Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
Join the Intego Mac security experts for the latest Apple news, industry opinions, and a splash of security advice in our easy-to-digest, entertaining, and informative podcast series. Hosted by Kirk McElhearn and Josh Long.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
As one of the longest-running podcasts, "Grumpy Old Geeks" discovers what went wrong on the Internet, and who's to blame. Every week they cut through the BS from big tech and tell you what's really going on. With wide-ranging topics, this show has something for everyone. There is a reason Elon Musk, Mark Zuckerberg, and that crowd all hate this podcast. Listen and find out for yourself!
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Internet safety, security, and digital parenting tips. You'll learn about protecting kids online (cybersafety), and general digital security and privacy (for adults as well as kids). https://DefendingDigital.com
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
The most recent additions to the Internet Archive collections. This RSS feed is generated dynamically
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Johnny Ball is famous for knowing many things, so who better to tell you how to keep your computer safe from online fraud. Johnny's guides contain all you need to know about internet and email security. There are four wisdom-packed episodes to download onto your computer and portable audio player.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
…
continue reading
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
If you're looking for a bunch of us security nerds to get together and talk shop, then Paul’s Security Weekly is for you. This show features interviews with folks in the security community; technical segments, which are just that, very technical; and security news, which is an open discussion forum for the hosts to express their opinions about the latest security headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more. The topics vary greatly and the ...
…
continue reading
Archive is an investigative documentary series hosted by Tommie Trelawny and Nicky Anderson. Following the success of The Interruption, listeners can expect another captivating story from Season Two: The World's Hardest Puzzle. In 2012, a mysterious organisation known as Cicada 3301 announced itself on the message board, 4chan. The cryptic post appeared online, seeking 'highly intelligent individuals.' What followed became known as the hardest puzzle on the internet. One that took players ac ...
…
continue reading
The Security Ledger: Cyber Security News & Analysis for The Internet of Things
…
continue reading
This is the Internet Report, where we uncover what’s working and what’s breaking on the Internet—and why. Catch our Outage Deep Dive series for special coverage of Internet outages. We go under the hood to determine what happened, covering key lessons and ways IT teams can minimize downtime in similar situations. Also tune in every other week for the Pulse Update podcast series to hear from the Internet experts at ThousandEyes as they share the latest data on ISP outages, public cloud provid ...
…
continue reading
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
Host Jay Benjamin will help you learn how to use a new Linux Operating System. Find out how easy it is to keep your computer safe from preying eyes. When you need answers to questions concerning a Linux operating system or why you should consider converting your current laptop or desktop computer, we will promptly get you the information needed to confidently convert your computer and make the switch to an operating system that will give you Internet freedom for many years to come."The Linux ...
…
continue reading
Unspoken Security by ZeroFox is a raw and gritty podcast for cybersecurity professionals who are looking to understand how the internet is being leveraged by threat actors. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share practical insights, and address the blunt truths surrounding cybersecurity. Ultimately, the lessons learned will enable security professionals to take an intel-driven, proactive approach to physical and cybersecurity th ...
…
continue reading
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users -- whether artists, coders, creators, developers, companies, organizations, or communities -- now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. Fro ...
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Internationally acclaimed journalist and filmmaker Jon Ronson (Adventures with Extremists, The Men Who Stare At Goats and New York Times Bestseller The Psychopath Test) turns his attentions to the Internet. Specifically, those people who try to control it -- for good or bad. Escape and Control: Stories About People Trying To Control The Internet It can sometimes feel like we're creating a new kind of democracy online, where we control and regulate each other instead of being told how to beha ...
…
continue reading
Analzying Synology Disks https://isc.sans.edu/diary/Analyzing%20Synology%20Disks%20on%20Linux/30904 RSA Panel https://www.rsaconference.com/usa/agenda/session/The%20Five%20Most%20Dangerous%20New%20Attack%20Techniques%20You%20Need%20to%20Know%20About SANS.edu Research Journal https://www.sans.edu/cyber-security-research…
…
continue reading
1
Network Security News Summary for Thursday May 09th, 2024
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10
Analyzing Synology Disks; RSA Panel; SANS.edu Research Journal Analzying Synology Disks https://isc.sans.edu/diary/Analyzing%20Synology%20Disks%20on%20Linux/30904 RSA Panel https://www.rsaconference.com/usa/agenda/session/The%20Five%20Most%20Dangerous%20New%20Attack%20Techniques%20You%20Need%20to%20Know%20About SANS.edu Research Journal https://www…
…
continue reading
1
The Internet of Things is Less Secure Than You Think w/FCC Commissioner Simington
1:05:27
1:05:27
Play later
Play later
Lists
Like
Liked
1:05:27
The number of internet-connected devices in the world has skyrocketed. According to one estimate, there are currently 17 billion connected devices in the world. This doesn’t just include well known electronics like laptops and smartphones. These devices span every sector of the global economy—from agriculture and manufacturing to healthcare and sci…
…
continue reading
1
Why Is Your TV & NAS On The Internet? - PSW #824
1:56:48
1:56:48
Play later
Play later
Lists
Like
Liked
1:56:48
Ahoi new VM attacks ahead! HTTP/2 floods, USB Hid and run, forwarded email tricks, attackers be scanning, a bunch of nerds write software and give it away for free, your TV is on the Internet, Rust library issue, D-Link strikes again, EV charging station vulnerabilities, and rendering all cybersecurity useless. Show Notes: https://securityweekly.co…
…
continue reading
In this episode, host Bidemi Ologunde spoke with Karisya "Ysa" Moran-Adames, a Corporate Banking Analyst at MUFG and the Founder/CEO of Project SonrYsa, a community-focused effort to provide food to low-income students and their families during weekends. The conversation touched on her family background, her volunteering and community organizing ef…
…
continue reading
1
Hacker Heroes - Jeremiah Grossman - PSW #828
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23
Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cybersecurity landscape. As a recognized expert, Jeremiah has played a pivotal role in shaping the discourse around web security and risk management. Jeremiah's journey in cybersecurity i…
…
continue reading
1
Episode 343: Apple “Let Loose”: iPad Pro gets M4 and OLED
28:12
28:12
Play later
Play later
Lists
Like
Liked
28:12
We look at what Apple let loose at this week's Apple event: the M4 chip, updated iPads, and the Apple Pencil Pro. Show Notes: Apple Revamps iPad Line, with M4 Processor, New Magic Keyboard, and Apple Pencil Pro Which iPad Is Best for You in 2024? Everything you can do with the Apple Pencil and Logitech Crayon on your iPad Intego Mac Premium Bundle …
…
continue reading
1
The Art of Possible In the World of Enterprise Storage Solutions | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A Infinidat Story with Bill Basinas
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58
7 Minutes Conversation at RSA Conference As the Senior Director of Product Marketing, Bill Basinas brings a wealth of experience and knowledge as he seats down with Sean Martin for a new episode of "7 Minutes on ITSP Magazine" live from the RSA Conference. Bill shared insights into how Infinidat is redefining the landscape of storage solutions. Bri…
…
continue reading
1
Revolutionizing Network Security: How to strategies the relationship between IT and OT | A Brand Story Conversation From RSA Conference 2024 | A Dispersive Story with Rajiv Pimplaskar | On Location Coverage ...
20:35
20:35
Play later
Play later
Lists
Like
Liked
20:35
One company at the forefront of redefining IT security is Dispersive, led by the visionary CEO, Rajiv Pimplaskar. In a recent discussion with Sean Martin of ITSP Magazine at the RSA Conference, Rajiv shared insights into Dispersive's cutting-edge approach to network security and how they are revolutionizing the industry. Unveiling Dispersive's Stea…
…
continue reading
1
Unmasking LockBitsupp, company extortion, and a Tinder fraudster
51:11
51:11
Play later
Play later
Lists
Like
Liked
51:11
The kingpin of the LockBit ransomware is named and sanctioned, a cybersecurity consultant is charged with a $1.5 million extortion, and a romance fraudster defrauded women he met on Tinder of £80,000. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole …
…
continue reading
1
Is there a Frankenstein's Industry Monster lurking in the shadow at RSAC 2024? | Cybersecurity Chronicles from Broadcast Alley with Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli ...
35:20
35:20
Play later
Play later
Lists
Like
Liked
35:20
Guest: Christina Stokes, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes On LinkedIn | https://www.linkedin.com/in/xTinaStokes/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefini…
…
continue reading
1
Corporate Ransomware Deep Dive - Mikko Hypponen - PSW #828
56:06
56:06
Play later
Play later
Lists
Like
Liked
56:06
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Show Notes: https://securityweekly.com/psw-828
…
continue reading
1
Empowering Businesses Through IT and Security Transformation | A Brand Story Conversation From RSA Conference 2024 | An Open Systems Story with Tim Roddy | On Location Coverage with Sean Martin and Marco ...
20:06
20:06
Play later
Play later
Lists
Like
Liked
20:06
In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of busin…
…
continue reading
1
Embracing Zero Trust: A Conversation with Object First and Numberline Security | A Brand Story Conversation From RSA Conference 2024 | An Object First Story with Anthony Cusimano and Jason Garbis | On ...
21:36
21:36
Play later
Play later
Lists
Like
Liked
21:36
On the of cybersecurity planet, one term that continues to resonate and shape organizations' security strategies is Zero Trust. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Anthony Cusimano from Object First and Jason Garbis from Numberline Security to talk about Zero Trust and its implications for data security an…
…
continue reading
1
Shaking Up the Security Information and Event Management Market | A Brand Story Conversation From RSA Conference 2024 | An Abstract Security Story with Colby DeRodeff | On Location Coverage with Sean Martin ...
18:26
18:26
Play later
Play later
Lists
Like
Liked
18:26
In the bustling atmosphere of the RSA Conference, a conversation unfolded that shed light on the evolution of cybersecurity and the innovative solutions paving the way for a more efficient and effective approach to data management. Colby DeRodeff, the CEO and co-founder of Abstract Security, shared insights into the journey that led to the creation…
…
continue reading
1
From Data to Defense. Behind the Scenes of the DirectDefense's Threat Report Insights | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Jim Broome | On Location Coverage ...
21:19
21:19
Play later
Play later
Lists
Like
Liked
21:19
In cybersecurity, understanding the constantly evolving landscape of threats is key to safeguarding digital assets and sensitive information. DirectDefense, a leading security services provider, offers valuable insights into the world of threat intelligence through a candid conversation with Jim Broome, the Director of DirectDefense. In a recent di…
…
continue reading
1
Presenting The Superhero Product for Browser Security at RSA Conference | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean ...
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30
As we journey through the ever-evolving landscape of enterprise and individual cybersecurity, it is clear for organizations that is it essential to stay one step ahead of malicious actors looking to exploit vulnerabilities. One such innovative solution, SquareX, has emerged as a superhero product in the market of browser security, providing a dynam…
…
continue reading
1
Ethics and Technology | Cyber Cognition Podcast with Hutch and Len Noe
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26
Hosts: Hutch On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/hutch Len Noe, Technical Evangelist / Whitehat Hacker at CyberArk [@CyberArk] On Twitter | https://twitter.com/hacker_213 On LinkedIn | https://www.linkedin.com/in/len-noe/ ______________________ Episode Sponsors Are you interested in sponsoring an ITSPmaga…
…
continue reading
Detecting XFinity/Comcast DNS Spoofing https://isc.sans.edu/diary/Detecting%20XFinity%20Comcast%20DNS%20Spoofing/30898 Weblogic PoC CVE-2024-21006 https://pwnull.github.io/2024/oracle%20weblogic%20CVE-2024-21006%20Double-JNDInjection%20RCE%20analyze/ https://github.com/momika233/CVE-2024-21006 PDF.js React PDF Vulnerablity https://securityonline.in…
…
continue reading
1
Network Security News Summary for Wednesday May 08th, 2024
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14
ISP DNS Spoofing; Weblogic PoC; PDF.js / React PDF Vuln; Tinyproxy Detecting XFinity/Comcast DNS Spoofing https://isc.sans.edu/diary/Detecting%20XFinity%20Comcast%20DNS%20Spoofing/30898 Weblogic PoC CVE-2024-21006 https://pwnull.github.io/2024/oracle%20weblogic%20CVE-2024-21006%20Double-JNDInjection%20RCE%20analyze/ https://github.com/momika233/CVE…
…
continue reading
1
Navigating the Future of AI Governance with LogicGate | A Brand Story Conversation From RSA Conference 2024 | A LogicGate Story with Matt Kunkel and Nick Kathmann | On Location Coverage with Sean Martin ...
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53
The RSA Conference in San Francisco is renowned for being a hub of cutting-edge discussions around everything related to cybersecurity, and this year, one of the spotlight was on and AI governance. In this conversation featuring industry experts from LogicGate, the focus was on unraveling the challenges organizations face in adapting to the rapidly…
…
continue reading
1
Innovations in Cybersecurity and Threat Intelligence Solutions | A Brand Story Conversation From RSA Conference 2024 | A MITRE Story with Jon Baker | On Location Coverage with Sean Martin and Marco Ciappelli ...
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57
The cybersecurity landscape is ever-evolving, and staying ahead of threats requires constant innovation and collaboration. At the recent RSA Conference, industry experts gathered to discuss the latest trends and advancements in the field. One of the On Location Coverage with Sean Martin and Marco Ciappelli was the insightful conversation between Se…
…
continue reading
How's your identity governance? Richard talks to Jef Kazimer from Microsoft about Entra's capabilities to help you have robust governance around identity. Jef talks about the lifecycle of identity - when someone joins the organization and a new identity gets created, privileges changing as roles evolve, to the eventual offboarding when that person …
…
continue reading
The 17th annual Verizon Data Breach Investigation Report reveals key findings and trends in cybersecurity. The report highlights the increase in vulnerability exploitation for initial access, the continued prevalence of human error in breaches, the rise of pure extortion attacks, and the limited impact of generative AI in the cybersecurity landscap…
…
continue reading
Blind and low-vision people have experienced remarkable gains in information literacy because of digital technologies, like being able to access an online library offering more than 1.2 million books that can be translated into text-to-speech or digital Braille. But it can be a lot harder to come by an accessible map of a neighborhood they want to …
…
continue reading
Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. S…
…
continue reading
DHCP Based VPN Routing Leaks https://www.leviathansecurity.com/blog/tunnelvision Mullvad VPN DNS Traffic Leak https://mullvad.net/en/blog/dns-traffic-can-leak-outside-the-vpn-tunnel-on-android Tiny Proxy Vulnerability https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889By Dr. Johannes B. Ullrich
…
continue reading
1
Network Security News Summary for Wednesday May 08th, 2024
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28
VPN Routing Leaks; Mullvad VPN Traffic Leak; Tiny Proxy unpatches RCE Vuln; DHCP Based VPN Routing Leaks https://www.leviathansecurity.com/blog/tunnelvision Mullvad VPN DNS Traffic Leak https://mullvad.net/en/blog/dns-traffic-can-leak-outside-the-vpn-tunnel-on-android Tiny Proxy Vulnerability https://talosintelligence.com/vulnerability_reports/TALO…
…
continue reading
1
Navigating the World of Operational Technology and Cybersecurity | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Chris Walcutt | On Location Coverage with Sean Martin ...
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08
In a recent episode recorded live at the RSA Conference, an insightful discussion unfolded between Sean Martin and Chris Walcutt on the intersection of operational technology (OT) and cybersecurity. The conversation look into the challenges, insights, and best practices surrounding these vital areas of technology. Let's dive deeper into the key tak…
…
continue reading
1
Unveiling the World of Bad Bots: Insights from Imperva's 11th Edition Report | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Erez Hasson | On Location Coverage with Sean Martin ...
21:38
21:38
Play later
Play later
Lists
Like
Liked
21:38
The world of cybersecurity never ceases to amaze with its intricacies and challenges. One of the ongoing battles that organizations face is the constant threat posed by bad bots infiltrating the digital landscape. In a recent interview with Sean Martin and Erez Hasson from Imperva, key insights from the 11th edition of the Bad Bot Report were unvei…
…
continue reading
1
Embracing the Art of Possible | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Nanhi Singh | On Location Coverage with Sean Martin and Marco Ciappelli
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41
In the buzzing atmosphere of the RSA conference in San Francisco, key players in the cybersecurity industry gathered to discuss the evolving landscape of technology and data security. Among them was Nanhi Singh, the General Manager for the application security business of Imperva, who shared insights on how organizations are redefining cybersecurit…
…
continue reading
1
Embracing Data-Centric Security | A Brand Story Conversation From RSA Conference 2024 | A Seclore Story with Vishal Gupta | On Location Coverage with Sean Martin and Marco Ciappelli
13:09
13:09
Play later
Play later
Lists
Like
Liked
13:09
Amidst the buzzing atmosphere of RSA Conference 2024, Sean Martin, host an On Location Brand Story With ITSPmagazine, engages in a thought-provoking discussion with Vishal Gupta, co-founder of Seclore. The theme of this year's conference, the Art of Possible, sets the stage for a conversation that unravels the critical role of data in driving busin…
…
continue reading
1
Redefining Cybersecurity by Unlocking Government and Startup Collaboration While Enhancing Software Supply Chain Visibility | A Conversation with Melissa Oh and Anil John | Redefining CyberSecurity with ...
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00
Guests: Melissa Oh, Managing Director, Silicon Valley Innovation Program (SVIP), DHS Science & Technology Directorate [@DHSgov] On LinkedIn | https://www.linkedin.com/in/melissa-oh/ Anil John, Technical Director, Silicon Valley Innovation Program (SVIP), DHS Science & Technology Directorate [@DHSgov] On LinkedIn | https://www.linkedin.com/in/aniljo…
…
continue reading