show episodes
 
Artwork

1
Blackcatloner

Blackcatloner

Unsubscribe
Unsubscribe
Monthly
 
The exploits of vlogger Blackcatloner who navigates his way through life proving that he is truly one lone cat against a big bad world. Also includes Blackcat Riffs, where he riffs on Public Domain educational movies, Blackcatloner Reviews and more.
  continue reading
 
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
  continue reading
 
Artwork

1
Cybberssecurity Podcast

Nathanael Dick and Andrew Nuxoll

Unsubscribe
Unsubscribe
Monthly
 
Join us on a cybersecurity journey like no other! In our podcast, we dive into the dynamic world of cybersecurity, exploring the latest topics and trends. We blend insightful discussions with a touch of humor and real-world anecdotes to keep you informed, entertained, and one step ahead of the cyber threats lurking out there. Tune in for a unique blend of cybersecurity insights and a dash of 'BS' – because learning about security doesn't have to be dry and boring!
  continue reading
 
Artwork
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
Loading …
show series
 
The manufacturing threat landscape is evolving rapidly, with increased automation and remote access needs making Operational Technology (OT) environments more vulnerable to cyber threats. As attackers become more sophisticated, manufacturers must adapt to protect their critical infrastructure and maintain business continuity. Join Tia Hopkins, Fiel…
  continue reading
 
The manufacturing industry is facing an increasingly complex threat landscape, characterized by expanding attack surfaces due to continuous IT transformation and interconnected OT environments. Key threats such as ransomware and sophisticated social engineering attacks are exploiting these vulnerabilities, making robust security measures and swift …
  continue reading
 
In this episode of Cyber Talks, Erin McLean and Eldon Sprickerhoff, Founder & Advisor of eSentire, to discuss the latest trends and misconceptions in cybersecurity. Eldon shares his recent experience of being inducted into the Waterloo Entrepreneur Hall of Fame, reflecting on his journey and the importance of support from his family and colleagues.…
  continue reading
 
In this follow-up episode, we reunite with aspiring cybersecurity professional Chris Frey to dive deeper into the strategies for breaking into the cybersecurity field. This time, our focus is on the power of personal interactions and building connections both in-person and online. Chris shares his journey, highlighting the key steps he took to netw…
  continue reading
 
In this episode of Cyber Talks, Erin McLean, Chief Marketing Officer at eSentire, sits down with Bob Layton, Chief Channel Officer, and Tommy Wald, CEO of RIATA Technologies, to discuss the evolution of MSSP services, the importance of building strong client relationships, and the necessity of robust vendor partnerships. Tommy and Bob also share th…
  continue reading
 
Although mergers and acquisitions (M&As) are strategic moves that can propel companies toward greater market share, enhanced capabilities, and increased innovation, one critical aspect often overlooked is cybersecurity. Ensuring robust cybersecurity during the M&A process is paramount, as it safeguards the integrity of both companies involved, prot…
  continue reading
 
For those who want to enter the cybersecurity field, especially if they come from a non-technical background, there is no shortage of opportunities. Just ask Kristin Kelly, our Growth Marketing Programs Specialist, who was recently recognized as a Young Professional to Watch by the International Legal Technology Association (ILTA). In this conversa…
  continue reading
 
In this episode, Ciaran Luttrell, Sr. Director of SOC Operations, EMEA, is joined by Rob Watson, SVP Security Services, to discuss security operations. Specifically, they chat about how SOCs should be structured, how to build a high-performing team of SOC Analysts, helping your team tackle burnout, and what it really takes to build an in-house SOC.…
  continue reading
 
In this episode, we sit down with Spence Hutchinson, Sr. Staff Threat Intelligence Researcher with our Threat Response Unit (TRU), and chat about the ransomware landscape, the cybercriminal "gig" economy, and which industries and types of businesses are most at risk of ransomware attacks. Key takeaways from the conversation include: The evolution o…
  continue reading
 
In this installment of the cybersecurity podcast, we sit down with cybersecurity recruitment expert, Stephanie Zavala, to dive into the current trends shaping the job market in cybersecurity. She shares insights on salary movements, the most sought-after specialties in the field, and much more.By Nathanael Dick and Andrew Nuxoll
  continue reading
 
In this episode, we sit down with Joe Panettieri, Founder of Channel Angels, Sustainable Tech Partner, and Mentore Ventures, to discuss how Joe got his start as a communications intern at IBM, his approach to making cybersecurity communications clear and digestible, and the dynamic nature of the cybersecurity industry. He also shares the lessons le…
  continue reading
 
The AlphV/BlackCat ransomware-as-a-service gang has been in the news lately thanks to the recent ransomware attack on Change Healthcare that resulted in widespread disruptions to healthcare services and allegedly resulted in the organization paying a $22 million ransom. Shortly thereafter, an affiliate claimed that BlackCat cheated them out of thei…
  continue reading
 
Private Equity (PE) firms are increasingly targeted due to their comprehensive disclosure requirements, possession of sensitive data, and wide network of portfolio companies, making them lucrative targets for cybercriminals. What's more, threat actors exploit these characteristics to gain access to an extensive network by breaching just one entity.…
  continue reading
 
Since its emergence in 1911, every year on March 8, we celebrate International Women's Day to recognize the inspiring contributions that women have made in the professional and personal lives of those around them. In this episode, Erin McLean talks to Tia Hopkins and Andrea Markstrom, the Chief Information Officer at Schulte Roth & Zabel LLP and Fo…
  continue reading
 
Since their emergence in 2019 under the moniker 'ABCD', the LockBit ransomware-as-a-service gang has carved out a notorious reputation as a leading purveyor of ransomware. Their notoriety was cemented by pioneering triple extortion techniques and causing unprecedented disruption across the globe. However, they suffered a significant blow with the o…
  continue reading
 
In this episode, we explore Michael Smith's journey from an Air Force IT Manager to VP of Infrastructure and Operations at Trinity Industries, Inc., highlighting his pivotal roles and the cybersecurity landscape within the architecture, engineering, and construction sectors. Michael shares insights on outsourcing cybersecurity teams, the strategic …
  continue reading
 
Given the macroeconomic climate, security leaders are constantly tasked to do more with less – you’re being asked to take on more responsibility and protect your organizations against increasing cyber threats while balancing evolving regulatory frameworks and third-party vendor risk management. In this episode, Tia Hopkins, Chief Cyber Resilience O…
  continue reading
 
Join us as we sit down with aspiring cybersecurity professional Chris Frey to discuss the ins and outs of breaking into the cybersecurity field. We cover practical tips you need to know to kickstart your cybersecurity career. Whether you're a newcomer or a seasoned professional, this episode provides valuable insights and inspiration to carve your …
  continue reading
 
Whether you're on the football field or on the cybersecurity battlefield, being resilient means being able to bounce back stronger after a setback. On the field, it's about how quickly your team is able to adapt to a bad start or a late-game deficit to take the win. In cybersecurity, it's about how your organization can anticipate, withstand, and r…
  continue reading
 
The role of any security leader – be it the CISO, CIO, VP Security, or even Director of Security, is that of a grandmaster in chess. Every move in the first phase sets the tone for the game, and the world of cybersecurity is no different. As a new security leader, your first 90 days can either establish a robust defense against cyber threats or lea…
  continue reading
 
Step into the fascinating world of cybersecurity with our latest podcast featuring Gary De Mercurio, a distinguished penetration tester renowned for his involvement in an classic penetration test courthouse break-in that sent shockwaves through the industry. In this gripping interview, Gary takes us on a journey around his experience and helps us a…
  continue reading
 
🎄 Holiday Cyber Tips 🎁 'Tis the season to be merry and cyber-safe! Join Andrew Nuxoll and Nathanael Dick on a quick journey through essential holiday cyber tips. From safeguarding your social media cheer to dodging order scams, phishing, and travel risks – we've got you covered. 🔍 Spot Fake Websites 🌐 Secure Your Domains 📧 Verify Order Confirmation…
  continue reading
 
join us for a quick dive into the latest cybersecurity headlines. We dissect Boeing and Booking.com breaches, focusing on the LockBit malware and Scattered Spider hacking group. Plus, we stress the crucial balance of trust and verification in cybersecurity insurance. Short, sweet, and secure—tune in for a bite-sized update on the cyber front. Happy…
  continue reading
 
In this episode of the Cybberssecurity Podcast, we dive deep into the latest developments in the world of cybersecurity, exploring two major breaches that have sent shockwaves through the tech industry: Okta and ServiceNow. We'll also dissect the legal battle surrounding the SolarWinds CISO that sheds light on the often murky world of cybersecurity…
  continue reading
 
Celebrate Cybersecurity Awareness Month with hosts Andrew Nuxoll and Nathanael Dick in this special episode as we unravel the CDW and 23andMe data breaches and then explore the intersection of artificial intelligence and digital security. Discover the causes, consequences, and cutting-edge AI solutions to protect your data in the digital age. Don't…
  continue reading
 
In this upcoming podcast episode, we'll kick things off by introducing ourselves and giving you a sneak peek into our plans for the Cybberssecurity Podcast. In the episode we will cover some current cybersecurity incidents: the MGM and Caesars hacks and we'll dissect how these companies handled the disclosures and what valuable lessons we can extra…
  continue reading
 
Modern threat response requires the ability to collect unstructured data from disparate sources associated with attacker tactics, techniques, and procedures (TTPs) and operationalize global protections – all in a timely manner. Unfortunately, many in-house security teams don't have the bandwidth or expertise to perform proactive threat hunting, con…
  continue reading
 
Loading …

Quick Reference Guide