Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
SC Media, and our sponsor, VISO Trust, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
InfoSecSync is an Information Security Broadcast that promotes Information Security Awareness to the masses as well as industry professionals.
…
continue reading
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
…
continue reading
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
…
continue reading

1
McDonald’s outage update, Chrome URL protection, Birmingham Alabama outage
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34
Global McDonald’s outage blamed on third-party vendor, not cyberattack Google adds real-Time URL protection for Chrome Network outages hit Birmingham Alabama Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and securi…
…
continue reading

1
Week in Review: Russian Microsoft exfiltration, JetBrains Rapid7 feud, Change Healthcare fallout
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Alexandra Landegger, Executive Director and CISO Collins Aerospace Thanks to our show sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compli…
…
continue reading

1
🔴 March 15's Top Cyber News NOW! - Ep 579
1:37:58
1:37:58
Play later
Play later
Lists
Like
Liked
1:37:58
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
Change Healthcare fallout, Fortinet SQL warning, Yacht company breach
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55
Change Healthcare - AHA asks for aid, HHS questions HIPAA compliance Fortinet warns of severe SQLi vulnerability in FortiClientEMS software Yacht company MarineMax announces cyberattack Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for …
…
continue reading

1
🔴 March 14’s Top Cyber News NOW! - Ep 578
1:30:54
1:30:54
Play later
Play later
Lists
Like
Liked
1:30:54
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
The Demand for Affordable Blue Team Training
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Ron Gula, president and co-founder, Gula Tech Adventures. In this epi…
…
continue reading

1
Gemini vulnerabilities, NYT-OpenAI drama, GitHub leak report
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
Researchers find vulnerabilities in Gemini New York Times denies it “hacked” OpenAI for lawsuit Leaked GitHub secrets up 28% Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and security programs is increasingly chall…
…
continue reading

1
🔴 March 13's Top Cyber News NOW! - Ep 577
1:31:01
1:31:01
Play later
Play later
Lists
Like
Liked
1:31:01
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
LockBit claims hack, CISA understaffed, US and Russia election concerns
9:37
9:37
Play later
Play later
Lists
Like
Liked
9:37
LockBit takes credit for hacking South African pension fund CISA’s OT attack response team understaffed US and Russia accuse each other of potential election cyberattacks Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern complian…
…
continue reading

1
🔴 March 12’s Top Cyber News NOW! - Ep 576
1:54:25
1:54:25
Play later
Play later
Lists
Like
Liked
1:54:25
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
Securing Connections: 3rd Party Risk Mgmt Expert Insights - Charles Spence - CSP #165
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49
Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-politi…
…
continue reading

1
Roku forces reset, French agencies targeted, Fintech firm taken offline
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02
Roku forces reset after 15,000 accounts compromised French government agencies targeted in “unprecedented” attacks Fintech firm taken offline by ransomware attack Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and s…
…
continue reading

1
🔴 March 11’s Top Cyber News NOW! - Ep 575
1:33:04
1:33:04
Play later
Play later
Lists
Like
Liked
1:33:04
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
Microsoft breach update, CISA flags JetBrains, ChatGPT creds sale
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19
Microsoft says Russian hackers breached its systems, accessed source code CISA adds JetBrains TeamCity bug to its KEV catalog Over 225,000 compromised ChatGPT credentials for sale Thanks to today's episode sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern…
…
continue reading

1
Week in Review: German Webex gaffe, Google engineer indicted, Cloudflare’s AI firewall
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest David Cross, SVP/CISO, Oracle. Also check out David’s travel blog, DavidCrossTravels.com Thanks to our show sponsor, Conveyor Conveyor is the AI security review automation platform helping infosec teams automate everything from securely …
…
continue reading

1
🔴 March 8’s Top Cyber News NOW! - Ep 574
1:31:57
1:31:57
Play later
Play later
Lists
Like
Liked
1:31:57
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
FlipperZero attacks Teslas, Google engineer indicted, PetSmart attack warning
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44
Flipper Zero WiFi attack can unlock and steal Tesla cars Former Google engineer indicted for stealing AI secrets for Chinese companies PetSmart warns customers of credential stuffing attack Thanks to today's episode sponsor, Conveyor Conveyor is the AI security review automation platform helping infosec teams automate everything from securely shari…
…
continue reading

1
🔴 March 7’s Top Cyber News NOW! - Ep 573
1:34:02
1:34:02
Play later
Play later
Lists
Like
Liked
1:34:02
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
Why are CISOs Excluded from Executive Leadership?
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Ben Sapiro, head of global cyber secur…
…
continue reading

1
Online fraud hits record losses, states urge Meta to crack down on scammers, Apple issues update for zero-day flaw
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55
Online fraud hits record losses States urge Meta to crack down on scammers Apple issues update for zero-day flaw Thanks to today's episode sponsor, Conveyor Happy Thursday. Are you tired of us talking about how Conveyor’s AI security review automation software? We’ll stop talking about it if you come talk to them. Ready to give the market leading A…
…
continue reading

1
🔴 March 6’s Top Cyber News NOW! - Ep 572
1:57:42
1:57:42
Play later
Play later
Lists
Like
Liked
1:57:42
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
US cyber strategy update, spyware sanctions, ALPHV exits
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45
US cybersecurity strategy update on the way US Treasury issues first spyware sanctions UK denies responsibility for ALPHV takedown Thanks to today's episode sponsor, Conveyor Conveyor is the only GPT-powered customer trust portal that automates the entire customer security review process — from sharing your security posture and documents in a singl…
…
continue reading

1
🔴 March 5's Top Cyber News NOW! - Ep 571
2:01:49
2:01:49
Play later
Play later
Lists
Like
Liked
2:01:49
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
A Printout on Secure by Design When Utilizing 3rd Parties - Bryan Willett - CSP #164
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14
With CISA just putting out new “secure by design” guidance, Lexmark CISO Bryan Willett pulls the curtain back on the curtain back on how Lexmark is approaching secure-by-design in its products Lexmark is at the forefront of secure by design as their products constantly touch highly confidential information in regulated industries, along with an est…
…
continue reading

1
North Korea semiconductor hacks, ALPHV goes dark, China AI vouchers
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52
North Korea targets semiconductor industry ALPHV infrastructure goes dark China to offer computing vouchers to AI startups Thanks to today's episode sponsor, Conveyor AI is getting pretty smart so you shouldn’t settle for mediocre security questionnaire automation software that only generates the right answer 20 to 50 percent of the time or have to…
…
continue reading

1
🔴 March 4's Top Cyber News NOW! - Ep 570
1:46:31
1:46:31
Play later
Play later
Lists
Like
Liked
1:46:31
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
NSO code verdict, Change Healthcare fallout, law firm breach
8:02
8:02
Play later
Play later
Lists
Like
Liked
8:02
NSO Group to ordered to give Pegasus code to WhatsApp Change Healthcare confirms BlackCat, Schumer asks for aid Law firm announces data breach affecting 325,000 people Thanks to today's episode sponsor, Conveyor We’ve got a returning sponsor this week – Conveyor. They’re the AI security review automation platform helping infosec teams automate ever…
…
continue reading

1
Week in Review: GenAI BEC explodes, NIST updates framework, vending machine gaffe
27:37
27:37
Play later
Play later
Lists
Like
Liked
27:37
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Russ Ayres, SVP of Cyber & Deputy CISO, Equifax Thanks to our show sponsor, Egress People are the biggest risk to your organization’s security, and they are most vulnerable when using email. With more advanced threats getting through sec…
…
continue reading

1
🔴 March 1's Top Cyber News NOW! - Ep 569
1:51:33
1:51:33
Play later
Play later
Lists
Like
Liked
1:51:33
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
Cencora pharma breach, Gen-AI explodes BEC, Chinese doorbell warning
8:29
8:29
Play later
Play later
Lists
Like
Liked
8:29
Pharma giant Cencora announces data breach GenAI drives surge in BEC attacks Popular video doorbell easy hijacked Thanks to today's episode sponsor, Egress People are the biggest risk to your organizations' security and they are most vulnerable when using email. With more advanced threats getting through secure email gateway detection every day, Eg…
…
continue reading

1
Public-Private Partnership: How to Punish Bad Actors, Not Organizations
35:13
35:13
Play later
Play later
Lists
Like
Liked
35:13
In this episode of The New CISO, host Steve is joined by guest Ron Banks, CISO at Toyota Financial Services. In part one of his two-part interview, Ron shares how he transitioned from a fighter pilot to a cybersecurity leader. He also digs into what is required for a joint government, private industry, cyber offensive response. Listen to the episod…
…
continue reading

1
🔴 February 29's Top Cyber News NOW! - Ep 568
1:25:04
1:25:04
Play later
Play later
Lists
Like
Liked
1:25:04
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
What Is Your SOC's Single Search of Truth?
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Matt Eberhart, CEO, Query. In this episode: Isn't the whole…
…
continue reading

1
EO limits PII, Australia's espionage struggle, Lazarus zero-day
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04
Biden signs order limiting the sale of personal data Australia claims its seeing unprecedented “foreign interference” Lazarus Group targeting Windows and PyPi Thanks to today's episode sponsor, Egress People are the biggest risk to your organizations' security and they are most vulnerable when using email. With more advanced threats getting through…
…
continue reading

1
🔴 February 28's Top Cyber News NOW! - Ep 567
1:28:52
1:28:52
Play later
Play later
Lists
Like
Liked
1:28:52
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
NIST framework 2.0, Optum linked to BlackCat, ScreenConnect exploitations continue
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46
NIST releases cybersecurity framework 2.0 Optum attack linked to BlackCat ransomware ScreenConnect exploitations continue Thanks to today's episode sponsor, Egress People are the biggest risk to your organizations' security and they are most vulnerable when using email. With more advanced threats getting through secure email gateway detection every…
…
continue reading

1
🔴 February 27's Top Cyber News NOW! - Ep 566
2:21:02
2:21:02
Play later
Play later
Lists
Like
Liked
2:21:02
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
Intelligent Generative AI Handling - Aaron Weismann - CSP #163
26:01
26:01
Play later
Play later
Lists
Like
Liked
26:01
Generative AI security and integrity. This is important to me because it's a cool new commercially available technology that promises efficiency and time savings--and therefore everyone wants to use it without a thorough understanding of how to secure data used with it or correcting model bias introduced through improper governance. The implication…
…
continue reading

1
Cyber Security Headlines: SVR tactics, brand spamming, steel giant cyberattack
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55
SolarWinds attackers changing tactics Brand domains used in spam operation Steel giant hit with cyberattack Thanks to today's episode sponsor, Egress People are the biggest risk to your organizations' security and they are most vulnerable when using email. With more advanced threats getting through secure email gateway detection every day, Egress p…
…
continue reading

1
🔴 February 26's Top Cyber News NOW! - Ep 565
1:23:01
1:23:01
Play later
Play later
Lists
Like
Liked
1:23:01
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
Police taunt LockBit, PayPal’s cookie patent, vending machine controversy
8:02
8:02
Play later
Play later
Lists
Like
Liked
8:02
British police taunt LockBit administrator PayPal files patent for new stolen cookies detector Vending machine crash reveals face recognition tech Thanks to today's episode sponsor, Egress People are the biggest risk to your organizations' security and they are most vulnerable when using email. With more advanced threats getting through secure emai…
…
continue reading

1
Week in Review: LockBit gets bitten, airline bot gaffe, exploding car keys
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Thom Langford, CISO, Velonetic Thanks to our show sponsor, Conveyor Conveyor AI is so good, it can now autofill OneTrust portal questionnaires in one click. Yes, we’ve been talking about it all week. Conveyor's security questionnaire aut…
…
continue reading

1
🔴 February 23's Top Cyber News NOW! - Ep 564
1:33:08
1:33:08
Play later
Play later
Lists
Like
Liked
1:33:08
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
LockBit’s thwarted upgrade, AT&T’s massive outage, Change Healthcare cyberattack
9:58
9:58
Play later
Play later
Lists
Like
Liked
9:58
LockBit was building next gen encryptor before takedown Thousands of wireless customers suffer outage Prescription delays due to Change Healthcare cyberattack Thanks to today's episode sponsor, Conveyor Conveyor, the security questionnaire automation software one of their customers dubbed “my favorite security tool of the year”, is now even better.…
…
continue reading

1
🔴 February 22's Top Cyber News NOW! - Ep 563
1:31:06
1:31:06
Play later
Play later
Lists
Like
Liked
1:31:06
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
When Is Data an Asset and When Is It a Liability?
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is my guest, Mario Trujillo, staff attorney, Electro…
…
continue reading

1
LockBit gang doesn’t keep its word, the LockBit bounty, White House tackles U.S. maritime threats
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01
Thanks to today's episode sponsor, Conveyor Happy Thursday. Are you tired of us talking about how Conveyor’s AI can now autofill OneTrust security questionnaires in one-click? Well, we’ll stop talking about it if you come talk to them. Ready to give the market leading AI for security questionnaires a spin? Try a free proof of concept by booking a d…
…
continue reading

1
🔴 February 21's Top Cyber News NOW! - Ep 562
1:16:52
1:16:52
Play later
Play later
Lists
Like
Liked
1:16:52
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading

1
LockBit update, Signal usernames, NSA Cyber Director retires
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28
LockBit takedown update Signal now lets users keep phone numbers private NSA Cybersecurity Director Rob Joyce to retire Thanks to today's episode sponsor, Conveyor No more portal scaries. Conveyor just launched AI autofill of OneTrust portal questionnaires. That means no more clicking question-by-question to copy-paste each answer when a customer s…
…
continue reading

1
🔴 February 20's Top Cyber News NOW! - Ep 561
1:50:30
1:50:30
Play later
Play later
Lists
Like
Liked
1:50:30
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading