show episodes
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Artwork

1
Dear Infosec

ISF Analyst Insight Podcast

Unsubscribe
Unsubscribe
Monthly+
 
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
  continue reading
 
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
  continue reading
 
Exploring threats to global stability from Ukraine to China to the Middle East with host Gavin Esler – former BBC News presenter, Washington correspondent and host of Newsnight – plus Ukraine-based war reporter Oz Katerji and independent conflict analyst Emma Beals. This Is Not A Drill dives deep into the dangers, corruption, conflicts, disinformation, rivalries and ruthless realpolitik that are making our world ever more dangerous. Support This Is Not A Drill on Patreon from just £3 per mon ...
  continue reading
 
In this episode of The #SecurityANGLE, Shelly Kramer, managing director and principal analyst at #theCUBEResearch, is joined by Jo Peterson, VP of cloud and security services at #Clarify360 and a member of #theCUBECollective community of independent analysts. Check out theCUBE for the latest in enterprise tech https://siliconangle.com/category/cube-event-coverage/
  continue reading
 
Artwork

1
The Cyber Hub

Techie Pedias

Unsubscribe
Unsubscribe
Monthly
 
Dipanshu Parashar is a Blogger || influencer || Author || digital marketer. He brings out the best tech stories and shares the difficult moments which made his journey a huge success. He is currently India's youngest Cybersecurity author and security analyst.
  continue reading
 
Artwork

1
SecOps Interview Secrets

Peter Schawacker, Nearshore Cyber USA, LLC

Unsubscribe
Unsubscribe
Weekly+
 
You´re applied for scores or hundreds of jobs, you finally get an interview, and then you bomb. Or, you think you did well, but you got turned down. Why? How can you improve your chances of succeeding at interviewing for security jobs? What can interviews and the questions teach us? This podcast is for job seekers, hiring managers, screeners, and recruiters who want to improve their interviewing skills.
  continue reading
 
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
  continue reading
 
The CIO Evolution, a CXO REvolutionaries podcast sponsored by Zscaler CIOs are a special breed of executive: the Swiss Army Knife of leaders. They lead the innovation agenda and use technology to power the capabilities that deliver business outcomes. This podcast covers the art and science of business transformation and the tools CIOs use: cloud, mobile, AI, zero trust. More importantly, it investigates the true essence of digital leadership.
  continue reading
 
The Global Center for Women and Justice launched the Ending Human Trafficking podcast in 2011. Our hosts are Dr. Sandie Morgan and Dr. Dave Stachowiak. Our mantra is Study the Issues. Be a voice. Make a difference. We believe that if you do not study first, you may say or do the wrong thing.
  continue reading
 
Artwork

1
The Gay Johnny Bravo

The Gay Johnny Bravo

Unsubscribe
Unsubscribe
Monthly
 
“When men have realized that time has upset many fighting faiths, they may come to believe even more than they believe the very foundations of their own conduct that the ultimate good desired is better reached by free trade in ideas — that the best test of truth is the power of the thought to get itself accepted in the competition of the market” - Supreme Court Justice Oliver Wendell Holmes Jr., Abrams v. United States (1919) Some of the most important issues that face society today are diff ...
  continue reading
 
Artwork
 
Offical Podcast feed for SiliconANGLE Media's podcast where our hosts and guests reflect upon the many events the CUBE provides coverage for. @theCUBE@dvellante@stu@furrier
  continue reading
 
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
  continue reading
 
Artwork
 
The H4unt3d Hacker podcast is an idea that came to be from a conversation over a glass of bourbon. We bring you REAL talk about cybersecurity. Want to know how hackers see the world and events? Then tune in and go on a trip with the H4unt3d Hackers in their hoppin H4unt3d house. Mike Jones "H4unt3d" Mike is a former hacktivist, red teamer, SIGINT operator and intelligence analyst. Mike left the world of illegal hacking to help businesses and individuals learn how and why they are attacked an ...
  continue reading
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork

1
Disrupting Divorce: Conversations for Women

Rhonda Noordyk, CDFA® | The Women’s Financial Wellness Center

Unsubscribe
Unsubscribe
Monthly+
 
Divorce is the second highest stressor for women, second only to the death of a spouse. Are you feeling overwhelmed and not even sure where to start? If so, you are in the right place! We are so glad you are here. Disrupting Divorce: Conversations for Women is for women who want to be heard, want to step into their financial power and want to get a better outcome. What is your next best disruptive move? Join Certified Divorce Financial Analyst, Rhonda Noordyk, as she provides you with candid ...
  continue reading
 
A gripping financial technology spy thriller. Produced by a former CIA officer. *****YOU CAN NOW BINGE SEASON 1. SEASON 2 IS FORTHCOMING***** The story: Jabbari Lincoln is the CIA’s top financial analyst. He happens to be Muslim. And he’s at the top of his professional game when he is unfairly suspected of being disloyal to the United States and gets suspended by the Agency. Dejected and disgraced, he takes on a central bank consulting gig in Nigeria. But as he uncovers a sophisticated cyber ...
  continue reading
 
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
  continue reading
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
  continue reading
 
Artwork

1
Cloud Ace

SANS Institute

Unsubscribe
Unsubscribe
Monthly
 
Cloud Ace is your go-to podcast for in-depth expert discussions on all topics that touch cloud security. Information security professionals can tune in for fresh perspectives on building and managing secure cloud infrastructure, platforms, and applications. The insight shared by our experts on this podcast transcends cloud, making it valuable for professionals across all fields of cyber security. Brought to you by SANS Institute, Cloud Ace podcast delivers actionable insight through intervie ...
  continue reading
 
Loading …
show series
 
Rhonda sits down with Health Advisor, Leah Perry to discuss the options for Health Insurance after you’re divorced. It’s not fun to talk about - but necessary - and one of the biggest post-divorce expenses. Topics include: 3 options to get coverage for you and your kids Timing is crucial How to best evaluate your needs as you move forward Schedule …
  continue reading
 
Send us a Text Message. In this episode, we dive into actionable strategies for networking with cybersecurity professionals to land your dream job. From leveraging local security conferences to connecting with industry practitioners and engaging in online communities, we cover essential tips to help you build valuable relationships in the cybersecu…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Climate change doesn’t just mean dire consequences for food, water, human migration and long-term human survival. As the seas heat up they create critical security issues, from impacts on military sonar to spikes in turbulence threatening commercial flights, from new theatres of war to suddenly fragile states and strengthened terrorist groups. Are …
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
Matt Palmer, Director of the Jersey Cybersecurity Centre has been the driving force behind the creation of a Computer Emergency Response Team (CERT) for Jersey – one of the Channel Islands. As the architect behind this initiative, Matt explains the circumstances that led to the realisation of its necessity, the efforts involved in bringing it to fr…
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
In this two-part episode, we welcome Zscaler CXO Advisor Bruce Lee to talk about the pivotal role of CIOs and CTOs in steering innovation, guided by the "Three Horizons" model from the book, "The Alchemy of Growth." By applying dedicated and simultaneous efforts to current operations, exploring new opportunities, and reimagining business models, yo…
  continue reading
 
Dr. Sandie Morgan is joined by Ambassador John Cotton Richmond as the two discuss the 2024 Trafficking in Persons Report. John Cotton Richmond Ambassador Richmond is an attorney and diplomat focused on ethical business, human rights, democracy, and rule of law. He served in the country’s highest position dedicated to combating human trafficking as …
  continue reading
 
Early on in his career Spaf was working with microcode and continued to work on technical projects. As time went on he realized that focusing on the non-technical work, such as policies and shaping our thinking, would help move the needle. Borrowing concepts from his book on the subject, we will delve into some cybersecurity myths such as: Are user…
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
In this episode of the SecurityANGLE, our podcast series on all things security, Shelly Kramer, managing director and principal analyst at theCUBE Research. I’m joined by my friend and fellow analyst, Jo Peterson, for a conversation today about Secure Enterprise Browsers and how we see these as the new endpoint. Browsers. It’s hard to think that th…
  continue reading
 
The course of the war in Ukraine changed dramatically on Tuesday 6th August when Ukraine launched an unprecedented incursion on Russian territory. The Kursk Offensive took Moscow entirely by surprise, with thousands of Ukrainian troops moving into the region – taking control of villages – and claiming 1,000 square kilometres of Russian territory. W…
  continue reading
 
Startups and small orgs don't have the luxury of massive budgets and large teams. How do you choose an appsec approach that complements a startup's needs while keeping it secure. Kalyani Pawar shares her experience at different ends of an appsec maturity spectrum. In complex software ecosystems, individual application risks are compounded. When it …
  continue reading
 
This week, it’s time for security money, our quarterly review of the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. This quarter, Crowdstrike crashes the index, as Thoma Bravo acquires another index company. The index is currently made up of the following 25 pure play cybersecurity pu…
  continue reading
 
Long Description: In this episode, Max is joined by Matt King, Chief Security and Data Officer at Belcan. Matt shares his story of transitioning from Anthem to Belcan, where he has been instrumental in building a security program to meet the stringent requirements of federal compliance. The conversation dives into the DIBCAC assessment process, the…
  continue reading
 
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the meaning of cybersecurity materiality. References: Amy Howe, 2024. Supreme Court strikes down Chevron, curtailing power of federal agencies [Blog] Cydney Posner, 2023. SEC Adopts Final Rules on Cybersecurity Disclosure [Explainer]. The Harvard Law School Forum on Corporate G…
  continue reading
 
Send us a Text Message. Are cybersecurity bootcamps worth it in 2024 to start your career in cybersecurity? We may have a controversial take on this topic. Tune in to find out what we have to say. Contact us to sign up for your free 30-minute mentor session, or if you'd like a copy of the spreadsheet where we break down the options we describe in t…
  continue reading
 
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her presence at Black Hat, where she delivered two days of training and participated on an AI safety panel. We'll also discuss the process of pentesting an AI. Will pentesters just have giant cheatsheets…
  continue reading
 
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her presence at Black Hat, where she delivered two days of training and participated on an AI safety panel. We'll also discuss the process of pentesting an AI. Will pentesters just have giant cheatsheets…
  continue reading
 
Rhonda and Attorney Max Emmer talk through some of the latest trends they are seeing in the divorce process. There is more than one way to get divorced - be informed. Preparation and information goes a long way. Learn some of the newest trends and changes. Imperative that you build the right team for your situation. About today’s guest: Max Emmer h…
  continue reading
 
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Learn what is most interesting at hacker summer camp this year! Visit https://www.securitywee…
  continue reading
 
This episode of the SecurityANGLE features Shelly Kramer, managing director and principal analyst at theCUBE Research and Tanium CEO Dan Streetman, for a conversation about the renewed interest in business resilience and business continuity following the massive CrowdStrike outage of a few weeks past as well as the fact that multi-cloud is becoming…
  continue reading
 
Russia is the most sanctioned country in the world. The Ukraine war might have left her internationally isolated and starved of resources – but Putin and his oligarch court are adept at avoiding financial restrictions, cutting side deals that enable them to fund the war and protect their power. Are the West’s sanctions working? How can we tighten t…
  continue reading
 
Even though Security Champions programs look very different across organizations and maturity levels, they share core principles for becoming successful. Marisa shares her experience in building these programs to foster a positive security culture within companies. She explains the incentives and rewards that lead to more engagement from champions …
  continue reading
 
In this episode of the SecurityANGLE, host Shelly Kramer, managing director and principal analyst at theCUBE Research reviews the findings from Zscaler ThreatLabz' 2024 Ransomware Report with Brett Stone-Gross, senior director of threat intelligence at Zscaler, for a walk through the newly released Zscaler ThreatLabz 2024 Ransomware Report.…
  continue reading
 
We're back with a new look and content even better than before! Over time, the Analyst Insight Podcast has evolved, and so has our content. What began as a review of research has transformed into a space for in-depth discussions addressing pressing Infosec issues. As our scope has grown, so has our community. In this first episode of the re-branded…
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Job Search Strategies for CISOs. In part 1, we discuss the challenges facing the CISO role and it's hiring. As CISOs leave the role, the position is not necessarily being refilled. How will this impact future CISO hiring? Inspired by my co-host Jason Albuquerque, …
  continue reading
 
Dr. Sandie Morgan is joined by Dr. Alexis Kennedy as the two discuss the importance of self care within the parameters of professional careers. Dr. Alexis Kennedy Dr. Alexis Kennedy is a forensic psychology researcher, and professor at the University of Nevada, Las Vegas. She has led federal and state grants to study violence against women and chil…
  continue reading
 
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the idea that Cybersecurity is radically asymmetrically distributed. It means that cybersecurity risk is not the same for all verticals and knowing that may impact the first principle strategies you choose to protect your enterprise. For a complete reading list and even more in…
  continue reading
 
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
  continue reading
 
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
  continue reading
 
Join Rhonda and CPA Kathy Bue as they walk through some of your tax questions. It’s never too early to be thinking about tax planning, especially if you’re in the midst of divorce. Tune in to learn: What should you be doing now? How should you file? What you need to gather (we can help you with that!) What questions should you be asking? About toda…
  continue reading
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Hacking tra…
  continue reading
 
Loading …

Quick Reference Guide