Encryption offentlig
[search 0]
Flere
Download appen!
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Classic tales of supernatural horror and suspense are brought to life in this series of audiobooks featuring the works of E.F.Benson, Saki, H.P. Lovecraft, Bram Stoker, and more. Fans of the creepiest, spookiest podcasts will thrill to the immersive retellings of these nightmarish short stories from the vaults of terror, complete with compelling narration, sound effects and music. As told by the mysterious Jasper L'Estrange, EnCrypted: The Classic Horror Podcast is your new home for scary st ...
  continue reading
 
Artwork

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Månedligt+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
  continue reading
 
Welcome to Uncanny Valley—an insider look at the people, power, and influence of Silicon Valley. Join hosts Lauren Goode, Michael Calore, and Zoë Schiffer as they break down new stories or phenomena bubbling up in Silicon Valley. Whether it’s a pivotal decision made inside a tech company, a quirky, new habit of a CEO, or the overwhelming expansion of generative AI, we’ll explain why these matter and how they affect you. Share your thoughts on Uncanny Valley. As a token of our appreciation, y ...
  continue reading
 
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Månedligt
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP OGG

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Månedligt
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Månedligt
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
Entangled Things

Entangled Things

Unsubscribe
Unsubscribe
Månedligt+
 
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
TechSNAP Mobile Video

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Månedligt
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
Day[0]

dayzerosec

Unsubscribe
Unsubscribe
Månedligt+
 
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
  continue reading
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
In Conversation With

Internet Watch Foundation (IWF)

Unsubscribe
Unsubscribe
Månedligt
 
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
  continue reading
 
Artwork

1
Small Business Cybersecurity Podcast

Small Business Cybersecurity Podcast

Unsubscribe
Unsubscribe
Månedligt
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
  continue reading
 
Artwork
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Artwork
 
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
  continue reading
 
Artwork

1
Enginears

Enginears

Unsubscribe
Unsubscribe
Månedligt+
 
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

Unsubscribe
Unsubscribe
Månedligt+
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Loading …
show series
 
Visiting her twin sister at her new home in the isolated backwater of Thrubend Edge, a woman becomes drawn into a sinister web of madness and local folklore.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “SHUCK” by Rebecca Lloyd (2008). Read by permission of the author. For more information about Rebecca…
  continue reading
 
If you're keen to share your story, please reach out to us! Guest: https://www.linkedin.com/in/agnes-leroy/ https://jobs.zama.ai/ Powered by Artifeks! https://www.linkedin.com/company/artifeksrecruitment https://www.artifeks.co.uk https://www.linkedin.com/in/agilerecruiter LinkedIn: https://www.linkedin.com/company/enginearsio Twitter: https://x.co…
  continue reading
 
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerl…
  continue reading
 
Encrypted - Radiance is out now on all streaming platforms: https://push.fm/fl/enradianceFollow Outertone for new music, news & more: https://push.fm/fl/outertoneJoin us on Discord: https://discord.gg/outertone▼ Follow Encrypted:Spotify: https://open.spotify.com/artist/1wjNROnnq1Edjvmwh56LOVInstagram: https://www.instagram.com/encrypted.music/Sound…
  continue reading
 
This week we're talking to Matthew Hodgson, one of the founders of Matrix - a network for secure, decentralised communication, and CEO/CTO of Element - a communications platform built using Matrix, about the regulatory environment matrix lives in, the difficulty of and the passion for interoperable communications at matrix, and the complications of…
  continue reading
 
The Indus Valley Civilization and the Minoan Civilization were both highly advanced, highly influential nations of the ancient world, yet our knowledge of them is obscured by our inability to decipher their writing systems (Indus Valley Script and Linear A). Hear Lance Fever Myers, William Gold, and L.B. Deyo struggle to draw deep knowledge from li…
  continue reading
 
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
EPISODE 100! In this milestone episode, Patrick and Ciprian are thrilled to welcome back Richard Campbell for a fascinating discussion that dives deep into the world of quantum advancements and scientific exploration. Together, they explore the mysterious Majorana Fermion, the allure of Cold Fusion, the lessons from refuted papers, and the solution…
  continue reading
 
Soundstorm - SUBLIMINAL is out now on all streaming platforms: https://push.fm/fl/sssubliminalFollow Outertone for new music, news & more: https://push.fm/fl/outertoneJoin us on Discord: https://discord.gg/outertone▼ Follow SOUNDSTORM:Spotify: https://open.spotify.com/artist/2Jt9b6rDdlnViRGOGp0ypSYouTube: https://www.youtube.com/@realsoundstorm/Sou…
  continue reading
 
Methodology is the theme of this week's episode. We cover posts about static analysis via CodeQL, as well as a novel blackbox binary querying language called QueryX. Project Zero also leverages Large Language Models to successfully find a SQLite vulnerability. Finally, we wrap up with some discussion on Hexacon and WOOT talks, with a focus on Clem1…
  continue reading
 
Summary: This episode was recorded in front of a live audience at Bitcoin Park on November 4, 2024. In this episode, we dive into a lively discussion with our guests who have traveled from far and wide, including a memorable visit from Calle from Sweden, who shared his insightful books on Bitcoin. We also engage in a humorous debate about the price…
  continue reading
 
The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain?For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not re…
  continue reading
 
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers responsible for major breaches. The episode also covers a notable Okta vulnerability that allowed so…
  continue reading
 
Episode 96: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with Matanber to hit some stuff we ran out of time on last episode. We talk about advanced cookie parsing techniques and exploitation methods, Safari's unique behaviors regarding cookie handling and debugging methods, and some of the writeups from the HeroCTF v6. Follo…
  continue reading
 
Much of the tech workforce has become accustomed to remote or hybrid jobs over the last several years. But lately, we’ve seen big tech companies demanding their teams head back into the office. This week, we look at some of these return-to-office mandates and discuss their ripple effects. Plus, we ask the question on all of our minds: does working …
  continue reading
 
Google's record-breaking fine by Russia. (How many 0's is that?) RT's editor-in-chief admits that their TV hosts are AI-generated. Windows 10 security updates set to end next October... or are they? When a good Chrome extension goes bad. Windows .RDP launch config files. What could possibly go wrong? Firefox 132 just received some new features. Chi…
  continue reading
 
Google's record-breaking fine by Russia. (How many 0's is that?) RT's editor-in-chief admits that their TV hosts are AI-generated. Windows 10 security updates set to end next October... or are they? When a good Chrome extension goes bad. Windows .RDP launch config files. What could possibly go wrong? Firefox 132 just received some new features. Chi…
  continue reading
 
How does Software-Defined Networking in Azure work? Richard chats with Aidan Finn about his experiences working with the suite of Azure networking products, including Firewall and Route Server. Aidan talks about the training available on Microsoft Learn to get up to speed with the power of Azure Firewall, including building policy rule sets. The co…
  continue reading
 
In this episode, host KJ Burke is joined by Adam Diallo, Senior Manager Customer Success, CDW Canada and Amanda Frank, Senior Manager Customer Success, CDW Canada to discuss how services organizations and technology providers continue to change they way they help customers, ensuring they have success throughout the full lifecycle of technology.To l…
  continue reading
 
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin. We explore the implications of this significant breach and whether paying ransoms is a viable solu…
  continue reading
 
In this week's episode, we talk a little bit about LLMs and how they can be used with static analysis. We also cover GitHub Security Blog's post on attacking browser extensions, as well as a somewhat controversial CyberPanel Pre-Auth RCE that was disclosed. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/…
  continue reading
 
https://youtu.be/CVeZfM0pVyU https://odysee.com/@NaomiBrockwell:4/Local-LLM:d AI chatbots are taking over the world. But if you want to guarantee your privacy when using them, running an LLM locally is going to be your best bet. In this video I collaborate with The Hated One to show you how, and to explain some AI terminology so that you understand…
  continue reading
 
From Nextcloud Breakup to Blissful Reunion: Chris's journey back to a smarter setup. Plus, Jellyfin's game-changing features and a beloved self-hosted app get the upgrade we've all been waiting for. Sponsored By: Tailscale: Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere.…
  continue reading
 
Episode 95: In this episode of Critical Thinking - Bug Bounty Podcast In this episode, Justin is joined by MatanBer to delve into the intricacies of browser extensions. We talk about the structure and threat models, and cover things like service workers, extension pages, and isolated worlds. Follow us on twitter at: @ctbbpodcast We're new to this p…
  continue reading
 
For years, Mark Zuckerberg’s style could be summed up in a look: the hoodie. But now, he’s entered a new style era. One that involves gold chains and oversized tees of his own creation (with a little help from a high-end designer). In this episode of Uncanny Valley, we look into Zuckerberg’s style evolution, how it aligns with the future of Meta, a…
  continue reading
 
If you're keen to share your story, please reach out to us! Guest: https://www.linkedin.com/in/dziublinski/ https://www.xapobank.com/en/careers Powered by Artifeks! https://www.linkedin.com/company/artifeksrecruitment https://www.artifeks.co.uk https://www.linkedin.com/in/agilerecruiter LinkedIn: https://www.linkedin.com/company/enginearsio Twitter…
  continue reading
 
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerl…
  continue reading
 
ARM for Windows is here in the form of the Snapdragon Copilot+ PCs - how do you update them? Richard talks with Aria Hanson about how Windows Updates treat ARM like just another Windows device - all the updates! Aria talks about the transition time with Windows 24H2 update, which has some specific Copilot+ PC features. But when looking at ARM-based…
  continue reading
 
Loading …

Hurtig referencevejledning