Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Similar Podcasts
The Infinite Monkey Cage
Brian Cox and Robin Ince host a witty, irreverent look at the world through scientists' eyes.
The Top Shelf
ThePrimeagen and teej_dv are on a quest to find the best possible technical speakers and ask the best possible questions we can find. You all know ThePrimeagen can't read, so this is a great format for him to really shine. Teej is here to make sure that Prime knows who the guest is and also to interrupt Prime wherever possible
24H24L
Evento en línea, de 24 horas de duración que consiste en la emisión de 24 audios de diversas temáticas sobre GNU/Linux. Estos son los audios del evento en formato podcast.
RSA Breach, Part 2
In the wake of RSA's disclosure of the breach, the company cyber analysts chose not to boot the attackers of their network - but followed their activities closely, trying to figure out their identities and motives. For the first time since the actual breach, a decade ago, we'll get the (surprising) answers to those questions - and more.
RSA Breach, Part 2
RSA Breach, Part 2Advertising Inquiries: https://redcircle.com/brands
RSA Breach: The Untold Story, Part 1
In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espionage - and an early victim of its new 'Unrestricted Warfare' doctrine.
RSA Breach: The Untold Story, Part 1
RSA Breach: The Untold Story, Part 1Advertising Inquiries: https://redcircle.com/brands
China’s Unrestricted Warfare, Part 2
In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China's number one target for corporate espionage - and an early victim of its new 'Unrestricted Warfare' doctrine.
China's Unrestricted Warfare, Part 2
China's Unrestricted Warfare, Part 2Advertising Inquiries: https://redcircle.com/brands
The History of Security BSides Conferences with Jack Daniel [ML B-Side]
Security BSides - or just 'BSides', for short' - is the first grassroots, DIY, open security conference in the world - with more than 650 events in more than 50 countries. Jack Daniel, one of BSides' founders, recalls how the conference started, and what do such 'community-oriented' events contribute that other events often cannot.
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
China’s Unrestricted Warfare, Part 1
Back in the 1990s, Cyberwarfare was a word rarely used in the West - and definitely unheard of in China, which was just taking it's first steps in the Internet. Two Chinese military officers, veterans of the semi-conflict with Taiwan, helped shape the role of cyber in modern warfare in China and beyond.
China's Unrestricted Warfare, Part 1
China's Unrestricted Warfare, Part 1Advertising Inquiries: https://redcircle.com/brands
Can Nuclear Power Plants Be Hacked?
Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, speaks to Sr. Producer Nate Nelson about the cybersecurity of Nuclear facilities. How protected are modern nuclear power plants?
Can Nuclear Power Plants Be Hacked?
Can Nuclear Power Plants Be Hacked?Advertising Inquiries: https://redcircle.com/brands
Shutting Down The Internet in 30 Minutes: Chris Wysopal [ML B-Side]
Chris Wysopal, a cyber security pionneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force cooporations to fix their software, and the (not so fortunate) consequenses of the sale to @stake.
Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]
Shutting Down The Internet in 30 Minutes: Chris Wysopal (WeldPond) [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
‘L0pht’, Part 2 – The End
In the early days, the L0pht guys tinkered with what they already had laying around, or could find dumpster diving. But things change, of course. By the end of the ‘90s many of the L0pht hackers had quit their day jobs, incorporating under the name “L0pht Heavy Industries”, and moving into a nicer space, the “new L0pht.” Seven days after Y2K, they merged with @stake, an internet security startup. It was a signal that hacking wasn’t just for the kids anymore.