open Shifting value away from just hel…
  continue reading
 
SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increas…
  continue reading
 
Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
  continue reading
 
Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
  continue reading
 
As your thought partner, I can help you quickly understand and analyze the provided information to formulate strategic recommendations for senior leadership. I will provide clear, concise, and well-supported answers, drawing on the details in the sources. The knowledge base you've provided includes extensive insights into Uruguay's cybersecurity la…
  continue reading
 
Transitioning from IPv4 to IPv6, or at least IPv6-mostly, is no easy task. Today’s show provides some education and advice about IPv6 transition mechanisms. We cover options such as NAT64, DNS64, PREF64, and more, as well as use cases. Also, if your technology vendors aren’t offering some of these mechanisms, ask for them – you’re... Read more »…
  continue reading
 
Artie Shevchenko, author of Code Health Guardian, speaks with host Jeff Doolittle about the crucial role of human programmers in the AI era, emphasizing that humans must excel at managing code complexity. Shevchenko discusses these concepts and key takeaways from his book, including the three problems caused by complexity: change amplification, cog…
  continue reading
 
It’s time to talk crypto. No, not the Bitcoin kind. Ethan and Holly introduce the basics of IPsec, the protocol that authenticates and encrypts traffic between endpoints. They discuss what it is, how it provides trustworthiness and secrecy to IP traffic, and common use cases. They review the different types of IPsec protocols and modes,... Read mor…
  continue reading
 
- IDC Raises 2025 Smartphone Shipment Expectations Thanks to iPhone - Apple Revokes Notarization for iTorrent in EU’s AltStore PAL - Google Intros Notarization-Style Verification for Android Apps Outside Play Store - Columbia Pursues Probe into Alleged Anticompetitive Behavior from Apple - Apple Music Radio Stations Turn Up on TuneIn - Apple TV+ Dr…
  continue reading
 
The FBI shares revelations on Salt Typhoon’s reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. …
  continue reading
 
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallet…
  continue reading
 
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
  continue reading
 
In the changing landscape of AI data infrastructure, F5 and MinIO are partnering on a solution that brings together the best of each company. This solution bookends the AI stack—it uses F5 for reliable, secure, and observable data delivery and MinIO’s AIStor for storage of all data types. The goal is to help organizations be... Read more »…
  continue reading
 
We’re in the era of quantum computing. That brings with it a lot of great things. But at the same time, it brings some not so good things. Once again, we’re in a race to stay ahead of the bad guys to keep our systems secure. Folks like the experts at Infineon are doing what they can to do just that. And the best part is that they are trying to insu…
  continue reading
 
The provided report offers an extensive overview of the global cyber threat landscape for 2024-2025, emphasizing the professionalization of cybercrime and its increasing entanglement with geopolitical motives. It highlights the rise of Ransomware-as-a-Service (RaaS) models and the evolution of multi-extortion tactics, which have significantly impac…
  continue reading
 
Send us a text What happens when three major cloud providers each reimagine network design from scratch? You get three completely different approaches to solving the same fundamental problem. The foundation of cloud networking begins with the virtual containers that hold your resources: AWS's Virtual Private Clouds (VPCs), Azure's Virtual Networks …
  continue reading
 
Noticing your computer running slower after a recent Windows 11 update? You’re not alone. In this episode of Act on Tech, Alex explains how a recent Windows 11 patch has been causing SSD performance issues—leading to longer boot times, sluggish apps, and slower file transfers. Learn what’s behind the slowdown, how to check if your system is affecte…
  continue reading
 
- Apple’s Next Media Event Set for 9 September - Expectations for Apple’s “Awe Dropping” Event - Apple Sets “Awe Dropping” Placeholder on YouTube - “Awe Dropping” Art Goes Interactive on Apple Site - BofA: Investors Not Super Excited About iPhone Air - Germany Says Apple Can’t Call Apple Watch “Carbon Neutral” - Apple Opening Two Stores in India Ne…
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
The provided sources offer a multifaceted conversation exploring challenges in the digital age, particularly concerning online platforms and free speech. They highlight personal struggles and emotional reunions among friends, alongside the pervasive influence of Artificial Intelligence in both its beneficial and harmful applications. A significant …
  continue reading
 
Ever been told, “You’re too expensive”? Yeah, me too. In this episode, I share how I deal with prospects who quote me lower rates from “their guy” — and why I never match those prices. Instead, I focus on flipping the conversation to value, downtime costs, and the trust that keeps clients with me for decades. Why Listen: Learn why I never match low…
  continue reading
 
What are common mistakes folks are making with their Azure tenant(s)? While at the Kansas City Developers Conference, Richard chatted with Scott Sauber to run down his top ten list of issues he checks on for all his customers using Azure. From tenant ownership to naming conventions, policies, identities, and cost controls - there are a lot of thing…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play