100本のエピソード

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

Exploring Information Security - Exploring Information Security Timothy De Block

    • テクノロジー

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

    How to Harness the Power of pfSense for Network Security

    How to Harness the Power of pfSense for Network Security

    In this episode of Exploring Information Security, Security Engineer Kyle Goode takes a deep dive into the versatile world of pfSense, a robust open-source firewall and router that has been a mainstay in the network security arena for over two decades. Kyle shares insights from his own experiences with pfSense, exploring both the practical and technical aspects of setting up and managing a pfSense system.

    • 33分
    What are Deepfakes?

    What are Deepfakes?

    In this enlightening episode of the Exploring Information Security podcast, we dive deep into the world of deepfakes with Dr. Donnie Wendt. With a background in cybersecurity at MasterCard, Dr. Wendt shares his journey into the exploration of deepfake technology, from setting up a home lab using open-source tools to presenting the potential business impacts of deepfakes to leadership teams.

    • 33分
    ShowMeCon: Talking PCI 4.0 change with Jeff Man

    ShowMeCon: Talking PCI 4.0 change with Jeff Man

    In this compelling episode of the Exploring Information Security podcast, we sit down with Joe Weiss, a seasoned expert in control systems security, to unravel the complexities and challenges facing the security of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems today.

    • 35分
    ShowMeCon: Talking PCI 4.0 change with Jeff Man

    ShowMeCon: Talking PCI 4.0 change with Jeff Man

    Welcome to a special edition of the Exploring Information Security podcast, where we dive into the intricacies of cybersecurity with industry veteran Jeff Man! A distinguished figure in cybersecurity Jeff has a wealth of experience that spans over four decades, including his early years at the National Security Agency and extensive work in the private sector.

    This podcast sponsored by ShowMeCon.

    • 32分
    ShowMeCon: How AI will impact Cybersecurity Enhancements and Threats

    ShowMeCon: How AI will impact Cybersecurity Enhancements and Threats

    In this engaging episode Jayson E. Street, a renowned cybersecurity expert, joins me to discuss the return of ShowMeCon, the impact of AI in cybersecurity, and innovative strategies for enhancing security and combating threats. Jayson shares his excitement for ShowMeCon, insights on utilizing AI for security enhancements rather than traditional attacks, and offers practical advice for users, executives, and information security professionals.

    This podcast sponsored by ShowMeCon.

    • 31分
    ShowMeCon: Azure Vulnerabilities with Scott Miller

    ShowMeCon: Azure Vulnerabilities with Scott Miller

    Scott Miller, a fresh voice in the cybersecurity arena, joins me to discuss the intricacies of hacking Azure services. Scott shares his journey from a recent college graduate to becoming a speaker at cybersecurity conferences, along with valuable insights into Azure AD (Active Directory), vulnerabilities within cloud services, and the art of escalation.

    This episode sponsored by ShowMeCon.

    • 22分

テクノロジーのトップPodcast

ゆるコンピュータ科学ラジオ
ゆるコンピュータ科学ラジオ
zenncast - 技術トレンドを耳で聴く
zenncast
Acquired
Ben Gilbert and David Rosenthal
デデデータ!!〜“あきない”データの話〜
DATAFLUCT
backspace.fm
backspace.fm
Rebuild
Tatsuhiko Miyagawa

その他のおすすめ

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Defense in Depth
David Spark
CyberWire Daily
N2K Networks
Security Now (Audio)
TWiT
Hacking Humans
N2K Networks
Malicious Life
Malicious Life