CISO public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2024, National Security Corporation. All Rights Reserved
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
  continue reading
 
Artwork
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an e ...
  continue reading
 
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
  continue reading
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

Unsubscribe
Unsubscribe
Weekly
 
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
  continue reading
 
Artwork
 
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
  continue reading
 
Join Query CISO Neal Bridges and VP - Distinguished Engineer Jonathan Rau as they explore the world of SecDataOps. What is it? Who should care about it? Wait, wasn’t it a throwaway joke?
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
Weekly
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork
 
A disgraced CISO (Greg Kinnear) gets a call from a Miami journalist (Erin Moriarty) who needs help investigating a series of scams targeting terminally ill patients. He begrudgingly accepts… But in a world of swindling and deceit, where nothing is what it seems – their findings are just the tip of the iceberg.
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Artwork

1
CISO insiders

GRSee Consulting

Unsubscribe
Unsubscribe
Monthly
 
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
  continue reading
 
Artwork

1
Cybersecurity Where You Are

Center for Internet Security

Unsubscribe
Unsubscribe
Monthly+
 
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
  continue reading
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
  continue reading
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
  continue reading
 
Artwork

51
Enterprise Software Defenders

Enterprise Software Defenders

Unsubscribe
Unsubscribe
Monthly
 
Enterprise Software Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. ESD is hosted by Evan Reiser, the CEO & founder of Abnormal Security, and Mike Britton, the CISO of Abnormal Security.
  continue reading
 
The Cloud Frontier podcast by simplyblock brings you topics around the founding of early-stage cloud infrastructure startups, entrepreneurship and taking visionary ideas to market. Explore their fundraising journeys, go-to-market strategies, and the challenges of finding product-market fit. Tune in to discussions on AI, machine learning, and the future of cloud technologies. Whether you're a tech enthusiast, aspiring entrepreneur, or industry professional (CTO, CIO, CISO, VP of Infrastructur ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
  continue reading
 
Artwork

1
CISO Talk

Techstrong Group

Unsubscribe
Unsubscribe
Monthly+
 
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
  continue reading
 
Artwork

1
Soulful CXO Podcast

Soulful CXO, ITSPmagazine Soulful CXO, ITSPmagazine

Unsubscribe
Unsubscribe
Monthly+
 
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
  continue reading
 
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
  continue reading
 
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
  continue reading
 
Artwork
 
Your hosts, Tom Meehan, CIO and CISO at CONTROLTEK and Shaun Ferrari, Global Cash Product Director at Currency Research share the latest information on the issues affecting the world of cash today. Featuring interviews with top industry experts and thought leaders, you’ll have a close look at trends, strategies, and technology influencing the world of cash. Stay informed on topics like cash security, payments technology, risks, the cash supply chain, and learn about strategies to support bet ...
  continue reading
 
Artwork
 
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
Monthly
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Loading …
show series
 
In This Episode: We cover a range of timely topics, including: • Matt Walker, Managing Director of Security and Compliance at Goosehead Insurance: Discusses the challenges of threat exposure management and strategies for cloud security. • Dr. Harvey Castro, ER Doctor and Keynote Speaker: Shares his journey of integrating AI into healthcare, from re…
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole continues the conversation on key trends that every Chief Information Security Officer (CISO) should be aware of. Building off the last episode where he discussed AI regulations, zero trust, and cyber numbness, Dr. Cole shifts focus to critical topics like metrics, communication, leadership, cloud se…
  continue reading
 
🚨 Ex Uber CISO asks for Fair Trial, Air Gapped Networks Breached, Patch Tuesday Recap, MSFT 0Day 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Ex Uber CISO Joe Sullivan asks for a Fair trial in new filing with more news below: Air Gapped Netwo…
  continue reading
 
Factories face unique and seemingly insurmountable cybersecurity challenges in the increasingly digitalized landscape, but there is a light at the end of the tunnel where leaders can deliver reliable production, secure supply chains, and availability of products and services. Discover how zero trust fits in a world of operational tech, legacy proce…
  continue reading
 
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp…
  continue reading
 
Cary Johnson has developed a fully managed phishing awareness and auditing program that provides true value to phishing simulations. Legacy phishing simulators lack a performance measurement framework that undeniably measures impact. His innovative performance measurement framework establishes true baselines and resets them monthly to provide objec…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Eduardo Ortiz, vp, global head of cybersecurity, Techtronic Industries. Joining us is Adam Fletcher, CSO, Blackstone. In this episode: Keeping our eyes on new risks The hiring disconnect Mental h…
  continue reading
 
In this episode of CISO Tradecraft, hosted by G Mark Hardy, you'll learn about four crucial tools in cloud security: CNAPP, CASB, CSPM, and CWPP. These tools serve various functions like protecting cloud-native applications, managing access security, maintaining cloud posture, and securing cloud workloads. The discussion covers their roles, benefit…
  continue reading
 
Welcome to the GC+CISO Connection Show with host Shawn Tuma. In this very first episode of the Show, Shawn talks with Dena DeNooyer Stroh, General Counsel and Ethics Officer at North Texas Tollway Authority, to learn her perspectives on the legal department's role in cybersecurity, collaboration between the GC and the IT and InfoSec Teams, and tips…
  continue reading
 
Episode Summary: In this episode of The New CISO, host Steve Moore is joined by Nicola Sotira, head of CERT at Poste Italiane. Nicola shares his journey from working on cryptographic devices in the pre-internet era to leading security teams today. His early work with assembly language, hardware security, and cryptanalysis offered unique challenges,…
  continue reading
 
In this episode of The Virtual CISO Podcast, your host, John Verry, sits down with David Carvalho, a cryptography and cybersecurity expert with over 25 years of experience, to explore the next frontier in cybersecurity: decentralized security models and post-quantum cryptography. How the Naoris Protocol establishes decentralized trust for compute e…
  continue reading
 
On the 18th episode of Enterprise Software Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Stephen Harrison, Senior Vice President and Chief Information Security Officer at MGM Resorts International. MGM Resorts International is a global hospitality and entertainment leader, operating some of the most …
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Quincy Castro, CISO, Redis. Thanks to our show sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, sec…
  continue reading
 
Three Buddy Problem - Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge…
  continue reading
 
Ever order takeout online? You're thinking about food, not data, right? But somewhere a company is processing your order, your address, and even your payment information, possibly sending it across borders. This podcast is your crash course on data privacy laws and cross-border data transfers. Learn how GDPR, CCPA, LGPD, and PIPL impact you and wha…
  continue reading
 
White House prioritizes secure internet routing, using memory safe languages Federal Trade Commission and CISA warn of hurricane-related scams Mozilla warns of Firefox zero day: patch now Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security re…
  continue reading
 
🚨 Internet Archive Data Breach, Marriott Fined over Data Breach, AI powered Cybercrime on the Rise 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Internet archive data breach with more news below: Fortinet Exploit in the Wild AI Powered Cybercr…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Shawn Bowen, VP and deputy CISO - Gaming, Microsoft. Joining us is Adam Fletcher, CSO, Blackstone. In this epi…
  continue reading
 
Australian Parliament introduces standalone cybersecurity law Qualcomm zero-day used to target Android devices Russia and Turkey ban Discord Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, sec…
  continue reading
 
In this episode, Jeffrey talks to entrepreneur and four-time CISO Demetrios Lazarikos — aka Laz. Laz is the founder and IT security consultant of Blue Lava Consulting. They discuss why security salespeople should look for ways to solve problems instead of focusing solely on closing and how CISOs can better communicate to a wider audience.…
  continue reading
 
This week, we discuss something near and dear to our hearts - RDP Shortpath! What is it, even? TCP and UDP? Get out of here! We touch on the current enterprise landscape, the need for BYOD, Microsoft's remote working capabilities, and how RDP Shortpath rules them all. Mostly. Also, Tobi asks Jussi an unexpected question. (00:00) - Intro and catchin…
  continue reading
 
Jason Shockey, CISO of Cenlar FSB, and 25 year veteran of cybersecurity, has a formula for running an excellent cybersecurity program. He studied a great deal in his various cybersecurity roles before leaping into a CISO role, and the studying paid off! Jason and Allan and Drew discuss the following: Identifying Common Pitfalls Promoting Team Well-…
  continue reading
 
Scam hunters look for vulnerabilities. Ezra teaches Heidi where to look. Stay up-to-date on future episodes at scamhunters.io – SCAM HUNTERS is presented by Thoropass. Does your infosec compliance process sometimes feel like a mystery? You need Thoropass—the all in one infosec compliance delivery platform with seamless audits, airtight security, an…
  continue reading
 
In this episode, David Malicoat interviews Gary Hayslip, Global Chief Information Security Officer (CISO) at SoftBank Investment Advisors. Gary shares his deep insights on the evolution of the CISO role, discussing how it’s becoming more integrated with risk management, business strategy, and AI. He reflects on his own career journey from the U.S. …
  continue reading
 
In episode 104 of Cybersecurity Where You Are, Sean Atkinson is joined by Kennidi Ortega, Information Security Analyst at the Center for Internet Security® (CIS®). Together, they explore the experience of a first-year analyst and how they might make the most of getting started in a cybersecurity career. Here are some highlights from our episode: 01…
  continue reading
 
GoldenJackal uses new tools against governments Cross-site scripting flaw found in major WordPress plugin Ukraine’s defense ministry launched military CERT Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire …
  continue reading
 
Don’t let the perfect be the enemy of the good… it’s a challenge that architects and strategists often face. They may design a “perfect” architecture or strategy, only to see it overwhelmed by the realities of implementation. John Burke and Johna Johnson discuss the questions to ask to ensure that devotion to the perfect doesn’t... Read more »…
  continue reading
 
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Show Notes: https://cisostoriespodcast.com/csp-195
  continue reading
 
In this episode of Cloud Frontier, we chat with Adam Szymański, CTO and co-founder of Oxla, a fast and efficient distributed database. Adam shares his journey from Google to founding Oxla and how it's helping IoT and cybersecurity companies handle massive data more quickly and cost-effectively. He also touches on the challenges of competing with gi…
  continue reading
 
🚨 American Water Shuts Down after Cyberattack, Russian State Media Cyberattack, ADT Breach 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as American Water Shuts Down after Cyberattack with more news below: Russian State Media Cyberattack Moneygra…
  continue reading
 
This podcast provides a comprehensive overview of the essential cybersecurity laws that shape how we interact with data in the digital age. Listeners will gain a clear understanding of the key regulations, including GDPR, CCPA, HIPAA, and PCI DSS, and how these laws work in concert to protect personal and sensitive information. The podcast breaks d…
  continue reading
 
Salt Typhoon attack potentially exposes wiretap data Cyberattack hits major U.S. water utility A not- so- happy birthday present for Russia’s president Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Auto…
  continue reading
 
🚨 China Hacks US Wiretap systems in ISP Attack, Star Blizzard Dismantled, Comcast & Truist Bank Breach 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as China Targets US Wiretaps in ISP Attack with more news below: Russian Star Blizzard Dismantled…
  continue reading
 
Insurers should stop funding ransomware payments, says Neuberger Google removes Kaspersky antivirus software from Play Store Cyberattack hits Detroit-area government services Huge thanks to our sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With V…
  continue reading
 
Feeling lost in a sea of acronyms like NIST, ISO 27001, and CIS? This podcast is your guide to understanding and choosing the right cybersecurity framework for your organization. We break down the jargon, explore the strengths of each framework, and help you ask the right questions to find the perfect fit for your size, industry, and budget. Join u…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jonathan Waldrop, CISO, The Weather Company. Here’s a link to CISA’s Cybersecurity Awareness Month announcement, sent to us by Jonathan. Thanks to our show sponsor, SpyCloud SpyCloud disrupts cybercrime by telling you what criminals know…
  continue reading
 
Three Buddy Problem - Episode 15: Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean c…
  continue reading
 
In this compelling episode of Breakfast Bytes, host Felicia King delves into the complex world of cloud computing, exploring the intricacies of public cloud, private cloud, self-hosting, and premise servers. With insights from a newly recognized expert in the field, this episode promises to challenge conventional wisdom and offer fresh perspectives…
  continue reading
 
Cloudflare blocks largest recorded DDoS attack Adobe Commerce and Magento stores compromised by CosmicSting bug DOJ and Microsoft take down 107 domains used in Star Blizzard phishing attacks Huge thanks to our sponsor, SpyCloud Ransomware continues to impact organizations. A new report released by SpyCloud shares insights from your peers in securit…
  continue reading
 
In this new episode of Life of a CISO, Dr. Eric Cole dives into one of the biggest challenges faced by Chief Information Security Officers (CISOs): staying up to date with the rapidly changing trends in cybersecurity. With new technologies, products, and vendors emerging from conferences like RSA, it's crucial for CISOs to stay focused on key areas…
  continue reading
 
In this episode of The Cash News Podcast, Tom Meehan and Shaun Ferrari explore key trends in Central Bank Digital Currencies (CBDCs) and the growing influence of artificial intelligence (AI) in the financial sector. From regulatory challenges to emerging use cases, they discuss how central banks are leveraging these technologies to shape the future…
  continue reading
 
Loading …

Quick Reference Guide