show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
C
Click Here

1
Click Here

The Record by Recorded Future

Unsubscribe
Unsubscribe
Weekly
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. If you want more news like this deliver ...
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Alias Secure AF Cybersecurity Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cybersecurity topics with coworkers and special guests. No matter where you are on the cybersecurity knowledge ladder, there's an episode here for you.
 
I
InTechnology

1
InTechnology

Tom Garrison and Camille Morhardt

Unsubscribe
Unsubscribe
Weekly
 
Welcome to InTechnology, hosted by Tom Garrison and Camille Morhardt. In this podcast you will hear conversations with industry leaders and technical experts in cybersecurity, sustainability, and technology. Our guests will explain their approach to recognize emerging trends and to create best practices… where more and more, the health of an organization depends on embracing the interconnectedness of these three areas.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
 
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
 
Fed up with tech hype and buzzwords? Looking for a tech podcast where you can learn and be inspired by real-world examples of how technology is transforming businesses and reshaping industries? In this business technology podcast, you can keep informed of the latest business and tech trends by listening to the stories of other people in your field and how they are overcoming challenges with emerging technologies. Learn from the guest's actionable tips, and lessons learned to obtain greater c ...
 
S
Smashing Security

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
 
T
Technado

1
Technado

Peter VanRysdam

Unsubscribe
Unsubscribe
Weekly
 
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
 
Welcome to the Sales Bluebird podcast, where we help cybersecurity companies grow sales faster. Whether you are a seller, marketer, leader, or founder, we give you tips, tricks, experiences, examples, ideas, and inspiration from people who know a thing or 10 about building great cyber security companies. For sales reps, VP Sales, CRO, marketing, CMO, founder, CEO, and investors at cyber security companies.
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
 
Join Mat and Mike from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
 
R
Reality 2.0

1
Reality 2.0

Katherine Druckman and Doc Searls

Unsubscribe
Unsubscribe
Monthly+
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
 
Cybersecurity affects us all whether we are at home, managing a company, supporting clients, or even running a state or local government. Join the Center for Internet Security’s Sean Atkinson and Tony Sager as they discuss trends and threats, ways to implement controls and infrastructure, explore best practices, and interview experts in the industry. If you are interested in learning more about how to grow your cybersecurity program, CIS and its volunteer community are here to bring clarity ...
 
C
Cyber Crime Junkies

1
Cyber Crime Junkies

Cyber Crime Junkies-David Mauro

Unsubscribe
Unsubscribe
Weekly+
 
Our mission is to keep you, your family and your organization's brand safe. We interview Leaders who build and protect great brands, provide advice on how to advance your career and even break into the Cybersecurity field. Become a Cyber Crime Junky! New Episodes on most Mondays with other bonus episodes.
 
Loading …
show series
 
Pentagon awards cloud deal to four major providers Apple finally adds encryption to iCloud backups CloudSEK claims it was hacked by another cybersecurity firm Thanks to today's episode sponsor, PlexTrac The Plextrac platform is your offensive security team’s secret weapon. Build better reports in half the time, centralize your data, maximize your r…
 
The FBI and CISA are releasing this alert to disseminate known Cuba Ransomware Group indicators of compromise and TTPs identified through FBI investigations. FBI and CISA would like to thank BlackBerry, ESET, The National Cyber-Forensics and Training Alliance (NCFTA), and Palo Alto Networks for their contributions to this CSA. AA22-335A Alert, Tech…
 
Global dependence on technology blurs the lines between national and cybersecurity, elevating the importance that consistent collaboration and information-sharing has in the industry. ODNI Director of Cyber Threat Intelligence Integration Center Laura Galante discusses the prevalence of disinformation and how the rapidly shifting cyber landscape im…
 
As we get ready to say goodbye to 2022 the team at the Cybersecurity Defenders podcast thought it would be nice to review all the predictions for the future made by guests on this show so far. It is a fun episode and will be interesting to circle back on next year at the same time. In the show, we talk about Dr. Joseph Burt-Miller Jr's study hall g…
 
Chris Patteson, Field Risk Officer at LogicGate, explains why compliance doesn't equate to security and why this is a common misconception in corporate boardrooms. Chris talks about the difference between compliance with an industry or regional regulatory agency related to privacy and data protection doesn't mean that a company's systems are secure…
 
This week we welcome Adam Levin to the podcast. He is a long-time consumer affairs advocate with more than 40 years of experience, author of the book Swiped and formerly Chairman and founder of CyberScout as well as co-founder of Credit.com. Adam joins us at the apex of the consumer security awareness time of year as holiday shopping, COVID, flu, R…
 
William Parks, Andy Kerr, and Kyle Hinterberg discuss the latest PCI news, share how to create and what should be covered in an executive summary for a PCI assessment, and answer a few questions from our listeners. If you’d like us to answer and address questions on our next episode, reach out to us here: Andy Kerr – andy.kerr@lbmc.com Kyle Hinterb…
 
There's no escaping cyber risks these days. But what can you do to mitigate and transfer them? Listen to this episode for a Founder-to-Founder conversation as they share their perspectives on cyber risk & protecting their small businesses. You'll learn about different types of cyber risks, how to assess and protect against them, and some tips for p…
 
Cybersecurity certifications can make or break SOME careers. Watch and listen as we discuss some of the issues at hand. Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and disc…
 
This episode was recorded on: 12/1/2022Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our ecosystem of partners, customers, and industry exp…
 
We've talked about password security a lot on this podcast, and we’ll definitely keep talking about it. What we haven’t discussed enough is password security from the system administrator side. What can admins do to better protect their users from themselves? Find out in this episode of the Secure AF podcast as we talk with security engineer, Rober…
 
Cybersecurity is now recognized as a critical priority for businesses around the world. However, cybersecurity threats are evolving as risks, and the responses necessary to mitigate them, change rapidly. As a result, staying ahead of bad actors is a continuous challenge, and businesses, despite their intentions, are only sometimes keeping pace. To …
 
Practical skills and experience are kings right now for cybersecurity job seekers, but how does one get it and what are the MAJOR pitfalls folks are experiencing?? Get daily cyber threat briefings with Simply Cyber every weekday. https://simplycyber.io/streams for all the details. Simply Cyber's mission is to help purpose driven professionals make …
 
The US Government Accountability Office issues a report on offshore oil and gas cybersecurity. The Oak Ridge National Laboratory seeks to secure power grids. Boa web server vulnerabilities used to target energy organizations. CISA updates its Infrastructure Resilience Planning Framework. And CISA issues advisories for ICS vulnerabilities. Guests Ma…
 
https://www.yourcyberpath.com/84/ In this short episode, Jason and Kip discuss the first aspect of the CIA Triad which is Confidentiality. They break down the critically important confidentiality point and how it works in the real world, highlighting that it's not about the information itself but more likely about where that information is in the f…
 
Zenobia Godschalk has worked closely with many cybersecurity companies over the years as the founder of ZAG Communications, a PR and marketing firm serving technology companies, and is now SVP of Communications for Hedera. She also does a lot of philanthropic work in the technology space. LinkedIn: https://www.linkedin.com/in/zenobiaaustingodschalk…
 
Every piece of malware, every phishing email, reaches its potential victim via the network, the means by which the organization communicates internally and with the outside world. So who better to protect the company than the people who install and specialize in communications networks? That's the premise of this episode of the Tech Means Business …
 
Machine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity. The management of digital certificates and keys allows all internal traffic to be encrypted, seriously narrowing the attack surface of an enterprise. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Chris Hi…
 
In episode 43 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Amanda Flynn, Manager of Admin Services and Board Relations at the Center for Internet Security (CIS), and Elijah Cedeno, Sr. Account Management Specialist at CIS. Together, they discuss the work of CIS CARES, a CIS program that gives back to the commu…
 
Melanie Teplinsky fell in love with cryptography at an early age, which led her to landing her first job at the National Security Agency at 16. From there, she found her niche in cybersecurity at the intersection of technology and the law. As a senior fellow at American University in the Law Tech, Law, and Security Program, Melanie helps craft cybe…
 
Too often companies spend a lot of time and resources on figuring out how to describe what they do on their website. The straplines, tag lines, and cute sayings. That may work for websites and email blasts but it doesn’t work for the sales team. The difference is marketing does one-to-many and one-way communication. Sales does one-to-one and two-wa…
 
Chris Romano, CISSP / Cybersecurity Career Mentor, and experienced IT Security leader. Chris is the founder of CAREER UP, a dynamic cyber career program training and educational platform for Cyber. Chris explains his career trajectory in technology management, through networking to a cybersecurity leader. He has gained unique and incredible experie…
 
In this episode, host Bidemi Ologunde discussed the many ways that the ongoing economic downturn is impacting the tech industry. Timestamps Part 1: "Declines in tech stocks and cryptocurrencies" (0:29). Part 2: "The good old days were kind of over" (3:46). Part 3: "It is time to batten down the hatches" (8:39). Part 4: "A meaningful cultural shift …
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login