Ranked #1

Developing Cyber Skills: A Job Role Centric Approach
Developing Cyber Skills: A Job Role Centric Approach
Jane Dickinson talks about CompTIA's approach to supporting individuals and businesses with security readiness, includin... Read more
13 Mar 2017
•
23mins
Ranked #2

Cyber Attacks
Cyber Attacks
John Finch examines the anatomy of a cyber-attack that caused a breach of public sector data, considering the impact ass... Read more
24 Oct 2016
•
27mins
Similar Podcasts
Ranked #3

Careering towards a secure future?
Careering towards a secure future?
Recognising the breadth of cyber security, there is a corresponding recognition of the widening need for skills - from s... Read more
12 Dec 2016
•
37mins
Ranked #4

Apprenticeships into Cyber - A Panel Discussion
Apprenticeships into Cyber - A Panel Discussion
Kevin Jones moderates a panel discussion about the role of apprenticeships as a means of entering a career in the domain... Read more
21 Mar 2015
•
Ranked #5

Vulnerability management
Vulnerability management
Considering the essential role of vulnerability management in maintaining IT security, examining how it can be undermine... Read more
27 Aug 2011
•
17mins
Ranked #6

Integrated Compliance and Risk Management using STREAM
Integrated Compliance and Risk Management using STREAM
Richard Mayall shows how a variety of risk and compliance activities can be combined into an Integrated Management Syste... Read more
14 Jun 2014
•
Ranked #7

Quantum Cryptography
Quantum Cryptography
From 2000BC, cryptography used substitution ciphers and relied on a key exchange. With Public Key Cryptography, Mathemat... Read more
4 Jan 2016
•
54mins
Ranked #8

03 - Basic SQL String Injection
03 - Basic SQL String Injection
This is the third of a series of videos that consider a range of security vulnerabilities. In this video, the concept of... Read more
18 Feb 2011
•
7mins
Ranked #9

A look into the Payment Card Industry
A look into the Payment Card Industry
Pete Woodward, Chief Information Officer of Securious Limited, explains what PCI DSS means to SMEs and large corporation... Read more
7 Apr 2016
•
23mins
Ranked #10

The IT Security Industry - Survival in the Age of Cyberwarfare
The IT Security Industry - Survival in the Age of Cyberwarfare
First came Stuxnet, then Duqu, followed by Flame, Gauss and Red October. These were all cutting-edge malware used for cy... Read more
19 May 2013
•
Ranked #11

Security usability - Principles and perceptions
Security usability - Principles and perceptions
An examination of the need for security features to be usable and understandable for their target audience. [Released u... Read more
21 Nov 2010
•
15mins
Ranked #12

Mobile Malware
Mobile Malware
Prof. Steven Furnell outlines the problem of malware on mobile devices, looking at how it has been a long-predicted thre... Read more
16 Dec 2012
•
Ranked #13

RFID security
RFID security
An introduction to the general principles of RFID technology and an overview of some of the attacks that this can enable... Read more
29 Sep 2011
•
9mins
Ranked #14

Security and Privacy - All under control?
Security and Privacy - All under control?
Privacy settings are available on many devices and services, but the available options can often frustrate attempts to c... Read more
20 Sep 2015
•
32mins
Ranked #15

Cyber Security for SMBs
Cyber Security for SMBs
Cyber Security has seen many changes recently with terms such as hactivism, cyber-espionage and cyber-warfare dominating... Read more
21 Jul 2012
•
Ranked #16

Bitcoin and other Crypto- currencies – Will they thrive once regulated?
Bitcoin and other Crypto- currencies – Will they thrive once regulated?
Bitcoin has shown that an alternative, decentralized currency is now possible. As there is no central authority, anyone ... Read more
10 May 2014
•
Ranked #17

Pursuing Careers in Cyber Security
Pursuing Careers in Cyber Security
This film presents thoughts from various exhibitors at the South West Regional Cyber Day, organised by the Cyber Securit... Read more
4 Apr 2015
•
Ranked #18

04 - Password Recovery
04 - Password Recovery
This is the fourth of a series of videos that consider a range of security vulnerabilities. In this video, the Password ... Read more
18 Feb 2011
•
3mins
Ranked #19

Testing our Security Defences
Testing our Security Defences
Dr Maria Papadaki from Plymouth University examines how penetration testing can help assess the robustness of our securi... Read more
12 May 2013
•
Ranked #20

Harnessing Security Skills and Professionalism
Harnessing Security Skills and Professionalism
Despite increasing demand for cyber security roles, the industry is facing a deficit of skilled practitioners. Amanda Fi... Read more
23 Feb 2014
•