It is our persona beyond ourselves, with traces of us scattered from birth certificates, Social Security numbers, shopping patterns, credit card histories, photographs, mugshots and health records. Those who wish to live anonymous lives must take extraordinary measures to succeed in that improbable quest, while those who hope for friendship or fame through the spread of their personal data must learn how to prevent theft of their identity and bank account.
If you have ideas for interviews or stories, please email [email protected] com. The internet in its blooming evolution makes personal data big business — for government, the private sector and denizens of the dark alike. The Data Privacy Detective explores how governments balance the interests of personal privacy with competing needs for public security, public health and other communal goods.
It scans the globe for champions, villains, protectors and invaders of personal privacy and for the tools and technology used by individuals, business and government in the great competition between personal privacy and societal good order.
For the public good and personal privacy can be at odds. On one hand, governments try to deter terrorist incidents, theft, fraud and other criminal activity by accessing personal data, by collecting and analyzing health data to prevent and control disease and in other ways most people readily accept.
How authorities regulate data privacy is an ongoing balance of public and individual interests. Our concern is not only spiritual in nature, but also practical. Analysis of these principals will quickly reveal their value in our personal, professional, and financial lives. Success is ours to achieve. The roadmap has been laid for us. All that remains is for us to take disciplined action. So what can we do to make the internet more secure? Threat Wire by Hak5 is a quick weekly dose of news about security, privacy, and what is threatening the freedom of our Internet.
On Tech Policy Grind we talk about the most pressing issues at the intersection of law and technology.
As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society.
Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in.
What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts. Recorded Future takes you inside the world of security intelligence.
We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. What really happens when a hacker snatches all your data?
Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of million people, why it matters, and what we can do about it. Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time. Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
Thinking about the intersection of security, technology, and society—and what might be coming next. Every Monday morning you get a curated minute summary of the week's most important stories and why they matter. Plus regular essays and interviews that explore a single topic. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security. The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting. Without trust, society stagnates, economies decline, and businesses fail.
Just two people trying to do IT and Security the right way. A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis. Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online. From the team behind the No 1 Hit podcast, Untold: the Daniel Morgan Murder, comes another inside story of a crime - in this case the hacking, data misuse, illegal financing and potential interference in the EU referendum.
Orwell Prize winning journalist Carole Cadwalladr lays out the evidence with Peter Jukes and asks: why hasn't the UK got a proper investigation into wrongdoing See acast. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week. Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life. Interviews with people who have transitioned and got jobs in infosec and cybersecurity so you can learn and be inspired from their experience.
There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. The log4j vulnerability still exists in many environments. Learn how to exploit this vulnerability in our step-by-step guide. Please only use this information for research and testing purposes, and only with permission!
You can follow WireWheel on social media to track the latest news in the Privacy wor…. Help support our independent journalism at theguardian. Your iPhone now gives you lots of transparency into what your downloads are up to. Here's what to look out for. Apple has difficulty managing scams and copycat apps in its App Stores. And iCloud Private Relay is provoking ire among phone carriers.
Ransomware hackers recently hit a hospital, and everything from the cardiac machines to IV pumps stopped working. Doctors and nurses had to use pen and paper. There were no electronic patient records. But what happened when the hackers found out it was a hospital will undoubtedly surprise you. Learn more about your ad choices. Visit megaphone.
Liked this or any other episode? Who has been playing video games rather than hunting down criminals? How is a man alleged to have stolen manuscripts of unpublished books from celebrity authors? Which pot contains an elephant? And why has Graham been listening to podcasts about pest control marketing? All this and much much more is discussed in the latest edition of the "Smashing …. The US issues an alert over the prospect of Russian cyberattacks, and the EU begins a series of stress tests, both in apparent response to concerns over the prospect of a Russian attack on Ukraine.
NIght Sky ransomware exploits Log4shell. Phishing afflicts a hotel chain. Carole Th…. Cybersecurity in looks to be an even hotter button than years past. Cybercriminals are becoming more persistent and devious than ever…This needs to be top of mind with business this year and moving forward. The critical vulnerability is buried among endless open source code, and many cyber experts are stumped. In the leadership and communications section, no, we're not discussing log4j, recaps or lessons learned, or new year's resolutions or predictions!
Johannes B. Getting your Public Key Infrastructure right can be tricky - and getting wrong can be very bad. Richard talks to Richard Hicks about the right way to go about setting up and operating a PKI infrastructure in your organization. Different from the public certificates you use for websites and servers, Richard focuses on how to use certificates to auth…. How cloud resources are architected and utilized is different for every organization, but whether cloud native or cloud traditionalist — security risk and complexity are problems.
Concerns over account takeover, overprivileged access and the struggle to keep pace with the dynamism of the cloud are driving demand for a better way to secure access.
Log4shell as an instance of a more general software supply chain issue. A new backdoor, SysJoker, is in use in the wild. A warning on commercial surveillance software. A leak investigation continues in Denmark. Joe Carrigan explains bogus QR codes. Our guest is Casey Allen of Concentric …. It's not free, but apparently it still does the job at the fraction of a price that the latest tools ask. We recommend: Security Now! You can tell that the site owners are serious when its name is partially written in Started in , this podcast is still among the most poplar ones for businesses.
Contrary to others, this podcast has a guest speaker most of the time. We recommend: Down the Security Rabbithole Ep. The CyberWire Daily Podcast differs from the rest on this list because it's run by a news service and not by some cybersecurity enthusiasts.
It's also purely news-related, aggregating what you have to know about the latest InfoSec developments. That's why new episodes come out each weekday and are shorter when compared to some weekly podcasts above. That's a significant achievement, given that some like Security Now! There's already over a thousand of Daily Podcast episodes, but The CyberWire offers much more free and premium content.
Putting everything else aside, there are more than ten podcasts, all related to cybersecurity in one way or another. They range from those covering social engineering Hacking Humans to personal stories of cybersecurity experts Career Notes. Your email address will not be published. Required fields are marked. If you purchase via links on our site, we may receive affiliate commissions.
Vyv Evans 4. Smashing security Owner: Graham Cluley and Carole Theriault SmashinSecurity Date of podcast launch: December Average episode length: 50 minutes, weekly Three typical topics: Abusive corporate apps, adult website censorship, the pros and cons of 2FA Website: smashingsecurity.
Website: sharedsecurity. Security Now! Owner: Leo Laporte leolaporte , Steve Gibson SGgrc Date of podcast launch: Average episode length: minutes, weekly Three typical topics: Personal security, vulnerabilities, malware Website: grc.
Down the Security Rabbithole Owner: Rafal Los wh1t3rabbit , James Jardine JardineSoftware Date of podcast launch: Average episode length: 45 minutes, weekly Three typical topics: Business security, legal aspect, non-traditional sectors Website: podcast. The CyberWire Daily Podcast Owner: David Bittner thecyberwire Date of podcast launch: Average episode length: 20 minutes, every weekday Three typical topics: Cybersecurity news, industry analysis, interviews Website: thecyberwire.
Lila Canner prefix 5 months ago. True Crime Cyber Geeks is a lot of fun too. Paul Roberts prefix 6 months ago.
0コメント