show episodes
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

Unsubscribe
Unsubscribe
Weekly
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
  continue reading
 
Artwork

1
Cyber Defense Indonesia

Cyber Defense Indonesia

Unsubscribe
Unsubscribe
Monthly
 
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
  continue reading
 
Artwork
 
The Chatting With Ingram podcasts take global issues and chat them through with industry and thought leaders bringing unique insights into life, the universe and everything, as the quote goes. The series focuses on people, security, defence, cyber, intelligence, business, terrorism, spies, current affairs and just fun chats with great people hosted by Philip Ingram MBE.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
  continue reading
 
Artwork

1
UnHacked

Phoenix IT Advisors

Unsubscribe
Unsubscribe
Monthly
 
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
  continue reading
 
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

Unsubscribe
Unsubscribe
Monthly+
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

Unsubscribe
Unsubscribe
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
  continue reading
 
Enterprise Security Tech presents The Cyber Jack Podcast. The Cyber Jack Podcast brings together critical news, expert insights, and product information to help CISOs, CIOs, and CEOs make informed IT technology and cybersecurity decisions.
  continue reading
 
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
  continue reading
 
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
  continue reading
 
Smart Business Dealmakers is the CEO's M&A playbook. We interview the entrepreneurs doing deals, the private equity, VC and family office players investing in them, and the M&A advisers making them happen. Topics include raising capital, buying and selling companies and managing a liquidity event.
  continue reading
 
Artwork

1
Enterprise Software Defenders

Enterprise Software Defenders

Unsubscribe
Unsubscribe
Monthly
 
Enterprise Software Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. ESD is hosted by Evan Reiser, the CEO & founder of Abnormal Security, and Mike Britton, the CISO of Abnormal Security.
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Join Prescriptive’s own Paul Di Liegro, Senior Sales Executive, as he interviews lawyers, doctors, athletes, and interesting personalities from all walks of life. Paul’s curiosity leads to the uncovering of his guests’ most impactful life stories, and Paul illuminates the connection between life’s important lessons and being a better sales rep. Business, Brains & the Bottom Line is the leading podcast by and for Enterprise IT decision-makers. Read more at https://www.prescriptive.solutions/p ...
  continue reading
 
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
  continue reading
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
  continue reading
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
  continue reading
 
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
  continue reading
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Welcome to Shephard Studio's special series on Five Eyes Connectivity, sponsored by our partner Viasat. Over three episodes, we will look at the changing face of modern warfare across the land, sea and air domains through the prism of three key technology areas - Satellite communications, Line-of-sight datalinks, and cybersecurity. We will hear from senior military leaders about the changing nature of today’s threats, and how unfettered access across the electromagnetic spectrum can no longe ...
  continue reading
 
Artwork

1
KnowTechTalk

Barb Paluszkiewicz

Unsubscribe
Unsubscribe
Monthly
 
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
  continue reading
 
Artwork

1
MSP 1337

Chris Johnson

Unsubscribe
Unsubscribe
Weekly
 
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
  continue reading
 
Artwork

1
Killer Psyche

Wondery | Treefort Media

Unsubscribe
Unsubscribe
Weekly+
 
When a shocking crime occurs, people ask “Why?” Was it about power, ego, or revenge? On Killer Psyche, retired FBI agent Candice DeLong draws on her decades of experience to reveal why these murderers and criminals committed these heinous acts. She will reveal fascinating new details about what drove these people, including cases she was close to. Candice will share specific psychological methods and profiling techniques that experts use to understand the deepest part of the most complex, fa ...
  continue reading
 
Artwork

1
RealClearPodcasts

RealClearPolitics

Unsubscribe
Unsubscribe
Monthly
 
RealClear Podcasts go behind the headlines covering the most interesting topics and news of the day. From the president’s first 100 days to an in-depth look at the administrative state, listeners can count on RealClear’s Washington Bureau to start the smartest conversations on the issues that matter most.
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
Loading …
show series
 
What if your organization's data could be breached through an exposed API in your modem? Join me, Sean Gerber, in this week's CISSP Cyber Training Podcast as we unravel the hidden dangers of API connections and dive into the latest security flaws found in Cox modems. We'll also kick off our thrilling CISSP Question Thursday, tackling complex querie…
  continue reading
 
Reimagining Cyber is 100 episodes old! The podcast began in December 2020 as a bi-weekly dive into cybersecurity and cyber resiliency. It is now a weekly affair and has become a regular feature in the Apple Podcast Technology charts. It is also one of the most respected shows in the cybersecurity genre. Hosts Rob Aragao and Stan Wisseman alternate …
  continue reading
 
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Neal Hartsell Chief Marketing Officer of Gradient Cyber, https://www.gradientcyber.com, @GradientCyber who provides 24/7/365 protection with Managed Extended Detection and Response (MXDR) designed specifically for the mid-market. Gain new insights into cyb…
  continue reading
 
In this weeks episode, we are joined by Michael Perdunn: Director of Advisory Services at Cyber Defense Labs. Michael dives into the essentials of preventative cybersecurity, career insights, and the latest on ransomware and AI's impact. Whether you're a seasoned professional or just starting out, this episode offers valuable perspectives and actio…
  continue reading
 
How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors Investing in autonomous and integrated security platforms without breaking the bank This episode is hosted by Thom Langford htt…
  continue reading
 
Send us a Text Message. Ever misplaced your phone and felt that momentary pulse of panic? Listen in as we recount a cautionary tale of lost phones and the perils of unsecured devices, illustrating just how easily our personal and work data can be compromised. Wendy's harrowing experience at a shoe store losing her phone inside a boot serves as a po…
  continue reading
 
Welcome to the Heroes of IT podcast, hosted by Automox’s Ashley Smith. In this podcast, Ashley interviews IT heroes ready to share their insights, successes, challenges, and stories from the field. Join us as we talk endpoint management tips and tricks, how to overcome hurdles, and celebrate IT heroes’ contributions to modern technology.…
  continue reading
 
CYFIRMA’s Research team embarked on a mission to uncover a targeted attack on Indian defense personnel via WhatsApp Messenger. Suspected to originate from Pakistan, the threat actor deployed malicious Android apps disguised as "MNS NH Contact" and "Posted out off," aiming to gain unauthorized access to sensitive information. Our Investigation revea…
  continue reading
 
Filling in for host Cliff May this week is Mark Dubowitz, chief executive of FDD, and he’s joined by Karim Sadjadpour. They cover the full gamut of U.S. foreign policy on Iran, from looking back at President Obama’s 2015 nuclear deal with the Islamic Republic and President Trump’s 2018 withdrawal from the JCPOA to looking ahead and arguing for poli…
  continue reading
 
In 2022, after the sudden death of her husband, Utah mother Kouri Richins released a children’s book about coping with grief. But shortly after the book garnered national attention, Kouri was charged with murder. Prosecutors say that she intentionally killed her own husband, but she claims she is innocent. Just a few weeks ago, Kouri’s attorneys wi…
  continue reading
 
In this episode, Will Lassalle, co-founder of Simplix, a platform designed to assist businesses in complying with cyber regulations in Latin America, discusses the challenges and opportunities surrounding cyber compliance in the region. We then delve into the evolving cyber regulatory landscape in Latin America, highlighting the region's efforts to…
  continue reading
 
Join us as we speak with John Scrimsher, CISO at Kontoor Brands, to share his expertise and insights. We explore the crucial role of the modern CISO in today's landscape, and tackle common challenges when hiring. Are security-centric backgrounds necessary? Find out and tune in now.By NDK Cyber
  continue reading
 
In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving exce…
  continue reading
 
CYFIRMA research team has examined a variant of Vidar Stealer malware, and this in-depth examination explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Additionally, it describes the use of social media platforms to procure co…
  continue reading
 
In this episode, we're joined by Richard Hollis, the Director at Risk Crew, a leader in European governance, risk, and compliance consulting. Richard heads an elite team dedicated to providing bespoke full-service information risk management and compliance services. Together, we dive into the current state of cybersecurity, exploring its evolving l…
  continue reading
 
Send us a Text Message. Is your mindset holding you back from achieving the success you desire? Discover how a simple shift in perspective can transform your life, as we share personal stories and actionable strategies to help you envision and reach your goals. Reflecting on my own journey, I recount how motivational videos in high school changed m…
  continue reading
 
Ashton Forbes on Twitter - https://x.com/JustXAshton on YouTube - https://www.youtube.com/@JustXAshton . Find Conspiracy Analytica On: Rumble: https://rumble.com/c/c-735873 BitChute: https://www.bitchute.com/channel/LLrgzJoLMNpX/ Podbean: https://conspiracyanalytica.podbean.com/ Apple Podcasts: https://podcasts.apple.com/us/podcast/conspiracy-analy…
  continue reading
 
Ever feel like a punching bag when the phone rings and you have an upset client? Do you communicate with your clients outside of IT support? I sit down with Morgan Barse of Wing Woman to talk about Marketing and how the majority of marketing needs to start after you onboard your client. I learned a lot from Morgan's insights, and I think you will, …
  continue reading
 
The Russian Federation is an example of a large authoritarian state whose military is subordinate to its civil government. But since the onset of the War in Ukraine, tensions have been growing between civilian and military leaders. In this episode, Julian Waller joins John to discuss the current state of civil-military relations in Russia’s governm…
  continue reading
 
Send us a Text Message. In this episode, Alex Boyd joins Spencer and Brad. Alex is a shareholder in Polsinelli's national Technology Transactions and Data Privacy practice, shares crucial insights for CTOs, IT Directors, CISOs, Security Managers when responding to security incidents. Discover common misconceptions about breaches and the mistakes or…
  continue reading
 
The number of compliance frameworks is seemingly endless. The lack of standards is problematic enough. Even more problematic, however, is how the compliance frameworks overlaps with one another. When it comes to International Trade and Export Compliance, the problem is overlap is accentuated by the fact that there is not a definitive ‘framework’ fo…
  continue reading
 
Some recent estimates have postulated that data is now the world’s most valuable asset. Unlike other assets, like oil, for example, data proliferates on a staggering scale. In other words, it doesn’t seem to be finite, subject the law of scarcity. This hammers home the importance of answering the question that each of you are wrestling with: how do…
  continue reading
 
In the second half of this two-part episode, retired FBI agent and criminal profiler Candice DeLong speaks with Chicago trial attorney, radio show host and legal analyst Karen Conti, who represented notorious serial killer John Wayne Gacy in his final death row appeal attempts. Candice and Karen discuss what Gacy was like on a personal level and wh…
  continue reading
 
One of the greatest challenges to security compliance are exception cases. What are exception cases? They are the cases in which a particular compliance objective cannot be achieved, as required. The reasons are myriad: cost, environmental constraints, vendor dependency, and technical limitations. Building an exception case is key to achieving comp…
  continue reading
 
Curious about how to implement robust cybersecurity measures and avoid costly breaches? In our latest episode of the CISSP Cyber Training Podcast, we unravel the intricacies of defense in depth and secure defaults as outlined in domains 3.1.2 and 3.1.3 of the CISSP exam. Starting with a weather update from Kansas, we shift gears to dissect a critic…
  continue reading
 
Nancy Brophy fills her novels with romantic betrayals and murder. It’s a far cry from her quiet life in the suburbs, where she and her chef husband, Dan, are living out their golden years. But when Dan is shot dead, Nancy finds herself at the center of a murder case that could be ripped from the pages of her novels. From Wondery, this is a story ab…
  continue reading
 
Send us a Text Message. Are your cloud environments secure, or are they silently exposing you to threats? In this gripping episode, we sit down with security industry giant Sandy Bird from Sonrai Security. Sandy draws from his rich 20-year career, from founding Q1 Labs to his pivotal role as CTO of IBM's security division, to share invaluable insig…
  continue reading
 
Host Yonatan Lipschitz is joined in this conversation by Carlo Schreurs, Global CISO at FrieslandCampina. Carlo shares his journey from aeronautical engineering to becoming the CISO of Friesland Campina. He discusses the shift from IT to OT security, the importance of a transformational mindset in cybersecurity leadership, and the challenges of sta…
  continue reading
 
Tariq Farid built Edible Brands from a single store in 1999 into a flourishing franchise empire that today has nearly 1,000 stores. Now he and his daughter, Somia Farid Silber, who is also now Edible’s president, are rebranding, expanding and plotting the company’s future. At this year's Atlanta Smart Business Dealmakers Conference, the two sat dow…
  continue reading
 
Tariq Farid built Edible Brands from a single store in 1999 into a flourishing franchise empire that today has nearly 1,000 stores. Now he and his daughter, Somia Farid Silber, who is also now Edible’s president, are rebranding, expanding and plotting the company’s future. At this year's Atlanta Smart Business Dealmakers Conference, the two sat dow…
  continue reading
 
During the 1980s, women in South Florida were terrorized by a prolific serial rapist. Victims reported a man sneaking into their homes at night and assaulting them while covering their faces with a pillowcase. They called him “The Pillowcase Rapist,” and after over 40 assaults, he vanished, until over 30 years later, when a stroke of luck led polic…
  continue reading
 
Dive into the world of IT tech with the Hands-On IT podcast, hosted by Landon Miles. Each episode uncovers the intricacies of IT technologies, real-life use cases, and practical guidance on their application. Tune in for your weekly dose of tech trends, user-friendly tutorials, and innovative solutions to transform your IT experience. This podcast …
  continue reading
 
Ever wondered how to navigate the complexities of data classification within your organization? Get ready to sharpen your cybersecurity skills and elevate your knowledge as we dissect CISSP Question Thursday, focusing on domain 2.1.1. This week, we also bring you an intriguing piece of news about ARPA-H, a groundbreaking new agency inspired by DARP…
  continue reading
 
Urgent Alert: Hackers are actively exploiting CVE-2024-3273, a critical vulnerability in D-Link NAS devices, with affected device IP addresses being shared on underground forums. With over 90,000 potentially impacted devices globally and inclusion in CISA's Known Exploited Vulnerabilities list, immediate action is crucial to secure data and prevent…
  continue reading
 
The first Arab country to sign a peace treaty with the Jewish state was Egypt. Following the Yom Kippur War of 1973, came the Camp David Accords of 1978 which provided both countries with tangible benefits. While the peace has never been warm, it has held. But since October 7, Egypt’s behavior has been distressing. What’s more, there’s now evidence…
  continue reading
 
Send us a Text Message. In this episode, Brad and Spencer discuss the preparation stage of defending against ransomware. As we know, the time to have a plan is before you enter the woods and cybersecurity is no different. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.com/cyberthreatpov Work wit…
  continue reading
 
In this episode of Reimagining Cyber Rob and Stan look at the staggering costs and ongoing epidemic of data breaches and ransomware attacks. Did you know that the average cost of a mega breach involving 50 to 60 million records is a jaw-dropping $332 million? Ransomware, though less expensive, still costs businesses an average of $4.5 million per a…
  continue reading
 
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Varun Kohli, Chief Marketing Officer of Cequence Security – Cequence.ai, @cequenceai who provides innovative bot management and API security to help customers protect applications and APIs against attacks, business logic abuse, and fraud. Gain new insights…
  continue reading
 
From Layoffs to job transitions in the channel. Desraie Thomas and I chat about cybersecurity and how it impacts us all. It doesn't just happen at work; yet, as employees, we have been given the tools and resources we don't often see at home. The kids and elderly are usually victims who never have their stories heard. Then, we wrap things up with a…
  continue reading
 
Retired FBI agent and criminal profiler Candice DeLong breaks down the seminal case of John Wayne Gacy. Known as the "Killer Clown," Gacy murdered thirty-three boys and young men, burying the majority of them under his house. Candice digs into Gacy's abusive childhood, a domineering father and internalized homophobia to understand how he became one…
  continue reading
 
The notorious Nikki Stealer group has transitioned into the Iluria Stealer group, maintaining a strong presence with a predominantly Portuguese-speaking user base. Both their websites are hosted by Hostinger, and the current owner, as per his Discord bio, claims to be the former CEO of Nikki Stealer. Dynamic analysis reveals that Iluria Stealer has…
  continue reading
 
Send us a Text Message. Experience the extraordinary journey of Indu Keri as he traverses the landscape of IT, from her upbringing in India to discovering her passion for computer science. With a choice between becoming a doctor or an engineer, Indu opted for electronics—motivated by her aversion to dissection—and eventually found herself captivate…
  continue reading
 
Join us for an in-depth discussion on the challenges and strategies of Application Security Program Management (ASPM) in today's fast-evolving tech landscape. Francesco Cipollone welcomes guest Akira Brand, a seasoned application security engineer and cybersecurity consultant, to explore practical insights into securing applications in the cloud an…
  continue reading
 
As we honor the memory of those who have served and sacrificed, we also acknowledge the ever-present battlefield of cybersecurity. Today, we dissect the essentials of data classification, an integral aspect of Domain 2 in the CISSP exam, while paying tribute to Memorial Day. Join me, Sean Gerber, for a candid conversation where we unwrap the layers…
  continue reading
 
Loading …

Quick Reference Guide