The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
The Secure Talk podcast reviews the latest threats, tips, and trends related to cybersecurity and compliance. Host, Mark Shriner, interviews leading cybersecurity executives, consultants, and educators and discuss best practices related to IT security and compliance. securetalkpodcast.com
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
Digital Shadows' ShadowTalk discusses the latest threat intelligence and cybersecurity news with our panel of threat intelligence experts, security engineers, security researchers, and more.
The Hub of the Infosec Community. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
Sleep at night knowing what's going on with your cybersecurity - America’s Leading Security Coach - FBI InfraGard Webinar Moderator - Network Security Since 1991 CraigPeterson.com
The monthly podcast for security professionals by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
Join Mat and Mike from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
Today, Enterprise Technology is both Strategy and Global. On CIO Talk Network (CTN), Business IT Thought Leaders from around the globe share their experience and discuss how they are partnering with business to innovate and help grow the top line revenue, better care of customers, and improve the corporate bottom line. If you want to keep up with changes in technology and how it can be leveraged to maximize business potential, listen to CTN: CIO Talk Network
GovCast, a production of GovernmentCIO Media & Research, tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered.
The Bid Picture is a weekly podcast that provides useful and actionable cyber intelligence by examining cybersecurity news and events, and how we can learn from them and apply those lessons to our daily lives.For questions, comments, or any suggestions on which topics you would like to hear about on future episodes, please send an email to bidemi@thebidpicture.com. Thank you for your time, and God bless.
Welcome to "In Check with Fintech", the PCN podcast series. In this podcast series we will talk about all things related to the payments & fintech industry, from open banking to blockchain, cybersecurity, ecommerce, merchants, acquirers, PSP's and more!
According to the Bureau of Labor Statistics (BLS), 'Black or African-American' people make up only 3% of the information security analysts in the U.S. The goal of our podcast is to be a resource, and catalyst in the education, advancement, and visibility of African American Cybersecurity professionals world-wide. Support this podcast: https://anchor.fm/blakcyber/support
The official podcast of the annual Global Connected Aircraft Summit, featuring interviews with influencers across the connected aircraft ecosystem on topics such as airline business models and cockpit improvements, cybersecurity, to new IFEC technologies and more.
Fed up with tech hype and buzzwords? Looking for a tech podcast where you can learn and be inspired by real-world examples of how technology is transforming businesses and reshaping industries? Keep informed of the latest business and tech trends by listening to stories of other people in your field and how they are overcoming challenges with emerging technologies. Learn from the guest's actionable tips, and lessons learned to obtain greater clarity and how you can leverage technology. In th ...
Tune in to listen to Kyle Burk talk about Information Security, IT, and Development topics every week. Go to Twitch.Tv/SecuritySundays to join the conversation. Interested on being in the show? Email us here: mail@securitysundays.com
The State Bar of Michigan podcast series, On Balance, features a diversified array of legal thought leaders. Hosted by JoAnn Hathaway of the bar’s Practice Management Resource Center and Tish Vincent of its Lawyers and Judges Assistance Program, the series focuses on the need for interplay between practice management and lawyer-wellness for a thriving law practice.
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.
Have you ever wondered what happens when women take off their heels for the day and unwind with a glass of red or a finger or two of whiskey? What stories would they tell? What meetings have they walked into unannounced to take back the power? If These Heels Could Talk takes you behind the scenes with two women in the business world who have seen it all. They’ve been at the bottom of the ladder and the top of the ladder. They’ve been underestimated and they’ve had their ideas stolen. And the ...
We cover the latest in cybersecurity news, including what new threats are out there and what you can do to protect yourself and your clients.
Welcome to Lock and Code, a Malwarebytes podcast. Every two weeks, we serve up the latest cybersecurity headlines, plus we dig deep into some of the industry's most vexing topics. From deep state to deep fakes, we separate cybersecurity fact from fiction.
Your career-related cybersecurity show. Regularly we will be speaking with a variety of guests from industry leaders to new entrants into the space. Each sharing their journey to where they are today, views on the industry, and how others can find success navigating their career.
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
Do you want to dive into the ocean of IoT but don't know how to get started? Would you like to know more about the possibilities that lie in the digital future? Are you into digital trends that revolutionize today's industries? If so, this podcast is for you! Welcome to our podcast “Unlock the full potential of IoT”, a 360-degree view of the latest IoT trends. We talk to the innovators, experts and visionaries who work and play in digital transformation. Explore with us the practical ways to ...
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
Welcome to the BitSight Risk Review. Listen as we discuss the latest cybersecurity trends, current events, and talk more in-depth about the application of security ratings.
Online & Offline Safety Tips, Techniques & Technologies
A technology podcast and an engaging platform for discussions and expert opinions on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and information security in support of technology and business. Winner of 2019-Outstanding Security Performance Awards, she is an acclaimed and well-known security expert and public speaker. On the podcast, she brings on different cybersecurity, privacy and risk management pr ...
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
reframe is a podcast series that brings you inspiring stories from successful people adding value to society. I'm always excited to meet my wonderful guests and talk to them about their journeys and practical advice they want to share with people like you, who want to grow in life. If you get value out of this podcast, please share it with your friends and subscribe on youtube, spotify, itunes or wherever you're listening, as it will really help me in growing the community and helping others ...
Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!
Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
This is a podcast where we explore the issues today with the insider threat, or human factor, of our organizations. We also talk about ways to tackle those issues through training, culture, and technology in order to help information security and business professionals reduce risks in their environments. We have a patreon page for the podcast, located at . I don't want to be too pushy for this, but a couple of you have asked about ways that you can support the show.
Super Happy Dragon Lucky is Dragonchain's (American blockchain technology company open sourced from The Walt Disney Company in 2016) weekly live show on YouTube. Founder and CEO Joe Roets and co-host Rocco discuss the latest cryptocurrency and blockchain news with industry guests. As well as all news related to Dragonchain, and the capabilities of our blockchain solutions and services.
C
ConnectWise Podcast Network


1
ConnectWise Tech Talk: Getting Started With Integrations
39:28
39:28
Play later
Play later
Lists
Like
Liked
39:28
Join the ConnectWise Invent team as they share details on the opportunities and tools available for extending ConnectWise products. The team will review how to access our APIs, resources available, the ConnectWise Marketplace and support options.
T
The Tech Talks Daily Podcast


1
1510: Dentons - Exploring Big Tech, Politics and Policy Changes
41:33
41:33
Play later
Play later
Lists
Like
Liked
41:33
With Twitter recently hitting the headlines for silencing President Trump, many have questioned if tech giants now possess more power than governments. With increased polarization in society, many also blame tech and social media for division rather than uniting the global community. How did we get here? And how do we stop a tech lash from building…
I
ITSPmagazine Podcast


1
Ant Colonies, Metaverses, Virtual & Augmented Realities, Diversity, Ethics, And Some Thoughts About The Future | An Audio Signals Conversation With Antonia Forster
41:32
41:32
Play later
Play later
Lists
Like
Liked
41:32
Imagine you could experience worlds that you design and build the way you want them to be; alternative realities that you can enter and leave as you wish. Now, Imagine there's no countries, nothing to kill or die for... imagine all the people, livin' life in peace. You may say I'm a dreamer. But I'm not the only one. Certainly not the only one. The…
T
The CyberWire Daily


1
Accellion FTA compromise spreads. Ocean Lotus is back. LazyScripter seems to represent a new threat group. Notes from the SolarWinds hearings. New ICS threat actors.
25:59
25:59
Play later
Play later
Lists
Like
Liked
25:59
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
Today's Headlines and the latest #cybernews from the desk of the #CISO: Critical VMware vCenter Server Flaw Can Expose Organizations to Remote Attacks NASA and the FAA were also breached by the SolarWinds criminals Tech Firms Say There's Little Doubt Russia Behind Major Hack CEOs, Senators discuss mandating cyber-attack disclosures The Practitioner…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON: WGAN Mornings News with Matt Gagnon: Texas Energy - Asleep at the Switch and State Vaccine Scheduling Websites are a Nightmare
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13
Good morning everybody! I was on WGAN this morning with Matt Gagnon. We really got into the power distribution issues in TX and it appears that the Energy department was really "asleep at the switch." Then we talked about the nightmare that these bureaucratic states are having with their vaccine scheduling websites. We discussed why they are having…
S
Siemens Advanta - Unlock the full potential of IoT


1
IoT: Where to begin and the value of partnerships
25:13
25:13
Play later
Play later
Lists
Like
Liked
25:13
How do you start your digital journey? What is the benefit for two huge corporates such as SAP and Siemens to work in partnerships and how can you profit from these alliances? Moving to ecosystems is the way forward. Revealing what it all has to do with the Siemens and SAP digital threat, our guests Thomas Saueressig, Member of the Executive Board …
I
If These Heels Could Talk


1
Digital Privacy and Security for Small Business
42:15
42:15
Play later
Play later
Lists
Like
Liked
42:15
From logins to employees to insurance to password managers, small businesses have very little in place for their own privacy and don’t do much about client and customer security. The thought that small businesses are not targets is patently false. This podcast is a reminder to stop doing these things: Emailing passwords Using the same password for …
T
The Tech Talks Daily Podcast


1
1509: How to Integrate, Unify and Protect Your Knowledge Platforms
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44
Employees can now work anywhere and everywhere thanks to a long list of remote working tools and productivity apps. But remembering which app you saved your document, message, presentation, report, video, project plan, or a task list can be frustrating. Onna is an eDiscovery startup that raised $27M during the lockdown. The latest funding round was…
I
ITSPmagazine Podcast


1
Starting or Running a Vulnerability Disclosure Program? Here’s What To Do Next | Redefining Responsible Disclosure With Chloé Messdaghi And John Jackson
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49
If a tree falls in a forest and no one is around to hear it, does it make a sound? Yes and no, it depends on who you ask. In our case, the answer is a solid FOR SURE. Especially once we consider the squirrels that live in the said forest — the criminal and the ethical ones. Listen up. In the cybersecurity community it is not uncommon to use the sen…
T
The CyberWire Daily


1
DDoS in hybrid war. Accellion compromise attributed. Initial access brokers. Agile C2 for botnets. US Senate’s SolarWinds hearing. US DHS cyber strategy. Shiny new phishbait.
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
I
ITSPmagazine Podcast


1
TMI? Staying Social Without Oversharing | A Conversation With Tim Sadler | Your Everyday Cyber With Limor Kessem And Diana Kelley
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13
Chances are you’re on at least one social media platform. It’s a great way to connect, but you need to connect and share mindfully. Tim Sadler helps us take a closer look at how to social safely. You can overshare on social media and it can get risky quickly if you share personal data like your birthday, you COVID vaccine card, or even the names of…
Today's Headlines and the latest #cybernews from the desk of the #CISO: Chinese Hackers Hijacked NSA-Linked Hacking Tool Accellion FTA Zero-Day Attacks Show Ties to Clop Ransomware, FIN11 VC Giant Sequoia Capital Informs Investors of Data Breach Texas electric company warns of scammers threatening to cut power TDoS Attacks Take Aim at Emergency Fir…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Texas Energy Problems -- Could Mass be in for Something Similar? and Apple Goes All In on 6G
12:43
12:43
Play later
Play later
Lists
Like
Liked
12:43
Good morning, everybody. I was on this morning on WTAG with Jim Polito. We discussed the power situation in Texas and then brought it home to Mass and talked about whether we could be in for anything similar. We also discussed Green Energy and Nuclear Energy. Then we got into 6G -- yes that is not a typo, Apple is developing their own chips and dit…
T
The Tech Talks Daily Podcast


1
1508: Getting Back to the Point of Healthcare With Technology
31:08
31:08
Play later
Play later
Lists
Like
Liked
31:08
Point Health is a digital healthcare startup on a mission to make healthcare easy to find, easy to understand, and easier to afford for members of insurance plans and healthcare sharing organizations. The company recently announced the intent to acquire The Karis Group, an Austin-based company with 25 years of experience in healthcare billing negot…
T
The CyberWire Daily


1
Facebook takes down Myanmar military page. Chinese cyberespionage and cloned Equation Group tools. Supply chain compromises. Threat trends.
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49
Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accen…
Jim Bowers is Security Architect for TBI, a Chicago-based telecommunications master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. His expertise ranges from architecting complete security infrastructure, to assessments for vu…
Deepfakes continue to be a growing security concern. As the technology to alter video footage and replace one person's face with another’s has advanced in ease, sophistication and availability, the use of deepfakes has become more broadly prevalent, extending beyond novelty use to become another tool in the adversary’s playbook. Our guest today is …
Today's Headlines and the latest #cybernews from the desk of the #CISO: Malformed URL Prefix Phishing Attacks Spike 6,000% SolarWinds Attackers Downloaded Azure, Exchange Code SonicWall releases additional update for SMA 100 vulnerability Mysterious Mac Malware Infected at Least 30,000 Devices Worldwide The Practitioner Brief is sponsored by: KnowB…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON NH Today WGIR-AM 610: It Wasn't Just Ice That Brought Texas Energy to A Standstill
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56
Welcome, Craig Peterson here. This morning I was on with Chris Ryan on NH Today. We talked about what is going on in Texas and Why? What did they do? What assumptions did they make? Where do they go from here? Here we go with Chris. These and more tech tips, news, and updates visit. - CraigPeterson.com --- Automated Machine Generated Transcript: Ju…
G
Grassroots Security: Cybersecurity for Everyone


1
Protecting You Through Security Filtered Domain Lookups | Grassroots Security (S2:E6)
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
Protect your computer using a security-filtered Domain Name System (DNS) server configuration. Also hear about the Center for Internet Security (CIS) offering to protect US hospitals against malware through a similar method of DNS protection. Reference: https://grassrootsecurity.com/2021/02/22/protecting-you-through-security-filtered-domain-lookups…
T
The Tech Talks Daily Podcast


1
1507: How Citrix AMD and Microsoft Are Building The Future of Work
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30
In the Citrix Ready Podcast series, I explore how technology can empower people and organizations to unlock innovation, engage customers, and be productive—anytime, anywhere. In today's episode, I learn more about how collaboration and hybrid working environments are reshaping the future of work. It recently occurred to me that Microsoft, Citrix, a…
B
Brakeing Down Security Podcast


1
2021-007-News-Google asking for OSS to embrace standards, insider threat at Yandex, Vectr Discussion
57:01
57:01
Play later
Play later
Lists
Like
Liked
57:01
Links to discussed items: Yandex Employee Caught Selling Access to Users' Email Inboxes (thehackernews.com) Supply-Chain Hack Breaches 35 Companies, Including PayPal, Microsoft, Apple | Threatpost Google pitches security standards for 'critical' open-source projects | SC Media (scmagazine.com) Google’s approach to secure software development and su…
T
The CyberWire Daily


1
Billy Wilson: Translating language skills to technical skills. [HPC] [Career Notes]
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37
High Performance Computing Systems Administrator at Brigham Young University Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursui…
T
The Tech Talks Daily Podcast


1
1506: How Does your Approach to Network Management Compare?
19:08
19:08
Play later
Play later
Lists
Like
Liked
19:08
Auvik Networks recently released its 2021 Network Field Report which surveyed IT pros across North America and looks at how in-house IT admins manage their networks and the current state of network management practices. Steve Petryschuk joins me on the podcast to share insights from the survey. I learn how there appears to be high network confidenc…
I
ITSPmagazine Podcast


1
A Conversation With Kim Crawley | The Uncommon Journey With Alyssa Miller, Chloe Messdaghi, And Phillip Wylie
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58
In this episode we talk to Kim Crawley about her experience in the cyber security industry. She shares her perspectives as an author and her efforts to bring more inclusive perspectives to the community. Come join us for another uncommon journey with Phil, Alyssa, and Chloe. In this episode they wander into the InfoSec bar and sit down for a conver…
T
The Bid Picture (Simplified Cyber Threat Intelligence)


1
8: Mike Applied For Car Insurance Online, Then His Social Security Number Was Stolen. Ashley Got Into A Twitter Argument, Then California Hackers Sent Her a Phishing Email.
32:05
32:05
Play later
Play later
Lists
Like
Liked
32:05
In this episode, host Bidemi Ologunde presents two recent incidents where both intentional and unintentional behaviors exposed users to cyberattacks. Please send questions, comments and suggestions to bidemi@thebidpicture.com. Thank you for your time!By Bidemi Ologunde
T
The CyberWire Daily


1
Attackers (ab)using Google Chrome. [Research Saturday]
20:47
20:47
Play later
Play later
Lists
Like
Liked
20:47
Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)u…
C
Craig Peterson - America's Leading Security Coach


1
Tech Talk with Craig Peterson Podcast: Backups versus Disaster Recovery versus Business Continuity, Apple wants Privacy - Google wants Your Info and more
1:20:31
1:20:31
Play later
Play later
Lists
Like
Liked
1:20:31
Welcome! We lost a Radio Icon this week and he had a big impact on me, I have a short tribute to him but it was also another busy week on the technology front. We are going to get into the differences between Backups, Disaster Recovery and Business Continuity, often these get tossed around in discussions as one in the same - they are not. Then we w…
T
The Tech Talks Daily Podcast


1
1505: Deloitte - Thriving in the Era of Pervasive AI
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41
As AI adoption grows, how are companies working to manage risk and stay ahead of the pack? Deloitte's third annual survey suggests how leaders' thinking is changing as applications become pervasive throughout the organization. Beena Ammanath, executive director of the Deloitte AI Institute shares insights in relation to Deloitte's latest State of A…
I
ITSPmagazine Podcast


1
Big News, Business Success, And Beavers! | All About Alissa Knight | Focal Point With Chantel Sims And Angela Marafino
1:00:53
1:00:53
Play later
Play later
Lists
Like
Liked
1:00:53
You probably know Alissa Knight as the badass female hacker of banks and cars, but she is so much more! Join us as we get to know (and laugh with) Alissa – the author, content creator, entrepreneur, speaker, wife, and all around wonderful human! From starting her first company at 17 and selling it at age 20, to hacking connected cars and writing a …
T
The CyberWire Daily


1
Mopping up Solorigate. Tehran’s Lightning and Thunder in Amsterdam. The view from Talinn. Malware designed for Apple’s new chips. Lessons from the ice, and how hackers broke bad.
25:37
25:37
Play later
Play later
Lists
Like
Liked
25:37
Microsoft wraps up its internal investigation of Solorigate, which the US Government continues to grapple with, and which has had some effect in Norway. An apparent Iranian APT has been hosting its command-and-control in two Netherlands data centers. Estonia’s annual intelligence report describes Russian and Chinese ambitions in cyberspace. Threat …
G
Global Connected Aircraft Podcast


1
FEAM's Managing Director Talks Expanding Aircraft Maintenance Services During a Pandemic
25:05
25:05
Play later
Play later
Lists
Like
Liked
25:05
On this episode of the Connected Aircraft Podcast, Cam Murphy, the managing director of FEAM, joins to discuss the airline maintenance and engineering services provider's experience expanding its U.S.-based operations throughout 2020 and into early 2021 under the many regulatory and operational challenges posed by the impact of the COVID-19 crisis.…
S
ShadowTalk Threat Intelligence by Digital Shadows


1
Weekly: Egregor Arrests, SIM-Swapping, and Oldsmar Updates!
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:- Adam takes us through the latest on Egregor and related arrests - is the threat group down but not out?- Dylan talks SIM-swapping - who was targeted?- Kim brings us the most recent news on the Centreon breach- Plus, the team reviews th…
I
ITSPmagazine Podcast


1
Part 4 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | WISP — WoSec — Gate Breachers
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Charlie Baker's No Good Very Bad Day or Why Should Bureaucrats Not Design Websites
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41
Welcome! Good morning, everybody. I was on WTAG this morning with Jim Polito. He wanted me on to discuss the problems that Massachusetts was having with the rollout of their Vaccine Scheduling website. Here we go with Jim. For more tech tips, news, and updates, visit - CraigPeterson.com. --- Automated Machine Generated Transcript: Craig Peterson: […
This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.…
T
The Tech Talks Daily Podcast


1
1504: How Issuu Is Connecting Content to People
28:46
28:46
Play later
Play later
Lists
Like
Liked
28:46
Today's guest is Joe Hyrkin, CEO of Issuu, the Omni-channel content tools and publishing platform. The Issuu Story Cloud enables millions of marketers, brands, and creators, and publishers globally to digitally share and monetize their longer-form quality content and create content marketing materials. As someone that creates a wealth of content, I…
T
The CyberWire Daily


1
The WatchDog Monero cryptojacking operation. “A criminal syndicate with a flag.” US Senator asks FBI, EPA for a report on water system cybersecurity. Cybercrooks placed on notice.
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53
Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident…
C
CISO's Secrets

1
Ep. S1E4 - Ross Young, CISO at Caterpillar
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30
Ross Young, CISO at Caterpillar Financial joins host James Azar for this week’s episode of CISOs Secrets. The two CISO’s discuss the migration from legacy to cloud systems, how the migrations changes the landscape of audits and what CISO’s need to plan for as they transition and prepare for audits. http://bit.ly/2NT5vmH…
I
ITSPmagazine Podcast


1
Safe To Drink? Cyber Attacks And The Water Supply: What You Need To Know | A Conversation With Bryson Bort | Your Everyday Cyber With Limor Kessem And Diana Kelley
20:06
20:06
Play later
Play later
Lists
Like
Liked
20:06
Water, we usually take it for granted that what comes out of our taps is safe. But recently an attacker attempted to poison a water supply in Florida. Bryson Bort, explains what happened. Bryson is a cyber-security expert with vast experience in cyber mission support for national defense, especially where a lot of industrial controls are implemente…
I
ITSPmagazine Podcast


1
Part 3 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | Diana Initiative — Black Girls Hack — WiCSME
31:41
31:41
Play later
Play later
Lists
Like
Liked
31:41
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
D
Digital Detectives


1
Occam’s Razor — A SolarWinds Perspective for Law Firms
22:58
22:58
Play later
Play later
Lists
Like
Liked
22:58
Third party providers are often indispensable to law firms, but how can you know whether these working relationships could put you at risk for a security breach? With thousands of organizations still reeling from the recent SolarWinds attack, John and Sharon welcome technologist and cybersecurity expert Jeffrey Wells to discuss this event and what …
Today's Headlines and the latest #cybernews from the desk of the #CISO: US Still Unraveling ‘Sophisticated’ Hack of 9 Gov’t Agencies Russian Sandworm hackers only hit orgs with old Centreon software U.S. Charges North Korean Hackers Over $1.3 Billion Bank Heists Hackers Target Myanmar Government Websites in Coup Protest Senators Push for Action on …
This week the Mat and Mike welcome Troy Hunt from HaveIBeenPwned.com, to discuss how Troy started in tech, security breaches, application privacy, and of course movies. ------------------------- Follow us on all the things: Twitter: @PCyberTAP LinkedIn: Purdue cyberTAP Email the Cyber Tap with suggestions (or be a guest) cybertappodcast@purdue.edu …
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-data-destruction How do you deal with data at end of life? Holding onto data too long can be very costly and increase risk. So how do you get rid of it... safely? Check out this post for the basis for our conversation on this week’s episode whi…