Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Exploring both the practical realities and the exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Sjoukje & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Exp ...
…
continue reading
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Queer in Cyber is a community service of Nearshore Cyber. Its purpose is to illuminate the intersection of queerness and the cybersecurity profession. It is produced by and for LGBTQI+ and non-gender-conforming people who work in the industry.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Ride the cyber trails with one CISO (Allan Alford) and a diverse group of friends and experts who bring a human perspective to cybersecurity.
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
A Cyber Security Podcast, focussed on Threat Research and the interesting people behind it.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Exploring Trauma and Healing: Insights from Dr. Tracey Shors
50:49
50:49
Play later
Play later
Lists
Like
Liked
50:49
In this episode… In this episode of The Cyber Business Podcast, host Matthew Connor sits down with Dr. Tracey Shors, a distinguished professor at Rutgers University and author of "Everyday Trauma." Dr. Shors provides an in-depth look at the distinctions between stress and trauma, emphasizing the unique ways individuals respond to traumatic events. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S1 E6 - A Certification Exam Prep Strategy That Works
18:50
18:50
Play later
Play later
Lists
Like
Liked
18:50
In this episode Dr. Jeff shares a certification exam preparation strategy that has proved effective for him and his students: Exam blueprint shows you what to study Clues are in the verbs Some topics are more important than others Two key reasons to use practice exams Exam taking strategies Cyber Job Hacks is the official podcast of Team Caveo Want…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CrowdStrike hits Cloud PCs, criminals exploit CrowdStrike fix, CISA rebuked
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47
Microsoft confirms CrowdStrike update also hit cloud Windows PCs Cybercriminals exploit CrowdStrike problem to distribute malware CISA adds some big names to its KEV catalog Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and mor…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Making your ICS/OT environments cyber secure, with Dragos’ Lesley Carhart
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02
In this episode of the Cyber Uncut podcast, Lesley Carhart, director of incident response for North America at Dragos, joins host Liam Garman to unpack how businesses can improve their ICS/OT cyber processes, before giving some tangible advice for business leaders on how they can build their incident response plans. The pair begin the podcast by un…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The current state of Cyber Threat Intelligence.
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant’s Chief Analyst. References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Josephine Wolff, Octob…
…
continue reading
Widespread Windows Crashes Due to Crowdstrike Updates https://isc.sans.edu/diary/Widespread%20Windows%20Crashes%20Due%20to%20Crowdstrike%20Updates/31094 https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/ https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/ https://techcommunity.microsoft.c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
When Gamers Start Swatting: Violence for Hire Online
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20
NEW! Text Us Direct Here! We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors. Visit kiteworks.com to get started. W…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 76: Episode 76 - Melbourne CISO 2024
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19
In this episode, Richard covers the recent Corinium Intelligence's Melbourne CISO 2024 and briefly mentions the recent world-wide IT outage.
…
continue reading
In this week's episode, we review some of the cybersecurity news that stood out. Show notes Euro 2024 Attack https://www.darkreading.com/cloud-security/euro-2024-becomes-latest-sporting-event-to-attract-cyberattacks Operation DISTANTHILL https://www.group-ib.com/media-center/press-releases/operation-distanthill/ U.S Election attack https://www.proo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
🔴 Jul 19’s Top Cyber News NOW! - Ep 668
2:08:53
2:08:53
Play later
Play later
Lists
Like
Liked
2:08:53
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Resilient Cyber w/ Stuart Mitchell Cyber Talent, Recruiting & the Workforce
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33
- First off, for folks now familiar with your background, can you tell us a bit about yourself? - You made the leap from working for a firm to founding your own talent and recruiting company. Can you tell us about that decisions and experience? - Before we dive into specific topics, what are some of the biggest workforce trends you are seeing in cy…
…
continue reading
What if understanding human behavior could be the key to bolstering your organization's cybersecurity? Join us for an enlightening conversation with Bob Casey, a veteran security expert whose career has spanned the FBI, Houston Police Department, and corporate security at a major pharmaceutical company. Bob's journey from handling organized crime o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
149. Mic Drop: China seeks a Great Leap Forward in cyber
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09
Chinese hackers are stepping up their game, according to Nigel Inkster, the former director of operations for Britain’s MI6. In an encore episode of Mic Drop, he says Chinese hackers are taking on a new swagger in cyberspace and borrowing things from a familiar playbook: a Russian one.By Recorded Future News
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How to pass the CISSP on the first attempt | EP 1
1:16:50
1:16:50
Play later
Play later
Lists
Like
Liked
1:16:50
Join our expert panel for an insightful discussion on essential tips, tricks, and strategies for passing your CISSP exam. Whether you're considering a career in cyber security or are already a seasoned professional, the CISSP exam is a crucial milestone. Tune in to learn how you can ace your CISSP exam on your first attempt. With Nathan House CISSP…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
teissTalk: A playbook for new CISOs - learnings from years in the trenches
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49
How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow Identifying the quick wins and making the most of the finite time new CISOs have to get their message across Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term This episode is hosted by …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ep. 46 - De LatAm a Europa: Matices Culturales en Estrategias de Seguros Cibernéticos - con Andrea García-Beltrán
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07
¿Te has preguntado alguna vez cómo difieren las estrategias de seguros cibernéticos entre Bogotá y Berlín? En este episodio de podcast, descubrimos las complejidades culturales que intervienen en los diferentes mercados de seguros cibernéticos. Únete a nosotros mientras Andrea García-Beltrán, Socia y Jefa de Cyber Media y Tecnología Europa en Nirva…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Osher Assor Partner and CEO of Cyber Security & Tech Division @Auren Israel about penetration testing (PT)
47:02
47:02
Play later
Play later
Lists
Like
Liked
47:02
האם העובדה שביצעתם מבדקי חדירות ותיקנתם ליקויים אומרת שאתם מוגנים? אין ספק שאתם יותר מוגנים ממה שהיתם לפני, אבל נדרש לערוך את מבדקי החדירות בלופ כדי לוודא שלא נפתחו פרצות חדשות מאז המבדק האחרון נחשון פינקו מארח את אושר עשור שותף ומנכ"ל חטיבת הסייבר והטכנולוגיה באוריין ישראל, אחת משתיים עשרה חברות ראיית החשבון הגדולות בעולם. בשיחה על מבדקי חדירות, ה…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
(Replay) How We Hack Medical Devices To Save Lives
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12
Text us feedback! Discover the vulnerabilities lurking within medical devices and how ethical hacking can safeguard patient care. Join Brad, VP of Offensive Security at SecurIT360, as he unpacks the risks and protections against cyber threats in healthcare tech. - Unveiling the risks of wireless communication vulnerabilities in insulin pumps and gl…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Corporate Social Responsibility - The New Model for Cyber? w/ Drew Simonis
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26
Hang on to your saddle for this one! Drew Simonis joins Allan as his new co-host in a show where the two of them explore alternative models for selling and funding the cyber mission! You probably know about corporate social responsibility initiatives. Did you know that it's not a a new idea in the history of capitalism, but rather a throwback? Befo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From Ransomware to Nation-State Attacks: Insights on Cyber Insurance with Matt McCabe
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08
In this episode of Cyber Focus, Frank Cilluffo explores the evolving landscape of cyber insurance with Matt McCabe. McCabe shares the history, current state, and future challenges of cyber insurance, emphasizing its critical role in national resilience against cyber threats. The discussion covers the fundamental coverage aspects of cyber insurance,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Telecom Data Risks: Government's Role in the Fight - Ep 106
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46
The latest episode of Reimagining Cyber dives into the recent major data breaches that have rocked the telecom sector, focusing on the latest AT&T incident. It begins by reflecting on the historical context of cyberattacks in telecom, noting T-Mobile’s previous breach involving 85 million records and a hefty $500 million settlement. Host of the sho…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Queer in Cyber Episode 6 - Being a Leader
39:10
39:10
Play later
Play later
Lists
Like
Liked
39:10
Coming out as Queer in the workplace Being an ally/standard bearer to others, how? As a leader, how do you push back up the chain if you are not getting the proper support? hat kind of pushback have we seen when advocating for queer employees? As a hiring manager, how do you advocate for a diverse candidate pipeline? Bringing the team together - st…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Convocourses Podcast: Getting into Cyber from NOTHING (open topics)
1:49:05
1:49:05
Play later
Play later
Lists
Like
Liked
1:49:05
http://convocourses.netBy Bruce Brown
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Barrett Brown: Hacktivist, Narcissist, Anonymous
1:08:50
1:08:50
Play later
Play later
Lists
Like
Liked
1:08:50
How does someone introduce Barrett Brown? That's a really tough one because the personal, professional, and political stories play off each other in numerous ways. I would have to say that first of all, Barrett Brown is one of too few to survive a very intense era of anti-authoritarian activism and state repression. In addition, Brown is a survivor…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Defense Radio - Tran Minh Quang - Viettel Cyber Security - Hotseat - Podcast - 2024
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Tran Minh Quang, Director of Intelligence Center, Viettel Cyber Security who offers comprehensive cybersecurity products and services as part of the largest company, Viettel, in Vietnam. Gain new insights into cybersecurity from our always free monthy publ…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber resiliency and national defense | Guest Georgianna "George" Shea
58:06
58:06
Play later
Play later
Lists
Like
Liked
58:06
Today on Cyber Work, I’m introducing you to Dr. Georgianna, or “George” Shea, the chief technologist at the Foundation for Defense of Democracies’ Center on Cyber and Technology Innovation. Shea finds new and developing technologies and develops pilot programs for implementation in a variety of locales, including DoD, the government sector and crit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Multiple Data Breaches Linked to Snowflake Cloud Provider
7:32
7:32
Play later
Play later
Lists
Like
Liked
7:32
Ticketmaster, AT&T, Neiman Marcus, Advanced Auto Parts. These organizations may not seem like they have anything in common, but they all were customers of Snowflake that had a data breach within the past couple months. With conflicting reports from Snowflake, the victims, the threat actors, and different security firms, who is really at fault here?…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Safeguarding Manufacturing Operations with Ray Texter
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36
The manufacturing threat landscape is evolving rapidly, with increased automation and remote access needs making Operational Technology (OT) environments more vulnerable to cyber threats. As attackers become more sophisticated, manufacturers must adapt to protect their critical infrastructure and maintain business continuity. Join Tia Hopkins, Fiel…
…
continue reading
In this interview at SINCON 2024, Dr. Joshua James, a Regional Counter Cyber Crime Coordinator for the United Nations Office on Drugs and Crime (UNODC), shared his insights on the Regional Counter-cybercrime programme at UNODC. Dr. James argued that while law enforcement agencies are getting better at responding to cybercrime, the cyber criminals a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Vulnerability Scanning VS Pen Testing, Whats The Difference?
12:52
12:52
Play later
Play later
Lists
Like
Liked
12:52
This is the Sixth episode of the C.S. Cyber video podcast series. In this episode we talk about risk assessments vs pen testing and what the difference is! ✅ Become a supporter of the show! https://www.buzzsprout.com/2373619/support ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberd…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 74 - Mike Krygier - Founder & CEO of DeepCove Cybersecurity
22:38
22:38
Play later
Play later
Lists
Like
Liked
22:38
In this episode of the Cyber Inspiration Podcast, host Evgeniy Kharam sits down with Mike Krygier, a seasoned cybersecurity leader and CISO, to discuss his journey and the insights he’s gained along the way. Mike shares his experiences from his impressive career, providing valuable perspectives on driving innovation in cybersecurity, tackling emerg…
…
continue reading
Links: https://www.darkreading.com/cybersecurity-operations/a-cisos-guide-to-avoiding-jail-after-a-breach https://www.csoonline.com/article/2512955/us-supreme-court-ruling-will-likely-cause-cyber-regulation-chaos.html/ https://sansec.io/research/polyfill-supply-chain-attack https://www.securityweek.com/over-380k-hosts-still-referencing-malicious-po…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
NCF-355 I'm an Average User - What does security do for me?
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49
Hello, everybody! Welcome back to New Cyber Frontier! Today we have our guest Dominic Paulo on the show for the second time. We have asked Mr. Paulo to lend his voice as an engaged but cautious technologist, and to discuss some trends that he sees with blockchain technologies. Mr. Paulo has taken some time to reflect on experienced positions from t…
…
continue reading
CyberNorth catches up with Aidan from Aspire Technology Solutions, one of the region's leading cyber businesses. Everyday, and I mean everyday, Aidan publishes his Cyber Daily newsletter on LinkedIn. At the time of writing he is on edition number 168, an amazing achievement. The Cyber Daily is a fantastic source of information and updates, that sho…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
12. What a cyber insurance is and how to get one (With Kim Theilgaard - Partner at fairside)
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24
We've invited Kim Theilgaard on to our podcast. Kim is partner at fairside. fairside help and advise companies in insurances. One of these insurances is cyber insurances which is becoming more and more popular. In the episode Kim tells me about: What a cyber insurance is What it covers and what it doesn't cover What you need to have in place to get…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Downfall of LockBit, with Jon DiMaggio
25:55
25:55
Play later
Play later
Lists
Like
Liked
25:55
Jon DiMaggio is the chief security strategist at Analyst1 and has over 16 years of experience hunting, researching, and writing about advanced cyber threats. In 2022, Jon’s authored his first book, “The Art of Cyberwarfare,” which earned him the prestigious SANS Difference Makers Award, solidifying his status as a thought leader in the industry. Th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
11. Behind the scenes with a Digital Detective
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07
Who do you call when you are going through a cyber attack? The answer is someone like Claudia, a Digital Forensics and Incident Response investigator. In this episode Claudia takes us through a day in her life as an investigator, how she got into the industry and answers the arguably more important question, what is the funniest google search you’v…
…
continue reading
How CISOs sleep at night - aka Assurance: The final episode of our special series on risk. Matt, Tom and Toby discuss how you can assure your risks, ensuring your risk understanding and prioritisation is correct, and your mitigation work effectively.If you want any cyber security support please get in contact with the team by email info@clearcutcyb…
…
continue reading