Here’s a list of the 7 best security podcasts on network security and hacking.
Daily Podcasts
Internet Storm Center StormCasts
https://isc2.sans.org/podcastdetail.html?id=4265
Listen to a daily wrapup of events from the SANS Internet Storm Center.
Weekly Podcasts
Sophos Chet Chat
http://www.sophos.com/en-us/company/podcasts.aspx
Sophos brings you impressive antivirus software and other security products. Two expert Sophos engineers do a weekly podcast covering security news and other security topics.
Security Now
https://www.grc.com/securitynow.htm
Steve Gibson and Leo Laporte do a 2 hour podcast each week to discuss security news, recent vulnerabilities, long standing problems, best practices, and sometimes do deep dives into a specific technology.
Security Weekly
http://securityweekly.com/
Formerly PaulDotCom, listen/watch Paul give his weekly security podcast in which he discusses security news, research, hacker techniques, and technical how-tos.
Packet Pushers
http://packetpushers.net/category/podcast-post/weekly-show
Weekly security podcast covering news and events in the security realm.
Defensive Security Podcasts
https://www.defensivesecurity.org/category/podcast
A weekly discussion of security events in the news.
Monthly Podcasts
Cigital Silver Bullet
http://www.cigital.com/silver-bullet
This monthly podcast usually consists of an interview of a prominent security researcher or engineer.
Ex Podcasts
These don’t count on the list because they appear to be abandoned. They either don’t release a regular podcast or have just stopped releasing podcasts.
Cisco Security TAC Podcasts
http://www.cisco.com/c/en/us/solutions/enterprise-networks/security/security_tac_podcasts.html
Listen in as Cisco Security TAC engineers talk about the latest interesting cases they’ve seen, new Cisco products, interesting solutions to problems, and tips for securing the network.
Tenable Podcasts
http://www.tenable.com/podcast
From the makers of Nessus vulnerability scanner, these podcasts cover current events in network security and best practices for defending.
No comments:
Post a Comment