show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Exploring both the practical realities and the exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Sjoukje & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Exp ...
  continue reading
 
Artwork
 
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

Unsubscribe
Unsubscribe
Monthly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Webby-nominated "What the Hack with Adam Levin" is true cybercrime with dad jokes. It’s a no-shame zone for anyone who’s ever been scammed, hacked, phished or cyber-bushwhacked. Every week, we feature fascinating people talking about the terrifying, annoying, embarrassing, or infuriating things they’ve experienced online. Join consumer affairs veteran Adam Levin with co-hosts Beau “Hack Me” Friedlander and Travis “Here's What Actually Happened” Taylor for a good story and tips on how to make ...
  continue reading
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork

1
Cyber Inspiration

Evgeniy Kharam and Security Architecture

Unsubscribe
Unsubscribe
Monthly+
 
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
  continue reading
 
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Weekly
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies-David Mauro

Unsubscribe
Unsubscribe
Weekly+
 
Socializing Cybersecurity. Translating Cyber into business terms. Home of the Vigilance Newsletter, the latest Cyber News from the Dark web, research and insider info. We interview Leaders, share True Cyber Crime and provide advice on how to advance your career. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Simply Cyber

Gerald Auger, PhD

Unsubscribe
Unsubscribe
Daily
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

Unsubscribe
Unsubscribe
Weekly
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

Unsubscribe
Unsubscribe
Monthly
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
  continue reading
 
Artwork

1
Cyber Focus

The McCrary Institute

Unsubscribe
Unsubscribe
Weekly
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Artwork

1
Life N Cyber

Josh, John, Kenny & Shannon

Unsubscribe
Unsubscribe
Monthly+
 
We chat about life about working in Cyber and how it effects our lives from Career to Parenting and the balancing of everything in between. You can also watch us in video format on YouTube! https://youtube.com/@lifencyber
  continue reading
 
Artwork

1
The cyber weekly

Deogratius Okello and Josephine Olok

Unsubscribe
Unsubscribe
Monthly+
 
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
  continue reading
 
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
  continue reading
 
Welcome to the Future of Cyber Risk podcast brought to you by Team Cymru. This show will focus on conversations with experts and leading practitioners about what can be done to prepare for what lies ahead. Every episode will highlight actionable takeaways to help our audience get ahead of the curve and prepare for the trends and technologies shaping the future.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Artwork

1
Geopolitics Decanted by Silverado

Silverado Policy Accelerator

Unsubscribe
Unsubscribe
Monthly+
 
Geopolitics Decanted is a podcast featuring analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.silverado.org), a Washington DC-based non-profit with a mission to promote ...
  continue reading
 
Artwork

1
Live on Cyber

Dr. Stan Stahl and Julie Morris

Unsubscribe
Unsubscribe
Weekly
 
Join SecureTheVillage founder and President Dr. Stan Stahl and thought leader Julie Morris as they riff on cybersecurity and privacy complexities, share actionable tips for businesses, boards, and a safer day-to-day digital experience.
  continue reading
 
The Cyber Social Hub is an online community of digital investigators. Join your host, Kevin DeLong as he discusses with a variety of guests on topics in the field of digital investigations and sometimes terrible ”dad” jokes. We talk to investigators, researchers, and vendors to get you the information you need to find the truth about digital incidents! Join us at https://cybersocialhub.com for FREE and be part of the community. If you want to see the video version of this podcast, watch us o ...
  continue reading
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Loading …
show series
 
UnitedHealth fronts over $2 billion in recovery efforts Spyware agreement gains more international support FTC probes Reddit's AI data licensing ahead of IPO Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and securi…
  continue reading
 
Microsoft announced deprecation of 1024 bit RSA Keys https://learn.microsoft.com/en-us/windows/whats-new/deprecated-features#deprecated-features Chrome Real-Time Safe Browsing Protection https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/ Fortra FileCatalyst Vulnerability CVE-2024-25153 https://www.fortra.com/security/advisor…
  continue reading
 
נחשון פינקו מארח את מוטי קריסטל מנכ"ל חברת אנ.אי.אס.טי. (אסטרטגיות מו"מ) מי שהתחיל את דרכו כנושא ונותן בצוותי המו״מ המדיני של לשכת ראש הממשלה רבין וכיום מבכירי מנהלי המשא ומתן בעולם במשברי סייבר ומפתח תורת המשא ומתן כתחום אקדמאי, בשיחה על ניהול מו"מ במצבי משבר בכלל ומשברי סייבר בפרט. איך מנהלים מו"מ מבלי לדבר (טונציה) או לראות (שפת גוף) את הצד השני…
  continue reading
 
Change Healthcare is a major medical clearinghouse, nearly half of all insurance transactions go through them, so when ransomware struck the effect was felt all over the healthcare industry. However it gets stranger, as the group responsible seems to have scammed their affiliates and faked a takedown. Sources: https://pastebin.com/PRmnEGnL…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
  continue reading
 
Benjamin Studebaker joins us again to talk about one of my favorite topics and the title of his new book, “Four Essays on the Revolutionary Subject”. Studebaker is a PhD in Politics and International Studies from the University of Cambridge. He is a political theorist who teaches and publishes in both contemporary political theory and the history o…
  continue reading
 
We speak with Grant Wright, General Manager of Marketplace and AI Products, SEEK. Grant leads SEEK's global AI and Analytics teams at SEEK, who build and support the AI services that power SEEK's products including search, recommendations, candidate quality and pricing; and provide internal analytics and experimentation capability to better underst…
  continue reading
 
Hello and welcome back to USB our Guest, Cyber Security tips. I’m Theo, here to help you break down cyber security news and hacks and how they affect you. However, today I am interviewing Anyaacii a Linux in HPC Administrator. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed b…
  continue reading
 
Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working wi…
  continue reading
 
- It is often now said that identity is the new perimeter, why do you think that phrase has taken hold and what does it mean to you? - How much do you think the complicated identity landscape plays a role, for example most organizations have multiple IdP's, as well as external environments such as SaaS and so on that they have identities and permis…
  continue reading
 
Infosec and Cyber Work Hacks are here to help you pass the CISSP exam. Today’s Hack is part two, so I encourage you to go back and listen to part one of Steve Spearman’s CISSP exam tips and tricks. In part two, I pass the mic to Spearman to give you his top five test-taking strategies for the CISSP. What’s the Sesame Street rule? How does the CISSP…
  continue reading
 
Selecting metrics that best convey the impacts and risks of your strategy to the board How the changing threat landscape will affect your cyber resilience The role cyber insurance plays as a component of your resilience strategy This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Daniel G. Dresner, Professor of Cyberse…
  continue reading
 
In this episode of the Cyber Uncut podcast, hosts Phil Tarrant and Major General (Ret’d) Dr Marcus Thompson unpack how foreign actors are targeting persons of interest on social media and how Australians are falling victim to unsophisticated credential stuffing campaigns. Like all news over recent months, the podcast begins talking about Taylor Swi…
  continue reading
 
In this week's podcast we bring on Olivia Rose a CISO, who trains other CISO's and has vast experience in doing so. She does a great a job demystifying how communication is done at a board level. Show notes Olivia’s post on Newbies ”non-technical” https://www.linkedin.com/posts/oliviarosecybersecurity_ah-we-women-in-tech-are-masters-at-downplaying-…
  continue reading
 
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explor…
  continue reading
 
In this week's episode of the Future of Cyber Risk podcast, David speaks to Eric Adams, CEO/CISO at Federal Cyber Defense Solutions. They discuss what FedRAMP and FISMA are, how to use NIST as a roadmap to federal compliance, and what controls you need to implement for those requirements. They also talk about the need for vulnerability context and …
  continue reading
 
What happens after a municipality gets hacked? In this episode, Darnley discusses the fates of a city or town that gets hit with a ransomware. Who pays for it? How much damage does it really cause? What is the price to be paid post-breach? Why it is the citizens responsibility to hold their local governments accountable before it happens to them? S…
  continue reading
 
In this episode, Brand and Spencer dive into Defense in Depth. What is it, what does that mean, what are some actionable and practical steps you can take to implement a defense in depth strategy, how does threat modeling and incident response tabletop exercises fit into it and so much more. Do not miss this episode Blog: https://offsec.blog/ Youtub…
  continue reading
 
How does cybersecurity relate to the four horsemen of the apocalypse? Famine, Pestilence, War, and Death? In this episode, Dr. Chase Cunningham, renowned Zero Trust expert, author, instructor, Chief Strategy Officer, advisor, etc., examines the 4 conditions on our planet represented by the four horsemen, ties it all to cybersecurity, and then solve…
  continue reading
 
Wynter Deagle is a Data Privacy and Cybersecurity Attorney out of California. She has proactively counseled companies and defended companies in data privacy litigation. She shares insights from her experience with us. Chapters: 0:00 How Data Privacy came to Light 4:08 Are you Opting in or Opting out? 6:16 Healthcare Companies have the Facebook Pixe…
  continue reading
 
George Barnes worked inside the National Security Agency for 35 years. Before retiring last year, he served as the agency's Deputy Director and most senior civilian leader. In this week's episode, George shares what led the NSA to leave behind the complete secrecy of the past, and embrace a more open posture with the American people. He also lays o…
  continue reading
 
Welcome back, to the New Cyber Frontier Podcast with our hosts Tim Montgomery and Dr. Gorog. In the final episode of the eight-part series, Tim provides a direct inquisitive dialog with Dr. Gorog regarding his dissertation work in distributed trust. What distribution of trust means to the average person is a bit Shakey as the coining of Zero-trust …
  continue reading
 
Since its emergence in 1911, every year on March 8, we celebrate International Women's Day to recognize the inspiring contributions that women have made in the professional and personal lives of those around them. In this episode, Erin McLean talks to Tia Hopkins and Andrea Markstrom, the Chief Information Officer at Schulte Roth & Zable LLP and Fo…
  continue reading
 
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Erwin Eimers (https://www.linkedin.com/in/erwin-eimers/), CISO of Sumitomo Chemical Americas https://sumitomochemicalamerica.com/, a cybersecurity expert at a global leader in the chemicals manufacturing industry. Gain new insights into cybersecurity from …
  continue reading
 
In this episode of the Cyber Inspiration Podcast, the host, Evgeny Kharam, a cybersecurity veteran, speaks to Co-Founder & CEO Ezzeldin Tahoun from Cypienta. The discussion revolves around the startup journey of the cybersecurity company Cypienta. The podcast spotlights the company's evolution which involved pivoting their focus towards solving mor…
  continue reading
 
Ever wondered what a Broadcom takeover could mean for the tech you use daily? We're tackling this head-on, exploring the seismic shifts in the virtualization world as VMware gets a new owner. Get ready to hear our unfiltered thoughts on the surge of vulnerabilities hitting the news and the potential ramifications of ESXi's free version possibly hit…
  continue reading
 
How does the insurance industry keep pace with the constant evolution of cyber threats? In this episode, we're joined by Alexandra Bretschneider, Vice President & Cyber Practice Leader at Johnson, Kendall & Johnson, who dives deep into the dynamic world of cyber insurance. Alexandra shares her unique journey from IT consulting to shaping the future…
  continue reading
 
This month’s guest of the Cyber Insider is Ryan Chapman. Ryan is the author of SANS Forensics FOR528: Ransomware and Cyber Extortion along with a Certified Instructor for SANS. In his day job, he functions as a consultant for threat hunting and incident response. Ryan often presents at conferences, including running workshops the last 4 years runni…
  continue reading
 
Learn how to plan cyber incident responseWe explain how to plan for cyber incident response. The elements that make up the plan, the stages that take place during cyber incident response, the key things to do ahead of an incident, and how to learn more.If you want any cyber security support please get in contact with the team by email info@clearcut…
  continue reading
 
Sales and marketing have changed significantly over the years, and due to COVID-19, more decision-makers are working from home or don't answer the phone. Jay Shawkat gives some sales and marketing tips on trying new ways to reach new prospects. Cyber CherBy Cyber Cher
  continue reading
 
OH NO. "Business is more afraid of the sheriff than we are the cybercriminal." Overheard in our ongoing LACybersecure work from an attendee. The point of entry isn't HELP - It's getting into TROUBLE. What are we DOING?? For SMBs, the cavalry isn't coming. Even after a crime, the sheriff is going after the criminals. Don't count on asset recovery. Y…
  continue reading
 
Join us on our 8th episode of season 2, as Julien and Troy from GoSecure explore the transformation of cybersecurity threats over the years, from traditional phishing attacks to the emergence of sophisticated ransomware campaigns. Gain insights into the role of artificial intelligence and IoT in enhancing security measures, while also introducing n…
  continue reading
 
Loading …

Quick Reference Guide