show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
 
T
The Shared Security Show

1
The Shared Security Show

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Weekly
 
Hosted by cybersecurity and privacy professionals Tom Eston, Scott Wright and Kevin Johnson, Shared Security is a weekly podcast that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.
 
Want to stay up to date with the latest in the data privacy world? Hear from thought leaders about US and International privacy regulations, learn from privacy operations experts about building your privacy program or structuring your privacy engineering approach as well as other hot topics in the space. To learn more about WireWheel Data Privacy Management solutions, visit www.wirewheel.io.
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
 
Partially Redacted brings together experts on engineering, architecture, privacy, data, and security to share knowledge, best practices, and real world experiences – all to help you better understand how to use, manage, and protect sensitive customer data. Each episode provides an in-depth conversation with an industry expert who dives into their background and experience working in data privacy. They’ll share practical advice and insights about the techniques, tools, and technologies that e ...
 
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
 
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
S
Serious Privacy

1
Serious Privacy

Paul Breitbarth and Dr. K Royal

Unsubscribe
Unsubscribe
Monthly+
 
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy and data protection or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal and Paul Breitbarth, will feature open, unscripted discussions with global privacy professionals (those kitche ...
 
The AdTech industry is constantly changing. With new trends every day, organizations cannot afford to miss out on what’s happening in the industry. Keep up with the latest solutions for the challenges that arise with each new wave of changes. Companies need to explore new and emerging channels to achieve growth and better results.AlikeAudience, a global leader in audience segmentation from mobile and transaction data, discusses the latest AdTech trends and present you with diverse insights a ...
 
Covering everything from the future of organizational culture to accelerated cloud adoption, in this inaugural podcast series, Splunk thought leaders sit down with Principal Analyst Daniel Newman to discuss the unique intricacies organizations are navigating in an era of rapid digital transformation and how data remains the key solution to thriving in uncertain times.
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
 
Define your digital roadmap. Weekly podcasts featuring specialists from 451 Research and other areas of S&P Global Market Intelligence help you take a deep look at industries and companies as they invent and implement digital infrastructure. To learn more, visit: www.spglobal.com/451-research
 
Manuel W. Lloyd is a top industry Virtual CIO helping healthcare and banking businesses achieve customer-vendor alignment, IT governance, and data security while avoiding costly and embarrassing data breaches. The program is supported by Holiday Delta, Inc dba Dominos Pizza, JTV Management, & Manuel W. Lloyd Consulting®
 
Welcome to the Ivanti Security Insights podcast: Where best-practice cybersecurity meets real-world workplaces and roadblocks. Join Chris Goettl, Amanda Wittern, Daniel Spicer and Ashley Stryker as they review the security news, research and tactics that truly matter to the infosec and security teams protecting organizations and businesses like yours.
 
Loading …
show series
 
Robert Johnson, III, President & CEO at Cimcor, Inc., sits down with Cybercrime Magazine to share data security best practices, trends, and more. Cimcor is the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com…
 
What We've Learned About ChangemakersPaul, Jeff, Lindsey, Priya, and senior editor Anna Kuno look back at 2022 and look ahead at what's next, including a new name for the podcast. The hosts reflect on topics that have stood out, lessons they have learned, and things that have surprised them, as well as why the show is now called Healthcare Changema…
 
Ameesh Divatia, CEO of Baffle, Inc., talks about data privacy, data security, cloud security and how a skillset in the middle of that triangle will be your best asset in the years to come. All that, and a little bit of local-focused philanthropy. – Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free – View Cyber Wo…
 
Intruders gain access to user data in LastPass incident Sirius XM flaw unlocks smart cars thanks to code flaw Medibank hackers announce ‘case closed’ and dump huge data file on dark web Thanks to this week's episode sponsor, Automox And now a word from our sponsor, Automox. Are you ready to ditch manual patching and all the complexity and hassle th…
 
Despite certain economic indicators warning that a recession is on the horizon, investment remains healthy within the security market amid thirst for cloud security, in particular. One such emerging field is data security posture management (DSPM), which aims to bridge the gap between business goals and a comprehensive security mechanism that leave…
 
Exploring Edge Data Center Security Challenges, Trends, and More In this episode of Agent of Influence, Nabil and Todd Cushing, President at 1623 Farnam, discuss the importance of edge data centers. Plus, they explore data center security challenges, third-party risk management, and advice for organizations migrating to edge data centers. …
 
Companies use bug bounties and penetration testing to proactively look for vulnerabilities in their systems. These programs should be part of any security conscious organization.However, even with these systems in place, it can be difficult to stay ahead of the hackers and potential attacks. Additionally, the tools available for running penetration…
 
On August 6, 2020, the Trump Administration issued a ban on TikTok in the United States, requiring that the owner, Beijing-based Bytedance, sell the company to American investors or shut it down. Legions of TikTokers were devastated at the possible loss of their beloved platform, and for what: a political grudge with China? American suitors like Wa…
 
The IT Army of Ukraine claims responsibility for DDoS against a Russian bank. North Korea exploits an Internet Explorer vulnerability. A new variant of Babuk ransomware has been reported. Blind spots in air-gapped networks. Rob Boyce from Accenture has insights on the most recent ransomware trends. Our guest is Nathan Howe from Zscaler with the lat…
 
In this episode of Serious Privacy, Paul Breitbarth of Catawiki and Dr. K Royal of Outschool have a rousing good time with Glyn Moody, author of the recent book Walled Culture: How Big Content Uses Technology and the Law to Lock Down Culture and Keep Creators Poor. Join us for a lively conversation about copyright and mass surveillance in pursuit o…
 
Pentagon awards cloud deal to four major providers Apple finally adds encryption to iCloud backups CloudSEK claims it was hacked by another cybersecurity firm Thanks to today's episode sponsor, PlexTrac The Plextrac platform is your offensive security team’s secret weapon. Build better reports in half the time, centralize your data, maximize your r…
 
In this episode of the National Security Podcast, eminent Russian foreign policy scholar Professor Akihiro Iwashita joins Professor Rory Medcalf in conversation. How does the history of conflict between Japan and Russia affect relations today? How has the Russian invasion of Ukraine impacted their relationship? And what strategic challenges does th…
 
Rackspace reacts to ransomware. Third-party incidents in New Zealand and the Netherlands. Russian intelligence goes phishing. Mustang Panda uses Russia's war as phishbait. A Malicious package is found in PyPi. Kevin Magee from Microsoft Canada shares thoughts on cybersecurity startups in an economic downturn. Our guest is IDology's Christina Luttre…
 
The FBI and CISA are releasing this alert to disseminate known Cuba Ransomware Group indicators of compromise and TTPs identified through FBI investigations. FBI and CISA would like to thank BlackBerry, ESET, The National Cyber-Forensics and Training Alliance (NCFTA), and Palo Alto Networks for their contributions to this CSA. AA22-335A Alert, Tech…
 
According to the New Zealand Herald, Chinese cyber attackers mined Australian computer systems for months, seeking vital information about defense and energy. In this episode, host Hillarie McClure is joined by Cyberwarfare Correspondent Theresa Payton to discuss the targets of this phishing scam, why China would be interested in attacking Australi…
 
In this episode, host Hillarie McClure is joined by Dr. Mizanur Rahman, Assistant Professor at the University of Alabama. Together, they discuss his role at the University of Alabama, how he and his team developed a system that can overcome the threat of GPS hacking that can send a self-driving vehicle to the wrong destination, and more. • For more…
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
 
The Cybercrime Magazine Podcast brings you daily cybercrime news that airs each day on WCYB Digital Radio, the first and only 7x24x365 Internet radio station devoted to cybersecurity. Our host Hillarie McClure keeps you on the cutting edge of cyber with a rundown of the latest cyberattacks, hacks, data breaches, and more. Don't miss an episode! Air…
 
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard. https://mastercard.us/…
 
Are we in the age of AI generated malware Rackspace confirms ransomware attack Meta Oversight Board rules on cross-check system Thanks to today's episode sponsor, PlexTrac The best pentesting teams trust PlexTrac. PlexTrac can improve efficiency and effectiveness at every phase of your proactive assessments. By centralizing the data from all your a…
 
Picture of the Week. Don't mess with Australia. Facebook / Meta fined by Ireland. REvil's full Medibank dump. Is nothing sacred? Mozilla yanks a (no longer) trusted root. Android Platform Certs Escape. South Dakota says: No more Tik-Tok. Albania blames its IT staff. Good news on the memory safe languages front. Black Hat USA 2022. Another Chrome 0-…
 
Is Excel damaging your company? Richard talks with Jen Stirrup about how Excel gets used far too much in businesses and for too many things. Jen talks about the lack of data integrity in Excel and how it's easy to make small mistakes that can damage data - and give you little to no methods to detect the damage! While Excel can often be a starting p…
 
A Chinese cyberespionage campaign is believed to be active in the Middle East. Poor quality control turns ransomware into a wiper, and a typo crashes a cryptojacker. A large DDoS attack is reported to have hit a Russian state-owned bank. Privateers compromise Western infrastructure to stage cyberattacks. Cyber operations against national morale. A …
 
Chris Patteson, Field Risk Officer at LogicGate, explains why compliance doesn't equate to security and why this is a common misconception in corporate boardrooms. Chris talks about the difference between compliance with an industry or regional regulatory agency related to privacy and data protection doesn't mean that a company's systems are secure…
 
The Cybercrime Magazine Podcast brings you daily cybercrime news that airs each day on WCYB Digital Radio, the first and only 7x24x365 Internet radio station devoted to cybersecurity. Our host Hillarie McClure keeps you on the cutting edge of cyber with a rundown of the latest cyberattacks, hacks, data breaches, and more. Don't miss an episode! Air…
 
Many discussions around modern infrastructure pit cloud and datacenter choices against each other. Research directors Melanie Posey and Dan Thompson return to the podcast to sort out best execution venue, workload repatriation and the realities of modern infrastructure. Spoiler alert – it’s all of the above and organizations have to build skills fi…
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
 
Welcome to Talking Cyber, a Cybercrime Magazine podcast series that covers the latest news and breaking stories on the cybereconomy, hackers, intrusions, privacy, security and much more. In this episode, host Hillarie McClure is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss the recent cyberattack that has plunged…
 
William Parks, Andy Kerr, and Kyle Hinterberg discuss the latest PCI news, share how to create and what should be covered in an executive summary for a PCI assessment, and answer a few questions from our listeners. If you’d like us to answer and address questions on our next episode, reach out to us here: Andy Kerr – andy.kerr@lbmc.com Kyle Hinterb…
 
Vulnerabilities found in popular baseboard software Chinese threat group stole COVID-19 relief funds The question of AI generated code Thanks to today's episode sponsor, PlexTrac The Plextrac platform is your offensive security team’s secret weapon. Build better reports in half the time, centralize your data, maximize your reusable content, and bec…
 
Wiper malware hits Russian targets. Microsoft sees an intensification of Russian cyber operations against Ukraine. State policy, privateering, or an APT side-hustle? The US Cyber Safety Review Board will investigate the Lapsu$ Group. Rackspace works to remediate a security incident. The Schoolyard Bully Trojan harvests credentials. Grayson Milbourn…
 
Evolving Threat Insights is a Cybercrime Magazine podcast series brought to you by Wells Fargo. In this episode, Justin Ellerman, SVP, Head of Cyber Advisory Services at Wells Fargo, joins host Hillarie McClure to discuss leveraging cybersecurity as a differentiator, how the cyber and financial services industry has evolved to begin taking this cus…
 
In this sponsored episode co-host Tom Eston discusses SASE (Secure Access Service Edge) and if its more than just the latest cybersecurity buzzword with Carlos Salas from NordLayer. Topics include: – What is SASE (Secure Access Service Edge)? – What’s the difference between SASE and SSE (Security Service Edge)? – What challenges/problems do compani…
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
 
The Cybercrime Magazine Podcast brings you daily cybercrime news that airs each day on WCYB Digital Radio, the first and only 7x24x365 Internet radio station devoted to cybersecurity. Our host Hillarie McClure keeps you on the cutting edge of cyber with a rundown of the latest cyberattacks, hacks, data breaches, and more. Don't miss an episode! Air…
 
Cybercrime Magazine CISO Minute host Theresa Payton, Former White House CIO, discusses the cybersecurity skills shortage, how industry leaders are filling open positions, and more. The CISO Minute is sponsored by https://knowbe4.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login