Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
…
continue reading
A podcast about the fundamentals of safe and resilient modeling systems behind the AI that impacts our lives and our businesses.
…
continue reading
Cybersecurity and data privacy is a requirement for any good business. So how can a CISO, CTO or compliance manager stay on top of where the industry is heading? Infosec veteran and former lead auditor, Blaise Wabo discusses the intersection of security, privacy and compliance. Topics include: Guest interviews with industry experts, framework updates, the business implications of compliance (and non-compliance), and discussions about compliance challenges, tips and tricks.
…
continue reading
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
The official podcast of RIMS, the Risk and Insurance Management Society. Tune in for weekly discussions about risk management hot topics, interviews with leaders in the profession, and updates on RIMS events and education.
…
continue reading
Whether you're a practicing Latent Print Examiner or you're interested in forensics and true crime, the Double Loop Podcast is a weekly show featuring Glenn Langenburg and Eric Ray discussing latent print topics, current events in forensic science, the newest research articles, interesting guests, and analysis of notable cases from a forensic scientist perspective.
…
continue reading
1
The Security Podcast of Silicon Valley, a YSecurity.io Production
Jon McLachlan and Sasha Sinkevich
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gat ...
…
continue reading
Welcome to Compliance Therapy™, hosted by industry expert Igor Volovich. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join Igor and renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA ...
…
continue reading
Learn about U.S. Exporting Trends and Regulation Changes that impact the U.S. Commercial Manufacturing Industry as well as the Defense Industrial Base. ITAR & EAR changes as well as Periodic Interviews with People of Industry. Hosted by Nicolette Reed
…
continue reading
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?
…
continue reading
Tech Talks are a podcast imagined and created by the folks over at the Center for Democracy and Technology (CDT). We're a 501(c)3 nonpartisan nonprofit organization that fights to put democracy and human rights at the center of the digital revolution. We work to promote democratic values by shaping technology policy and architecture, with a focus on equity and justice. #techtalkcdt Support CDT's work with a donation: https://cdt.org/techtalk/
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
…
continue reading
Hear the latest news about everything from quantum computers to astrophysics, all straight from scientists at the University of Maryland.
…
continue reading
A podcast that marries business and technology to help businesses and individuals leverage technology to accelerate growth. Brought to you biweekly by Eric Clark and Shane Kroening at SWICKtech.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Just two people trying to do IT and Security the right way.
…
continue reading
Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).
…
continue reading
Emagine the Future is a cybersecurity and technology podcast aimed to offer ambitious technology and national security professionals with actionable insights and unique stories from proven industry leaders. Each week, we release conversations with experts from the intelligence, defense, civilian, and private sectors where we discuss current events, career and skill development, technology and national security, and the future. Obtain the edge you need to stay current, to accelerate your deve ...
…
continue reading
Data security impacts all of us. How can we safeguard our identity, devices, and apps in the era of AI, ML, and cloud? Tune in to learn about the latest on data security, best practices to secure your data, and the future of data governance and protection with leading experts from all over the world.
…
continue reading
Cybersecurity is hard and every business regardless of size struggles to deal with its complexities. One of the pressing questions executives have is where is the easy button? The Bite Size Security Podcast is for executives & business owners to stay on top of emerging cybersecurity trends, news on risks and regulations, as well as proven strategies that will simplify your approach to addressing risks. Join your host & guide Mike Fitzpatrick, the Founder & CEO of NCX Group on Bite Size Secur ...
…
continue reading
Welcome to irResponsible AI —a series where you find out how NOT to end up on the New York Times headlines for all the wrong reasons! 💡 Why are we doing this? As experts, we are tired of the boring “mainstream corporate” RAI communication. Here, we give it to you straight. ⁉️ Why call it Irresponsible AI? Responsible AI exists because of irresponsible AI. Knowing what NOT to do can be, at times, more actionable than knowing what to do. 🎙️Who are your hosts? Why should you even bother to list ...
…
continue reading
1
UL NO. 449: China Hits US ISPs, NIST CSF 2.0, Russian Intel Attacks, Stagnant Companies...
54:16
54:16
Play later
Play later
Lists
Like
Liked
54:16
Life changing books, defining your core problems, the Apple updates, and much more... ➡ Check out Vanta and get $1000 off: vanta.com/unsupervised Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https:…
…
continue reading
1
#305 - Identity Week America with Ryan Galluzzo of NIST
57:24
57:24
Play later
Play later
Lists
Like
Liked
57:24
In this episode of the Identity at the Center podcast, Jeff and Jim are live at the Identity Week America conference in Washington, DC. Welcoming Ryan Galluzzo, Identity Management Program Lead at NIST, they dive into recent NIST updates, including a mobile driver's license project, changes in public comment and revision processes, and the signific…
…
continue reading
1
Live from Billington: NIST Center Helps Translate Cybersecurity Standards into Practice
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39
The future of cybersecurity is changing as threats evolve. NIST’s Cybersecurity Center of Excellence works with partners in the public and private sectors to address securing IT systems and critical infrastructure. Cherilyn Pascoe, director of NCCoE, at Billington Cyber Summit in Washington, D.C., discussed the center’s collaboration with industry …
…
continue reading
Eric and Glenn are back from a little summer break, prepping for the 2024 IAI Conference in Reno. They do a final “Where in the Whorld?” game. Then they jump into a recent paper on “Inconclusive” decisions (Swofford, et al. (2024) “Inconclusive Decisions and Error Rates in Forensic Science”, Forensic Science International: Synergy (vol 8; 100472)) …
…
continue reading
Enjoying the content? Let us know your feedback! In today episode we’re diving into something that’s been making waves in the cybersecurity community—NIST Cybersecurity Framework 2.0. The NIST Cybersecurity Framework has long been a cornerstone for building robust security practices, and with the release of version 2.0, there are some exciting new …
…
continue reading
1
A Conversation with Shiladitya Sircar from BlackBerry on DeepFake Threats
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44
In this conversation, I speak with Shiladitya Sircar, Senior VP of Product Engineering and Data Science at BlackBerry. We talk about: The Rise of Deepfakes and Cyber Threats Innovation Meets Malicious Intent: Deepfakes are not just a tech novelty; they’re a growing threat. From text-based phishing to hyper-realistic fake videos and audio, the lands…
…
continue reading
1
A Conversation with Shiladitya Sircar from BlackBerry on DeepFake Threats
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44
In this conversation, I speak with Shiladitya Sircar, Senior VP of Product Engineering and Data Science at BlackBerry. We talk about: The Rise of Deepfakes and Cyber Threats Innovation Meets Malicious Intent: Deepfakes are not just a tech novelty; they’re a growing threat. From text-based phishing to hyper-realistic fake videos and audio, the lands…
…
continue reading
1
The Critical Role of Identity in Creating Effective Ransomware Attack Defense and Broader Business Resilience Strategies | 7 Minutes on ITSPmagazine | A Semperis Short Brand Story with Simon Hodgkinson ...
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03
Semperis, a pioneer in identity-driven cyber resilience has published the results of its global ransomware study of nearly 1,000 IT and security professionals at organisations spanning multiple industries across the US, UK, France, and Germany. The study aims to understand the prevalence, frequency and costs of ransomware attacks—in both ransom pay…
…
continue reading
1
UL NO. 449: China Hits US ISPs, NIST CSF 2.0, Russian Intel Attacks, Stagnant Companies...
53:27
53:27
Play later
Play later
Lists
Like
Liked
53:27
Life changing books, defining your core problems, the Apple updates, and much more... Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler See you in the next one…
…
continue reading
1
The Ransomware Threat and the Resilience Imperative | A HITRUST Collaborate 2024 Conversation with Allan Liska | On Location Coverage with Sean Martin and Marco Ciappelli
24:19
24:19
Play later
Play later
Lists
Like
Liked
24:19
Guest: Allan Liska, Senior Security Architect and Ransomware Specialist, Recorded Future [@RecordedFuture] On Linkedin | https://www.linkedin.com/in/allan2 On Twitter | https://twitter.com/uuallan ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCybe…
…
continue reading
1
The Missing Link: How We Collect and Leverage SBOMs | An OWASP 2024 Global AppSec San Francisco Conversation with Cassie Crossley | On Location Coverage with Sean Martin and Marco Ciappelli
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25
Guest: Cassie Crossley, VP, Supply Chain Security, Schneider Electric [@SchneiderElec] On LinkedIn | https://www.linkedin.com/in/cassiecrossley/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/se…
…
continue reading
1
Identity Week: How AI Will Continue to Advance Biometric Tech
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44
Biometric technology has seen remarkable advancements in recent years, especially in areas like facial recognition. Arun Vemury, senior advisor for biometric and identity technologies at the Department of Homeland Security, shared how error rates in facial recognition have dropped tenfold over the past decade thanks to machine learning. He also hig…
…
continue reading
1
Identity Week: TSA is Innovating Digital Identity Solutions with AI
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13
Travelers around the world are seeing more opportunities to use digital documents to verify their identities at airports and other travel hubs. The Transportation Security Agency (TSA) is honing in on technologies that rely on biometrics and artificial intelligence to develop and create seamless solutions that cater to all travelers at these checkp…
…
continue reading
1
Li-On, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland... - SWN #413
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12
Through the Fire and Li-On Flames, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-413
…
continue reading
1
Cybersecurity has too many distractions and can the White House fix BGP? - Harish Peri, Harry Wilson, Darren Guccione - ESW #375
2:30:27
2:30:27
Play later
Play later
Lists
Like
Liked
2:30:27
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
…
continue reading
1
BOOK | The Warminster Series: J.V. Hilliard on His Journey from Defense Lobbyist to Fantasy Novelist and How the Mythical World he Created is Becoming a Video Game | A Conversation with J.V. Hilliard ...
37:29
37:29
Play later
Play later
Lists
Like
Liked
37:29
Get the The Warminster Series by J.V. Hilliard: https://amzn.to/3Zk4OFF Guest: J.V. Hilliard, Author On Twitter | https://x.com/JVHilliardBooks Website | https://jvhilliard.com/ _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast On ITSPmagazi…
…
continue reading
1
Identity Week: The Security and UX Standards That Power Digital Identity Programs
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39
In August, the National Institute of Standards and Technology (NIST) released a new draft of its Digital Identity Guidelines for the identity-proofing process. This covers technologies like digital wallets, passkeys and physical identification documents like REAL ID-compliant passports and drivers licenses. The draft outlines ways to boost privacy,…
…
continue reading
1
Recent Cyber Security Laws & Regulations - Lee Kim - PSW #842
3:04:37
3:04:37
Play later
Play later
Lists
Like
Liked
3:04:37
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
…
continue reading
1
Healthcare, Technology, Transhumanism, and a Garlic: A Deep Dive into the Future of Healthcare and Humanity | A Carbon, a Silicon, and a Cell walk into a bar... | A Redefining Society Podcast Series With ...
40:56
40:56
Play later
Play later
Lists
Like
Liked
40:56
Book: The Singularity Is Nearer: When We Merge with AI by Ray Kurzweil (Author) https://amzn.to/3Zk7CTa Guest: Dr. Bruce Y Lee, Executive Director of PHICOR (Public Health Informatics, Computational, and Operations Research) [@PHICORteam] On LinkedIn | https://www.linkedin.com/in/bruce-y-lee-68a6834/ On Twitter | https://twitter.com/bruce_y_lee Web…
…
continue reading
1
Generative AI and Large Language Model (LLM) Prompt Hacking: Exposing Systemic Vulnerabilities of LLMs to Enhance AI Security Through Innovative Red Teaming Competitions | A Conversation with Sander Schulhoff ...
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14
Guest: Sander Schulhoff, CEO and Co-Founder, Learn Prompting [@learnprompting] On LinkedIn | https://www.linkedin.com/in/sander-schulhoff/ ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/sean-mart…
…
continue reading
1
GovCast: GSA Cloud Chief Talks FedRAMP 2.0, Automation Hub
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17
General Service Administration Executive Director of Cloud Strategy Eric Mill briefed updates for the newly focused FedRAMP program and associated advisories for cloud service providers. FedRAMP’s Agile Delivery Pilot will help prepare the program for continuous assessments, a key part of FedRAMP 2.0’s evolution. He also previews FedRAMP’s Emerging…
…
continue reading
1
AI Trucks, Solid Concrete, Sonicwall, Progress, Rust, Apple, and more... - SWN #412
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19
AI Trucks, Solid Concrete, Sonicwall, Progress, Rust, Apple, and more, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-412
…
continue reading
1
Paying Down Tech Debt, Rust in Firmware, EUCLEAK, Deploying SSO - ASW #298
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25
Considerations in paying down tech debt, make Rust work on bare metal, ECDSA side-channel in Yubikeys, trade-offs in deploying SSO quickly, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-298
…
continue reading
1
Cybersecurity and the Business - Theresa Lanowitz - BSW #363
56:32
56:32
Play later
Play later
Lists
Like
Liked
56:32
Cybersecurity resilience, different from cyber resilience, is critical as threats grow in frequency and complexity. With digital innovation driving business, cybersecurity resilience is essential for maintaining stakeholder trust and compliance. But where do you start? Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Business Security Weekly …
…
continue reading
1
Georgia Tech Cybersecurity False Claims Scandal: Meet the Whistleblowers
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35
Introducing the Georgia Tech Whistleblowers. In this episode, the whistleblowers explain how they tried to stop Georgia Tech from allegedly LYING to the government about their NIST 800-171 compliance and what they have faced since they blew the whistle! Whistleblower attorney Julie Bracker also shares what could come next and how much Georgia Tech …
…
continue reading
1
Achieving Compliance in the Cloud through Continuous Controls Monitoring (CCM) | 7 Minutes on ITSPmagazine | A RegScale Short Brand Story with Travis Howerton
7:05
7:05
Play later
Play later
Lists
Like
Liked
7:05
With the rapid pace of cloud adoption, less time is spent ensuring that systems are built and operated effectively and with proper cyber hygiene. As a result, continuous controls monitoring (CCM) has emerged as indispensable for ensuring both security and regulatory compliance. Travis will discuss how CCM: transforms reactive security measures into…
…
continue reading
Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society. Justin Smulison interviews Elise Farnham about how ERM has changed, how new policies like the SEC climate disclosures influence the ERM landscape, and Elise’s risk philosophy. They discuss whether organizational leaders ar…
…
continue reading
1
North Korea Strategy to “Infiltrate” Foreign Companies
3:04
3:04
Play later
Play later
Lists
Like
Liked
3:04
KnowBe4 accidentally hired a North Korean state actor who tried to install info-stealing malware on their devices. They caught it in time, but it shows how good North Korean hackers are at pretending to be IT staff. | Bill Toulas | MORE Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmies…
…
continue reading
1
North Korea Strategy to “Infiltrate” Foreign Companies
3:04
3:04
Play later
Play later
Lists
Like
Liked
3:04
KnowBe4 accidentally hired a North Korean state actor who tried to install info-stealing malware on their devices. They caught it in time, but it shows how good North Korean hackers are at pretending to be IT staff. | Bill Toulas | MORE Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmies…
…
continue reading
1
Digital Dilemmas: Legal and Social Landscape of Ransom Payments with Justin Daniels | Cybersecurity Insights Podcast with Matthew Rosenquist
51:50
51:50
Play later
Play later
Lists
Like
Liked
51:50
Guest: Justin Daniels, M&A and Tech Transactions Attorney, Baker Donelson On LinkedIn | https://www.linkedin.com/in/justinsdaniels/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist ______________________ Episode Sponsors Are you interested in sponsoring an ITSPmagazine Chann…
…
continue reading
1
Charting the Path Forward: Navigating Security and Compliance at Collaborate 2024 | A HITRUST Collaborate 2024 Conversation with Leslie Jenkins, Robert Booker, Blake Sutherland, and Steve Perkins | On ...
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25
Guests: Leslie Jenkins, Sr. Director, Marketing, HITRUST [@HITRUST] On LinkedIn | https://www.linkedin.com/in/lsjenkins/ Robert Booker, Chief Strategy Officer, HITRUST [@HITRUST] On LinkedIn | https://www.linkedin.com/in/robertbooker/ Blake Sutherland, EVP Market Adoption, HITRUST [@HITRUST] On LinkedIn | https://www.linkedin.com/in/blake-sutherlan…
…
continue reading
1
Live from Billington: Boosting the Public Sector Cybersecurity Workforce
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46
The White House has made government cybersecurity hiring a priority, releasing a strategy in 2023 to address gaps. Agencies and their partners have stressed the need to build foundational cyber skills in Americans long-term. ISC2 is a professional association for cybersecurity pros, with more than 650,000 members. ISC2 Executive Vice President of A…
…
continue reading
1
Home Away from Home - Shivani Shetty's Cybersecurity Journey at Stevens Institute of Technology | Off the Record with Saman — Student Abroad Podcast
55:00
55:00
Play later
Play later
Lists
Like
Liked
55:00
Guest: Shivani Shetty, Cybersecurity Consultant, Cyber Arts On LinkedIn | https://www.linkedin.com/in/shettysshivani/ ________________________________ Host: Saman Fatima On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/saman-fatima ________________________________ This Episode’s Sponsors Are you interested in sponsori…
…
continue reading
1
AI-powered, Unified Detection and Response Platform Streamlines Cybersecurity for MSPs and IT Service Providers | 7 Minutes on ITSPmagazine | A Guardz Short Brand Innovation Story with Dor Eisner
7:05
7:05
Play later
Play later
Lists
Like
Liked
7:05
As cyber threats grow more sophisticated and target various aspects of businesses across digital assets and surfaces, a common practice is to increase the number of security layers a company uses, often tasked to an MSP. However, this approach has led to a new dilemma: MSPs are now dealing with managing a plethora of disparate point solutions simul…
…
continue reading
1
#304 - Identity and Cybersecurity Insights with United Airlines' CISO Deneen DeFiore
45:31
45:31
Play later
Play later
Lists
Like
Liked
45:31
In this episode of the Identity at the Center podcast, host Jim McDonald welcomes Deneen DeFiore, Chief Information Security Officer at United Airlines. The episode delves into Deneen's career path in identity, her extensive experience at General Electric, and the evolution of identity and access management practices. The conversation transitions t…
…
continue reading
1
It's a broken system | A conversation with David Benzaquen | What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman
1:03:40
1:03:40
Play later
Play later
Lists
Like
Liked
1:03:40
Guest: David Benzaquen, Founder and CEO, Mission: Plant LLC On LinkedIn | https://www.linkedin.com/in/davidbenzaquen/ Hosts: Alejandro Juárez Crawford On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford Miriam Plavin-Masterman On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-r…
…
continue reading
1
How To Find Great People to Work With - UBI & Talent Distribution
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31
This reminds me of a very similar lesson I learned when hiring in cybersecurity over 20 years: exposing people to training and encouragement makes the stars stand out, but it doesn’t turn everyone into stars. Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X…
…
continue reading
1
How To Find Great People to Work With - UBI & Talent Distribution
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31
This reminds me of a very similar lesson I learned when hiring in cybersecurity over 20 years: exposing people to training and encouragement makes the stars stand out, but it doesn’t turn everyone into stars. Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X…
…
continue reading
1
What is a Habitable Zone? | Stories From Space Podcast With Matthew S Williams
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes The term "habit…
…
continue reading
Enjoying the content? Let us know your feedback! In this episode we’re diving into an important topic that concerns one of the most trusted hardware security tokens on the market—the YubiKey 5 series. We’ll discuss a recently discovered vulnerability affecting YubiKeys and go over what it means for the broader world of authentication and cryptograp…
…
continue reading
1
Book | The Mango Chronicle: A Journey Through Stories, Memories, and Forgiveness | A Conversation with Ricardo Jose Gonzalez-Rothi | Audio Signals Podcast With Marco Ciappelli
37:54
37:54
Play later
Play later
Lists
Like
Liked
37:54
Guest: Ricardo Jose Gonzalez-Rothi, Author On LinkedIn | https://www.linkedin.com/in/ricardo-gonzalez-rothi/ On YouTube | https://www.youtube.com/@MangoforYou2day _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast On ITSPmagazine | https://ww…
…
continue reading