show episodes
 
Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Think Cyber Secure uncovers the hidden gaps in your business that cause cyber risk and fixes them resulting in a stronger and more secure business. Learn how to embrace technology without worrying about the cybersecurity risks
 
Reformed Hacker Bastien Treptel and the Team at CTRL Group take us through managing our cyber risks and security in an age where cyber-attacks can be carried out with ease. Detailing risks in the Start-Up, SME industries and cloud services as well as giving us an insight into how secure we are in our very own homes.
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
 
Welcome to the Cyber Coalface a fortnightly Purple Team Cyber Podcast covering the whole cyber threat, hosted by myself David Tyler and JayJay Davey two UK Military Veterans who ended up in Cyber Security.Join us today as we cover aspects affecting Cyber Security from the perspective of a Red Teamer and Blue Teamer. This podcast is ideal for anyone in the Cyber or Infosec field, come and listen to those on the Cyber front lines!
 
Each month, on “Be Cyber Safe,” we interview leading figures in cyber security and law enforcement, thought leaders from the technology sector, business, and government technology experts. We provide insight for cyber security professionals and useful information for everyday people to live cyber safe. We also produce weekly cyber tips that you’ll find here too. They are short reminders for IT pros and helpful tips to improve your cyber security at home and the office.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over four million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
We live in two worlds, the real world and the cyber world. Both worlds are interconnected and interdependent but very different. Different rules apply. We have no choice but to exist in both worlds. As innovation and digitalization accelerates, we need to understand the risks, consequences and safeguards necessary to safely protect businesses, people and society.Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force hosts the “Cyber Task Force” podcast. In each show, Paul ...
 
Cybersecurity made simple. Come on a journey with our host Darnley G, to bring you through the rollercoaster of information security. We will discuss topics about any cybersecurity trending news, how to's, facts, who's been hacked, and even some tips to protect your business from cybercrime. Grab a cup of caffeine and enjoy!
 
Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organ ...
 
The real news... remixed! Media Monarchy is an independent news source which has grown to include the 'New World Next Week' video series with Corbett Report, the new music show called 'Pump Up Tha Volume' + interviews and extras from the worlds of food, technology, the occult and much more... http://feeds.feedburner.com/mediamonarchy
 
This is a weekly round-up of the most compelling cyber security intelligence originating from The Record and Recorded Future's research team — Insikt Group. Recorded Future is the global leader in security intelligence and every Friday we'll be highlighting the latest intelligence from criminal activity and nation state sponsored cyber campaigns to geo-political developments. Whether you're responsible for improving operational cyber security or strategically reducing risk, this podcast is f ...
 
The Voice of Cyber - KBKast brings you interviews, discussions and presentations from global leaders across information security and emerging technology. We spend time, understanding what they do, and unpacking their thoughts on the constantly evolving technology and people elements in the security industry as they pertain to an executive audience.
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Managing Director Steve Durbin speaks with rule breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
 
Loading …
show series
 
Did you know that 43% of small businesses are victims of cyber attacks and only 14% of all small businesses are protected? As a business owner you take risks everyday. Why do you take risks with your cyber security? One incident can paralyze your business, destroy your relationship with your clients, and make the sensitive and personal information …
 
In the second and final episode in a series for CYBER on neo-Nazi terror group the Base, we dive into its origins: The online brainchild of its leader Rinaldo Nazzaro, an ex-Pentagon contractor with alleged links to the Kremlin (which he denies) who began his project for “race war” as a WordPress site that evolved into a secretive, encrypted chat g…
 
This week on The Cyber Tap, Mat and Mike welcome...well themselves. Join them as they recap this season, chat about what's happening at cyberTAP, and as always break down the latest cyber news. Links from the episodes: Jim Browning Youtube - https://www.youtube.com/channel/UCBNG0osIBAprVcZZ3ic84vw ------------------------- Follow us on all the thin…
 
Lory's experience includes being a managing director with blockchain technology product company ConsenSys, where he led ConsenSys Ireland, co-led global partnerships and was part of the global leadership team. Prior to ConsenSys, Lory was a Partner with Deloitte China and a Director with Deloitte Ireland where he founded, set up and ran Deloitte’s …
 
The Special Case of TCP Resets https://isc.sans.edu/forums/diary/The+special+case+of+TCP+RST/26824/ VMWare Workspace Vulnerability https://www.theregister.com/2020/11/24/vmware_urges_sysadmins_to_implement/ Holiday Hack Challenge 2020 https://holidayhackchallenge.com/2020/By Johannes B. Ullrich, Ph.D.
 
This episode talks about the COVID-19 related Phishing tactics. This podcast has been fully transcribed and can be found here. After listening please visit National Cyber Security Centre, Action Fraud, Take Five and the West Midlands Cyber Protect Websites for more guidance on all things relating to online Security. Please forward any Phishing emai…
 
Another day, another breach. Organisations are still being hacked by malicious counterparts everyday, and the reason they're always a step ahead is not only gender diversity but a skills diversity as well - meanwhile we're still relying on our IT departments to handle cyber breaches that they simply weren't trained for. Ex-Hacker and Co-founder of …
 
You might have guessed from the title, but in this episode, we’re looking at how to hack an election. It’s basically one long “hackers could…” feature. We cover everything from outright deception to social engineering to power cuts to…well, real hacking. Naturally, we couldn’t have this conversation without Cambridge Analytica, the 2016 election an…
 
Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and Cybersecurity Practice Lead at Focal Law Group, discuss the “lessons learned” from the Capital One Consumer Data Security Breach litigation ruling relating to the attorney-client privilege for data breach reports.By Kip Boyle
 
Joining us this week is Pierre Noel, managing director for Europe at Astari, a company providing global cyber resilience services for businesses. Pierre Noel has enjoyed a remarkably broad professional career, with time spent at IBM, KPMG, Microsoft and Huawei, in both deeply technical and business roles. He shares his insights on the ways culture …
 
John Ford is the Cybersecurity Strategist at IronNet and is an information security veteran with over twenty years in a wide variety of roles. Prior to IronNet, John was CISO for ConnectWise, the global leader in providing software solutions for Managed Services Providers. In this role, he was accountable for customer-facing security activities, pr…
 
Today we’re talking cloud security and work-from-home. If you’ve ever checked your work email on your personal phone – I know you have, because we’ve all done it! – or touched up some time-sensitive spreadsheets on the same ipad your kids use to play Animal Crossing, Terence Jackson, Chief Information Security & Privacy Officer of Thycotic, is goin…
 
Learning some interesting things about ITIL and Microsoft 365 conditional access. ITIL will help us organize Section 9. 365 conditional access will help us lock down Azure AD. This should make it harder for the hackers to get in. LINKS 1. ITIL - Wikipedia Article for those who don’t know what this is 2. What is Conditional Access? 3. Manage emergen…
 
As Chief Security Officer, Errol Weiss is responsible for the strategic vision and direction of the H-ISAC’sday-to-day Cyber and Physical Security Services offered to H-ISAC member organizations, including the delivery of Cyber and Physical Threat Intelligence, the H-ISAC Security Operations Center (SOC), Identity services, community exercises and …
 
In a year unlike any other, holiday shoppers are dealing with changes as well. The tradition of a one-day Black Friday (and Cyber Monday) sale, has been replaced with a month-long drip of deals. Our guest Dan Lohrmann dubs this COVID-19-related change, "Cyber November." On this episode, Dan discusses why things have gone even more online than inlin…
 
The winners of the CISO Choice Awards 2020 are: VISIONARY VENDOR: ORCA SECURITY PREMIER SECURITY VENDOR: PROOFPOINT STARTUP SECURITY COMPANY: CYRAL COVID-19 PIVOT: ATTACKIQ PARTNER IN SUCCESS: SECURITYSCORECARD NETWORK SECURITY: ZERO NETWORKS ENDPOINT SECURITY: MALWAREBYTES DATA SECURITY: CYRAL IDENTITY AND ACCESS MANAGEMENT (IAM): SEMPERIS GOVERNA…
 
Our guest today has an entirely new approach to cybersecurity. Christopher Gorog interviews Kavya Pearlmen of XRSI, who is turning the conversation to safety: safety of our privacy and data, our physical beings, and our emotional and psychological state. Hear her explain this new thought process in extend reality, which is basically anything that r…
 
Cybersecurity has its own language and with an increasing focus being placed on cyber awareness we wanted to demystify and explain some of the key terms for those who might be new to Cybersecurity. Join SonicWall experts as they discuss some of the most common terms and what they mean. To find out more download the Mid Year Update: 2020 SonicWall C…
 
Hi, this is Sheri Donahue. I’m the co-founder and CEO of Commonwealth Sentinel, a cyber security consulting firm that focuses on keeping local governments, small businesses, and non-profits cyber safe. Each month, on “Be Cyber Safe,” I interview leading figures in cyber security and law enforcement, thought leaders from the technology sector, and b…
 
When cybercriminals attack a government institution, our response should launch a swift nuclear attack against the offending nation...right? In this episode, Darnley explains the act of war mindset in cyberspace. What constitutes that type of response, why we need to take care of our assumption of these attacks all the while looking at ourselves. S…
 
Ian Carpenter Present: // CYBER MONDAY Every Month in a Monday a fantastic DJ set with music selected for you by Ian Carpenter. CYM#30 Ian Carpenter @ Cyber Monday #30 Halloween House Party 03-11-20 Social Links: Instagram: www.instagram.com/iancarpenter_official/ Facebook: www.facebook.com/IanCarpenter.official/ Soundcloud: @iancarpenter_official …
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login