Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
Talion Threat Set Radio is your weekly cyber threat intelligence bulletin. We cut through the noise to give you our honest opinion on the threat news that matters.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Defending the Edge is a monthly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as your new hosts as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend ...
…
continue reading
The Security Ledger: Cyber Security News & Analysis for The Internet of Things
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Welcome to MN Health Security, a premier podcast and security content delivery platform developed by William Muenchow. At MN Health Security, our mission is to bring you closer to the forefront of healthcare technology and security. We delve into a wide range of topics that are shaping the future of Minnesota healthcare IT. Each episode features in-depth discussions with industry experts, thought leaders, and innovators, providing valuable insights, expert opinions, and the latest informatio ...
…
continue reading
We live in two worlds, the real world and the cyber world. Both worlds are interconnected and interdependent but very different. Different rules apply. We have no choice but to exist in both worlds. As innovation and digitalization accelerates, we need to understand the risks, consequences and safeguards necessary to safely protect businesses, people and society.Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force hosts the “Cyber Task Force” podcast. In each show, Paul ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
1
Moody's Talks - Focus on Finance
Moody's Investors Service, Ana Arsov, Danielle Reed, Mark Wasden, Bruno Baretta, Donald Robertson
Hosted by Danielle Reed of Moody's Financial Institutions team, Focus on Finance helps you keep on top of developments within the banking, insurance and asset management sectors — from the impact of tech disrupters and cyber risk to the ongoing effects of ESG and lower-for-longer interest rates. Published by Moody's Investors Service.
…
continue reading
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
…
continue reading
The SurfWatch Cyber Chat podcast includes interviews with experts on all things related to cyber risk. Learn what cybercriminals are up to and how it’s impacting businesses from those in the trenches. SurfWatch Labs helps organizations and service providers quickly establish a strategic cyber threat intelligence operation that drives more effective use of their tactical defenses. For more information, visit www.surfwatchlabs.com.
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
We Cover the Cyberspace.
…
continue reading
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
…
continue reading
The FortiGuard Labs Threat Intelligence Podcast provides highlights and commentary about the ever-evolving cyber threat landscape. Join Fortinet’s top threat experts as they delve into today’s critical cybersecurity topics. FortiGuard Labs is the global threat intelligence and research organization at Fortinet. Its mission is to provide customers the industry’s best threat intelligence to protect them from malicious cyberattacks. Using millions of global network sensors, FortiGuard Labs moni ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
…
continue reading
Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
…
continue reading
Welcome to Orpheus Talks, your go-to source for all things cyber threat intelligence and cybersecurity. Join the Orpheus team and other industry experts as they delve into the latest trends and threats in the digital world, and provide actionable insights on how to protect yourself and your organisation.https://orpheus-cyber.com/https://twitter.com/orpheuscyberhttps://www.linkedin.com/company/orpheuscyber/
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Humanity is under serious threat. Individual identity and privacy is dead. Law in every jurisdiction has failed to provide security to identity of individual in Cyber age. Such is the failure of Governmental and democratic and corporate systems that even elections and electoral proceses are not secured. Not even a single election held at any level any part of the world is secure. Elections are easily manipulated with investments at fraction of costs. Election and electoral processes and syst ...
…
continue reading
The podcast making sense of cyber and technology issues impacting business.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
The Castlerea Cybercast, hosted by Austin Farrell and Josh Hawk, brings you the latest news and information from the world of cybersecurity. From ways to protect yourself and your business to news about upcoming changes in the world of cyber, and interviews with industry leaders we have it all right here.
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
…
continue reading
Threat talks is a thought leadership discussion about everything cyber security. We have industry experts talking about current and future threats in the cyber industry. Host: Kevin Golas | Jay Grant | Fabian Franco Send us suggestions for topics and feedback to: E:Mail: threattalks@gmail.com
…
continue reading
"Secured" is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful ...
…
continue reading
The Bee in Cyber Podcast is a brand new UK cyber careers podcast, focussed on the people who work within cyber security. The podcast will interview and showcase the diverse individuals who work in cyber security, their career journeys, and showcase all sides of the cyber hive. This podcast is not just for people who want to be in cyber, it is for all of the worker bees, who are 2 years plus into their career, and now thinking what is next for me? How do I get to where I want to be? We want t ...
…
continue reading
1
Psychology vs. threat actors, AI leveling up, Qilin hit Synnovis
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19
US researches using psychology against threat actors AI leveling up unsophisticated threat actors London Hospital attacks linked to Qilin Thanks to today's episode sponsor, Conveyor Conveyor is the market leading AI-powered platform that automates the entire customer security review process — from easily sharing your security posture and SOC 2 to l…
…
continue reading
1
Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd
50:20
50:20
Play later
Play later
Lists
Like
Liked
50:20
Send us a Text Message. In this episode, Alex Boyd joins Spencer and Brad. Alex is a shareholder in Polsinelli's national Technology Transactions and Data Privacy practice, shares crucial insights for CTOs, IT Directors, CISOs, Security Managers when responding to security incidents. Discover common misconceptions about breaches and the mistakes or…
…
continue reading
1
Decrypting Cyber Threats: Tactics, Takedowns, and Resilience
43:30
43:30
Play later
Play later
Lists
Like
Liked
43:30
Hello to all our cyber pals! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Daniel Blackford, the Director of Threat Research at Proofpoint. The conversation dives into the intricate world of cyber threats and the impact of law enforcement disruptions on malware, botnets, and ra…
…
continue reading
1
Bruce Large discusses the importance of threat modelling in operational technology security
47:55
47:55
Play later
Play later
Lists
Like
Liked
47:55
Summary In this episode of Secured, host Cole Cornford interviews Bruce Large, a security architect and evangelist at Secolve, the OT security specialists in Australia. They discuss the importance of threat modelling in operational technology systems and the need for engineers to consider the potential for cyber attacks. Bruce also shares insights …
…
continue reading
1
S6E16: Alon Schindel - Cloud Threats and Cloud Security Platforms
34:30
34:30
Play later
Play later
Lists
Like
Liked
34:30
- You recently presented at Wiz's MisCONfigured at RSA, where you covered some of the most relevant cloud threats and risks, can you touch on what some of those are? - We know Wiz just announced a massive capital raise and there's been talks about M&A plans for Wiz, I know you help with looking at potential products/firms - what are some key things…
…
continue reading
1
The Outlook for Short-term China-Taiwan Relations
44:34
44:34
Play later
Play later
Lists
Like
Liked
44:34
In this episode of Essential Geopolitics, RANE’s Asia-Pacific Analyst Chase Blazek explains what Taiwan’s new leadership means for the future of the country’s relationship with China. RANE is a global risk intelligence company that delivers risk and security professionals access to critical insights, analysis and support to ensure business continui…
…
continue reading
1
Week in Review: CopIlot Recall disaster, Ticketmaster hack fallout, ChangeHealthcare notification change
26:03
26:03
Play later
Play later
Lists
Like
Liked
26:03
Link to blog post This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guest Andrew Wilder, CISO, Community Veterinary Partners, also cybersecurityintheboardroom.com. Thanks to our show sponsor, Conveyor Why did the AI cross the road? To complete your security questionnaires for you. Conveyor, the company using m…
…
continue reading
Attackers target GitHub repos once again in Ransom-lite extortion. Windows will finally depreciate NTLM, providing transition advice. PoC chaining two flaws for Telerik report released.By Talion Threat Intelligence Team
…
continue reading
1
How Organizations Can Survive and Thrive in the Digital Era
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26
In this episode of RANE Insights, RANE Co-Founder David Lawrence speaks with Sunand Menon about his experience conducting digital transformation and leadership research and his insights into the evolving business landscape in light of the rapid growth of AI. Sunand is the founder of Digital Transformation and AI Enablement Advisory New Media Insigh…
…
continue reading
1
FCC moves forward with BGP security, LockBit victims get lifeline, Gitloker attacks target GitHub repositories
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56
FCC moves forward with BGP security measures LockBit ransomware gang victims get lifeline from FBI Gitloker attacks target GitHub repositories Thanks to today's episode sponsor, Conveyor Why did the AI cross the road? To complete your security questionnaires for you. Conveyor, the company using market-leading AI to automate the entire security revi…
…
continue reading
1
CYFIRMA Research- Vidar Stealer: An In-depth Analysis of an Information-Stealing Malware
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17
CYFIRMA research team has examined a variant of Vidar Stealer malware, and this in-depth examination explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Additionally, it describes the use of social media platforms to procure co…
…
continue reading
1
Japan’s regional banks face rate rises; India’s non-bank finance companies see loan growth
10:53
10:53
Play later
Play later
Lists
Like
Liked
10:53
Moody’s Ratings analysts explain why Japan’s regional banks are vulnerable to yield-curve steepening and predict strong loan growth, and higher funding costs, for India’s non-bank finance companies. Speakers: Kensuke Ogawa, Analyst, Moody’s Ratings; C.J. Wong, AVP- Analyst, Moody’s Ratings Host: Danielle Reed, VP – Senior Research Writer, Moody’s R…
…
continue reading
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. Now What? appeared first on The Security Ledger with Paul F. Roberts.…
…
continue reading
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. Now What? appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Re…
…
continue reading
1
London hospitals hit by ransomware, Christie's stolen data sold, RansomHub claims Frontier breach
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58
Ransomware attack forces London hospitals to cancel operations Christie’s stolen data sold to highest bidder RansomHub claims responsibility for Frontier breach Thanks to today's episode sponsor, Conveyor Conveyor is the AI security review automation platform helping infosec teams automate everything from securely sharing a SOC 2 to one-click auto …
…
continue reading
By William Muenchow
…
continue reading
1
019. Is It Plausible Once The AI Attacks?
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20
In this episode, we sit down with DefendEdge's Security Operations Center (SOC) Director, Aaron Bozek, to explore the frontline defenses and best practices that keep organizations safe in the ever-evolving cybersecurity landscape. Our guest shares insights into the daily operations, challenges, and strategies SOC teams employ to detect and mitigate…
…
continue reading
1
S6E18: Stephen Carter - VulnMgt Modernization & FedRAMP
31:20
31:20
Play later
Play later
Lists
Like
Liked
31:20
- For those don't know your background or Nucleus Security, can you start by telling us a bit about both? - You have experience and a background in the Federal environment, and Nucleus recently achieved their FedRAMP authorization, can you tell us a bit about that process? - When you look at the Federal/Defense/IC VulnMgt landscape, what are some o…
…
continue reading
1
S6E17: Jimmy Mesta - Kubernetes, Runtime and Supply Chains
26:12
26:12
Play later
Play later
Lists
Like
Liked
26:12
- For those unfamiliar, please tell us a bit about your background, as well as about RAD Security. What do you all focus on and specialize in? - Your team recently was part of the RSAC Innovation Sandbox. Can you tell us a bit about that experience, and being able to highlight the innovative capabilities of RAD to such a key audience? - You recentl…
…
continue reading
In this episode of The Cyber Riddler podcast, we venture into the shadowy world of zero-day exploits, one of the most well known threats in the cybersecurity world . Zero-day exploits represent vulnerabilities that can be targeted before they are even known to exist, making them a significant concern for both organizations and individuals. We explo…
…
continue reading
In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals. This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.…
…
continue reading
1
Russian criminals unmasked, Background check firm breach, Creds added to HIBP
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47
Authorities unmask criminals behind malware loaders 3 billion records stolen from background check firm Creds for 361 million accounts added to HIBP Thanks to today's episode sponsor, Conveyor What are infosec teams measuring these days? More often than not, their impact on the business through revenue. A director of GRC told us the most direct val…
…
continue reading
1
Lessons Learned from Responding to Cloud Compromises
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16
Mandiant consultants Will Silverstone (Senior Consultant) and Omar ElAhdan (Principal Consultant) discuss their research into cloud compromise trends over 2023. They discuss living off the land techniques in the cloud, the concept of the extended cloud attack surface, how organizations can better secure their identities, third party cloud compromis…
…
continue reading
1
Cyber Insurance and the Evolution of Cybersecurity, with Sezaneh Seymour
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39
This month’s guest on the Cyber Insider is Sezaneh Seymour. Ms. Seymour is the Vice President and Head of Regulatory Risk and Policy at Coalition – a leading provider of innovative cyber insurance and security services. For nearly twenty years, Sezaneh has held various domestic and foreign policy roles at the nexus of national security, emerging te…
…
continue reading
1
Quantum Computing's Impact on Cybersecurity with Bernie Leung
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32
Explore the intriguing intersection of quantum computing and cybersecurity... It’s closer than you think. In this episode, special guest Bernie Leung from Autodesk shares his expert insights on how quantum computing is reshaping the cybersecurity landscape. Discover the challenges and breakthroughs in encryption practices as Bernie breaks down comp…
…
continue reading
1
Ticketmaster breached, Ticketek Australia breached, HHS notification change
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41
Ticketmaster hack affects 560 million customers, third-party denied liability Australia’s Ticketek sees customer details exposed in cyber security breach HHS changes tack, allows Change Healthcare to file breach notifications for others Thanks to today's episode sponsor, Conveyor Conveyor, the market-leading AI software for answering security quest…
…
continue reading
1
Transformation in Cyber Security Leadership: Carlo Schreurs, Global CISO at FrieslandCampina
48:57
48:57
Play later
Play later
Lists
Like
Liked
48:57
Host Yonatan Lipschitz is joined in this conversation by Carlo Schreurs, Global CISO at FrieslandCampina. Carlo shares his journey from aeronautical engineering to becoming the CISO of Friesland Campina. He discusses the shift from IT to OT security, the importance of a transformational mindset in cybersecurity leadership, and the challenges of sta…
…
continue reading
1
Encore: Diane M. Janosek: It's only together that we are going to rise. [Education]
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34
Commandant for the National Security Agency's National Cryptologic School Diane M. Janosek shares the story of her career going global Diane explains how she's always been drawn to doing things that could help and raise the nation. From a position as a law clerk during law school, to the role of a judicial clerk, and joining the White House Counsel…
…
continue reading
1
174 - Digital Twin Technology And Its Application In Security
38:27
38:27
Play later
Play later
Lists
Like
Liked
38:27
In this week's episode we're exploring an exciting and transformative innovation: Digital Twins technology and its groundbreaking application in cybersecurity. Imagine having a virtual replica of your entire digital infrastructure—a detailed, dynamic model that mirrors every aspect of your environment. In particular, we will look at how this cuttin…
…
continue reading
1
Global Implications of Russia’s Sabotage Campaign
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04
In this episode of Essential Geopolitics, RANE’s Director of Analysis Sam Lichtenstein provides an overview of recent Russian-linked sabotage incidents in Europe and discusses likely scenarios for the evolution of this campaign. RANE is a global risk intelligence company that delivers risk and security professionals access to critical insights, ana…
…
continue reading
1
Week in Review: Arc launch sabotaged, Cencora health breach, BlackBasta’s oil hit
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dimitri Van Zantvliet, CISO, Dutch Railways Thanks to our show sponsor, Vanta Are lengthy security reviews pulling attention away from your security program? With the largest network of Trust Centers, Vanta can help you streamline securi…
…
continue reading
1
Credit-risk transfer transactions’ prominence grows as regulations evolve
18:16
18:16
Play later
Play later
Lists
Like
Liked
18:16
As the regulatory environment continues to evolve, US and European banks have sought regulatory capital relief by offloading the credit risk of loans they make via special types of transactions. Guests: Warren Kornfeld, Senior Vice President at Moody's Ratings; Nick Monzillo, VP-Senior Analyst at Moody's Ratings; Frank Cerveny, VP-Senior Research A…
…
continue reading
1
UnitedHealth responsibility, Europol dropper takedown, malware bricks routers
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11
Senator calls for UnitedHealth leadership to be held responsible Europol seizes 2,000 domains in dropper takedown Malware bricked over 600,000 routers Thanks to today's episode sponsor, Vanta Are lengthy security reviews pulling attention away from your security program? With the largest network of Trust Centers, Vanta can help you streamline secur…
…
continue reading
In this week news: Check Point Zero-day vulnerability. Okta Credential Stuffing. Operation Endgame Targets Botnets.By Talion Threat Intelligence Team
…
continue reading
What happens when two cyber superpowers — and the most populous countries in the world — target one another? Tensions between China and India have been rising in recent years, and it’s time we take a deep dive into the many factors at play. In this episode, Adam and Cristian examine the dynamics between the two nations, the drivers of their evolvin…
…
continue reading
1
CYFIRMA Research- Threat Actors Actively Exploiting CVE-2024-3273: Underground Forums Share IP Addresses of Vulnerable D-Link NAS Devices
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17
Urgent Alert: Hackers are actively exploiting CVE-2024-3273, a critical vulnerability in D-Link NAS devices, with affected device IP addresses being shared on underground forums. With over 90,000 potentially impacted devices globally and inclusion in CISA's Known Exploited Vulnerabilities list, immediate action is crucial to secure data and prevent…
…
continue reading
1
Tunde Benjamin - Finding your Path in Security
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06
We interviewed Tunde Benjamin about his career journey, from deciding quite young he wanted to be a game developer, to working in IT before finding his squiggly path into cyber security management.By Rosie Anderson Bee in Cyber
…
continue reading
1
New NK hackers, Dutch bank breached, Wayback Machine attacked
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43
New North Korean hacking group emerges Dutch bank ABN Amro discloses data breach Internet Archive, including Wayback Machine, impacted by DDoS Thanks to today's episode sponsor, Vanta Are lengthy security reviews pulling attention away from your security program? With the largest network of Trust Centers, Vanta can help you streamline security revi…
…
continue reading
1
teissTalk: Fortifying your cyber defenses as a mid-sized organisation
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44
How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors Investing in autonomous and integrated security platforms without breaking the bank This episode is hosted by Thom Langford htt…
…
continue reading
1
Neue Funktionen von Tresorit (Spring Updates, 2024)
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55
Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024.By Tresorit
…
continue reading
1
Deepfakes pose real credit risk to corporations, financial institutions and governments
11:48
11:48
Play later
Play later
Lists
Like
Liked
11:48
We talk to Joe Lyons of Bitsight about the growing risk from deepfakes in the age of GenAI. Speakers: Joe Lyons, VP, Cyber Risk & Ratings Research, Bitsight; Abhi Srivastava, AVP-Analyst, Moody’s Ratings Host: Danielle Reed, VP – Senior Research Writer, Moody’s Ratings Related Research: Digital Economy – Cross Region: GenAI-powered deepfakes introd…
…
continue reading
1
Episode 94: Defending Against Ransomware Part 2
54:09
54:09
Play later
Play later
Lists
Like
Liked
54:09
Send us a Text Message. In this episode, Brad and Spencer discuss the preparation stage of defending against ransomware. As we know, the time to have a plan is before you enter the woods and cybersecurity is no different. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.com/cyberthreatpov Work wit…
…
continue reading
1
BreachForums returns, First American data breach, Chinese nationals sanctioned
8:17
8:17
Play later
Play later
Lists
Like
Liked
8:17
BreachForums returns just weeks after FBI-led takedown First American data breach impacts 44,000 people Chinese nationals sanctioned for botnet that stole ‘billions’ in COVID-19 relief funds Thanks to today's episode sponsor, Vanta Are lengthy security reviews pulling attention away from your security program? With the largest network of Trust Cent…
…
continue reading
1
S2 Ep11: BISO or CISO - Which one should you hire?
38:45
38:45
Play later
Play later
Lists
Like
Liked
38:45
The emergence of the Business Information Security Officer (BISO) role shows how far security leadership has evolved. But how different is it really from the CISO role? Recruitment expert Ross Tanner debates the difference between the two, and when an organisation should go hunting for each one with ISF analysts Paul Watts and Mark Ward. Other us…
…
continue reading
1
Ransomware uses BitLocker, pharmacy supplier breach, ATM malware threat
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23
New ransomware uses Windows BitLocker to encrypt victim data Sav-Rx discloses data breach impacting 2.8 million Americans New ATM malware poses significant global threat Thanks to today's episode sponsor, Vanta Are lengthy security reviews pulling attention away from your security program? With the largest network of Trust Centers, Vanta can help y…
…
continue reading
1
CYFIRMA Research- Iluria Stealer; a Variant of Another Discord Stealer
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49
The notorious Nikki Stealer group has transitioned into the Iluria Stealer group, maintaining a strong presence with a predominantly Portuguese-speaking user base. Both their websites are hosted by Hostinger, and the current owner, as per his Discord bio, claims to be the former CEO of Nikki Stealer. Dynamic analysis reveals that Iluria Stealer has…
…
continue reading
1
CYFIRMA Research - Synapse Ransomware Technical Analysis
4:41
4:41
Play later
Play later
Lists
Like
Liked
4:41
Meet Synapse ransomware, the newest digital threat on the block. This latest threat, emerging in February 2024, operates under a Ransomware-as-a-Service model, distributing its malicious payload via the dark web. Our research sheds light on the internal working of this malware. Discover how it selectively avoids encrypting Iranian systems, raising …
…
continue reading
1
Arc browser sabotaged, Cencora pharma breach, Albany County breach
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47
Arc browser’s Windows launch sabotaged by malvertising Cencora breach exposed patient info from 11 drug companies Albany County investigating cybersecurity breach ahead of holiday weekend Thanks to today's episode sponsor, Vanta Are lengthy security reviews pulling attention away from your security program? With the largest network of Trust Centers…
…
continue reading
1
Encore: Richard Torres: Getting that level of experience is going to be crucial. [Security Operations]
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59
Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there.…
…
continue reading