show episodes
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
T
The New CISO

1
The New CISO

Steve Moore, Exabeam

Unsubscribe
Unsubscribe
Monthly+
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
The Cybersecurity Collaborative — in conjunction with Cybereason — is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.sec ...
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show is live at 9 AM EST Monday through Thursday and tune in each Friday for a special Tech Corner with some of the industry's brightest minds to discuss the latest challenges, innovations, and technologies. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We wa ...
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Loading …
show series
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, Nov 29-Dec 3, is hosted by Rich Stroffolino with our guest, Pat Benoit, vp, Global Cyber GRC/BISO, CBRE Thanks to our episode sponsor, Votiro Your users need to accept and open files to do their jobs. Keep them safe and productive with Votiro. With Votiro zero trust file sanit…
 
This week's tools, tips, and tricks episode talks about a free wi-fi scanner you can use to help improve your network performance. Download - Acrylic Wi-Fi Home Scanner - https://www.acrylicwifi.com/en/downloads-free-license-wifi-wireless-network-software-tools/download-wifi-scanner-windows/ Be aware, be safe. Get ExpressVPN, Secure Your Privacy An…
 
Emotet now spreads via fake Adobe Windows App Installer packages Data from 400,000 Planned Parenthood patients compromised Double extortion ransomware victims soar 935% Thanks to our episode sponsor, Votiro Your users need to accept and open files to do their jobs. Keep them safe and productive with Votiro. With Votiro zero trust file sanitization …
 
Twitter announced a new policy where they will begin removing media that is deemed private. This episode goes into the details and some curious wording on what Twitter considers sensitive or not. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee ***…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Critical Flaw in NSS Cryptographic Library Affects Several Popular Applications Researches Detail 17 Malicious Frameworks Used to Attack Air-Gapped Networks Former Ubiquiti employee charged with hacking and extorting company Emotet now spreads via fake Adobe Windows App Install…
 
In a cloud environment, securing privileged identities and DevOps pipelines with privileged access requires special attention. In this session, Sean Deuby and Gil Kirkpatrick (Semperis Chief Architect) discuss Microsoft's current guidance for securing privileged access in Microsoft Azure with Thomas Naunheim (Cloud Architect at glueckkanja-gab AG).…
 
All links and images for this episode can be found on CISO Series Security convergence is the melding of all security functions from physical to digital and personal to business. The concept has been around for 17 years yet organizations are still very slow to adopt. A company's overall digital convergence appears to be happening at a faster rate t…
 
AT&T customers hit with malware CISA announces advisory panel Palo Alto Networks looks at speed of compromise in the cloud Thanks to our episode sponsor, Votiro Your users need to accept and open files to do their jobs. Keep them safe and productive with Votiro. With Votiro zero trust file sanitization API, your users can download and use any file …
 
A school district in Texas is going to start scanning all the student's district-provided devices. They will be looking at all communications, use and email for flag that might be indicative of cyber-bullying and potential mental health issues. This episode talked about this and what piece is missing that could be done. Source - https://www.gaggle.…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Yanluowang Ransomware Targeting U.S. Financial Corporations Hackers Increasingly Using RTF Template Injection Technique in Phishing Attacks FBI document shows what data can be obtained from encrypted messaging apps 2.1 Million People Affected by Breach at DNA Testing Company Eu…
 
Twitter bans sharing private images and videos without consent DNA testing firm discloses data breach affecting over 2 million people Critical ‘Printing Shellz’ bugs impact 150 HP printer models Thanks to our episode sponsor, Votiro Your users need to accept and open files to do their jobs. Keep them safe and productive with Votiro. With Votiro zer…
 
Are you reporting the same risks each year to management? This may be indicative of a lack of incentive or buy-in from senior management to fund the investments. Join this podcast to learn how to show senior management that funding these initiatives is more than risk avoidance and a cost to the bottom line. To view the article from the CISO COMPASS…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Panasonic discloses data breach after network hack Unpatched Unauthorized File Read Vulnerability Affects Microsoft Windows OS More than 300,000 Play Store users infected with Android banking trojans Chinese hackers could steal data now and crack it with quantum computers later…
 
Online shopping is on the increase this time of year and so are the scams. This episode goes through some of the red flags and cautions you should take when buying from online deals. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Secu…
 
Dark web market shuts down after DDoS Clearview facing fines in the UK New Chinese surveillance system will target journalists and students Thanks to our episode sponsor, Votiro Your users need to accept and open files to do their jobs. Keep them safe and productive with Votiro. With Votiro zero trust file sanitization API, your users can download …
 
The Internet Of Things Strikes Again. This episode talks about a big first step the UK is taking to address poor security in internet-enabled devices. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you ca…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Recently Patched Apache HTTP Server Vulnerability Exploited in Attacks Interpol arrests over 1,000 suspects linked to cyber crime VMware Patches File Read, SSRF Vulnerabilities in vCenter Server New Chinotto Spyware Targets North Korean Defectors, Human Rights Activists US sanc…
 
Our guest, is Dr. Ben Evans. Ben is an aeronautical engineer, and he’s applying his understanding of the forces at play, to the seemingly insurmountable challenge of conquering the breaking a world record at the Bloodhound Land Speed Project. Ben talks about the laws of science and engineering which help him to find the marginal opportunities for i…
 
RATDispenser spreads multiple remote access trojans into the wild North Korea-linked Zinc group posed as Samsung recruiters to target security firms Interpol arrests over 1,000 suspects linked to cyber crime Thanks to our episode sponsor, Votiro Your users need to accept and open files to do their jobs. Keep them safe and productive with Votiro. Wi…
 
The topic of application security has never been more important. So how are companies approaching appsec? What should companies do to ensure appsec gets the attention it needs? Antti Tuomi, who works in Japan, and Antti Vaha-Sipila (known as AVS), from Finland, join the show to share their thoughts on changes in application security, shifting left,…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Apple sues spyware-maker NSO Group, notifies iOS exploit targets What could we learn from the SolarWinds investor lawsuit? FBI warns of phishing targeting high-profile brands' customers APT C-23 Hackers Using New Android Spyware Variant to Target Middle East Users Story Links: …
 
In 2019 Facebook, now Meta, announced they are moving to enable end to end encryption on the messaging apps. It's 2021 and it's not completed and now they say it won't be until 2023 at the earlest. This episode talks about this. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the…
 
Over nine million Android devices infected Researcher discloses zero-day exploit due to low bounty payouts Threat actors compromise exposed services in 24 hours Thanks to our episode sponsor, deepwatch Increasing ransomware attacks and their evolving sophistication have been putting more pressure on security teams than ever before. Luckily, managed…
 
Infosec skills don't necessarily transfer to CISO skills, but CISO skills are 100% transferable to whatever your infosec career looks like. Growth begins outside of your comfort zones, so some of the CISO skills you can work on now include executive storytelling, internal coalition building, and how to be comfortable being uncomfortable… Show Notes…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Conti ransomware gang suffers security breach Severe Code Execution Vulnerabilities Affect OpenVPN-Based Applications Exploit released for Microsoft Exchange RCE bug, patch now GoDaddy Breach Exposes 1.2 Million Managed WordPress Customer Accounts Biometric auth bypassed using …
 
The Identity Theft Resource Center released a report that shows a disturbing trend. The survey showed that more than half of users involved in a breach take no action to strengthen their accounts. This episode breaks it down. Source Report - https://www.idtheftcenter.org/data-breach-notice-research-by-the-identity-theft-resource-center-shows-consum…
 
GoDaddy data breach impacts millions Microsoft looks at brute-force attacks Printers used to bypass fingerprint authentication Thanks to our episode sponsor, deepwatch What is the value of good security? Can you quantify what mature detection and response means for your organization? A recent Forrester study found that a deepwatch MDR customer achi…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Microsoft Exchange servers hacked in internal reply-chain attacks New Golang-based Linux Malware Targeting eCommerce Websites U.S Banks Required to Report Cyberattacks to Regulators Within 36 Hours Secretive Chinese committee focused on the “main economic battlefield” of tech I…
 
Millions of routers from Sky, a UK based broadband provider, were found to have security vulnerabilities that were left open for 18 months. This episode talks about this and what the security flaw was. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coff…
 
US banks will be required to report cyberattacks within 36 hours Microsoft Exchange malware campaign uses stolen internal reply-chain emails Conti ransomware group suffers a data breach Thanks to our episode sponsor, deepwatch Increasing ransomware attacks and their evolving sophistication have been putting more pressure on security teams than ever…
 
https://twitter.com/Esquiring - Fred Jennings Vulnerabilities Equity program (VEP), vuln disclosure program (VDP), and what is the best way for disclosure of 0day? (‘proper’ is different and dependent) This show was inspired by this Tweet thread from @k8em0 and @_MG_https://twitter.com/k8em0/status/1459715464691535877 https://twitter.com/_MG_/statu…
 
In this sponsored BDS episode, Bryan Brake and Amanda Berlin interview Emily Eubanks, a Security Operations Analyst for #Blumira. We discuss common business risks like IT staff turnover, a lack of Incident Response procedures, choosing not to follow PowerShell best practices, and MFA use for critical or sensitive applications. We also discuss ways …
 
Most Cyber Insurance companies belong to multiple Threat Intel services and Security rating companies for monitoring and analyzing their customers security posture and their cyber insurance rates. Threat Intel is very valuable for the Cyber insurers for monitoring their clients deep dark web and other areas of concerns as another data set in their …
 
This week's tools, tips, and tricks talk about a Windows Customization Tool called Winaero Tweaker. Download Winaero Tweaker - https://winaero.com/ Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can f…
 
PerSwaysion phishing campaign still ongoing, and pervasive FBI: FatPipe VPN zero-day exploited by APT for 6 months RedCurl corporate espionage hackers resume attacks with updated tools Thanks to our episode sponsor, Vulcan Cyber The fact that CISA felt the need to release the massive “Known Exploited Vulnerabilities Catalog” recently says everythin…
 
Thank you for tuning in. This is a special series dedicated to the men and women who volunteered and served in uniform in their home nations. This special series is highlighting these men and women who have transitioned from the military to a successful civilian career in Information Security. In Each episode we discuss their service, how they tran…
 
On today’s episode, we are joined by Andrew Obadiaru, CISO and Head of IT for Cobalt. Andrew discusses using soft skills to build connections within an organization. Listen to the episode to hear his advice on Two Roles in One Andrew discusses what it’s like to oversee both security and IT. The fields overlap in many ways and differ in others. He’s…
 
Scammers go after users of services but they also go after new users. This episode talks about the tactic to trick people in signing up for services with great-sounding deals and how to look out for these types of attacks. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podca…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Israel Defence Minister's Cleaner Charged With Spying for Iran Russian ransomware gangs start collaborating with Chinese hackers Microsoft Informs Users of High-Severity Vulnerability in Azure AD Critical Root RCE Bug Affects Multiple Netgear SOHO Router ModelsFBI Warns of Acti…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login