show episodes
 
Artwork

1
CISO Series Podcast

David Spark, Mike Johnson, and Andy Ellis

Unsubscribe
Unsubscribe
Weekly
 
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
  continue reading
 
SC Media is proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community. Listen to previous CISO Stories podcast episodes at cis ...
  continue reading
 
Artwork
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
Artwork
 
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership.
  continue reading
 
SC Media is proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community. Listen to previous CISO Stories podcast episodes at cis ...
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
  continue reading
 
Artwork

1
CISO insiders

GRSee Consulting

Unsubscribe
Unsubscribe
Monthly
 
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
  continue reading
 
Join Query CISO Neal Bridges and VP - Distinguished Engineer Jonathan Rau as they explore the world of SecDataOps. What is it? Who should care about it? Wait, wasn’t it a throwaway joke?
  continue reading
 
Artwork

1
Heavy Strategy

Packet Pushers

Unsubscribe
Unsubscribe
Monthly+
 
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Greg Ferro and Johna Till Johnson bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions ...
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

Unsubscribe
Unsubscribe
Weekly
 
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft Azure and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Artwork

1
CISO Talk

Techstrong Group

Unsubscribe
Unsubscribe
Monthly+
 
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
  continue reading
 
Artwork

1
Cybility Savvy

Michala Liavaag

Unsubscribe
Unsubscribe
Monthly
 
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
  continue reading
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork

1
Cybersecurity Where You Are

Center for Internet Security

Unsubscribe
Unsubscribe
Monthly+
 
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork
 
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
  continue reading
 
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
  continue reading
 
Artwork

1
Enterprise Software Defenders

Enterprise Software Defenders

Unsubscribe
Unsubscribe
Monthly
 
Enterprise Software Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. ESD is hosted by Evan Reiser, the CEO & founder of Abnormal Security, and Mike Britton, the CISO of Abnormal Security.
  continue reading
 
Security Market Watch is about stories of the cybersecurity industry. Every week, we follow trends and gather insights from industry leaders. We interview professionals with fingers on the pulse of what's happening in their slice of the industry, bringing our listeners information needed and necessary to make informed decisions. Whether you're a startup looking for market insights or a CIO/CISO facing the immense challenges of the job, this is the show for you.
  continue reading
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
  continue reading
 
The Cloud Frontier podcast by simplyblock brings you topics around the founding of early-stage cloud infrastructure startups, entrepreneurship and taking visionary ideas to market. Explore their fundraising journeys, go-to-market strategies, and the challenges of finding product-market fit. Tune in to discussions on AI, machine learning, and the future of cloud technologies. Whether you're a tech enthusiast, aspiring entrepreneur, or industry professional (CTO, CIO, CISO, VP of Infrastructur ...
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Artwork

1
Soulful CXO Podcast

Soulful CXO, ITSPmagazine Soulful CXO, ITSPmagazine

Unsubscribe
Unsubscribe
Monthly+
 
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
  continue reading
 
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
  continue reading
 
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
Monthly
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
  continue reading
 
Loading …
show series
 
In the latest episode of Life of a CISO, Dr. Eric Cole delves into the critical role that risk management plays in cybersecurity and executive leadership. He begins by revisiting the foundational definition of cybersecurity—understanding, managing, and mitigating the risk of critical assets being disclosed, altered, or denied access. Dr. Cole empha…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Sherron Burgess, CISO, BCD Travel. In this episode: Disingenuous clai…
  continue reading
 
In this episode of The Professional CISO Show, host David Malicoat is joined by Sonja Hammond, the Chief Information Security Officer and Vice President of IT Architecture and Engineering at National Veterinary Associates. Sonja shares her remarkable journey from land administration to becoming a cybersecurity leader, offering valuable insights on …
  continue reading
 
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
  continue reading
 
Matthew Harvey an information security professional with both deep and wide experience in the field of computers and networking. He has been in the computer business full-time since 1997, and has done a little bit of everything. He has expertise in everything from intrusion detection and malware analysis to Cisco LAN and WAN internetworking configu…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is Fredrick Lee (Flee), CISO, Reddit. In this episode: The case for the technical CISO Making Recall safe for business The aches …
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy delves into the intricate world of Identity and Access Management (IAM). Learn the essentials and best practices of IAM, including user registration, identity proofing, directory services, identity federation, credential issuance, and much more. Stay informed about the latest trends like proximi…
  continue reading
 
In this episode of The New CISO, host Steve is joined by Larry Pfeifer, CEO and President of Metrics That Matter. Although Larry is not a CISO, he has worked in many adjacent fields, including the US military, university IT research, sales engineering, and more. As a result of his vast experience, Larry has a unique lens on cybersecurity. Listen to…
  continue reading
 
On the 17th episode of Enterprise Software Defenders, host Evan Reiser (Abnormal Security) talks with Mark Ferguson, CISO at Bombardier. Bombardier is a Canadian multinational aircraft company best known for producing premium business jets. It has over 17,000 employees and over $8 billion in annual revenue. In this conversation, Mark shares his tho…
  continue reading
 
🧠 In this episode of CISO Insiders, we welcome Ray Espinoza, the CISO at Inspectiv. Ray Espinoza discusses in detail key skills as a leader in the cybersecurity industry. Ray also answers some of the more hard-pressing questions about being a CISO and a leader in the organization while also striking a balance between life and work. 👇🏻 This special …
  continue reading
 
In this episode, Joseph Carson interviews Myrna Soto, former Global CISO for Comcast, about the changing role of CISOs. Myrna shares her journey into cybersecurity and highlights the importance of business relationships and brand protection. She also offers tips on communicating with the board and staying informed. Tune in for valuable insights and…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO, The Carlyle Group Thanks to today’s episode sponsor, Nudge Security When your CEO asks “Hey, are we using that SaaS app that was just breached?”, how quickly and confidently can you answer? Stop guessing with Nudge…
  continue reading
 
Three Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misat…
  continue reading
 
There was a SOC analyst who searched what he knew, But had so much data, he didn’t know what to do. He tried to centralize, but it was a tragedy, So he listened to experts for a modern day strategy. This week, Query CISO Neal Bridges will sit down with NeXasure CEO Rick McElroy to discuss modern data strategy in the SOC and what you can do to set y…
  continue reading
 
In this riveting episode of Breakfast Bytes, host Felicia sits down with Crystal Redmann, the inquisitive Operations Director from Redmann Farms, to dive into the intricacies of network security. Crystal brings forth compelling questions about network segmentation, shedding light on how this fundamental security measure can protect even the smalles…
  continue reading
 
Kremlin complains of DDoS attack, digital experts not so sure FAA proposes new cybersecurity rules for airplanes Windows Recall to reappear Thanks to today’s episode sponsor, Nudge Security Do you know who’s using genAI tools in your org? Find out today with Nudge Security. Their patented approach to SaaS discovery gives you a full inventory of all…
  continue reading
 
🚨 Jenkins Bug Exploit Still Active, Github Authentication Flaw, Post Quantum Crypto Deep Dive 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Jenkins struggles to patch an active exploit with more news below: Github authentication flaw Microsoft…
  continue reading
 
Security initiative from Japanese auto companies Feds tapping into encrypted messaging haul Microsoft breaks Linux dual-boot systems Thanks to today’s episode sponsor, Nudge Security How big is your SaaS attack surface? Find out today with Nudge Security. Nudge Security discovers all SaaS accounts ever created by anyone in your org, in minutes, and…
  continue reading
 
Bryan Ware is an entrepreneur, innovator and technology business leader who served as the first Presidentially appointed Assistant Director of Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA). Bryan is deeply knowledgeable about the current threat and geopolitical landscapes, along with emerging technologies like AI. He'…
  continue reading
 
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? Also, Jussi asks Tobi an unexpected question. (00:00) - Intro and catching up. …
  continue reading
 
🚨 Microchip Cyberattack Halts Production, Data Hashing Ruling, RFID Cards Backdoor, Secure Open Source 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Microchip reels from a cyberattack with more news below: FTC Hashing Rule Azure Kubernetes Vul…
  continue reading
 
This is our third and final episode of this miniseries. In this episode we are joined by Ross Young, a well-established member of the cybersecurity community with a storied background and penchant for giving back via various means. Ross joins Allan and Drew in exploring the role of technology in the People, Process and Technology triad. Questions c…
  continue reading
 
Platformization is a hot topic in the cybersecurity industry, especially as use cases converge and vendor consolidation continues. Phil Calvin, chief product officer at Delinea, joins Joe to talk about how a platform approach changes the mindset around software development to prioritize agility and accelerate innovation. The two discuss how platfor…
  continue reading
 
In episode 97 of Cybersecurity Where You Are, Tony Sager is joined by the following guests: Dr. Ramon Barquin, Board Member at the Center for Internet Security® (CIS®) and President and Chief Executive Officer at Barquin International Franklin Reeder, Director Emeritus and Founding Chair of CIS as well as Director of the National Cybersecurity Scho…
  continue reading
 
Toyota confirms third-party data breach impacting customers Man who hacked Hawaii state registry sentenced U.S. Intelligence blames Iran for Trump campaign hack Thanks to today’s episode sponsor, Nudge Security When your CEO asks “Hey, are we using that SaaS app that was just breached?”, how quickly and confidently can you answer? Stop guessing wit…
  continue reading
 
Guest: Cash Nickerson, Chairman & CEO, Nickerson Stoneleigh, Inc Website: https://cashnickerson.com/ LinkedIn: https://www.linkedin.com/in/stevencashnickerson/ Facebook: https://www.facebook.com/cashnickersonauthor Twitter: https://twitter.com/cashnickerson Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-r…
  continue reading
 
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
  continue reading
 
🚨 The Known Facts of National Public Data Breach, Toyota Confirms Breach, Iran Blamed for Hack on Trump & Harris 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as National Public Data confirms data breach with more news below: Toyota confirms Data…
  continue reading
 
How can we reimagine social media to make it safer for everyone? Tracy Chou is on a mission to do just that. Join Block Party founder, Tracy Chou, as she sits down with Roo to share her thoughts on privacy in an always online world and what led her to create Privacy Party: A tool that's reshaping the way we use social media and giving power back to…
  continue reading
 
‘Only’ 1.3 million affected by National Public Data Breach Flaws in Microsoft macOS Apps allowing secret recording Configuration issue exposes flight tracking site Thanks to today’s episode sponsor, Nudge Security Do you know who’s using genAI tools in your org? Find out today with Nudge Security. Their patented approach to SaaS discovery gives you…
  continue reading
 
In this episode of Cloud Frontier, host Rob Pankow, CEO of ⁠simplyblock⁠, is joined by Mihai Mărcuță from ⁠NodeShift, a company decentralized cloud platforms that helps to connect enterprises with spare data center capacity, offering GPUs, storage and compute. Mihai talks about the origin story of NodeShift, as well as his experience of fundraising…
  continue reading
 
In this episode, we explore the rapid rise of AI in businesses and the pressing need for security teams to stay ahead of the curve. As organizations increasingly adopt AI technologies, the potential for Shadow AI and other security risks grows. Brad Bussie, Chief Information Security Officer at e360, discusses how security leaders can navigate this…
  continue reading
 
🚨 National Public Data Confirms Breach, SolarWinds Zeroday Exploit,Netsuite Exposes Customer Data, Ransomware News 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as National Public Data confirms data breach with more news below: T-Mobile Fined Cry…
  continue reading
 
Microsoft Entra admins must enable MFA or lose access to admin portals Cybercrime gang uses fake Windows update screen to hide data theft Google Pixel devices shipped with vulnerable Verizon app Thanks to today’s episode sponsor, Nudge Security How big is your SaaS attack surface? Find out today with Nudge Security. Nudge Security discovers all Saa…
  continue reading
 
Three Buddy Problem - Episode 8: This week’s show digs into Microsoft’s in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran’s aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions. Hosts: Costi…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Edwin Covert, head of cyber risk engineering, Bowhead Specialty Underwriters and edwincovert.com Thanks to our show sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden y…
  continue reading
 
GitHub vulnerability warning regarding ArtiPacked RansomHub affiliate launches new EDR-killing tool SolarWinds issues hotfix for web help desk vulnerability Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker h…
  continue reading
 
Welcome to Breakfast Bytes with Felicia King. Today, we delve deep into the often-misunderstood realm of penetration testing. As business owners grapple with the necessity and costs associated with these tests, Felicia demystifies the process, drawing from her three decades of cybersecurity expertise. In this episode, discover why traditional penet…
  continue reading
 
In this conversation, Josh Bruyning interviews Randy Blasik, the CTO and co-founder of ComplianceAide, about his journey as an AI bro and the use of generative AI in building his company. They discuss the power and potential of generative AI, the challenges of bringing a product like Compliance Aid to market, and the skepticism and misconceptions s…
  continue reading
 
Praj Prayag-Debis the founder of Cyberpink Advisors, offering information security consulting services to small and midsized businesses. She is an influential tech-savvy Cybersecurity and Technology risk executive and a strategic leader with a demonstrated track record of building successful Cybersecurity and Governance, Risk, and Compliance (GRC) …
  continue reading
 
🚨 Iran Central Bank Cyberattack, Iran Targets Both Presidential Campaigns, 2.9B Records Breach 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Iran suffers a devastating Cyberattack on its financial system with more news below: Iran Targets Pres…
  continue reading
 
In the latest episode of Life of a CISO, Dr. Eric Cole dives deep into the critical difference between compliance and true cybersecurity. He emphasizes that while frameworks and compliance standards are essential, they often focus on checking boxes rather than addressing the holistic needs of a secure environment. Without a strong foundation in cyb…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and John Underwood, vp, information security, Big 5 Sporting Goods. Joining us is our guest, Mike Lockhart, CISO, …
  continue reading
 
In this episode, Michala Liavaag sits down with Pradeep U.N., founder and CEO of Stories and Wisdom, an award-winning platform and company, to explore how storytelling can revolutionize organisational culture. Pradeep introduces his innovative approach to human engagement and culture transformation: Storytelling: A card game that encourages persona…
  continue reading
 
Google details privacy commitments with Gemini AI MIT releases AI Risk Repository Russian spies using highly targeted phishing Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, def…
  continue reading
 
Loading …

Quick Reference Guide