Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Zero Gravity LIVE is the ultimate destination for tech enthusiasts! Join us every Tuesday for a captivating live stream experience as we explore the latest and greatest in IT, tech, security, and storage news, and if you missed it, that's what the podcast is here for! The Zero Gravity Podcast delivers our weekly tech talk to your feed every week. Our show features interviews with leading experts in the field of technology, who will share their insights and knowledge with you. We’ll keep you ...
…
continue reading
Tom Merritt, Sarah Lane and the team help you stay up to date with independent, authoritative and trustworthy tech news. Become a member at https://plus.acast.com/s/dtns. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
In today's episode we have a tendency to state the most recent cyberattack on JBS and check out to quantify the impact they could wear giant businesses
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
The Ransomware Files podcast tells the harrowing stories of technology experts who have fought back against ransomware, which is one of the greatest crime waves the internet has ever seen. It features in-the-trenches stories about how organisations recovered and frank human reflections from those who have faced file-encrypting malware, a potent weapon used by high-tech criminals.
…
continue reading
Your Home for Linux-related fun and learning!
…
continue reading
Helping each other understand
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
a unique perspective on technology
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
The Predatar Podcast is back for 2024. Each episode will dive into a different aspect of Recovery Assurance, helping to keep security and IT leaders informed of what's new in this fast-moving area of technology.
…
continue reading
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
…
continue reading
healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.
…
continue reading
Two lawyers talk about technology.
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
A genuine and informative podcast about data privacy and security. Your reliable place for best practices, interviews, belly laughs, and real stories.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
True crime. Real prosecutors. Expert analysis. Experienced prosecutors from San Diego, CA discuss the latest crime news, interview criminal justice leaders, and bring you their expert analysis.
…
continue reading
In-depth analysis and perspective from our experts in Europe, the Middle East and Africa.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
The CyberPHIx is a regular audio podcast series that reports and presents expert viewpoints on data security strategy for organizations handling patient health or personal information in the delivery of health-related services. These timely programs cover trends and data security management issues such as cybersecurity risk management, HIPAA and OCR compliance strategy and vendor risk management. Meditology Services, the healthcare industry's leading security and compliance firm, moderates t ...
…
continue reading
Daily Tech News Show is a 30 minute podcast dedicated to giving you tech news that’s easy to understand in a fun and informative way.
…
continue reading
Panel Discussions & Interviews
…
continue reading
This is where poor financial decisions are not only welcomed but embraced. Join Matt West as he descends into automotive m̶a̶d̶n̶e̶s̶s̶ enlightenment, while featuring prominent guests, racecar drivers, industry news, and questionable mechanical advice free of charge. Listen Weekly! Listen on the Radio! AM1460 & FM 101.1 The Answer - Saturdays at 9am, Sundays at 6pm AM 1400 KRLN - Saturdays at 9am 91.7 KLZR - Saturdays at 10:30am
…
continue reading
1
UK ransomware reporting, Project Oscar, ransoms spike
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44
UK mandatory ransomware reporting gets watered-down Google introduces AI agent to look for software bugs Critical infrastructure ransomware costs spike Thanks to today's episode sponsor, Conveyor Does the anticipation of the next monster security questionnaire wrecking your day ever make you feel like a balloon floating above a cactus field? If so,…
…
continue reading
1
SN 983: A Snowflake's Chance - CDN Safety, Microsoft's Behavior, CDK Ransomware Attack
2:07:11
2:07:11
Play later
Play later
Lists
Like
Liked
2:07:11
Using Content Delivery Networks Safely The CDK Global Ransomware Attack The IRS and Entrust Polyfill.io fallout Microsoft's Behavior A Snowflake's Chance Show Notes - https://www.grc.com/sn/SN-983-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TW…
…
continue reading
We get more details on AMD’s Ryzen 5 Ryzen 9000 and AI 300 processors. Plus Google is allegedly looking to acquire security startup Wiz. And did AT&T pay off the attacker responsible for a data breach last Friday to delete customer data and what does that mean for potential future data breaches? Starring Tom Merritt, Shannon Morse, Roger Chang, Joe…
…
continue reading
1
CYFIRMA Research- TRACKING RANSOMWARE – JUNE 2024
4:44
4:44
Play later
Play later
Lists
Like
Liked
4:44
Stay informed about the latest developments in cybersecurity with CYFIRMA's Tracking Ransomware-June 2024 Report. This month's report highlights key trends, including a decrease in ransomware attacks by groups like Play and RansomHub, while Akira and Qilin increased their operations. Discover significant changes in targeted industries, with most se…
…
continue reading
1
Inside the Mind: Unveiling Cyber Criminals' Motives and the Real-World Dangers of Ransomware
51:10
51:10
Play later
Play later
Lists
Like
Liked
51:10
NEW! Text Us Direct Here! We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi). Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs an…
…
continue reading
We get more details on AMD’s Ryzen 5 Ryzen 9000 and AI 300 processors. Plus Google is allegedly looking to acquire security startup Wiz. And did AT&T pay off the attacker responsible for a data breach last Friday to delete customer data and what does that mean for potential future data breaches? Starring Tom Merritt, Shannon Morse, Roger Chang, Joe…
…
continue reading
1
Allan Liska on why it’s time to ban ransomware payments; Russian info ops
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02
We are living through an epidemic of ransomware. Last year alone, the amount paid to ransomware operators exceeded $1 billion, and the entities getting hit and seeing their operations disrupted by ransomware included hospitals, schools and libraries. Ransomware is both a public-health and national-security crisis, yet efforts to address the problem…
…
continue reading
1
S5, E216 - Mid-Year Check-In: AI Governance and Ransomware Resilience
19:01
19:01
Play later
Play later
Lists
Like
Liked
19:01
Send us a Text Message. As we reach the middle of the year, the focus is on responsible AI usage and the advancement of privacy measures, emphasizing their significance in both personal and business settings. Our discussion then turns to a more serious topic: the alarming increase in ransomware attacks. Occurring approximately every 17 seconds and …
…
continue reading
1
Cyber Security Today, July 8, 2024 - A New Ransomware Group Is Discovered
2:09
2:09
Play later
Play later
Lists
Like
Liked
2:09
A new ransomware group that has been discovered is highlighted in this editionBy Howard Solomon
…
continue reading
1
The Connected Lawyer Podcast Episode Eighteen: Ransomware
42:46
42:46
Play later
Play later
Lists
Like
Liked
42:46
Aaron and Bryan talk about ransomware and why it keeps Bryan up at night. Things that we discuss in the episode: CISA Synology SyncBack Checkout the blog at The Connected Lawyer Checkout our YouTube page. Find out more about your hosts: Aaron Brooks Bryan Sims Email us at info@theconnectedlawyer.com
…
continue reading
1
Ransomware Attack Cripples Dealerships & Pikes Peak Bonus with Tuner Brian!
43:00
43:00
Play later
Play later
Lists
Like
Liked
43:00
I talk about how a ransomware attack has warped car dealerships back to the stone age and why we need to be cautious about having online systems in every corner of our lives. I also run a bonus from my Pikes Peak Hill Climb live stream. That and more on this edition of the show! hemmings.com jimmyfordracing.com https://www.instagram.com/ethan_hunte…
…
continue reading
Send us a Text Message. As we’ve discussed numerous times on Security Breach, terms like change, evolution and constant are more than just buzz terms – they’re a simple reality of working in the industrial OT space. Whether we’re discussing threat actors from Stuxnet to Lockbit, tactics from social engineering to double-extortion ransomware, or vul…
…
continue reading
The summer season is here and if you’re traveling to a fan convention or a vacation getaway, Trisha Hershberger has some tips on tech to bring with you to make the most of your experience. Plus the reviews for ASUS’s ROG Ally X are out. What do the critics like and not like about the company’s latest handheld gaming PC. And we have a roundup of sto…
…
continue reading
The summer season is here and if you’re traveling to a fan convention or a vacation getaway, Trisha Hershberger has some tips on tech to bring with you to make the most of your experience. Plus the reviews for ASUS’s ROG Ally X are out. What do the critics like and not like about the company’s latest handheld gaming PC. And we have a roundup of sto…
…
continue reading
The summer season is here and if you’re traveling to a fan convention or a vacation getaway, Trisha Hershberger has some tips on tech to bring with you to make the most of your experience. Plus the reviews for ASUS’s ROG Ally X are out. What do the critics like and not like about the company’s latest handheld gaming PC. And we have a roundup of sto…
…
continue reading
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss the aftermath of the CrowdStrike failed software update. They express empathy for those impacted by the incident and discuss the importance of collaboration in the cybersecurity industry. They also explore the need for transparency from security vendors and the potential im…
…
continue reading
1
CrowdStrike hits Cloud PCs, criminals exploit CrowdStrike fix, CISA rebuked
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47
Microsoft confirms CrowdStrike update also hit cloud Windows PCs Cybercriminals exploit CrowdStrike problem to distribute malware CISA adds some big names to its KEV catalog Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and mor…
…
continue reading
1
Worst Cyber Event in History: CrowdStrike Update Causes Global Chaos. Cyber Security Today Special Edition for Monday, July 22, 2024
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12
Join Jim Love on a special edition of Cybersecurity Today and Hashtag Trending as he delves into the recent CrowdStrike incident that led to a global IT meltdown. With over 8.5 million Windows devices affected by a faulty CrowdStrike Falcon update, this event is being compared to Y2K and WannaCry. Discover the widespread impacts across key industri…
…
continue reading
1
[Bonus!] Right to Repair, Government Corruption, and More with Edison Motors CEO Chace Barber
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17
Edison Motors is the only EV truck company prioritizing the right to repair and building products in a way that supports North American Industry. I talk with CEO Chace Barber about that, his thoughts on the dark side of EV startups, and how his company exposed potential corruption in the Canadian government. That and more on this special edition po…
…
continue reading
1
Building an Electric Truck the RIGHT Way - Interview with Edison Motors Founder & CEO Chace Barber
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59
Chace Barber, Founder and CEO of Edison Motors joins the show to talk about how his company is breaking the norms by building an EV semi truck that prioritizes right to repair and North American manufacturing. We also talk about why diesel electric hybrids truly combine the best of both worlds with little to no compromise. Don't miss this special e…
…
continue reading
1
When Gamers Start Swatting: Violence for Hire Online
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20
NEW! Text Us Direct Here! We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors. Visit kiteworks.com to get started. W…
…
continue reading
1
The Intersection of Real Life, Prophecies, Cutting Edge Technology, and Storytelling | A conversation with Guy Morris | Audio Signals Podcast With Marco Ciappelli
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05
Guest: Guy Morris, Novelist, Guy Morris Books [@guymorrisbooks] On LinkedIn | https://www.linkedin.com/in/guybmorris/ _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio…
…
continue reading
1
The Grand Tour: The Legacy of the Voyager Probes | Stories From Space Podcast With Matthew S Williams
24:16
24:16
Play later
Play later
Lists
Like
Liked
24:16
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes Someday, they m…
…
continue reading
NEW! Text Us Direct Here! Summary This conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, including passwords and personal information. The conversation also delves into the operations of cybercrime gangs and their recr…
…
continue reading
1
The Misinformation Crisis: Navigating Technology and Truth in Modern Society | A Conversation with Joy Scott and Andrew Edwards | Redefining Society with Marco Ciappelli
41:28
41:28
Play later
Play later
Lists
Like
Liked
41:28
Guests: ✨ Joy Scott, President, Scott Public Relations [@Scott_PR] On LinkedIn | https://www.linkedin.com/in/scottpublicrelations/ Andrew Edwards, Founder and CEO, Verity7 On LinkedIn | https://www.linkedin.com/in/andrewvedwards/ On Twitter | https://x.com/AndrewVEdwards On Instagram | https://www.instagram.com/andrewvedwards1/ ____________________…
…
continue reading
1
Book | The Unthinkable Truth | A conversation about AI, The Future of Humanity, and Of Course About Storytelling | A Conversation With Author Dr. Yona Bouskila | Audio Signals Podcast With Marco Ciappelli ...
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10
Guest: Dr. Yona Bouskila, Author Website | https://www.yonabouskila.com/ _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli ______________________…
…
continue reading
1
2024 AppDome and OWASP Mobile Consumer Cyber Security Survey | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | An AppDome Brand Story with Brian Reed and Chris Roeckl | On Location Coverage ...
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02
In the latest Brand Story episode, host Sean Martin chats with Brian Reed, Mobile Security Evangelist, and Chris Roeckl, Chief Product Officer at AppDome, during the OWASP Global AppSec event in Lisbon. The episode dives into pivotal aspects of mobile app security and consumer expectations. Brian Reed articulates how AppDome collaborates with OWASP…
…
continue reading
1
Building a CISO Office: Mastering Enterprise Risk Management and Aligning Cybersecurity with Business Goals | Part 1 of 3 | A Conversation with Kush Sharma | Redefining CyberSecurity with Sean Martin
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25
Guest: Kush Sharma, Director Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario (MISA Ontario) On LinkedIn | https://www.linkedin.com/in/kush-sharma-9bb875a/ ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCybe…
…
continue reading
1
All About the CrowdStrike Outage – DTNS 4814
34:34
34:34
Play later
Play later
Lists
Like
Liked
34:34
Iyaz Akhtar is here with a review of Samsung’s flagship foldable Galaxy Z Fold 6. And We explain what happened with a CrowdStrike bug that crippled PCs around the world. Starring Tom Merritt, Sarah Lane, Iyaz Akhtar, Len Peralta, Roger Chang, Joe. To read the show notes in a separate page click here! Support the show on Patreon by becoming a suppor…
…
continue reading
1
Researcher detects what could have been one of the largest supply chain vulnerabilities to date. Cyber Security Today Weekend for July 20th
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29
Dodging the Biggest Supply Chain Attack Ever: An Insight with JFrog's Security Research Team In this weekend edition of Cyber Security Today, host Jim Love discusses with Brian Moussalli, the Security Research Team Lead at JFrog, how potentially the biggest supply chain attack was averted. They delve into the intricacies of supply chain attacks, th…
…
continue reading
1
Week in Review: Crowdstrike Microsoft outage, AT&T breach implications, CDK pays up
31:10
31:10
Play later
Play later
Lists
Like
Liked
31:10
Link to blog post – get exact one from https://cisoseries.com This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Adam Arellano, former vp, enterprise cybersecurity, PayPal Thanks to our show sponsor, Conveyor Why do teams choose Conveyor over the competition to automate answering security questionnaires? …
…
continue reading
Iyaz is here with a review of Samsung’s flagship foldable Galaxy Z Fold 6. And We explain what happened with a CrowdStrike bug that crippled PCs around the world. Starring Tom Merritt, Sarah Lane, Iyaz Akhtar, Len Peralta, Roger Chang, Joe. MP3 Download Using a Screen Reader? Click here Download the (VIDEO VERSION), here. Follow us on Twitter Instg…
…
continue reading
1
All About the CrowdStrike Outage - DTNS 4814
34:34
34:34
Play later
Play later
Lists
Like
Liked
34:34
Iyaz is here with a review of Samsung’s flagship foldable Galaxy Z Fold 6. And We explain what happened with a CrowdStrike bug that crippled PCs around the world. Starring Tom Merritt, Sarah Lane, Iyaz Akhtar, Len Peralta, Roger Chang, Joe. Link to the Show Notes. Become a member at https://plus.acast.com/s/dtns. Hosted on Acast. See acast.com/priv…
…
continue reading
1
ClowdStrike IT Outtage Hits F1 Team in Beautiful Moment of Irony
23:00
23:00
Play later
Play later
Lists
Like
Liked
23:00
I talk about a Kansas racetrack that needs saving and how the CrowdStrike IT debacle affected an F1 team in the most ironic way possible. That and more before my interview with Chace Barber from Edison Motors! Listen on the Radio in Colorado! AM1460 & FM 101.1 The Answer - Saturdays at 9am, Sundays at 6pm 100.7 The Word - Saturdays at 7pm AM 1400 K…
…
continue reading
Send us a Text Message. Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled Building a Culture of Cyber Resilience in Manufacturing. This initiative not only identified the sector’s primary c…
…
continue reading
1
Windows outage, Fin7 sells malware, Synnovis blood shortage
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40
Windows outage worldwide UK national blood stocks suffer the effects of ransomware Security flaws in SAP AI Core cloud-based platform Thanks to today's episode sponsor, Conveyor It’s Friday and Conveyor hopes you don’t have a meaty security questionnaire waiting for you on the other side of this podcast. If you do, you should check them out. As the…
…
continue reading
1
012: Back to the Basics, Back to the iPhone, Authy API Abuse
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34
This week we go back to the basics of privacy and security for the average Joe or Jane, and discuss the latest iPhone settings for privacy. I also discuss the Twilio Authy API abuse that resulted in 33 million phone numbers for Authy accounts being exposed. Huge thank you to the Patreon supporters! In this week's episode: Back to the basics Advice …
…
continue reading
1
Mind Games: Exploring Brain Reactions in Social Engineering
53:49
53:49
Play later
Play later
Lists
Like
Liked
53:49
NEW! Text Us Direct Here! We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ A…
…
continue reading
Where can you stream the Olympics and how are companies bundling their streaming options to make the most of it? Plus how are consumer protection laws conflicting with the roll out of AI? And Instagram will help research to determine if the service is bad for teen health. Starring Sarah Lane, Robb Dunewood, Roger Chang, Joe. To read the show notes …
…
continue reading
Where can you stream the Olympics and how are companies bundling their streaming options to make the most of it? Plus how are consumer protection laws conflicting with the roll out of AI? And Instagram will help research to determine if the service is bad for teen health. Starring Sarah Lane, Robb Dunewood, Roger Chang, Joe. MP3 Download Using a Sc…
…
continue reading
Where can you stream the Olympics and how are companies bundling their streaming options to make the most of it? Plus how are consumer protection laws conflicting with the roll out of AI? And Instagram will help research to determine if the service is bad for teen health. Starring Sarah Lane, Robb Dunewood, Charlotte Henry, Roger Chang, Joe. Link t…
…
continue reading
1
Dewey Murdick on enabling principles for AI governance; a landmark breach at AT&T
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43
Around the world policymakers seem to be grappling with the same question: How best to govern artificial intelligence? The Center for Security and Emerging Technology, a Washington-based think tank, has emerged as a key and influential player in that conversation. And on this episode of Safe Mode, its executive director, Dewey Murdick, sits down wi…
…
continue reading
1
University of Utah Health’s Victoria Tiase on Digital Health & Nursing: “We’re at a Real Inflection Point.”
30:30
30:30
Play later
Play later
Lists
Like
Liked
30:30
The best way to alleviate the documentation burden is by developing “tools that can help support nurses and create efficiencies.” The problem is that “we don’t have time right now to provide input,” said Victoria Tiase. In this interview, she talks about how digital transformation has affected nursing; the question vendors need to be asked; and how…
…
continue reading
Ever wondered how you’d cope during a natural disaster? In this episode of Zero Gravity Live, Tracy joins us to share her gripping tale of survival through a devastating hurricane in Houston. She recounts the struggles with power outages and the oppressive heat advisory that followed. Sterling chimes in with his experiences from the DMV area, while…
…
continue reading
1
CYFIRMA Research: Threat Actors Actively Exploiting CVE-2024-24919: Underground Forums Share IP Addresses of Vulnerable Check Point Security Gateway Devices
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30
A critical vulnerability (CVE-2024-24919) with a CVSS score of 8.6 has been discovered in EOL Check Point devices, allowing remote attackers to read arbitrary files. The Hacktivist group "Ghost Clan Malaysia" has shared affected IP addresses worldwide. Upgrade to supported versions and apply necessary hotfixes immediately to protect your data and i…
…
continue reading