show episodes
 
Artwork

1
Unsolicited Response

Dale Peterson: ICS Security Catalyst and S4 Conference Chair

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
  continue reading
 
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
  continue reading
 
Artwork

1
Security Voices

Security Voices

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
Simply Defensive

Simply Cyber Media Group

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
  continue reading
 
In just 25 minutes, I deliver concise and thought-provoking conversations with top minds in technology, cybersecurity, business, culture and enterpreneurship. Whether you’re a technologist, executive, culture-enthusiast or someone passionate about growth, each episode explores trends, strategies and ideas that shape success. For those with limited time but unlimited ambition, 25Minutes offers actionable insights and fresh perspectives where they matter most. Your time is valuable. Your 25 mi ...
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Artwork

1
The OT Life

Cygnet Health Care

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to The OT Life: A careers podcast from the OTs of Cygnet Health Care. We created The OT Life for OTs around the country who are interested in hearing from people who share the same passion for Occupational Therapy.We chat all things OT from our opinions about the profession, our role in health and social care, stories and experiences, and career advice.This is the place to help you make the most of the profession you love.https://join.cygnethealth.co.uk/ot-life/
  continue reading
 
Artwork

1
Adulting with Autism

April Ratchford MS OT/L

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
🎙️ Adulting with Autism – 1.1 MILLION DOWNLOADS & GROWING! 🚀 Navigating adulthood as an autistic individual comes with unique challenges and triumphs. Hosted by April Ratchford, an autistic occupational therapist, this podcast is your go-to resource for independent living, career growth, relationships, and self-advocacy. 💡 Featuring Exclusive Interviews with Leading Experts & Advocates: 🎙 Dr. Robert Melillo – Neurodevelopmental expert & author (Disconnected Kids). 🎙 Amanda Ralston – Founder ...
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
  continue reading
 
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
The Critical Assets Podcast covers important OT and ICS security topics with an eye toward standards and regulation to keep you ahead of your adversaries... and your auditors. Ampyx Cyber. Securing your world. See our other content such as blogs, cybersecurity news and more at www.ampyxcyber.com
  continue reading
 
Artwork

1
The ALL NBA Podcast

ALLCITY Network

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
The ALL NBA Podcast, hosted by ESPN’s Tim Legler and DNVR’s Adam Mares, brings you the most insightful and in-depth NBA analysis four times a week. Stay updated with expert breakdowns, exclusive interviews, and discussions about NBA stars like LeBron James, Nikola Jokic, Steph Curry, and emerging talents around the league. Featuring notable NBA personalities, special guests, and reporters from across the ALLCITY Network, this is your premier destination for comprehensive NBA coverage.
  continue reading
 
Welcome to Control Intelligence, a ControlDesign.com podcast that goes deep inside the automation and technology that machine builders, system integrators and end users rely on to keep production humming efficiently
  continue reading
 
Artwork

1
The Get Cyber Resilient Show

Get Cyber Resilient

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott, Garrett O'Hara and Vinh Nguyen will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get ...
  continue reading
 
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
  continue reading
 
Artwork

1
Bits and Bytes by Byteworks

Matthew P. Scott and Joey Wenzler

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A Broad array of topics in the technology space Informative, relevant, and engaging. Without the self-serving narrative. We aim to share industry best practices, drive awareness, and discuss what thought leaders share. Companies or manufacturers often only focus on their area of interest, which is short-sighted, limiting, and siloed. Our diversity and partner network offers substantial, informative value. Similar challenges and growth aspirations exist in the b2b and b2c space. This podcast ...
  continue reading
 
Artwork

1
Tech Bytes

Packet Pushers

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Artwork

1
AWS Industrial Insights

Amazon Web Services

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
  continue reading
 
Designed for those who crave the inside scoop on everything from people to policy to profits, each THRIVE episode transforms complex business and HR topics into clear, actionable advice. Whether you’re an entrepreneur, a seasoned business owner, or an aspiring leader, this podcast is your go-to source for cutting through the noise and gaining a competitive advantage.
  continue reading
 
Dave Kittle, DPT of www.CashBasedPhysicalTherapy.org discuss Physical Therapy and Technology in this podcast. Full VIDEO versions of each episode can be found at https://www.youtube.com/PTTechTalk Dave Kittle also owns www.ConciergePainRelief.com (Home Physical Therapy) serving New York City, Long Island, NJ, and CT.
  continue reading
 
Artwork

1
Left to Our Own Devices

Cybellum Technologies LTD

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Hosted & produced by: *David Leichner, CMO at Cybellum - https://www ...
  continue reading
 
Loading …
show series
 
In this episode of 25minutes, cybersecurity expert John returns to discuss the lessons he has learned over two decades in IT and OT security, focusing on the realities of risk management, leadership and the evolving threat landscape. We explore why common sense in security is often an illusion, what Zero Trust really means beyond the buzzword and h…
  continue reading
 
The explosion of connected devices is creating new cybersecurity challenges. In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, sits down with Hollie Hennessy, Principal Analyst for IoT Cybersecurity at Omdia. Hollie shares insights into the evolving risks posed by IoT devices, from industrial control s…
  continue reading
 
On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe shares a bit of follow up on scam victims sharing their experiences o…
  continue reading
 
Tim Legler and from Bleacher Report, guest host Andy Bailey break down how the Warriors beat the Bucks without Steph Curry. They also dive into Jimmy Butler’s two-way impact, Giannis and Damian Lillard’s playoff potential, Steph’s injury concerns, and how Kawhi Leonard and Bogdan Bogdanovic powered the Clippers past the Cavaliers. Plus, Cavs takeaw…
  continue reading
 
Dino Busalachi sits down with Carlos Buenaño, CTO of Armis, to explore the evolving cybersecurity challenges in industrial control systems (ICS) and operational technology (OT). Carlos shares insights from his extensive experience in process control engineering, industrial network security, and IT-OT convergence. He sheds light on how organizations…
  continue reading
 
Hey friends! 🌟 Navigating the workplace as an autistic professional? Whether you're stepping into your first job or facing challenges in a corporate environment, this episode is packed with game-changing strategies to help you thrive! Today, I’m joined by Morag Barrett, a leadership and workplace culture expert, to break down: ✔️ Bridging the gap b…
  continue reading
 
Organizations continue to suffer from security breaches, too many of which contain a human element. But there’s no consistent definition of the risk posed by human-related breaches, and recommendations are often limited to security awareness and training (SA&T). Understanding the depth and breadth of human-related breaches is critical to implementi…
  continue reading
 
Mike Holcomb, global lead for ICS and OT cybersecurity at Fluor, joins the Nexus Podcast to discuss his advocacy and efforts to educate engineers and IT cybersecurity professionals in the nuances of protecting operational technology and industrial control systems. Mike produces and hosts a learning series available for free on YouTube called "Getti…
  continue reading
 
It’s becoming easier for criminals to use counterfeit or altered chips in common office products, such as printer toner cartridges, with the aim of espionage or simple financial gain. Tony Moore, Senior Director Of Silicon Lab Services For IOActive, explains how the hacking embedded silicon within common objects in our day to day lives is becoming …
  continue reading
 
Tim Legler and Adam Mares break down the biggest NBA storylines, including Rudy Gobert’s ejection in the Timberwolves’ OT loss to the Pacers and Obi Toppin’s clutch performance. They dive into how late scratches impact game prep, Russell Westbrook’s triple-double and leadership for the shorthanded Nuggets over the Warriors, Christian Braun’s absenc…
  continue reading
 
Welcome back to the To the Point cybersecurity podcast, presented by Forcepoint! In this episode, hosts Rachael Lyon and Jonathan Knepper continue their engaging conversation with Michele Rigby Assad, a former CIA intelligence officer and renowned author of "Breaking Cover" and "Get Off the X." Join us as Michele shares her unique insights into the…
  continue reading
 
In episode 873, we dive deep into 5G security with Anand Oswald, Sr. VP and GM of Network Security at Palo Alto Networks. Explore the transformative impact of 5G on industries and how the convergence of technologies like AI and IoT drives 5G digital transformations. Learn about managing sophisticated threats, the importance of a zero-trust approach…
  continue reading
 
The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
  continue reading
 
Please enjoy this encore of Word Notes. The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, You…
  continue reading
 
The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, YouTube, 11 Nov. 2017, Learn more about you…
  continue reading
 
Tim Legler and Adam Mares break down the Bucks’ win over the Pacers and highlight Kevin Porter Jr.'s emergence as a key x-factor. The Thunder notch statement wins over the Pistons and Bucks—are they already playoff ready, and can Chet Holmgren become a consistent three-point threat? The Cavs fall to the Magic—what worked for Orlando, and should Cle…
  continue reading
 
Today on the Tech Bytes podcast we dive into 5G security with sponsor Palo Alto Networks. 5G services are being adopted worldwide for use cases such as IoT, connected vehicles, and AR and VR. At the same time, the number of threats against 5G is growing. We’ll talk about Palo Alto Networks Prisma SASE 5G,... Read more »…
  continue reading
 
In episode 872 of CXOTalk, we explore the capabilities of AI-powered smartphones in professional photography. Joining us are two former Apple engineers, Ziv Atar and Tom Bishop. They are the minds behind the iconic portrait mode on iPhones and are now the founders of GLASS Imaging. They discuss how neural networks are revolutionizing smartphone cam…
  continue reading
 
Penetration tests are probably the most common and recognized cybersecurity consulting services. Nearly every business above a certain size has had at least one pentest by an external firm. Here's the thing, though - the average ransomware attack looks an awful lot like the bog standard pentest we've all been purchasing or delivering for years. Yet…
  continue reading
 
NBA Insider Marc Stein joins Adam Mares to break down key takeaways from the OKC Thunder's win over the Boston Celtics. They also dive into which teams have a "puncher's chance" at the NBA Championship — including the Golden State Warriors, Los Angeles Lakers, and Minnesota Timberwolves. Plus, they discuss the Phoenix Suns' offseason plans and thei…
  continue reading
 
Hey there, fabulous listener! 🎉 April's bringing all the awareness vibes with Autism Awareness Month & Occupational Therapy Month on the horizon. I'm diving into a whopping 30 days of juicy content across YouTube and podcasts. Can I pull it off? Stick around and see if this 49-year-old can hang! 🎂PS, there's an episode on my birthday! 🎉 Join Stacey…
  continue reading
 
Tim Legler and Adam Mares break down the Warriors’ dominant win over the Kings, in spite of Steph Curry and Jimmy Butler's low scoring output. Are the Warriors back to championship form, is Jonathan Kuminga finally getting the respect he deserves, how important is Quentin Post to this team? Tim Legler sees Golden State as real title contenders. Cur…
  continue reading
 
Breaking down silos while securing the cloud and leveraging secure-by-design advancements. The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns. And while these fac…
  continue reading
 
Sounil Yu joins us to kick things off with AI defenses: Enterprise AI search tools like Copilot for Microsoft 365 lack the in-depth access controls required to ensure that query responses align with the user’s need-to-know boundaries. Without proper controls, these tools accelerate the discovery of improperly secured sensitive files within the orga…
  continue reading
 
Organizations in the industrial sector continue to invest in cybersecurity, but are they truly secure, or just leaning on a false sense of comfort? In this episode, industry experts Dino Busalachi and Craig Duckworth, dive into the dangerous gap between perception and reality when it comes to OT cybersecurity. They discuss real-world challenges, fr…
  continue reading
 
The chair of the Federal Reserve said that Americans should expect economic fluctuation and inflation while adjusting to the implementation of new policies, but the target of 2% is on track. Gene Marks comments on that while noting that the Paychex Small Business Employment Watch continues to show moderate job growth but stagnant hourly earnings gr…
  continue reading
 
In this special Women’s History Month episode of Threat Vector, host David Moulton speaks with four trailblazing women in cybersecurity who are shaping the industry: Kristy Friedrichs, Chief Partnerships Officer; Tanya Shastri, SVP of Product Management; Sama Manchanda, Consultant at Unit 42; and Stephanie Regan, Principal Technical Architect at Un…
  continue reading
 
On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start out with some follow up on chicken talk from last week. M…
  continue reading
 
Hey, happy Wednesday! How's your week going? I'm still catching up after being under the weather, and I'm behind on just about everything – t-shirts, recording, you name it. And I'm really missing Z this week as he's away figuring out his vocational path, which makes the house feel a bit too quiet. In this week's episode, we're delving into stories…
  continue reading
 
Noam Krasniansky, the visionary founder of Komposite Blockchain, joins Business Security Weekly to explore Web3's transformative potential. Noam delves into the basics of blockchain technology, Bitcoin and the meteoric rise of Ethereum, and the critical role of decentralized systems in safeguarding brands against counterfeiting—a global issue costi…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play