Weekly podcasts from Science Magazine, the world's leading journal of original scientific research, global news, and commentary.
…
continue reading
Intrusion Monitoring Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Nation Podcast is hosted by ESA, and it brings the voice of the electronic security and life safety industry to you! Host Hannah Boone brings on security pros to discuss best practices, real-life experiences, industry forecasts, and more on this monthly podcast. It's the ever-present voice in an ever-changing industry.
…
continue reading
This week, while Dave Bittner is on vacation, hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing …
…
continue reading
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. CyberWire Glossary…
…
continue reading
1
Hunting ancient viruses in the Arctic, and how ants build their nests to fight disease
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38First up on the podcast, Contributing Correspondent Kai Kupferschmidt takes a trip to Svalbard, an Arctic archipelago where ancient RNA viruses may lie buried in the permafrost. He talks with host Sarah Crespi about why we only have 100 years of evolutionary history for viruses such as coronavirus and influenza, and what we can learn by looking dee…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal ex…
…
continue reading
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.…
…
continue reading
1
How birds reacted to a solar eclipse, and keeping wildfire smoke out of wine
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00First up on the podcast, producer Kevin McLean talks with Associate Online News Editor Michael Greshko about the impact of wildfires on wine; a couple horse stories, one modern, one ancient; and why educators are racing to archive government materials. Next on the show, research that took advantage of a natural experiment in unnatural lighting. Hos…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
By N2K Networks
…
continue reading
By N2K Networks
…
continue reading
1
A new generation of radiotherapies for cancer, and why we sigh
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48First up on the podcast, Staff Writer Robert F. Service joins host Sarah Crespi to talk about a boom in nuclear medicine, from new and more powerful radioisotopes to improved precision in cancer cell targeting. Next on the show, we talk about why we sigh. Maria Clara Novaes-Silva, a doctoral student at ETH Zürich, discusses how deep breaths cause m…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are …
…
continue reading
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, I…
…
continue reading
1
Salty permafrost’s role in Arctic melting, the promise of continuous protein monitoring, and death in the ancient world
46:22
46:22
Play later
Play later
Lists
Like
Liked
46:22First up on the podcast, Science News Editor Tim Appenzeller joins host Sarah Crespi to discuss why a salty layer of permafrost undergirding Arctic ice is turning frozen landscapes into boggy morasses. Next on the show, glucose isn’t the only molecule in the body that can be monitored in real time; proteins can be, too. Freelancer producer Zakiya W…
…
continue reading
This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and …
…
continue reading
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestrationBy N2K Networks
…
continue reading
1
Protecting newborns from an invisible killer, the rise of drones for farming, and a Druid mystery
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00First up on the podcast, freelance science journalist Leslie Roberts joins host Sarah Crespi to talk about the long journey to a vaccine for group B streptococcus, a microbe that sickens 400,000 babies a year and kills at least 91,000. Next on the show, there are about 250,000 agricultural drones employed on farms in China. Countries such as South …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading
1
An aggressive cancer’s loophole, and a massive field of hydrogen beneath the ocean floor
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14First up on the podcast, aggressive tumors have a secret cache of DNA that may help them beat current drug treatments. Freelance journalist Elie Dolgin joins host Sarah Crespi to talk about targeting so-called extrachromosomal DNA—little gene-bearing loops of DNA—that help difficult-to-treat cancers break the laws of inheritance. Next on the show, …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal …
…
continue reading
1
Younger Generations in Security: Steven Swavely on Finding Purpose and Opportunity in the Industry
28:22
28:22
Play later
Play later
Lists
Like
Liked
28:22In this episode of Security Nation, we sit down with Steven Swavely, Distribution Account Manager at Resideo, to explore his journey into the industry and what it’s like to build a career as a Gen Z professional. Steven shares what surprised him most about working in security, the challenges he’s faced, and the opportunities he sees for his peers. …
…
continue reading
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 202…
…
continue reading
1
Finding HIV’s last bastion in the body, and playing the violin like a cricket
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57First up on the podcast, despite so many advances in treatment, HIV drugs can suppress the virus but can’t cure the infection. Where does suppressed HIV hide within the body? Staff Writer Jon Cohen joins host Sarah Crespi to talk about the Last Gift Study, in which people with HIV donate their bodies for rapid autopsy to help find the last reservoi…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: https://thecyberwire.com/glossary/devops Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and …
…
continue reading
1
A mother lode of Mexican mammoths, how water pollution enters the air, and a book on playing dead
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07First up on the podcast, Staff Writer Rodrigo Pérez Ortega joins host Sarah Crespi to talk about a megafauna megafind that rivals the La Brea Tar Pits. In addition to revealing tens of thousands of bones from everything from dire wolves to an ancient human, the site has yielded the first DNA from ammoths that lived in a warm climate. Next on the sh…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are ma…
…
continue reading
1
Waterfall Software Development Method (noun) [Word Notes]
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verr…
…
continue reading
1
New insights into endometriosis, and mapping dengue in Latin America
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07First up on the podcast, Staff Writer Meredith Wadman joins host Sarah Crespi to discuss recent advances in understanding endometriosis—a disease where tissue that resembles the lining of the uterus grows outside the uterus, causing pain and other health effects. The pair talk about how investigating the role of the immune system in this disease is…
…
continue reading
1
Scammers hit the right notes in the wrong way.
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We s…
…
continue reading
1
Agile Software Development Method (noun) [Word Notes]
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," …
…
continue reading
1
Why chatbots lie, and can synthetic organs and AI replace animal testing?
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53First up on the podcast, producer Meagan Cantwell and Contributing Correspondent Sara Reardon discuss alternative approaches to animal testing, from a heart on a chip to a miniorgan in a dish. Next on the show, Expert Voices columnist Melanie Mitchell and host Sarah Crespi dig into AI lies. Why do chatbots fabricate answers and pretend to do math? …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe's sto…
…
continue reading
Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:“Cybersecurity beyond the Headlines: A Conversatio…
…
continue reading
1
Why anteaters keep evolving, and how giant whales get enough food to live
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08First up on the podcast, Online News Editor David Grimm brings stories on peacock feathers’ ability to emit laser light, how anteaters have evolved at least 12 times, and why we should be thanking ketchup for our French fries. Next on the show, rorqual whales, such as the massive blue whale, use a lunging strategy to fill their monster maws with se…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some …
…
continue reading
1
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoptio…
…
continue reading
1
Work from home, malware included. [OMITB]
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena…
…
continue reading
1
Wartime science in Ukraine, what Neanderthals really ate, and visiting the city of the dead
51:33
51:33
Play later
Play later
Lists
Like
Liked
51:33First up on the podcast, Contributing Correspondent Richard Stone joins host Sarah Crespi to talk about the toll of the ongoing conflict in Ukraine and how researchers have been mobilized to help the war effort. In June, Stone visited the basement labs where Ukrainian students modify off-the-shelf drones for war fighting and the facilities where bi…
…
continue reading
In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering o…
…
continue reading
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWir…
…
continue reading
1
Robots that eat other robots, and an ancient hot spot of early human relatives
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45First up on the podcast, South Africa’s Cradle of Humankind is home to the world’s greatest concentration of ancestral human remains, including our own genus, Homo, Australopithecus, and a more robust hominin called Paranthropus. Proving they were there at the same time is challenging, but new fossil evidence seems to point to coexistence. Producer…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We've got some follow-up from…
…
continue reading
1
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks. Audio reference link: "OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)." by Pravir Chandra, OWASP MSP, 2009.…
…
continue reading
1
Studying a shark-haunted island, and upgrading our microbiomes with engineered bacteria
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50First up on the podcast, Réunion Island had a shark attack crisis in2011 and closed its beaches for more than a decade. Former News Intern Alexa Robles-Gil joins host Sarah Crespi to talk about how researchers have used that time to study the island’s shark populations and test techniques for preventing attacks, in the hopes of protecting lives and…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts share some follow-up, includi…
…
continue reading
1
Universal 2nd Factor (U2F) (noun) [Word Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange. Cyberwire Glossary link: https://thecyberwire.com/glossary/u2f Audio reference link: “Rise of…
…
continue reading
1
A tardi party for the ScienceAdviser newsletter, and sled dog genomes
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52First up on the podcast, Newsletter Editor Christie Wilcox joins host Sarah Crespi to celebrate the 2-year anniversary of ScienceAdviser with many stories about the amazing water bear. They also discuss links between climate change, melting glaciers, and earthquakes in the Alps, as well as what is probably the first edible laser. Next on the show, …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a ton of follow-up—from a sextortio…
…
continue reading