Cybersecurity công khai
[search 0]
Thêm

Download the App!

show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Alias Secure AF Cybersecurity Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cybersecurity topics with coworkers and special guests. No matter where you are on the cybersecurity knowledge ladder, there's an episode here for you.
 
C
Cybersecurity Sense

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Hàng tháng
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
 
C
Cybersecurity Stories

1
Cybersecurity Stories

Mark van Horik, ProteQtor IT Security

Unsubscribe
Unsubscribe
Hàng tháng
 
Cybersecurity Stories is een reeks verhalen over de vele online risico’s die ons werk en privéleven bedreigen en hoe we ons daar tegen kunnen beschermen. In deze podcast hoort u de verhalen van Nederlandse en buitenlandse gasten die u meenemen in hun wereld en hun strijd tegen cybercriminelen. Waardoor u beter inzicht krijgt hoe oplichters, ransomware-aanvallers en andere kwaadwillenden te werk gaan. Daarnaast krijgt u uiteenlopende tips en adviezen om u beter tegen al die online gevaren te ...
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
 
Cybersecurity affects us all whether we are at home, managing a company, supporting clients, or even running a state or local government. Join the Center for Internet Security’s Sean Atkinson and Tony Sager as they discuss trends and threats, ways to implement controls and infrastructure, explore best practices, and interview experts in the industry. If you are interested in learning more about how to grow your cybersecurity program, CIS and its volunteer community are here to bring clarity ...
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
 
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
 
Security and cybersecurity are critical concerns for any modern business, and startups are no exception. In order to compete in the digital age, startups need to be aware of the latest security threats and have a plan to protect their data and systems. The Startuprad.io security and cybersecurity track is designed to help companies stay ahead of the curve. We interview entrepreneurs who are active in the space and bring you the latest news from the world of cyber security. Our goal is to hel ...
 
It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share the ...
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
 
When it comes to cybersecurity, reacting to a threat isn’t always enough; you have to get ahead and stay ahead of the escalating risks. Join Sid Yenamandra, co-founder & CEO of Entreda, the leading provider of comprehensive cybersecurity software tools for wealth managers and other regulated industries, as he interviews business professionals about what’s keeping them up at night, and how they’re successfully mitigating the looming vulnerabilities that may exist within their firms.
 
Pour a glass and sit down with one of cybersecurity's most battle-worn CISOs Andy Bennett as he and his guests break down the complex problems, concepts, and technologies facing cybersecurity professionals today while exploring the complex flavors of our favorite distilled spirits. It's a free-flowing long-form conversation. Grab a seat and listen to security professionals break down cyber threats and actionable ways to be more resilient and prepared in the face of the world's biggest issues ...
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono imprese, dalle grandi multinazionali alle piccole piccole aziende locali, enti e organizzazioni di ogni ordine e grado, e privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell'attacco, entità della struttura attaccata o danni provocati. Sophos te ne racconta 5 nella stagione 2020 della serie podcast "Sotto Attacco | i grandi crimini ...
 
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
 
Hello everyone! We created this channel to promote a better world by improving digital security and privacy. This is done by better education and information that anyone can use on a daily basis providing simple guidance. I welcome feedback, so if you have an idea please let me know by posting it inside the videos or by an email to: Podcast@thecybersecurityinsider.com I’m your host - Yigal Behar
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://anchor.fm/amplifiedandintensified/support
 
CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Strategic Technologies Program and the International Security Program. Find the latest research from our scholars and CSIS events on this topic below.
 
T
The Cybersecurity Podcast

1
The Cybersecurity Podcast

New America and The Christian Science Monitor

Unsubscribe
Unsubscribe
Hàng tháng
 
Cybersecurity is not just computers and digital processes. Whether it's the threat or the response, the most important, and most interesting, part of the story is the people behind the keyboard. That’s why we’re launching The Cybersecurity Podcast, a monthly program featuring key leaders and thinkers in this space. Our half-hour podcast will go beyond the headlines to discuss some of the most pressing issues and newest ideas in cybersecurity.
 
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003, and it quickly became one of North America’s fastest-growing technology companies. At Herjavec Group, your IT security is our topmost priority as we work diligently around the clock to protect the assets of your business including employees, data, IT infrastructure, and information. Recorded and produced by Herjavec Group, The Cybersecurity Cast discusses the latest news, trends, vulnerabilities, and exploits in cybersec ...
 
Cybersecurity on the Front Lines is a new podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Sentinel IPS’ COO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
Loading …
show series
 
How To Choose A Cybersecurity Provider. Learn tips on what to ask for and what to look for. Penetration Tests vs. Vulnerability Scans, Pricing, Zero Trust Technology and The Latest Takeaways from the recent FTX Crypto Exchange Hack. Please like, subscribe and visit all of our properties at: YouTube: https://www.youtube.com/channel/UC8Hgyv0SzIqLfKqQ…
 
This episode was recorded on: 12/1/2022Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our ecosystem of partners, customers, and industry exp…
 
We've talked about password security a lot on this podcast, and we’ll definitely keep talking about it. What we haven’t discussed enough is password security from the system administrator side. What can admins do to better protect their users from themselves? Find out in this episode of the Secure AF podcast as we talk with security engineer, Rober…
 
Cybersecurity Risk Assessment Risk assessment is not necessarily scanning your network aimlessly; what should you expect from your team? First and foremost, adopt a risk assessment framework; it will be a helpful guide for determining what is assessed, who needs to be involved, and the criteria for developing risk criteria. Some of the frameworks y…
 
Garth Landers, Director of Global Product for Theta Lake, talks about some of the compliance and cybersecurity related issues associated with the use of collaboration platforms such as Zoom, Slack, Microsoft Teams, and WhatsApp. Garth also introduces some best practices for improving the security and compliance posture of these tools, and talks abo…
 
In this episode of the Cybersecurity Defenders Podcast, Dr. Gerald Auger takes us through the last couple of weeks in cybersecurity news via the Simply Cyber Report. We also sit down with Daniel Velasquez, founder of Ground Truth Connections. Daniel has had a very interesting career. He has been a drone pilot inside of a war zone, worked in signals…
 
The US Government Accountability Office issues a report on offshore oil and gas cybersecurity. The Oak Ridge National Laboratory seeks to secure power grids. Boa web server vulnerabilities used to target energy organizations. CISA updates its Infrastructure Resilience Planning Framework. And CISA issues advisories for ICS vulnerabilities. Guests Ma…
 
Do you know what deepfakes are? If you don't, you should. In the ever-evolving world of cybercrime, gaining an understanding of deepfakes is important. These slick images and videos purporting to look like the real thing can sneak up on us unknowingly. It's no stretch to imagine that cybercriminals use them to trick us. But when you're armed with t…
 
Joining the podcast this week is Maria Roat, who has had an impressive career in both government and the private sector for more than 35 years. She shares insights from her time in government, among the many roles she held included Deputy Federal CIO and Small Business Administration CIO, and the opportunities she helped identify to change the syst…
 
Dit keer hebben we als gast Chris Schrijver van RAOW. Hij vertelt wat je allemaal moet doen om je (WordPress) website te beveiligen. Hij vertelt welke gevaren je website kan lopen en geeft dan 3 soorten stappen om je website en je organisatie beter te beveiligen tegen kwaadwillenden: Preventie Barricades opwerpen Backup LinkedIn Chris Schrijver: ht…
 
https://www.yourcyberpath.com/84/ In this short episode, Jason and Kip discuss the first aspect of the CIA Triad which is Confidentiality. They break down the critically important confidentiality point and how it works in the real world, highlighting that it's not about the information itself but more likely about where that information is in the f…
 
Our Highlights: FTX may be history, BUT a German Blog reports there are several parties interested in buying the European Entity of FTX. FTX also triggered Bitpanda to order a special audit from KPMG. We have some more job cuts, this time the 2nd round. Gorillas may sell itself at 1 bn USD even though they have raised 1.3 bn USD in venture capital …
 
Machine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity. The management of digital certificates and keys allows all internal traffic to be encrypted, seriously narrowing the attack surface of an enterprise. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Chris Hi…
 
In episode 43 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Amanda Flynn, Manager of Admin Services and Board Relations at the Center for Internet Security (CIS), and Elijah Cedeno, Sr. Account Management Specialist at CIS. Together, they discuss the work of CIS CARES, a CIS program that gives back to the commu…
 
Mit meiner wunderbaren Gesprächspartnerin Milena habe ich hinter die Kulissen geschaut. Entstanden sind drei wundervolle Sessions die jeweils einen spannenden Aspekt des Themas aufnehmen und viele Denkanstöße für CISOs bringen. Ist Resilienz nur ein Thema des Vorbeugens? Ist Resilienz nur ein Thema der Technik? Ist Resilienz ein Thema, dass beim Ma…
 
This week the guys (and "Skippy the Intern") are joined by special guest, Caren Shiozaki, to discuss cybersecurity considerations among executive teams and boards of directors. Caren shares her experience as a technology executive, insights at the leadership level, and emerging trends that are changing the thought process around cybersecurity and c…
 
In this podcast, Host William Parks discusses with LBMC Information Security Senior Managers Andy Kerr and Kyle Hinterberg some of the top takeaways at this year’s PCI SSC Community Meeting. Topics discussed during this episode include changes to the “In-Place with Remediation” reporting option which was added in PCI DSS v4.0, what to do if you mis…
 
Data breaches are becoming more and more common, and they are costly—the average cost of a data breach is now $3.86 million. Regulations and compliance will only increase this cost. Businesses need to take steps to protect themselves, and one way to do this is by purchasing cyber liability insurance. Join Hosts Sean Mahoney and Stanley Li and their…
 
Loading …

Hướng dẫn sử dụng nhanh

Google login Twitter login Classic login