Cybersecurity công khai
[search 0]
Thêm

Download the App!

show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Connect with Renee Small on LinkedIn https://www.linkedin.com/in/reneebrownsmall/ Connect with Christophe Foulon on LinkedIn https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://cpf-coaching.com Develop Your Cybersecurity Career Path: How to Break into ...
 
America’s Leading Cybersecurity Strategist. My team and I start with a scan of all devices on your network to determine what needs to be secured. Then we work with you to develop a complete plan to secure what needs to be secured on your networks. In certain cases, my team and I will help businesses source, monitor, and run their cybersecurity. I've been providing Cybersecurity to enterprises of all sizes, and Federal and State agencies since 1991.
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono imprese, dalle grandi multinazionali alle piccole piccole aziende locali, enti e organizzazioni di ogni ordine e grado, e privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell'attacco, entità della struttura attaccata o danni provocati. Sophos te ne racconta 5 nella stagione 2020 della serie podcast "Sotto Attacco | i grandi crimini ...
 
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
 
C
Cybersecurity Sense

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Hàng tháng
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Cybersecurity on the Front Lines is a new podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Sentinel IPS’ COO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
 
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003, and it quickly became one of North America’s fastest-growing technology companies. At Herjavec Group, your IT security is our topmost priority as we work diligently around the clock to protect the assets of your business including employees, data, IT infrastructure, and information. Recorded and produced by Herjavec Group, The Cybersecurity Cast discusses the latest news, trends, vulnerabilities, and exploits in cybersec ...
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, social engineering scams as well as hints and tips from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware payloads. If you are worried about uneducated emp ...
 
CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Technology Policy Program and the International Security Program. Find the latest research from our scholars and CSIS events on this topic below.
 
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Dr. Rollan Roberts is an advisor and resource to national governments on strong Artificial Intelligence and quantum-proof Cybersecurity and was nominated to Central Command's Department of Defense Civilian Task Force. He is the CEO of Courageous!, a superhuman AI and Cybersecurity research and product development think tank that serves advanced national security initiatives of national governments. He served as CEO of the Hoverboard company, creating the best-selling consumer product worldwi ...
 
Loading …
show series
 
This week Noam Maital, CEO and Co-founder of Waycare Technologies, a subsidiary of Rekor, joins us to share insights on a topic we haven’t yet covered on the podcast – shaping the future of city mobility. Imagine the significant amount of data aggregation and synthesis through AI critical in the management of our roadways, traffic flow and emergenc…
 
Joining us today are Matt Lee and Gerald Auger to discuss the recent actions against REvil and Ukraine under threat. Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, …
 
Do You Have a Smartspeaker? Another Danger Comes Your Way! By now, you've heard of tick talk. You might use Tik TOK. Many people do. It's their go-to site online, especially if you're a little on the younger side. Here is a danger of some of these tick talk challenges and combine that with Alexa. Oh my [Following is an automated transcript] This is…
 
Breaking into Cybersecurity with Zinet Kemal (Legal Intern to Cloud Security Engineer) 1.14.22 Linkedin: https://www.linkedin.com/in/zinet-kemal/ About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our specia…
 
Pete Hanlon is the group chief technology officer for Moneypenny and has spent about 25 years in the IT and InfoSec business. In this episode of Cybersecurity Unplugged, Hanlon discusses: Digital transformation from a business impact point of view; The goal of digital transformation; Building a culture of change with digital transformation.…
 
Haseeb Awan, CEO of Efani explains how a secure cell phone service can prevent SIM swaps, eavesdropping, and location tracking, and explains how a home-based cell tower can be more secure and reduce cell phone costs. Haseeb also talks about Bitcoin ATMs and crypto wallets. https://www.efani.com/Bởi Cybersecurity Secure Talk
 
#CISOThursdays​: Breaking Into Cybersecurity + Alan Alford 01/12/22 It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. James Azar, CISO Talk podcast host & the crew are ready, as always, for a lively discussion. Today's guest is Alan Alford! About Breaking Into Cybersecurity: This series was created b…
 
The FIN7 ransomware group has been sending malware laden BadUSB devices to targets in the United States. https://therecord.media/fbi-fin7-hackers-target-us-companies-with-badusb-devices-to-install-ransomware/ Yealink phones are communicating with Chinese based servers three times a day and are able to review and log all network traffic flowing thro…
 
Breaking into Cybersecurity w Greg Hanniman (Ordinance Disposal to Cyber) 01/07/2022 https://www.linkedin.com/in/greg-hanniman/ https://www.withyouwithme.com About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry…
 
On this episode Eric shows us how to bypass Microsoft Windows Defender with DumpStack log and Mimikatz. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp …
 
#CISOThursdays​: Breaking Into Cybersecurity + Guillaume Ross 01/06/21 It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. James Azar, CISO Talk podcast host & the crew are ready, as always, for a lively discussion. Today's guest is Guillaume Ross! Check out James Azar's presentation at Keynote at Futu…
 
Cali Yost is the leading authority on high performance work flexibility, a visionary workplace futurist, strategist, author and keynote speaker. In this episode of Cybersecurity Unplugged, Yost discusses: The security vulnerabilities that remote work has created; Remote work and its impact on productivity and social conventions; How the reintegrati…
 
Welcome to the end of 2021 episode where Eric and Rachael recap highlights from guests throughout the year hitting on the key topics that dominated the headlines including Log4Shell, Sunburst, Colonial Pipeline, ransomware growth trends, the Biden Executive Order of May 12th, Zero Trust, and the many award-winning books published such as by NY Time…
 
Have You Checked If Your Email Is On The Dark Web? Let's Do It Now! Do you know how to find out if you have had your private information stolen? Well, you know, the odds are probably pretty bad, but where was it stolen? When? What has been stolen? How about your password and how safe is that password? We're going to show you real hard evidence, and…
 
Are You Ready For the Next Hacker Wave? It's Going to Be Brutal! Right now, we're going to talk about this vulnerability, this huge vulnerability in almost the entire internet that will affect your life over the following number of years. And if you're a business, you better pay close attention. [Following is an automated transcript] [00:00:16] Wel…
 
Leadership Edition: Breaking into Cybersecurity w Ron Brash 12/30/21 Ron Brash - https://www.linkedin.com/in/ronbrash/ About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking t…
 
#CISOThursdays​: Breaking Into Cybersecurity + Ryan Leirvik 12/30/21 It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. James Azar, CISO Talk podcast host & the crew are ready, as always, for a lively discussion. Our guest host today is the amazing Ryan Leirvik! Ryan's new book Understand, Manage, and…
 
Rudy Shoushany has wide experience in the information technology field, particularly in the financial sector with over 20 years of experience which gives him the ability to aid organizations. In this episode of Cybersecurity Unplugged, Shoushany discusses: How to tackle the global talent shortage; The differences in the UAE and the US's approach to…
 
Dr. Richard Ford, Chief Technology Officer at Praetorian joins us on the podcast this week to share perspective on Log4Shell that's been making the headlines in recent weeks. He explains why this is the worst zero-day vulnerability the industry has seen in the last ten years, what makes it special and how Log4j's ubiquity in the java world will kee…
 
This episode is meant to spark ideas, stimulate thoughts and hopefully leave you with more questions than answers As you prepare your company for an incident or ransomware event. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj…
 
Joining us from the fantastic vista of Monaco is Mark Arena, CEO at Intel 471 – and he has a great story to tell about the origins of the company name! He also breaks down the ransomware threat over the last couple decades and how they have evolved with the availability of new, faster, better technology as well as a business acumen in creating affi…
 
We've all been there, vendors overpromising, underdelivering and tucking tail to run when confronted. This episode is meant to peel back how we deal with all vendors, and hopefully you can pick up a thing or three. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buyme…
 
2021-12-18 1144 [00:00:00] Well, the tech world is all a buzz with this log for J or log for shell. However you want to call it because we are looking at what is probably the biggest security vulnerability the internet has had in a long time. [00:00:16] This is huge, huge, huge to chew. [00:00:19] I don't know how to express it anymore, but there a…
 
Breaking into Cybersecurity with Brian K (Student to Cyber Analyst) 12.17.21 About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus …
 
Loading …

Hướng dẫn sử dụng nhanh

Google login Twitter login Classic login