Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
This podcast explores investment strategies, economics, personal finance, and stock analysis. It features real conversations and analysis to inform, educate, and entertain. Note that nothing in this podcast is investment advice and it is for entertainment & discussion purposes only. Do your own due diligence before making any investment. www.securityanalysis.org
…
continue reading
Enterprise technology, business, CEO insights and more! We’re here to cut through the noise. Experts in Polo Shirts offers practical information, entertaining insights into a tech business and clarity on the most complex technologies.
…
continue reading
Chaos Lever examines emerging trends and new technology for the enterprise and beyond. Hosts Ned Bellavance and Chris Hayner examine the tech landscape through a skeptical lens based on over 40 combined years in the industry. Are we all doomed? Yes. Will the apocalypse be streamed on TikTok? Probably. Does Joni still love Chachi? Decidedly not.
…
continue reading
🎙️ Welcome to the Secure East Anglia: Insurance Matters Podcast! 🎙️ Join Ryan Whybrow, an experienced insurance broker at Konsileo, as he chats with industry experts and local business owners in East Anglia. Each episode dives into the world of general insurance, offering insights, advice, and real-world experiences to help you protect your business. Discover how to safeguard your assets, navigate insurance complexities, and ensure peace of mind for your enterprise. Tune in to stay informed, ...
…
continue reading
Presentations given at Oxford's International Conference on Water Security, Risk and Society, April 16-18th 2012. The event convened many of the world's leading thinkers from science, policy and enterprise to understand the status of and pathways to water security at multiple scales.
…
continue reading
The AIBP ASEAN B2B Growth Podcast is a series of fireside chats and interviews with business leaders in Southeast Asia focused on growing B2B businesses in the region. Each episode will feature a company which is rapidly growing their business in the region and will cover topics such as Business Strategy, Sales & Marketing, Enterprise Technology, Innovation and Financial metrics. Connect with us to learn more: https://www.linkedin.com/in/aibp/
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Interarbor Solutions' Briefings Direct: Unique B2B informational podcasts that offer the value of objective perspectives from leading industry analyst Dana Gardner. Briefings Direct delivers actionable knowledge on the latest enterprise IT subjects to those who need to know the most about the business of IT now.
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
The LiveSafe Prevention Podcast features news analysis and interviews with the leading voices in enterprise risk management, safety and security. Hosted by former intelligence officer and award-winning journalist Dan Verton, the Prevention Podcast delivers actionable insights into the real-world challenges faced by risk, safety and security professionals and how employee-sourced risk information can help improve and organization's risk profile.
…
continue reading
healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.
…
continue reading
The CYBER5 is hosted by Landon Winkelvoss, Co-Founder at Nisos, and features cybersecurity and investigations industry leaders' thoughts and answers to five questions on one topic on actionable intelligence to enterprise revolving around third-party risk management, adversary research and attribution, digital executive protection, merger and acquisition diligence, brand protection, disinformation, and cyber threat intelligence.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
This podcast is brought to you by The Chertoff Group; sharing unique insights and perspectives on security, technology, and policy; helping organizations manage risk and accelerate growth.
…
continue reading
Every Tuesday, NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
Buying Tech is a show dedicated to technology and procurement professionals. Each episode will delve into the workings of different types of technology in plain English, then discuss the various benefits and pitfalls, and how small, medium and enterprise businesses or Governments can procure them to maximise value and reduce risk. Click above to Subscribe in iTunes/your Podcast app, or follow us on Twitter, Facebook or Instagram to be notified when episodes are released.
…
continue reading
51
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Frazier & Deeter's Culture of Compliance podcast explores compliance as a competitive advantage in today's marketplace. Culture of Compliance was recently named #1 in “Top 25 Regulatory Compliance Podcasts You Must Follow in 2020” by Feedspot.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
Recent studies show that 82% of cyber incidents result from unintended human behavior. Further, the errant behavior of only 5% of all users creates most of this risk. This is pretty alarming, and yet no one is talking about it. Modifying the behavior of these few individuals can have a force multiplier effect on reducing overall enterprise cyber risks. Welcome to Friendly Fire: Mitigating Unintentional User Risk. Where we explore Human Risk, to raise awareness across the industry, and stimul ...
…
continue reading
Live conversations with the people operating at the frontier of crypto innovation: entrepreneurs, bankers, investors, fund administrators, traders, analysts and other crypto and digital asset market participants. Our objective is to help the broader ecosystem navigate this complex environment and unlock the market opportunity. This podcast is hosted by Metaco - the leading enterprise technology company whose mission is to enable financial and non-financial institutions to securely build thei ...
…
continue reading
1
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15
Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthe…
…
continue reading
1
Climate X founders, who mortgaged their houses to stay afloat, now raise a $18 million Series A
5:22
5:22
Play later
Play later
Lists
Like
Liked
5:22
To date, most of the hottest software platforms in the ClimateTech space have been about carbon accounting, offsets, removals, and regulatory disclosure. For instance, New York’s Persefoni (accounting) raised $164.2 million to date, Plan A (accounting/monitoring) in Berlin raised $43 million and at the lower end, Supercritical (removals) raised $15…
…
continue reading
1
Is Your App Security Culture Leaving Out the Basics? | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean ...
17:44
17:44
Play later
Play later
Lists
Like
Liked
17:44
In this episode of the On Location, host Sean Martin engages in an insightful conversation with Francesco Cipollone, Co-founder and CEO of Phoenix Security, at the OWASP AppSec Global conference in Lisbon. They delve into the evolving landscape of application security, focusing on the pressing challenges and innovative solutions that are shaping th…
…
continue reading
1
Build Social Media Presence | A Conversation with Jackie Blundell | Locked Down Podcast With Kayla Williams and Taylor Parsons
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55
Guest: Jackie Blundell, Senior Marketing Communications Manager, Devo On Twitter | https://x.com/devo_Inc On LinkedIn | https://www.linkedin.com/in/jacquelineblundell/ Hosts: Kayla Williams On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/kayla-williams Taylor Parsons On ITSPmagazine | https://itspmagazine.com/itspmag…
…
continue reading
1
Episode 1: Unveiling Expertise: A Conversation with Maxine Murray
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02
Episode 1: Unveiling Expertise: A Conversation with Maxine Murray Welcome to the first episode of the Secure East Anglia: Insurance Matters Podcast! In this episode, host Ryan Whybrow, an experienced insurance broker at Konsileo, sits down with Maxine Murray, a seasoned expert in the insurance industry. They discuss Maxine's role at Konsileo, the c…
…
continue reading
1
Prioritizing Cyber Resilience for your Business | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A LevelBlue Story with Theresa Lanowitz
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16
We are in the era of dynamic computing – and while that gives way to innovation, it also escalates the risks every business faces. Computing no longer occurs solely within the perimeter, and cybersecurity threats are increasingly more sophisticated. In fact, organizations today operate in a climate where entire systems can be taken offline in just …
…
continue reading
1
Hack all the things, patch all the things - PSW #833
1:50:38
1:50:38
Play later
Play later
Lists
Like
Liked
1:50:38
Zyxl NAS devices are under attack and the exploit is pretty simple, A new UEFI vulnerability with a name that some people don't like, that time you setup a load balancer and forgot about it, I love it when there is a vulnerability in a Wifi driver, Polyfill is filling the Internet with supply chain vulnerabilities, open source doesn't mean more sec…
…
continue reading
1
The Power of Personal Branding in the Age of AI and Social Media | A Conversation with Vladimer Botsvadze | Redefining Society with Marco Ciappelli
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21
Guest: ✨ Vladimer Botsvadze, Global Marketing Thought Leader On Linkedin | https://www.linkedin.com/in/vladimerbotsvadze/ On Twitter | https://twitter.com/VladoBotsvadze Website | https://www.vladimerbotsvadze.com/ ____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast O…
…
continue reading
1
VW to invest up to $5B into Rivian in software deal
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14
VW Group invest $1 billion into EV startup Rivian as part of a software development deal that could expand to as much as $5 billion. The deal, which was announced Tuesday afternoon, sent Rivian’s shares up more than 36% in after-hours trading. The two companies will create a joint venture focused on next-generation electrical architecture Learn mor…
…
continue reading
1
Leveraging Integration & Automation to Drive Towards Systemness
57:16
57:16
Play later
Play later
Lists
Like
Liked
57:16
To deliver the kinds of experiences patients expect, a healthcare system must act as just that—a unified system. This ideal system breaks down when patients are asked to re-enter their information with each care encounter or staff lose time dealing with cumbersome and repetitive processes that keep them from practicing at the top of their licenses.…
…
continue reading
1
Do We Need Penetration Testing and Vulnerability Scanning? - Josh Bressers, Adrian Sanabria - PSW #833
2:51:52
2:51:52
Play later
Play later
Lists
Like
Liked
2:51:52
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
…
continue reading
1
Infinitely Jesting About the Year of Quantum Science & Tech
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22
The UN named 2025 the Year of Quantum Science, so Ned and Chris attempt to cram 2,450 years of quantum history into one episode. A Gambol Through Space and Time The United Nations has designated 2025 as the International Year of Quantum Science and Technology. To add to the confusion, Ned and Chris are trying to cover the history of quantum mechani…
…
continue reading
1
Q&A: UH Chief Strategy & Innovation Officer David Sylvan on Removing Barriers to Access
25:07
25:07
Play later
Play later
Lists
Like
Liked
25:07
In today’s complex healthcare environment, providing a platform for users to present ideas is essential. However, “if it’s open-ended and unbounded, we’re going to be building a whole bunch of very pretty bridges to nowhere,” said David Sylvan, Chief Strategy & Innovation Officer at University Hospitals. Instead, “we have to be prescriptive about w…
…
continue reading
1
Winning Buy-In: Mastering the Art of Communicating (the Value of) Security (Culture) to Management | An OWASP AppSec Global Lisbon 2024 Conversation with Ida Hameete | On Location Coverage with Sean Martin ...
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59
Guest: Ida Hameete, Application Security Consultant, Zenrosi On LinkedIn | https://www.linkedin.com/in/idahameete/ ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/sean-martin _____________________…
…
continue reading
1
Snapchat introduces new safety features to limit bad actors from contacting users
3:49
3:49
Play later
Play later
Lists
Like
Liked
3:49
Snapchat on Tuesday announced a new suite of safety features, including updates to its account blocking functionality and enhanced friending safeguards, making it difficult for strangers to contact users on its platform. The new move comes amid concerns over predators exploiting teens on social media apps, which often results in severe incidents, i…
…
continue reading
1
Beyond "The Conceivable Future": Reimagining Our Climate Narrative | A conversation with Dr Meghan Elizabeth Kallman | What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman ...
58:49
58:49
Play later
Play later
Lists
Like
Liked
58:49
Guest: Dr. Meghan Elizabeth Kallman, PhD, Rhode Island State Senator and Associate Professor, School for Global Inclusion and Social Development UMASS Boston On Twitter | https://x.com/MeghanEKallman On LinkedIn | https://www.linkedin.com/in/meghan-kallman-6030a3229/ Website | https://meghankallman.com/ Hosts: Alejandro Juárez Crawford On ITSPmagaz…
…
continue reading
1
teissTalk: Protecting your C-Suite's private lives to protect the enterprise
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39
Threat trends - how threat actors are targeting C-Suite executives to access the enterprise Empowering your C-Suite to identify and avoid social engineering Creating social media policies that your C-Suite understand so that they can lead by example This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Thomas Wendrich, A…
…
continue reading
1
Do We Need Penetration Testing and Vulnerability Scanning? - Adrian Sanabria, Josh Bressers - PSW #833
1:00:55
1:00:55
Play later
Play later
Lists
Like
Liked
1:00:55
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Show Notes: https://securityweekly.com/psw-8…
…
continue reading
1
Uber Freight and self driving trucks startup Aurora partner for the long haul
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04
Uber Freight and Aurora Innovation have announced a multi-year collaboration that will see Aurora’s autonomous driving technology offered on the Uber Freight network through 2030. The deal gives Aurora access to shipping customers as it prepares to launch its fully driverless commercial service later this year. It also helps Aurora also secure long…
…
continue reading
As Apple enters the AI race, it’s also looking for help from partners. During the announcement of Apple Intelligence earlier this month, Apple said it would be partnering with OpenAI to bring ChatGPT into the revamped version of Siri. Now, the Wall Street Journal reports that Apple and Facebook’s parent company Meta are in talks Learn more about yo…
…
continue reading
Paul Gabrail operates the Everything Money YouTube channel and website. The channel covers a wide variety of investment strategies, but focuses on value investing concepts. Paul has been investing via his Family office, the Crossroads Group, investing in everything from stocks to private businesses to real estate. Links: * Everything Money: https:/…
…
continue reading
1
Book | Conspiracy Ignited | A Conversation With Author Raymond Paul Johnson | Audio Signals Podcast With Marco Ciappelli
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02
Guest: Raymond Paul Johnson, Novelist On LinkedIn | https://www.linkedin.com/in/raymond-paul-johnnson-author-attorney/ On Twitter | https://twitter.com/RPJohnsonBooks On Website | https://RaymondPaulJohnson.com On Facebook | https://www.Facebook.com/RaymondPaulJohnsonThrillerWriter On Instagram | https://www.Instagram.com/raymondpauljohnson_author …
…
continue reading
1
Mastering Cybersecurity: Jainam's Enlightening Journey Through Graduate Studies and Beyond | A Conversation with Jainam Basra | Off the Record with Saman — Student Abroad Podcast
54:29
54:29
Play later
Play later
Lists
Like
Liked
54:29
Guest: Jainam Basra, Cybersecurity Analyst and Technuf On LinkedIn | https://www.linkedin.com/in/jainam-basra/ ________________________________ Host: Saman Fatima On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/saman-fatima ________________________________ This Episode’s Sponsors Are you interested in sponsoring an I…
…
continue reading
1
Shared Responsibility Models, AI in Offensive Security, Apple's Private Cloud Compute - ASW #289
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10
Thoughts on shared responsibility models after the Snowflake credential attacks, looking at AI's current and future role in offensive security, secure by design lessons from Apple's Private Cloud Computer, and more! Show Notes: https://securityweekly.com/asw-289
…
continue reading
1
Identifying & Mitigating Key Drivers of Insider Risk
53:35
53:35
Play later
Play later
Lists
Like
Liked
53:35
Like any risk measure, the level of insider risk in a health system is never static, despite the fleeting comfort a snapshot might provide. Thus, it's helpful for security and privacy professionals to contemplate the reasons spikes occur so mitigation measures can be implemented at the right time and place. For example, if we consider that issuing …
…
continue reading
1
Meta makes its AI chatbot available to all users in India
3:36
3:36
Play later
Play later
Lists
Like
Liked
3:36
After a few months of testing during the general elections, Meta is making its Llama-3-powered AI chatbot available to all users in India. However, Meta AI currently only supports English and no other local languages. The company started testing Meta AI in India across WhatsApp, Instagram, Messenger, and Facebook in April. Learn more about your ad …
…
continue reading
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-394
…
continue reading
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-394
…
continue reading
1
Is Telegram the place for cyber investigators?
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32
In this episode, we sit down with cyber threat analyst and SANS OSINT instructor, Steven Harris. Steven discusses how Telegram is a must-use channel for investigating the war in Ukraine, and why cyber threat actors are flocking to the app. Key Takeaways SOCMINT from law enforcement to cyber threats Investigating on Telegram Why Telegram allows cybe…
…
continue reading
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
1
The Importance of Cyber Peace | A Conversation with Gabrielle Botbol | The Soulful CXO Podcast with Dr. Rebecca Wynn
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30
Guest: Gabrielle Botbol, Offensive Security Advisor, Desjardins Website: https://csbygb.github.io/ LinkedIn: https://www.linkedin.com/in/gabriellebotbol/ Twitter/X: https://twitter.com/Gabrielle_BGB Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ Th…
…
continue reading
1
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
1:04:51
1:04:51
Play later
Play later
Lists
Like
Liked
1:04:51
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
This week on Tech News of The Week, Ned and Chris rejoice that Voyager 1 is fully operational, remind you to update vCenter Security, ignore Dell’s demand for in-person attendance, and discuss Claude 3.5 Sonnet. Links: Interstellar Voyager 1 Fully Operational Again Critical vCenter Security Patches Released - You Know What To Do Dell’s Demand For I…
…
continue reading
1
Google is pausing its experiment of allowing real-money games on the Play Store
2:31
2:31
Play later
Play later
Lists
Like
Liked
2:31
Google said today that it is globally pausing its experiment of allowing real-money games on the Play Store, where there was no central body for this kind of app. In January, the company said it would start allowing real-money apps widely in June in India, Brazil, and Mexico. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
…
continue reading
1
S27 Ep1: Jane Hyun - Leading From Afar: Getting the best out of our remote workforce
14:55
14:55
Play later
Play later
Lists
Like
Liked
14:55
Today is the first in a two-part conversation centered on cultural fluency with global leadership strategist and corporate coach Jane Hyun. Jane is the author of Leadership Toolkit for Asians: The Definitive Resource Guide for Breaking the Bamboo Ceiling and Breaking the Bamboo Ceiling: Career Strategies for Asians, and the co-author of Flex: The N…
…
continue reading
1
DtSR Episode 607 - Outsourcing Your Security Part 2
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56
Send us a Text Message. TL;DR: This week is part 2 of the 2-part series on "Outsourcing your security" with Paul Farley. Paul's expertise in this space means you should be taking notes! On this second part, we dive into how you can pick an effective model for your use-case (we talk through a few of the available models out there), how to effectivel…
…
continue reading
1
Building a Successful API Security Strategy - Luke Babarinde - BSW #354
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
1
YouTube confirms crackdown on VPN users accessing cheaper Premium plans
2:28
2:28
Play later
Play later
Lists
Like
Liked
2:28
YouTube appears to be taking a firm stance against Premium subscribers who attempt to use a VPN (Virtual Private Network) to access cheaper subscription prices in other countries. This week, a number of users took to Reddit to express their frustration after their Premium plans were canceled for using a VPN to purchase the subscription Learn more a…
…
continue reading
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
1
Cybersecurity as a Profit Center: Transforming Risk into Opportunity | A Conversation with Robert Fernandes | Redefining CyberSecurity with Sean Martin
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49
Guest: Robert Fernandes, Chief Information Security Officer, The Investment Center, Inc. On LinkedIn | https://www.linkedin.com/in/robert-fernandes-cybersecurity/ ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.it…
…
continue reading
1
Q&A with United Musculoskeletal Partners CISO Krista Arndt: “Investing in Operational Partnerships is Key To Cyber Success”
31:10
31:10
Play later
Play later
Lists
Like
Liked
31:10
The pressures that go along with leading cyber in a healthcare institution are daunting; some of which include the need to be perfect all the time, the fact that the industry is under almost constant attack, and the presence of financial margins that don’t leave IT with money to burn. Of course, combine all that […] Source: Q&A with United Musculos…
…
continue reading