Cybersecurity công khai
[search 0]
Thêm
Download the App!
show episodes
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
  continue reading
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
  continue reading
 
Welcome to "Cybersecurity for Your Mom," the podcast where Joey breaks down the complex world of cybersecurity for everyone to understand. Join host Joey Wagner as he takes you on a journey through the ever-evolving landscape of cyber security. In each installment, Joey will demystify the intricacies of cybersecurity, offering insights into current events, in-depth discussions on cutting-edge cybersecurity topics, and the latest trends in the technology industry.
  continue reading
 
Cybersecurity affects us all whether we are at home, managing a company, supporting clients, or even running a state or local government. Join the Center for Internet Security’s Sean Atkinson and Tony Sager as they discuss trends and threats, ways to implement controls and infrastructure, explore best practices, and interview experts in the industry. If you are interested in learning more about how to grow your cybersecurity program, CIS and its volunteer community are here to bring clarity ...
  continue reading
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Interviews with founders, startup-advising CISOs, venture capitalists, and analysts discussing the issues of cybersecurity, new threats, and emerging technology. The Genealogy of Cyber Security brings listeners into forward-thinking conversations with industry visionaries, to explore big ideas, and discuss out-innovating the competition.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cybersecurity, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber security, co ...
  continue reading
 
Join James Farrow, the voice of Cyft.ai, as he explores the brightest minds in cybersecurity. Each week, he embarks on a deep dive into often-overlooked topics with industry experts. On this journey, you'll be exposed to game-changing insights, all designed to help you fortify your business and grow your career. Thanks for tuning in.
  continue reading
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
  continue reading
 
C
Cybersecurity Sense
Series avatar that links to series pageSeries avatar that links to series page

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Hàng tháng
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
  continue reading
 
Security and cybersecurity are critical concerns for any modern business, and startups are no exception. In order to compete in the digital age, startups need to be aware of the latest security threats and have a plan to protect their data and systems. The Startuprad.io security and cybersecurity track is designed to help companies stay ahead of the curve. We interview entrepreneurs who are active in the space and bring you the latest news from the world of cyber security. Our goal is to hel ...
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
  continue reading
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
  continue reading
 
Shon Gerber from the Reduce Cyber Risk and CISSP Cyber Training podcasts provides valuable insight, guidance, and training to you each week that only a senior cybersecurity expert can perform. Shon has over 21+ years of experience in cybersecurity from large corporations, government, and even as a college professor. Shon provides you the information and knowledge you need pass the CISSP exam the first time along with practical steps needed to enhance and grow your cybersecurity career. Shon ...
  continue reading
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè Questo show fa parte del network Spreaker Prime. Se sei interessato a fare pubblicità in questo podcast, contattaci su https://www.spreaker.com/show/4610094/advertisement
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by The CyberWire as a public service.
  continue reading
 
The Cybersecurity Startup Revenue Podcast helps startups grow sales faster. Whether you are a seller, marketer, leader, or founder, you hear proven strategies to help cybersecurity startups get more leads, more customers, and optimize their marketing and sales processes. All from people who know a thing or ten about building great cybersecurity startups. For sales rep, VP Sales, CRO, marketing, CMO, founder, CEO, and investors at cybersecurity startups. Guaranteed* to be the best resource fo ...
  continue reading
 
Loading …
show series
 
Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. The stories we’re covering today. Marcel Brown: December 6, 1994. Apple sues the San Francisco Canyon Company, alleging they helped Intel and Microsoft steal co…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-access-the-dark-web-methods-for-android-and-pc. Explore the depths of the Dark Web safely. Learn how to use Tor, understand its risks, and access it securely on Android and PC. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
  continue reading
 
Wie ist das denn mit dem Homeoffice aus Sicht der Cybersicherheit? Und des Datenschutzes, und, und, und... Das Ganze natürlich so, dass man das beim Mittagessen versteht, und ohne, dass Ihr Essen kalt wird! Website: https://www.4s-ag.de LinkedIn | FacebookBởi 4S IT-Solutions AG
  continue reading
 
Welcome to Reimagining Cyber, where we explore the evolving role of the Chief Information Security Officer (CISO). In this special episode, Stan and Rob present a compilation of insightful clips from previous episodes. First up, Parham Eftekhari, Executive Vice President of the Cyber Risk Alliance, discusses the transformation of the CISO role into…
  continue reading
 
Breaking into Cybersecurity with Brad Rager Brad Rager on Linkedin - https://www.linkedin.com/in/brad-rager/ Sponsored by CPF Coaching LLC - http://cpf-coaching.com The Breaking into Cybersecurity: It’s a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how t…
  continue reading
 
We’re excited to welcome to the podcast Lauren Zabierek, Senior Policy Advisor to the Cybersecurity and Infrastructure Security Agency (CISA). She deep dives into CISA’s Secure by Design principles and approaches for secure by design software launched in April 2023 - with version two published on October 17, 2023. Lauren shares insights on the path…
  continue reading
 
We delve into the intricate world of operational technology (OT) cybersecurity with industry expert Dave Purdy. With his extensive experience transitioning from IT to OT, Dave discusses the unique challenges and vulnerabilities in protecting critical infrastructure and industrial networks. He shares his insights on safeguarding legacy systems, the …
  continue reading
 
Get ready to get cyber fit with us! Join us as we unwrap Yale University's cybersecurity awareness program in 2023, reveal our upcoming plans, and guide you on defending against a prevalent cyber threat - domain spoofing. Alongside our boss, Jess Flower, we'll journey through the past year, reminiscing about our favorite moments, from engaging work…
  continue reading
 
This week: 3 – Backups are important even when you use the cloud. 2 – You need to check all of your doorways. 1 – Why the pain of DORA will be worth it. Links to all articles can be accessed from https://codeinmotion.ie/cyber321-20231203/ ---------------------------------------------------------------------- Hi, I'm Sam Glynn. If you are accountabl…
  continue reading
 
In this episode, host Bidemi Ologunde presented five stories from obscure corners of the news media and the internet. 1. Amsterdam, Netherlands 2. Lagos, Nigeria 3. Milan, Italy 4. Rio de Janeiro, Brazil 5. Paris, France Support the showBởi Bidemi Ologunde
  continue reading
 
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security implications of the new Apple iOS NameDrop feature.Bởi Enterprise Management Associates + DEVOPSdigest
  continue reading
 
Sean Mahoney and Will Lassalle catch up on the current state of cybersecurity, recent data breaches, the impact of regulations, and where opportunities for the future seem to be regarding compliance and cyber risk. Mentioned in this episode: Podcast Outro BumperBởi Netswitch Technology Management
  continue reading
 
About Don C. Weber: Don C. Weber is the Principal Consultant and Founder of Cutaway Security, LLC, an information security consulting firm based in Texas. With a master's degree in network security and a Certified Information Systems Security Professional (CISSP) certification, Don has a wealth of expertise gained over two decades. As a seasoned le…
  continue reading
 
Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats. By integrating relevant threat intelligence feeds, security teams gain insights into the tactics, techniques, and procedures employed by malicious actors. This aids in swift detection and response to potentia…
  continue reading
 
Like what you hear? You can tip us here: https://www.buymeacoffee.com/Startuprad.io Welcome Welcome to our November 2023 wrap-up with vital news from the startup scenes in Germany, Austria, and Switzerland in 30 minutes or less 🙂. Our Highlights AI startup Aleph Alpha raises half a billion dollars, CMBlu raises 100 mn € for energy storage, WeFox ge…
  continue reading
 
GRU's Sandworm implicated in campaign against Danish electrical power providers. Paris wastewater agency hit by cyberattack. LockBit hits Boeing. Bletchley Declaration represents a consensus starting point for AI governance. The US Executive Order on artificial intelligence is out. Guest Austin Reid of ABS Group discusses Ship and Shore challenges …
  continue reading
 
What if you could protect your cryptocurrency from hackers with just a few simple security measures? That's what we're diving into today in our exploration of the fascinating yet terrifying world of SIM Swaps and cryptocurrency security. We'll shed light on a real-life cautionary tale of a victim who lost his cryptocurrency to these cunning cyber c…
  continue reading
 
On this episode of No BS Cybersecurity, James is joined by Ayman Elsawah, Fractional CISO and Founder at Cloud Security Labs. Join them as they delve into: Foundational security measures for startups Why cybersecurity isn’t black and white - it’s gray The need to simplify cybersecurity Scenarios startups may find themselves in with security Why sec…
  continue reading
 
https://www.yourcyberpath.com/110/ In this episode, hosts Kip Boyle and Jason Dion discuss the topic of ageism in cybersecurity careers. They address a listener's question about whether it is too late for a career change into cybersecurity at the age of 60-65. The hosts acknowledge that ageism does exist in the industry, but they provide tips and s…
  continue reading
 
In episode 70 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Mathew Schwartz, Executive Editor for DataBreachToday & Europe at the Information Security Media Group (ISMG). Together, they discuss the media's role in shaping public understanding and perception of infosec. They begin by considering the idea of media channels helpin…
  continue reading
 
🎙️ Get ready for another episode FortinetLIVE as #Fortinet’s Chris Hinsz and Sandip Borle discuss our latest #FortiSwitch 600 and 2000 series product releases, and highlight Fortinet’s secure connectivity platform. Learn more about the new FortiSwitch: https://www.fortinet.com/blog/business-and-technology/fortiswitch-solutions-for-evolving-campus?u…
  continue reading
 
In a digital realm rife with misinformation, the guys dissect the reliability of cyber score sites like Security Scorecard that rate the security level of companies. They discuss the repercussions of false ratings and the pressures on organizations to pay for correcting misleading information. Breaking down real-world examples to a technical level,…
  continue reading
 
Enjoy this fireside chat with Jason Chan, former head of information security at Netflix and operating advisor, Bessemer Venture Partners. Jason joins SecurityWeek editor-at-large Ryan Naraine for a frank discussion on the state of vulnerability management and software development, multi-cloud deployments and expanding attack surfaces, the cyber st…
  continue reading
 
In this week's episode of the Kill Chain podcast hosts Terry Reinert and Marcus Q discuss the use of AI in creating automotive insurance policies and rates. The evolving field of AI can create more personalized rates and change the way insurance providers look at driving habits. Want to learn more about securing your fleets, platforms, or mission c…
  continue reading
 
Talon Founder Ofer Ben-Noon describes what it was like to win Innovation Sandbox in Interview with Ofer Ben-Noon, Founder of Innovation Sandbox 2022 champion Talon Cyber Security. Ofer discusses how Talon’s enterprise browser, is poised to reshape the landscape of cybersecurity. Its easy deployment onto all devices, including unmanaged ones, the en…
  continue reading
 
CISA, NSA, and ODNI issue new guidance on managing open source software and SBOMs to maintain awareness on software security.The post US Government Issues Guidance on SBOM Consumption appeared first on SecurityWeek. https://www.securityweek.com/us-government-issues-guidance-on-sbom-consumption/Support the show…
  continue reading
 
If you follow our socials, you know Phillip Wylie recently joined the Alias crew! We’re excited to welcome him to help us build our team’s presence supporting organizations’ and individuals’ growth in cybermaturity. Join Alias CISO Jonathan Kimmitt to hear his story of getting into cybersecurity, what’s brought him to Alias, and what's to come. Wat…
  continue reading
 
Dive into the latest in the PCI landscape with our October update. We kick off with a news segment spotlighting the new SAQ SPOC (Software PIN Entry on COTS) which includes portions of PCI DSS Requirements 3, 8, 9, and 12. Transitioning to Requirement 7, we discuss restricting access to system components and cardholder data based on business necess…
  continue reading
 
Loading …

Hướng dẫn sử dụng nhanh