show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Simply Cyber

Gerald Auger, PhD

Unsubscribe
Unsubscribe
Daily
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

Unsubscribe
Unsubscribe
Monthly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

Unsubscribe
Unsubscribe
Monthly
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

Unsubscribe
Unsubscribe
Weekly
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
  continue reading
 
Artwork

1
Life N Cyber

Josh, John, Kenny & Shannon

Unsubscribe
Unsubscribe
Monthly+
 
We chat about life about working in Cyber and how it effects our lives from Career to Parenting and the balancing of everything in between. You can also watch us in video format on YouTube! https://youtube.com/@lifencyber
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Hosted by Rick from DALY Computers (www.daly.com), the Technology Pulse podcast takes a look at new and existing technologies that will benefit the SLED (state/local government, education) sector in Maryland and Virginia. Episodes will feature guests from innovative product/service providers, the DALY team, and strategic partners.
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Creating connections and conversations about people, technology and the intersection of health and wellbeing. Recorded through the "cyber synaptic space." Catherine speaks to people who are considered experts in their fields. Important information for parents, teachers, professionals and anyone who wants to learn about cyberspace, digital parenting, security, data protection, counselling, health, wellbeing, personal growth and development. This is your acoustic & neuroplastic ride that will ...
  continue reading
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork

1
Security in Focus

Steve Bell - CTO at Gallagher security

Unsubscribe
Unsubscribe
Monthly
 
Security in Focus is hosted by Gallagher's Chief Technology Officer, Steve Bell. With a career history spanning over 30 years with Gallagher, Steve is an industry leader with expert knowledge across all aspects of security. Join Steve in our podcast series for updates on specific security issues and interviews with leading professionals across the sector.
  continue reading
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

1
Technology Now

Hewlett Packard Enterprise

Unsubscribe
Unsubscribe
Monthly+
 
HPE News. Tech Insights. World-Class Innovations. We take you straight to the source — interviewing tech's foremost thought leaders and change-makers that are propelling businesses and industries forward.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
The Audit

IT Audit Labs

Unsubscribe
Unsubscribe
Monthly+
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Loading …
show series
 
Today on Cyber Work, we continue our deep dive into industrial control systems and operational technology security by talking with Donovan Tindill of DeNexus. Now, I’m just going to come out and say it: Tindill's episode is like a cybersecurity career seminar in a box, and a must-not-miss if you’re interested in not just ICS and OT security, but sp…
  continue reading
 
According to a report published by the UK National Cyber Security Centre in January 2024, Artificial intelligence will increase the number and the severity of cyber attacks over the next two years. So how are AI models also being developed to effectively tackle cyber crime? And what is the potential of AI for stopping cyber security threats? Joinin…
  continue reading
 
In this episode of "Reimagining Cyber," join hosts Stan Wisseman and Rob Aragao as they explore the cutting edge of cybersecurity. First, they discuss an upcoming live webinar where listeners can engage with them directly on the topic of cyber risk posture management. Then, they delve into the world of smart contracts and decentralized finance, exa…
  continue reading
 
The vulnerability of GPS Is the sky falling on all VPN systems? Multi-user Passkeys, YubiKeys? The iCloud Keychain The UK and Google's Topics Show Notes - https://www.grc.com/sn/SN-973-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https:…
  continue reading
 
The vulnerability of GPS Is the sky falling on all VPN systems? Multi-user Passkeys, YubiKeys? The iCloud Keychain The UK and Google's Topics Show Notes - https://www.grc.com/sn/SN-973-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https:…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
  continue reading
 
"What's the definitive method for assessing cyber risk? Does it exist? How do you do it? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. If you want to know more, Kip has a course on LinkedIn Learning you can check out: ""IT and Cybersecurity Risk Management Essential Trainin…
  continue reading
 
In today's podcast we cover four crucial cyber and technology topics, including: TinyProxy flaw potentially impacting thousands El Salvadorian population impacted by data leak UK MoD suspects China looking for financial data in breach Germany recalls Ambassador from Russia citing Cyber Attack concerns I'd love feedback, feel free to send your comme…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
  continue reading
 
Today on Cyber Work, I’ve got a big guest for you. Jeffrey Brown is the chief information security officer for, not a company, not for a healthcare organization, but for the entire state of Connecticut! Brown walks me through the scope and reach of a state-wide CISO, a country-wide move toward a “whole of state” strategy and, frankly, I spend an aw…
  continue reading
 
In today's podcast we cover four crucial cyber and technology topics, including: Finland discloses ongoing Android malware campaign Czechia, Germany say Russia abused Microsoft flaw to spy Wichita officials say public services limited following ransomware Illinois to review language of law protecting biometric data I'd love feedback, feel free to s…
  continue reading
 
This month’s guest on the Cyber Insider is Andy Greenberg. Andy is a senior writer for WIRED who has covered hacking, cybersecurity and surveillance for 17 years. He’s the author of the new book Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency and the 2019 book Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s…
  continue reading
 
Embark on a transformative journey into the world of cybersecurity with me, Sean Gerber, as your guide. Discover how to fortify your career foundations and traverse the evolving landscape of digital protection. Our latest episode delves into the crucial timelines for mastering cybersecurity, with a special look at Dragos' role in safeguarding opera…
  continue reading
 
Have you ever gazed into the depths of a cybersecurity expert's mind? Prepare to be captivated as we sit down with Oliver, a virtuoso in the realms of IT and cybersecurity, whose tale unfolds from a childhood enchanted by math and sci-fi to the frontlines of digital defense. In today's episode, we peel back the layers of cybersecurity, from the bed…
  continue reading
 
We're celebrating May the 4th be with you. Yes, it's Star Wars Day and we've been given incredible behind the scenes access at none other than Star Wars: Galaxy's Edge at Walt Disney World Resort in Florida. Courtesy of Jose Corpuz, Principal Software Engineer with Global Engineering Technology and Analysis with Walt Disney Parks and Resorts, we've…
  continue reading
 
If you've ever been frustrated by how poorly you think politicians are dealing with the issues that face us in Cyber Security, maybe you've thought we should have more cyber security professionals in government. Madison Horn, cyber security professional feels the same way. So she's running for the a seat in the House of Representatives. This is my …
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
  continue reading
 
In today's podcast we cover four crucial cyber and technology topics, including: REVIL operator sentenced to 13 years in prison Sweden facing high volume of attacks after joining NATO Spanish police arrest over 100 individuals in cybercrime ring North Korean actors abusing email policies to spy I'd love feedback, feel free to send your comments and…
  continue reading
 
In this episode of the Cyber Uncut podcast, hosts Major General (Ret’d) Dr Marcus Thompson, Phil Tarrant and Liam Garman unpack what advertisers and business leaders can learn from military information warfare campaigns and just how many similarities these fields share. They begin the podcast by looking at the history of influence on the battlefiel…
  continue reading
 
This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Max Hillebrand. Max is the CEO at ZKSNACKS and Wasabi Wallet, a pioneering figure in the realm of privacy-focused cryptocurrency wallets. He is a dedicated open-source contributor focused on liberty and digital freedom. He champions non-scarcity in the dig…
  continue reading
 
When Russia invaded Ukraine in February of 2022, it was immediately apparent that the conflict would in part be waged in cyberspace. As Russian tanks rolled into Ukraine, Russian forces also launched a cyberattack against satellite modems that impacted the Ukrainian military’s ability to communicate. Since then, Russian cyberattacks have been a reg…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
  continue reading
 
AI is all the rage. Or AI having rage is the bigger fear. Doesn't matter where you go, it's a topic of attention. The potential uses and abuses are touted on every news station and from every pundit, whether proponent or naysayer. But what's true? Especially in the realm of cybersecurity? Our engineers have on-the-ground knowledge of AI's capabilit…
  continue reading
 
In today's podcast we cover four crucial cyber and technology topics, including: U.S., UK, Canada warn of Russian cyber attacks New Cuttlefish malware steals cloud credentials HPE Aruba fixes flaws in product leading to RCE DropBox discloses breach of DropBox Sign I'd love feedback, feel free to send your comments and feedback to | cyberandtechwith…
  continue reading
 
The “zero trust” security model has been a buzzword in IT circles for a while now. It was hailed as a revolutionary approach to protecting digital assets by assuming nothing inside or outside the network is trustworthy. It’s also proven very difficult to put into practice. In this episode, Nic Reys brings on Jim Fitzsimmons to dissect the principle…
  continue reading
 
Unlock the vault of cybersecurity wisdom and ace the CISSP exam with the guidance of Sean Gerber on the CISSP Cyber Training Podcast. Prepare to transform your approach to cyber studies as we emphasize understanding over rote memorization, with a treasure trove of 3,000 to 5,000 practice questions to arm you for battle. We'll tackle the complexitie…
  continue reading
 
A first-of-its-kind 2016 cyberattack on Ukraine’s power grid was a wake-up call for countries around the world to shore up protection of vulnerable energy resources. Mara Winn, Deputy Director for Preparedness, Policy, and Risk Analysis at the Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESAR), is in cha…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
  continue reading
 
In today's podcast we cover four crucial cyber and technology topics, including: Hacker arrested in Paris sentenced to six years in Finland Akamai finds spike in fake USPS sites used to target customers Researchers find new Chinese-linked actor abusing DNS FCC fines phone companies millions for selling customer data I'd love feedback, feel free to …
  continue reading
 
Can you crack the code on why cybersecurity in the Star Wars universe is more laughable than a Gungan at a Sith convention? Join us on a galactic journey as we celebrate the quirks and conundrums of Star Wars for May the 4th. In true fan style, we take a whimsical look at everything from the saga's focus on the Skywalker family to the spirited deba…
  continue reading
 
US Votes for Net Neutrality, Again. Tune in to this episode as Darnley delves into the critical topic of Net Neutrality. Explore why the FCC's stance seems to waver, unravel the backstory of net neutrality, and gain insights into its fundamental principles. Join us for a deep dive into this pivotal issue shaping the future of the internet. Support …
  continue reading
 
Why is a security culture important? And how do you create one? Julie has gone through a lot of research to answer those questions. And as she says at the beginning of the episode: "It's a cool topic". In this episode, Julie will tell us all: Why aware employees are not enough to drive secure cyber behavior in your company Why you need to convince …
  continue reading
 
Loading …

Quick Reference Guide