Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
Pod Save the UK

Crooked Media

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Pod Save the UK is your weekly fix of political news, big ideas and a shot of inspiration. Each week hosts, comedian Nish Kumar and journalist Coco Khan are joined by politicians, experts, and famous friends to unpick the latest news, look for solutions, and inspire action. From Crooked Media – the creators of Pod Save America – in partnership with Reduced Listening, tune in to new episodes of Pod Save the UK every Thursday wherever you pod.
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork

1
Citation Needed

Citation Needed Media

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we’re experts. Because this is the internet, and that’s how it works now.
  continue reading
 
Artwork

1
Carnegie Connects

Carnegie Endowment for International Peace

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
  continue reading
 
Listen in on FDD Events featuring discussions on today’s most pressing national security and foreign policy challenges and opportunities with top policymakers and leading experts. Webpage: https://www.fdd.org/events/
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Artwork

1
Post Reports

The Washington Post

icon
Unsubscribe
icon
Unsubscribe
Daily
 
Post Reports is the daily podcast from The Washington Post. Unparalleled reporting. Expert insight. Clear analysis. Everything you’ve come to expect from the newsroom of The Post, for your ears. Martine Powers and Elahe Izadi are your hosts, asking the questions you didn’t know you wanted answered. Published weekdays around 5 p.m. Eastern time.
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Welcome to The Peter Zeihan Podcast Series! Geopolitical Strategist Peter Zeihan is a global energy, demographic and security expert. If you want to stay informed on the realities of geography and populations, you've come to the right place. Zeihan's worldview offers insights into how global politics impact markets and economic trends, helping industry leaders navigate today’s complex mix of geopolitical risks and opportunities. Expect a forward-looking approach to what will drive tomorrow’s ...
  continue reading
 
Artwork

1
Technology and Security

Dr Miah Hammond-Errey

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

1
Security Dilemma

The John Quincy Adams Society

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Loading …
show series
 
Questions we answer in this episode Who is Troy Hunt? How did he get phished? What are some lessons we can learn from his story? Who will we be inviting as a guest to the podcast? Episode summary Troy Hunt, a security expert, got phished. He clicked a link in an email, and entered his password into a fake website. The hackers logged into his Mailch…
  continue reading
 
Send us a text 🎙️ Podcast Summary: In this compelling episode, Yolanda sits down with Lena Sisco — former Department of Defense interrogator, bestselling author, TEDx speaker, and body language expert. Lena shares her extraordinary and unexpected journey from archaeology to military intelligence, revealing the mental and emotional endurance it take…
  continue reading
 
As Artificial Intelligence reshapes our world, understanding the new threat landscape and how to secure AI-driven systems is more crucial than ever. We spoke to Ankur Shah, Co-Founder and CEO of Straiker about navigating this rapidly evolving frontier. In this episode, we unpack the complexities of securing AI, from the fundamental shifts in applic…
  continue reading
 
Trade tensions are taking their toll on an already fragile Chinese system. The US is dealing with self-sufficiency problems, but for China, it is an existential question. Will this new deal change that? Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/the-deal-with-the-chinese…
  continue reading
 
El Salvador’s President Nayib Bukele has made a lot of headlines recently in the United States for his partnership with the Trump administration. Bukele has helped enable President Trump’s scheme to remove supposed Venezuelan gang members from the U.S. under the Alien Enemies Act, housing these detainees in the notorious CECOT prison. In court, the…
  continue reading
 
In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
  continue reading
 
On this week's episode of Security Dilemma, John Allen Gay and A.J. Manuzzi spoke with Candace Rondeaux, the author of Putin’s Sledgehammer: The Wagner Group and Russia’s Collapse into Mercenary Chaos. She serves as the Senior Director for the Future Frontlines and Planetary Politics programs at New America, and is a professor of practice at Arizon…
  continue reading
 
Opening Bell - Morning Commentary Japan's PM Raises Alarm on Economic Challenges, Late U.S. Market Recovery to Boost Our Markets' Opening. US stocks recovered from steep early-session losses and closed slightly higher on Monday. Investors digested news that a major ratings agency had downgraded its U.S. federal government debt assessment. The major…
  continue reading
 
Down in Tampa on the sidelines of SOF Week, Ryan spoke with Lt. Gen. Frank Donovan, vice commander of Special Operations Command, in front of a live audience about how America's special operators are leading the way on the the future of warfare, from great power competition to data and AI — or, how our guest puts it, from the seabed to low earth or…
  continue reading
 
Before she decided to sue the Trump administration, Emily Ley’s image wasn’t political. She makes high-end planners and has a new cookbook with easy recipes for busy parents. But she manufactures her planners in China and says Trump’s tariffs make her business model untenable. “One minute I was talking about how to make an easy pot roast, and the n…
  continue reading
 
The UK’s Ministry of Justice suffers a major breach. Mozilla patches two critical JavaScript engine flaws in Firefox. Over 200,000 patients of a Georgia-based health clinic see their sensitive data exposed. Researchers track increased malicious targeting of iOS devices. A popular printer brand serves up malware. PupkinStealer targets Windows system…
  continue reading
 
IS SYRIA'S NEW REGIME MALIGN OR MODERATE? HEADLINE 1: Israel is working on a plan to relocate civilians in Gaza if a ceasefire doesn’t materialize soon. HEADLINE 2: It’s official: Hamas’s October 7th attack was designed to derail Saudi-Israel normalization. HEADLINE 3: Another day, another Israeli caught spying for Iran. -- FDD Executive Director J…
  continue reading
 
Today, we're launching into the next phase of our "Fire Hose of Chaos” series, shifting our focus from the US and onto China. Trust me, there will be no shortage of chaos in this series either. Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/the-fire-hose-of-chaos-chinese-edition-intro…
  continue reading
 
Sponsor: Netskope (www.netskope.com) On Location at CISO XC ATX: www.cisoxc.com THPC EP64 – CISO XC Austin: Veterans, Mid-Market Cyber & Responsible AI In this special episode recorded live at CISO XC’s inaugural Austin event, host David Malicoat brings you ground-level conversations with leaders shaping modern cybersecurity—from national defense t…
  continue reading
 
In a live conversation on May 16, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Anna Bower, Quinta Jurecic, and Roger Parloff and Lawfare Legal Fellow James Pearce to discuss legal challenges against President Trump’s executive actions, including the Friday hearing in the Abrego Garcia litigation, the Supreme Court’s …
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent developments in the 23andMe bankruptcy case and what it means for former customers. Joining the conversation is c…
  continue reading
 
Opening Bell - Morning Commentary US Credit Rating Downgrade to Temper Global Market Sentiment, Local Small and Midcap Stocks are likely to Remain Resilient. Moody’s Investors Service cut the United States' credit rating, citing concerns over rising debt and political deadlock. This is a jolt to US markets, though it may not impact it immediately, …
  continue reading
 
From September 26, 2023: On August 21, the Human Rights Watch released a report detailing systematic abuses of Ethiopian migrants and asylum seekers at the Saudi Arabia-Yemen border. Researchers interviewed dozens of Ethiopian migrants and asylum seekers and found that Saudi border guards had used explosive weapons on them and shot migrants at clos…
  continue reading
 
Please enjoy this encore of Career Notes. Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local P…
  continue reading
 
The world can seem like a really scary place right now. Many of us look around and see wars, climate change, economic uncertainty and a lot of overwhelming things we can’t control. So today we’re going to share a conversation about fear. Elahe Izadi spoke to Tara Brach, a therapist with a PhD in clinical psychology who has also spent years studying…
  continue reading
 
From January 4, 2022: Government secrecy is pervasive when it comes to national security and foreign affairs, and it’s becoming more and more common for state and even local governments to invoke government secrecy rationales that in the past, only the president of the United States and the national intelligence community were able to claim. While …
  continue reading
 
This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement count…
  continue reading
 
In this episode, Michael, Sarah, and Mark talk to Craig Nelson, VP of the Microsoft Red Team about how the Red Team works to help secure Microsoft and its customers. In life, there are things you know you know, things you know you don't know, and finally, things you don't know you don't know. This episode is full of the latter. We also cover securi…
  continue reading
 
The first week of testimony in the trial of music producer Sean “Diddy” Combs began with several witnesses, including the highly anticipated Casandra “Cassie” Ventura. Ventura is a central witness in the government’s case against Combs – she filed a civil lawsuit against him detailing allegations of violence and sex trafficking in 2023 that led to …
  continue reading
 
NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabi…
  continue reading
 
Rep. Jim Himes, top Dem on the House Intel Committee, talks with Jeff & Mike about the Qatar grift and more bad things going on under Tulsi Gabbard. Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk o…
  continue reading
 
Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
  continue reading
 
Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
  continue reading
 
TRUMP'S GULF TRIP AND THE IMPLICATIONS FOR THE REGION HEADLINE 1: President Trump’s whirlwind Middle East tour was rife with record-breaking deals. HEADLINE 2: Congressional Republicans have reiterated their support for full Iranian nuclear dismantlement. HEADLINE 3: Trump’s sharp policy reversal on U.S. sanctions against Syria during his Gulf tour…
  continue reading
 
Everyone gets mad at me for critiquing the leader that they like, but listen...I'm out here roasting everybody. Whether it's Obama, Trump, Xi Jinping, or Grandma, nobody is safe. Okay fine, we'll leave Gram Gram out of it for today. Join the Patreon here: https://www.patreon.com/PeterZeihan Full Newsletter: https://mailchi.mp/zeihan/the-question-of…
  continue reading
 
For today’s episode, Lawfare General Counsel and Senior Editor Scott R. Anderson sat down with Contributing Editor Joel Braunold, the Managing Director of the S. Daniel Abraham Center for Middle East Peace, for the latest in their series of podcast conversations delving into the latest developments relating to the Israeli-Palestinian conflict and r…
  continue reading
 
The assertion that Mexican drug cartels have engineered and deployed their own sophisticated, independent cellular networks to circumvent governmental surveillance, as detailed in the primary source article 1, presents a significant development in the operational capabilities of transnational criminal organizations. This report offers an exhaustive…
  continue reading
 
Helpful episodes to listen to first Episode 62, Even a Security Expert Can Get Phished (Troy Hunt, Part 1) Episode 17, Eliminating Email Exhaustion - Part 2 - Unique Emails Episode 42, Website and Email Filtering, Part 3: Email Friends Questions we answer in this episode Who is to blame for Troy getting phished? How can you reliably tell who sent y…
  continue reading
 
Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams A significant challenge in this analysis is the current inaccessibility of the live Instagram profile @lanarose786. Consequently, this assessment relies on data from third-party analytics providers such as HypeAuditor , publicly accessible information from platforms including YouTub…
  continue reading
 
Anomalous Health Incidents: An In-Depth Examination of the “Havana Syndrome” PhenomenonI. The Emergence of a Medical Mystery: Unexplained Health Incidents The perplexing saga of what became popularly known as “Havana Syndrome” began to unfold against a backdrop of shifting geopolitical tides. Its emergence not only presented a novel medical challen…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
There are plenty of ethical and security questions surrounding the Trump administration’s plan to accept a gift of an airplane from Qatar. Senior political reporter Aaron Blake talks with White House reporters Cleve R. Wootson Jr. and Natalie Allison about the proposal, and what it says about Trump’s evolving foreign policy in the Middle East. Also…
  continue reading
 
Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers…
  continue reading
 
In this episode of Security and GRC Decoded, Raj Krishnamurthy sits down with Andrew Spangler, Director of Security and GRC at Harness, to explore how compliance engineering can go far beyond checkboxes—and actually drive innovation. Andrew shares his journey from building the compliance engineering function at Datadog to scaling automation and vis…
  continue reading
 
Loading …
Listen to this show while you explore
Play