Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

Jerry Bell and Andrew Kalat

Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
profile image

3 Listeners

bookmark
Share icon

All episodes

Best episodes

Top 10 Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec Episodes

Goodpods has curated a list of the 10 best Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec episode by adding your comments to the episode page.

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec - Defensive Security Podcast Episode 289

Defensive Security Podcast Episode 289

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

play

12/19/24 • 60 min

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a year-long supply chain attack that compromised 390,000 credentials, the U.S. government’s bounty for information on North Korean IT worker farms, and the alarming number of vulnerabilities found in software containers. They also delve into the implications of the False Claims Act for cybersecurity whistleblowers and the evolving landscape of AI in security.

profile image

1 Listener

bookmark
plus icon
share episode
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec - Defensive Security Podcast Episode 270

Defensive Security Podcast Episode 270

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

play

02/06/23 • 46 min

1 Listener

bookmark
plus icon
share episode
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec - Defensive Security Podcast Episode 159

Defensive Security Podcast Episode 159

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

play

05/02/16 • 87 min

http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/

https://blog.osvdb.org/2016/04/27/a-note-on-the-verizon-dbir-2016-vulnerabilities-claims/

bookmark
plus icon
share episode
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec - Defensive Security Podcast Episode 69

Defensive Security Podcast Episode 69

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

play

05/30/14 • 55 min

Advice from Bob on the importance of an accurate inventory; TrueCrypt meets an unfortunate end; Weak passwords are responsible for the initial intrusion in 31% of breaches; 71% of exploits used Java; 59% of malicious email used an attachment, 41% used a link; NTT’s Global Threat Intelligence Report finds that most incidents are the result of failing to take basic precautions; DHS reports about a public utility compromised by a brute force attack; There is an apparent discrepancy between the severity of the breaches detailed in the recent DOJ indictment of alleged Chinese hackers and the way that the breached companies categorize was was stolen, and whether that loss needed to be reported to share holders.

Subscribe in iTunes | Podcast RSS Feed | Twitter | Email
http://arstechnica.com/security/2014/05/bombshell-truecrypt-advisory-backdoor-hack-hoax-none-of-the-above/
http://blog.itgovernance.co.uk/weak-passwords-responsible-for-31-of-cyber-attacks/

http://www.techcentral.co.za/surge-in-security-breaches-report/48374/
http://t.esecurityplanet.com/esecurityplanet/#!/entry/lowes-acknowledges-third-party-data-breach,5383580a025312186c0cf074
http://www.myce.com/news/only-51-of-anti-virus-scanners-detect-zero-day-malware-71652/
http://www.itproportal.com/2014/05/26/stop-the-blame-game-report-reveals-the-secrets-to-business-it-security/
http://news.techworld.com/security/3520791/public-utility-compromised-after-brute-force-attack-dhs-says/
http://mobile.bloomberg.com/news/2014-05-21/u-s-companies-hacked-by-chinese-didn-t-tell-investors.html

bookmark
plus icon
share episode
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec - Defensive Security Podcast Episode 128

Defensive Security Podcast Episode 128

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

play

08/25/15 • 29 min

bookmark
plus icon
share episode
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec - Defensive Security Podcast Episode 290

Defensive Security Podcast Episode 290

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

play

12/30/24 • 83 min

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the FTC’s order for Marriott and Starwood to enhance their data security measures, a recent hijacking of a Chrome extension, and emerging threats for 2025. They also delve into the implications of AI in cybersecurity, emphasizing the need for governance and risk management as AI technologies become more pervasive in the workplace. Takeaways
  • The FTC has mandated Marriott and Starwood to implement a comprehensive security program for 20 years.
  • Data breaches can lead to significant regulatory actions and long-term consequences for companies.
  • The hijacking of browser extensions poses a serious risk to user data and security.
  • Emerging threats for 2025 include zero-day exploits and supply chain attacks.
  • AI governance is crucial as employees increasingly use AI tools without oversight.

Links

  • https://www.bleepingcomputer.com/news/security/ftc-orders-marriott-and-starwood-to-implement-strict-data-security/
  • https://www.bleepingcomputer.com/news/security/cybersecurity-firms-chrome-extension-hijacked-to-steal-users-data/
  • https://www.darkreading.com/vulnerabilities-threats/emerging-threats-vulnerabilities-prepare-2025
  • https://www.securityweek.com/beware-of-shadow-ai-shadow-its-less-well-known-brother/
bookmark
plus icon
share episode
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec - Defensive Security Podcast Episode 65

Defensive Security Podcast Episode 65

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

play

04/30/14 • 57 min

Cisco’s annual security report for 2014; the Verizon Data Breach Investigations Report; 7 deadly cyber risks from Zurich Insurance; Alien Vault  urges opening up threat  intelligence; Stanford’s new password policy; New social engineering alert from Trusted Sec; New Internet Explorer 0day Subscribe in iTunes | Podcast RSS Feed | Twitter | Email https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf http://www.ibtimes.co.uk/zurich-insurance-unveils-7-deadly-cyber-risks-1445607 http://www.infosecurity-magazine.com/view/38136/alienvault-ceo-throws-down-the-gauntlet-on-threat-sharing/?utm_source=twitterfeed&utm_medium=twitter http://arstechnica.com/security/2014/04/stanfords-password-policy-shuns-one-size-fits-all-security/ https://www.trustedsec.com/april-2014/red-alert-massive-cyber-wire-fraud-attacks-us-companies/ https://community.qualys.com/blogs/laws-of-vulnerabilities/2014/04/26/new-internet-explorer-0-day
bookmark
plus icon
share episode
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec - Defensive Security Podcast Episode 143

Defensive Security Podcast Episode 143

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

play

01/03/16 • 81 min

This is our 2015 holiday episode with the Brakeing Down Security and PVC Security podcasts.

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec have?

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec currently has 228 episodes available.

What topics does Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec cover?

The podcast is about News, Tech News, Podcasts and Technology.

What is the most popular episode on Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec?

The episode title 'Defensive Security Podcast Episode 263' is the most popular.

What is the average episode length on Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec?

The average episode length on Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec is 51 minutes.

How often are episodes of Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec released?

Episodes of Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec are typically released every 8 days, 22 hours.

When was the first episode of Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec?

The first episode of Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec was released on Apr 30, 2014.

Show more FAQ

Toggle view more icon

Comments