Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
C
Cybersecurity Awesomeness Podcast


1
Cybersecurity Awesomeness Podcast
Enterprise Management Associates + DEVOPSdigest
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Restrike brings you a daily feed of the latest news in CyberSecurity
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
C
Control Loop: The OT Cybersecurity Podcast


1
Control Loop: The OT Cybersecurity Podcast
N2K Networks
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
How to manage Cybersecurity Risks and Regulations without losing your sanity . Discussing that magical intersection between cybersecurity and financial services regulations. No jargon, no scare stories. Just Plain English news and advice.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
M
Mahlzeit! Mundgerechte Cybersecurity am Mittag


1
Mahlzeit! Mundgerechte Cybersecurity am Mittag
4S IT-Solutions AG
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
…
continue reading
T
To The Point - Cybersecurity


1
To The Point - Cybersecurity
Forcepoint | Global Cybersecurity Leader | Security. Simplified.
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government and world at large.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
Welcome to "Cybersecurity for Your Mom," the podcast where Joey breaks down the complex world of cybersecurity for everyone to understand. Join host Joey Wagner as he takes you on a journey through the ever-evolving landscape of cyber security. In each installment, Joey will demystify the intricacies of cybersecurity, offering insights into current events, in-depth discussions on cutting-edge cybersecurity topics, and the latest trends in the technology industry.
…
continue reading
Cybersecurity
…
continue reading
S
SecurityWeek Podcast Series - Cybersecurity Insights


1
SecurityWeek Podcast Series - Cybersecurity Insights
SecurityWeek
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
…
continue reading
K
Kill Chain: A Platform Cybersecurity Podcast


1
Kill Chain: A Platform Cybersecurity Podcast
Fleet Defender
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
Cybersecurity affects us all whether we are at home, managing a company, supporting clients, or even running a state or local government. Join the Center for Internet Security’s Sean Atkinson and Tony Sager as they discuss trends and threats, ways to implement controls and infrastructure, explore best practices, and interview experts in the industry. If you are interested in learning more about how to grow your cybersecurity program, CIS and its volunteer community are here to bring clarity ...
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Y
Your Cyber Path: How to Get Your Dream Cybersecurity Job


Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).
…
continue reading
G
Genealogy of Cybersecurity - Startup Podcast


1
Genealogy of Cybersecurity - Startup Podcast
Paul Shomo
Interviews with founders, startup-advising CISOs, venture capitalists, and analysts discussing the issues of cybersecurity, new threats, and emerging technology. The Genealogy of Cyber Security brings listeners into forward-thinking conversations with industry visionaries, to explore big ideas, and discuss out-innovating the competition.
…
continue reading
R
Reimagining Cyber - real world perspectives on cybersecurity


1
Reimagining Cyber - real world perspectives on cybersecurity
Reimagining Cyber
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cybersecurity, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber security, co ...
…
continue reading
Join James Farrow, the voice of Cyft.ai, as he explores the brightest minds in cybersecurity. Each week, he embarks on a deep dive into often-overlooked topics with industry experts. On this journey, you'll be exposed to game-changing insights, all designed to help you fortify your business and grow your career. Thanks for tuning in.
…
continue reading
C
Cyber Rants - The Refreshingly Real Cybersecurity Podcast


1
Cyber Rants - The Refreshingly Real Cybersecurity Podcast
Silent Sector LLC
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
…
continue reading
2
2 Minute Tech Tips - Business Cybersecurity


1
2 Minute Tech Tips - Business Cybersecurity
North Tech Group
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
T
The Bid Picture with Bidemi Ologunde - Cybersecurity & Intelligence Analysis


The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
S
Security Sutra - Cybersecurity Startups and Venture Capital


1
Security Sutra - Cybersecurity Startups and Venture Capital
Jörn "Joe" Menninger
Security and cybersecurity are critical concerns for any modern business, and startups are no exception. In order to compete in the digital age, startups need to be aware of the latest security threats and have a plan to protect their data and systems. The Startuprad.io security and cybersecurity track is designed to help companies stay ahead of the curve. We interview entrepreneurs who are active in the space and bring you the latest news from the world of cyber security. Our goal is to hel ...
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading
I
It's 5:05! Daily cybersecurity and open source briefing


1
It's 5:05! Daily cybersecurity and open source briefing
Contributors from Around the World
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
…
continue reading
B
Bee Cyber Fit: Simplifying Cybersecurity for Everyone


1
Bee Cyber Fit: Simplifying Cybersecurity for Everyone
Wendy Battles/James Tucciarone
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
…
continue reading
C
Cybersecurity with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001


https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
…
continue reading
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
…
continue reading
W
Welcome to Cybersecurity Insights and Perspectives


1
Welcome to Cybersecurity Insights and Perspectives
Kevin E. Greene
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
…
continue reading
R
Reduce Cyber Risk Podcast - Cybersecurity Made Simple


1
Reduce Cyber Risk Podcast - Cybersecurity Made Simple
Shon Gerber, CISO, CISSP, Cybersecurity Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk and CISSP Cyber Training podcasts provides valuable insight, guidance, and training to you each week that only a senior cybersecurity expert can perform. Shon has over 21+ years of experience in cybersecurity from large corporations, government, and even as a college professor. Shon provides you the information and knowledge you need pass the CISSP exam the first time along with practical steps needed to enhance and grow your cybersecurity career. Shon ...
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
Host John Bambenek discusses complex cybersecurity issues
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè Questo show fa parte del network Spreaker Prime. Se sei interessato a fare pubblicità in questo podcast, contattaci su https://www.spreaker.com/show/4610094/advertisement
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by The CyberWire as a public service.
…
continue reading
T
The Cybersecurity Startup Revenue Podcast for founders, leaders and go-to-market teams


1
The Cybersecurity Startup Revenue Podcast for founders, leaders and go-to-market teams
Andrew Monaghan
The Cybersecurity Startup Revenue Podcast helps startups grow sales faster. Whether you are a seller, marketer, leader, or founder, you hear proven strategies to help cybersecurity startups get more leads, more customers, and optimize their marketing and sales processes. All from people who know a thing or ten about building great cybersecurity startups. For sales rep, VP Sales, CRO, marketing, CMO, founder, CEO, and investors at cybersecurity startups. Guaranteed* to be the best resource fo ...
…
continue reading
C
CyberPodYoruba - Cybersecurity in Yoruba


1
CyberPodYoruba - Cybersecurity in Yoruba
Rollademy - CyberPodYoruba
Cybersecurity in Yoruba - #CyberPodYoruba
…
continue reading
I
It's 5:05! Daily cybersecurity and open source briefing


1
Episode #288: Edwin Kwan: WhatsApp Updates Password Security; Katy Craig: AI Alliance to Compete with Closed Source LLMs; Hillary Coover: 23andMe: Guard Your DNA Data, Protect Your Family; Marcel Brown ...
10:33
10:33
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
10:33
Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. The stories we’re covering today. Marcel Brown: December 6, 1994. Apple sues the San Francisco Canyon Company, alleging they helped Intel and Microsoft steal co…
…
continue reading
C
Cybersecurity Tech Brief By HackerNoon


1
How to Access the Dark Web: Methods for Android and PC
13:03
13:03
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
13:03
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-access-the-dark-web-methods-for-android-and-pc. Explore the depths of the Dark Web safely. Learn how to use Tor, understand its risks, and access it securely on Android and PC. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
…
continue reading
Wie ist das denn mit dem Homeoffice aus Sicht der Cybersicherheit? Und des Datenschutzes, und, und, und... Das Ganze natürlich so, dass man das beim Mittagessen versteht, und ohne, dass Ihr Essen kalt wird! Website: https://www.4s-ag.de LinkedIn | FacebookBởi 4S IT-Solutions AG
…
continue reading
C
Cybersecurity Today


1
Cyber Security Today, Dec. 6, 2023 - Warnings about Russian-based cyber attacks, and more
5:50
5:50
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
5:50
This episode reports on abuse of Go language repositories, unpatched Outlook servers targeted by Russian group, and moreBởi ITWC
…
continue reading
R
Reimagining Cyber - real world perspectives on cybersecurity


1
The CISO: Guardian of the Digital Realm (SPECIAL EPISODE) - Ep 74
20:24
20:24
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
20:24
Welcome to Reimagining Cyber, where we explore the evolving role of the Chief Information Security Officer (CISO). In this special episode, Stan and Rob present a compilation of insightful clips from previous episodes. First up, Parham Eftekhari, Executive Vice President of the Cyber Risk Alliance, discusses the transformation of the CISO role into…
…
continue reading
B
Breaking Into Cybersecurity


1
Breaking into Cybersecurity with Brad Rager
31:38
31:38
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
31:38
Breaking into Cybersecurity with Brad Rager Brad Rager on Linkedin - https://www.linkedin.com/in/brad-rager/ Sponsored by CPF Coaching LLC - http://cpf-coaching.com The Breaking into Cybersecurity: It’s a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how t…
…
continue reading
C
Cybersecurity Unplugged


1
Lost in the Inbox: The Cybersecurity PR Epidemic Part 1
25:52
25:52
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
25:52
This two-part series dives into the issue within cybersecurity PR and Communications, focusing on the widespread use of ineffective mass email strategies by PR professionals. Featuring special guest Kevin Kosh, Senior Director of Communications at Bishop Fox.
…
continue reading
T
To The Point - Cybersecurity


1
Secure by Design - The Need We All Agree On with Lauren Zabierek
47:37
47:37
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
47:37
We’re excited to welcome to the podcast Lauren Zabierek, Senior Policy Advisor to the Cybersecurity and Infrastructure Security Agency (CISA). She deep dives into CISA’s Secure by Design principles and approaches for secure by design software launched in April 2023 - with version two published on October 17, 2023. Lauren shares insights on the path…
…
continue reading
I
Industrial Cybersecurity Insider


1
Unmasking Industrial Cybersecurity Threats and Solutions with Dave Purdy of TXOne Networks
26:23
26:23
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
26:23
We delve into the intricate world of operational technology (OT) cybersecurity with industry expert Dave Purdy. With his extensive experience transitioning from IT to OT, Dave discusses the unique challenges and vulnerabilities in protecting critical infrastructure and industrial networks. He shares his insights on safeguarding legacy systems, the …
…
continue reading
B
Bee Cyber Fit: Simplifying Cybersecurity for Everyone


1
Building Cyber Resilience: A Look at Yale's 2023 Cybersecurity Awareness Initiatives & 2024 Preview
29:32
29:32
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
29:32
Get ready to get cyber fit with us! Join us as we unwrap Yale University's cybersecurity awareness program in 2023, reveal our upcoming plans, and guide you on defending against a prevalent cyber threat - domain spoofing. Alongside our boss, Jess Flower, we'll journey through the past year, reminiscing about our favorite moments, from engaging work…
…
continue reading
This week: 3 – Backups are important even when you use the cloud. 2 – You need to check all of your doorways. 1 – Why the pain of DORA will be worth it. Links to all articles can be accessed from https://codeinmotion.ie/cyber321-20231203/ ---------------------------------------------------------------------- Hi, I'm Sam Glynn. If you are accountabl…
…
continue reading
In this episode, host Bidemi Ologunde presented five stories from obscure corners of the news media and the internet. 1. Amsterdam, Netherlands 2. Lagos, Nigeria 3. Milan, Italy 4. Rio de Janeiro, Brazil 5. Paris, France Support the showBởi Bidemi Ologunde
…
continue reading
Fishing is a really relaxing time but falling into a phishing scam is never a good time.Bởi North Tech Group
…
continue reading
C
Cybersecurity Awesomeness Podcast


1
Cybersecurity Awesomeness Podcast - Episode 38
12:31
12:31
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
12:31
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security implications of the new Apple iOS NameDrop feature.Bởi Enterprise Management Associates + DEVOPSdigest
…
continue reading
C
Cybersecurity Chronicles


1
Sons fo Hope: Critical Insights on the Alarming State of Cybersecurity Practices
34:46
34:46
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
34:46
Sean Mahoney and Will Lassalle catch up on the current state of cybersecurity, recent data breaches, the impact of regulations, and where opportunities for the future seem to be regarding compliance and cyber risk. Mentioned in this episode: Podcast Outro BumperBởi Netswitch Technology Management
…
continue reading
T
The PrOTect OT Cybersecurity Podcast

1
Don C. Weber: The Gray Area Between OT and IT
55:58
55:58
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
55:58
About Don C. Weber: Don C. Weber is the Principal Consultant and Founder of Cutaway Security, LLC, an information security consulting firm based in Texas. With a master's degree in network security and a Certified Information Systems Security Professional (CISSP) certification, Don has a wealth of expertise gained over two decades. As a seasoned le…
…
continue reading
T
The Next Phase of Cybersecurity

1
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
21:57
21:57
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
21:57
Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats. By integrating relevant threat intelligence feeds, security teams gain insights into the tactics, techniques, and procedures employed by malicious actors. This aids in swift detection and response to potentia…
…
continue reading
S
Security Sutra - Cybersecurity Startups and Venture Capital


1
This Month in German, Swiss, and Austrian (GSA) Startups - November 2023
19:46
19:46
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
19:46
Like what you hear? You can tip us here: https://www.buymeacoffee.com/Startuprad.io Welcome Welcome to our November 2023 wrap-up with vital news from the startup scenes in Germany, Austria, and Switzerland in 30 minutes or less 🙂. Our Highlights AI startup Aleph Alpha raises half a billion dollars, CMBlu raises 100 mn € for energy storage, WeFox ge…
…
continue reading
C
Control Loop: The OT Cybersecurity Podcast


1
Building automation systems and maritime cyber regulations.
36:48
36:48
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
36:48
GRU's Sandworm implicated in campaign against Danish electrical power providers. Paris wastewater agency hit by cyberattack. LockBit hits Boeing. Bletchley Declaration represents a consensus starting point for AI governance. The US Executive Order on artificial intelligence is out. Guest Austin Reid of ABS Group discusses Ship and Shore challenges …
…
continue reading
C
Cybersecurity with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001


1
Navigating Cryptocurrency Security: Sim Swaps, Vendor Risks and Assertive Measures
39:24
39:24
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
39:24
What if you could protect your cryptocurrency from hackers with just a few simple security measures? That's what we're diving into today in our exploration of the fascinating yet terrifying world of SIM Swaps and cryptocurrency security. We'll shed light on a real-life cautionary tale of a victim who lost his cryptocurrency to these cunning cyber c…
…
continue reading
N
No BS Cybersecurity

1
Let’s Simplify Cybersecurity Language with Ayman Elsawah, Founder at Cloud Security Labs
51:28
51:28
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
51:28
On this episode of No BS Cybersecurity, James is joined by Ayman Elsawah, Fractional CISO and Founder at Cloud Security Labs. Join them as they delve into: Foundational security measures for startups Why cybersecurity isn’t black and white - it’s gray The need to simplify cybersecurity Scenarios startups may find themselves in with security Why sec…
…
continue reading
Join us as we discuss ransomware, its history, its ramifications, and whether should you pay the ransom or notBởi Joey Wagner
…
continue reading
Y
Your Cyber Path: How to Get Your Dream Cybersecurity Job


1
EP 110: Am I too old to work in Cybersecurity
34:04
34:04
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
34:04
https://www.yourcyberpath.com/110/ In this episode, hosts Kip Boyle and Jason Dion discuss the topic of ageism in cybersecurity careers. They address a listener's question about whether it is too late for a career change into cybersecurity at the age of 60-65. The hosts acknowledge that ageism does exist in the industry, but they provide tips and s…
…
continue reading
C
Cybersecurity Where You Are


1
Episode 70: How the Media Molds Public Perception of Infosec
46:20
46:20
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
46:20
In episode 70 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Mathew Schwartz, Executive Editor for DataBreachToday & Europe at the Information Security Media Group (ISMG). Together, they discuss the media's role in shaping public understanding and perception of infosec. They begin by considering the idea of media channels helpin…
…
continue reading
F
Fortinet Cybersecurity Podcast

1
FortinetLIVE #63 - Secure Connectivity And The New FortiSwitch
12:10
12:10
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
12:10
🎙️ Get ready for another episode FortinetLIVE as #Fortinet’s Chris Hinsz and Sandip Borle discuss our latest #FortiSwitch 600 and 2000 series product releases, and highlight Fortinet’s secure connectivity platform. Learn more about the new FortiSwitch: https://www.fortinet.com/blog/business-and-technology/fortiswitch-solutions-for-evolving-campus?u…
…
continue reading
C
Cyber Rants - The Refreshingly Real Cybersecurity Podcast


1
Episode #112 - Cyber Score Sites: Fact or Fiction
53:49
53:49
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
53:49
In a digital realm rife with misinformation, the guys dissect the reliability of cyber score sites like Security Scorecard that rate the security level of companies. They discuss the repercussions of false ratings and the pressures on organizations to pay for correcting misleading information. Breaking down real-world examples to a technical level,…
…
continue reading
During this Podcast Jonathan Care, Advisor at Lionfish and former Gartner Analysts, talks scams, cons and frauds and why they still work.Bởi Jeffrey Wheatman
…
continue reading
S
SecurityWeek Podcast Series - Cybersecurity Insights


1
Fireside Chat With Former Netflix Security Chief, Jason Chan
33:19
33:19
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
33:19
Enjoy this fireside chat with Jason Chan, former head of information security at Netflix and operating advisor, Bessemer Venture Partners. Jason joins SecurityWeek editor-at-large Ryan Naraine for a frank discussion on the state of vulnerability management and software development, multi-cloud deployments and expanding attack surfaces, the cyber st…
…
continue reading
In this week's episode of the Kill Chain podcast hosts Terry Reinert and Marcus Q discuss the use of AI in creating automotive insurance policies and rates. The evolving field of AI can create more personalized rates and change the way insurance providers look at driving habits. Want to learn more about securing your fleets, platforms, or mission c…
…
continue reading
G
Genealogy of Cybersecurity - Startup Podcast


1
Ep 17. Talon on Enterprise Browsers Solving Data Loss and Unmanaged Devices
24:58
24:58
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
24:58
Talon Founder Ofer Ben-Noon describes what it was like to win Innovation Sandbox in Interview with Ofer Ben-Noon, Founder of Innovation Sandbox 2022 champion Talon Cyber Security. Ofer discusses how Talon’s enterprise browser, is poised to reshape the landscape of cybersecurity. Its easy deployment onto all devices, including unmanaged ones, the en…
…
continue reading
R
Restrike Cybersecurity News


1
US Government Issues Guidance on SBOM Consumption
1:46
1:46
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
1:46
CISA, NSA, and ODNI issue new guidance on managing open source software and SBOMs to maintain awareness on software security.The post US Government Issues Guidance on SBOM Consumption appeared first on SecurityWeek. https://www.securityweek.com/us-government-issues-guidance-on-sbom-consumption/Support the show…
…
continue reading
S
Secure AF - A Cybersecurity Podcast


1
Episode 57 - Introducing Phillip Wylie
35:35
35:35
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
35:35
If you follow our socials, you know Phillip Wylie recently joined the Alias crew! We’re excited to welcome him to help us build our team’s presence supporting organizations’ and individuals’ growth in cybermaturity. Join Alias CISO Jonathan Kimmitt to hear his story of getting into cybersecurity, what’s brought him to Alias, and what's to come. Wat…
…
continue reading
C
Cybersecurity Sense


1
PCI Monthly Update: October - New SAQ Review, Focused Look at Requirement 7, and Expert QSA Insights
29:07
29:07
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
29:07
Dive into the latest in the PCI landscape with our October update. We kick off with a news segment spotlighting the new SAQ SPOC (Software PIN Entry on COTS) which includes portions of PCI DSS Requirements 3, 8, 9, and 12. Transitioning to Requirement 7, we discuss restricting access to system components and cardholder data based on business necess…
…
continue reading