Cybersec public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

Unsubscribe
Unsubscribe
Monthly+
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Artwork

1
Cybersecurity Basement – der Podcast für echten Security-Content

suresecure GmbH, Michael Döhmen, Andreas Papadaniil

Unsubscribe
Unsubscribe
Monthly
 
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast spricht Michael Döhmen alle 14 Tage mit spannenden Gästen über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. Ehrlich auf ...
  continue reading
 
Artwork

1
Cybersecurity Where You Are

Center for Internet Security

Unsubscribe
Unsubscribe
Monthly+
 
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
  continue reading
 
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
  continue reading
 
Der wöchentliche Podcast "Cybersecurity ist Chefsache - Der Podcast!" ist eine Plattform, auf der verschiedene Experten aus der Welt der Digitalisierung & Cybersecurity zusammenkommen, um über aktuelle Themen, Trends und praktische Anwendungen zu sprechen. Der Gastgeber Nico Werner lädt dazu Freunde, Kollegen oder gleichgesinnte aus allen Branche ein, um Ihre Erfahrungen und Meinungen zu teilen und um aktuelle Themen rund um Digitalisierung, Cybersecurity, OT-Sicherheit, Datenschutz und Info ...
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
  continue reading
 
Artwork

1
The Cybersecurity Digest

The Cybersecurity Digest LLC

Unsubscribe
Unsubscribe
Weekly+
 
In the ever-evolving world of cybersecurity, keeping updated on the latest developments is crucial. The Cybersecurity Digest is your curated source for the most recent cybersecurity updates. Our goal is to bring you a comprehensive roundup of news, ensuring you’re well-informed and ahead of the curve. Stay Informed to Stay Secure.
  continue reading
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
  continue reading
 
What risks lie at the intersection of healthcare and data? Are our food production capabilities at risk of cyberattack? How can we stay ahead of scammers, bad actors, and cybercriminals? Brought to you by the Cyber Innovation Hub and Business News Wales, and hosted by Carwyn Jones, the Cybersecurity Roundtables will bring together industry experts from across the cybersecurity landscape. These experts will discuss, on a sector-by-sector basis, the critical challenges facing the industry today.
  continue reading
 
Welcome to Security Sutra, a sub-podcast of Startuprad.io™, dedicated to safeguarding your startup against cyber threats in today's digital landscape. As part of one of the top 20 entrepreneurship podcasts on Apple Podcasts worldwide, we bring you vital insights into cybersecurity, blending deep tech with entrepreneurship to empower your startup. Our podcast features a diverse range of guests, including industry-leading cybersecurity entrepreneurs, Emmy winners, New York Times best-selling a ...
  continue reading
 
The podcast for sales and marketing teams that tackles the question: How can cybersecurity companies grow sales faster? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the right place.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
Cybervize Cybersecurity

Alexander Busse | Cybervize

Unsubscribe
Unsubscribe
Monthly
 
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
  continue reading
 
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
  continue reading
 
Artwork
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
  continue reading
 
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
  continue reading
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Monthly
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Artwork

1
C bot run : A K12 Cybersecurity Podcast

Jennette Irish Glass, John Rizzo, and Sean Whelan

Unsubscribe
Unsubscribe
Monthly
 
C:\bot_run is a K-12 Podcast produced by Technology Directors who are navigating the complicated and ever-changing realm of cybersecurity. Monthly episodes feature guests and topics designed around dialogue and resources focused on educating and networking with technology professionals.
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-startups-can-bolster-defenses-as-cyber-threats-loom-in-cloud-era. The transition to cloud-based infrastructure and remote work has dramatically expanded the attack surface for cybercriminals. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybe…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/scim-a-critical-yet-underappreciated-element-in-enterprise-iam. Discover how SCIM improves enterprise IAM complementing SSO for automated authentication and authorization. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also …
  continue reading
 
In this episode, Jeffrey is joined by Matthew Webster, founder, CEO and CISO for Cyvergence. Jeffrey and Matthew discuss movies where miscommunication impacts a character, the importance of CISOs communicating the business impact of cybersecurity and finding allies to help them do it.By Jeffrey Wheatman
  continue reading
 
Cybersecurity Digest for 17 July 2024: Today we discuss: MuddyWater’s Latest Cyber Onslaught and a sneaky backdoor! AT&T Pays Hackers – Was it Worth it? An Update on RiteAid’s Data Breach SEXi Ransomware group rebrands…. Meet APT INC! mSpy Breach SYS01 Stealer Malware: Malvertising across Social Media 15 Million Trello Email Addresses Leaked Google…
  continue reading
 
In episode 92 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by John Cohen, Executive Director of Countering Hybrid Threats at the Center for Internet Security® (CIS®). Together, they discuss "Enhancing Safety in the Connected World — A National Framework for Action," a multi-year project to help law enforcement an…
  continue reading
 
The latest episode of Reimagining Cyber dives into the recent major data breaches that have rocked the telecom sector, focusing on the latest AT&T incident. It begins by reflecting on the historical context of cyberattacks in telecom, noting T-Mobile’s previous breach involving 85 million records and a hefty $500 million settlement. Host of the sho…
  continue reading
 
With Howard away and today's episode of Hashtag Trending being all about security stories, I took the liberty of doing a cross posting. Hope we'll have Howard back next week. In today's episode of Hashtag Trending, host Jim Love covers significant cybersecurity news. Microsoft faces criticism for mishandling a reported MSHTML browser engine vulnera…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/actionable-threat-intelligence-at-google-scale-meet-google-threat-intelligence-powered-by-gemini. Google Threat Intelligence provides unparalleled visibility into the global threat landscape. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-snowflake-hack-and-its-domino-effect. Learn how to secure your company's data in the wake of major breaches. Discover a four-zone approach to data management that balances security and accessibility Check more stories related to cybersecurity at: https://hackernoon.com…
  continue reading
 
In this episode, cybersecurity expert Sandeep Lota, Nozomi Networks Field CTO, joins Dino Busalachi to discuss the challenges and innovations in OT cybersecurity. Key topics they explore include dealing with the evolution of OT security tools, the challenges with IT-OT convergence, and the increasing importance of continuous monitoring. Sandeep als…
  continue reading
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Intro Agenda Who are you wearing? Nerd Zone AT&T says criminals stole phone records of ‘nearly all’ customers in new data breach Microsoft informs customers that Russian hackers spied on emails Polyfill supply chain attack hits 100K+ sites Prudential Data Breac…
  continue reading
 
Today’s Episode Topics for 15 July 2024 AT&T Data Leaks 70%+ of public facing servers could be Vulnerable Apple warns iPhone customers of spyware in certain countries Netgear patches a Stored XSS Vulnerability A look at CrystalRay RiteAid hit with a data breach Disney’s Internal Slack possibly leaked Is your organization able to keep up with hacker…
  continue reading
 
Introduction: Host Introduction: Tanner Greer and Anthony Kent, two IT executives with 35 years of combined experience in the IT field, specializing in cybersecurity. Episode Overview: Discussion on Zero Trust security. Segment 1: Conference Recap Anthony's recent attendance at the IT conference for South Carolina co-ops. Key takeaway: Importance o…
  continue reading
 
Erweitere dein Wissen über digitale Sicherheit mit "Cybersecurity ist Chefsache". In der neuesten Episode begrüßt Nico Werner den erfahrenen IT- und OT Security Ingenieur bei Amprion GmbH, Mohamed Harrou. In dieser spannenden Folge enthüllen sie die wesentlichen Unterschiede zwischen Krisen und Notfällen und warum ein effektives Krisenmanagement in…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/tech-expert-durga-sanagana-advances-next-gen-firewalls-and-threat-modeling-techniques. Durga Prasada Rao Sanagana, the lead cybersecurity architect at a renowned financial organization, is a tech expert stepping up to combat cyber threats. Check more stories related to cyb…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/critical-vulnerability-in-swedish-bankid-exposes-user-data. A common misconfiguration found in services integrating BankID, allows attackers to take over victim's accounts exploiting a Session Fixation bug Check more stories related to cybersecurity at: https://hackernoon.…
  continue reading
 
This week we talk about Microsoft patches 140+ vulnerabilities including 2 zero days, in Patch Tuesday; Adobe patches critical issues in several of its products, 10 Billion Passwords leaked, 39,000 Ticket master tickets leaked, Chinese APT 40 hiijack routers Hackers are Targeting Wordpress plugins, A new attack bypasses RADIUS authentication CISA a…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/secure-and-dynamic-publishsubscribe-lcmsec-related-work. Introducing LCMSec, a secure, brokerless Publish/Subscribe protocol for IoT and automotive applications, enhancing LCM with low-latency. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybers…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/secure-and-dynamic-publishsubscribe-lcmsec-description-of-lcm. Introducing LCMSec, a secure, brokerless Publish/Subscribe protocol for IoT and automotive applications, enhancing LCM with low-latency. Check more stories related to cybersecurity at: https://hackernoon.com/c/…
  continue reading
 
On this episode of the SecureAF Podcast, Keelan Knox interviews our 2024 interns. They share insights on how they got in, what they are learning, and where this will take them. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcasts, Spotify and anywhere you get you're …
  continue reading
 
In dieser Folge unserer Serie "Security Incident" sprechen Michael und Jona über die ersten sieben Tage nach der Entdeckung eines Sicherheitsvorfalls. Ab dem zweiten Tag, manchmal auch schon ab dem ersten, geht es richtig los: Teams werden zusammengestellt und der Krisenstab trifft sich zweimal täglich, vormittags und nachmittags, denn in den erste…
  continue reading
 
Welcome to Brass Tacks - Talking Cybersecurity, the latest Fortinet podcast series where we discuss the business implications of cybersecurity. We're kicking off the first episode as our host, Joe Robertson, is joined by Wolfgang Bitomsky, Chief Information Officer for FCC Environment CEE, a European leader in sustainable waste management services.…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/cybersecurity-and-ai-meetings-and-insights-from-the-nexus-2050-conference. The Nexus 2050 conference brought together experts and stakeholders to discuss a wide range of critical topics related to cybersecurity and global resilience. Check more stories related to cybersecu…
  continue reading
 
In episode 91 of Cybersecurity Where You Are, Sean Atkinson is joined by Charity Otwell, Director of the CIS Critical Security Controls® (CIS Controls®) at the Center for Internet Security® (CIS®). Together, they discuss what you need to know about the release of CIS Controls v8.1. Here are some highlights from our episode: 01:17. What you can expe…
  continue reading
 
Join hosts Stan Wisseman and Rob Aragao as they engage with Martin Roesch, CEO of Netography and creator of Snort. With over 25 years in cybersecurity, Martin discusses network security evolution, especially in network observability. He explains the shift from traditional deep packet inspection (DPI) to leveraging metadata for network analysis due …
  continue reading
 
Secondo i dati diffusi dalla banca digitale Revolut, ad essere maggiormente colpiti dalle truffe online sono le generazioni più giovani e non quelle più vecchie come si potrebbe pensare. Abbiamo intervistato Jenny Radcliffe, People hacker ed esperta in ingegneria sociale, che con Revolut ha lavorato a una campagna sulle frodi. ASCOLTA LA PUNTATA…
  continue reading
 
Financial scams and cyber breaches are hitting more Americans than ever. This week, Zach and Lauro dive into common personal scams and cyber attacks, sharing essential prevention tips and steps to take if you're targeted. Tune in and share with non-tech-savvy friends to help them stay safe from online criminals. Pick up your copy of Cyber Rants on …
  continue reading
 
Erweitere dein Wissen über digitale Sicherheit mit "Cybersecurity ist Chefsache". In der neuesten Episode begrüßt Nico Werner den erfahrenen CISO der Jungheinrich AG, Tim Sattler. In dieser inspirierenden Folge enthüllen sie Tims außergewöhnliche Reise von seiner Leidenschaft für die Astronomie hin zur strategischen Informationssicherheit und disku…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/understanding-authentication-a-guide-to-cookie-based-and-session-based-authentication. Cookies-Based Authentication Vs. Session-Based Authentication: All You Should Know! Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also c…
  continue reading
 
With the cyber threat landscape ever evolving it can be challenging to stay up to date on the latest cybersecurity developments. There are so many fantastic security news sites and blogs out there. However, due to the sheer number of resources, I found it difficult to read them all and I wished there was a consistent way for me to listen to the lat…
  continue reading
 
This episode features an interview with a cybersecurity and privacy lawyer about responding to cyber attacks Navigating Ransomware Response: Insights from Cybersecurity Expert Imran Ahmad In this episode features an interview between Howard Solomon and Imran Ahmad, a partner at Norton Rose Fulbright, discussing effective strategies for managing ran…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/cyber-scum-are-free-to-exploit-vulnerabilities-without-fear. Cyber Scum Are Free To Exploit Vulnerabilities Without Fear. 3 out of 1,000 malicious cyber incidents. Only 3 out of 1,000 are brought to justice Check more stories related to cybersecurity at: https://hackernoon…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/effective-proxy-server-design-and-implementation. Explore the principles of proxy server design, key architectural considerations, and best practices for efficient and secure network management. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyber…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/balancing-usability-and-security-in-the-wake-of-a-breach-an-interview-with-magpie-protocols-cio. We sat with Dr. Ali Raheman, Founder of Magpie, to get his perspective on DeFi security concerns and their experience and learnings following getting hacked. Check more stories…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/solving-crimes-with-data-the-btk-killer-and-the-power-of-metadata-analysis. Explore how metadata analysis led to the capture of the BTK killer and learn about the powerful role of tools like Metagoofil in modern cybersecurity efforts. Check more stories related to cybersec…
  continue reading
 
In this episode, Jeffrey talks to Octavia Howell, CISO at Equifax. Jeffrey and Octavia discuss movies that have done a good job at implementing diversity in storylines and characters, the isolation that women and people of color can feel at security events and what can be done to make the industry more inclusive.…
  continue reading
 
In episode 90 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by the following guests: Charity Otwell, Director of the CIS Critical Security Controls® (CIS Controls®) at the Center for Internet Security® (CIS®) Mia LaVada, Product Manager of CIS Benchmarks and Cloud at CIS Don Freeley, VP of IT Services at CIS Toget…
  continue reading
 
Integration and communication between Cloud Security and the Security Operations Center (SOC) is now a top priority for effective security. Cloud Security teams focus on securing cloud infrastructure, managing identity and access, and ensuring data protection, while SOC teams monitor, detect, and respond to threats in real time. Effective collabora…
  continue reading
 
In this episode, we delve into the recent cyber attack on CDK Global, a leading technology provider for the automotive industry. This incident, which disrupted operations for thousands of car dealerships across the United States, serves as a stark reminder of the vulnerabilities in our interconnected digital landscape. Join us as we explore the imm…
  continue reading
 
Loading …

Quick Reference Guide