show episodes
 
Hosted by Carlos L Chacon, the SQL Data Partners Podcast focuses on Microsoft data platform related topics mixed with a sprinkling of professional development. Carlos and guests discuss new and familiar features and ideas and how you might apply them in your environments. Visit our website for episode show notes at sqldatapartners.com/podcast and leave a comment if you have a topic you think we should discuss. We’ll see YOU on the SQL Trail.
 
GDPR Now! is brought to you by Data Protection 4 Business and Thisisdpo! Our podcast focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of speciali ...
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
The tech world is an endless stream of updates and disruptions. It's challenging enough to keep track of what's happening now, never mind navigating the potential of what's coming next. Join host Jon Hyde as he chats with some of the leading minds at Dell Technologies to better understand the landscape surrounding emerging technologies. Tune in to learn about impending trends, their impact on society and what you need to know today to prepare for the innovations of tomorrow.
 
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
 
There are more information security and privacy threats than ever before. As more technologies emerge, more surveillance tactics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in t ...
 
Unexpected Data is the first Austrian Data and Data Science Podcast. Founded and hosted by Yudan Lin, the podcast has been devoted to open the discussion and give awareness about Data and Data Science in our daily life. By creating unexpected and inspirational content, Unexpected Data supports you in understanding what it takes to live in the world of Data Science, Machine Learning and Artificial Intelligence. Taboos are especially investigated: from sex, justice to the digital fight for our ...
 
A weekly conversation on cybersecurity law and policy, surveillance and digital privacy. Hosted by the CyberWire's Dave Bittner and Ben Yelin from the University of Maryland Center for Health and Homeland Security. They break down important current legal cases, policy battles, and regulatory matters along with the news headlines that matter most. It’s not just a podcast for lawyers and policymakers; security professionals, businesses, and anyone concerned about privacy and security in the di ...
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
 
Manuel W. Lloyd is a top industry Virtual CIO helping healthcare and banking businesses achieve customer-vendor alignment, IT governance, and data security while avoiding costly and embarrassing data breaches. The program is supported by Holiday Delta, Inc dba Dominos Pizza, JTV Management, & Manuel W. Lloyd Consulting®
 
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
 
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy and data protection or someone who just finds this fascinating, we have topics for you. In-depth information on serious privacy topics. This podcast, hosted by K Royal and Paul Breitbarth, will feature open, unscripted discussions with global privacy professionals (those kitchen table or back porch conversations) where you hear the opinions and thought ...
 
Data privacy is the footprint of our existence. It is our persona beyond ourselves, with traces of us scattered from birth certificates, Social Security numbers, shopping patterns, credit card histories, photographs, mugshots and health records. In a digital world, where memory is converted to 0’s and 1’s, then instantly transformed into a reproduction even in 3D, personal data is an urgent personal and collective subject. Those who wish to live anonymous lives must take extraordinary measur ...
 
Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, social engineering scams as well as hints and tips from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware payloads. If you are worried about uneducated emp ...
 
Loading …
show series
 
Twice, it’s maybe an indicator. Once, it’s nuthin’ at all...to the machines. The Reserve Bank of New Zealand works to clean up its data sources. Wormy student laptops. Daily Food Diary is a glutton for your data. Ransom DDoS. Caleb Barlow examines how we handle disinformation in our runbooks and response plans. Our guest Ron Gula from Gula Tech Adv…
 
With every new technology comes the potential for abuse. And while AI is clearly starting to deliver an awful lot of value, it’s also creating new systemic vulnerabilities that governments now have to worry about and address. Self-driving cars can be hacked. Speech synthesis can make traditional ways of verifying someone’s identity less reliable. A…
 
For Data Privacy Day month Rebecca is speaking with Kim Hakim, CEO & Founder of FutureCon Events, about how she handled needing to move...almost overnight!...all her 2020 conferences to being online events at the beginning of 2020 when COVID-19 started spreading through the USA. Kim also discusses some of the key privacy issues she had to address w…
 
20 years ago, the objection to implementing security on the basis of performance had validity—especially for smaller organizations. Security was a pain in the neck; however, how many of us are still hanging on to some of those old biases. Even worse, some of us IT pros seem to put up objections to doing the most basic security procedures—sending us…
 
As 2020 comes to a close (Queue cheering in the background) we can look back at the silver linings and change that Covid has pushed. The SMB has been reluctant for years to move their infrastructure to the cloud and wanted tested and true on prem servers….appliances they could see and feel. With so many now open to the cloud through necessity, the …
 
We speak with John Karabin, Director of Cybersecurity at NTT Australia looking at their January threat report and specifically at their recommended Endpoint Device evasive attack stages. Also includes in-depth discussion on the Solarwinds breach and how it has reached Australian and APAC shores. Following John, we speak with Anthony Spiteri, Senior…
 
Coming up in this week's episode: Pimlico Plumbers, Covid19 vaccination and employer's rights, Which countries does the EDPB consider adequate for GDPR? Guernsey and UK GDPR adequacy, GDPR penalties up 39% year on year, ICO reopens adtech investigation, Ireland Government and the Mother and Child homes, Hackney postal electors are asked to register…
 
Program Director for Public Policy and External Affairs at the University of Maryland's Center for Health and Homeland Security Ben Yelin shares his journey from political junkie to Fourth Amendment specialist. Several significant life defining political developments like the disputed 2000 election, 9/11, and the Iraqi war occurred during his forma…
 
Guest Mark Arena from Intel471 joins us to discuss his team's research into Trickbot and its evolution from a banking trojan to a long-standing, most likely well-resourced operation that was taken down last year. Mark shares some insight into Trickbot's order of operations and what went on behind the scenes that his team working with Brian Krebs we…
 
In this episode Michael, Sarah, Gladys and Mark talk with guest Alex DeDonker, and member of the Azure STRIKE team, about his team's role in helping secure the Microsoft Azure cloud platform. We also discuss the latest Azure Security news for the following services: Azure Sphere, Azure Backup, Managed Disks, Azure Security Center, Azure Policy, Azu…
 
This week's tools, tips and tricks covers Azure AD Investigator. FireEye Mandiant released this tool as open source in response to the SolarWinds hack to help businesses analyze their Microsoft 365 environments for security issues that may lead to an attack. Azure AD Investigator GitHub - https://github.com/fireeye/Mandiant-Azure-AD-Investigator Wh…
 
Microsoft researchers detail the lengths to which the Solorigate threat actor went to stay undetected and establish persistence. LuckyBoy malvertising is described. Business email compromise as a reconnaissance technique? More reminders about the risks that accompany remote work. Ben Yelin looks at cyber policy issues facing the Biden administratio…
 
Last year, 2020, we saw an increase of Common Vulnerabilities and Exposures (CVEs) reported from 2019. What's interesting is the time of the year that most were reported. This episode talks about why that could have been. Be aware, be safe. Primary Partner - WeHackPurple.com Become A Patron! Patreon Page *** Support the podcast with a cup of coffee…
 
All links and images for this episode can be found on CISO Series You're a new CISO at a new org given a headcount of ten to build a cybersecurity team. What's your strategy to build that team? Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of CISO Series, guest co-ho…
 
One of the areas where machine learning and artificial intelligence have had lots of success is with image work. Whether identifying people in pictures or helping cars stay on the road and out of each other's way, this capability of computing has worked well. It's not perfect, and not necessarily as accurate as most humans, but it works well. At le…
 
Another security company discloses a brush with the threat actor behind Solorigate. Advice on hardening Microsoft 365 against that same threat actor. Chimera turns out to be interested in airlines as well as semiconductor manufacturing intellectual property. Former President Trump’s last Executive Order addresses foreign exploitation of Infrastruct…
 
Facebook routinely deploys recommendation systems and predictive models that affect the lives of billions of people everyday. That kind of reach comes with great responsibility — among other things, the responsibility to develop AI tools that ethical, fair and well characterized. This isn’t an easy task. Human beings have spent thousands of years a…
 
Eventually, you will be part of a breach. You will get a letter from your clinic or an email from a website you use that your credentials were compromised. This episode talks about what you shouldn't do if you get one of the see notices and why it could make things worse. Be aware, be safe. Primary Partner - WeHackPurple.com Become A Patron! Patreo…
 
By this point, most industries have experienced some sort of digital revolution. As evidenced by this year's Digital Transformation Index, no one wants to be a “digital laggard.” But, some industries have shown up a little later to the party; manufacturing included. One particulary company, Xometry, has taken on that challenge. By creating an onlin…
 
On this week’s show Dave speaks with guest Dr. Dennis Hirsch from the Ohio State University's Risk Institute on his research on data ethics, and we unpack the aftermath of the riot and attack on the US Capitol, and the security and privacy issues that have arisen as a result. While this show covers legal topics, and Ben is a lawyer, the views expre…
 
The European Medicines Agency says stolen emails about vaccine development were altered before being dumped online. Another backdoor is found associated with the SolarWinds supply chain campaign. DNS cache poisoning vulnerabilities are described. FBI renews warnings about vishing. Iran’s “Enemies of the People” disinformation campaign. Vishing is u…
 
Believe it or not businesses still use fax machines to transmit data. This episode talks about the security gaps you have to be aware of if you use fax machines. Be aware, be safe. Primary Partner - WeHackPurple.com Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Secu…
 
In this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their story of how they got into the NSA and what they did while there. To hear more stories from Jeff tune into Paul’s Security Weekly where Jeff is a regular co-host and shares a lot of stories and insights. Marcus has written several books on security. They…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login