ddos attack Podcasts
Best ddos attack podcasts available (Last Updated Feb 2026)
1
Security Breach
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
2
A Multi-Vector DDoS Attack Spotlight
Multi-vector DDoS attack campaigns make DDoS mitigation more difficult. Multiple attack vectors make it less likely the attack can be blocked with automated devices. In addition, the DDoS mitigation team has to track more details and to fight the attack on multiple fronts simultaneously. In this podcast, Prolexic examines a Q4 2013 DDoS attack that involved a dozen attack vectors, and explains how they fought back. (2:37)
3
Prolexic DDOS Mitigation Podcast
Distributed Denial of Service (DDoS) attacks can damage your business, so it’s important to take preventive steps to defend against these events. You should hire a DDoS mitigation service and, in cooperation with it, run tests to ensure that your system is adequately protected. In addition, you should devise a policy that informs personnel of their duties and responsibilities during a DDoS cyberattack. Businesses should interview their DDoS mitigation service to confirm that it can properly defend against DDoS attacks. Prolexic provides a variety of tools and services to mitigate this increasingly common threat
4
Follow the White Rabbit - IT Security Podcast - English Edition
"Wake up, Neo. The Matrix has you." Welcome to the rabbit hole of cybersecurity. Instead of a red pill, we offer something much more valuable: clarity in a world of digital chaos. With cyberattacks surging globally and costing businesses billions while threatening critical infrastructure, staying ahead of the curve isn't just for IT pros - it’s a necessity for everyone. Follow the White Rabbit for your backstage pass to the frontlines of IT security. Hosted by Kofi Osae-Attah, the information security officer at Link11, we explore the strategies of modern attackers and the cutting-edge defenses that protect our digital future. Why subscribe? Global Insights: From our headquarters in Frankfurt, Germany, we discuss cyber resilience that transcends borders. Cutting-Edge Tech: Discover how AI and machine learning are revolutionizing DDoS attacks and automated defense mechanisms. Regulatory Roadmap: We demystify NIS2, the Cyber Resilience Act, and the EU AI Act to reveal what matters most for your business. Expert Access: Join us for candid conversations with industry leaders and Link11’s top security architects. Whether you're a CISO, tech enthusiast, or business owner navigating the cloud, we provide the insights you need to protect yourself against data breaches, identity theft, and infrastructure disruptions. Follow the White Rabbit. Your journey into the heart of cybersecurity starts now. Keep calm and get protected.
5
AWS Certified Security Specialist Podcast
Welcome to the 'AWS Certified Security Specialist Podcast' where we considered every domain, task statement, knowledge and skill to build a complete audio study guide for the exam 'AWS Certified Security - Specialty (SCS-C02) Exam'. Please like (thumbs up) or provide positive feedback as that would be helpful. Let me know what domain or task statements you would like more content in and will endeavor to get new episodes available for free and subscribers soon. Domain 1 is totally free and the remaining domains initial tasks are also super free episodes. **** Subscribe on Apple Podcasts to access the full course !!! **** Domain 1: Threat Detection and Incident Response focuses on designing comprehensive incident response plans that incorporate AWS best practices, cloud-specific incident handling, and clearly defined roles and responsibilities using the AWS Security Finding Format (ASFF). This domain emphasizes implementing credential invalidation and rotation strategies through services like IAM and AWS Secrets Manager, while ensuring proper resource isolation during security events. Critical skills include deploying and integrating security services such as Security Hub, GuardDuty, Macie, Inspector, Config, Detective, and IAM Access Analyzer with native AWS services and third-party tools through EventBridge. The domain covers detecting security threats and anomalies using AWS managed security services, employing correlation techniques to join data across services, and creating visualizations to identify unusual patterns while centralizing security findings for comprehensive analysis. Domain 2: Security Logging and Monitoring centers on designing and implementing robust monitoring and alerting systems to address security events using services like CloudWatch and EventBridge for automated responses. This includes analyzing architectures to identify monitoring requirements, setting up automated auditing tools, and defining appropriate metrics and thresholds for alert generation. The domain encompasses comprehensive logging solutions utilizing VPC Flow Logs, DNS logs, CloudTrail, and CloudWatch Logs with proper lifecycle management and retention policies. Key competencies include troubleshooting logging configurations, identifying missing logs, managing access permissions for logging services, and designing log analysis solutions using tools like Athena, CloudWatch Logs Insights, and Security Hub insights to identify patterns indicating anomalies and known threats. Domain 3: Infrastructure Security emphasizes implementing security controls across edge services, networks, and compute workloads to protect against common attacks and exploits. Edge security involves leveraging AWS WAF, load balancers, Route 53, CloudFront, and Shield to create layered defense strategies against threats like OWASP Top 10 and DDoS attacks, while applying geographic and rate-limiting restrictions. Network security focuses on VPC security mechanisms including security groups, network ACLs, and Network Firewall, along with inter-VPC connectivity through Transit Gateway and VPC endpoints to keep data off the public internet. Compute workload security involves provisioning and maintaining EC2 instances with proper patching, vulnerability scanning through Inspector and ECR, implementing IAM instance roles, creating hardened AMIs, and applying host-based security mechanisms while securely managing secrets and credentials. Domain 4: Identity and Access Ma
6
Threat Monitor
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
7
DDoS Protection
DDoS protection has to be in place as soon as you can get it because there are quite a few cases that are present with regards to attacks online.
8
What is an IP Stresser and How Does it Work?
Cybercrime has spiked in recent years, and one of the most common types of attacks is Distributed Denial of Service (DDoS) attacks. These attacks flood a targeted website with traffic until the website crashes. One tool that cybercriminals use to launch such attacks is an IP stresser. #ipstresser https://darkvr.io/
9
Prolexic DDOS Mitigation Podcast
Able to absorb the largest and most complex DDoS attacks ever launched, Prolexic protects and restores mission-critical, Internet-facing infrastructures for global enterprises and government agencies within minutes.
10
Technopolitan | Το Podcast των Power Users
Ένα τεχνολογικό "ραδιοφωνικό" μαγκαζίνο για το Linux, το Android, το gaming και τις αγαπημένες μας ταινίες και σειρές.
11
Duo Attack
Duo Attack gives you a Heroclix podcast from an experienced player or two and a veteran judge's point of view. With segments throughout the show covering every topic and keeping it moving, Duo Attack is ready for your ears! E-mail questions and comments to duoattack@gmail.com.
12
Online Reputation Radio - What to do When The Internet Attacks You
Welcome To Reputation Radio The Host, Tyronne (TJ) Jacques is the author of "How To Fight Google And Win" and founder of Remove It Now.com.RemoveItNow.com is an online community dedicated to protecting consumers from online slander and cyber bully attacks. He is an expert in the field of Entertainment PR and Brand Development. Tyronne Jacques is also the Executive Director of Image Max PR which specializes in Brand Development, and Online Brand Protection. In addition to his day to day responsibilities in the field of public relations, he has also published over 500 articles on Public Relations and Student Cyber Safety Topics.
13
El DDT Ataca de Nuevo!
Llamadas telefonicas hechas a toda hora del día y de la noche...Hahahahahahahahahaha...
14
Program Podcast: What Do the Music of a Native People, the Happy Atheist and the Intensifying Attacks on Women Have in Common? Tune In and Find Out!
Podcast for Program: What Do the Music of a Native People, the Happy Atheist and the Intensifying Attacks on Women Have in Common? Tune In and Find Out!
15
Bulldog Radio
BULLDOG RADIO - A group of surly, tattooed pricks spewing their contempt for the world and sometimes each other. Join Junior, Bobby and Lorenzo as they come to verbal blows over society, politics and popular culture. You’ll find yourself either laughing along or screaming back in anger.
16
Hoofcast
Hoofcast is a comedy sketch show disguised as a podcast starring three comedic geniuses fond of irrelevant, disturbing, and sometimes downright disgusting comedy and pop culture. The most irrelevant comedy podcast on the web!










