The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
The Chatting With Ingram podcasts take global issues and chat them through with industry and thought leaders bringing unique insights into life, the universe and everything, as the quote goes. The series focuses on people, security, defence, cyber, intelligence, business, terrorism, spies, current affairs and just fun chats with great people hosted by Philip Ingram MBE.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
Join Jordan Sather as he peers past the illusions of our world with logic and reason on the Conspiracy Analytica podcast.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
Smart Business Dealmakers is the CEO's M&A playbook. We interview the entrepreneurs doing deals, the private equity, VC and family office players investing in them, and the M&A advisers making them happen. Topics include raising capital, buying and selling companies and managing a liquidity event.
…
continue reading
Enterprise Software Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. ESD is hosted by Evan Reiser, the CEO & founder of Abnormal Security, and Mike Britton, the CISO of Abnormal Security.
…
continue reading
Smart Business Dealmakers interviews the entrepreneurs doing deals, the PE, VC and family office players investing in them, and the M&A advisers making them happen. Topics include raising capital, buying and selling companies and managing a liquidity event.
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Join Prescriptive’s own Paul Di Liegro, Senior Sales Executive, as he interviews lawyers, doctors, athletes, and interesting personalities from all walks of life. Paul’s curiosity leads to the uncovering of his guests’ most impactful life stories, and Paul illuminates the connection between life’s important lessons and being a better sales rep. Business, Brains & the Bottom Line is the leading podcast by and for Enterprise IT decision-makers. Read more at https://www.prescriptive.solutions/p ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today. 213656
…
continue reading
Welcome to Shephard Studio's special series on Five Eyes Connectivity, sponsored by our partner Viasat. Over three episodes, we will look at the changing face of modern warfare across the land, sea and air domains through the prism of three key technology areas - Satellite communications, Line-of-sight datalinks, and cybersecurity. We will hear from senior military leaders about the changing nature of today’s threats, and how unfettered access across the electromagnetic spectrum can no longe ...
…
continue reading
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
…
continue reading
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
…
continue reading
When a shocking crime occurs, people ask “Why?” Was it about power, ego, or revenge? On Killer Psyche, retired FBI agent Candice DeLong draws on her decades of experience to reveal why these murderers and criminals committed these heinous acts. She will reveal fascinating new details about what drove these people, including cases she was close to. Candice will share specific psychological methods and profiling techniques that experts use to understand the deepest part of the most complex, fa ...
…
continue reading
RealClear Podcasts go behind the headlines covering the most interesting topics and news of the day. From the president’s first 100 days to an in-depth look at the administrative state, listeners can count on RealClear’s Washington Bureau to start the smartest conversations on the issues that matter most.
…
continue reading
Cyber Security & Physical Security and Safety Information, Products and Technologies
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
1
CCT 147: Practice CISSP Questions - Defense in Depth and Secure Defaults (D3.1.2-3)
17:37
17:37
Play later
Play later
Lists
Like
Liked
17:37
What if your organization's data could be breached through an exposed API in your modem? Join me, Sean Gerber, in this week's CISSP Cyber Training Podcast as we unravel the hidden dangers of API connections and dive into the latest security flaws found in Cox modems. We'll also kick off our thrilling CISSP Question Thursday, tackling complex querie…
…
continue reading
1
The Future of Cyber Defense: Multi-Space and Machine Learning - Ep 100
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50
Reimagining Cyber is 100 episodes old! The podcast began in December 2020 as a bi-weekly dive into cybersecurity and cyber resiliency. It is now a weekly affair and has become a regular feature in the Apple Podcast Technology charts. It is also one of the most respected shows in the cybersecurity genre. Hosts Rob Aragao and Stan Wisseman alternate …
…
continue reading
1
Cyber Defense Radio - Neal Hartsell - Gradient Cyber - Hotseat - Podcast - 2024
15:26
15:26
Play later
Play later
Lists
Like
Liked
15:26
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Neal Hartsell Chief Marketing Officer of Gradient Cyber, https://www.gradientcyber.com, @GradientCyber who provides 24/7/365 protection with Managed Extended Detection and Response (MXDR) designed specifically for the mid-market. Gain new insights into cyb…
…
continue reading
1
Shielding Cyberspace: Why Preventative Cybersecurity Matters – Michael Perdunn, Cyber Defense Labs
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29
In this weeks episode, we are joined by Michael Perdunn: Director of Advisory Services at Cyber Defense Labs. Michael dives into the essentials of preventative cybersecurity, career insights, and the latest on ransomware and AI's impact. Whether you're a seasoned professional or just starting out, this episode offers valuable perspectives and actio…
…
continue reading
1
teissTalk: Fortifying your cyber defenses as a mid-sized organisation
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44
How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors Investing in autonomous and integrated security platforms without breaking the bank This episode is hosted by Thom Langford htt…
…
continue reading
1
Behind the Lock Screen: Strategies for Device Defense & Cyber Resilience
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24
Send us a Text Message. Ever misplaced your phone and felt that momentary pulse of panic? Listen in as we recount a cautionary tale of lost phones and the perils of unsecured devices, illustrating just how easily our personal and work data can be compromised. Wendy's harrowing experience at a shoe store losing her phone inside a boot serves as a po…
…
continue reading
1
Heroes of IT – Automation Down Under: Cythera's Approach to Cyber Defense, E05
16:07
16:07
Play later
Play later
Lists
Like
Liked
16:07
Welcome to the Heroes of IT podcast, hosted by Automox’s Ashley Smith. In this podcast, Ashley interviews IT heroes ready to share their insights, successes, challenges, and stories from the field. Join us as we talk endpoint management tips and tricks, how to overcome hurdles, and celebrate IT heroes’ contributions to modern technology.…
…
continue reading
1
CYFIRMA Research - New Pakistan-based Cyber Espionage Group’s Year-Long Campaign Targeting Indian Defense Forces with Android Malware
2:55
2:55
Play later
Play later
Lists
Like
Liked
2:55
CYFIRMA’s Research team embarked on a mission to uncover a targeted attack on Indian defense personnel via WhatsApp Messenger. Suspected to originate from Pakistan, the threat actor deployed malicious Android apps disguised as "MNS NH Contact" and "Posted out off," aiming to gain unauthorized access to sensitive information. Our Investigation revea…
…
continue reading
1
What America Misunderstands About the Islamic Republic of Iran
1:21:41
1:21:41
Play later
Play later
Lists
Like
Liked
1:21:41
Filling in for host Cliff May this week is Mark Dubowitz, chief executive of FDD, and he’s joined by Karim Sadjadpour. They cover the full gamut of U.S. foreign policy on Iran, from looking back at President Obama’s 2015 nuclear deal with the Islamic Republic and President Trump’s 2018 withdrawal from the JCPOA to looking ahead and arguing for poli…
…
continue reading
1
20. Cybersecurity and Productivity on a Budget
53:31
53:31
Play later
Play later
Lists
Like
Liked
53:31
Unconventional Tricks for Maximizing Tech ROIBy Phoenix IT Advisors
…
continue reading
1
The Case of Kouri Richins: Will the Defense Struggle to Prove Her Claim of Innocence?
13:27
13:27
Play later
Play later
Lists
Like
Liked
13:27
In 2022, after the sudden death of her husband, Utah mother Kouri Richins released a children’s book about coping with grief. But shortly after the book garnered national attention, Kouri was charged with murder. Prosecutors say that she intentionally killed her own husband, but she claims she is innocent. Just a few weeks ago, Kouri’s attorneys wi…
…
continue reading
1
An Insider's Guide to Cracking the Cyber Compliance Code in Latin America
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05
In this episode, Will Lassalle, co-founder of Simplix, a platform designed to assist businesses in complying with cyber regulations in Latin America, discusses the challenges and opportunities surrounding cyber compliance in the region. We then delve into the evolving cyber regulatory landscape in Latin America, highlighting the region's efforts to…
…
continue reading
1
“A healthy dose of fear is good” - John Scrimsher, CISO at Kontoor Brands
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02
Join us as we speak with John Scrimsher, CISO at Kontoor Brands, to share his expertise and insights. We explore the crucial role of the modern CISO in today's landscape, and tackle common challenges when hiring. Are security-centric backgrounds necessary? Find out and tune in now.By NDK Cyber
…
continue reading
1
Sentry’s Cody Florek on Enabling Business Processes through Making Them More Secure
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53
In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving exce…
…
continue reading
1
CYFIRMA Research- Vidar Stealer: An In-depth Analysis of an Information-Stealing Malware
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17
CYFIRMA research team has examined a variant of Vidar Stealer malware, and this in-depth examination explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Additionally, it describes the use of social media platforms to procure co…
…
continue reading
1
Ep. 99: Cybersecurity Today and Tomorrow: Accountability and Future Trends with Richard Hollis
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51
In this episode, we're joined by Richard Hollis, the Director at Risk Crew, a leader in European governance, risk, and compliance consulting. Richard heads an elite team dedicated to providing bespoke full-service information risk management and compliance services. Together, we dive into the current state of cybersecurity, exploring its evolving l…
…
continue reading
1
Transforming Your Mindset for Lasting Success: Personal Stories and Strategies
29:31
29:31
Play later
Play later
Lists
Like
Liked
29:31
Send us a Text Message. Is your mindset holding you back from achieving the success you desire? Discover how a simple shift in perspective can transform your life, as we share personal stories and actionable strategies to help you envision and reach your goals. Reflecting on my own journey, I recount how motivational videos in high school changed m…
…
continue reading
1
Bringing Free Energy to the World w/ Ashton Forbes (Ep. 24)
54:24
54:24
Play later
Play later
Lists
Like
Liked
54:24
Ashton Forbes on Twitter - https://x.com/JustXAshton on YouTube - https://www.youtube.com/@JustXAshton . Find Conspiracy Analytica On: Rumble: https://rumble.com/c/c-735873 BitChute: https://www.bitchute.com/channel/LLrgzJoLMNpX/ Podbean: https://conspiracyanalytica.podbean.com/ Apple Podcasts: https://podcasts.apple.com/us/podcast/conspiracy-analy…
…
continue reading
Ever feel like a punching bag when the phone rings and you have an upset client? Do you communicate with your clients outside of IT support? I sit down with Morgan Barse of Wing Woman to talk about Marketing and how the majority of marketing needs to start after you onboard your client. I learned a lot from Morgan's insights, and I think you will, …
…
continue reading
1
Vladimir Putin's New Defense Minister Andrey Belousov
35:11
35:11
Play later
Play later
Lists
Like
Liked
35:11
The Russian Federation is an example of a large authoritarian state whose military is subordinate to its civil government. But since the onset of the War in Ukraine, tensions have been growing between civilian and military leaders. In this episode, Julian Waller joins John to discuss the current state of civil-military relations in Russia’s governm…
…
continue reading
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. Now What? appeared first on The Security Ledger with Paul F. Roberts.…
…
continue reading
1
Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd
50:20
50:20
Play later
Play later
Lists
Like
Liked
50:20
Send us a Text Message. In this episode, Alex Boyd joins Spencer and Brad. Alex is a shareholder in Polsinelli's national Technology Transactions and Data Privacy practice, shares crucial insights for CTOs, IT Directors, CISOs, Security Managers when responding to security incidents. Discover common misconceptions about breaches and the mistakes or…
…
continue reading
The number of compliance frameworks is seemingly endless. The lack of standards is problematic enough. Even more problematic, however, is how the compliance frameworks overlaps with one another. When it comes to International Trade and Export Compliance, the problem is overlap is accentuated by the fact that there is not a definitive ‘framework’ fo…
…
continue reading
Some recent estimates have postulated that data is now the world’s most valuable asset. Unlike other assets, like oil, for example, data proliferates on a staggering scale. In other words, it doesn’t seem to be finite, subject the law of scarcity. This hammers home the importance of answering the question that each of you are wrestling with: how do…
…
continue reading
1
John Wayne Gacy, Part 2: A Conversation with his Appeal Lawyer
40:18
40:18
Play later
Play later
Lists
Like
Liked
40:18
In the second half of this two-part episode, retired FBI agent and criminal profiler Candice DeLong speaks with Chicago trial attorney, radio show host and legal analyst Karen Conti, who represented notorious serial killer John Wayne Gacy in his final death row appeal attempts. Candice and Karen discuss what Gacy was like on a personal level and wh…
…
continue reading
One of the greatest challenges to security compliance are exception cases. What are exception cases? They are the cases in which a particular compliance objective cannot be achieved, as required. The reasons are myriad: cost, environmental constraints, vendor dependency, and technical limitations. Building an exception case is key to achieving comp…
…
continue reading
1
CCT 146: Defense in Depth and Secure Defaults for the CISSP Exam (Domains 3.1.2 & 3.1.3)
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22
Curious about how to implement robust cybersecurity measures and avoid costly breaches? In our latest episode of the CISSP Cyber Training Podcast, we unravel the intricacies of defense in depth and secure defaults as outlined in domains 3.1.2 and 3.1.3 of the CISSP exam. Starting with a weather update from Kansas, we shift gears to dissect a critic…
…
continue reading
1
Listen Now: Happily Never After: Dan & Nancy
5:15
5:15
Play later
Play later
Lists
Like
Liked
5:15
Nancy Brophy fills her novels with romantic betrayals and murder. It’s a far cry from her quiet life in the suburbs, where she and her chef husband, Dan, are living out their golden years. But when Dan is shot dead, Nancy finds herself at the center of a murder case that could be ripped from the pages of her novels. From Wondery, this is a story ab…
…
continue reading
1
Unlocking Cloud Security: Insights and Innovations with Sandy Bird
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25
Send us a Text Message. Are your cloud environments secure, or are they silently exposing you to threats? In this gripping episode, we sit down with security industry giant Sandy Bird from Sonrai Security. Sandy draws from his rich 20-year career, from founding Q1 Labs to his pivotal role as CTO of IBM's security division, to share invaluable insig…
…
continue reading
1
Transformation in Cyber Security Leadership: Carlo Schreurs, Global CISO at FrieslandCampina
48:57
48:57
Play later
Play later
Lists
Like
Liked
48:57
Host Yonatan Lipschitz is joined in this conversation by Carlo Schreurs, Global CISO at FrieslandCampina. Carlo shares his journey from aeronautical engineering to becoming the CISO of Friesland Campina. He discusses the shift from IT to OT security, the importance of a transformational mindset in cybersecurity leadership, and the challenges of sta…
…
continue reading
1
19. The Benefits and Risks of Using AI in Your Business
1:10:16
1:10:16
Play later
Play later
Lists
Like
Liked
1:10:16
Leveraging AI in your small business may be the most important thing you do. But make these mistakes, and it may be game-over.By Phoenix IT Advisors
…
continue reading
1
Tariq Farid and Somia Farid Silber of Edible Brands
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02
Tariq Farid built Edible Brands from a single store in 1999 into a flourishing franchise empire that today has nearly 1,000 stores. Now he and his daughter, Somia Farid Silber, who is also now Edible’s president, are rebranding, expanding and plotting the company’s future. At this year's Atlanta Smart Business Dealmakers Conference, the two sat dow…
…
continue reading
1
Tariq Farid and Somia Farid Silber of Edible Brands
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02
Tariq Farid built Edible Brands from a single store in 1999 into a flourishing franchise empire that today has nearly 1,000 stores. Now he and his daughter, Somia Farid Silber, who is also now Edible’s president, are rebranding, expanding and plotting the company’s future. At this year's Atlanta Smart Business Dealmakers Conference, the two sat dow…
…
continue reading
1
Felonious Florida: The Case of The Pillowcase Rapist
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14
During the 1980s, women in South Florida were terrorized by a prolific serial rapist. Victims reported a man sneaking into their homes at night and assaulting them while covering their faces with a pillowcase. They called him “The Pillowcase Rapist,” and after over 40 assaults, he vanished, until over 30 years later, when a stroke of luck led polic…
…
continue reading
1
Hands-On IT – From Algorithms to APIs, E05
11:24
11:24
Play later
Play later
Lists
Like
Liked
11:24
Dive into the world of IT tech with the Hands-On IT podcast, hosted by Landon Miles. Each episode uncovers the intricacies of IT technologies, real-life use cases, and practical guidance on their application. Tune in for your weekly dose of tech trends, user-friendly tutorials, and innovative solutions to transform your IT experience. This podcast …
…
continue reading
1
CCT 145: Practice CISSP Questions - Data Classification and Protection for the Exam (Domain 2.1.1)
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40
Ever wondered how to navigate the complexities of data classification within your organization? Get ready to sharpen your cybersecurity skills and elevate your knowledge as we dissect CISSP Question Thursday, focusing on domain 2.1.1. This week, we also bring you an intriguing piece of news about ARPA-H, a groundbreaking new agency inspired by DARP…
…
continue reading
1
CYFIRMA Research- Threat Actors Actively Exploiting CVE-2024-3273: Underground Forums Share IP Addresses of Vulnerable D-Link NAS Devices
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17
Urgent Alert: Hackers are actively exploiting CVE-2024-3273, a critical vulnerability in D-Link NAS devices, with affected device IP addresses being shared on underground forums. With over 90,000 potentially impacted devices globally and inclusion in CISA's Known Exploited Vulnerabilities list, immediate action is crucial to secure data and prevent…
…
continue reading
The first Arab country to sign a peace treaty with the Jewish state was Egypt. Following the Yom Kippur War of 1973, came the Camp David Accords of 1978 which provided both countries with tangible benefits. While the peace has never been warm, it has held. But since October 7, Egypt’s behavior has been distressing. What’s more, there’s now evidence…
…
continue reading
1
Episode 94: Defending Against Ransomware Part 2
54:09
54:09
Play later
Play later
Lists
Like
Liked
54:09
Send us a Text Message. In this episode, Brad and Spencer discuss the preparation stage of defending against ransomware. As we know, the time to have a plan is before you enter the woods and cybersecurity is no different. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.com/cyberthreatpov Work wit…
…
continue reading
1
Maintaining Leadership and Credibility After a Cybersecurity Breach - Ep 99
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34
In this episode of Reimagining Cyber Rob and Stan look at the staggering costs and ongoing epidemic of data breaches and ransomware attacks. Did you know that the average cost of a mega breach involving 50 to 60 million records is a jaw-dropping $332 million? Ransomware, though less expensive, still costs businesses an average of $4.5 million per a…
…
continue reading
1
Cyber Defense Radio - Varun Kohli - Cequence.ai - Hotseat - Podcast - 2024
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Varun Kohli, Chief Marketing Officer of Cequence Security – Cequence.ai, @cequenceai who provides innovative bot management and API security to help customers protect applications and APIs against attacks, business logic abuse, and fraud. Gain new insights…
…
continue reading
From Layoffs to job transitions in the channel. Desraie Thomas and I chat about cybersecurity and how it impacts us all. It doesn't just happen at work; yet, as employees, we have been given the tools and resources we don't often see at home. The kids and elderly are usually victims who never have their stories heard. Then, we wrap things up with a…
…
continue reading
1
John Wayne Gacy: The Killer Clown, Part I
52:50
52:50
Play later
Play later
Lists
Like
Liked
52:50
Retired FBI agent and criminal profiler Candice DeLong breaks down the seminal case of John Wayne Gacy. Known as the "Killer Clown," Gacy murdered thirty-three boys and young men, burying the majority of them under his house. Candice digs into Gacy's abusive childhood, a domineering father and internalized homophobia to understand how he became one…
…
continue reading
1
CYFIRMA Research- Iluria Stealer; a Variant of Another Discord Stealer
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49
The notorious Nikki Stealer group has transitioned into the Iluria Stealer group, maintaining a strong presence with a predominantly Portuguese-speaking user base. Both their websites are hosted by Hostinger, and the current owner, as per his Discord bio, claims to be the former CEO of Nikki Stealer. Dynamic analysis reveals that Iluria Stealer has…
…
continue reading
1
Indu Keri's Insights on Balancing Security and Innovation
47:16
47:16
Play later
Play later
Lists
Like
Liked
47:16
Send us a Text Message. Experience the extraordinary journey of Indu Keri as he traverses the landscape of IT, from her upbringing in India to discovering her passion for computer science. With a choice between becoming a doctor or an engineer, Indu opted for electronics—motivated by her aversion to dissection—and eventually found herself captivate…
…
continue reading
1
CSCP S4EP15 - Akira Brand - Singing the Tune of Application Security with Akira Brand
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34
Join us for an in-depth discussion on the challenges and strategies of Application Security Program Management (ASPM) in today's fast-evolving tech landscape. Francesco Cipollone welcomes guest Akira Brand, a seasoned application security engineer and cybersecurity consultant, to explore practical insights into securing applications in the cloud an…
…
continue reading
1
CCT 144: Data Classification and Protection for the CISSP Exam (Domain 2.1.1)
38:47
38:47
Play later
Play later
Lists
Like
Liked
38:47
As we honor the memory of those who have served and sacrificed, we also acknowledge the ever-present battlefield of cybersecurity. Today, we dissect the essentials of data classification, an integral aspect of Domain 2 in the CISSP exam, while paying tribute to Memorial Day. Join me, Sean Gerber, for a candid conversation where we unwrap the layers…
…
continue reading