It Security public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
  continue reading
 
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

Unsubscribe
Unsubscribe
Weekly
 
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy weekly episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Mission.org is a media studio producing content for world-cla ...
  continue reading
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
IT Ops Query

TechTarget Editorial

Unsubscribe
Unsubscribe
Monthly+
 
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at TechTarget.
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman and Paul Robichaux, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork
 
The Cloudcast (@cloudcastpod) is the industry's #1 Cloud Computing podcast, and the place where Cloud meets AI. Co-hosts Aaron Delp (@aarondelp) & Brian Gracely (@bgracely) speak with technology and business leaders that are shaping the future of business. Topics will include Cloud Computing | AI | AGI | ChatGPT | Open Source | AWS | Azure | GCP | Platform Engineering | DevOps | Big Data | ML | Security | Kubernetes | AppDev | SaaS | PaaS .
  continue reading
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
  continue reading
 
Artwork

1
The BLC Connection

Ben Lomand Connect

Unsubscribe
Unsubscribe
Monthly
 
The BLC Connection Podcast is a fun and informative show from Ben Lomand Connect that answers your questions about the internet, Wi-Fi, home security and more, and brings you information on the stories and events in “Ben Lomand Country.” Bryan, Karen and Micah take you behind the scenes of Ben Lomand Connect, where the cooperative connects Middle Tennessee with the latest in communications technology and with businesses that are making a difference in our service territory. The BLC Connectio ...
  continue reading
 
Artwork
 
If you’re looking to understand the business of cybersecurity, then Business Security Weekly is your show! Matt Alderman, Jason Albuquerque, and Ben Carr cover cybersecurity for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your cybersecurity program, solve real problems, learn leadership ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

Unsubscribe
Unsubscribe
Monthly
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
  continue reading
 
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
  continue reading
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

51
Conversations in Close Protection

Chuck Randolph & Chris Story

Unsubscribe
Unsubscribe
Monthly
 
Conversations In Close Protection is a podcast about the Executive/Close Protection industry. We use the podcast to enhance discussions about the industry and promote values, information and education within the Close Protection Community and try to have fun doing it!
  continue reading
 
Artwork
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema and John Kinsella on a journey through modern cybersecurity practices for applications, clouds, containers, and more.
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Broadcasting world-class sport. Keeping hospitals running 24/7. Your boss knowing that, of course, you can join the Teams meeting from your 2-hour train journey. What do all of these things have in common? Fantastic tech, and even better people. Join us in hitting refresh on The F5 podcast, bringing you amazing stories about the human side of tech, and leaving the jargon at the door.
  continue reading
 
A podcast on all things related to IT Security from the CompTIA IT Security Community. If you’re not already part of the CompTIA IT Security Community, join here (https://bit.ly/2Pat2OD) and be on the forefront of new technologies in IT security and evaluate new opportunities and challenges for businesses in the security space.
  continue reading
 
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Loading …
show series
 
Send us a text Welcome to Season 3 of the MLSecOps Podcast, brought to you by Protect AI! In this episode, MLSecOps Community Manager Charlie McCarthy speaks with Sander Schulhoff, co-founder and CEO of Learn Prompting. Sander discusses his background in AI research, focusing on the rise of prompt engineering and its critical role in generative AI.…
  continue reading
 
In this episode of the Security Table with Chris Romeo, Izar Tarandach, and Matt Coles, the team dives into the evolving landscape of modern security approaches. They discuss the shift from strategy to tactics, the impact of data breaches, and why people are becoming numb to such incidents. The episode also touches on the importance of understandin…
  continue reading
 
Welcome to Episode 384 of the Microsoft Cloud IT Pro Podcast. In this episode, we tackle a wide range of essential topics to help you monitor, secure, and streamline operations across your Azure estate. From access control strategies to virtual machine agents and everything in between, this episode gives you a high-level overview of Microsoft Defen…
  continue reading
 
Kevin E. Greene is public sector CTO at OpenText Cybersecurity. Prior to his current role, Kevin worked at the MITRE Corporation supporting DevSecOps initiatives for sponsors, ATT&CK research, and MITRE’s Common Weakness Enumeration program, and served as cyber research and development program manager at the US Department of Homeland Security. Kevi…
  continue reading
 
Security clearance holders have self reporting requirements, but they also have requirements to report issues about their coworkers or fellow security clearance holders. Some think that sounds like the government getting into office gossip. Sean Bigley and Lindy Kyzer discuss the self reporting requirements and why they're a crucial part of the sec…
  continue reading
 
Welcome to this episode of That IT Show podcast, where we continue discussing security. In this episode, we're diving deep into the recent Microsoft recall and the alarming rise of zero-day attacks targeting Windows systems. We're not just scratching the surface—we've brought in a seasoned expert, our colleague mr. Zlatan Moric from the cybersecuri…
  continue reading
 
Secure messaging apps are one of the most-used app categories on current mobile devices, and a significant subset of human communication is handled through them. This makes them an interesting target for forensics, surveillance, and general information collection for intelligence services and police institutions. In this talk, we will discuss vario…
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
Send us a text I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II. Similarly, we can loo…
  continue reading
 
The source is an audio recording of a podcast episode focused on providing advice for those seeking to enter the cybersecurity field. The host, Marc, offers insights on acquiring practical experience, the importance of certifications, the significance of soft skills, strategies for successful job interviews, and effective networking methods. He emp…
  continue reading
 
Brian Jack is chief information security officer and data protection officer at KnowBe4, a security awareness training software vendor based in Clearwater, Florida. The company made headlines in July when it thwarted an attempt by a North Korean nation-state actor to infiltrate its software engineering staff. The company did hire the attacker, who …
  continue reading
 
Tim Hinds, Senior Vice President of Human Resources, joined us on a recent episode of the Security Clearance Careers Podcast, ClearedCast. We gained insights into FTI’s dynamic workplace culture and its focus on career development and individual success. Learn more about FTI and explore careers. Hosted on Acast. See acast.com/privacy for more infor…
  continue reading
 
In Episode 279 of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss the latest cybersecurity news and issues. Stories include Transportation for London requiring in-person password resets after a security incident, Google’s new ‘air-gapped’ backup service, the impact of a rogue ‘Whois’ server, and the ongoing ramifications of the …
  continue reading
 
In this episode of ShadowTalk, host Chris, along with Corey and Anna, discuss the latest news in cyber security and threat research. Topics this week include: Threat actors express difficulty in retrieving stolen Fortinet data Amadey malware's novel approach: Users locked in Kiosk Mode Aftermath of incident affecting Transport for London (TFL) Reli…
  continue reading
 
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? Also, Jussi asks Tobi an unexpected question. (00:00) - Intro and catching up. …
  continue reading
 
Episode 30: Joey Rachid – Professionalizing the CISO Role & Building Strong Cyber Teams In this episode of The Professional CISO Show, host David Malicoat interviews Joey Rachid, Chief Information Security Officer (CISO) at UST. Joey takes us on a fascinating journey from his early days in the U.S. Marine Corps, where he first got involved with tec…
  continue reading
 
In the latest episode of Reimagining Cyber, Rob interviews Bindu Sundaresan, Director of Cybersecurity Solutions at Level Blue, about the evolution and significance of cyber resilience. Bindu, with over 20 years in cybersecurity, discusses how the field has shifted from a focus solely on prevention to a broader approach that includes resilience and…
  continue reading
 
Jay Madheswaran (Founder & CEO @ Eve) talks about bringing AI to the legal vertical and the intersection of AI/ML of increased efficiency for legal firms. SHOW: 857 SHOW TRANSCRIPT: The Cloudcast #857 Transcript SHOW VIDEO: https://youtube.com/@TheCloudcastNET CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw NEW TO CLOUD? CHECK OUT OUR OTHER …
  continue reading
 
The security clearance polygraph continues to generate a lot of questions from security clearance applicants. Jill Hamilton, senior editor at ClearanceJobs comes on the show to discuss the security clearance polygraph process and a recent series of articles that discussed the security clearance polygraph. Hosted on Acast. See acast.com/privacy for …
  continue reading
 
Do you know how asymmetric encryption works? While at the Kansas City Developers Conference, Richard sat down with Eli Holderness to discuss many of the encryption technologies being used today—and the new options coming in the future! Eli talks about how symmetrical encryption and public key encryption have been the focus of modern encryption, esp…
  continue reading
 
80% Chinese Cranes, Drones vs. Abrahams, a RAG kickstart, a Canary-based Security Maturity Model, and more... Check out Wiz for a Free Could Security Scan: https://www.wiz.io/ul Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmie…
  continue reading
 
In which we discuss alleged Spotify streaming ad fraud that brought in millions, extremely poor voter outreach and an extended tangent on AI. Correction: we failed to make the "Ramen Empire" joke. Our apologies. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Hacked
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
Send the hosts a message - try it now! TL;DR: This week's episode features Aaron Bray, CEO of Phylum. We use this episode as a complete primer on SBOM (Software Bill of Materials). We cover the typical "lot of ground" but try to answer the question of what SBOMs are, how they're useful, and what you as practitioners can do now that you have them. Y…
  continue reading
 
Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales. From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech. Evgeniy Kharam has authored “Architecting Success: The Art …
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode was recorded in front of a live audience in Seattle as part of the National Cybersecurity Alliance’s event Convene. Recording is hosted by me, David Spark (@dspark), producer of CISO Series and Nicole Ford, SVP and CISO, Nordstrom. Joining us is guest, Varsha Agr…
  continue reading
 
In the leadership and communications segment, Why Companies Should Consolidate Tech Roles in the C-Suite, End of an era: Security budget growth slows down, Global cybersecurity workforce growth flatlines, stalling at 5.5M pros, and more! Show Notes: https://securityweekly.com/bsw-364
  continue reading
 
On this episode, Tony Lambert, CTO of TechSmith, discusses how TechSmith stays at the forefront of innovation by listening to customer needs, conducting research, and staying informed about industry trends. Plus, he explains why TechSmith has invested in content creation roles and how, in the future, video AI may be able to diagram manual skills, t…
  continue reading
 
In this conversation, I speak with Shiladitya Sircar, Senior VP of Product Engineering and Data Science at BlackBerry. We talk about: The Rise of Deepfakes and Cyber Threats Innovation Meets Malicious Intent: Deepfakes are not just a tech novelty; they’re a growing threat. From text-based phishing to hyper-realistic fake videos and audio, the lands…
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
Life changing books, defining your core problems, the Apple updates, and much more... ➡ Check out Vanta and get $1000 off: vanta.com/unsupervised Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https:…
  continue reading
 
Guest: Josh Liburdi, Staff Security Engineer, Brex Topics: What is this “security data fabric”? Can you explain the technology? Is there a market for this? Is this same as security data pipelines? Why is this really needed? Won’t your SIEM vendor do it? Who should adopt it? Or, as Tim says, what gets better once you deploy it? Is reducing cost a bi…
  continue reading
 
ClearanceJobs Connect is now less than ONE MONTH away! The excitement is high and anticipation is building for the ONLY conference focused on cleared recruiting and security clearance process and policy on Oct. 3, at the Hyatt Regency in Reston, V.A. Hear all about it on this week's episode and click the link to register: https://about.clearancejob…
  continue reading
 
In this episode, Robby speaks with Jens Christian Vedersø, Head of Cyber Risk Management at Vestas, one of the world’s largest wind turbine manufacturers. Jens is a former Navy and intelligence officer and recovering regulator. Before managing cyber risk in the renewable energy sector, Jens helped develop energy sector legislation and cyber prepare…
  continue reading
 
Back from some recent travel, we look at why it’s important to listen to people from around the world to understand the differences between how global regions adopt technology. SHOW: 856 SHOW TRANSCRIPT: The Cloudcast #856 Transcript SHOW VIDEO: https://youtube.com/@TheCloudcastNET CLOUD NEWS OF THE WEEK: http://bit.ly/cloudcast-cnotw CHECK OUT OUR…
  continue reading
 
Enjoying the content? Let us know your feedback! Today’s topic is one that mixes the marvel of modern technology with some very real concerns. We’re talking about the rise of Large Language Models, or LLMs, how they’re rapidly being adopted across industries, and the potential for sensitive data leakage on the open web. It’s a thrilling time for AI…
  continue reading
 
Welcome to this episode of "ThatITShow," where we dive into the cutting-edge world of artificial intelligence and explore two of the most powerful AI systems shaping the future: Grok and ChatGPT. In this episode, we’ll break down the unique capabilities of each, discussing their roles in revolutionizing industries, enhancing productivity, and trans…
  continue reading
 
Send us a text We’re back to discuss an all-too-familiar topic – ransomware. Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resourc…
  continue reading
 
In this episode of ShadowTalk, host Chris Morgan, along with Marken Teder, discuss the latest news in cyber security and threat research. Topics this week include: Russia's Military Intelligence target CNI, identified using "Non-Lethal Acoustic Weapons" New Sextortion scam targets spouses Privacy concerns with smart automobiles ReliaQuest research …
  continue reading
 
We've covered the Azure Well-Architected Framework (WAF) in the past. It also got a significant rewrite recently, and this week, we look at the updated Reliability pillar with Bastian Ulke from Microsoft. What is it? How should you utilize this pillar? Bastian also talks about the recommendations and patterns within Reliability. Also, Bastian asks …
  continue reading
 
Applying for a security clearance is stressful. When you finally get in front of a background investigator, some applicants feel the pressure to impress that person and hopefully improve their clearance chances. Unfortunately, trying to butter up to your investigator won't make your process of getting a clearance any easier - and it could just make…
  continue reading
 
In this episode of the Security Table, our hosts discuss the concept of the 'Shared Fate Model' in cloud security. The conversation explores how this model builds on the shared responsibility model and the implications for cloud service providers and consumers. From robust default security measures to the historical evolution of ISPs, the discussio…
  continue reading
 
On the show this week, Steve Goodman is joined by IT industry veteran, Paul Thurrott to talk a variety of subjects he'll be speaking on in his keynote at TEC 2024 - namely Windows and Copilot. As Microsoft have had a turbulent year with both, we get Paul's take on it. Want to stay up to date on all things Practical 365? Follow us on Twitter, Facebo…
  continue reading
 
In this episode of The Professional CISO Show, host David Malicoat is joined by Matt Walker, Managing Director of Security and Compliance at Goosehead Insurance. Matt shares his unique journey from a career in commercial art to becoming a cybersecurity leader. Together, they explore the evolving role of the CISO and the importance of professionaliz…
  continue reading
 
Loading …

Quick Reference Guide