Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field.
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Listen to Accenture’s own internal InfoSec and IT executives as they discuss what it takes to keep client, business partner, and enterprise data secure. Hosted by Kris Burkhardt, Accenture managing director responsible for its information security technology and operations.
…
continue reading
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
U
UNSECURITY: Information Security Podcast


1
UNSECURITY: Information Security Podcast
The InfoSec Mission
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
…
continue reading
T
The Host Unknown Podcast


1
The Host Unknown Podcast
Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
R
Random but Memorable - Security Advice from 1Password


Lighthearted security advice and banter from 1Password and guests.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
A interview series where information security marketing executives share their stories, insights, best practices. For more information, check out: https://cybersecuritysalesinsider.substack.com and https://aphinia.com/
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
B
Black Hills Information Security


1
Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Podcast by InfoSec Campus
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for NORTH AMERICA by the 2021, 2022, and 2023 Cybersecurity Excellence Awards. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking with current leaders and experts in the IT and C ...
…
continue reading
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
…
continue reading
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
…
continue reading
We're your daily briefing on the pulse of the cyber world. Each day, we decrypt the complex landscape of cyber threats, zero in on the latest hacks, and dissect the strategies that keep data defenders on their toes. Whether it's a deep dive into the latest enterprise breach, a spotlight on emerging threat vectors, or actionable intel from the cybersecurity trenches, 'DCTIB' is your essential source for the cyber news that matters. Join us in the loop, and stay one step ahead in the digital age
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at:Website: https://topcyberpro.com/Facebook: https://www.facebook.com/TopCyberPro/Instagram: https://www.instagram.com/topcyberpro/Twitter: https://twitter.com/TopCyberProTikTok: https://www.tiktok.com/@topcyberproLinkedIn: https://www.linkedin.com/company/topcyberpro/
…
continue reading
Cybersecurity and data privacy is a requirement for any good business. So how can a CISO, CTO or compliance manager stay on top of where the industry is heading? Infosec veteran and former lead auditor, Blaise Wabo discusses the intersection of security, privacy and compliance. Topics include: Guest interviews with industry experts, framework updates, the business implications of compliance (and non-compliance), and discussions about compliance challenges, tips and tricks.
…
continue reading
W
Wait Just an InfoSec


1
Cyber Warfare Frontlines: Unveiling the Digital Battlefield with Rob Lee and Jake Williams
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36
Join renowned cybersecurity experts Rob Lee and Jake Williams in a riveting livestream discussion as they delve into the complex world of offensive cyber operations amid ongoing nation-state conflicts. In this episode of Wait Just an Infosec, we’ll explore the critical role of cyber warfare in the Ukraine-Russia and other global conflicts, providin…
…
continue reading
B
Black Hills Information Security


1
Talkin’ About Infosec News – 11/30/2023
1:02:44
1:02:44
Play later
Play later
Lists
Like
Liked
1:02:44
The post Talkin’ About Infosec News – 11/30/2023 appeared first on Black Hills Information Security.By Black Hills Information Security
…
continue reading
C
CISO Series Podcast


1
We Got This Far Without Hiring a Prompt Engineer
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our guest, Suresh Vasudevan, CEO, Sysdig. In this episode: What will the employment landscape look like with Generative AI becoming the next big thing? W…
…
continue reading
C
Cyber Security Headlines


1
Nuclear site hacked, Iranian water breaches, ChatGPT data leaks
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14
UK nuclear site attacked by state-linked attackers US confirms Iranian actors behind water breaches The infinite regress of ChatGPT data exfiltration Huge thanks to our sponsor, Barricade Cyber Solutions Facing a ransomware attack? Don't panic, remain calm and remember to contact Barricade Cyber Solutions, the DFIR team trusted to quickly recover b…
…
continue reading
Madison's nude photos were posted online. Her twin sister Christine came to help. This begins a bizarre and uneasy story. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Jack Rhysider
…
continue reading
Oh misinformation, we will break your spell.. In this episode, understand the entangled complex web of disinformation and misinformation that threatens to disrupt the delicate balance of our communities. The false narratives start to manifest in the real world, the vulnerability of societal trust, and the importance of critical thinking in the face…
…
continue reading
I
ITSPmagazine


1
CISO Stories Recounted By The World's First CISO | A Conversation With Steve Katz | The Business of Security | Redefining CyberSecurity Podcast with Sean Martin and Marco Ciappelli
42:59
42:59
Play later
Play later
Lists
Like
Liked
42:59
Episode Originally Aired Aug 2020: Officially granted the title within a company in 1995, the CISO role is relatively new in Infosec's grand scheme. Since this first attribution, many have taken the job - and the reigns - to shape and define the responsibilities, but it looks like it is still a work in progress. With each step comes new challenges,…
…
continue reading
The US and Israel attribute attacks on PLCs to Iran. Agent Raccoon backdoors organizations on three continents. XDSpy is reported to be phishing the Russian defense sector. Trends in digital banking fraud. Repojacking Go module repositories. Ann Johnson from Afternoon Cyber Tea speaks with Lynn Dohm, executive director of WiCyS, about the power of …
…
continue reading
D
Daily Cyber Threat Intelligence Brief


1
DCTIB ‐ Dec 04, 23 ‐ Agent Racoon, Fake WP CVE, Apple Zero Days, AeroBlade
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30
In this episode: We have a new agent on the block, Agent Racoon. We also cover 2 new apple Zero days which have been used to hack victims devices. Arm yourself with knowledge and join us at the vanguard of digital defense. Subscribe for a front-row seat to the ongoing battle in the binary world of zeros and ones. 💻⚔️🛡️ #CybersecurityUpdate #ransomw…
…
continue reading
C
Cyber Work


1
Empowering African Women through Cybersecurity | Cyber Work Podcast
1:09:32
1:09:32
Play later
Play later
Lists
Like
Liked
1:09:32
Confidence Staveley of the CyberSafe Foundation and the CyberGirls program is today's guest. CyberGirls is a year-long cohort program in which women in Africa ages 18 to 28 can learn cybersecurity basics and create career tracks to fast-track these students into cybersecurity careers! Staveley tells us about the workings of the program, how she use…
…
continue reading
C
Cyber Security Headlines


1
Credit Unions outage, Roblox-Twitch extortion, Apple zero-days
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46
Credit unions facing outages due to ransomware attack on cloud provider Roblox, Twitch allegedly targeted by ransomware cartel Apple fixes two new iOS zero-days in emergency updates Huge thanks to our sponsor, Barricade Cyber Solutions Experiencing ransomware? Barricade Cyber Solutions will help you recover from the nightmare. Trust the industry DF…
…
continue reading
Are you prepared to redefine your approach to securing the public cloud? Join us for an enlightening discussion with Jeff, an InfoSec veteran, where we unravel the intricacies of securing public cloud-native platforms. As we step into Jeff's career of over two decades, we explore the world of cloud security and emphasize the role of cloud providers…
…
continue reading
C
CyberWire Daily


1
Bernard Brantley: Tomorrow is a new day. [CISO] [Career Notes]
10:33
10:33
Play later
Play later
Lists
Like
Liked
10:33
Bernard Brantley, CISO from Corelight sits down to share his inspiring career path with others. Bernard started at the very bottom of the tech stack, and shares how he was extremely unclear about what it was that he wanted to do in life and how he was going to get there. Ultimately he reached a point now where he has the self confidence and an incr…
…
continue reading
This week in InfoSec (09:40) With content liberated from the “today in infosec” twitter account and further afield 24th November 2014: The Washington Post published an article which included a photo of TSA master keys. A short time later functional keys were 3-d printed using the key patterns in the photo. https://twitter.com/todayininfosec/status/…
…
continue reading
I
ITSPmagazine


1
The Dark Universe: What are Dark Matter and Dark Energy? | Stories From Space Podcast With Matthew S Williams
33:26
33:26
Play later
Play later
Lists
Like
Liked
33:26
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes In the 1960s, s…
…
continue reading
I
ITSPmagazine


1
Pioneering the 2050 Collective: From Digital Islands to Global Harmony and Cyber Resilience | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39
In "Cybersecurity 2050: A Collective Odyssey into a Secure Future," we explore the transformative journey of cybersecurity from its nascent stages to a robust, interconnected landscape in 2050. Join us as we investigate the integration of advanced technologies like AI, quantum computing, IoT, and biometric systems with an open cybersecurity model. …
…
continue reading
C
CyberWire Daily


1
Exploits and vulnerabilities. [Research Saturday]
18:48
18:48
Play later
Play later
Lists
Like
Liked
18:48
Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop Fox worked up a proof of concept demo. This research share how they were able to create that proof-of-concept…
…
continue reading
C
Cyber Security Headlines


1
Week in Review: Okta breach expands, Former Uber CISO speaks, OpenAI’s chatbot leak secrets
29:02
29:02
Play later
Play later
Lists
Like
Liked
29:02
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, SpyCloud SpyCloud disrupts cybercrime by telling you what criminals know about your business and your customers, so you can take action on exposed authentication d…
…
continue reading
Senator Wyden blocks the Senate vote on the new NSA and Cyber Command lead. GPS interference is attributed to Iran. Meta identifies and removes Chinese and Russian accounts and groups for coordinated inauthenticity. The EU Council president proposes ‘European cyber force’ with ‘offensive capabilities’. Twisted Spider is observed conducting new rans…
…
continue reading
C
CYBER


1
How Online Fights Affect Real World Battlefields
51:02
51:02
Play later
Play later
Lists
Like
Liked
51:02
Your posts matter more than you think. Social media has changed the way wars are fought and the internet has become a new battlefield. Twitter may be dying, but it still matters an awful lot to policy makers. TikTok is ascendent, but often because its content can be repurposed on other platforms. Telegram can give you the news on the ground, but on…
…
continue reading
I
ITSPmagazine


1
Why Cybersecurity Must Be Included in AI Initiatives | Cybersecurity Insights Podcast with Matthew Rosenquist
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28
Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist ______________________ Episode Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Introduction Cybersecurit…
…
continue reading
Doc Searls and Katherine Druckman talk to Kyle Rankin about his journey into Kubernetes and the cloud native landscape. Site/Blog/Newsletter FaceBook Twitter Mastodon Special Guest: Kyle Rankin. Support Reality 2.0 Links: Bluefin | The Next Generation Linux Workstation — The next generation Linux workstation, designed for reliability, performance, …
…
continue reading
C
Cyber Security Headlines


1
Manufacturing tops extortion, RETVec battles spam, new Zyxel warnings
8:20
8:20
Play later
Play later
Lists
Like
Liked
8:20
Manufacturing industry tops cyber extortion trend Google’s RETVec the latest warrior on bad emails Zyxel warns of vulnerabilities in NAS devices Huge thanks to our sponsor, SpyCloud New research from SpyCloud reveals a critical discovery: nearly a third of ransomware victim companies this year were infected with infostealer malware like Raccoon, Vi…
…
continue reading
C
CyberWire Daily


1
Widespread exploitation of severe vulnerability in ownCloud.
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51
Reports of a Critical Vulnerability in ownCloud. Sites serving bogus McAfee virus alerts. Japan’s space agency reports a breach. Okta revises the impact of their recent breach. Cryptomixer gets taken down in an international law enforcement operation. "SugarGh0st" RAT prospects targets in Uzbekistan and South Korea. NATO cyber exercise runs against…
…
continue reading
C
Compliance Crosswalk


1
Elevating Compliance with a Culture of Security
43:02
43:02
Play later
Play later
Lists
Like
Liked
43:02
Join hosts Giles House and Abby Rodrigues along with their guest Mark Petry, Cyber Compliance and Risk Manager at GoodLeap, as they lend valuable insights about the importance of building a culture of security. Listen to learn why more organizations should phase out rubber stamp reports, seek high-quality audits, and position compliance as a value …
…
continue reading
T
Top Cyber Pro


1
The Future Of Artificial Intelligence with David Youngblood
57:06
57:06
Play later
Play later
Lists
Like
Liked
57:06
The Future Of Artificial Intelligence with David YoungbloodIn this episode, I discuss the future of AI, Sam Altman, Open AI, AI research, human values, AI risk mitigation, how AI will improve lives, AI augmentation, and the benefits of AI.References:CommonThread AI: A Customer Journey Mapping and Data Interpreter Platform for B2B Organizations leve…
…
continue reading
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our guest, Jerich Beason, CISO, WM. In this episo…
…
continue reading
D
Daily Cyber Threat Intelligence Brief


1
DCTIB ‐ November 30, 23 ‐ JAXA, Sinbad Crypto Mixer, Chinese Lidar, Dollar Tree Breached
9:41
9:41
Play later
Play later
Lists
Like
Liked
9:41
In this episode: Sinbad Crypto Mixer gets taken down by LEO, Dollar Tree gets breached and some interesting insights in the paths a few young men took on their cyber journey. Arm yourself with knowledge and join us at the vanguard of digital defense. Subscribe for a front-row seat to the ongoing battle in the binary world of zeros and ones. 💻⚔️🛡️ #…
…
continue reading
C
Cyber Security Headlines


1
Okta breach expands, JAXA cyberattack, leaky GPTs
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22
All Okta customers exposed in breach JAXA hit by cyberattack OpenAI’s chatbots leak secrets Huge thanks to our sponsor, SpyCloud For some people ignorance is bliss – but that’s not an option for those of us in cybersecurity. SpyCloud has a free tool that lets you check your company’s darknet exposure, and you might find some things that are pretty …
…
continue reading
D
Daily Cyber Threat Intelligence Brief


1
DCTIB ‐ November 29, 23 ‐ Okta Breach, Qilin, BLUFFS
8:24
8:24
Play later
Play later
Lists
Like
Liked
8:24
In this episode: Okta reveals that the October hack had a much bigger impact, Identity service gets hijacked to steal americans credentials, and Qilin ransoms Yanfeng. Arm yourself with knowledge and join us at the vanguard of digital defense. Subscribe for a front-row seat to the ongoing battle in the binary world of zeros and ones. 💻⚔️🛡️ #Cyberse…
…
continue reading
I
ITSPmagazine


1
Exploring the Future at Smart City Expo 2023: A Deep Dive into Technological Integration and Societal Transformation driven by Circular Economy and Co-Creation | A Smart City Event Coverage Conversation ...
46:22
46:22
Play later
Play later
Lists
Like
Liked
46:22
Guests: Shawn Butler, Co-Founder / VP - Architecture & Analytics at BNS UEP [@bnsuep1] On LinkedIn | https://www.linkedin.com/in/1kindword/ Kika Von Klück, VP - Research and Innovation at BNS UEP [@bnsuep1] On Linkedin | https://www.linkedin.com/in/kikavonkluck/ ____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPma…
…
continue reading
S
Smashing Security


1
Think before you shrink! And our guest is faked
1:04:03
1:04:03
Play later
Play later
Lists
Like
Liked
1:04:03
Don't minimise your Teams Meeting video call too hastily, you might reveal your dirty secrets! Would you be prepared to pay for Facebook and Instagram? And who is being faked to promote cryptocurrency scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carol…
…
continue reading
C
CyberWire Daily


1
Major crackdown on international cybersecurity.
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40
A major ransomware gang is taken down in an international sweep. CISA and the WaterISAC respond to the Aliquippa cyberattack. Attacks against infrastructure operators hit business systems. Qlik Sense installations are hit with Cactus ransomware. Researchers discover a Google Workspace vulnerability. A hacktivist auxiliary compromises a Russian medi…
…
continue reading
I
ITSPmagazine


1
Tyler Cohen Wood discusses why the Internet struggles with secure communication | Cybersecurity Insights Podcast with Matthew Rosenquist
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33
Guest: Tyler Cohen Wood, CEO and Co-Founder Dark Cryptonite | Keynote Speaker | 2023 Top 30 Women in #AI | Cyber Woman of the Year Finalist 2021 and 2023 | Top 50 Global #Cybersecurity | Board Member | Fmr DIA Cyber Deputy Division Chief On LinkedIn | https://www.linkedin.com/in/tylercohen78/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.i…
…
continue reading
The latest episode of the Transatlantic Cable podcast begins with news that General Electric are investigating claims of a data breach, found it was found that an attacker was selling access to the business for just $500. From there, the team discuss how U.S police forces are returning $9 million in seized crypto assets back to victims of ‘pig butc…
…
continue reading
4
401 Access Denied


1
401 Access Denied Podcast Ep. 94 | Crowdsourced Security & Vulnerability Disclosure with Casey Ellis
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59
Join host Joseph Carson for a compelling discussion with Bugcrowd founder Casey Ellis on the evolution of coordinated vulnerability disclosure. Ellis’ pioneering work connects ethical hackers with organizations to enhance their cyber resilience. He shares his experiences and unique insights into disclosure trends, including how changing regulations…
…
continue reading
C
Cyber Security Headlines


1
Ransomware gang busted in Ukraine, North Texas water utility cyberattack, Former Uber CISO breaks 6-year silence
7:36
7:36
Play later
Play later
Lists
Like
Liked
7:36
Ransomware gang busted in Ukraine by international operation North Texas water utility hit with cyberattack Former Uber CISO speaks out after 6-year silence Huge thanks to our sponsor, SpyCloud SpyCloud has discovered that infostealer malware infections are an early warning signal for ransomware. In fact, nearly a third of ransomware victim compani…
…
continue reading