Cyber عمومی
[search 0]
بیشتر

برنامه را دانلود کنید!

show episodes
 
Cyberbacker: To empower growth-minded, emerging business owners with world-class, economical leverage to fulfill their greatest purpose! To know more about us visit www.cyberbacker.com
  continue reading
 
Dark Future Dice is an actual play podcast in which Titus, Lindsay and Sloane delve into the dystopian worlds of Cyberpunk 2020 and Red, weaving narratives that deal with trauma, human connection, and marginalization within an unforgiving dark future. Available on: Spotify: https://spoti.fi/2SG0xtn Apple: https://apple.co/39Fij5M Patreon: https://www.patreon.com/rocketadrift
  continue reading
 
S
Simply Cyber

1
Simply Cyber

Gerald Auger, PhD

Unsubscribe
Unsubscribe
روزانه
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
  continue reading
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Each week Toastie and Jennasis bring you the foundations of the past, the state of Night City today, and news of the future for all things Cyberpunk. We talk about the TTRGP, 2077, and every hidden gem we can find. Subscribe for more Cyberpunk lore, news, and more! Patreon - Get ad-free episodes early & support the show! https://www.patreon.com/cyberpunklorecast Discord: https://discord.gg/JXKfVhM Twitter: https://twitter.com/CyberpunkLore Email: cyberpunklorecast@gmail.com https://fanrolldi ...
  continue reading
 
Are you a cybersecurity professional who wants to be updated with the latest industry news, emerging threats and challenges but you've got no time to wade through white papers or the tech press? Are you a passionate person about cybersecurity who just wants to learn more on how to protect information? We've got you covered. The Cyberstar Talk's Podcast allows you to stay up to date as you’re going on with your daily grind. This channel will provide you with a bunch of exclusive and best inte ...
  continue reading
 
C
Cyber Crime Junkies

1
Cyber Crime Junkies

Cyber Crime Junkies-David Mauro

Unsubscribe
Unsubscribe
هفتگی+
 
Socializing Cybersecurity. Our mission is to keep you, your family and your organization's brand safe. We interview Leaders who build and protect great brands, provide advice on how to advance your career and even break into the Cybersecurity field. Become a Cyber Crime Junky! New Episodes weekly.
  continue reading
 
C
Cybersecurity Sense

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
ماهیانه
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
  continue reading
 
C
Cyber Inspiration

1
Cyber Inspiration

Evgeniy Kharam and Security Architecture

Unsubscribe
Unsubscribe
هفتگی
 
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Alias Secure AF Cybersecurity Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cybersecurity topics with coworkers and special guests. No matter where you are on the cybersecurity knowledge ladder, there's an episode here for you.
  continue reading
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/
  continue reading
 
“In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened." I am Alberto and this podcast is about my story, cybersecurity and hackers. https://podcast.darkweb.today/ https://twitter.com/ADanielHill https://twitter.com/Darkwebtoday https://darkweb.today http ...
  continue reading
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
  continue reading
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
  continue reading
 
Loading …
show series
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Asses…
  continue reading
 
Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real life individuals. A compelling em…
  continue reading
 
This episode reports on the BlackSuit ransomware strain, an expected EU privacy fine against Microsoft, a warning about an attack on web sites and moreتوسط ITWC
  continue reading
 
Xplain hack impacts Swiss cantonal police and Fedpol BlackSuit shows similarities to Royal Microsoft is retiring Cortana on Windows Thanks to this week's episode sponsor, Trend Micro Hybrid work, cloud adoption, and shadow IT have introduced new cybersecurity risks to organizations. Security leaders are left asking, “How can I manage our expanding …
  continue reading
 
Tech evangelist Huxley Barbee from runZero talks about asset detection, and yes, just asset detection. Learn about the day-to-day work of asset detection and asset mapping. Go beyond the theory and speculation about whether the U.S. federal government will implement it on time, and join Barbee as he walks you through how it’s all done and what you …
  continue reading
 
Critical Vulnerability in MoveIT Transfer Actively Exploited https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023 https://www.rapid7.com/blog/post/2023/06/01/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability/ https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft Atomic Wallet Co…
  continue reading
 
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Edgard Capdevielle of Nozomi Networks. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/…
  continue reading
 
Customs and Border Protection is scanning people’s social media, the feds have arrested some swatters, and the FTC has ordered Ring to cough up a fine. This week on Cyber, Motherboard’s premier cyber crime reporter Joseph Cox is back to walk us through the latest in privacy violations done by Washington and the private sector. We’ll also take anoth…
  continue reading
 
- First off, can you each tell us a bit about your backgrounds and experience in the space? - What made you all decide to found Stacklok, what gaps and opportunities in the ecosystem did you see? - What are your thoughts around the industry's response to software supply chain security and how do you see things such as OSS and Sigstore playing a rol…
  continue reading
 
China's Volt Typhoon snoops into US infrastructure, with special attention to Guam. Is CosmicEnergy just red-teaming, or is it a threat straight out of Red Square? Siemens patches a vulnerability endemic to the energy sector. An update on the Vulkan Papers. A cyberattack leads Suzuki to shut down its Indian production line. BlackBasta conducts rans…
  continue reading
 
English Episode Nachshon Pincu hosts Brigadier General (res.) Daniel Bren, Co-Founder and CEO at Otorio, In a conversation about cyber defense and regulation. Cyber security on a national scale and the significant role of IDF Cyber Defense Brigade. About Otorio? How to deal with critical infrastructure cyber defense on a national scale? What is the…
  continue reading
 
Welcome to Cyber Inspiration Podcast, you may be familiar with me as Co-host of the Security Architecture Podcast, which I started with Dmitry Raidman CTO of Cybeats in 2020. From the Episode If you want a very successful early on, you have to have A players. The question then is, how do you identify A players? What is an A player? There's a lot of…
  continue reading
 
In today’s podcast we cover four crucial cyber and technology topics, including: 1. Emby shuts down servers to address ongoing attack 2. SimpleTire exposed user data for at least 3 weeks 3. MCNA dental data leaked following failure to pay ransom 4. DeFi project Jimbos Protocol abused to steal 7.5 million USD I'd love feedback, feel free to send you…
  continue reading
 
Jane Lo, Singapore Correspondent speaks with Yakir Kadkoda, Security Researcher and Ilay Goldman, Security Researcher with Aqua Security Yakir Kadkoda combines his expertise in vulnerability research with a focus on discovering and analyzing new security threats and attack vectors in cloud native environments, supply chain security, and CI/CD proce…
  continue reading
 
Cyber, Cyber… Raport to specjalna edycja naszego podcastu. Co tydzień opowiadamy o najważniejszych wydarzeniach z cyberprzestrzeni. Dzisiejszy odcinek prowadzi Kamil Gapiński i Piotr Kępski. Zapraszamy! Dzisiejsze tematy: Apple łata ~40 podatności w iPhone, w tym luki wykorzystywane aktywnie w realnych atakach CERT-UA zidentyfikował nowy malware w …
  continue reading
 
Cybersecurity authorities are issuing this joint Cybersecurity Advisory to highlight a recent cluster of activity associated with a People’s Republic of China state-sponsored cyber actor, also known as Volt Typhoon. AA23-144A Alert, Technical Details, and Mitigations Active Directory and domain controller hardening: Best Practices for Securing Acti…
  continue reading
 
CAT Labs CEO and founder Lili Infante worked as a special agent for the U.S. Department of Justice for 10 years specializing in cryptocurrency’s use in dark web investigations. Infante gives us the insider’s view of dark web investigations, why it’s so difficult to prosecute dark web actors when anonymity extends up and down the hierarchy, the curr…
  continue reading
 
LoLBins or Living Off The Land Binaries are binaries within the operating system it doesn't matter if it's a windows or unix based system. these binaries are heavily utilized by hackers to avoid detections, in this episode we will be diving into the world of LoLBins and we will discover how hackers are using them. Twitter: @almorabea Twitter: @Cybe…
  continue reading
 
Welcome back to the show! Today we have guest Amit Serper Director of Security Research at Sternum. At Sternum, Mr. Serper is tasked with researching hardware or "Hardware Hacking," where he takes apart specific devices to gain access to them. Mr. Serpers say's, "Our approach to security at Sternum is, we know those devices are vulnerable for vario…
  continue reading
 
Loading …

راهنمای مرجع سریع