show episodes
 
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cybersecurity Effectiveness Podcast. Learn more about the Verodin Security Instrumentation Platform at https://www.verodin.com #InstrumentSecurity #ProveSecurity
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Renee Small https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at: https://www.magnetichiring.com/book Christophe Foulon https://www.linkedin.com/in/christophefoulon/ Career Coaching - https://cpfcoaching.wordpress.com
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Welcome to the Risk Intelligence Podcast, where the Global Association of Risk Professionals, also known as GARP, brings together the world’s foremost Risk Practitioners, from around the globe, for in depth insights and discussions on today’s most important risk issues in finance and energy. Here is your chance to listen in.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
TechStuff is a show about technology. And it’s not just how technology works. Join host Jonathan Strickland as he explores the people behind the tech, the companies that market it and how technology affects our lives and culture.
 
GovCast, a production of GovernmentCIO Media & Research, tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered.
 
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
 
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
 
Cybersecurity made simple. Come on a journey with our host Darnley G, to bring you through the rollercoaster of information security. We will discuss topics about any cybersecurity trending news, how to's, facts, who's been hacked, and even some tips to protect your business from cybercrime. Grab a cup of caffeine and enjoy!
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
 
The concept is simple - Cybersecurity's best Virtual Happy Hour! BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. In the midst of most bars being closed for on-prem service, a virtual bartender joins us each episode to explain how ...
 
Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and subscribe! See acast.com/privacy for privacy and opt-out information.
 
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
 
Constellations from Kratos is your connection to the innovators, business leaders, entrepreneurs and policy makers who are making ... and remaking ... today's satellite and space industries. The current explosion in innovation is revolutionizing communications, imagery, defense and research and has caused a culture shift within the traditional satellite and space industry landscapes. New Space versus Old Space, GEO versus LEO Satellites, Narrowband versus Wideband, High-Throughput Satellites ...
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are. Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
Loading …
show series
 
James Azar, CISO Talk Podcast host + Naomi Buckwalter, CISO extraordinaire, are here to talk about cybersecurity resumes. Join us for a lively conversation! About Breaking Into Cybersecurity: This series was created by Renee Small & ☁️ Christophe Foulon ☁️ to share stories of how the most recent cybersecurity professionals are breaking into the ind…
 
As we approach the end of 2021, Sean Berg shares his perspective on how the government has done on the rapid transition to Remote work, the pros and cons and what's next. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e102 Have a guest you think would be great for the podcast?…
 
Sean Mahoney, Stanley Li and James Watson discuss a new case of a construction company that may incur a $1m cost because of a single email deleted by an employee 2 years ago. -- Why Governance Risk and Compliance (GRC) is driving the agenda for security controls, policies and procedures for small and mid-size businesses. -- How automation can be us…
 
Craig discusses cybersecurity audits and new vehicle lifespan. For more tech tips, news, and updates, visit - CraigPeterson.com --- Right To Repair Or A Fight For Survival? Ring’s latest security camera is a drone that flies around inside your house Malware Attacks Declined But Became More Evasive in Q2 Elon Musk reveals plans to slash electric bat…
 
Some familiar threat actors--both nation-states and criminal gangs--return to the news: Venomous Bear, Charming Kitten, Wizard Spider, and Maze. Mike Benjamin from Lumen looks at the Mozi malware family. Our guest is Neal Dennis from Cyware on why it's time for organizations to step up their data sharing. And Big Tech’s day on Capitol Hill involved…
 
Women in Nuix host Tish Looper is joined by Cynthia Vasquez, founder of Propel Consulting, a provider of eDiscovery and litigation support services. Cynthia is also the Assistant Director of the Orange County, CA chapter of Women in eDiscovery. In this episode, they talk about taking risks and supporting underdogs, and even some tips for networking…
 
Chris Westbrook is a Program Associate for Federal Career Connection. Chris brings many years of experience as a recruiter and as a hiring manager within the US Intelligence Community. She provides career-development and leadership instruction services to a variety of public- and private-sector clients. This series was created by Renee Small & ☁️ C…
 
Our guest today is Maddy Pet who will share her experiences in her company's Cyber Cryptography Services group. She will also talk to us about becoming a founding member of Capital One’s McLean Women in Technology committee. This series was created by Renee Small & ☁️ Christophe Foulon ☁️ to share stories of how the most recent cybersecurity profes…
 
Gaylynn Fassler, MS, SSCP is here to talk about her journey into the industry and will give a sneak peek into her upcoming talk at the Triangle InfoSeCon, hosted by ISSA Raleigh Chapter. Bring your questions! This series was created by Renee Small & ☁️ Christophe Foulon ☁️ to share stories of how the most recent cybersecurity professionals are brea…
 
On today’s episode, Jeff Schilling, the CISO for Teleperformance, joins us today to discuss the transition from a security career in the military to the private sector, the importance of relationships, and security in relation to the Cloud. Transition from the Army to Civilian Life Jeff recounts his career in CISO, first discussing Teleperformance,…
 
In our most recent episode of Security Nation, we spoke with Maria Barsallo Lynch, Executive Director of the Defending Digital Democracy Project (D3P) at the Belfer Center for Science and International Affairs at the Harvard Kennedy School, about her work informing election officials of the rise of misinformation and disinformation campaigns center…
 
A few episodes ago I talked about the increased use of business issued comptuers for personal reasons. This epsiode talks about this from the employee's point of view and why you should think twice about what you should and should not do on business owned devices. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup o…
 
Salt Security’s Roey Eliyahu joined Technado to discuss one of the most vulnerable things security teams often overlook: APIs. They dissected an API issue at Uber that left accounts open to attack. Then, in the news, the guys covered Vint Cerf’s plan for Internet in space, Microsoft throttling availability of their October 2020 Windows 10 update, U…
 
Today's Headlines: Microsoft’s SMBGhost Flaw Still Haunts 108K Windows Systems Critical Oracle WebLogic vulnerability exploited in the wild Russian Turla hackers breach European government organization U.S. Hospitals Warned of Imminent Ransomware Attacks From Russia To make sure you never miss a single Practitioner Brief sign up for our daily maili…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-securing-digital-transformations/) Digital transformation. It's definition is broad. Meaning securing it is also broad. But there are some principles that can be followed as companies undergo each step in a deeper dive to make more and more of…
 
Good morning everybody! I was on WGAN this morning with Matt Gagnon and started off this morning talking about Iran and the letters sent to some of US Voters. They were purported to be from the Proud Boys but were from Iran. We also discussed a bit about Election Hacking and then got into, How safe are our USBs? Here we go with Matt. These and more…
 
US authorities warn that North Korea’s Kimsuky APT is out and about and bent on espionage, with a little cryptojacking on the side. As the US elections enter their endgame, observers point out that the appearance of hacking can be just as effective for foreign influence operations as the reality. CISA continues to tweet rumor control and election r…
 
In this episode, Darnley discusses the surge of technology and online use since March 2020. The increased expenditures on technology have equated to more people using technology and spending time online - which creates a bigger gold mine for cybercriminals. Learn why the "new normal" makes it easier for hackers to infiltrate your network to cause c…
 
Listen to Michael Martinez talk about software-defined technology allowing Maxar to scale for capacity when needed and only when needed – which is significant when considering costs. He discusses AI machine learning being a big part of their ground system process, leveraging their capability to do operations around multiple satellites without growi…
 
This episode goes over the top breaches and their fines. This also talks about the average cost of a breach and if your company can handle the cost of being non-compliant. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Secur…
 
Today's Headlines: Microsoft releases update to remove Adobe Flash from Windows LinkedIn, Instagram Vulnerable to Preview-Link RCE Security Woes FBI: Hackers stole government source code via SonarQube instances Elections 2020 cyber update To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailchi.mp/…
 
In this episode, hosts Nic Fillingham and Natalia Godyla speak with Mike Flowers and Cole Sodja of the Microsoft Protection Team, and Justin Carroll of the Microsoft Threat Intelligence Global Engagement and Response team, about how they’re using machine learning to identify and model lateral movement attacks. Then they speak to Dr. Anna Bertiger, …
 
Phil Beyer - Bio (CISO at Etsy) Importance on books about behavioral science. “Thinking Fast and Slow”: https://smile.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555 “Predictably irrational”: https://smile.amazon.com/Predictably-Irrational-Revised-Expanded-Decisions/dp/0061353248/ http://humanhow.com/list-of-cognitive-biases-with-exampl…
 
EI-ISAC reports a curious election-related phishing campaign, widespread, but indifferently coordinated and without an obvious motive. Nitro discloses a “low impact security incident.” A breach at a law firm affects current and former Googlers. Finnish psychological clinic Vastaamo dismisses its CEO for not disclosing a breach promptly. Ben Yelin l…
 
Prologue This week on DtSR, John Steven joins Rafal & James to talk about an inflection point in security that's happening right now. As you may notice, everything about security is changing, especially in the AppSec space... listen in and you'll hear John's thoughts on a very interesting time to be in the industry. Evolve, or die... Guest John Ste…
 
Mimecast released a report from a study they conducted about remote worker's behavior at home. This epsiode talks about the findings and what you can do to make your education more engaging and proactive to curb these behaviors. Source: https://www.mimecast.com/resources/ebooks/cybersecurity-awareness-company-issued-computers-survey/ Be aware, be s…
 
Welcome! Good morning, everybody. I was on WTAG this morning with Jim Polito. We got into a lengthy discussion about some letters purported to be to democrats from the proud boys. Then we talked about Hunter Biden and recycling phones. Here we go with Jim. For more tech tips, news, and updates visit - CraigPeterson.com --- Automated Machine Generat…
 
Today's Headlines: Containerd Bug Exposes Cloud Account Credentials Amazon sacks insiders over data leak, alerts customers IoT Device Takeovers Surge 100 Percent in 2020 To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailchi.mp/1c199cd854f0/practitioners-brief **** James Azar Host of CyberHub Pod…
 
Many organizations use the Common Vulnerability Scoring System (CVSS) to prioritize actions during vulnerability management. This podcast—which highlights the latest work in prioritizing actions during vulnerability management—presents a testable Stakeholder-Specific Vulnerability Categorization (SSVC) that avoids some problems with CVSS. SSVC take…
 
People mistake information as something you have to personally have in your mind. They assume that If you know a lot of information, you are smart, if you don't, you are dumb. Nothing could be further from the truth. In this episode, Andrew explains why information doesn't have to be in your head to be of value to you, and he shares a few secret pe…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login