Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Basement – der Podcast für echten Security-Content
suresecure GmbH, Michael Döhmen, Andreas Papadaniil
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast spricht Michael Döhmen alle 14 Tage mit spannenden Gästen über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. Ehrlich auf ...
…
continue reading
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
…
continue reading
Der wöchentliche Podcast "Cybersecurity ist Chefsache - Der Podcast!" ist eine Plattform, auf der verschiedene Experten aus der Welt der Digitalisierung & Cybersecurity zusammenkommen, um über aktuelle Themen, Trends und praktische Anwendungen zu sprechen. Der Gastgeber Nico Werner lädt dazu Freunde, Kollegen oder gleichgesinnte aus allen Branche ein, um Ihre Erfahrungen und Meinungen zu teilen und um aktuelle Themen rund um Digitalisierung, Cybersecurity, OT-Sicherheit, Datenschutz und Info ...
…
continue reading
Cybersecurity
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
…
continue reading
In the ever-evolving world of cybersecurity, keeping updated on the latest developments is crucial. The Cybersecurity Digest is your curated source for the most recent cybersecurity updates. Our goal is to bring you a comprehensive roundup of news, ensuring you’re well-informed and ahead of the curve. Stay Informed to Stay Secure.
…
continue reading
A bi-weekly podcast where pressing cybersecurity and information technology issues are discussed.
…
continue reading
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
…
continue reading
Your daily cybersecurity news for cyber professionals.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
…
continue reading
What risks lie at the intersection of healthcare and data? Are our food production capabilities at risk of cyberattack? How can we stay ahead of scammers, bad actors, and cybercriminals? Brought to you by the Cyber Innovation Hub and Business News Wales, and hosted by Carwyn Jones, the Cybersecurity Roundtables will bring together industry experts from across the cybersecurity landscape. These experts will discuss, on a sector-by-sector basis, the critical challenges facing the industry today.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Welcome to Security Sutra, a sub-podcast of Startuprad.io™, dedicated to safeguarding your startup against cyber threats in today's digital landscape. As part of one of the top 20 entrepreneurship podcasts on Apple Podcasts worldwide, we bring you vital insights into cybersecurity, blending deep tech with entrepreneurship to empower your startup. Our podcast features a diverse range of guests, including industry-leading cybersecurity entrepreneurs, Emmy winners, New York Times best-selling a ...
…
continue reading
The podcast for sales and marketing teams that tackles the question: How can cybersecurity companies grow sales faster? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the right place.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
We are a discord community of cyber security enthusiasts. We host various "Ask Me Anythings" and put them here for people to enjoy any time they like. Discord: https://discord.gg/r4JxpJS
…
continue reading
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
…
continue reading
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Byte-sized tutorials to prepare for Comptia Network+ exam, and for beginners who want to enter into cybersecurity.
…
continue reading
Host John Bambenek discusses complex cybersecurity issues
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
L’heure de la cybersécurité est un podcast passionnant de sensibilisation et qui vous tient informés des dernières actualités sur la cybersécurité en Afrique et dans le monde.
…
continue reading
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: info@4s-ag.de https://www.4s-ag.de
…
continue reading
Pensez cybersécurité est un balado ayant pour objectif, de sensibiliser les Canadiennes et les Canadiens aux enjeux de cybercriminalité, et de les aider à travers une série de conseils à mieux protéger leurs données en ligne. Animation : Winy Bernard
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
C:\bot_run is a K-12 Podcast produced by Technology Directors who are navigating the complicated and ever-changing realm of cybersecurity. Monthly episodes feature guests and topics designed around dialogue and resources focused on educating and networking with technology professionals.
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Startups Can Bolster Defenses as Cyber Threats Loom in Cloud Era
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13
This story was originally published on HackerNoon at: https://hackernoon.com/how-startups-can-bolster-defenses-as-cyber-threats-loom-in-cloud-era. The transition to cloud-based infrastructure and remote work has dramatically expanded the attack surface for cybercriminals. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SCIM: A Critical Yet Underappreciated Element in Enterprise IAM
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14
This story was originally published on HackerNoon at: https://hackernoon.com/scim-a-critical-yet-underappreciated-element-in-enterprise-iam. Discover how SCIM improves enterprise IAM complementing SSO for automated authentication and authorization. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISOs Need to Tell Good Stories and the Right Allies to Help Tell Them
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35
In this episode, Jeffrey is joined by Matthew Webster, founder, CEO and CISO for Cyvergence. Jeffrey and Matthew discuss movies where miscommunication impacts a character, the importance of CISOs communicating the business impact of cybersecurity and finding allies to help them do it.By Jeffrey Wheatman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MuddyWater’s Cyber Onslaught, AT&T Pays, Trello Leak, and Sys01 Malvertising Campaign
15:16
15:16
Play later
Play later
Lists
Like
Liked
15:16
Cybersecurity Digest for 17 July 2024: Today we discuss: MuddyWater’s Latest Cyber Onslaught and a sneaky backdoor! AT&T Pays Hackers – Was it Worth it? An Update on RiteAid’s Data Breach SEXi Ransomware group rebrands…. Meet APT INC! mSpy Breach SYS01 Stealer Malware: Malvertising across Social Media 15 Million Trello Email Addresses Leaked Google…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 92: A Framework to Counter Evolving Cyber Threats
33:19
33:19
Play later
Play later
Lists
Like
Liked
33:19
In episode 92 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by John Cohen, Executive Director of Countering Hybrid Threats at the Center for Internet Security® (CIS®). Together, they discuss "Enhancing Safety in the Connected World — A National Framework for Action," a multi-year project to help law enforcement an…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Telecom Data Risks: Government's Role in the Fight - Ep 106
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46
The latest episode of Reimagining Cyber dives into the recent major data breaches that have rocked the telecom sector, focusing on the latest AT&T incident. It begins by reflecting on the historical context of cyberattacks in telecom, noting T-Mobile’s previous breach involving 85 million records and a hefty $500 million settlement. Host of the sho…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Microsoft's Bug Reporting Criticized, Disney Hacked, and Kaspersky Exits US. Cyber Security Today Special Edition from Hashtag Trending
7:24
7:24
Play later
Play later
Lists
Like
Liked
7:24
With Howard away and today's episode of Hashtag Trending being all about security stories, I took the liberty of doing a cross posting. Hope we'll have Howard back next week. In today's episode of Hashtag Trending, host Jim Love covers significant cybersecurity news. Microsoft faces criticism for mishandling a reported MSHTML browser engine vulnera…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Actionable Threat Intelligence at Google Scale: Meet Google Threat Intelligence Powered by Gemini
7:08
7:08
Play later
Play later
Lists
Like
Liked
7:08
This story was originally published on HackerNoon at: https://hackernoon.com/actionable-threat-intelligence-at-google-scale-meet-google-threat-intelligence-powered-by-gemini. Google Threat Intelligence provides unparalleled visibility into the global threat landscape. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/the-snowflake-hack-and-its-domino-effect. Learn how to secure your company's data in the wake of major breaches. Discover a four-zone approach to data management that balances security and accessibility Check more stories related to cybersecurity at: https://hackernoon.com…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Future Trends in Industrial Cybersecurity with Sandeep Lota of Nozomi Networks
22:18
22:18
Play later
Play later
Lists
Like
Liked
22:18
In this episode, cybersecurity expert Sandeep Lota, Nozomi Networks Field CTO, joins Dino Busalachi to discuss the challenges and innovations in OT cybersecurity. Key topics they explore include dealing with the evolution of OT security tools, the challenges with IT-OT convergence, and the increasing importance of continuous monitoring. Sandeep als…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#20 - Security Awareness Training (part 1)
1:15:43
1:15:43
Play later
Play later
Lists
Like
Liked
1:15:43
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Intro Agenda Who are you wearing? Nerd Zone AT&T says criminals stole phone records of ‘nearly all’ customers in new data breach Microsoft informs customers that Russian hackers spied on emails Polyfill supply chain attack hits 100K+ sites Prudential Data Breac…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AT&T Data Leak, Millions of Email Servers Vulnerable, and Disney's Slack Leaked?
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20
Today’s Episode Topics for 15 July 2024 AT&T Data Leaks 70%+ of public facing servers could be Vulnerable Apple warns iPhone customers of spyware in certain countries Netgear patches a Stored XSS Vulnerability A look at CrystalRay RiteAid hit with a data breach Disney’s Internal Slack possibly leaked Is your organization able to keep up with hacker…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
E18 – Building a Secure Network with the Zero Trust Blueprint
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07
Introduction: Host Introduction: Tanner Greer and Anthony Kent, two IT executives with 35 years of combined experience in the IT field, specializing in cybersecurity. Episode Overview: Discussion on Zero Trust security. Segment 1: Conference Recap Anthony's recent attendance at the IT conference for South Carolina co-ops. Key takeaway: Importance o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Krisenmanagement in der digitalen Welt: Mohamed Harrous Tipps für IT-Notfälle!
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51
Erweitere dein Wissen über digitale Sicherheit mit "Cybersecurity ist Chefsache". In der neuesten Episode begrüßt Nico Werner den erfahrenen IT- und OT Security Ingenieur bei Amprion GmbH, Mohamed Harrou. In dieser spannenden Folge enthüllen sie die wesentlichen Unterschiede zwischen Krisen und Notfällen und warum ein effektives Krisenmanagement in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tech Expert Durga Sanagana Advances Next-Gen Firewalls and Threat Modeling Techniques
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38
This story was originally published on HackerNoon at: https://hackernoon.com/tech-expert-durga-sanagana-advances-next-gen-firewalls-and-threat-modeling-techniques. Durga Prasada Rao Sanagana, the lead cybersecurity architect at a renowned financial organization, is a tech expert stepping up to combat cyber threats. Check more stories related to cyb…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Critical Vulnerability in Swedish BankID Exposes User Data
13:20
13:20
Play later
Play later
Lists
Like
Liked
13:20
This story was originally published on HackerNoon at: https://hackernoon.com/critical-vulnerability-in-swedish-bankid-exposes-user-data. A common misconfiguration found in services integrating BankID, allows attackers to take over victim's accounts exploiting a Session Fixation bug Check more stories related to cybersecurity at: https://hackernoon.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Digest for week of 12 July 2024
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27
This week we talk about Microsoft patches 140+ vulnerabilities including 2 zero days, in Patch Tuesday; Adobe patches critical issues in several of its products, 10 Billion Passwords leaked, 39,000 Ticket master tickets leaked, Chinese APT 40 hiijack routers Hackers are Targeting Wordpress plugins, A new attack bypasses RADIUS authentication CISA a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Awesomeness Podcast - Episode 68
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss leveraging AI for audits of Static Application Security Testing (SAST).By Enterprise Management Associates + DEVOPSdigest
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Secure and Dynamic Publish/Subscribe: LCMsec: Related Work
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32
This story was originally published on HackerNoon at: https://hackernoon.com/secure-and-dynamic-publishsubscribe-lcmsec-related-work. Introducing LCMSec, a secure, brokerless Publish/Subscribe protocol for IoT and automotive applications, enhancing LCM with low-latency. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybers…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Secure and Dynamic Publish/Subscribe: LCMsec: Description of LCM
2:50
2:50
Play later
Play later
Lists
Like
Liked
2:50
This story was originally published on HackerNoon at: https://hackernoon.com/secure-and-dynamic-publishsubscribe-lcmsec-description-of-lcm. Introducing LCMSec, a secure, brokerless Publish/Subscribe protocol for IoT and automotive applications, enhancing LCM with low-latency. Check more stories related to cybersecurity at: https://hackernoon.com/c/…
…
continue reading
On this episode of the SecureAF Podcast, Keelan Knox interviews our 2024 interns. They share insights on how they got in, what they are learning, and where this will take them. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcasts, Spotify and anywhere you get you're …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security Incident: Die ersten sieben Tage - Stabile Seitenlage durchgeführt, was nun?
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44
In dieser Folge unserer Serie "Security Incident" sprechen Michael und Jona über die ersten sieben Tage nach der Entdeckung eines Sicherheitsvorfalls. Ab dem zweiten Tag, manchmal auch schon ab dem ersten, geht es richtig los: Teams werden zusammengestellt und der Krisenstab trifft sich zweimal täglich, vormittags und nachmittags, denn in den erste…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Brass Tacks #1 - Onboarding the Board with Cybersecurity
17:32
17:32
Play later
Play later
Lists
Like
Liked
17:32
Welcome to Brass Tacks - Talking Cybersecurity, the latest Fortinet podcast series where we discuss the business implications of cybersecurity. We're kicking off the first episode as our host, Joe Robertson, is joined by Wolfgang Bitomsky, Chief Information Officer for FCC Environment CEE, a European leader in sustainable waste management services.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity and AI: Meetings and Insights from the Nexus 2050 Conference
10:23
10:23
Play later
Play later
Lists
Like
Liked
10:23
This story was originally published on HackerNoon at: https://hackernoon.com/cybersecurity-and-ai-meetings-and-insights-from-the-nexus-2050-conference. The Nexus 2050 conference brought together experts and stakeholders to discuss a wide range of critical topics related to cybersecurity and global resilience. Check more stories related to cybersecu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Third Party Risk Management Doesn’t Stop When the Contract is Executed
31:01
31:01
Play later
Play later
Lists
Like
Liked
31:01
In this episode, Jeffrey talks to Melissa Mellen, Head of Third Party Risk Management for the Federal Reserve Bank of New York. They discuss movies that have unforeseen plot twists and the myriad challenges related to addressing third party risk management in cybersecurity.By Jeffrey Wheatman
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 91: What You Need to Know about CIS Controls v8.1
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07
In episode 91 of Cybersecurity Where You Are, Sean Atkinson is joined by Charity Otwell, Director of the CIS Critical Security Controls® (CIS Controls®) at the Center for Internet Security® (CIS®). Together, they discuss what you need to know about the release of CIS Controls v8.1. Here are some highlights from our episode: 01:17. What you can expe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Martin Roesch’s Insights: Multi-Cloud Network Security - Ep 105
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18
Join hosts Stan Wisseman and Rob Aragao as they engage with Martin Roesch, CEO of Netography and creator of Snort. With over 25 years in cybersecurity, Martin discusses network security evolution, especially in network observability. He explains the shift from traditional deep packet inspection (DPI) to leveraging metadata for network analysis due …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Truffe online, Gen Z e Millenials tra i più colpiti
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07
Secondo i dati diffusi dalla banca digitale Revolut, ad essere maggiormente colpiti dalle truffe online sono le generazioni più giovani e non quelle più vecchie come si potrebbe pensare. Abbiamo intervistato Jenny Radcliffe, People hacker ed esperta in ingegneria sociale, che con Revolut ha lavorato a una campagna sulle frodi. ASCOLTA LA PUNTATA…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode #120 - Defending Against Personal Cyber Attacks
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58
Financial scams and cyber breaches are hitting more Americans than ever. This week, Zach and Lauro dive into common personal scams and cyber attacks, sharing essential prevention tips and steps to take if you're targeted. Tune in and share with non-tech-savvy friends to help them stay safe from online criminals. Pick up your copy of Cyber Rants on …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, July 8, 2024 - A New Ransomware Group Is Discovered
2:09
2:09
Play later
Play later
Lists
Like
Liked
2:09
A new ransomware group that has been discovered is highlighted in this editionBy Howard Solomon
…
continue reading
Erweitere dein Wissen über digitale Sicherheit mit "Cybersecurity ist Chefsache". In der neuesten Episode begrüßt Nico Werner den erfahrenen CISO der Jungheinrich AG, Tim Sattler. In dieser inspirierenden Folge enthüllen sie Tims außergewöhnliche Reise von seiner Leidenschaft für die Astronomie hin zur strategischen Informationssicherheit und disku…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Understanding Authentication: A Guide to Cookie-Based and Session-Based Authentication
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32
This story was originally published on HackerNoon at: https://hackernoon.com/understanding-authentication-a-guide-to-cookie-based-and-session-based-authentication. Cookies-Based Authentication Vs. Session-Based Authentication: All You Should Know! Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also c…
…
continue reading
With the cyber threat landscape ever evolving it can be challenging to stay up to date on the latest cybersecurity developments. There are so many fantastic security news sites and blogs out there. However, due to the sheer number of resources, I found it difficult to read them all and I wished there was a consistent way for me to listen to the lat…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, Week in Review for week ending July 5, 2024
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36
This episode features an interview with a cybersecurity and privacy lawyer about responding to cyber attacks Navigating Ransomware Response: Insights from Cybersecurity Expert Imran Ahmad In this episode features an interview between Howard Solomon and Imran Ahmad, a partner at Norton Rose Fulbright, discussing effective strategies for managing ran…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Awesomeness Podcast - Episode 67
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss getting your data ready for AI.By Enterprise Management Associates + DEVOPSdigest
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Scum Are Free To Exploit Vulnerabilities Without Fear
8:54
8:54
Play later
Play later
Lists
Like
Liked
8:54
This story was originally published on HackerNoon at: https://hackernoon.com/cyber-scum-are-free-to-exploit-vulnerabilities-without-fear. Cyber Scum Are Free To Exploit Vulnerabilities Without Fear. 3 out of 1,000 malicious cyber incidents. Only 3 out of 1,000 are brought to justice Check more stories related to cybersecurity at: https://hackernoon…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, July 5, 2024 - Prepare for business email compromise attacks
3:30
3:30
Play later
Play later
Lists
Like
Liked
3:30
A report on business email compromise attacks is highlighted in this editionBy Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Effective Proxy Server Design and Implementation
15:53
15:53
Play later
Play later
Lists
Like
Liked
15:53
This story was originally published on HackerNoon at: https://hackernoon.com/effective-proxy-server-design-and-implementation. Explore the principles of proxy server design, key architectural considerations, and best practices for efficient and secure network management. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyber…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Balancing Usability and Security in the Wake of a Breach: An Interview With Magpie Protocol's CIO
5:32
5:32
Play later
Play later
Lists
Like
Liked
5:32
This story was originally published on HackerNoon at: https://hackernoon.com/balancing-usability-and-security-in-the-wake-of-a-breach-an-interview-with-magpie-protocols-cio. We sat with Dr. Ali Raheman, Founder of Magpie, to get his perspective on DeFi security concerns and their experience and learnings following getting hacked. Check more stories…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Solving Crimes with Data: The BTK Killer and the Power of Metadata Analysis
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58
This story was originally published on HackerNoon at: https://hackernoon.com/solving-crimes-with-data-the-btk-killer-and-the-power-of-metadata-analysis. Explore how metadata analysis led to the capture of the BTK killer and learn about the powerful role of tools like Metagoofil in modern cybersecurity efforts. Check more stories related to cybersec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
An Honest Look at Diversity and Inclusion in the Security Industry
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08
In this episode, Jeffrey talks to Octavia Howell, CISO at Equifax. Jeffrey and Octavia discuss movies that have done a good job at implementing diversity in storylines and characters, the isolation that women and people of color can feel at security events and what can be done to make the industry more inclusive.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 90: Migrating to the Cloud with Control Continuity
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05
In episode 90 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by the following guests: Charity Otwell, Director of the CIS Critical Security Controls® (CIS Controls®) at the Center for Internet Security® (CIS®) Mia LaVada, Product Manager of CIS Benchmarks and Cloud at CIS Don Freeley, VP of IT Services at CIS Toget…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, July 3, 3034 - Beware of advanced attack tactics
3:41
3:41
Play later
Play later
Lists
Like
Liked
3:41
This episode reports on some of the new ways threat actors are bypassing phishing defencesBy Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
Integration and communication between Cloud Security and the Security Operations Center (SOC) is now a top priority for effective security. Cloud Security teams focus on securing cloud infrastructure, managing identity and access, and ensuring data protection, while SOC teams monitor, detect, and respond to threats in real time. Effective collabora…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The CDK Cyber Fallout: A Wake-Up Call for the Auto Industry - Ep 104
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54
In this episode, we delve into the recent cyber attack on CDK Global, a leading technology provider for the automotive industry. This incident, which disrupted operations for thousands of car dealerships across the United States, serves as a stark reminder of the vulnerabilities in our interconnected digital landscape. Join us as we explore the imm…
…
continue reading