show episodes
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork
 
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
  continue reading
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Security Architecture Podcast

Evgeniy Kharam & Dmitry Raidman

Unsubscribe
Unsubscribe
Monthly
 
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
  continue reading
 
Artwork
 
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
  continue reading
 
Artwork

1
Business Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Weekly+
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
The Millennium Alliance Podcast offers Fortune 1000 C-Level executives, leading public sector/government officials, and thought leaders across a variety of disciplines a unique and exclusive platform to present opportunities to their peers, share industry developments, and tell the story of their career and overall company value. Headquartered in Midtown Manhattan, The Millennium Alliance is a leading technology, business, and educational advisory firm. Focusing primarily in areas such as bu ...
  continue reading
 
Artwork

1
Surveillance Report

Techlore & The New Oil

Unsubscribe
Unsubscribe
Weekly+
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-net--6102015/support.
  continue reading
 
Artwork

51
CXOTalk

Michael Krigsman

Unsubscribe
Unsubscribe
Weekly
 
Executive CXO conversations on leadership, AI, and the digital economy with the world's top business innovators. Hosted by well-known Industry Analyst Michael Krigsman. Subscribe: www.cxotalk.com/subscribe YouTube: www.youtube.com/channel/UCGeqHuR3eUU5tnmgjkqZazw LinkedIn: linkedin.com/company/cxotalk Twitter: twitter.com/cxotalk
  continue reading
 
Artwork

1
XenTegra - The Citrix Session

XenTegra / Andy Whiteside / Bill Sutton

Unsubscribe
Unsubscribe
Monthly+
 
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
Artwork

1
Humane Tech

Jeffrey S. Kaye, mozutech

Unsubscribe
Unsubscribe
Monthly
 
Too often we work at the pleasure of technology. This is backwards. Technology should serve our needs and support our humanity. Instead, we can use tools to translate our desires into the language that technology requires. You aren’t alone in this…I will be your guide. Together, we'll protect our personal privacy, security, and get better use of technology.
  continue reading
 
Artwork

1
Dashamaya

Wali Kukula FM

Unsubscribe
Unsubscribe
Monthly
 
Here we talk about many untalked subjects in Sri Lanka and in the world and also talked about subjects to give our take on it. Brought to you by Shiyon Perera. If you enjoy listening be sure to follow and let us know on social media: https://twitter.com/dashamaya_ https://www.facebook.com/DashamayaPodcast/
  continue reading
 
These are new product announcements from my main website (Open 24/7/365). We have a life-time warranty / guarantee on all products. (Includes parts and labor). Here you will find a variety of cutting-edge Surveillance and Security-Related products and services. (Buy/Rent/Layaway) Post your own comments and concerns related to the specific products or services mentioned or on surveillance, security, privacy, etc.
  continue reading
 
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
  continue reading
 
Welcome to Ethical Data, Explained, where we delve into the world of data and data collection. In our podcast, we aim to debunk common myths surrounding web scraping and answer burning questions like: Is web scraping legal? Is it ethical to use proxies for data collection? Why do companies scrape data? etc. We invite tech entrepreneurs, data security experts, lawmakers, and hackers to look at data and public data collection from various points of view to unlock safe and ethical web scraping ...
  continue reading
 
Artwork
 
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
  continue reading
 
Loading …
show series
 
In this special episode of the Shared Security Podcast, host Tom Eston interviews Vivek Ramachandran, the founder of SquareX. Vivek shares his journey in WiFi security, recounting his introduction of the Cafe Latte man-in-the-middle attack and founding of Pentest Academy. He discusses his latest venture, SquareX, a company focused on browser securi…
  continue reading
 
In this special episode of the Shared Security Podcast, host Tom Eston interviews Vivek Ramachandran, the founder of SquareX. Vivek shares his journey in WiFi security, recounting his introduction of the Cafe Latte man-in-the-middle attack and founding of Pentest Academy. He discusses his latest venture, SquareX, a company focused on browser securi…
  continue reading
 
TechSpective Podcast Episode 133 Nick Edwards, Vice President of Product Management at Menlo Security joins me for this insightful episode of the TechSpective Podcast. Nick brings decades of cybersecurity experience to the table, offering a deep dive into the […] The post Enhancing Enterprise Browser Security appeared first on TechSpective.…
  continue reading
 
The recent rise in adversarial AI has made it clear: organizations must fight AI with better AI. Gone are the days of relying on legacy, antiquated endpoint detection and response offerings, or cybersecurity tools that are based on ineffective machine learning models. In this interview, Deep Instinct CIO Carl Froggett will explain why Deep Learning…
  continue reading
 
In this episode, Host Ron Eddings is joined by guests Anirban Banerjee, CEO and Co-Founder at Riscosity, and James Berthoty, Founder and Analyst at Latio Tech. Together they focus on data security, AI-driven product development, and the challenges of implementing AI solutions responsibly. Anirban discusses the importance of organizational buy-in an…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
🌟 Welcome to Episode 842 of CXOTalk! 🌟 Join us for an insightful conversation with Sridhar Vembu, CEO and Founder of Zoho, a global leader in cloud-based business software. In this episode, we explore innovative strategies for business growth and sustainability, focusing on leveraging rural talent and fostering innovation outside traditional urban …
  continue reading
 
In this episode, Oliver Cronk, Doro Hinrichs and Kira Clark from Scott Logic are joined by Peter Gostev, Head of AI at Moonpig. Together, they explore whether we can ever really trust and secure Generative AI (GenAI), while sharing stories from the front line about getting to grips with this rapidly evolving technology. With its human-like, non-det…
  continue reading
 
In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police Department’s new guidelines on facial recognition technology following a lawsuit over a wrongful arrest due to misidentification, sh…
  continue reading
 
In episode 337, we cover “broken” news about the new SSH vulnerability 'regreSSHion' highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police Department's new guidelines on facial recognition technology following a lawsuit over a wrongful arrest due to misidentification, sh…
  continue reading
 
Episode 185: Proton Drive now allows collaborative Docs editing, Big Tech platforms are changing their Privacy Policies to allow AI training with user data, Discord is experimenting with end-to-end encryption, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eA…
  continue reading
 
The 'Three Buddy Problem' Podcast Episode 3: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on …
  continue reading
 
TechSpective Podcast Episode 134 There is a lot of talk about identity protection–password policies and best practices, requiring two-factor or multifactor authentication, user credentials exposed in phishing attacks and data breaches, etc. What we don’t talk about nearly as […] The post Extending Modern Identity Protection for Comprehensive Securi…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Q&A184: How can we trust FOSS? Are there any apps you shouldn't trust with FOSS? What are our privacy & security thoughts on biohacking? How do we approach uncertainy in threat modeling? How do ISPS collect data? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded** Welcome to the Surveillance Report - featuring Te…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
In this episode, Host Ron Eddings catches up with one of his colleagues, Whitney Palacios, Vice President and CISO at BigBear.ai. They explore the challenges and responsibilities of being a CISO and Whitney addresses key cybersecurity issues such as the importance of balancing security with innovation, especially in the context of AI. Whitney offer…
  continue reading
 
In CXOTalk episode 841, host Michael Krigsman sits down with Yousuf Khan, Partner at Ridge Ventures and former multi-time CIO, to explore the transformative impact of AI on venture capital, startups, and enterprise AI. Key topics include: • Separating AI hype from reality in VC investing • Evaluating AI startups and their long-term potential • The …
  continue reading
 
In this episode, they dive deep into the world of software development. Adam and Shawn are joined by special guest Simon Cropp. Together, they embark on a comprehensive discussion about snapshot testing in the dotnet ecosystem, with a specific focus on the powerful tool known as Verify. You'll learn about the different APIs for managing values, the…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
In episode 336 of the Shared Security Podcast, we discuss the Biden administration’s recent ban on Kaspersky antivirus software in the U.S. due to security concerns linked to its Russian origins. We also highlight the importance of keeping all software updated, using recent examples of supply chain attacks that have compromised several popular Word…
  continue reading
 
In episode 336 of the Shared Security Podcast, we discuss the Biden administration's recent ban on Kaspersky antivirus software in the U.S. due to security concerns linked to its Russian origins. We also highlight the importance of keeping all software updated, using recent examples of supply chain attacks that have compromised several popular Word…
  continue reading
 
Episode 184: Local accounts on Windows just got more difficult to create, a new red flag about Telegram security, updates from Mullvad, a ton of data breaches, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps Sources 00:00 Intro…
  continue reading
 
Another edition of Tech Talk, today we dove into password efficiency and how to keep a constant record of your passwords to increase security. Also, we talked about Dark Web, Brave browser tips, internet service provider options, Starlink new tech, Linux, saving to your desktop and more! Doug Swinhart answers any tech or device questions you may ha…
  continue reading
 
We love to hear from you! In this episode, we’re focusing on the rising trend of IT outsourcing and its implications for cybersecurity. As more businesses delegate non-core tasks to third-party providers, they inadvertently open doors to trust relationship attacks. We'll explore how attackers exploit the trust between companies and their service pr…
  continue reading
 
Loading …

Quick Reference Guide