show episodes
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

Unsubscribe
Unsubscribe
Monthly+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
CyberSound is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork

251
Securing Sexuality

Securing Sexuality

Unsubscribe
Unsubscribe
Weekly
 
Do you know how to protect your pursuit of pleasure? Technology upended how we connect romantically and sexually. But broken apps, hacked toys, confusing privacy settings, and breaches are anything but sexy. This podcast is here to help with tips for safer sex in a digital age. Offering insights into intriguing and often taboo subjects are our hosts, Stefani Goerlich and Wolfgang Goerlich. They’re joined by experts on cybersecurity, cybersexuality, sextech, mental health, and more. Listen in.
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork

1
CISO Series Podcast

David Spark, Mike Johnson, and Andy Ellis

Unsubscribe
Unsubscribe
Weekly
 
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
  continue reading
 
Welcome to the Tactical Cyber Podcast, where we transform strategic cyber insights into actionable tactics for everyday implementation. Join your hosts, retired FBI Supervisory Special Agent Darren Mott, and Risk Advisory Practice Leader at Warren Averett, Paul Perry. Together, they bring decades of experience from the front lines of cybersecurity and risk management to help business owners and individuals take the actions that will keep their business and personal digital data safe. Each ep ...
  continue reading
 
Artwork

51
Security Masterminds

Security Masterminds

Unsubscribe
Unsubscribe
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
  continue reading
 
Artwork

1
Ofofo Studio

https://ofofo.io

Unsubscribe
Unsubscribe
Daily
 
Welcome to "Ofofo Studio" your go-to podcast for exploring the dynamic world of entrepreneurship, cybersecurity, and small to medium-sized businesses (SMBs). Join us as we dive into captivating conversations with visionary entrepreneurs, leading cybersecurity experts, and innovative SMB leaders. Discover the stories behind their journeys, the challenges they’ve faced, and the strategies they’ve employed to achieve success in today’s fast-paced digital landscape. Whether you're an aspiring en ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Artwork

1
AcoraCast

Acora Limited

Unsubscribe
Unsubscribe
Monthly
 
Welcome to AcoraCast - The forefront of expertise and innovation, with the freshest IT, cyber security and AI insights brought to you by Acora. Tune in as we unravel the latest trends, tips, and tools, all tailored to empower you in your role as an IT or Security Trailblazer. Interested in seeing what else Acora can do? Visit our website.
  continue reading
 
Welcome to The Defender's Journal (our next step up from The Tech Stack), where we delve into the lives and minds of leading professionals in the cybersecurity space. Discover their unique stories, motivations, perspectives on the industry, and tips for long-term success! *Interested in joining us on the show? Please connect with Cameron Wenham or Jeff Harrod!
  continue reading
 
Uncle Marv’s IT Business Podcast is a show designed for IT professionals and Managed Service Providers. The podcast aims to provide actionable advice and tips that help IT businesses grow and thrive in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, and industry pioneers who share their experiences, insights, and strategies for success. These discussions often cover topics such as: - Cloud computing and AI advancements - M ...
  continue reading
 
Artwork
 
A sales tips podcast where Michael Halper, Founder and CEO of Sales Scripter, shares practical sales tips that are easy to implement and that will often show an immediate improvement in your sales results. Most of these recordings are from webinars that also had slides presented. If you would like to see the videos that include both the audio and slides, visit our website at https://salesscripter.com/ and do a search on the blog with the podcast title.
  continue reading
 
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
  continue reading
 
Artwork

1
Teck Talk

Sadaf Jabeen

Unsubscribe
Unsubscribe
Daily+
 
Welcome to Tech Talk, your ultimate destination for everything tech! Join us as we dive into the fascinating world of technology, exploring a wide array of topics that impact our daily lives and shape our future. From the latest gadgets and innovative startups to deep dives into artificial intelligence, cybersecurity, and beyond, we cover it all. Whether you're a tech enthusiast, a professional in the field, or simply curious about the ever-evolving digital landscape, Tech Talk offers insigh ...
  continue reading
 
Artwork

51
Left to Our Own Devices

Cybellum Technologies LTD

Unsubscribe
Unsubscribe
Monthly+
 
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Left to Our Own Devices is brought to you by Cybellum. To learn more ...
  continue reading
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Tech with Newton is an informative technology podcast for tech enthusiasts, newcomers to tech, tech professionals, and anyone looking to break into the industry. It is a podcast committed to educating and empowering technology careers worldwide. In each episode, the host, Newton, a seasoned IT consultant, explores the latest interesting technology news, trends, insights, and innovations, as well as career development tips and tricks to turbocharge careers in tech.
  continue reading
 
Welcome to the KeyHire Solutions Podcast – where we cover the issues, people and processes that matter to small businesses. From the current employment market to cybersecurity, we’re here to help you stop grinding and start growing. Join us for bi-weekly chats with our human capital expert and CEO of KeyHire Solutions, Corey Harlock. For years, KeyHire has been helping small businesses optimize their organizational design and processes to increase efficiency and profitability. We'll share ti ...
  continue reading
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Welcome to CISO Conversations: EU Data Regulations, a podcast designed for CTOs, CIOs, CISOs, Heads of Security, Compliance Officers, and Subject Matter Experts navigating data security and regulatory compliance within the European Union and beyond. Join us as we delve into expert insights, practical advice, and innovative solutions to transform compliance into a strategic advantage. Each episode features industry leaders, real-world case studies, and actionable tips to help you stay ahead o ...
  continue reading
 
Hosted by Ryan Irvine & Aaron Dunn, the podcast is highly interactive taking listener questions each week on individual Canadian & U.S. stocks as well as stock portfolio building strategies. The podcast focuses on high quality Canadian Dividend growth stocks, unknown & profitable Canadian Small-Cap stocks, U.S. tech leaders and high growth small-cap stocks. We also provide simple portfolio building tips for DIY investors. Weekly show highlights include: - Case For & Against Any Stock: our Ry ...
  continue reading
 
Artwork

1
HR Mixtape

Powered by Paylocity

Unsubscribe
Unsubscribe
Weekly
 
Whether you’re buried in paperwork or just looking for a break from the grind, we’ve got your back with HR Mixtape. Tune in each week to hear thought-provoking interviews with industry leaders, compliance tips, coffee chats with human resources trendsetters, and the latest HR-related news. It’s like nothing else out there: it’s the perfect mix of practical advice and stories that just hit different so that work doesn’t have to feel like...well...work!
  continue reading
 
Artwork

1
Treasury Talk PODCAST

Treasury Talk with MI Treasurer Rachael Eubanks

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and and your business!
  continue reading
 
Artwork

1
Analytics For Humans

Night Shift Development, Inc

Unsubscribe
Unsubscribe
Monthly
 
In today's world, data is everywhere, but let's face it, it's not about how much data you have, it's about how you use it. Success comes from not just collecting and analyzing numbers, but from understanding the story behind those numbers and using them to drive your business forward. Join us as we put down the 1s and 0s and dive into practical tips that real leaders use to navigate through the vast sea of data and make better business decisions.
  continue reading
 
Billions & Billions of eyeballs, six continents, 10k+ servers, and plenty of lessons learned over 2+ decades in IT If you're looking for quick tips on optimizing tech, managing suppliers, and growing a business, 20 Minutes Max is the space for you. Join me as I talk about things that come up during my day and share insights on taking your business to the next level. In less than 20 minutes, you'll walk away with actionable advice and strategies for success. Take advantage of this valuable re ...
  continue reading
 
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you! Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: @NakedSecurity Instagram: @NakedSecurity
  continue reading
 
Artwork

1
TechPulse AI Talk

Author Adidas Wilson

Unsubscribe
Unsubscribe
Weekly
 
Welcome to "TechPulse AI Talk," a weekly podcast that delves deep into the ever-evolving world of technology. From the latest breakthroughs in artificial intelligence, quantum computing, and biotech, to the societal impacts of social media, cybersecurity, and the digital divide, we explore it all. Whether you're a tech guru, a startup founder, or just someone curious about where the future is headed, "TechPulse AI Talk" offers insightful discussions, fascinating stories, and a pulse on the l ...
  continue reading
 
Welcome to The Rocheston Cybersecurity Podcast, your go-to podcast for demystifying cybersecurity concepts in a global context. Hosted by Haja Mo who has a passion for cybersecurity education, this podcast breaks down complex topics into easy-to-understand explanations, ensuring that listeners of all backgrounds can grasp essential cybersecurity principles. In each episode, we delve into various cybersecurity concepts, making it easy for everyone to understand. Whether you're a tech enthusia ...
  continue reading
 
Welcome to Security Sutra, a sub-podcast of Startuprad.io™, dedicated to safeguarding your startup against cyber threats in today's digital landscape. As part of one of the top 20 entrepreneurship podcasts on Apple Podcasts worldwide, we bring you vital insights into cybersecurity, blending deep tech with entrepreneurship to empower your startup. Our podcast features a diverse range of guests, including industry-leading cybersecurity entrepreneurs, Emmy winners, New York Times best-selling a ...
  continue reading
 
"The Digital Revolution with Jim Kunkle", is an engaging podcast that delves into the dynamic world of digital transformation. Hosted by Jim Kunkle, this show explores how businesses, industries, and individuals are navigating the ever evolving landscape of technology. On this series, Jim covers: Strategies for Digital Transformation: Learn practical approaches to adopting digital technologies, optimizing processes, and staying competitive. Real-Life Case Studies: Dive into inspiring success ...
  continue reading
 
Artwork

1
Cyber Snacks

David Myers

Unsubscribe
Unsubscribe
Monthly
 
Cyber Snacks, by Buckingham, is a podcast dedicated to providing useful data privacy and cybersecurity tips in bite-sized pieces. The goal is to keep each episode short, simple, actionable, and reasonable.
  continue reading
 
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
  continue reading
 
Loading …
show series
 
Introduction Discussing the rising threat of cyber attacks affecting businesses across industries. Even if your business hasn't been affected yet, preparation is crucial. Case Study: CDK Cyber Attack on Car Dealerships Recently, 15,000 car dealerships were paralyzed by a cyber attack, highlighting the devastating impact on operations. Losses includ…
  continue reading
 
Send us a Text Message. Have you ever wondered how to keep your data and devices secure while you're traveling for work or vacation? This episode of the Bee Cyber Fit podcast has you covered! We're talking all things secure summer travel: ▶️ hidden risks lurking on public Wi-Fi networks in hotels, airports, and other places ▶️ important tips to saf…
  continue reading
 
Boost MSP Efficiency with Strategy Overview Website: https://www.strategyoverview.com/ In this episode, Uncle Marv sits down with Alex Markov to delve into Strategy Overview, a software platform tailored for MSPs to optimize their strategic planning and client management. Alex explains how the platform's powerful and flexible template engine allows…
  continue reading
 
Revolutionizing SaaS Security with Overe Website: https://www.overe.io/ In this episode, Uncle Marv welcomes Paul Barnes, co-founder and CEO of Overe, to discuss their SaaS security platform and its role in the IT Nation Pitch It Accelerator program. Overe focuses on providing automated security analysis and continuous monitoring for SaaS applicati…
  continue reading
 
The bonus episode of the rapid fire questions with Loren Kohnfelder. Connect with Loren Kohnfelder LinkedIn: https://www.linkedin.com/in/kohnfelder/ Designing Secure Software Book: https://a.co/d/07h5nQna Connect with us Website: securitymasterminds.buzzsprout.com KnowBe4 Resources: KnowBe4 Blog: https://blog.knowbe4.com James McQuiggan - https://w…
  continue reading
 
Send us a Text Message. In this episode, we're diving into a fascinating and timely subject, the possibility of the United States adopting a digital currency. Imagine a world where physical cash is replaced by digital tokens, securely stored in your digital wallet. But what would this mean for our economy, privacy, and financial systems? Buckle up,…
  continue reading
 
In this episode, host Alex and expert Sarah discuss the importance of emergency plumbing services and how to handle basement flooding. They cover essential steps for basement flood cleanup services, the importance of basement waterproofing in Toronto, and how to detect and address basement water leaks. They also delve into comprehensive water damag…
  continue reading
 
In this episode, the hosts discuss the recent CrowdStrike EDR update that crashed Windows systems worldwide. They highlight the impact of the update on various industries, including airlines and healthcare. The hosts also discuss the potential long-term consequences for CrowdStrike and Microsoft, as well as the need for better testing and quality c…
  continue reading
 
In episode 339, hosts Tom Eston and Scott Wright discuss the massive AT&T data breach affecting 110 million customers, which is larger than a previous breach from March affecting 73 million customers. They also talk about the importance of reading privacy policies on sites like Facebook and Instagram, as these platforms may use user data to train A…
  continue reading
 
In episode 339, hosts Tom Eston and Scott Wright discuss the massive AT&T data breach affecting 110 million customers, which is larger than a previous breach from March affecting 73 million customers. They also talk about the importance of reading privacy policies on sites like Facebook and Instagram, as these platforms may use user data to train A…
  continue reading
 
CircleCI, a leading continuous integration and deployment (CI/CD) platform, faced a breach detected by a vigilant customer, involving compromised tokens. This incident underscores the critical need for robust security measures. Tune in to our latest episode to discover how CircleCI could have prevented this breach, its impact on stakeholders, and h…
  continue reading
 
What do the Gremlins, Feminist Theory, and Stefani's 3rd grade Odyssey of the Mind team have in common? They all got us thinking about adaptive technologies and how we can promote pleasure and intimacy across the lifespan. In this week's free-ranging conversation, Stef and Wolf talk about aging, living and loving with disabilities, and Stef's favor…
  continue reading
 
Send us a Text Message. How does understanding the legal landscape in cybersecurity elevate your professional game? Join us on this episode of the CISSP Cyber Training Podcast as we unpack the complexities of civil, criminal, administrative, and contractual law. Learn how each legal category influences risk assessments, organizational policies, and…
  continue reading
 
In this episode, Ryan Williams and Elizabeth Stephens discuss the recent IT outage caused by a bad patch from CrowdStrike that impacted Microsoft systems. They emphasize the importance of investing in people, processes, and tools to prevent such incidents and highlight the need for digital resilience. They also address the role of AI in cybersecuri…
  continue reading
 
Businesses globally faced a significant IT outage on Friday, impacting financial services, doctors' offices, and some TV broadcasters. The aviation industry suffered greatly, with grounded planes, delayed services, and airports providing guidance to passengers. The disruption occurred when cybersecurity company CrowdStrike encountered a major issue…
  continue reading
 
In this episode, the hosts discuss their recent activities and media consumption. They mention watching documentaries, TV shows, and movies, as well as their experiences with family activities like bowling. They also talk about exploring different cuisines and cooking healthier meals. Additionally, they mention their interest in Japanese culture an…
  continue reading
 
Explore how Secure Service Edge (SSE) and Secure Access Service Edge (SASE) revolutionize your network security! Let’s discuss the key differences and benefits, highlighting why SASE might be your next big move for seamless, secure connectivity. Tune in to learn more and share your thoughts in the comments 👇 *** Billions & Billions of eyeballs, six…
  continue reading
 
Send us a Text Message. Ready to fortify your software development practices against security risks? Join us as we unearth critical strategies for mitigating vulnerabilities in your code. From the seamless integration of Static Application Security Testing (SAST) into your CI/CD pipelines to refactoring code to eliminate buffer overflow issues, thi…
  continue reading
 
In this conversation, Ryan Williams Sr. interviews Miguel Clarke, a retired Supervisory Special Agent from the FBI, now a Cybersecurity and GRC Evangelist, at Armor Defense. Miguel shares his background in law enforcement and his transition into cybersecurity. He discusses the early days of cyber investigations and the collaboration between differe…
  continue reading
 
Uncle Marv welcomes Tim Coach to discuss strategic spending in IT businesses. Tim emphasizes the importance of aligning spending with business goals and market demands. He advises against arbitrary budget cuts, instead recommending a focus on ROI and strategic investments. Tim highlights the significance of investing in both technology and talent. …
  continue reading
 
Imposter syndrome can affect anyone at any time, making it easy to feel like you don't belong or aren't worthy of your position. But we're here to tell you that you are worthy of every bit! We're speaking with Kevin Palmeri, host of Next-Level University, to discuss his personal journey with imposter syndrome and how you can utilize some of the sam…
  continue reading
 
The podcast discusses a recent article about a Russian troll farm that uses AI-enhanced software to spread disinformation. The hosts highlight the importance of verifying information and diversifying news sources to combat the spread of fake news. They also discuss the need for social media platforms to implement better troll detection and verifica…
  continue reading
 
In this podcast interview, Robert Krugman, Chief Digital Officer and Digital Transformation Expert at Broadridge discusses the future of blockchain technology and cryptocurrencies, emphasizing the need to distinguish between the two. He highlights how blockchain technology is utilized beyond financial services, such as supply chain systems for audi…
  continue reading
 
Noteworthy Analytics Customer Feedback Analysis: Utilizing customer feedback to understand the effectiveness of free trials and optimize the enrollment process. Data Centralization: Implementing a data factory to integrate various data sources into a single data lake, enhancing data-driven decision-making across franchises. Operational Efficiency: …
  continue reading
 
Worried about hotel hacking? This episode unveils the cybersecurity protocols of resorts like Atlantis. ️ Dive deep into the unique challenges of cybersecurity in hospitality, from balancing guest convenience with ironclad defenses to training a diverse workforce. Tsega Thompson, Executive Director of Cybersecurity and Data Privacy at Atlantis Reso…
  continue reading
 
Send us a Text Message. Recorded on Monday, July 1st 2024. On this LIVE chat (recording) I talked about the fascinating world of artificial intelligence and specifically exploring how it enhances efficiency across various domains. From automating repetitive tasks to optimizing decision-making processes, AI has revolutionized the way we work and liv…
  continue reading
 
Discover why striving for top-tier hardware in your bare metal or colocation setup can derail your project with excessive costs. Learn the smarter way to transition from AWS to Bare Metal and save big. Share your thoughts and experiences in the comments below👇 You can also listen on your favorite podcast: *** Billions & Billions of eyeballs, six co…
  continue reading
 
Welcome to a new conversational spin-off of the Defender's Journal podcast series! In these bite-sized episodes, we'll highlight broader perspectives in the technology world - offering market insights, success tips, and unique viewpoints to help you think differently and progress. Like our main podcast, we delve into individual expertise to shape s…
  continue reading
 
What software do radical techno-libertarians, the CIA, Privacy Advocates, the US State Department and Cyber Criminals use every day? The TOR Browser. In this compelling episode of SecureTalk, Justin Beals, the Founder and CEO of Strike Graph, discusses the book ‘Tor: From the Dark Web to the Future of Privacy’ with its author, Ben Collier, a Lectur…
  continue reading
 
In the latest episode of CyberSound, Vancord's Cybersecurity Podcast 2024, hosts Jason and Steve introduce a new segment to the show, titled "Hot or Not." Joined by Brian Brehart of Vancord, they explore trending topics in cybersecurity and beyond. The episode covers a range of issues, from the ongoing challenges of compromised firewalls and the ne…
  continue reading
 
In this episode of the IT Business Podcast, host Uncle Marv interviews William Hibbard, owner of TorqueNet LLC. The two discuss Bill's journey from Air Force cyber operations officer to running his own Managed Service Provider (MSP) business. Hibbard shares insights on transitioning from a hobby to a full-fledged business, his approach to cybersecu…
  continue reading
 
The power of shared life experiences: A new approach to employee support! In this episode of HR Mixtape hosted by Shari Simpson, Derek Lundsten, the President and Chief Culture Officer at LifeGuides, discusses the transformative platform that connects employees with certified life guides. The platform covers over 400 topics of personal growth, life…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our sponsored guest, Abhishek Agrawal, CEO and co-founder, Material Security. In this episode: What does defense in depth look…
  continue reading
 
Join us as we dive into the journey of Ashwini Siddhi, Director of Product Security Engineering at GoDaddy. Ashwini shares her experiences from Dell to GoDaddy, her expertise in threat modeling, and the pivotal role of Bengaluru in her career. We also explore her advocacy for diversity and inclusion in cybersecurity and her influential mentorship w…
  continue reading
 
The conversation discusses a recent article about a new attack on a 30-year-old protocol called RADIUS. The protocol is widely used in networks for client-server interactions, including VPN access, DSL and fiber connections, and 5G authentication. The attack, called Blast Radius, exploits vulnerabilities in the MD5 hash used in the protocol. The at…
  continue reading
 
Introduction to AI Impact on Jobs Exploring the growing impact of Artificial Intelligence on job roles across industries. Highlighting examples where companies have replaced human staff with AI, citing significant cost savings. Financial Implications Illustrating cost savings: replacing a 60-person writing department ($3 million/year payroll) with …
  continue reading
 
Guaranteeing Your Vehicle Title: Top Four Steps Ensure Vehicle Legitimacy: Check if your vehicle is eligible for a title. Vehicles with stolen reports or marked as junk won't receive titles. Use the Correct Process: Different scenarios require specific methods (e.g., court orders for liens). Using the wrong method leads to rejections. Avoid Phone o…
  continue reading
 
Introduction: Discussing the recent CDK cyber attack affecting car dealerships and its broader implications for businesses. Key Points: Impact of the Attack: The CDK attack, while not widely known by name, has significant repercussions. According to CNN, these outages could become the new norm for cyber attacks. Duration and Disruption: Businesses …
  continue reading
 
Introduction Discussing the evolving landscape of cyber threats and the challenges companies face in defending against them. Highlighting the importance of continuous monitoring in cybersecurity. Main Points Continuous Red Teaming: Explaining how continuous red teaming is essential due to the rapid emergence of new and unknown threats. Continuous M…
  continue reading
 
Today we're diving into a crucial topic: Zombie Debts. What is a Zombie Debt? It could be a mortgage, a judgment, or a lawsuit—something you thought was long resolved. Perhaps an old car loan, once in collections or charged off, or a forgotten judgment. The common thread? "I haven't heard anything in years—5, 7, even 10 years. No calls, no attempts…
  continue reading
 
Introduction: The landscape of imported vehicles in the US is evolving, especially for non-dealership imports like Japanese mini trucks. These vehicles, often over 25 years old, were exempt from stringent import regulations under federal law. Challenges in State Registration: Imported vehicles must conform to state-specific road legality requiremen…
  continue reading
 
Introduction Discussing the CDK cyberattack on car dealerships in June, affecting over 15,000 dealerships indirectly through a vendor's hack. Key Takeaways Vendor Risks: Emphasize the vulnerability posed by third-party vendors in industries. Organized Cyber Threats: Highlight the sophisticated nature of cyber attackers like the Black Suit ransomwar…
  continue reading
 
Introduction Exploring ways to attract more customers to your business through effective marketing strategies. Case Study in Marketing Success Highlighting a remarkable marketing strategy that increased monthly organic traffic significantly. Increased from 37,000 visitors to 210,000 visitors per month, a fivefold increase. Discussing the potential …
  continue reading
 
Introduction to EV Market Trends: In mid-June 2024, the used electric vehicle market continues to see steep price declines, even drawing attention from mainstream business channels like CNBC. Price Declines and Predictions: Predictions suggest used Teslas could drop to $10,000 within the next year. EVs are becoming increasingly affordable compared …
  continue reading
 
Loading …

Quick Reference Guide