Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
We chat about life about working in Cyber and how it effects our lives from Career to Parenting and the balancing of everything in between. You can also watch us in video format on YouTube! https://youtube.com/@lifencyber
…
continue reading
The podcast making sense of cyber and technology issues impacting business.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
Hosted by Rick from DALY Computers (www.daly.com), the Technology Pulse podcast takes a look at new and existing technologies that will benefit the SLED (state/local government, education) sector in Maryland and Virginia. Episodes will feature guests from innovative product/service providers, the DALY team, and strategic partners.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Creating connections and conversations about people, technology and the intersection of health and wellbeing. Recorded through the "cyber synaptic space." Catherine speaks to people who are considered experts in their fields. Important information for parents, teachers, professionals and anyone who wants to learn about cyberspace, digital parenting, security, data protection, counselling, health, wellbeing, personal growth and development. This is your acoustic & neuroplastic ride that will ...
…
continue reading
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
Security in Focus is hosted by Gallagher's Chief Technology Officer, Steve Bell. With a career history spanning over 30 years with Gallagher, Steve is an industry leader with expert knowledge across all aspects of security. Join Steve in our podcast series for updates on specific security issues and interviews with leading professionals across the sector.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
HPE News. Tech Insights. World-Class Innovations. We take you straight to the source — interviewing tech's foremost thought leaders and change-makers that are propelling businesses and industries forward.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
1
Careers in operational technology: What does a security risk assessor do? | Guest Donovan Tindill
54:57
54:57
Play later
Play later
Lists
Like
Liked
54:57
Today on Cyber Work, we continue our deep dive into industrial control systems and operational technology security by talking with Donovan Tindill of DeNexus. Now, I’m just going to come out and say it: Tindill's episode is like a cybersecurity career seminar in a box, and a must-not-miss if you’re interested in not just ICS and OT security, but sp…
…
continue reading
1
The potential of AI for stopping cyber security threats
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33
According to a report published by the UK National Cyber Security Centre in January 2024, Artificial intelligence will increase the number and the severity of cyber attacks over the next two years. So how are AI models also being developed to effectively tackle cyber crime? And what is the potential of AI for stopping cyber security threats? Joinin…
…
continue reading
1
Unpacking DeFi Security and Cybersecurity Summit Insights - Ep 96
21:30
21:30
Play later
Play later
Lists
Like
Liked
21:30
In this episode of "Reimagining Cyber," join hosts Stan Wisseman and Rob Aragao as they explore the cutting edge of cybersecurity. First, they discuss an upcoming live webinar where listeners can engage with them directly on the topic of cyber risk posture management. Then, they delve into the world of smart contracts and decentralized finance, exa…
…
continue reading
1
SN 973: Not So Fast - GPS Vulnerabilites, VPN Flaw
2:24:22
2:24:22
Play later
Play later
Lists
Like
Liked
2:24:22
The vulnerability of GPS Is the sky falling on all VPN systems? Multi-user Passkeys, YubiKeys? The iCloud Keychain The UK and Google's Topics Show Notes - https://www.grc.com/sn/SN-973-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https:…
…
continue reading
1
SN 973: Not So Fast - GPS Vulnerabilites, VPN Flaw
2:24:22
2:24:22
Play later
Play later
Lists
Like
Liked
2:24:22
The vulnerability of GPS Is the sky falling on all VPN systems? Multi-user Passkeys, YubiKeys? The iCloud Keychain The UK and Google's Topics Show Notes - https://www.grc.com/sn/SN-973-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https:…
…
continue reading
1
🔴 May 7s Top Cyber News NOW! - Ep 616
1:39:38
1:39:38
Play later
Play later
Lists
Like
Liked
1:39:38
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
EP 157: How To Assess Cyber Risk (REPLAY)
49:30
49:30
Play later
Play later
Lists
Like
Liked
49:30
"What's the definitive method for assessing cyber risk? Does it exist? How do you do it? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. If you want to know more, Kip has a course on LinkedIn Learning you can check out: ""IT and Cybersecurity Risk Management Essential Trainin…
…
continue reading
In today's podcast we cover four crucial cyber and technology topics, including: TinyProxy flaw potentially impacting thousands El Salvadorian population impacted by data leak UK MoD suspects China looking for financial data in breach Germany recalls Ambassador from Russia citing Cyber Attack concerns I'd love feedback, feel free to send your comme…
…
continue reading
1
🔴 May 6s Top Cyber News NOW! - Ep 615
1:33:00
1:33:00
Play later
Play later
Lists
Like
Liked
1:33:00
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
…
continue reading
1
What's it like to be the CISO for the state of Connecticut? | Guest Jeffrey Brown
51:36
51:36
Play later
Play later
Lists
Like
Liked
51:36
Today on Cyber Work, I’ve got a big guest for you. Jeffrey Brown is the chief information security officer for, not a company, not for a healthcare organization, but for the entire state of Connecticut! Brown walks me through the scope and reach of a state-wide CISO, a country-wide move toward a “whole of state” strategy and, frankly, I spend an aw…
…
continue reading
In today's podcast we cover four crucial cyber and technology topics, including: Finland discloses ongoing Android malware campaign Czechia, Germany say Russia abused Microsoft flaw to spy Wichita officials say public services limited following ransomware Illinois to review language of law protecting biometric data I'd love feedback, feel free to s…
…
continue reading
1
Cryptocurrency Tracing and the Fight Against Cybercrime, with Andy Greenberg
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45
This month’s guest on the Cyber Insider is Andy Greenberg. Andy is a senior writer for WIRED who has covered hacking, cybersecurity and surveillance for 17 years. He’s the author of the new book Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency and the 2019 book Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s…
…
continue reading
1
CCT 138: CISSP Cybersecurity Journey - Education to Operational Technology Defense (DRAGOS)
38:49
38:49
Play later
Play later
Lists
Like
Liked
38:49
Embark on a transformative journey into the world of cybersecurity with me, Sean Gerber, as your guide. Discover how to fortify your career foundations and traverse the evolving landscape of digital protection. Our latest episode delves into the crucial timelines for mastering cybersecurity, with a special look at Dragos' role in safeguarding opera…
…
continue reading
1
Cyber Security Today, May 6, 2024 - Ransomware gang claims responsibility for attacking Italian healthcare service, Russian gang blamed for attacks in Europe, and more
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04
This episode reports on vulnerable routers, an attack on a Canadian digital library service and moreBy Howard Solomon
…
continue reading
1
Inside the Mind of a Cybersecurity Maestro: Oliver Tavakoli's Journey from Mainframes to AI
43:19
43:19
Play later
Play later
Lists
Like
Liked
43:19
Have you ever gazed into the depths of a cybersecurity expert's mind? Prepare to be captivated as we sit down with Oliver, a virtuoso in the realms of IT and cybersecurity, whose tale unfolds from a childhood enchanted by math and sci-fi to the frontlines of digital defense. In today's episode, we peel back the layers of cybersecurity, from the bed…
…
continue reading
1
Exploring the tech behind Star Wars: Galaxy's Edge at Walt Disney World Resort
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04
We're celebrating May the 4th be with you. Yes, it's Star Wars Day and we've been given incredible behind the scenes access at none other than Star Wars: Galaxy's Edge at Walt Disney World Resort in Florida. Courtesy of Jose Corpuz, Principal Software Engineer with Global Engineering Technology and Analysis with Walt Disney Parks and Resorts, we've…
…
continue reading
1
Cybersecurity professional Madison Horn runs for Congress. Cyber Security Today Weekend Show May 3, 2024
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02
If you've ever been frustrated by how poorly you think politicians are dealing with the issues that face us in Cyber Security, maybe you've thought we should have more cyber security professionals in government. Madison Horn, cyber security professional feels the same way. So she's running for the a seat in the House of Representatives. This is my …
…
continue reading
1
🔴 May 3s Top Cyber News NOW! - Ep 614
1:40:36
1:40:36
Play later
Play later
Lists
Like
Liked
1:40:36
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
…
continue reading
AI is the future but with the advancements comes risks.By North Tech Group
…
continue reading
In today's podcast we cover four crucial cyber and technology topics, including: REVIL operator sentenced to 13 years in prison Sweden facing high volume of attacks after joining NATO Spanish police arrest over 100 individuals in cybercrime ring North Korean actors abusing email policies to spy I'd love feedback, feel free to send your comments and…
…
continue reading
1
Cyber Security Today, May 3, 2024 - North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07
This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure, and moreBy Howard Solomon
…
continue reading
1
What advertisers and business leaders can learn from information warfare campaigns
52:22
52:22
Play later
Play later
Lists
Like
Liked
52:22
In this episode of the Cyber Uncut podcast, hosts Major General (Ret’d) Dr Marcus Thompson, Phil Tarrant and Liam Garman unpack what advertisers and business leaders can learn from military information warfare campaigns and just how many similarities these fields share. They begin the podcast by looking at the history of influence on the battlefiel…
…
continue reading
1
S14 E9 Insights into the Cryptocurrency Fueling Cybercrime (Part 1)
1:00:06
1:00:06
Play later
Play later
Lists
Like
Liked
1:00:06
This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Max Hillebrand. Max is the CEO at ZKSNACKS and Wasabi Wallet, a pioneering figure in the realm of privacy-focused cryptocurrency wallets. He is a dedicated open-source contributor focused on liberty and digital freedom. He champions non-scarcity in the dig…
…
continue reading
1
Stefan Soesanto on Ukrainian hack and leak ops; cyberattack in Georgia
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57
When Russia invaded Ukraine in February of 2022, it was immediately apparent that the conflict would in part be waged in cyberspace. As Russian tanks rolled into Ukraine, Russian forces also launched a cyberattack against satellite modems that impacted the Ukrainian military’s ability to communicate. Since then, Russian cyberattacks have been a reg…
…
continue reading
1
🔴 May 2s Top Cyber News NOW! - Ep 613
1:29:38
1:29:38
Play later
Play later
Lists
Like
Liked
1:29:38
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
…
continue reading
AI is all the rage. Or AI having rage is the bigger fear. Doesn't matter where you go, it's a topic of attention. The potential uses and abuses are touted on every news station and from every pundit, whether proponent or naysayer. But what's true? Especially in the realm of cybersecurity? Our engineers have on-the-ground knowledge of AI's capabilit…
…
continue reading
In today's podcast we cover four crucial cyber and technology topics, including: U.S., UK, Canada warn of Russian cyber attacks New Cuttlefish malware steals cloud credentials HPE Aruba fixes flaws in product leading to RCE DropBox discloses breach of DropBox Sign I'd love feedback, feel free to send your comments and feedback to | cyberandtechwith…
…
continue reading
The “zero trust” security model has been a buzzword in IT circles for a while now. It was hailed as a revolutionary approach to protecting digital assets by assuming nothing inside or outside the network is trustworthy. It’s also proven very difficult to put into practice. In this episode, Nic Reys brings on Jim Fitzsimmons to dissect the principle…
…
continue reading
1
CCT 137: Practice CISSP Questions (All Domains)
17:23
17:23
Play later
Play later
Lists
Like
Liked
17:23
Unlock the vault of cybersecurity wisdom and ace the CISSP exam with the guidance of Sean Gerber on the CISSP Cyber Training Podcast. Prepare to transform your approach to cyber studies as we emphasize understanding over rote memorization, with a treasure trove of 3,000 to 5,000 practice questions to arm you for battle. We'll tackle the complexitie…
…
continue reading
1
Mara Winn on protecting America’s critical infrastructure from cyberthreats
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58
A first-of-its-kind 2016 cyberattack on Ukraine’s power grid was a wake-up call for countries around the world to shore up protection of vulnerable energy resources. Mara Winn, Deputy Director for Preparedness, Policy, and Risk Analysis at the Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESAR), is in cha…
…
continue reading
1
🔴 May 1s Top Cyber News NOW! - Ep 612
1:42:24
1:42:24
Play later
Play later
Lists
Like
Liked
1:42:24
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
…
continue reading
1
🔴 April 30’s Top Cyber News NOW! - Ep 611
2:08:39
2:08:39
Play later
Play later
Lists
Like
Liked
2:08:39
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
…
continue reading
1
S6E15: John Hammond - Cybersecurity Industry Trend Analysis & Content Creation
38:24
38:24
Play later
Play later
Lists
Like
Liked
38:24
By Chris Hughes
…
continue reading
In today's podcast we cover four crucial cyber and technology topics, including: Hacker arrested in Paris sentenced to six years in Finland Akamai finds spike in fake USPS sites used to target customers Researchers find new Chinese-linked actor abusing DNS FCC fines phone companies millions for selling customer data I'd love feedback, feel free to …
…
continue reading
Can you crack the code on why cybersecurity in the Star Wars universe is more laughable than a Gungan at a Sith convention? Join us on a galactic journey as we celebrate the quirks and conundrums of Star Wars for May the 4th. In true fan style, we take a whimsical look at everything from the saga's focus on the Skywalker family to the spirited deba…
…
continue reading
US Votes for Net Neutrality, Again. Tune in to this episode as Darnley delves into the critical topic of Net Neutrality. Explore why the FCC's stance seems to waver, unravel the backstory of net neutrality, and gain insights into its fundamental principles. Join us for a deep dive into this pivotal issue shaping the future of the internet. Support …
…
continue reading
1
09. Why a security culture is so damn important and how to create one (with Julie Dolleris - Digital Learning Specialist at CyberPilot)
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04
Why is a security culture important? And how do you create one? Julie has gone through a lot of research to answer those questions. And as she says at the beginning of the episode: "It's a cool topic". In this episode, Julie will tell us all: Why aware employees are not enough to drive secure cyber behavior in your company Why you need to convince …
…
continue reading