Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Digital security principles in tiny powerful packages that are easy to understand, no matter your skill level.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Welcome to the new home for Adam's rantings and ravings. This is the #1 Daily Downloaded Podcast in the World. GET IT ON as Adam shares his thoughts on current events, relationships, airport security, specialty pizzas, politics, and anything else he can complain about. Five days a week and completely uncensored, Adam welcomes a wide range of guests to join him in studio for in depth interviews and a front row seat to his unparalleled ranting. Let's not forget Bryan Bishop (Bald Bryan) on sou ...
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Do you know how to protect your pursuit of pleasure? Technology upended how we connect romantically and sexually. But broken apps, hacked toys, confusing privacy settings, and breaches are anything but sexy. This podcast is here to help with tips for safer sex in a digital age. Offering insights into intriguing and often taboo subjects are our hosts, Stefani Goerlich and Wolfgang Goerlich. They’re joined by experts on cybersecurity, cybersexuality, sextech, mental health, and more. Listen in.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
"Digital Strategy Unlocked" is a show that helps CIOs and other business leaders take a step back, take a breath, and consider the broader perspective, to rethink how digital can transform businesses. In every episode, we provide cutting-edge insights from global Digital leaders to help increase IT product adoption and accelerate business outcomes.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The MERICS China Podcast, brought to you by the Mercator Institute for China Studies, a show that analyses current affairs in China and the latest developments in EU-China relations.
…
continue reading
World-renowned criminal defense lawyer Mark Geragos reveals the latest in our nation's most high-profile legal cases with podcast king Adam Carolla. In addition to examining how current law affects society, current events are brought to the forefront, as Geragos brings significant details from past and present experiences. Geragos has made notable marks on the legal system while representing Scott Peterson, Michael Jackson, Susan McDougal, Colin Kaepernick and more.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Brought to you by HughesON. Visit us at HughesON.com. HughesON is a suite of network services and media solutions by Hughes.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Listen to Questions for now to hear big thinkers discuss today’s big questions in digital CX. Featuring thought leaders from beloved brands and influential institutions, Questions for now is packed full of compelling perspectives and actionable insights.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Addressing Industrial Challenges with Starlink Solutions
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49
The integration of biometric technology for employee management represents a significant advancement in how industries approach workforce optimization and security. By harnessing the power of biometric authentication and real-time monitoring capabilities, industries can streamline operations, enhance safety measures, and ensure regulatory complianc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Protecting Small Businesses in the Digital Age With Chris Petersen From Radicl
52:15
52:15
Play later
Play later
Lists
Like
Liked
52:15
Send us a Text Message. Ever wondered how a degree in accounting could lead to a thriving career in cybersecurity? Join us as Chris Petersen shares his riveting journey from Colorado State University to becoming a cybersecurity expert. Initially hesitant to dive into engineering, Chris leveraged his minor in accounting information systems and a gol…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 078 Catherine Knibbs, Human Behaviour Technologist, 'Parenting in the Digital Age: Protecting Your Kids Online'
1:16:09
1:16:09
Play later
Play later
Lists
Like
Liked
1:16:09
Why are children not safe online? What is Cybertrauma? Any trauma that is a result of self or, other-directed interaction with, mediated through, or from any electronic internet/cyberspace ready device or machine learning or artificial intelligence algorithm, that results in impact now or future. This event/interaction can be multi-modal, multi-pla…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jun. 17, 2024. Microsoft Vows Security Improvements. WCYB Digital Radio.
2:54
2:54
Play later
Play later
Lists
Like
Liked
2:54
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Revolutionizing digital identity, data privacy and data security | Guest Raj Ananthanpillai
41:55
41:55
Play later
Play later
Lists
Like
Liked
41:55
Today on Cyber Work, my guest is Raj Ananthanpillai, CEO of Trua, a company that is steeped in the current issues around digital credentials and data privacy. As you’ve no doubt heard, AT&T reported a data breach that compromised the personal information of approximately 7.6 million users! Ananthanpillai discusses Trua’s mission to leave data thiev…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jun. 25, 2024. Gotham Restaurant Falls Victim to Cyberattack. WCYB Digital Radio
2:53
2:53
Play later
Play later
Lists
Like
Liked
2:53
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Jun. 25, 2024. Ohio School District Hit By $1.7M Cyberattack. WCYB Digital Radio
1:20
1:20
Play later
Play later
Lists
Like
Liked
1:20
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Importance of Cyber Peace | A Conversation with Gabrielle Botbol | The Soulful CXO Podcast with Dr. Rebecca Wynn
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30
Guest: Gabrielle Botbol, Offensive Security Advisor, Desjardins Website: https://csbygb.github.io/ LinkedIn: https://www.linkedin.com/in/gabriellebotbol/ Twitter/X: https://twitter.com/Gabrielle_BGB Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ Th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Identity Belongs To You. AI At Work 2024. Bhawna Singh, Okta.
14:53
14:53
Play later
Play later
Lists
Like
Liked
14:53
Bhawna Singh is the CTO of Customer Identity Cloud at Okta. In this episode, she joins host Melissa O'Leary to discuss Okta's new and timely analysis, "AI At Work 2024: C-Suite Perspectives on Artificial Intelligence." A trusted partner to businesses around the world, Okta powers identity for the internet by creating great user experiences, increas…
…
continue reading
As June draws to a close, co-hosts Emily Wearmouth and Max Havey zoom out a bit to reflect on some of the most interesting episodes of 2024, the trends that are piquing their interest, and peak at what they’re hoping to cover in the rest of the year to come. This episode is great, particularly if you’re a new listener looking for a place to start. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security Nudge. Beware Of Scammers Impersonating Well-Known Brands. Sponsored By CybSafe.
1:35
1:35
Play later
Play later
Lists
Like
Liked
1:35
Scammers impersonate Best Buy, Geek Squad, Amazon, and PayPal brands more than any others, a new analysis by the Federal Trade Commission, or FTC, has revealed. In analyzing complaints submitted by consumers during 2023, the government consumer protection agency found that it received around 52,000 reports – or 1000 per week – of scammers impersona…
…
continue reading
The JOHARI methodology simply provides a structure for something that you're probably already doing. However, with the structure comes a standard, which is the benefit to any security team. The team should be speaking the same language, especially in fast moving, dynamic situations. Going into a situation and asking for the "known – knowns” and “Bl…
…
continue reading
While most of us have a basic understanding of phishing, the email attack tactic that’s been with us for years, attack techniques and the attacker community have been evolving rapidly. The speed of that evolution is outpacing the ability of users to detect the latest instances of phishing attacks and the advances are not slowing down. Poornima DeBo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Erica Rhodes, Mayhem, Motorcycles & Huak Tuah
1:59:47
1:59:47
Play later
Play later
Lists
Like
Liked
1:59:47
Comedian Erica Rhodes returns to the show and is joined by Jason “Mayhem” Miller on the news. They open the show with Adam explaining how he turned introducing Kevin Costner’s band into spending Christmas at the Costner ranch. Next, they discuss how each of the different races has a different preferred type of motorcycle. Then, they take a look at …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
142. Meet Antibot4Navalny: the mysterious researchers exposing Russia’s war on truth.
30:30
30:30
Play later
Play later
Lists
Like
Liked
30:30
Antibot4Navalny is a small but mighty group of anonymous researchers calling out Russian disinformation — and punching way above their weight.By Recorded Future News
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Tide. Translating Cybersecurity Into Business Risk. Mark Sangster, Chief Of Strategy, Adlumin.
16:22
16:22
Play later
Play later
Lists
Like
Liked
16:22
Mark Sangster, cybersecurity author and expert, is the Chief of Strategy at Adlumin. In this episode, he joins host Heather Engel to discuss the financial impacts that result from cyber incidents, including how companies are operating in today's threat environment, how organizations can reevaluate their cyber strategies, and more. Cyber Tide is a C…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity’s role in U.S. foreign relations | Guest Tom Siu
59:37
59:37
Play later
Play later
Lists
Like
Liked
59:37
Today on Cyber Work, Tom Siu, CISO of Inversion6, joins the podcast to talk about cyber diplomacy! As Siu says at the start of the show, the internet has no borders. It’s like water. There are pathways and choke points, but there is no ownership by any one country or entity. How does that influence international diplomacy? Siu discusses possible sc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Jun. 24, 2024. Cyberattack Strikes Indonesia Data Center. WCYB Digital Radio.
1:19
1:19
Play later
Play later
Lists
Like
Liked
1:19
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jun. 24, 2024. Apple Source Code Exposed in Data Breach. WCYB Digital Radio.
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity as a Profit Center: Transforming Risk into Opportunity | A Conversation with Robert Fernandes | Redefining CyberSecurity with Sean Martin
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49
Guest: Robert Fernandes, Chief Information Security Officer, The Investment Center, Inc. On LinkedIn | https://www.linkedin.com/in/robert-fernandes-cybersecurity/ ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.it…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dan Bakkedahl Has No Trouble Being Funny These Days
2:18:42
2:18:42
Play later
Play later
Lists
Like
Liked
2:18:42
Actor Dan Bakkedahl visits for the first time and they open the show by discussing Dan’s improv background, Adam test driving a racecar through Glendale and the growing trend of faking Super 8 film in documentaries.Next, they move on to talk about the record-breaking sale of a Malibu beach home, the SF mayor’s drag queen quiz and recount their most…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Social Media Warning Labels, Should You Store Passwords in Your Web Browser?
22:28
22:28
Play later
Play later
Lists
Like
Liked
22:28
In this episode of the Shared Security Podcast, the team debates the Surgeon General’s recent call for social media warning labels and explores the pros and cons. Scott discusses whether passwords should be stored in web browsers, potentially sparking strong opinions. The hosts also provide an update on Microsoft’s delayed release of CoPilot Plus P…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Social Media Warning Labels, Should You Store Passwords in Your Web Browser?
22:28
22:28
Play later
Play later
Lists
Like
Liked
22:28
In this episode of the Shared Security Podcast, the team debates the Surgeon General's recent call for social media warning labels and explores the pros and cons. Scott discusses whether passwords should be stored in web browsers, potentially sparking strong opinions. The hosts also provide an update on Microsoft's delayed release of CoPilot Plus P…
…
continue reading
Episode 183: Chat Control defeated (for now), the US bans Kaspersky, Proton is becoming a non-profit, Mozilla acquires an ad company, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps Sources 00:00 Introduction 00:47 Support us! …
…
continue reading
Friend of the show and brand new author Stephanie Sigler is joining Wolf and Stefani this week and she is opening up... about all things ENM! A multiple-award winning sėxuality coach, she's here to share her tips on everything from how to navigate a group chat when you're chatting about "group activities" and what NOT to do on lifestyle apps to the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
BARD - Prosecution Rests on Read and an Internet Takeover
16:00
16:00
Play later
Play later
Lists
Like
Liked
16:00
Mark and Gary link up for thier Sunday tradition with Gary out at V Hotel in Palm Springs to catch up on the Karen Read trial which saw the prosection rest on a whimper with the defense case set to start on Monday. They also watch a clip of Andrew Cuomo with a somewhat unexpected take on Bill Maher's show and finally review a viral video that has t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
177 - The importance Of Automation And Orchestration In Cyber Security - Part 2
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01
We love to hear from you! This week's episode will continue with part 2 of "The Importance of Automation and Orchestration in Cyber Security." As I said in the episode one, the need for efficient and effective security measures has never been more critical. I suggest you listen to E1, before you dive into this one. Without further ado, lets first g…
…
continue reading
#1 ACS #829 (feat. Teresa Strasser, Chris Laxamana, Alison Rosen and Bryan Bishop) (2012)#2 ACS #991 (feat. Jim Jefferies, Alison Rosen and Bryan Bishop) (2013)#3 ACS #1031 (feat. Peter Mehlman, Alison Rosen and Bryan Bishop) (2013)#4 ACS #1156 (feat. Dwight Yoakam, David Wild, Alison Rosen and Bryan Bishop)#5 ACS #1329 (feat. Jo Koy, Bill Courtney…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Jun. 22-23, 2024. Weekend Update. WCYB Digital Radio.
1:28
1:28
Play later
Play later
Lists
Like
Liked
1:28
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Safety. What You Should Know About Car Security. Scott Schober, Author, "Hacked Again."
3:07
3:07
Play later
Play later
Lists
Like
Liked
3:07
In this episode of Cyber Safety, Scott Schober, author of "Hacked Again," talks to listeners about car security, including how to make sure your vehicle stays protected from cyber threats, and more. To learn more about https://ransomware and more about cybersecurity, visit us at https://cybersecurityventures.com…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Without Compromise. Threats In The Age Of AI. Patricia Murphy, Palo Alto Networks.
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15
Patricia Murphy is the Vice President, EMEA & LATAM Ecosystems, Strategic Alliances and Channel at Palo Alto Networks. In this episode, she joins host Heather Engel to discuss the evolution of the threat landscape in the age of AI, including how organizations can leverage Precision AI to solve complex issues, her perspective on copilots, and more. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hidden Risk. Why Mitigate Damage When You Can Mitigate Risk? Jeffrey Wheatman, Black Kite.
14:55
14:55
Play later
Play later
Lists
Like
Liked
14:55
Jeffrey Wheatman is the SVP, Cyber Risk Evangelist at Black Kite. In this episode of Hidden Risk, he joins host Charlie Osborne to discuss the advantages of mitigating risk, as opposed to the widely-adopted practice of mitigating damage, including how companies can be proactive, first steps to take, and more. An award-winning intelligence platform,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CTRL, ALT, HACKED. LinkedIn Games. Diving Deeper Into The Platform's Newest Feature.
12:36
12:36
Play later
Play later
Lists
Like
Liked
12:36
In early May, CNN reported that LinkedIn was adding a variety of games to its platform, aimed at making connections among users. In this episode, host Paul John Spaulding is joined by Kyle Haglund, Senior Audio Engineer at Cybercrime Magazine, Sam White, Video Producer at Cybercrime Magazine, Taylor Fox, Media Coordinator at Cybercrime Magazine, an…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Support to Advocacy - The Path to Effortless Customer Experience: Tarun Luthra
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12
Join our host, Deepak Sharma, for an engaging conversation with Tarun Luthra, Global VP of Customer Experience at SAP. Discover how AI is revolutionizing customer experiences and transforming support functions into revenue drivers. Learn why trust, human connection, and adaptability are more critical than ever in today's digital landscape. Tune in …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Jun. 21, 2024. Data From London Hospitals Posted Online. WCYB Digital Radio.
1:20
1:20
Play later
Play later
Lists
Like
Liked
1:20
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jun. 21, 2024. Maui Health Center Hit By Ransomware Attack. WCYB Digital Radio.
2:54
2:54
Play later
Play later
Lists
Like
Liked
2:54
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Supply Chain Q&A. Buying IoT & OT Products. Cassie Crossley, Schneider Electric.
4:16
4:16
Play later
Play later
Lists
Like
Liked
4:16
Cassie Crossley, author of the book “Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware,” is the VP, Supply Chain Security, Cybersecurity & Product Security Office at Schneider Electric. In this episode, she joins host Steve Morgan to discuss what CISOs and security teams should look for when b…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Story with Benny Lakunishok
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07
Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconside…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
20. Signal: A Safe and Private Communication App
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18
Everyone deserves a safe and private place to communicate. Listen now to learn why we trust Signal to do that for us, and for you. If you are serious about leveling up your digital defenses, join us in the Security Dojo!By IHP Academy
…
continue reading
![Artwork](/static/images/128pixel.png)
1
141. Legislative solutions for deepfake abuse finally begin to take shape
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42
Omny Miranda Martone has been working with a handful of Washington lawmakers for more than a year on legislation that would put an end to the impunity of deepfake abuse. The bill, known as the Defiance Act, is being fast-tracked through Congress with a rare procedure known as “hotlining” and it may land on the president’s desk as early as this fall…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Development: Can Ethics Keep Up with Innovation? | A Conversation with Eric Permenter, Pam Kamath, Darryl Hawkins, and Taiye Lambo | Redefining CyberSecurity with Sean Martin
1:05:38
1:05:38
Play later
Play later
Lists
Like
Liked
1:05:38
Guests: Taiye Lambo, Founder of Holistic Information Security Practitioner Institute (HISPI), Founder and Chief Technology Officer of CloudeAssurance, Inc. On LinkedIn | https://www.linkedin.com/in/taiyelambo/ Pam Kamath, Founder, Adaptive.AI On LinkedIn | https://www.linkedin.com/in/pamkamath/ Aric Perminter, CEO, Lynx Technology Partners, LLC. On…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
BEHAVE: A Human Risk Podcast. Oritse J. Uku, BISO at Northwestern Mutual. Sponsored By CybSafe.
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22
Oritse J. Uku is the Business Information Security Officer (BISO) and IT Governance Risk and Compliance at Northwestern Mutual. In this episode, he joins Oz Alashe, founder and CEO at CybSafe, and host Heather Engel to discuss security awareness training and human risk management, particularly phishing simulation and what it can do for organization…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Breaking down CEH exam questions with an Infosec expert
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37
Infosec and Cyber Work Hacks are here to help you pass the CEH, or Certified Ethical Hacker exam. For today’s Hack, Akyl Phillips, Infosec bootcamp instructor in charge of the CEH/Pentest+ dual-cert bootcamp, walks us through four sample CEH questions, explaining the logic behind each answer and discounting the wrong ones with explanations, allowin…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Jun. 20, 2024. Cyberattack Shuts Down U.S. Auto Dealers. WCYB Digital Radio.
1:16
1:16
Play later
Play later
Lists
Like
Liked
1:16
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jun. 20, 2024. Ransomware Attack On Oahu Transit Services. WCYB Digital Radio.
3:04
3:04
Play later
Play later
Lists
Like
Liked
3:04
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading