show episodes
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

Unsubscribe
Unsubscribe
Monthly+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

Unsubscribe
Unsubscribe
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

Unsubscribe
Unsubscribe
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
  continue reading
 
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
This podcast explores investment strategies, economics, personal finance, and stock analysis. It features real conversations and analysis to inform, educate, and entertain. Note that nothing in this podcast is investment advice and it is for entertainment & discussion purposes only. Do your own due diligence before making any investment. www.securityanalysis.org
  continue reading
 
Enterprise technology, business, CEO insights and more! We’re here to cut through the noise. Experts in Polo Shirts offers practical information, entertaining insights into a tech business and clarity on the most complex technologies.
  continue reading
 
Artwork

51
Chaos Lever Podcast

Ned Bellavance and Chris Hayner

Unsubscribe
Unsubscribe
Weekly+
 
Chaos Lever examines emerging trends and new technology for the enterprise and beyond. Hosts Ned Bellavance and Chris Hayner examine the tech landscape through a skeptical lens based on over 40 combined years in the industry. Are we all doomed? Yes. Will the apocalypse be streamed on TikTok? Probably. Does Joni still love Chachi? Decidedly not.
  continue reading
 
🎙️ Welcome to the Secure East Anglia: Insurance Matters Podcast! 🎙️ Join Ryan Whybrow, an experienced insurance broker at Konsileo, as he chats with industry experts and local business owners in East Anglia. Each episode dives into the world of general insurance, offering insights, advice, and real-world experiences to help you protect your business. Discover how to safeguard your assets, navigate insurance complexities, and ensure peace of mind for your enterprise. Tune in to stay informed, ...
  continue reading
 
Presentations given at Oxford's International Conference on Water Security, Risk and Society, April 16-18th 2012. The event convened many of the world's leading thinkers from science, policy and enterprise to understand the status of and pathways to water security at multiple scales.
  continue reading
 
The AIBP ASEAN B2B Growth Podcast is a series of fireside chats and interviews with business leaders in Southeast Asia focused on growing B2B businesses in the region. Each episode will feature a company which is rapidly growing their business in the region and will cover topics such as Business Strategy, Sales & Marketing, Enterprise Technology, Innovation and Financial metrics. Connect with us to learn more: https://www.linkedin.com/in/aibp/
  continue reading
 
Artwork
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Interarbor Solutions' Briefings Direct: Unique B2B informational podcasts that offer the value of objective perspectives from leading industry analyst Dana Gardner. Briefings Direct delivers actionable knowledge on the latest enterprise IT subjects to those who need to know the most about the business of IT now.
  continue reading
 
The LiveSafe Prevention Podcast features news analysis and interviews with the leading voices in enterprise risk management, safety and security. Hosted by former intelligence officer and award-winning journalist Dan Verton, the Prevention Podcast delivers actionable insights into the real-world challenges faced by risk, safety and security professionals and how employee-sourced risk information can help improve and organization's risk profile.
  continue reading
 
Artwork

1
the CYBER5

Nisos, Inc.

Unsubscribe
Unsubscribe
Monthly
 
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
  continue reading
 
Artwork

1
ITSPmagazine Podcast Network

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
Artwork
 
Every Tuesday, NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
  continue reading
 
Artwork
 
Buying Tech is a show dedicated to technology and procurement professionals. Each episode will delve into the workings of different types of technology in plain English, then discuss the various benefits and pitfalls, and how small, medium and enterprise businesses or Governments can procure them to maximise value and reduce risk. Click above to Subscribe in iTunes/your Podcast app, or follow us on Twitter, Facebook or Instagram to be notified when episodes are released.
  continue reading
 
Artwork

1
Culture of Compliance

Frazier & Deeter Podcasts

Unsubscribe
Unsubscribe
Monthly
 
Frazier & Deeter's Culture of Compliance podcast explores compliance as a competitive advantage in today's marketplace. Culture of Compliance was recently named #1 in “Top 25 Regulatory Compliance Podcasts You Must Follow in 2020” by Feedspot.
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
Monthly
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Recent studies show that 82% of cyber incidents result from unintended human behavior. Further, the errant behavior of only 5% of all users creates most of this risk. This is pretty alarming, and yet no one is talking about it. Modifying the behavior of these few individuals can have a force multiplier effect on reducing overall enterprise cyber risks. Welcome to Friendly Fire: Mitigating Unintentional User Risk. Where we explore Human Risk, to raise awareness across the industry, and stimul ...
  continue reading
 
Live conversations with the people operating at the frontier of crypto innovation: entrepreneurs, bankers, investors, fund administrators, traders, analysts and other crypto and digital asset market participants. Our objective is to help the broader ecosystem navigate this complex environment and unlock the market opportunity. This podcast is hosted by Metaco - the leading enterprise technology company whose mission is to enable financial and non-financial institutions to securely build thei ...
  continue reading
 
Loading …
show series
 
Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthe…
  continue reading
 
To date, most of the hottest software platforms in the ClimateTech space have been about carbon accounting, offsets, removals, and regulatory disclosure. For instance, New York’s Persefoni (accounting) raised $164.2 million to date, Plan A (accounting/monitoring) in Berlin raised $43 million and at the lower end, Supercritical (removals) raised $15…
  continue reading
 
In this episode of the On Location, host Sean Martin engages in an insightful conversation with Francesco Cipollone, Co-founder and CEO of Phoenix Security, at the OWASP AppSec Global conference in Lisbon. They delve into the evolving landscape of application security, focusing on the pressing challenges and innovative solutions that are shaping th…
  continue reading
 
Guest: Jackie Blundell, Senior Marketing Communications Manager, Devo On Twitter | https://x.com/devo_Inc On LinkedIn | https://www.linkedin.com/in/jacquelineblundell/ Hosts: Kayla Williams On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/kayla-williams Taylor Parsons On ITSPmagazine | https://itspmagazine.com/itspmag…
  continue reading
 
Episode 1: Unveiling Expertise: A Conversation with Maxine Murray Welcome to the first episode of the Secure East Anglia: Insurance Matters Podcast! In this episode, host Ryan Whybrow, an experienced insurance broker at Konsileo, sits down with Maxine Murray, a seasoned expert in the insurance industry. They discuss Maxine's role at Konsileo, the c…
  continue reading
 
We are in the era of dynamic computing – and while that gives way to innovation, it also escalates the risks every business faces. Computing no longer occurs solely within the perimeter, and cybersecurity threats are increasingly more sophisticated. In fact, organizations today operate in a climate where entire systems can be taken offline in just …
  continue reading
 
Zyxl NAS devices are under attack and the exploit is pretty simple, A new UEFI vulnerability with a name that some people don't like, that time you setup a load balancer and forgot about it, I love it when there is a vulnerability in a Wifi driver, Polyfill is filling the Internet with supply chain vulnerabilities, open source doesn't mean more sec…
  continue reading
 
Guest: ✨ Vladimer Botsvadze, Global Marketing Thought Leader On Linkedin | https://www.linkedin.com/in/vladimerbotsvadze/ On Twitter | https://twitter.com/VladoBotsvadze Website | https://www.vladimerbotsvadze.com/ ____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast O…
  continue reading
 
VW Group invest $1 billion into EV startup Rivian as part of a software development deal that could expand to as much as $5 billion. The deal, which was announced Tuesday afternoon, sent Rivian’s shares up more than 36% in after-hours trading. The two companies will create a joint venture focused on next-generation electrical architecture Learn mor…
  continue reading
 
To deliver the kinds of experiences patients expect, a healthcare system must act as just that—a unified system. This ideal system breaks down when patients are asked to re-enter their information with each care encounter or staff lose time dealing with cumbersome and repetitive processes that keep them from practicing at the top of their licenses.…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
The UN named 2025 the Year of Quantum Science, so Ned and Chris attempt to cram 2,450 years of quantum history into one episode. A Gambol Through Space and Time The United Nations has designated 2025 as the International Year of Quantum Science and Technology. To add to the confusion, Ned and Chris are trying to cover the history of quantum mechani…
  continue reading
 
In today’s complex healthcare environment, providing a platform for users to present ideas is essential. However, “if it’s open-ended and unbounded, we’re going to be building a whole bunch of very pretty bridges to nowhere,” said David Sylvan, Chief Strategy & Innovation Officer at University Hospitals. Instead, “we have to be prescriptive about w…
  continue reading
 
Guest: Ida Hameete, Application Security Consultant, Zenrosi On LinkedIn | https://www.linkedin.com/in/idahameete/ ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/sean-martin _____________________…
  continue reading
 
Snapchat on Tuesday announced a new suite of safety features, including updates to its account blocking functionality and enhanced friending safeguards, making it difficult for strangers to contact users on its platform. The new move comes amid concerns over predators exploiting teens on social media apps, which often results in severe incidents, i…
  continue reading
 
Guest: Dr. Meghan Elizabeth Kallman, PhD, Rhode Island State Senator and Associate Professor, School for Global Inclusion and Social Development UMASS Boston On Twitter | https://x.com/MeghanEKallman On LinkedIn | https://www.linkedin.com/in/meghan-kallman-6030a3229/ Website | https://meghankallman.com/ Hosts: Alejandro Juárez Crawford On ITSPmagaz…
  continue reading
 
Threat trends - how threat actors are targeting C-Suite executives to access the enterprise Empowering your C-Suite to identify and avoid social engineering Creating social media policies that your C-Suite understand so that they can lead by example This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Thomas Wendrich, A…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Show Notes: https://securityweekly.com/psw-8…
  continue reading
 
Uber Freight and Aurora Innovation have announced a multi-year collaboration that will see Aurora’s autonomous driving technology offered on the Uber Freight network through 2030. The deal gives Aurora access to shipping customers as it prepares to launch its fully driverless commercial service later this year. It also helps Aurora also secure long…
  continue reading
 
As Apple enters the AI race, it’s also looking for help from partners. During the announcement of Apple Intelligence earlier this month, Apple said it would be partnering with OpenAI to bring ChatGPT into the revamped version of Siri. Now, the Wall Street Journal reports that Apple and Facebook’s parent company Meta are in talks Learn more about yo…
  continue reading
 
Paul Gabrail operates the Everything Money YouTube channel and website. The channel covers a wide variety of investment strategies, but focuses on value investing concepts. Paul has been investing via his Family office, the Crossroads Group, investing in everything from stocks to private businesses to real estate. Links: * Everything Money: https:/…
  continue reading
 
Guest: Raymond Paul Johnson, Novelist On LinkedIn | https://www.linkedin.com/in/raymond-paul-johnnson-author-attorney/ On Twitter | https://twitter.com/RPJohnsonBooks On Website | https://RaymondPaulJohnson.com On Facebook | https://www.Facebook.com/RaymondPaulJohnsonThrillerWriter On Instagram | https://www.Instagram.com/raymondpauljohnson_author …
  continue reading
 
Guest: Jainam Basra, Cybersecurity Analyst and Technuf On LinkedIn | https://www.linkedin.com/in/jainam-basra/ ________________________________ Host: Saman Fatima On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/saman-fatima ________________________________ This Episode’s Sponsors Are you interested in sponsoring an I…
  continue reading
 
Like any risk measure, the level of insider risk in a health system is never static, despite the fleeting comfort a snapshot might provide. Thus, it's helpful for security and privacy professionals to contemplate the reasons spikes occur so mitigation measures can be implemented at the right time and place. For example, if we consider that issuing …
  continue reading
 
After a few months of testing during the general elections, Meta is making its Llama-3-powered AI chatbot available to all users in India. However, Meta AI currently only supports English and no other local languages. The company started testing Meta AI in India across WhatsApp, Instagram, Messenger, and Facebook in April. Learn more about your ad …
  continue reading
 
In this episode, we sit down with cyber threat analyst and SANS OSINT instructor, Steven Harris. Steven discusses how Telegram is a must-use channel for investigating the war in Ukraine, and why cyber threat actors are flocking to the app. Key Takeaways SOCMINT from law enforcement to cyber threats Investigating on Telegram Why Telegram allows cybe…
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Guest: Gabrielle Botbol, Offensive Security Advisor, Desjardins Website: https://csbygb.github.io/ LinkedIn: https://www.linkedin.com/in/gabriellebotbol/ Twitter/X: https://twitter.com/Gabrielle_BGB Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ Th…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
This week on Tech News of The Week, Ned and Chris rejoice that Voyager 1 is fully operational, remind you to update vCenter Security, ignore Dell’s demand for in-person attendance, and discuss Claude 3.5 Sonnet. Links: Interstellar Voyager 1 Fully Operational Again Critical vCenter Security Patches Released - You Know What To Do Dell’s Demand For I…
  continue reading
 
Google said today that it is globally pausing its experiment of allowing real-money games on the Play Store, where there was no central body for this kind of app. In January, the company said it would start allowing real-money apps widely in June in India, Brazil, and Mexico. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
  continue reading
 
Today is the first in a two-part conversation centered on cultural fluency with global leadership strategist and corporate coach Jane Hyun. Jane is the author of Leadership Toolkit for Asians: The Definitive Resource Guide for Breaking the Bamboo Ceiling and Breaking the Bamboo Ceiling: Career Strategies for Asians, and the co-author of Flex: The N…
  continue reading
 
Send us a Text Message. TL;DR: This week is part 2 of the 2-part series on "Outsourcing your security" with Paul Farley. Paul's expertise in this space means you should be taking notes! On this second part, we dive into how you can pick an effective model for your use-case (we talk through a few of the available models out there), how to effectivel…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
YouTube appears to be taking a firm stance against Premium subscribers who attempt to use a VPN (Virtual Private Network) to access cheaper subscription prices in other countries. This week, a number of users took to Reddit to express their frustration after their Premium plans were canceled for using a VPN to purchase the subscription Learn more a…
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Guest: Robert Fernandes, Chief Information Security Officer, The Investment Center, Inc. On LinkedIn | https://www.linkedin.com/in/robert-fernandes-cybersecurity/ ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.it…
  continue reading
 
The pressures that go along with leading cyber in a healthcare institution are daunting; some of which include the need to be perfect all the time, the fact that the industry is under almost constant attack, and the presence of financial margins that don’t leave IT with money to burn. Of course, combine all that […] Source: Q&A with United Musculos…
  continue reading
 
Loading …

Quick Reference Guide