疲惫娇娃是一档从荧幕聊到宇宙深处的泛文化播客,用女性的声波延展对世界的参与和想象。 在一个内陷的时代,疲惫娇娃站在中国和美国的交汇点上,用女性的元视角去观察、抵抗、塑造政治和社会对流行文化的影响。我们讨论流动的时代精神、艺术、自由、未来、友谊以及一切使我们获得力量的事物。
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A high action, serial audio drama adventure following the wild lives of those living in the cyberpunk-deco city of Neo-Atlantis, 2112.
…
continue reading
Cybernormer er en podcast om teknologi og samfund. Den er produceret at Cybernauterne, et netværk af eksperter i cybersikkerhed, internetkultur og digital forståelse. Læs mere om os på vores hjemmeside cybernauterne.dk
…
continue reading
Daily update on current cyber security threats
…
continue reading
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Each week Toastie and Jennasis bring you the foundations of the past, the state of Night City today, and news of the future for all things Cyberpunk. We talk about the TTRGP, 2077, and every hidden gem we can find. Subscribe for more Cyberpunk lore, news, and more! Patreon - Get ad-free episodes early & support the show! Behind-the-scenes content and more https://www.patreon.com/cyberpunklorecast Discord: https://discord.gg/JXKfVhm Twitter: https://twitter.com/CyberpunkLore Email: cyberpunkl ...
…
continue reading
Een podcast voor, door en over vrouwen in cybersecurity.
…
continue reading
Dark Future Dice is an actual play podcast in which Titus, Lindsay and Sloane delve into the dystopian worlds of Cyberpunk 2020 and Red, weaving narratives that deal with trauma, human connection, and marginalization within an unforgiving dark future. Available on: Spotify: https://spoti.fi/2SG0xtn Apple: https://apple.co/39Fij5M Patreon: https://www.patreon.com/rocketadrift
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
A podcast for anyone and everyone interested in leadership in the cybersecurity industry - we talk about the challenges impacting our industry & how leadership can address that and gain insights, advice and the occasional anecdote from experienced leaders who are happy to share their stories with us!
…
continue reading
High tech, low budget. Library technology, FOSS, and cyberpunk.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
บอกเล่าเรื่องราวในโลกไอทีมาอยู่หน้าไมค์
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
…
continue reading
Ride the cyber trails with one CISO (Allan Alford) and a diverse group of friends and experts who bring a human perspective to cybersecurity.
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
1
Inside Cyber: Chuck Brooks on His Book, AI, IoT & Cybersecurity's Future
19:23
19:23
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
19:23
In this episode, we are thrilled to welcome Chuck Brooks, a renowned cybersecurity expert and thought leader, to discuss his highly anticipated book, Inside Cyber. Chuck shares his journey from shaping a course on disruptive technologies to crafting a comprehensive resource on cybersecurity and emerging technologies. Buy Your Copy Here Key Topics C…
…
continue reading
1
All the Cyber Ladies met Maaike Hielkema
38:26
38:26
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
38:26
De Cyber Lady van deze week is incident responder MaaikeHielkema. Ze heeft een schat aan ervaring als het gaat om het managen van digitale incidenten en werkt momenteel voor de stichting Z-CERT. Het CERT voor de Nederlandse zorg. Ze is van oudsher forensisch onderzoeker, want spoorzoeken was haar passie. Incident respons ziet ze als een grote puzze…
…
continue reading
1
Episode 15: The Best Practices for Building a Transparent Cyber Security Consultancy with Matt Strahan
1:19:41
1:19:41
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
1:19:41
Can you believe there was a time when cybersecurity wasn’t a priority for most organizations? Just 20 years ago, simple passwords and basic firewalls were seen as enough protection. So, what changed? How did we go from minimal defenses to a world where cybersecurity is critical for survival? In this episode of the Cyber Consulting Room podcast, hos…
…
continue reading
1
Leading Cyber - in conversation with Melissa Gurney
59:51
59:51
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
59:51
In this episode, we chat with Melissa Gurney, CEO of Punk Security about her background in the RAF, her career and her thoughts and views on leadership; ranging from working with remote teams and compassion at work to experiencing bias and Melissa's rekindled love - trail running!Bởi Leading Cyber
…
continue reading
1
CCT 195: Navigating End-of-Life Systems: Balancing Cost, Compliance, and Security for CISSP Success (Domain 2.5)
15:03
15:03
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
15:03
Send us a text Ever wondered about the hidden dangers lurking in outdated systems? Join me, Sean Gerber, as we tackle the pressing issues surrounding end-of-life assets on the CISSP Cyber Training Podcast. This episode unpacks the critical risks of holding onto systems that no longer receive manufacturer support and the security implications that f…
…
continue reading
In this episode of the cyber riddler, we talked about the critical first stage of cyberattacks: Initial Access. Learn how hackers breach organizations using tactics like phishing, exploiting vulnerabilities, stolen credentials, and supply chain attacks. We’ll explore real-world examples, discuss why initial access is so crucial, and share practical…
…
continue reading
1
ISC StormCast for Thursday, November 21st, 2024
5:03
5:03
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
5:03
Apple Patches Two Exploited Vulnerabilities https://isc.sans.edu/diary/Apple%20Fixes%20Two%20Exploited%20Vulnerabilities/31452 Oracle Patch for Agile Product Lifecycle Management CVE-2024-21287 https://www.oracle.com/security-alerts/alert-cve-2024-21287.html OFBiz Patches CVE-2024-47208 CVE-2024-48962 https://nvd.nist.gov/vuln/detail/CVE-2024-47208…
…
continue reading
1
teissTalk: Reducing your security debt in a GenAI-driven world
43:21
43:21
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
43:21
Minimising the risks to your security posture from developers’ reliance on GenAI Using AI to speed up remediation and avoid security becoming the bottleneck Steps to ensure safe and secure implementation of GenAI in software development This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Lee Munson, Principal Research…
…
continue reading
1
Scattered Spider arrest, telcos attacked, Apple exploit
8:04
8:04
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
8:04
US charges Scattered Spider members Chinese threat actors infiltrate more telcos Apple issues emergency security update Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-de…
…
continue reading
1
Ep 50 - Cyber Risk Is Human: Why High-Tech Alone Won’t Manage the Threat - Ann Irvine
49:23
49:23
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
49:23
High-tech tools alone can’t manage today’s evolving cyber threats—human insight remains essential. In this episode, host Anthony Hess welcomes Ann Irvine, Chief Data and Analytics Officer at Resilience, who shares why cyber risk management requires more than just the latest tech. Ann explains how Resilience combines technology with hands-on experti…
…
continue reading
1
CONTESTED GROUND: Where does the misinformation bill leave free speech?
36:23
36:23
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
36:23
In this episode of the Contested Ground podcast, shadow minister for communications and federal member for Banks David Coleman joins host Liam Garman to discuss the recent misinformation bill that will leave free speech and political discourse in Australia. They begin the podcast with a recap of what’s in the bill, including how the government will…
…
continue reading
1
Episode 115: How to understand and address risk w/ Robert McElroy
40:25
40:25
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
40:25
In this episode, we discuss the broad concept of risk, what it is, and how to manage it. This episode is a great way to begin understanding how to develop an overall risk management strategy at your organization or understand how a risk management program might work for you. You find out more about what Rob and his team can do here: https://www.sec…
…
continue reading
1
Hybrid Identity Protection - Amazing Interviews with Many Guests
31:42
31:42
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:42
This week Allan attended the HIP Global conference in New Orleans, which happens to be Allan's favorite city in America. The conference was outstanding - no sales pitches, no nonsense, just many experts speaking on the topic of securing identity. Entra ID, Okta, AD folks all were present, and it was amazing. Allan got to interview some AMAZING gues…
…
continue reading
1
Driving the Future: Cybersecurity Challenges for Connected Vehicles with Cheri Caddy
29:48
29:48
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
29:48
Overview: In this episode, host Frank Cilluffo sits down with Cheri Caddy, former Deputy Assistant National Cyber Director at the White House and senior technical advisor at the Department of Energy. They discuss the cybersecurity challenges surrounding connected vehicles, examining how modern cars are effectively "computers on wheels" and the broa…
…
continue reading
サウナのようにホットなセキュリティトレンド、テクノロジー、インサイトをお届けするポッドキャスト『Cyber SecurityサウナJapan』。第17回目は前回に引き続き、IT系記者さん2人を交えての「中小企業のセキュリティ対策」を取り上げたディスカッションの後半をお届けします。Bởi WithSecure
…
continue reading
1
Microsoft Unveils New Cybersecurity Features at Ignite Conference: Cyber Security Today for November 20, 2024
9:01
9:01
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
9:01
Cybersecurity Today: Microsoft Updates, Gen AI Risks, and Liminal Panda Threat In this episode of Cybersecurity Today, host Jim Love discusses major cybersecurity updates from Microsoft's Ignite conference, including enhancements to Windows security and device recovery. A survey by LegitSecurity highlights the security risks associated with generat…
…
continue reading
1
Episode 420 - State of Cybersecurity 2024 report insights with ISACA
21:28
21:28
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
21:28
In response to new questions asked by the annual study, sponsored by Adobe—which showcases the feedback of more than 1,800 global cybersecurity professionals on topics related to the cybersecurity workforce and threat landscape—security teams in Oceania noted they are primarily using AI for: Automating threat detection/response (36 percent vs 28 pe…
…
continue reading
In this episode, Darnley discusses a cyberattack against an electricity provider that left 50,000 German customers vulnerable. Learn ways to protect yourself and understand the damages these energy companies face in our digital world. 5 Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay …
…
continue reading
1
Certifications 101: Why A+, Network+ and Security+ are game changers | Cyber Work Hacks
15:35
15:35
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
15:35
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast James Stanger from CompTIA joins today's Cyber Work Hacks episode to delve into the Tech Trifecta of certifications: A+, Network+ and Security+. These foundational certif…
…
continue reading
1
Sitting Duck Attack Allows Hackers to Hijack Websites
9:08
9:08
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
9:08
Simple misconfiguration can often lead to disaster, and sometimes that disaster is a threat actor sneakily taking over your trusted website and using it to host malware, send phishing emails, or control botnets. Here's a surprisingly easily exploited DNS oversight that has allowed threat actors to take over 70,000 websites. Sources: https://pastebi…
…
continue reading
1
Building a Cybersecure Foundation in Healthcare with Kevin Heineman of Lyric
32:38
32:38
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
32:38
In This Episode: Kevin Heineman shares his experience as the Chief Information Security Officer at Lyric, a company he describes as a "30-year-old startup." Kevin explains Lyric's transition from being part of Change Healthcare to becoming an independent entity focused on payment integrity for major health insurance carriers. He dives into the comp…
…
continue reading
In today’s podcast we cover four crucial cyber and technology topics, including: 1. Criminals abuse brands in shopping-themed phishes 2. GeoVision devices abused to support botnet 3. T-Mobile compromise revealed; Chinese adversaries implicated 4. NSO Group abused WhatsApp even after legal complaint I'd love feedback, feel free to send your comments…
…
continue reading
1
Resilient Cyber w/ Jim Dempsey - Navigating the Cyber Regulatory Landscape
56:54
56:54
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
56:54
In this episode, we sit with the return guest, Jim Dempsey. Jim is the Managing Director of the Cybersecurity Law Center at IAPP, Senior Policy Advisory at Stanford, and Lecturer at UC Berkeley. We will discuss the complex cyber regulatory landscape, where it stands now, and implications for the future based on the recent U.S. Presidential election…
…
continue reading
1
S1 E18 - The Impact of the Cloud First Strategy to Network Design and Security
25:30
25:30
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
25:30
What is a Cloud First Strategy? How does it impact how we design and secure networks? In this episode, Dr. Jeff shares what it means to have a cloud first strategy and the disruptive change it has had on how networks are designed and secured. The old design models are out and a new approach must be adopted if you want to be a successful engineer in…
…
continue reading
1
LIVE: Guarding the Gate. Emerging Threats. Protecting Your Life Online.
1:16:03
1:16:03
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
1:16:03
Live session held for organization. Guarding the Gate. Emerging Threats. Protecting Your Life Online. Covering topics like Cyber crime by the numbers, best practices and more. Other topics: affordable ways to limit cyber liability, ai implications in cyber security today, best security practices for business, best security practices for individuals…
…
continue reading
1
🎙️ Cyber Defense Radio - Ricky Brown - Author - Hotseat - Podcast - 2024
17:26
17:26
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
17:26
Hosted by Gary @Miliefsky, Publisher of @CyberDefenseMag, this hotseat interview is with Ricky Brown, an Air Force veteran, former commercial pilot, and acclaimed author, to discuss his transformative insights on personal growth and resilience. He is a seasoned professional with over 25 years of experience in leadership and strategy found online at…
…
continue reading
Welcome To C.S. Cyber, Thanks For Clicking And Enjoy The Episode! ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on T…
…
continue reading
Show Notes Zip files https://www.bleepingcomputer.com/news/security/hackers-now-use-zip-file-concatenation-to-evade-detection/ Remcos RAT https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyber…
…
continue reading
1
Unlock the Secret to Breaking Into Cyber Security | EP 13
11:30
11:30
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
11:30
The One Thing You Need to Succeed in Cybersecurity In this episode of Cybersecurity Diaries, Nathan from StationX reveals the crucial element that determines success in the cybersecurity field: unwavering commitment. Drawing from his extensive experience guiding over half a million people, Nathan emphasizes that dedication, not just skills or intel…
…
continue reading
1
🚨 China Telecom Hack Escalates, Halliburton Breach Cost $35M, Hot Topic Data Breach, FBI Cyber Warning
18:02
18:02
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
18:02
🚨 China Telecom Hack Escalates, Halliburton Breach Cost $35M, Hot Topic Data Breach, FBI Cyber Warning 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as The Hack on US Telecom by China Escalates with more news below: • Halliburton Breach Cost • Se…
…
continue reading
1
Defensive Security Podcast Episode 285
1:08:00
1:08:00
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
1:08:00
In this episode of the Defensive Security Podcast, we discuss the theft of cloud credentials, the exploitation of SharePoint vulnerabilities, evolving malware techniques, and the importance of cyber due diligence for suppliers. They reflect on the challenges of managing secrets, the implications of auto-updates, and the need for robust risk managem…
…
continue reading
1
Simply Cyber Con '24 - Storytelling Skills to Level Up Your Cybersecurity Career
43:16
43:16
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
43:16
In this episode John shares an upcoming talk that he gave at the Simply Cyber Con '24 in Charleston, SC. Title: From Technical to Tactical: Storytelling Skills to Level Up Your Cybersecurity Career Description: In the fast-paced and complex world of cybersecurity, technical expertise alone isn't enough to stand out. What if you could turn your expe…
…
continue reading
1
Beyond Buzzwords: Zero Trust Implementation and Challenges – with Florian Buschor
10:01
10:01
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
10:01
Host Nico Capitoni dives into the world of Zero Trust with Florian Buschor, Senior Information Security Officer at Georg Fischer. They explore the nuances of the Zero Trust model, from its core principles to vendor differences and the practical challenges of implementation. Florian sheds light on strengthening identity security through advanced mea…
…
continue reading
1
Quantification des risques cyber : comment commencer ? | #60
38:25
38:25
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
38:25
Seconde partie de mon échange avec Matthias Pouyanne, consultant indépendant et spécialiste français de la quantification du risque cyber. 👉 note: il y a un possible décalage de +/- 10 secondes du chapitrage selon la plateforme d'écoute ✅ CONTENU ✅ (00:47) - Établir un programme de quantification : les étapes à court terme et à long terme. (07:29) …
…
continue reading