Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Testing Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
The TestGuild Automation Testing Podcast (formerly TestTalks) is the longest-running podcast dedicated to test automation, releasing new weekly episodes since 2014. Hosted by Joe Colantonio, this podcast is for software testers, automation engineers, and developers who want practical, real-world insights to improve automation reliability, reduce flaky tests, and stay ahead of modern testing trends. Each episode features in-depth conversations with leading automation experts, tool creators, a ...
  continue reading
 
Artwork

1
Great Security Debate

The Great Security Debate

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Artwork

1
Packet Protector

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
  continue reading
 
Artwork

1
The Security Briefing

The Security Event

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the issues that matter most to security professionals today.
  continue reading
 
Artwork

1
The Elara Edge

Regia Multimedia Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Smooth Scaling: System Design for High Traffic focuses on all things scalability, reliability, and performance. Tune in for expert advice on how to scale systems, control costs, boost availability, optimize performance, and get the most out of your tech stack. Host Jose Quaresma is the VP of Technical Engagement at Queue-it, working on the frontlines with some of the world’s biggest businesses on their busiest days, from Ticketmaster to Zalando to Home Office U.K. He’ll be joined by experts ...
  continue reading
 
Artwork

1
Sirens: A Bombshell production

Loren DeJonge Schulman, Radha Iyengar Plumb, Erin Simpson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Sirens, a new podcast from the ladies of Bombshell, dissects the institutions of American power. With their trademark wit and charm, join Loren DeJonge Schulman, Radha Iyengar Plumb, and Erin Simpson as they sound the alarm on technology, governance, and national security issues. (And maybe lure men to their deaths.)
  continue reading
 
Artwork

1
SMC Journal

SMC Journal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
  continue reading
 
Artwork
 
Australian comedy duo Hamish Blake and Andy Lee continue to taunt each other and their button-pusher Jack with a weekly show that is more about their listeners than it is about themselves. Hamish & Andy question and test the smaller things in life, no pondering too small. Visit hamishandandy.com
  continue reading
 
Artwork

1
Software Defined Talk

Software Defined Talk LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
  continue reading
 
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
  continue reading
 
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
  continue reading
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork
 
The mission of the Financial Safari is to equip you with the tools and knowledge that you need to successfully navigate through today's complex financial jungle. Each week, the hosts and guests on the show reveal the latest developments in the financial world to keep you informed of changes that may affect you personally, while sharing some common sense strategies that will help you make the most out of your retirement savings.
  continue reading
 
Artwork

1
Series 7 Whisperer

capadvantage

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Series 7 Whisperer is the voice in your head you wish you had while studying. Hosted by a retired NYSE trader and FINRA principal with 37 years on the Street, this podcast cuts through the noise to deliver the raw, real, and testable truths behind the Series 7 exam. No fluff. No filler. Just the stuff that gets you paid. Whether you’re cramming before test day or grinding through options, suitability, and regs, this is your shortcut to passing with swagger.
  continue reading
 
Welcome to “Understandable Insights: Information to Intelligence with Sue Gordon” — the national security podcast that provides you an elemental understanding of the world as it is, not how you prefer it to be. Each week, Eric — a former Marine, father, and entrepreneur — sits down with the Honorable Sue Gordon, the nation’s former top career intelligence officer. Together, they break down the headlines shaping our world and ask what they really mean for citizens, leaders, and institutions. ...
  continue reading
 
Artwork

1
One Decision

Situation Room Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Tough decisions rattle us all to the core. But for our guests on One Decision— the choices they are up against can also shape history. No pressure! They take us through all of their doubts, emotions and—sometimes unexpected--consequences. A fresh take on foreign policy. Hear the former head of Mi6, Sir Richard Dearlove alongside international journalists as they analyse, interview, and discuss.
  continue reading
 
Artwork

1
The Manhood Experiment

Devon Wesley, Jason Sani, Tarek Statico

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We are often distracted in life and never really dive deep into the real foundation of self improvement, goal achieving, and wellbeing. - Join our team of experts every week as we discuss the real facets of manhood. Topics like: How to develop more self esteem, self love, deeper relationships. How to improve our wellbeing, mental toughness, resilience, and productivity. How to develop critical skills, become better leaders, expand our careers/business, create financial security and contribut ...
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Loading …
show series
 
In this episode, host Dejan Kosutic interviews Sasa Jusic, a board member at Infigo IS and a cybersecurity expert. They delve deep into penetration testing and cyber threat intelligence, explaining their roles in enhancing cybersecurity. Learn about the differences between offensive and defensive security measures, the importance of DORA and ISO 27…
  continue reading
 
On today's podcast: 1) President Trump faced rare opposition from key Republican lawmakers after Federal Reserve Chair Jerome Powell accused the Department of Justice of launching a grand jury investigation to pressure and intimidate the central bank. Senator Thom Tillis, a key Republican on the Banking Committee who isn’t running for reelection, v…
  continue reading
 
In this episode of Smooth Scaling, José Quaresma talks with Ryan Sherlock, Director of Engineering at Intercom, about the realities of scaling databases in a fast-growing SaaS product. Ryan shares Intercom’s journey from a single MySQL database through Aurora, proxies, and per-customer scaling patterns—and what eventually pushed the team toward Pla…
  continue reading
 
Rachel Maddow rounds up a litany of recent court losses Donald Trump has suffered, as even some Republicans in Congress are agreeing to block or otherwise mitigate the damage Trump's policies are inflicting on their constituents, all while Americans rally in protest of abuses and outright crimes committed by Trump's ICE agents. Rachel Maddow review…
  continue reading
 
On this episode of One Decision In Brief, guest host Rosanna Lockwood and Sir Richard Dearlove, former head of MI6, unpack the shifting landscape of U.S. foreign policy on Greenland and Iran. Rosanna questions whether the United States is abandoning 75 years of post-war foreign policy in favor of a return to regional hegemony and balance-of-power p…
  continue reading
 
n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time unpachted flaw in Gogs was exploited to compromise git repos. https://www.wiz.io/blog/wiz-rese…
  continue reading
 
Recently and over the past few years, world events may have included cybersecurity components in their enactment. So, Brian, Erik, and Dan started talking about the role of security in critical infrastructure protection, asking questions about the ethics and thresholds for government and corporate roles in cyber retaliation, whether we as security …
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Start with the reality check: today’s AI-enabled businesses face nine fas…
  continue reading
 
On today's podcast: 1) Federal Reserve Chair Jerome Powell said the US central bank had been served grand jury subpoenas from the Justice Department threatening a criminal indictment, a dramatic escalation of the Trump administration’s attacks on the institution. In a forceful written and video statement released Sunday evening, Powell said the act…
  continue reading
 
In a world of uncertainty, developing a resilient survival mindset is your greatest asset. This Mind4Survival episode explores practical, actionable strategies for preparedness—sharpening situational awareness, using the "what-if" game to guide decisions, and transforming anxiety into calm confidence. Whether you're an experienced prepper or just g…
  continue reading
 
Inspector Lewis Hastie is the unit head of the National Vehicle Threat Mitigation Unit, which is a specialised police unit operating within the National Counter Terrorism Security Office (NaCTSO). The unit comprises of subject matter experts, who have a wealth of experience in the temporary vehicle security barriers through the deployment of the Na…
  continue reading
 
In this episode of You Gotta Hack That, Felix sits down with Emily, a principal industrial cyber security consultant and former national utility cyber lead, to demystify ISA/IEC 62443. Why do so many teams treat it like a silver bullet and why does that backfire fast? Emily breaks down what 62443 actually is (spoiler: it’s a family of standards), w…
  continue reading
 
Malicious Process Environment Block Manipulation The process environment block contains metadata about particular processes, but can be manipulated. https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1.11.0 Release: Hash Function Warnings The latest version of YARA will warn users if a hash rule attempts to ma…
  continue reading
 
In this episode of the Be Fearless Podcast, StickmanCyber’s Founder Ajay Unni sits down with SquareX Field CISO John Carse to discuss the personal side of building a global cybersecurity brand. Ajay reveals how a failure in his 12th-grade exams in India became the catalyst for his first software company. He explains his leadership philosophy, which…
  continue reading
 
Coach Pete teams up with CPA Stan Moore to break down the massive tax changes coming in 2026—and who really wins from them. They unpack new deductions, smart tax moves for business owners, and advanced strategies like cost segregation and the backdoor Roth IRA. If you want to keep more of your money, avoid ugly tax surprises, and stay ahead of the …
  continue reading
 
Hey friends, in episode #649 I gave you my first impressions of Twingate. It's been a minute, so I thought I'd revisit Twingate (specifically this awesome Twingate LXC) and talk about how we're using it to (almost) entirely replace remote access to our datacenter servers and pentest dropboxes. Also, don't forget: Our pentest class is coming up at t…
  continue reading
 
Bloomberg Daybreak Weekend with Host Nathan Hager take a look at some of the stories we'll be tracking in the coming week. In the US – a look ahead to U.S CPI data and bank earnings. In the UK – a look at what to expect from the UK’s property market moving forward. In Asia – a look ahead to China trade figures. See omnystudio.com/listener for priva…
  continue reading
 
Happy 2026 to all friends of Sirens! Loren, Radha, and Erin are truly astonished at the pace of news in their mid-winters nap and gab for an extended drill to cover new Hatch Act procedures, protests in Iran, the thwarted terrorist attack on NYE, the drastic decrease in financial crime fines in 2026, and Netanyahu's visit (also, Andy and Anderson's…
  continue reading
 
On today's podcast: 1) The investigation into the killing of a US citizen by an ICE agent in Minneapolis this week is being complicated by clashes between federal and local officials, with the FBI taking control over the objections of Governor Tim Walz. State authorities questioned whether a federal probe could be trusted, especially given comments…
  continue reading
 
In this episode, we dissect the dangerous trend of organizations ceding control of their security strategy to vendors, exploring the pitfalls of vendor lock-in, overspending, and the illusion of comprehensive protection. We'll provide actionable steps to reclaim your security posture and build an independent strategy tailored to your specific needs…
  continue reading
 
Listen to this special invitation from Rachel Maddow and sign up for MS NOW Premium on Apple Podcasts to take advantage of a 3-month free trial! With MS NOW Premium, you can get our entire suite of podcasts – everything from “The Last Word with Lawrence O’Donnell” to “The Best People with Nicolle Wallace” – all ad-free. As a subscriber, you also ge…
  continue reading
 
This week, we discuss AI’s impact on Stack Overflow, Docker’s Hardened Images, and Nvidia buying Groq. Plus, thoughts on playing your own game and having fun. Watch the YouTube Live Recording of Episode 554 Please complete the Software Defined Talk Listener Survey! Runner-up Titles It’s all brisket after that. Exploring Fun Should I go build a snow…
  continue reading
 
Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility …
  continue reading
 
What really happens when a cyberattack becomes a criminal investigation? In this episode of THEOS Cybernova, Paul Jackson speaks with Steve Santorelli, a formerly of Scotland Yard, whose career spans Microsoft’s Internet Crimes Investigation Team and Team Cymru. They explore how cybercrime investigations succeed in the real world: why trust and com…
  continue reading
 
In this episode of the Be Fearless Podcast, Gautam "Gotham" Sharma, Executive Director, Cybersecurity Education and Training at AccessCyber, sits down with SquareX Field CISO John Carse to discuss why cybersecurity education and hiring are broken. The conversation explores nontraditional cyber career paths, why certifications alone don’t get candid…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv What happens when your “helper” becomes your riskiest insider? We dig int…
  continue reading
 
On today's podcast: 1) An Immigration and Customs Enforcement officer fatally shot a woman during a confrontation in Minneapolis, sparking an uproar over the presence of ICE agents in the city and heightening political divisions around the Trump administration’s migrant crackdown. The Wednesday shooting — caught on video and shared widely on social…
  continue reading
 
In this episode of One Decision, host Kate McCann and co-host Sir Ben Wallace, former UK Defence Secretary, speak with former US National Security Advisor to Kamala Harris, Philip Gordon. They dissect the Trump administration’s military actions in Venezuela, including the arrest of President Maduro, and also discuss the US’s threat to take control …
  continue reading
 
A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
  continue reading
 
Derick Schaefer, author of CLI: A Practical Guide to Creating Modern Command-Line Interfaces, talks with host Robert Blumen about command-line interfaces old and new. Starting with a short review of the origin of commands in the early unix systems, they trace the evolution of commands into modern CLIs. Following the historic rise, fall, and re-emer…
  continue reading
 
On today's podcast: 1) President Trump said Venezuela would relinquish as much as 50 million barrels of oil to the US, worth roughly $2.8 billion at the current market price, announcing the cargoes would be sold with proceeds benefiting both countries. The announcement late on Tuesday, which came with few details, marked a significant step up for t…
  continue reading
 
Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems …
  continue reading
 
AI testing is everywhere — but clarity isn't. In this episode, Joe Colantonio breaks down the real test automation trends for 2026, based on data from 40,000+ testers, 510 live Q&A questions, and 50+ interviews with industry leaders. This isn't vendor hype or futuristic speculation. It's what working testers are actually worried about — and what th…
  continue reading
 
In this episode, Sue and Eric kick off the year with a look at geopolitical hotspots and assess that, in aggregate, US actions reveal the National Security Strategy for what it is—and isn’t. Assessing the Trump strategy as one of power, resources, and driven by their version of the “scarcity model”, they walk through recent actions in Venezuela, Ir…
  continue reading
 
This episode explores the rapid expansion of artificial intelligence in software, with a focus on how software engineering professionals and QA can keep pace. We discuss the quality of software generated by AI tools, and how to adapt mindsets to these new tech trends. 🔥 Like and Subscribe 🔥 💰 Sponsors If you are interested in sponsoring my content,…
  continue reading
 
On today's podcast: 1) Ousted Venezuela President Nicolás Maduro pleaded not guilty on Monday to US charges in a narco-terrorism case against him, kicking off an extraordinary legal battle with major geopolitical ramifications. The US accused Maduro over the weekend of using his positions in government for a quarter of a century to enrich himself a…
  continue reading
 
The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the 80s/90s. BBSes, phreaking, rival crews, and the crackdowns that changed everything. From those humble beginnings came a legacy that still echoes through modern security culture today. Sponsors Support for this show comes from ThreatLocker®. …
  continue reading
 
Rachel Maddow runs through the litany of excuses and justifications the Trump administration has presented to explain the military invasion of Venezuela, and points out that none of what has been floated holds up under scrutiny. Every principle the Trump administration claims to be defending comes with examples of the administration not caring at a…
  continue reading
 
On this week’s One Decision In Brief, host Kate McCann is joined by co-host and former UK Defence Secretary Sir Ben Wallace to examine the fallout of the United States’ military raid in Caracas, Venezuela, which led to the arrest of President Nicolás Maduro and his wife Cilia Flores. Sir Ben explains the military execution of the operation, why it …
  continue reading
 
Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP…
  continue reading
 
In response to evolving cyber threats that can manipulate and compromise a satellite’s data, the United States Space Force is heightening its focus on “space cyber,” or the cybersecurity of space systems on-orbit. One emerging solution toward this effort is the Cyber Reslience On-Orbit tool (CROO), a software program that focuses on not just securi…
  continue reading
 
In this episode of the Be Fearless Podcast, Larry Whiteside Jr, Co-Founder and President of Confide, sits down with SquareX Field CISO John Carse to discuss the real risks facing today’s CISOs. Drawing from three decades of experience across the U.S. military, the Pentagon, and Fortune 500 leadership roles, Larry explains why the CISO role is the m…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Your TV, camera, or even a smart bird feeder can be a beachhead for attac…
  continue reading
 
On today's podcast: 1) President Trump said the US needs “total access” to Venezuela as questions mount about the country’s leadership following the capture of President Nicolás Maduro. Delcy Rodríguez, the acting president of Venezuela, has asked the US to work with her country, striking a more conciliatory tone toward the Trump administration aft…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play