The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
This is the replay of my monthly CompTIA Security+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
The Packet Pushers Podcast Network offers continuous professional development for IT professionals. Keep up with networking, security, cloud, career, and more. We bring the IT community together--engineers, architects, vendors, developers, educators, etc. In this feed, listen to every conversation we record!
…
continue reading
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Greg Ferro and Drew Conry-Murray sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a (longis ...
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users -- whether artists, coders, creators, developers, companies, organizations, or communities -- now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. Fro ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Audio files of our weekly radio show on WDBO where we talk about your electronic life. Help and advice are given on a range of technical issues from computers to everything internet-related.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
We Cover the Cyberspace.
…
continue reading
1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Adam Pearce and Adam Wignall from Strawberry7 are here to bring you the latest updates about everything that’s happening around Google Workspace. This podcast is also available in video form on our YouTube channel - youtube.com/strawberry7
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cybersecurity, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber security, co ...
…
continue reading
A show that brings you closer to the cutting edge in computer architecture and the remarkable people behind it. Hosted by Dr. Suvinay Subramanian, who is a computer architect at Google in the Systems Infrastructure group, working on designing Google’s machine learning accelerators (TPU), and Dr. Lisa Hsu who is a Principal Engineer at Microsoft in the Azure Compute group, working on strategic initiatives for datacenter deployment.
…
continue reading
Archive is an investigative documentary series hosted by Tommie Trelawny and Nicky Anderson. Following the success of The Interruption, listeners can expect another captivating story from Season Two: The World's Hardest Puzzle. In 2012, a mysterious organisation known as Cicada 3301 announced itself on the message board, 4chan. The cryptic post appeared online, seeking 'highly intelligent individuals.' What followed became known as the hardest puzzle on the internet. One that took players ac ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Welcome to 'Community Connect,' this is the space where we dive into the benefits of seamlessly integrating security products using open source software and standards, all with the goal of fostering a more interoperable security ecosystem. In each episode, we'll embark on a journey into the heart of the OCA community, engaging in insightful conversations with the individuals who are actively shaping the open source security landscape. Expect to stay up-to-date with the very latest developmen ...
…
continue reading
Uncle Marv’s IT Business Podcast is a show designed for IT professionals and Managed Service Providers. The podcast aims to provide actionable advice and tips that help IT businesses grow and thrive in the competitive tech industry. Each episode covers various topics, from technology updates to marketing strategies, business best practices, and interviews with industry experts.
…
continue reading
1
Cyber Security Today, April 19, 2024 - Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more
4:46
4:46
Play later
Play later
Lists
Like
Liked
4:46
This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international, and moreBy Howard Solomon
…
continue reading
1
2024-04-10 - Vigilante Hackers, Data Sharing, Cybersecurity Taken Over by Computers?
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15
00:00 - PreShow Banter™ — BHIS Bees Corp® 04:08 - The FUTURE IS…… Kickstarter 05:29 - BHIS - Talkin’ Bout [infosec] News 2024-04-08 06:03 - Story # 1: New draft bipartisan US federal privacy bill unveiled 11:03 - Story # 2: How To Opt Out Of GM Sharing Your Driving Data With Insurance Companies 13:04 - Story # 2b: Request a Consumer Disclosure Repo…
…
continue reading
1
We got hacked: Lektionen aus realen Security-Vorfällen (glt24)
48:53
48:53
Play later
Play later
Lists
Like
Liked
48:53
System-AdministratorInnen (Sysadmins) sind dafür verantwortlich, dass die IT-Infrastruktur rund läuft. Dazu gehört auch das Thema IT-Security. Jeder tatsächliche Vorfall bietet dabei wertvolle Erkenntnisse, die uns helfen können, die Systeme widerstandsfähiger und sicherer zu gestalten. Dieser Vortrag gibt einen Einblick in reale Security-Incidents…
…
continue reading
1
New Podcast | Unleashing Innovation through Storytelling: Insights from "What If Instead" Podcast | A Conversation With Hosts Alejandro Juárez Crawford and Miriam Plavin-Masterman | Audio Signals Podcasts ...
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59
Guests: Alejandro Juárez Crawford, Co-Host of What If Instead? Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford Miriam Plavin-Masterman, Co-Host of What If Instead? Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/miriam-plavin-masterman ________…
…
continue reading
1
What does DoD’s CMMC Requirement Mean for American Businesses - Edward Tuorinsky, Mike Lyborg - BSW #347
1:04:41
1:04:41
Play later
Play later
Lists
Like
Liked
1:04:41
Since 2016, we been hearing about the impending impact of CMMC. But so far, it's only been words. That looks to be changing. Edward Tourinsky, Founder & Managing Principal at DTS, joins Business Security Weekly to discuss the coming impact of CMMC v3. Edward will cover: The background of CMMC Standardization of CMMC CMMC v3 changes and implementati…
…
continue reading
1
Network Security News Summary for Tuesday April 23th, 2024
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06
Exposed ICS; Evil XDR; GitLab Comment Bug; Number of Industrial Devices Accessible From Internet Up 30 Thousand over three years https://isc.sans.edu/diary/It%20appears%20that%20the%20number%20of%20industrial%20devices%20accessible%20from%20the%20internet%20has%20risen%20by%2030%20thousand%20over%20the%20past%20three%20years/30860 Evil XDR: Turning…
…
continue reading
Section 702 gets another two years. MITRE suffers a breach through an Ivanti VPN. CrushFTP urges customers to patch an actively exploited flaw. SafeBreach researchers disclose vulnerabilities in Windows Defender that allow remote file deletion. Ukrainian soldiers see increased attention from data-stealing apps. GitHub’s comments are being exploited…
…
continue reading
1
NB475: Cisco Hypes Hypershield; Broadcom Tries To Clarify VMware Strategy
1:00:52
1:00:52
Play later
Play later
Lists
Like
Liked
1:00:52
Take a Network Break! This week we cover Hypershield, a new Cisco security product that uses technology from its Isovalent acquisition. We parse a blog from Broadcom CEO Hock Tan on the company’s VMware strategy, and discuss China’s latest counter-punch in its tech infrastructure fight with the United States. A KPMG survey reveals that executives..…
…
continue reading
1
NB475: Cisco Hypes Hypershield; Broadcom Tries To Clarify VMware Strategy
1:00:52
1:00:52
Play later
Play later
Lists
Like
Liked
1:00:52
Take a Network Break! This week we cover Hypershield, a new Cisco security product that uses technology from its Isovalent acquisition. We parse a blog from Broadcom CEO Hock Tan on the company’s VMware strategy, and discuss China’s latest counter-punch in its tech infrastructure fight with the United States. A KPMG survey reveals that executives..…
…
continue reading
1
Tech Bytes: Begin Your Unified SASE Journey with Next-Gen SD-WAN (Sponsored)
18:40
18:40
Play later
Play later
Lists
Like
Liked
18:40
Secure Access Service Edge, or SASE, combines SD-WAN with cloud-delivered security services including next-gen firewall, CASB, secure web gateway, and others. You can mix and match your SD-WAN and cloud security, but today Rajesh Kari from Palo Alto Networks is here to advocate for the benefits of their single-vendor option. We talk performance, se…
…
continue reading
1
RSA Conference 2024 Keynote: The Cybercrime Unicorns: Exploring the First and Next Decades of Corporate Ransomware | An RSA Conference 2024 Conversation With Mikko Hypponen | On Location Coverage with ...
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23
Guest: Mikko Hypponen, Chief Research Officer (CRO) at WithSecure [@WithSecure] On LinkedIn | https://www.linkedin.com/in/hypponen/ On Twitter | https://twitter.com/mikko At RSAC | https://www.rsaconference.com/experts/Mikko%20Hypponen ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining…
…
continue reading
1
621 Transform Your Profitability with StackTracker
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20
Introducing Stack Tracker for MSPs Colin Knox explains that StackTracker goes beyond just mapping an MSP's technology stack. It focuses on the reseller aspect of an MSP's business, providing insights into the usage, costs, and profitability of the solutions they are reselling to clients. By pulling in data directly from vendors, StackTracker can sh…
…
continue reading
You’ve heard people like me recommend this for years. It’s time to just do it: freeze your credit report. There are really no downsides at this point. For example, it’s now free everywhere in the US, by law. It’s also free to temporarily “thaw” your credit. And it’s gotten a lot easier to do, too. Freezing your credit is your main defense against f…
…
continue reading
1
Cyber Security Today, April 22, 2024 - Vulnerability found in CrushFTP file transfer software, security updates for Cisco's controller management application, and more
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10
This episode reports on a new campaign to steal credentials from LastPass users, a warning to admits of Ivanti Avalanche mobile device management software, and moreBy Howard Solomon
…
continue reading
1
Are Your Discord Messages For Public Sale?
47:45
47:45
Play later
Play later
Lists
Like
Liked
47:45
Episode 174: A new bot is selling your Discord content, DuckDuckGo has announced a new suite of privacy-protecting services, Proton & Standard Notes have joined forces, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps Sources 00…
…
continue reading
1
Network Security News Summary for Monday April 22th, 2024
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36
CVE Changes; CrushFTP 0-Day; GitHub Comment Bug; YubiKey Manager Bug; PAN GlobalProtect Update The CVE's They are A-Changing https://isc.sans.edu/diary/The%20CVE%27s%20They%20are%20A-Changing!/30850 CrushFTP 0-Day Vulnerability https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update https://www.reddit.com/r/crowdstrike/comments/1c88788/situationa…
…
continue reading
1
Encore: Kiersten Todt: problem solving and building solutions. [Policy] [Career Notes]
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in …
…
continue reading
1
Cloud Architect vs Detection Engineer: Mutual benefit. [CyberWire-X]
18:23
18:23
Play later
Play later
Lists
Like
Liked
18:23
In this episode of CyberWire-X, N2K CyberWire’s Podcast host Dave Bittner is joined by Brian Davis, Principal Software Engineer, and Thomas Gardner, Senior Detection Engineer, both from Red Canary. They engage in a cloud architect vs. detection engineer discussion. Through the conversation, they illustrate how one person benefits the other's work a…
…
continue reading
1
04-20-2024 Tech Talk Live! Lots of Great Topics, Callers, Deals
36:58
36:58
Play later
Play later
Lists
Like
Liked
36:58
This is a recording of our Texh Talk Live show on 04-20-2024. This is the recorded live version of the popular Tech Talk Show by Refresh Computers. Listen to callers who phoned in concerning their tech issues and tech suggestions like - What do you think about Chromebooks? Can I bring my old laptop in to be refreshed so I can hand it down to my gra…
…
continue reading
1
The art of information gathering. [Research Saturday]
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48
Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. The rese…
…
continue reading
1
Unveiling the New Short Podcast Format — 7 Minutes on ITSPmagazine | On Location Podcast with Sean Martin and Marco Ciappelli
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02
Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | https://www.itspmagazine.com/sean-martin Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast | https://www.itspmagazine.com/marco-ciappelli Episode Notes In a fast-paced world where…
…
continue reading
Two swift responses to recent cyberattacks. Frontier Communications discloses cyberattack. Texas town repels water system cyberattack by unplugging. List of undesirables falls into the wrong hands. CryptoChameleon phishing kit impersonates LastPass. Ransomware payments trending down in Q1 2024 and a warning for small to medium-sized businesses. US …
…
continue reading
1
Win 95, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland... - SWN #379
34:41
34:41
Play later
Play later
Lists
Like
Liked
34:41
Win 95, Cheat Lab, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-379
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday April 19, 2024
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57
On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT departmentsBy Howard Solomon
…
continue reading
1
HN730: Retail, Healthcare, Manufacturing and More Transform Their Branches with Next-Gen SD-WAN and SASE (Sponsored)
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33
If you haven’t made the leap from traditional wide area networking to SD-WAN, or perhaps you’re thinking about adding security services to your SD-WAN infrastructure, this episode is for you. Rajesh Kari from Palo Alto Networks joins the show to share customer stories from the front lines of multi-branch businesses’ networks. Industry verticals inc…
…
continue reading
1
Cyber Talent Insights: Charting your path in cybersecurity. (Part 2 of 3) [Special Edition]
52:44
52:44
Play later
Play later
Lists
Like
Liked
52:44
Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. In this episode, we shift our point of view to provide guidance for an individual's first career or perhaps conside…
…
continue reading
1
620 Profit First for MSPs: How Lori Hardtke Found Financial Clarity
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49
Lori Hardtke is a solo MSP owner who has been in the IT industry for many years, working in various roles such as IT manager at large companies like Mayo Clinic. Over time, Lori realized that she didn't want the responsibility of managing employees and decided to run her business as a solo operation, leveraging subcontractors when needed. In 2018, …
…
continue reading
1
Network Security News Summary for Friday April 19th, 2024
5:07
5:07
Play later
Play later
Lists
Like
Liked
5:07
Delinea PoC; Ivanti Avalanche PoC; Advanced Phishing Campaign; go-getter update; OfflRouter Virus Delinea Secret Server Authn Authz Bypass https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3 Ivanti Avalanche Poc/Details https://www.tenable.com/security/research/tra-2024-10 Advan…
…
continue reading
Q&A172: Is F-Droid safe to use yet? Where else do we get our news? How should one pick a data removal service? This and more! Join our next Q&A on Patreon: https://www.patreon.com/posts/is-f-droid-safe-102620011 Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. ❤️ Suppor…
…
continue reading
1
From Hackers to Streakers - How Counterintelligence Teams are Protecting the NFL - Joe McMann - ESW #358
1:47:19
1:47:19
Play later
Play later
Lists
Like
Liked
1:47:19
Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann a…
…
continue reading
1
Beyond Borders: Uncovering Cyber Challenges and Innovations in Latin America | A Conversation with Kate Esprit and Marco Ciappelli | Redefining CyberSecurity with Sean Martin
48:48
48:48
Play later
Play later
Lists
Like
Liked
48:48
Guests: Kate Esprit, Senior Cyber Threat Intelligence Analyst, MITRE [@MITREcorp] On LinkedIn | https://www.linkedin.com/in/kate-e-2b262695/ Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli ______________…
…
continue reading
A major Phishing-as-a-service operation gets taken down by international law enforcement. US election officials are warned of nation-state influence operations. The house votes to limit the feds’ purchase of citizens personal data. A Michigan healthcare provider suffered a ransomware attack. Critical infrastructure providers struggle to trust cyber…
…
continue reading