show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
R
Reality 2.0

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
America’s Leading Security Coach to Small Business, the FBI, Homeland Security, Department of Defense, Department of Energy, The Whitehouse, all major DoD contractors, including Raytheon, Boeing, Lockheed, BAE, and more. Dozens of US State, County, and City governments. School Districts, Hospitals, Doctors, and Clinics. All major financial institutions in the United States, including The Federal Reserve, Fidelity, Bank of America, Visa, M/C, etc. Providing Network Security since 1991.
 
B
BarCode

1
BarCode

Chris Glanden

Unsubscribe
Unsubscribe
Monthly+
 
Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who wi ...
 
Join Mat and Mike from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
 
Every weekday, host Kai Ryssdal helps you make sense of the day’s business and economic news — no econ degree or finance background required. “Marketplace” takes you beyond the numbers, bringing you context. Our team of reporters all over the world speak with CEOs, policymakers and regular people just trying to get by.
 
Cybersecurity on the Front Lines is a new podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Sentinel IPS’ COO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
T
The Cognitive Crucible

1
The Cognitive Crucible

Information Professionals Association

Unsubscribe
Unsubscribe
Weekly
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
 
Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, social engineering scams as well as hints and tips from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware payloads. If you are worried about uneducated emp ...
 
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
 
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
 
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Matt Pincus interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Welcome to the Risk Intelligence Podcast, where the Global Association of Risk Professionals, also known as GARP, brings together the world’s foremost Risk Practitioners, from around the globe, for in depth insights and discussions on today’s most important risk issues in finance and energy. Here is your chance to listen in.
 
The Bid Picture podcast presents lessons we can learn from fascinating cybersecurity topics, news, events, and incidents, and how those lessons could influence our decisions, thoughts, opinions, and lifestyle choices, as well as how everything fits together to form the bigger picture of online security in this digital age. For listener questions to be addressed on podcast episodes, please email bidemi@thebidpicture.com or via Twitter @BidPicture.Thank you for your time.
 
Loading …
show series
 
In this episode, host Bidemi Ologunde provided new details and some plausible theories regarding the recent arrest of the Ilya Sachkov, the Russian CEO of a leading cybersecurity company, Group-IB. Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, and the Clubhouse app (@bi…
 
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologi…
 
Alyssa Miller, Business Information Security Officer at S&P Global Ratings and author of the forthcoming book, “Cyber Defenders' Career Guide, is one of the most provocative, unfiltered and interesting voices in the cybersecurity community. She’s essential reading on infosec Twitter and a regular draw at conferences around the world. In this episod…
 
Ed Cabrera is the former CISO of the United States Secret Service and current Chief Cybersecurity Officer at Trend Micro. He believes we are at an inflection point in cybersecurity and is cautiously optimistic. During this conversation with SecureWorld, Cabrera also discusses ransomware, cryptocurrency, threat intelligence, cyber insurance, and mor…
 
The cybersecurity gaming event, Hack For Troops, takes place on October 30, 2021 from 9AM–4PM ET. Listen in to learn how you can play, watch, and support this program which helps raise money for the non-profit, Tech For Troops. About the Hack For Troops Event Hack For Troops is an annual capture the flag fundraising event to support Tech For Troops…
 
What's on the horizon for the ConnectWise cybersecurity stack? Join Raffael Marty, SVP of Cybersecurity Product Management, and Jeff Bishop, Chief Product Officer, in an enlightening conversation as they discuss the ConnectWise cybersecurity roadmap, liability, cybersecurity insurance, the threat landscape, and so much more! https://www.connectwise…
 
Jeremy Grant is the managing director of technology business strategy for Venable. Grant has been a major contributor to improving the privacy and security of sensitive online transactions as a senior executive advisor to the National Strategy for Trusted Identities in Cyberspace, which is part of the NIST identity management, authentication and pr…
 
Cyberespionage seems undeterred by stern warnings. DDoS hits the Philippine Senate. The US Department of Homeland Security intends to issue cybersecurity regulations for passenger rail and airlines. The US Department of Justice intends to use the False Claims Act to bring civil actions against government contractors who fail to follow “recognized c…
 
Erin Dotsey and BJ Saldana-Tovar of Petronella Cybersecurity interview Jamel Lugg of Gatekeeper. Gatekeeper is a proximity token based Multifactor authentication (MFA) solution that meets compliance with regulations such as HIPAA for medical practices and CMMC for DOD contractors. Token based solutions like Gatekeeper are much more secure than SMS …
 
How do you build out a sophisticated, enterprise-level cybersecurity posture when your mid-sized organization doesn’t even have a dedicated cybersecurity team, and even your vendors treat you like a small business? Turns out, the answer is pretty old school. It’s all about building the right relationships and setting the right priorities. Today we’…
 
Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. …
 
Mortgage interest rates have been historically low for the past year — at or below 3%. However, many banks have kept in place Great Recession-era proof of employment requirements. This means that those who lost their jobs during the pandemic and could benefit the most from refinancing are often unable to. Plus: The Weekly Wrap, breaking down what t…
 
A CISA-issued Joint Advisory warns of threats and vulnerabilities at water and wastewater treatment facilities. CISA issues twenty-two other industrial control system advisories. Andrea Little Limbago from Interos on trends in the human element of security. Our guest is Gidi Cohen from Skybox with Vulnerability and Threat Trends. And the Governor o…
 
Joe Vest started his journey as an aspiring herbalist, then his focus turned to IT working as a sysadmin. Joe's knack for technology as a sysadmin led him to cybersecurity and then red teaming when the discipline was not very known or practiced. _______________________ Guest Joe Vest On Linkedin | https://www.linkedin.com/in/joe-vest/ On Twitter | …
 
In a world where technology accelerates the speed of change in our society, the only way to stay grounded is to accept that you can’t. We have to learn how to keep up with the times and prepare the next generation for that. With three books and a long carrier as editor of Psychology Today, Hara Estroff Mariano shares her personal and professional e…
 
In this SEI Podcast, Bill Nichols and Hasan Yasar, both with the Carnegie Mellon University Software Engineering Institute, discuss DevSecOps metrics with Suzanne Miller. DevSecOps practices, made possible by improvements in underlying technology that automate the development-to-production pipeline, can generate more information about development a…
 
While the broader discussion of cyber-related incidents, events, and trends are contributed to by many different types of organizations and individuals, journalists play an important role in furthering our collective understanding of this space. Journalist Kim Zetter joins host Luke McNamara on Eye on Security to share her perspective in covering c…
 
New "Yanluowang" ransomware variant discovered Financial regulator addresses hybrid working security risks DocuSign phishing campaign targets low-ranking employees Thanks to our episode sponsor, Bitsight These are challenging times for security professionals. From managing third party supply chain risk, to quantifying financial exposure, to reducin…
 
Historically, barbecue has been a cheap and delicious way to cook meat — principally by Black pitmasters who lived in poverty. Now, ‘cue joints win prestigious awards and can charge top dollar. But a lot of media attention has centered on white cooks, who make up a fraction of pitmasters. Marketplace’s Andy Uhler visited a few Texas barbecue restau…
 
Data breach extortion seems to be an emerging criminal trend. Notes on a darknet market’s retirement. Verizon advises Visible users to look to their credentials. Windows users’ attention is drawn to seven potentially serious vulnerabilities (all patchable). The Necro botnet is installing Monero cryptojackers. Organizing an international response to…
 
Stalkerware can monitor all of your device activity. Martijn Grooten, Coordinator The Coalition Against Stalkerware talks us through what to do if you’re being cyberstalked. Stalkerware is software that is installed by abusers and predators on a victim’s device without their consent. Stalkerware can monitor your emails, texts, social media posts, p…
 
The pandemic has brought out a sense of work and personal balance. Now it's time to dive in further. Learn about burnout, PCSD, and what organizations can do to make a better environment for employees' health. Guest Dr. Ryan Louie On LinkedIn | https://www.linkedin.com/in/ryanlouie/ On Twitter | https://twitter.com/ryanlouie _______________________…
 
As current VP at Drip7, a microlearning platform for Cybersecurity education, Tara Anderson has been instrumental in increasing the revenue of some of the largest and most prestigious corporations in the world while mitigating cyber and compliance risk. Passionate about risk management, cyber security, behavior design, and education; Snapshots of h…
 
We kick off the Transatlantic Cable podcast this week with the recent Twitch data breach. Details are still scarce, but the topic is on the collective lips of the infosec community. From there, Jeff, Ahmed, and Dave move on to Facebook’s decision to crack down on its marketplace sales of Amazonian rainforest plots. How that will work in practice re…
 
Windows 11 Patch Tuesday causes AMD performance issues Student used zero-day for school prank US leaves China and Russia off the anti-ransomware invite list Thanks to our episode sponsor, Bitsight Did you know that organizations with poor patching practices are 8 times more likely to experience a ransomware incident? From managing third party suppl…
 
In this episode, host Bidemi Ologunde talked about the delicate balance between security and privacy, in terms of how geofence warrants are being used to arrest the rioters that breached the U.S. Capitol on January 6, 2021. Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, …
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Chloé Messdaghi as a guest on the show — together they talk about: Dogs and Halloween | Technology making the old way of spying obsolete and more dangerous | From climate crisis to child labor; the many reasons for keeping our phones and gadgets | Robo…
 
Tony Robinson (@da_667) Thought we’d put in a little news to round out the show https://www.bbc.com/news/world-us-canada-58863678 - nuclear secrets hidden in a peanut butter sandwich https://www.theregister.com/2018/04/20/rsa_security_conference_insecure_mobile_app/ https://www.vice.com/en/article/jg8w9b/the-twitch-hack-is-worse-for-streamers-than-…
 
The child care industry was struggling even before the pandemic. Costs are high for parents who need the service to enable them to work, yet employee wages rank low among professions. Now, some 80% of day care centers are short-staffed. Experts say the $39 billion in relief outlined in the American Rescue Plan may only be a crutch for the problems …
 
A Chinese-speaking APT is distributing the MysterySnail RAT in what appears to be a cyberespionage campaign. Some users still haven’t patched vulnerable SolarWinds instances. Notes on yesterday’s Patch Tuesday. The US-convened international ransomware conference kicked off today, and Russia wasn’t invited. Former users of a criminal booter service …
 
IT Nation Connect is just around the corner and soon we’ll be heading into the new year! Strategic planning to get your organization ready for execution is critical for business success. IT Nation Connect can help you identify key growth areas for your business and plan which goals you’ll be tackling next. Join us on this episode of Inside the Indu…
 
Olympus suffers second cyberattack in 2021 Microsoft’s Patch Tuesday squashes four zero-day vulns White House directs federal agencies to step up EDR Thanks to our episode sponsor, Bitsight In spite of all the recent attacks, did you know that only 17% of organizations continuously monitor their third party vendors? From managing third party supply…
 
Though unemployment levels are dipping, some 4.3 million people left their jobs in August, according to a new Bureau of Labor Statistics report. The “quits rate” is up to 2.9% — the highest it’s been since the BLS started tracking it. This employee exodus is partially fueling the worker shortage in industries like food services, health care, manufa…
 
Naked As A Jaybird: Amazon Astro, Privacy For The Elderly And Disabled, And Centralized Privacy In The U.S. _______________________ Guest Liz Wharton On LinkedIn | https://www.linkedin.com/in/elizabeth-wharton/ On Twitter | https://twitter.com/LawyerLiz ______________________ Host Keenan Skelly On ITSPmagazine 👉https://www.itspmagazine.com/itspmaga…
 
As a security consultant who transitioned to lead product security in-house, Jason Geffner has seen both sides of the application security process. He joins Tech Done Different to provide insights about consulting vs. in-house, leadership, the role of kindness in team dynamics, and managing third party security risk. You'll learn: why it's the cons…
 
Teheran is running password spraying attacks (especially on Thursdays and Sundays). More on the renewed popularity of DDoS attacks. NCSC warns British businesses against ransomware. Two journalists win the Nobel Peace Prize. Joe Carrigan shares his thoughts on GriftHorse. Our guest is Bindu Sundaresan from AT&T Cybersecurity football season and cyb…
 
SOC analysts are often overworked and under-appreciated — but that needs to change! How and where do the SOC and the SOC analyst make positive impacts on the business? That's exactly what we explore in this new episode. In this third of three episodes covering the first-ever SOC Analyst Appreciation Day, we get to speak with Nipun Gupta, a security…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login