Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
N2k Networks public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
Only Malware in the Building

DISCARDED | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join your host Selena Larson, along with her N2K Network partner-in-crime, Dave Bittner, as they delve into the mysteries behind notable cyberattacks. This segment focuses on the most impactful and intriguing malware stories. Its aim is to distill complex cybersecurity information into digestible, insightful episodes for tech professionals, providing ...
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
The Need-to-Know podcast deals with the now acknowledged reality of Unidentified Aerial Phenomena or UAP. Its hosts are award-winning broadcasters and investigative journalists Ross Coulthart and Bryce Zabel. Every episode, they’ll look at what’s happened in the UAP/UFO world. Coulthart and Zabel discuss their current investigations, give each other advice, and seek to answer the big questions: who are they and what do they want? Ross Coulthart’s work has been featured on Australia’s version ...
  continue reading
 
Loading …
show series
 
Please enjoy this encore episode of Career Notes. CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her requir…
  continue reading
 
Welcome to the Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft. In this episode, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft fo…
  continue reading
 
Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, includin…
  continue reading
 
The Astronaut Scholarship Foundation (ASF) was created in 1984 by six Mercury 7 astronauts. Since then astronauts from the Mercury, Gemini, Apollo, Skylab and Space Shuttle programs have pursued the mission to encourage university students pursuing scientific excellence. The prestigious Astronaut Scholarship is known nationwide for being among the …
  continue reading
 
The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack.…
  continue reading
 
Japan’s Space Agency (JAXA) releases phase 2 of its ¥1 Trillion, 10-year Strategic Space Fund. Planet Labs has signed a multi-year contract with EMDYN. MaiaSpace has selected the Łukasiewicz Research Network’s Institute of Aviation to develop the engine that will power its kick stage, and more. Remember to leave us a 5-star rating and review in you…
  continue reading
 
Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from …
  continue reading
 
China launches the Shenzhou 20 spacecraft with three astronauts to the Tiangong Space Station. Katalyst Space has acquired in-space servicing company Atomos Space. The United States Space Force’s (USSF) Space Systems Command (SSC) has awarded a $2.9 million contract to Raft LLC for the development of an Application Programming Interface (API), and …
  continue reading
 
We're sharing a episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives,…
  continue reading
 
In this episode of Threat Vector, host David Moulton speaks with Daniel B. Rosenzweig, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Dan explains how businesses can build trust by aligning technical operations with legal obligations—what he calls “say w…
  continue reading
 
This week we are joined by Avani Desai, CEO of Schellman, who is talking about what we can expect now that Digital Operational Resilience Act (DORA) is in effect. Ben’s got the story of how a federal judge ruled that Google broke antitrust laws to maintain its dominance in online advertising, marking the second major legal blow in a year that could…
  continue reading
 
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
  continue reading
 
The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A n…
  continue reading
 
The US Space Development Agency (SDA) has awarded $55M to Science Applications International Corp. (SAIC) for Tranche 3 (T3) Program and Integration. Northwood Space has raised $30 million in a Series A funding round to support a global ground network. The European Space Agency’s (ESA) Earth Explorer Biomass satellite has been secured on top of the…
  continue reading
 
The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia…
  continue reading
 
The Indian Space Research Organisation (ISRO) has completed a second satellite docking demonstration as part of the Space Docking Experiment (SpaDeX) mission. India plans to partner with NASA and the European Space Agency (ESA) on seven experiments for the Axiom 4 mission. SpaceX launches the Bandwagon 3 mission carrying payloads for South Korea, T…
  continue reading
 
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
  continue reading
 
Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsoft Entra app triggers widespread account lockouts. The alleged operator…
  continue reading
 
The African Space Agency (AfSA) has officially opened its headquarters in Cairo. The National Reconnaissance Office (NRO( in partnership with the United States Space Force (USSF) Space Launch Delta 30 and SpaceX, launched the NROL-145 mission from Vandenberg Space Force Base. SpaceX launched the 32nd resupply mission to the ISS, and more. Remember …
  continue reading
 
Please enjoy this encore episode of Career Notes. Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer (one he has yet to realize), through his experience with the Royal Air Force to the commercial sector where his firm works to secure dark data. During his time in the Air Force, Rich was fo…
  continue reading
 
Loading …
Listen to this show while you explore
Play