Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Fix Security Podcasts

show episodes
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Artwork

1
Political Fix

Financial Times

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Financial Times takes you into the corridors of power to unwrap, analyse and debate British politics with a regular lineup of FT correspondents and informed commentators. New episodes available every Friday. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork

1
Battle Lines

The Telegraph

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Battle Lines is The Telegraph’s foreign policy, geopolitics and global conflict podcast. It offers expert analysis and on-the-ground reporting everywhere from China and the United States to the Middle East and Europe. Twice a week, veteran foreign correspondents Roland Oliphant and Venetia Rainey bring you on-the-ground dispatches from the world’s most volatile regions and informed analysis from world-class experts. Whether it’s the Russia-Ukraine war, the Israel-Gaza conflict, Chinese aggre ...
  continue reading
 
Artwork

1
How to Fix the Internet

Electronic Frontier Foundation (EFF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
  continue reading
 
Artwork
 
This is daily Apple news. Monday through Friday, Ken Ray brings a short shot of tech happenings to your day. If it's Apple news, Apple-related news, or news related to Apple-related news, you'll hear about it here. News you'll like... this is Mac OS Ken.
  continue reading
 
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
  continue reading
 
Artwork
 
Forrest Hanson is joined by clinical psychologist Dr. Rick Hanson and a world-class group of experts to explore the practical science of lasting well-being. Conversations focus on the key insights from psychology, science, and contemplative practice that you need to build reliable inner strengths, overcome your challenges, and get the most out of life. New episodes every Monday.
  continue reading
 
Artwork

1
Fixed Deposit

bhishma4691

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shriram Fixed deposits are the most secured investment options with guaranteed returns that multiply your investments. Shriram offers one of the highest interest rates at 9.20%, including 0.50% for senior citizens. Returns on Fixed deposits do not change with market or external factors. More Information Visit: https://www.shriramfinance.in/fixed-deposit
  continue reading
 
🎙️ Welcome to the Microsoft Intune and Security Report Podcast🎙️ — your essential stop for the latest in Windows and Edge security! This podcast is designed to be a time-saving powerhouse, distilling the most critical updates, new features, and emerging vulnerabilities from multiple trusted sources into one convenient, ready-to-reference report. Each week, we dig deep into the data to give you a concise, actionable rundown on the security landscape, helping you stay one step ahead. So whethe ...
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

1
Louder with Crowder

Louder with Crowder

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Steven Crowder brings you news, entertainment and politics with the most politically incorrect show on the web. Guests, rants, sketches, your calls ... it's whatever. Watch the VIDEO version of this podcast here: http://www.louderwithcrowder.com/mugclub
  continue reading
 
Artwork
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
Small changes, made over time, can produce significant results. Much like a high performance engine, or an entire orchestra, when even a small part is not doing what it is supposed to do, everything suffers. And the same is true of your finances. This show is dedicated to the small things that make a significant difference.
  continue reading
 
Artwork

1
Think Cyber Secure

Think Cyber Secure

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
  continue reading
 
Retirement and income planning in a fast paced format. Kevin has focused on helping investors age 50+ preserve and grow their assets, increase their income, and reduce overall income and estate taxes. Many conservative investors have used his advice to invest their savings prudently and transfer more wealth to their heirs efficiently. Visit silverleaffinancial.com for more information.
  continue reading
 
Artwork

1
WP Builds

Nathan Wrigley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Web site building with WordPress. In this podcast we follow the hopeless exploits of David Waumsley and Nathan Wrigley as they try, and fail, to understand WordPress. They know that they love building websites with WordPress, but the complexities of this awesome web building solution are always out of reach. Not only are they not clever enough, but they just don't try all that hard
  continue reading
 
Artwork

1
The Scalpel With Dr. Keith Rose

Scalpel Productions, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Dr. Keith Rose is an internationally recognized plastic surgeon and tactical medicine physician who has been performing plastic and reconstructive surgery in Afghanistan, Pakistan, Africa, Central, and South America for the past 21 years. He is also the CEO of Rose Medical Management (www.roseonsite.com), a South Texas-based company providing urgent care clinics (www.urgentcarecc.com), onsite clinics, emergency response teams, and medical/occupational case management services to over 100 com ...
  continue reading
 
Artwork
 
The latest in AWS news, sprinkled with snark. Posts about AWS come out over sixty times a day. We filter through it all to find the hidden gems, the community contributions--the stuff worth hearing about! Then we summarize it with snark and share it with you--minus the nonsense.
  continue reading
 
Artwork
 
Sharyl Attkisson is a nonpartisan investigative journalist, five-time Emmy Award winner and recipient of the Edward R. Murrow award for investigative reporting. She is the New York Times bestselling author of "The Smear," "Stonewalled," "Slanted," and "Follow the Science." She is managing editor of the Sun. morning national TV news program “Full Measure with Sharyl Attkisson.” Find out why her podcasts and Tedx talks have received many millions of views. Do your own research. Make up your ow ...
  continue reading
 
Artwork
 
Christ Restoration Church exists to honor God by fostering a movement of Christ's Kingdom through the proclamation and practice of the gospel that serves and transforms the Sunapee region, and through the Sunapee region the world. Find out more about our church at www.christrestorationchurch.net
  continue reading
 
Artwork

1
Nature Podcast

Springer Nature Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Nature Podcast brings you the best stories from the world of science each week. We cover everything from astronomy to zoology, highlighting the most exciting research from each issue of the Nature journal. We meet the scientists behind the results and provide in-depth analysis from Nature's journalists and editors. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Insights Now

Dr. David Kelly and Gabriela Santos, J.P. Morgan Asset Management

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Listen to the latest insights from Dr. David Kelly, Chief Global Strategist, and Gabriela Santos, Chief Strategist for the Americas at J.P. Morgan Asset Management, as they sit down with a variety of thought leaders for a conversational breakdown of big ideas, future trends, emerging topics, and their investment implications, helping to inform the building of stronger long-term investment plans.
  continue reading
 
Artwork

1
Bond Investment Mentor

Chris Nelson, CFA

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Are you searching for an objective source to help you understand how to manage fixed income investments for your financial institution? Each week, join Chris Nelson, a 30-year banking and investment veteran, as he covers fixed income securities and investment portfolio management, and discusses the latest news and developments in the financial markets.
  continue reading
 
Loading …
show series
 
- Apple Outs iOS/iPadOS/macOS Updates with Important Security Fix - Zoom Dropping Support for iOS 13 and iOS 14 - SCMP: Foxconn Ramps Hiring in China (Slightly) Ahead of iPhone 17 - Masimo Sues to Reinstate Blood Oxygen Ban in Apple Watch - Geely Adds CarPlay to EX5 in Australia - Apple Pay Express Mode Hits Manchester, England’s Bee Network - Tim …
  continue reading
 
Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Craig M. Taylor, Co-Founder & CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes. Craig believes cybersecurity awareness should be short, engaging, …
  continue reading
 
August 2025’s Patch Tuesday brought major security updates from two of the biggest names in technology — Microsoft and Adobe — addressing a combined 170+ vulnerabilities across widely used products. The scale and severity of these updates make them critical for IT teams and security leaders to implement without delay. Microsoft’s security release f…
  continue reading
 
Helpful episodes to listen to first Introduction to Privacy.com Questions we answer in this episode What is Makani's most used online shopping tool? What are 2 key features it provides? What 3 subscription problems does it fix? Episode summary Privacy.com offers super powered Privacy Cards that you can use to shop online. You create a unique Privac…
  continue reading
 
Lindsey N. Kingston’s new book, Fully Human: Personhood, Citizenship, and Rights (Oxford UP, 2019) interrogates the idea of citizenship itself, what it means, how it works, how it is applied and understood, and where there are clear gaps in that application. This is a wide-ranging, rigorously researched examination of citizenship, statelessness, an…
  continue reading
 
The soaring cost of capital for many low- and middle-income countries, particularly in Africa, is one of the most urgent and overlooked development challenges. High borrowing costs are hindering vital investments in energy, infrastructure, food security and public services – threatening development progress and deepening global inequality. But this…
  continue reading
 
Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
  continue reading
 
A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) tec…
  continue reading
 
The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to major U.S. technology companies: resist foreign government demands to weaken encryption. At stake is nothing less than the security of millions of Americans’ private communications, financial data, a…
  continue reading
 
Breaking Here is what we know so far on the Minneapolis Catholic Church shooting. GUEST: Josh Firestine Link to today’s sources: https://www.louderwithcrowder.com/sources-august-27-2025 Buy the OG Mug Club Mug on Crowder Shop now! https://crowdershop.com/products/og-mug-club-mug Let my sponsor American Financing help you regain control of your fina…
  continue reading
 
Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involves hiding malicious instructions inside high-resolution images, invisible to the human eye. When AI systems automatically downscale these images during preprocessing, the hidden prompt becomes visible…
  continue reading
 
Breaking: shooting in Minneapolis. Travis Kelce and Taylor Swift are engaged. So we have to talk about it. Will Smith is faking his audience. Zohran Mamdani is promising New Yorkers free stuff if they only elect him. Problem is plenty of places have already tried that, and it has failed miserably. A Cuban-born businessman, Joseph Hernandez, decided…
  continue reading
 
The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundry services to healthcare facilities, disclosed a data breach that compromised the personal information of over 624,000 individuals. Between late September and early October 2024, hackers gained unauth…
  continue reading
 
00:48 How the 18th-Century 'Great Fear’ spread across rural France In the late 1700s, rural France was beset with rapidly spreading rumours of aristocratic plots to suppress revolutionary ideas. But how, and why, these rumours were able to spread so quickly has puzzled historians. Now, using modern epidemiological modelling, a team suggests that a …
  continue reading
 
French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen data includes names, addresses, phone numbers, email addresses, and loyalty card numbers—though banking details, passwords, and PINs were reportedly not affected. Despite this, the breach is serious …
  continue reading
 
- Apple’s Next Media Event Set for 9 September - Expectations for Apple’s “Awe Dropping” Event - Apple Sets “Awe Dropping” Placeholder on YouTube - “Awe Dropping” Art Goes Interactive on Apple Site - BofA: Investors Not Super Excited About iPhone Air - Germany Says Apple Can’t Call Apple Watch “Carbon Neutral” - Apple Opening Two Stores in India Ne…
  continue reading
 
>Join Jocko Underground< Norm Hooten was a U.S. Army Special Forces soldier (a Green Beret) who became well known because of his role in the Battle of Mogadishu in October 1993, the operation later depicted in the book and film Black Hawk Down. Support this podcast at — https://redcircle.com/jocko-podcast/exclusive-content…
  continue reading
 
The human brain might be the grandest computer of all, but in this episode, we talk to two experts who confirm that the ability for tech to decipher thoughts, and perhaps even manipulate them, isn't just around the corner – it's already here. Rapidly advancing "neurotechnology" could offer new ways for people with brain trauma or degenerative disea…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
  continue reading
 
Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
  continue reading
 
A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed an unauthenticated Docker Engine API (192.168.65.7:2375) to any container running on Windows and macOS. With nothing more than a few HTTP requests—or even three lines of Python code—attackers could esc…
  continue reading
 
Vincent Ambrose, Chief Commercial Officer at FranklinWH, a company that provides innovative whole-home energy management and storage solutions for homeowners across the U.S joins Enterprise … Read more The post Energy for the Future: How FranklinWH is Transforming Home Energy Management appeared first on Top Entrepreneurs Podcast | Enterprise Podca…
  continue reading
 
The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most critical services, including the main website, the Arch User Repository (AUR), and community forums. Beginning in mid-August 2025, the sustained volumetric and protocol-level assault overwhelmed hostin…
  continue reading
 
Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nations. The recent ransomware attack on Data I/O, a chip programming firm whose customers include global giants like Apple, Microsoft, Amazon, and Bosch, demonstrates how one breach can disrupt manufacturi…
  continue reading
 
Remember when exercise was white supremacy? It’s also bad for you now, according to the New York Times. A girl in the UK was arrested after wielding a knife at an “asylum seeker” who was following her. Somebody should make Britain great again. President Donald Trump is allowing 600,000 Chinese students into the country. There’s a 100% chance that t…
  continue reading
 
The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent Aspire Rural Health System breach in Michigan—attributed to the BianLian ransomware group—exposed the personal and medical data of nearly 140,000 patients and staff. From Social Security numbers and fin…
  continue reading
 
Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructure. But with this rise comes a hidden battlefield: adversarial attacks designed to manipulate AI systems in subtle yet devastating ways. One of the most alarming threats is the OneFlip attack, a method…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
- Elon Musk Sues Apple and OpenAI Over iOS/ChatGPT Integration - Y Combinator Sides with Epic in Amicus Brief Against Apple - Apple Seeds Eighth (blank)OS 26 Betas to Developers - 9to5Mac Suspects Eighth iOS 26 Developer Beta is Last Before Wide Release - Apple Seeds Fifth Betas of Most (blank)OS 26 Builds to Public Testers - F1: The $600M+ Movie -…
  continue reading
 
Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
  continue reading
 
Teachers cheating? Grade fixing? Investigative journalist Chris Papst's new book, "Failure Factory," tracks his investigations into the failures behind Baltimore City Schools and, just maybe, the failures behind a school system near you. Order Sharyl's bestseller “Slanted: How the News Media Taught Us to Love Censorship and Hate Journalism” at ⁠⁠⁠⁠…
  continue reading
 
The United States and China are constantly looking for a leg up in their rivalry for geopolitical primacy. But what if the real advantage lies in adopting a bit of the other’s culture? A new book makes the case that while China has become an engineering state obsessed with building, the United States has become a lawyerly society focused on procedu…
  continue reading
 
/// Support The Scalpel with Dr. Keith Rose - Experience a Healthier You with LifeWave Phototherapy Patches. These non-transdermal, drug-free patches capture infrared light emitted by your body, reflecting it at specific wavelengths. Visit https://lifewave.com/RoseMD to learn more or call 866.202.0065 -----------------------------------------------…
  continue reading
 
Zohran Mamdani is bad at lifting weights and should be embarrassed. At least Representative Eric Swalwell did a full rep. Disney recently bemoaned the lack of males in their audience. Gee. Wonder why they’re losing the men. After seemingly fixing Washington, D.C. crime in a week, President Donald Trump suggested that maybe Chicago needs the law and…
  continue reading
 
Episode Summary: AWS Morning Brief for the week of August 25th, 2025, with Corey Quinn. AWS pricing for Kiro dev tool 'a wallet-wrecking tragedy SQL injection vulnerability in the AWS Aurora DSQL MCP Server | by Michael Kandelaars | Aug, 2025 | Medium Top AWS chip engineer reportedly defects to Arm Copilot Broke Your Audit Log, but Microsoft Won’t …
  continue reading
 
Forrest and therapist Brandy Wyant discuss limerence, an intense and often one-sided state of romantic obsession. They explore how limerence differs from both love and ordinary crushes, why uncertainty fuels it, and how it can take over a person’s inner world. Brandy shares both clinical insights and her own lived experience, describing the obsessi…
  continue reading
 
All links and images can be found on CISO Series. In this episode, Simone Rapizzi, CSO at RedCarbon, explains how their AI-powered platform uses specialized models to automate threat detection and response while learning from each customer's unique environment. Joining him are Jonathan Waldrop, former CISO, and John Scrimsher, CISO at Kontoor Brand…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play