Cybersecurity The Secure Talk public
[search 0]
More

Download the App!

show episodes
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
 
Today, Enterprise Technology is both Strategy and Global. On CIO Talk Network (CTN), Business IT Thought Leaders from around the globe share their experience and discuss how they are partnering with business to innovate and help grow the top line revenue, better care of customers, and improve the corporate bottom line. If you want to keep up with changes in technology and how it can be leveraged to maximize business potential, listen to CTN: CIO Talk Network
 
GovCast, a production of GovernmentCIO Media & Research, tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered.
 
The Bid Picture is a weekly podcast that provides useful and actionable cyber intelligence by examining cybersecurity news and events, and how we can learn from them and apply those lessons to our daily lives.For questions, comments, or any suggestions on which topics you would like to hear about on future episodes, please send an email to bidemi@thebidpicture.com. Thank you for your time, and God bless.
 
According to the Bureau of Labor Statistics (BLS), 'Black or African-American' people make up only 3% of the information security analysts in the U.S. The goal of our podcast is to be a resource, and catalyst in the education, advancement, and visibility of African American Cybersecurity professionals world-wide. Support this podcast: https://anchor.fm/blakcyber/support
 
Fed up with tech hype and buzzwords? Looking for a tech podcast where you can learn and be inspired by real-world examples of how technology is transforming businesses and reshaping industries? Keep informed of the latest business and tech trends by listening to stories of other people in your field and how they are overcoming challenges with emerging technologies. Learn from the guest's actionable tips, and lessons learned to obtain greater clarity and how you can leverage technology. In th ...
 
The State Bar of Michigan podcast series, On Balance, features a diversified array of legal thought leaders. Hosted by JoAnn Hathaway of the bar’s Practice Management Resource Center and Tish Vincent of its Lawyers and Judges Assistance Program, the series focuses on the need for interplay between practice management and lawyer-wellness for a thriving law practice.
 
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
 
Have you ever wondered what happens when women take off their heels for the day and unwind with a glass of red or a finger or two of whiskey? What stories would they tell? What meetings have they walked into unannounced to take back the power? If These Heels Could Talk takes you behind the scenes with two women in the business world who have seen it all. They’ve been at the bottom of the ladder and the top of the ladder. They’ve been underestimated and they’ve had their ideas stolen. And the ...
 
Do you want to dive into the ocean of IoT but don't know how to get started? Would you like to know more about the possibilities that lie in the digital future? Are you into digital trends that revolutionize today's industries? If so, this podcast is for you! Welcome to our podcast “Unlock the full potential of IoT”, a 360-degree view of the latest IoT trends. We talk to the innovators, experts and visionaries who work and play in digital transformation. Explore with us the practical ways to ...
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
A technology podcast and an engaging platform for discussions and expert opinions on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and information security in support of technology and business. Winner of 2019-Outstanding Security Performance Awards, she is an acclaimed and well-known security expert and public speaker. On the podcast, she brings on different cybersecurity, privacy and risk management pr ...
 
reframe is a podcast series that brings you inspiring stories from successful people adding value to society. I'm always excited to meet my wonderful guests and talk to them about their journeys and practical advice they want to share with people like you, who want to grow in life. If you get value out of this podcast, please share it with your friends and subscribe on youtube, spotify, itunes or wherever you're listening, as it will really help me in growing the community and helping others ...
 
This is a podcast where we explore the issues today with the insider threat, or human factor, of our organizations. We also talk about ways to tackle those issues through training, culture, and technology in order to help information security and business professionals reduce risks in their environments. We have a patreon page for the podcast, located at . I don't want to be too pushy for this, but a couple of you have asked about ways that you can support the show.
 
Super Happy Dragon Lucky is Dragonchain's (American blockchain technology company open sourced from The Walt Disney Company in 2016) weekly live show on YouTube. Founder and CEO Joe Roets and co-host Rocco discuss the latest cryptocurrency and blockchain news with industry guests. As well as all news related to Dragonchain, and the capabilities of our blockchain solutions and services.
 
Loading …
show series
 
With Twitter recently hitting the headlines for silencing President Trump, many have questioned if tech giants now possess more power than governments. With increased polarization in society, many also blame tech and social media for division rather than uniting the global community. How did we get here? And how do we stop a tech lash from building…
 
Imagine you could experience worlds that you design and build the way you want them to be; alternative realities that you can enter and leave as you wish. Now, Imagine there's no countries, nothing to kill or die for... imagine all the people, livin' life in peace. You may say I'm a dreamer. But I'm not the only one. Certainly not the only one. The…
 
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Critical VMware vCenter Server Flaw Can Expose Organizations to Remote Attacks NASA and the FAA were also breached by the SolarWinds criminals Tech Firms Say There's Little Doubt Russia Behind Major Hack CEOs, Senators discuss mandating cyber-attack disclosures The Practitioner…
 
Good morning everybody! I was on WGAN this morning with Matt Gagnon. We really got into the power distribution issues in TX and it appears that the Energy department was really "asleep at the switch." Then we talked about the nightmare that these bureaucratic states are having with their vaccine scheduling websites. We discussed why they are having…
 
How do you start your digital journey? What is the benefit for two huge corporates such as SAP and Siemens to work in partnerships and how can you profit from these alliances? Moving to ecosystems is the way forward. Revealing what it all has to do with the Siemens and SAP digital threat, our guests Thomas Saueressig, Member of the Executive Board …
 
From logins to employees to insurance to password managers, small businesses have very little in place for their own privacy and don’t do much about client and customer security. The thought that small businesses are not targets is patently false. This podcast is a reminder to stop doing these things: Emailing passwords Using the same password for …
 
Employees can now work anywhere and everywhere thanks to a long list of remote working tools and productivity apps. But remembering which app you saved your document, message, presentation, report, video, project plan, or a task list can be frustrating. Onna is an eDiscovery startup that raised $27M during the lockdown. The latest funding round was…
 
If a tree falls in a forest and no one is around to hear it, does it make a sound? Yes and no, it depends on who you ask. In our case, the answer is a solid FOR SURE. Especially once we consider the squirrels that live in the said forest — the criminal and the ethical ones. Listen up. In the cybersecurity community it is not uncommon to use the sen…
 
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
 
Chances are you’re on at least one social media platform. It’s a great way to connect, but you need to connect and share mindfully. Tim Sadler helps us take a closer look at how to social safely. You can overshare on social media and it can get risky quickly if you share personal data like your birthday, you COVID vaccine card, or even the names of…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Chinese Hackers Hijacked NSA-Linked Hacking Tool Accellion FTA Zero-Day Attacks Show Ties to Clop Ransomware, FIN11 VC Giant Sequoia Capital Informs Investors of Data Breach Texas electric company warns of scammers threatening to cut power TDoS Attacks Take Aim at Emergency Fir…
 
Good morning, everybody. I was on this morning on WTAG with Jim Polito. We discussed the power situation in Texas and then brought it home to Mass and talked about whether we could be in for anything similar. We also discussed Green Energy and Nuclear Energy. Then we got into 6G -- yes that is not a typo, Apple is developing their own chips and dit…
 
Point Health is a digital healthcare startup on a mission to make healthcare easy to find, easy to understand, and easier to afford for members of insurance plans and healthcare sharing organizations. The company recently announced the intent to acquire The Karis Group, an Austin-based company with 25 years of experience in healthcare billing negot…
 
Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accen…
 
Jim Bowers is Security Architect for TBI, a Chicago-based telecommunications master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. His expertise ranges from architecting complete security infrastructure, to assessments for vu…
 
Deepfakes continue to be a growing security concern. As the technology to alter video footage and replace one person's face with another’s has advanced in ease, sophistication and availability, the use of deepfakes has become more broadly prevalent, extending beyond novelty use to become another tool in the adversary’s playbook. Our guest today is …
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Malformed URL Prefix Phishing Attacks Spike 6,000% SolarWinds Attackers Downloaded Azure, Exchange Code SonicWall releases additional update for SMA 100 vulnerability Mysterious Mac Malware Infected at Least 30,000 Devices Worldwide The Practitioner Brief is sponsored by: KnowB…
 
Welcome, Craig Peterson here. This morning I was on with Chris Ryan on NH Today. We talked about what is going on in Texas and Why? What did they do? What assumptions did they make? Where do they go from here? Here we go with Chris. These and more tech tips, news, and updates visit. - CraigPeterson.com --- Automated Machine Generated Transcript: Ju…
 
Protect your computer using a security-filtered Domain Name System (DNS) server configuration. Also hear about the Center for Internet Security (CIS) offering to protect US hospitals against malware through a similar method of DNS protection. Reference: https://grassrootsecurity.com/2021/02/22/protecting-you-through-security-filtered-domain-lookups…
 
In the Citrix Ready Podcast series, I explore how technology can empower people and organizations to unlock innovation, engage customers, and be productive—anytime, anywhere. In today's episode, I learn more about how collaboration and hybrid working environments are reshaping the future of work. It recently occurred to me that Microsoft, Citrix, a…
 
Links to discussed items: Yandex Employee Caught Selling Access to Users' Email Inboxes (thehackernews.com) Supply-Chain Hack Breaches 35 Companies, Including PayPal, Microsoft, Apple | Threatpost Google pitches security standards for 'critical' open-source projects | SC Media (scmagazine.com) Google’s approach to secure software development and su…
 
High Performance Computing Systems Administrator at Brigham Young University Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursui…
 
Auvik Networks recently released its 2021 Network Field Report which surveyed IT pros across North America and looks at how in-house IT admins manage their networks and the current state of network management practices. Steve Petryschuk joins me on the podcast to share insights from the survey. I learn how there appears to be high network confidenc…
 
In this episode we talk to Kim Crawley about her experience in the cyber security industry. She shares her perspectives as an author and her efforts to bring more inclusive perspectives to the community. Come join us for another uncommon journey with Phil, Alyssa, and Chloe. In this episode they wander into the InfoSec bar and sit down for a conver…
 
In this episode, host Bidemi Ologunde presents two recent incidents where both intentional and unintentional behaviors exposed users to cyberattacks. Please send questions, comments and suggestions to bidemi@thebidpicture.com. Thank you for your time!By Bidemi Ologunde
 
Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)u…
 
Welcome! We lost a Radio Icon this week and he had a big impact on me, I have a short tribute to him but it was also another busy week on the technology front. We are going to get into the differences between Backups, Disaster Recovery and Business Continuity, often these get tossed around in discussions as one in the same - they are not. Then we w…
 
As AI adoption grows, how are companies working to manage risk and stay ahead of the pack? Deloitte's third annual survey suggests how leaders' thinking is changing as applications become pervasive throughout the organization. Beena Ammanath, executive director of the Deloitte AI Institute shares insights in relation to Deloitte's latest State of A…
 
You probably know Alissa Knight as the badass female hacker of banks and cars, but she is so much more! Join us as we get to know (and laugh with) Alissa – the author, content creator, entrepreneur, speaker, wife, and all around wonderful human! From starting her first company at 17 and selling it at age 20, to hacking connected cars and writing a …
 
Microsoft wraps up its internal investigation of Solorigate, which the US Government continues to grapple with, and which has had some effect in Norway. An apparent Iranian APT has been hosting its command-and-control in two Netherlands data centers. Estonia’s annual intelligence report describes Russian and Chinese ambitions in cyberspace. Threat …
 
On this episode of the Connected Aircraft Podcast, Cam Murphy, the managing director of FEAM, joins to discuss the airline maintenance and engineering services provider's experience expanding its U.S.-based operations throughout 2020 and into early 2021 under the many regulatory and operational challenges posed by the impact of the COVID-19 crisis.…
 
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:- Adam takes us through the latest on Egregor and related arrests - is the threat group down but not out?- Dylan talks SIM-swapping - who was targeted?- Kim brings us the most recent news on the Centreon breach- Plus, the team reviews th…
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
Welcome! Good morning, everybody. I was on WTAG this morning with Jim Polito. He wanted me on to discuss the problems that Massachusetts was having with the rollout of their Vaccine Scheduling website. Here we go with Jim. For more tech tips, news, and updates, visit - CraigPeterson.com. --- Automated Machine Generated Transcript: Craig Peterson: […
 
Today's guest is Joe Hyrkin, CEO of Issuu, the Omni-channel content tools and publishing platform. The Issuu Story Cloud enables millions of marketers, brands, and creators, and publishers globally to digitally share and monetize their longer-form quality content and create content marketing materials. As someone that creates a wealth of content, I…
 
Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident…
 
Water, we usually take it for granted that what comes out of our taps is safe. But recently an attacker attempted to poison a water supply in Florida. Bryson Bort, explains what happened. Bryson is a cyber-security expert with vast experience in cyber mission support for national defense, especially where a lot of industrial controls are implemente…
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
Third party providers are often indispensable to law firms, but how can you know whether these working relationships could put you at risk for a security breach? With thousands of organizations still reeling from the recent SolarWinds attack, John and Sharon welcome technologist and cybersecurity expert Jeffrey Wells to discuss this event and what …
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: US Still Unraveling ‘Sophisticated’ Hack of 9 Gov’t Agencies Russian Sandworm hackers only hit orgs with old Centreon software U.S. Charges North Korean Hackers Over $1.3 Billion Bank Heists Hackers Target Myanmar Government Websites in Coup Protest Senators Push for Action on …
 
This week the Mat and Mike welcome Troy Hunt from HaveIBeenPwned.com, to discuss how Troy started in tech, security breaches, application privacy, and of course movies. ------------------------- Follow us on all the things: Twitter: @PCyberTAP LinkedIn: Purdue cyberTAP Email the Cyber Tap with suggestions (or be a guest) cybertappodcast@purdue.edu …
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login