Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
A Grafana Labs' show all about the people, community, tools, and tech around Observability.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Monthly Dharma talks by Tenshin Fletcher Roshi at Yokoji-Zen Mountain Center. Yokoji is a year-round Zen Buddhist Training Center in the Southern Californian mountains.
…
continue reading
Welcome to EZ 𝐓𝐡𝐞 𝐄𝐧𝐠𝐥𝐢𝐬𝐡 𝐙𝐨𝐧𝐞. This is your host Ziyad. My goal is to help you practice and improve your English the easy way through fun, motivational, and English skill-based content. I have 10+ years of English teaching experience. Practice with EZ on TikTok here https://www.tiktok.com/@theenglishzone Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
1
How eBPF Makes Observability Awesome
1:01:02
1:01:02
Play later
Play later
Lists
Like
Liked
1:01:02
Hosts Tom Wilkie and Matt Toback sit down with guests Liz Rice from Isovalent and Mario Macías from Grafana Labs to explore how eBPF is revolutionizing observability, networking, and security in modern infrastructure. They cover what eBPF is (hint: it's no longer just about packet filtering!), the performance advantages of eBPF-based instrumentatio…
…
continue reading
1
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
…
continue reading
1
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
…
continue reading
Tenshin Roshi talks about case nine from The Gateless Gate, "Daitsū Chishō."By Tenshin Fletcher Roshi
…
continue reading
1
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Show Notes: https://cisostoriespodcast.co…
…
continue reading
1
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Visit https://cisostoriespodcast.com for …
…
continue reading
1
172. Understand the Power of Words or Be a Slave of Your Own Mind! These 10 Minutes Can Change Everything about You and How You See the World! | Advanced English
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10
People don't understand the power of words, that's why they are powerless. You can change that! Listen and pay attention. --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
1
Monitoring Kubernetes: Why traditional techniques aren't enough
1:08:45
1:08:45
Play later
Play later
Lists
Like
Liked
1:08:45
In this episode of Grafana's Big Tent, hosts Mat Ryer and Tom Wilkie dive into the world of monitoring Kubernetes with guests Vasil Kaftandzhiev from Grafana Labs and Dio Tsoumas who leads the DevOps team at the consumer research company GWI. They explore why traditional monitoring techniques aren't enough for Kubernetes environments and discuss th…
…
continue reading
1
171. Understand Present Perfect in Only TWO Minutes! | Intermediate English Level
3:00
3:00
Play later
Play later
Lists
Like
Liked
3:00
Watch the lesson with subtitle on Youtube here! --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
1
Have you consider your team’s cognitive biases when selecting tools? - Dustin Sachs - CSP #196
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
…
continue reading
1
Have you consider your team’s cognitive biases when selecting tools? - Dustin Sachs - CSP #196
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
…
continue reading
1
Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20
Send us a text Key Takeaways: Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments. Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Activ…
…
continue reading
1
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Show Notes: https://cisostoriespodcast.com/csp-195
…
continue reading
1
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp…
…
continue reading
1
170. You MUST Know These 10 Phrasal Verbs to Understand Native Speakers EASILY!
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37
Phrasal Verbs are a big part of English language, especially colloquial English, spoken daily by native speakers. If you don't understand phrasal verbs, you will NOT be able to understand American native speakers. Watch this on Youtube HERE! --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support…
…
continue reading
1
Adapting to the Metrics Cardinality Crisis
55:50
55:50
Play later
Play later
Lists
Like
Liked
55:50
Join host Mat Ryer as he explores the world of Adaptive Metrics with Grafana Labs engineers Patrick Oyarzun and Mauro Stettler, alongside guest Oren Lion from TeleTracking. What started as a hackathon project has evolved into a game-changing feature that helps organizations manage their metrics more efficiently and cost-effectively. They discuss th…
…
continue reading
1
169. The 7 Habits of Highly LAZY People | Here's how you can become unrecognizable! Advanced English Lesson
27:20
27:20
Play later
Play later
Lists
Like
Liked
27:20
If you have one or more of these habits, chances are you are heading to towards failure. But you have the choice to change them... Watch this on YouTube here! --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
1
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
…
continue reading
1
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
…
continue reading
…
continue reading
1
Episode 415 - The Risk Story – Software Supply Chain Security
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
…
continue reading
1
Episode 414 - Winning the OT Security Battle
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09
We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity. CrowdStrike Lessons Learned Tim and Robert began by examining the CrowdStrike incident from July 2024. They highlighted the dangers of over-relying on trusted technology without sufficient testing and verification, and the …
…
continue reading
1
168. BOOST Your English with Atomic Habits | 4 Laws to Accelerate Your Learning
14:21
14:21
Play later
Play later
Lists
Like
Liked
14:21
Learning English is NOT difficult; rather, it is EASY! It's just difficult for you to practice and stay focused for even 5 minutes! Watch this video to help you build the habits YOU NEED for boosting your English in no time! Watch the YouTube video HERE! --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support…
…
continue reading
1
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
…
continue reading
1
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
…
continue reading
1
Episode 413 - Operational Technology (OT) Cybersecurity - Episode 4
1:00:06
1:00:06
Play later
Play later
Lists
Like
Liked
1:00:06
This episode dives into OT Cybersecurity and discusses: SCADA, ICS & IIoT Cybersecurity How do we define an OT-related cyber incident? What are the leading standards and guidelines for managing OT Cybersecurity and resilience? Threat intelligence and suitable ISAC models Vendor platform insights and cyber maturity landscape Speakers include: Daniel…
…
continue reading
1
Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson
1:08:33
1:08:33
Play later
Play later
Lists
Like
Liked
1:08:33
Send us a text In this episode of Traffic Light Protocol, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University. Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital…
…
continue reading
1
Observability to Controllability: Lessons in DDoS Mitigation with Cloudflare
55:54
55:54
Play later
Play later
Lists
Like
Liked
55:54
In this episode of Grafana's Big Tent, host Matt Toback explores the world of DDoS protection and observability with guests Alex Forster, Engineering Manager at CloudFlare, and Dee Kitchen, VP of Engineering at Grafana Labs. They discuss the challenges of detecting and mitigating DDoS attacks, the importance of automation in maintaining high availa…
…
continue reading
1
167. This Technique is Better and More Effective than Manifestation!! | English for Advanced Learners
15:22
15:22
Play later
Play later
Lists
Like
Liked
15:22
We are living at an age where success is only measured by achieving goals and never failing and they say that if you think positive things only, you will attract ONLY good and positive things. That's a wrong approach. Here's a better and more effective alternative to "manifestation". You can also watch the Youtube video lesson here! --- Support thi…
…
continue reading
1
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
…
continue reading
1
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
…
continue reading
1
166. Asking for Directions | Listen to the Story and Practice! Beginner English
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50
This is part of a 30 day English course for beginner English learners. You can watch this lesson on YouTube as well as the other lessons. Click here. Subscribe on Youtube: https://www.youtube.com/@theenglishzone Follow on Instagram: @TheEnglishZone_ --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support…
…
continue reading
1
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
…
continue reading
1
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
…
continue reading
1
Episode 412 - AI, ML & Automation | Aligning Safety & Cybersecurity - Episode 6
1:02:41
1:02:41
Play later
Play later
Lists
Like
Liked
1:02:41
In March 2024, the Australian Senate resolved that the Select Committee on Adopting Artificial Intelligence (AI) be established to inquire into and report on the opportunities and impacts for Australia arising out of the uptake of AI technologies in Australia. The committee intends to report to the Parliament on or before 19 September 2024. More th…
…
continue reading
1
The (No) Blame Game: A Sustainable Approach to Incident Management
1:02:51
1:02:51
Play later
Play later
Lists
Like
Liked
1:02:51
In this episode, hosts Tom Wilkie and Mat Ryer are teaming up with Grafana Labs’ Devin Cheevers and Prezi’s Alex Koehler to tackle the world of on-call responsibilities and incident management. Alex digs into Prezi's tech stack and provides a real-world look at observability practices and the lessons learned from managing a complex microservices ar…
…
continue reading
1
Todd’s Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
…
continue reading
1
Todd’s Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
…
continue reading
Cyber Essentials - Part 2:We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover 8 more tips to achieve CE, including the elements that are not obvious. This advice stems from us advising and supporting compl…
…
continue reading
Tenshin Fletcher Roshi talks about case 95 of the Book of Equanimity, "Rinzai's One Stroke."By Tenshin Fletcher Roshi
…
continue reading
1
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
…
continue reading
1
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
…
continue reading
To kick off season two of Grafana's Big Tent podcast, our host Mat Ryer is back and he's bringing along some heavy hitters! Get ready for a deep dive into the world of caching with Memcached maintainer Alan Kasindorf (aka dormando), along with caching aficionados Danny Kopping and Ed Welch. They’ll discuss CPU-level to application-level caching and…
…
continue reading
1
165. The Scary Pool Incident | A Short Story in Past Tense for Beginner and Intermediate English
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31
Practice your English on The English Zone podcast with short and fun stories and motivational content to help you take your English to the next level the EZ way! --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
1
164. How to Reprogram Your Mind into Thinking that Everything is EASY Including Learning English
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28
Watch this with SUBTITLE on YouTube: https://youtu.be/NGMCf03yOZk?si=rXOKb63NAQJsFBCk --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
…
continue reading
1
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
41:03
41:03
Play later
Play later
Lists
Like
Liked
41:03
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
…
continue reading
1
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
41:08
41:08
Play later
Play later
Lists
Like
Liked
41:08
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
…
continue reading