POPULARITY
The Richard Syrett Show August 15th, 2024 Subscribe to Richard's newsletter, "Why I Fight" Scroll to bottom of page https://sauga960am.ca/programs/the-richard-syrett-show Class action lawsuit proposed against B.C. government over safe supply drug program https://globalnews.ca/news/10699432/class-action-lawsuit-bc-government-safe-supply-drug-program/ Adam Zivo - Columnist National Post. Director of the Centre For Responsible Drug Policy KEEPING AN EYE ON YOUR MONEY Time to end bonuses and defund the CBC https://www.taxpayer.com/newsroom/feds-must-end-cbc-bonuses-now Franco Terrazzano Federal Director at the Canadian Taxpayers Federation IN DEFENSE OF WOMEN 50-year-old Italian sprinter Valentina Petrillo to be first transgender Paralympian https://nypost.com/2024/08/13/sports/sprinter-valentina-petrillo-will-be-first-transgender-paralympian/ Linda Blade Co-Author of “Unsporting: How Trans Activism and Science Denial are Destroying Sport“ and CaWsbar Rep on Women's Sports Preserving Liberty: Bold and Brave Solutions to Save America and Create Permanent Freedom https://www.amazon.com/Preserving-Liberty-Solutions-America-Permanent/dp/1510782192/ref=sr_1_1 Josh Bernstein is a talk show host, political analyst, commentator, and professional speaker, and is one of America's most sought-after television and radio guests in media today. Author of Preserving Liberty: Bold and Brave Solutions to Save America and Create Permanent Freedom Listen to the Josh Bernrstein Uncensored Show Musk & Trump X Interview Hit By Massive DDOS Cyber Attack! https://www.dailywire.com/news/trumps-interview-with-musk-crashes-after-coming-under-massive-ddos-attack Hackers found vulnerabilities in voting machines — but it's too late to do anything about it https://www.independent.co.uk/news/world/americas/us-politics/hackers-2024-election-voting-machines-b2595812.html Julio Rivera Political Commentator, Cybersecurity Researcher, and the Founder of RivitMedia.Com Learn more about your ad choices. Visit megaphone.fm/adchoices
Join me as I chat with Jason Parker, a Software Developer, Cybersecurity Researcher and Independent Journalist about hacking court systems, punycode, infosec training and more! !! Explicit Language Alert !! Show Notes Jason Parker on Mastodon Twitter Migration Maricopa County Superior Corut eFiling system disclosure My call for Podcast guests on Mastodon Jeltz Bluesky Exploits Disorder In The Court OWASP Broken Access Control 404 Media LockBit ransomware Fulton county Toothbrush botnet Security flaws in court record systems used in five US states exposed sensitive legal documents | Tech Crunch Flaws in public records management tool could let hackers nab sensitive data linked to requests | Nextgov Software Flaws Exposed Sealed Court Docs, Researcher Says | Law360 Multiple Vulnerabilities Affecting Web-Based Court Case and Document Management Systems | CISA California Bar investigates after confidential discipline records published online State Bar of Calif. Data Breach Caused Confidential Disciplinary Records to Show Up on Third-Party Website, Class Action Says Microsoft Recall The best counterargument to using Recall Punycode Single-letter second-level domain Interesting instance domains Donate to the EFF ISC2 certified in cybersecurity Web Security Academy California Consumer Privacy Act (CCPA) Other US States w/ Privacy Laws iTerm moves AI functionality into a plugin Governor Wants to Prosecute Journalist Who Clicked View Source on Government Site AWS Shared Responsibility Model
Fred I. Lederer, Director of the Center for Legal & Court Technology (CLCT) and Daniel Shin, Cybersecurity Researcher for CLCT join Steve Wood, Ph.D. to discuss the topic of deepfakes in litigation. Fred and Daniel provide the background and history of CLCT and how the center has expanded its focus to new and emerging technologies including machine learning and AI. Daniel defines what a deepfake is, how deepfake technology is being used and applied, and the group discuss the implications of deepfakes on litigation. Fred brings up the impact on admissibility of evidence as well as the larger concern of the triers of fact not believing whether any digital, video, photographic, or physical evidence is real. Daniel shares how some companies have been creating technology to authenticate digital content to aid in dealing with deepfakes, though this technology is still in its infancy at this time so education on what is happening with deepfake technology is key in the legal space. Lastly, Fred and Daniel share details about the courtroom at William & Mary Law School, which is considered to be the most technologically advanced courtroom in the country. Learn more about CLCT here: https://law.wm.edu/academics/intellectuallife/researchcenters/clct/. Watch the video of this episode: https://www.courtroomsciences.com/r/E5q
In this episode of Women Making Impact, we spoke with Meraj Farheen Ansari, Ph.D., MBA, an challenging, committed, and goal-oriented security engineer, technologist, and IT strategist. She has been serving as a reviewer in multiple journals, published various articles in emerging technology field such as AI in Cybersecurity, healthcare, education and many more. Below are some talking points which Meraj answers: How important is cybersecurity awareness in today's world. Benefits of using AI in Cybersecurity What are some concerns about using AI in cybersecurity? Why cybersecurity is more important now than ever.
John Hammond is a cybersecurity researcher, educator and content creator. His YouTube channel has over 25 million views, making him, in our opinion and many others', one of the most influential and rising figures in malware analysis and more broadly in the industry. In his daily life, as part of the Threat Operations team at Huntress, John spends his days making hackers earn their access and helping tell the story. Previously, as a Department of Defence Cyber Training Academy instructor, he taught the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. Time Stamps: 00:00 - Introduction & James Hammond Origin Story 07:00 - Creating content around Malware Analysis, Dark Web & Cyber Crime 16:00 - Has James ever been infiltrated or compromised? 25:00 - Will Artificial Intelligence take our jobs in the future? 33:30 - Is it possible to spot empathy in code? 42:00 - Day in the life of a Cybersecurity Researcher 47:45 - Unexpected truths and harsh realities of being a cybersecurity content creator 59:50 - Skill Shortage in Cyber Security and James advice
John Hammond is well known for his content creation and contributions to the cybersecurity community. His YouTube videos are enjoyed by many and are especially helpful to aspiring pentesters.John holds multiple offensive security certifications and was the first to earn the new OSCE(3) certifications. John is a highly skilled CTF expert and security researcher and talented content creator. Listen as he shares his valuable advice._______________________GuestJohn HammondOn Linkedin | https://www.linkedin.com/in/johnhammond010/On Twitter | https://twitter.com/_JohnHammondOn YouTube | https://www.youtube.com/johnhammond010______________________HostPhillip WylieOn ITSPmagazine
John Hammond is well known for his content creation and contributions to the cybersecurity community. His YouTube videos are enjoyed by many and are especially helpful to aspiring pentesters.John holds multiple offensive security certifications and was the first to earn the new OSCE(3) certifications. John is a highly skilled CTF expert and security researcher and talented content creator. Listen as he shares his valuable advice._______________________GuestJohn HammondOn Linkedin | https://www.linkedin.com/in/johnhammond010/On Twitter | https://twitter.com/_JohnHammondOn YouTube | https://www.youtube.com/johnhammond010______________________HostPhillip WylieOn ITSPmagazine
John Hammond, Cybersecurity Researcher at Huntress Labs, joins the show. See omnystudio.com/listener for privacy information.
French Caldwell of The Analyst Syndicate talks about his role as founder and chief researcher of the group. We also talk about Caldwell's time at Gartner research, and his passion for cybersecurity research as a whole. 00:00 - Intro 03:43 - Caldwell's background in cybersecurity 07:25 - Knowledge management09:55 - Protecting digital trash 12:33 - Risk assessment and day-to-day work life18:00 - How has research changed since 1999?22:48 - Founding The Analyst Syndicate 26:45 - What is your day like at the Syndicate?28:11 - What is your research like now?29:33 - Disruptive technology and public policy31:09 - Disruptive trends34:30 - Advice to students in disruptive technologies38:58 - Tell us about your simulator46:22 - Cyberterrorism and risk to municipalities and hospitals50:18 - Learn more about Caldwell and the Syndicate51:54 - OutroLearn cybersecurity for free with our new hands-on Cyber Work Applied series. Whether you want to learn how cross-site scripting attacks work, set up a man-in-the-middle attack or walk through major breaches like Equifax, Infosec instructors will teach you these skills and show you how they apply to real-world scenarios. Best of all — it's free!– Learn cybersecurity with our FREE Cyber Work Applied training series: https://www.infosecinstitute.com/learn/– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastFrench Caldwell is the leading strategist and thought leader in RegTech, including GRC and ESG, cybersecurity, social and digital risks and regulation and the impact of disruptive technologies on policy and strategy. He is a former Gartner Fellow, and following Gartner he became the global head of marketing at a Silicon Valley firm that delivers regtech solutions for governance, risk and compliance analytics and reporting. Skilled at the alignment of strategy, communications, technology, processes, analysis, policy and people to improve business and mission outcomes. Experienced at advising senior executives and corporate directors on disruptive technology, strategic risk management, cybersecurity and public policy issues.About InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
Guest Contacts:https://www.linkedin.com/in/limbo0x01/https://twitter.com/Limbo0x01Interviewer:https://www.linkedin.com/in/younes-hassanin-233809144/Prepared By:https://www.linkedin.com/in/0xmohammed/ The post 19 Ahmed Attia – CyberSecurity Researcher first appeared on Nakerah Network.
Avec la montée en puissance du Web et des objets connectés, il est plus que jamais nécessaire de se protéger des pirates informatiques. Les métiers de la Cybersécurité sont donc très recherchés et les professionnels se font rares. Alors, quand on a déjà un bon bagage Tech, une spécialisation en Cybersécurité peut être un excellent débouché. Pour parler des opportunités du secteur et des spécificités des différents métiers, nous accueillons aujourd’hui Thomas Roccia, Cybersecurity Researcher chez McAfee, Lorraine Lacoue Labarthe, Security Change Team Leader chez Sopra Steria et René Thiel, Directeur cybersécurité avec plus de 15 ans d’expérience dans des entreprises telles que Sopra Steria, Altran, Sogeti ou encore l’armée de Terre. Rendez-vous au début de l'épisode pour les écouter nous inviter dans leur quotidien d'experts en sécurité informatique - avec des spécialités extrêmement diverses. Conception et réalisation : Nora Leon. Modération : Marion Armengod (Studio de production Make Some Noise). Prises de son : Guillaume Girault. Montage et mixage : Romain Debrie.
Comenzamos la primera temporada de #CyberCoffee2019 hablando con Carlos Seisdedos, CyberSecurity Researcher con un tono informal y sobre muy diversos temas. CyberCoffee es el primer programa en formato podcast de CyberSecurity News, revista especializada en ciberseguridad en España. ¡Escucha ya #CyberCoffee01 con Carlos Seisdedos en todas las plataformas! Periodista: Vicente Ramírez Molina
Comenzamos la primera temporada de #CyberCoffee2019 hablando con Carlos Seisdedos, CyberSecurity Researcher con un tono informal y sobre muy diversos temas. CyberCoffee es el primer programa en formato podcast de CyberSecurity News, revista especializada en ciberseguridad en España. ¡Escucha ya #CyberCoffee01 con Carlos Seisdedos en todas las plataformas! Periodista: Vicente Ramírez Molina
Hablamos con Carlos Seisdedos, Cybersecurity Researcher sobre los temas de actualidad en materia de Ciberseguridad en nuestro país. Este CyberCoffee 01 es el primero de os 12 programas en formato podcast de CyberCoffee 2019, producido por CyberSecurity News, revista líder especializada en Ciberseguridad en España.
Yossi Sassi is the Co-Founder and Cybersecurity Researcher at CyberArtSecurity.com. Yossi joins us for a tech segment to talk about using windows powershell, discussing DCSync, DCShadow, creative Event Log manipulation & thoughts about persistence. To learn more about Javelin Networks, Go To: www.javelin-networks.com Full Show Notes: https://wiki.securityweekly.com/Episode580 Follow us on Twitter: https://www.twitter.com/securityweekly
Yossi Sassi is the Co-Founder and Cybersecurity Researcher at CyberArtSecurity.com. Yossi joins us for a tech segment to talk about using windows powershell, discussing DCSync, DCShadow, creative Event Log manipulation & thoughts about persistence. To learn more about Javelin Networks, Go To: www.javelin-networks.com Full Show Notes: https://wiki.securityweekly.com/Episode580 Follow us on Twitter: https://www.twitter.com/securityweekly
This week, we welcome Veronica Schmitt, Senior Digital Forensic Scientist for DFIRLABS! Veronica explains what SRUM is in Windows 10, and how SRUM can be a valuable tool in Digital Forensics! In the Technical Segment, we welcome Yossi Sassi, the Co-Founder and Cybersecurity Researcher at CyberArtSecurity.com and Advisory Board member at Javelin Networks! Yossi joins us to discuss using Windows Powershell, discussing DCSync, DCShadow, creative Event Log manipulation & thoughts about persistence! In the Security News, Fear of AI attacks, the FDA releases cybersecurity guidance, watch hackers steal a Tesla, serious D-Link router security flaw may never be patched, and California addresses default passwords! All that and more, on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode580 Visit https://www.securityweekly.com/psw for all the latest episodes! To learn more about Javelin Networks, Go To: www.javelin-networks.com Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Veronica Schmitt, Senior Digital Forensic Scientist for DFIRLABS! Veronica explains what SRUM is in Windows 10, and how SRUM can be a valuable tool in Digital Forensics! In the Technical Segment, we welcome Yossi Sassi, the Co-Founder and Cybersecurity Researcher at CyberArtSecurity.com and Advisory Board member at Javelin Networks! Yossi joins us to discuss using Windows Powershell, discussing DCSync, DCShadow, creative Event Log manipulation & thoughts about persistence! In the Security News, Fear of AI attacks, the FDA releases cybersecurity guidance, watch hackers steal a Tesla, serious D-Link router security flaw may never be patched, and California addresses default passwords! All that and more, on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode580 Visit https://www.securityweekly.com/psw for all the latest episodes! To learn more about Javelin Networks, Go To: www.javelin-networks.com Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!! Follow us on Twitter: https://www.twitter.com/securityweekly ike us on Facebook: https://www.facebook.com/secweekly