Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
疲惫娇娃是一档从荧幕聊到宇宙深处的泛文化播客,用女性的声波延展对世界的参与和想象。 在一个内陷的时代,疲惫娇娃站在中国和美国的交汇点上,用女性的元视角去观察、抵抗、塑造政治和社会对流行文化的影响。我们讨论流动的时代精神、艺术、自由、未来、友谊以及一切使我们获得力量的事物。
…
continue reading
A high action, serial audio drama adventure following the wild lives of those living in the cyberpunk-deco city of Neo-Atlantis, 2112.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Cybernormer er en podcast om teknologi og samfund. Den er produceret at Cybernauterne, et netværk af eksperter i cybersikkerhed, internetkultur og digital forståelse. Læs mere om os på vores hjemmeside cybernauterne.dk
…
continue reading
Cybersecurity Ally is Fortra’s cybersecurity podcast covering security, today’s cyber threats, and everything you need for cyber news today. Listen now!
…
continue reading
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Το Podcast τροφή για το μυαλό σου: συμβουλές για την ζωή στο εξωτερικό, εμπειρίες, συζητήσεις για εκπαίδευση, εργασία και επιχειρείν. Προσθέστε βιβλία και κόμικ.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Een podcast voor, door en over vrouwen in cybersecurity.
…
continue reading
Dark Future Dice is an actual play podcast in which Titus, Lindsay and Sloane delve into the dystopian worlds of Cyberpunk 2020 and Red, weaving narratives that deal with trauma, human connection, and marginalization within an unforgiving dark future. Available on: Spotify: https://spoti.fi/2SG0xtn Apple: https://apple.co/39Fij5M Patreon: https://www.patreon.com/rocketadrift
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Each week Toastie and Jennasis bring you the foundations of the past, the state of Night City today, and news of the future for all things Cyberpunk. We talk about the TTRGP, 2077, and every hidden gem we can find. Subscribe for more Cyberpunk lore, news, and more! Patreon - Get ad-free episodes early & support the show! Behind-the-scenes content and more https://www.patreon.com/cyberpunklorecast Discord: https://discord.gg/JXKfVhm Twitter: https://twitter.com/CyberpunkLore Email: cyberpunkl ...
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
บอกเล่าเรื่องราวในโลกไอทีมาอยู่หน้าไมค์
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email spollock@mcdonaldhopkins.com
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
A podcast for anyone and everyone interested in leadership in the cybersecurity industry - we talk about the challenges impacting our industry & how leadership can address that and gain insights, advice and the occasional anecdote from experienced leaders who are happy to share their stories with us!
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Cybernomics is your backstage pass to the journeys of today’s most inspiring founders and entrepreneurs in tech. Hosted by Josh Bruyning, this podcast goes beyond the pitch decks and funding rounds to explore the real, raw stories behind the people who build innovative companies. Each episode dives into pivotal moments, lessons learned, and the personal growth that fuels success. If you’re a founder, aspiring entrepreneur, or simply curious about the rollercoaster of building a business, tun ...
…
continue reading
High tech, low budget. Library technology, FOSS, and cyberpunk.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with CyberRes, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
…
continue reading
In this episode, we will be sitting down with Filip Stojkovski and Dylan Williams to dive into AI, Agentic AI, and the intersection with cybersecurity, specifically Security Operations (SecOps). I’ve been following Filip and Dylan for a bit via LinkedIn and really impressed with their perspective on AI and its intersection with Cyber, especially Se…
…
continue reading
In this episode, we’re discussing what a seasoned CISO is focused on going into 2025. Mike Whitt is a Cheif Information Security Officer in the financial sector with over 20 years of experience building teams, security programs, and leading organizations to a more secure posture. https://www.linkedin.com/in/mike-whitt-a4b4802/ Blog: https://offsec.…
…
continue reading
1
Ballot Integrity, Tabulators, & Cyber: Talking with an Election Security Official
1:02:16
1:02:16
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:02:16
Michael Moore is the Chief Information Security Office for the Arizona Secretary of State which plays a major role in running elections. We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respond to allegations…
…
continue reading
For this episode of Cyber Focus, host Frank Cilluffo sits down with Eric Geller, a leading cybersecurity journalist who contributes to top outlets like Politico, Wired, and The Record. Together, they unpack Eric's reporting on expectations for changes in AI regulation and cybersecurity under the incoming Trump administration. They also discuss the …
…
continue reading
Senator announces new bill to secure telecom companies Google unveils new quantum chip U.S. sanctions Chinese cybersecurity firm for firewall hacks Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you …
…
continue reading
1
Disclosure Rules Lead To Less Disclosure: Cyber Security Today for Wednesday, December 11, 2024
7:43
SEC Cyber Disclosure Rules, Deloitte Hack Denial, and Critical Microsoft & SAP Patches | Cybersecurity Today In this episode of Cybersecurity Today, host Jim Love delves into the ongoing confusion and compliance struggles faced by companies one year after the SEC's cyber disclosure rules were introduced. We analyze a BreachRx report revealing that …
…
continue reading
In this episode, Rob speaks to Dr. Andrew Reeves, expert in cyberpsychology and current Deputy Director of UNSW Institute for Cyber Security. They discuss the intersection of human psychology and cybersecurity. Andrew shares insights from his groundbreaking research including the first national baseline study on mental well-being in the cybersecuri…
…
continue reading
Microsoft Patch Tuesday December 2024 https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%3A%20December%202024/31508 Ivanty Security Advisory https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-11639-CVE-2024-11772-CVE-2024-11773?language=en_US Visual Studio Code Tunnels https://www.sentinelone.co…
…
continue reading
Fortifying Australia’s Data Resilience and Security Luncheon held 31 October 2024 at the National Press Club in Canberra gathered industry leaders, government officials and cybersecurity experts to explore Australia’s pressing cyber security challenges. As one of the most attacked countries in the world, Australia faces significant threats that dem…
…
continue reading
Episode 89 of the Cyber Law Revolution highlights a crucial shift in mindset regarding how organizations approach relationships in the realm of cybersecurity and privacy. By emphasizing partnerships over traditional vendor or service provider labels, it acknowledges the collaborative effort required to effectively address cyber incidents. This pers…
…
continue reading
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=audio&utm_medium=podcast&utm_campaign=podcast In this episode of Cyber Work Hacks, guest James Stanger from CompTIA dives into the PenTest+ certification. He explains the critical distinctions between pentesting and ha…
…
continue reading
Telecom providers across many countries have been compromised by an APT, which means your text messages may be vulnerable if you text people with different phones, due to insecurities in text message protocols. Fortunately there's some solutions. Sources: https://pastebin.com/pMnEP6Ljتوسط Chloe Thonus
…
continue reading
1
פרק מס' 3 בסדרת "מוצאים עבודה" – איך מתכוננים לראיונות, חידושים בראיונות של מעסיקים, חוזים וטיפים
46:30
חזרת ממילואים ומצאת את עצמך בלי עבודה ופרנסה קבועה רוצה להיכנס להייטק או כול תחום אחר כג'וניור רוצה להחליף מקום עבודה כסיניור רוצה לעשות שינוי כיוון בקריירה שלך סדרת הפודקאסטים הזו נועדה עבורך נחשון פינקו מארח את דפנה הר-לבן מנהלת קשרי הייטק בקריה האקדמית אונו ומנהלת מחלקת גיוסים בעברה. בתפקידה הנוכחי דפנה מסייעת לסטודנטים במכללה במציאת עבודה. הפוד…
…
continue reading
Send us a text Unlock the secrets of safeguarding your digital empire with an urgent cybersecurity update from Sean Gerber on the CISSP Cyber Training Podcast. Imagine a vulnerability so severe it's rated at a critical level of 10—this is the reality for Atlassian Confluence users, and immediate action is non-negotiable. Arm yourself with strategie…
…
continue reading
1
TCW EPISODE 50: What a ride
1:08:49
1:08:49
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:08:49
Last week we had a Live show with Ronald Mugisha, and we felt it right to share the audio of the episode. Thank you for 50 Episodes. Follow Ronald https://www.linkedin.com/in/ronald-mugisha-a8a988143 https://x.com/R24M Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/th…
…
continue reading
In this episode of the Defensive Security Podcast, we discuss the anticipated rise of Mac malware, the economic implications of new top-level domains (TLDs) for phishing, innovative phishing techniques using corrupt documents, and the risks associated with open-source software. We also explore the concept of risk homeostasis in cybersecurity, exami…
…
continue reading
Exclusive interview with Perry Carpenter, a multi-award-winning author, podcaster, and cybersecurity expert. Perry's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, offers invaluable insights into navigating the complexities of AI-driven deception. Send us a text Have a Guest idea…
…
continue reading
Irene van der Zanden, is communitymanager bij het DigitalTrust Center en onder haar leiding is de DTC community gegroeid naar 5000 leden. Dat zijn 5000 securityminded mensen, veelal ondernemers die elkaar helpen, ideeën uitwisselen en Nederland veiliger maken. Wat doet eencommunity manager allemaal en hoe houd je al die nerds een beetje in bedwang?…
…
continue reading
In this episode, Darnley uncovers the chaos caused by the MOVEit hack, a massive data breach affecting millions worldwide. Learn why hackers exploited vulnerabilities to steal sensitive data from major organizations and what it means for personal and global security. Tune in for insights on staying safe in an increasingly vulnerable digital world. …
…
continue reading
In this episode… Bradley Enneking discusses the monumental task of consolidating 36 acquired banks into a unified operating company under the HTLF brand. He shares how standardizing processes across 11 distinct brands was the most challenging yet rewarding aspect of the transformation. While unifying technology was relatively straightforward, Bradl…
…
continue reading
The Bottom LineCash! We talk about funding cyber security, when you need funding, and top tips on how to secure funding.If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.comMusic is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA …
…
continue reading
Welcome To C.S. Cyber, Thanks For Clicking And Enjoy The Episode! gocybercollective.org ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberde…
…
continue reading
Diverse threat vectors and complex attacks - how to expand your detection and response programmes Helping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providers Pathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford: https://ww…
…
continue reading
Demystifying Cybersecurity: A Beginner's Guide In this episode of Cybersecurity Diaries, Nathan from Station X offers a comprehensive introduction to cybersecurity. He explains its importance in protecting our digital assets and dives into the various domains within the field, including security architecture, application security, risk assessment, …
…
continue reading
Welcome back, everybody, to this groundbreaking episode of New Cyber Frontier! Today we have our two hosts Shawn Murray and Dr. Gorog finally together after quite some time. This is Mr. Murray’s 20th year in business at Murray Security bringing to you new and exciting projects that he has in store. Both hosts will be informing you on the status and…
…
continue reading
In today’s podcast we cover four crucial cyber and technology topics, including: 1. Bologna FC has data stolen in ransomware attack 2. Russia arrests notorious malware developer 3. UK to allow Chinese takeover of scientific firm 4. UN to investigate undersea cable resiliency I'd love feedback, feel free to send your comments and feedback to | cyber…
…
continue reading
Click here to send us your ideas and feedback on Blueprint! Mark Morowczynski returns for his 4th(!) time with his Microsoft coworker and identity and authentication expert Tarek Dawoud in this incredibly insightful conversation on the what, why, and how of phishing resistant credentials that YOU can implement right now! This conversation covers: W…
…
continue reading
Cyber Inspiration Podcast: Featuring René-Sylvain Bédard In this episode of the Cyber Inspiration Podcast, we sit down with René-Sylvain Bédard, the visionary Founder and CEO of Indominus and a newly published author. 🎙️📚 René shares his journey of building a cutting-edge company while embracing the creative process of writing his first book. He op…
…
continue reading
Content warning: This episode includes discussion involving imaged based abuse, child sexual abuse, violence and suicide. Please listen with care. If content raises anything for you, please seek support by contacting Lifeline on 13 11 14 or via the website https://www.lifeline.org.au/. Sit down with us in the CyberCX lounge at SXSW as we interview …
…
continue reading
1
Episode 15: The Best Practices for Building a Transparent Cyber Security Consultancy with Matt Strahan
1:19:41
1:19:41
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:19:41
Can you believe there was a time when cybersecurity wasn’t a priority for most organizations? Just 20 years ago, simple passwords and basic firewalls were seen as enough protection. So, what changed? How did we go from minimal defenses to a world where cybersecurity is critical for survival? In this episode of the Cyber Consulting Room podcast, hos…
…
continue reading
In this episode, we chat with Melissa Gurney, CEO of Punk Security about her background in the RAF, her career and her thoughts and views on leadership; ranging from working with remote teams and compassion at work to experiencing bias and Melissa's rekindled love - trail running!توسط Leading Cyber
…
continue reading
In this episode of the cyber riddler, we talked about the critical first stage of cyberattacks: Initial Access. Learn how hackers breach organizations using tactics like phishing, exploiting vulnerabilities, stolen credentials, and supply chain attacks. We’ll explore real-world examples, discuss why initial access is so crucial, and share practical…
…
continue reading
サウナのようにホットなセキュリティトレンド、テクノロジー、インサイトをお届けするポッドキャスト『Cyber SecurityサウナJapan』。第17回目は前回に引き続き、IT系記者さん2人を交えての「中小企業のセキュリティ対策」を取り上げたディスカッションの後半をお届けします。توسط WithSecure
…
continue reading