show episodes
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork
 
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
  continue reading
 
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
  continue reading
 
Zero Gravity LIVE is the ultimate destination for tech enthusiasts! Join us every Tuesday for a captivating live stream experience as we explore the latest and greatest in IT, tech, security, and storage news, and if you missed it, that's what the podcast is here for! The Zero Gravity Podcast delivers our weekly tech talk to your feed every week. Our show features interviews with leading experts in the field of technology, who will share their insights and knowledge with you. We’ll keep you ...
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Monthly
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Artwork

1
The Ransomware Files

Jeremy Kirk, Executive Editor, Information Security Media Group

Unsubscribe
Unsubscribe
Monthly
 
The Ransomware Files podcast tells the harrowing stories of technology experts who have fought back against ransomware, which is one of the greatest crime waves the internet has ever seen. It features in-the-trenches stories about how organisations recovered and frank human reflections from those who have faced file-encrypting malware, a potent weapon used by high-tech criminals.
  continue reading
 
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
  continue reading
 
Artwork

1
Modem Mischief

Keith Korneluk

Unsubscribe
Unsubscribe
Monthly+
 
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
  continue reading
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
  continue reading
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork
 
The Predatar Podcast is back for 2024. Each episode will dive into a different aspect of Recovery Assurance, helping to keep security and IT leaders informed of what's new in this fast-moving area of technology.
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
  continue reading
 
Artwork

1
CISO Series Podcast

David Spark, Mike Johnson, and Andy Ellis

Unsubscribe
Unsubscribe
Weekly
 
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
  continue reading
 
Artwork

1
Tech for Leaders

Mazars in the UK

Unsubscribe
Unsubscribe
Monthly
 
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
  continue reading
 
"The real price of everything is the toil and trouble of acquiring it." -Adam Smith (WoN, Bk I, Chapter 5) In which the Knower of Important Things shows how transaction costs explain literally everything. Plus TWEJ, and answers to letters. If YOU have questions, submit them to our email at taitc.email@gmail.com There are two kinds of episodes here: 1. For the most part, episodes June-August are weekly, short (<20 mins), and address a few topics. 2. Episodes September-May are longer (1 hour), ...
  continue reading
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

Unsubscribe
Unsubscribe
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
Artwork

1
Crime News Insider

San Diego Deputy District Attorneys Association

Unsubscribe
Unsubscribe
Monthly
 
True crime. Real prosecutors. Expert analysis. Experienced prosecutors from San Diego, CA discuss the latest crime news, interview criminal justice leaders, and bring you their expert analysis.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
  continue reading
 
Artwork

1
ITSPmagazine Podcast Network

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

Unsubscribe
Unsubscribe
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/infinidat-revolutionizes-enterprise-cyber-storage-protection-combats-ransomware-and-malware-threats. Sophisticated cyberattacks, including new sinister forms of AI-driven attacks, are increasingly targeting the data storage infrastructure of enterprises. Check more stories…
  continue reading
 
As we’ve discussed numerous times on Security Breach, terms like change, evolution and constant are more than just buzz terms – they’re a simple reality of working in the industrial OT space. Whether we’re discussing threat actors from Stuxnet to Lockbit, tactics from social engineering to double-extortion ransomware, or vulnerability sources rangi…
  continue reading
 
Arctic Wolf’s 2024 report reveals 45% of companies faced ransomware attacks in the past year, highlighting the urgent need for improved security measures. Check out this excerpt from the Insuring Cyber Podcast where Carrier Management Deputy Editor Elizabeth Blosfield talks with Arctic Wolf’s Chief Product and Services Officer Dan Schiappa about th…
  continue reading
 
Change Healthcare suffered a ransomware attack in February that affected a substantial number of Americans, TikTok offered a “kill switch, to U.S. lawmakers, and Google is pausing real-money games globally less India. https://open.acast.com/public/streams/619570402eacc3a36070252c/episodes/6675a5f9a4ecc300124cb52f.mp3 Please SUBSCRIBE HERE. You can …
  continue reading
 
Stay informed about the latest trends in the ransomware landscape with CYFIRMA's May 2024 Ransomware report. This edition highlights significant increases in ransomware activity, with LockBit3 surging tremendously and Play rising by 10.34%. Incransom's activity doubled, while RansomHub and Medusa also showed notable activity. Manufacturing, real es…
  continue reading
 
The recent rash of ransomware-induced outages has truly created a "not if, but when" dynamic for health systems. And with that feeling must come a commitment on the part of all leaders to ensure their organizations can continue safely treating patients and maintaining critical business operations during such an ordeal. To do that, downtime plans ne…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss three main topics: the unauthorized user access at Snowflake, the cybersecurity issue at Finley Automotive Group, and the cyber threats surrounding the upcoming Olympics in Paris. They highlight the importance of implementing strong security controls like multi-factor authenticatio…
  continue reading
 
Text us feedback! In this episode, Spencer and Tyler discuss two of their current favorite tools: OneDriveEnum for enumerating user accounts in Microsoft 365 and AD Miner for visualizing attack paths in Active Directory. We hope you enjoy and get value from this episode! Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Tw…
  continue reading
 
Send us a Text Message. History of location sharing, it certainly didn't start yesterday folks...😉 Younger internet users seem to be okay with sharing their location data and the convenience it offers however, what about the potential risks of being constantly tracked? Do you know how much of your life is up for grabs in the digital world? In this …
  continue reading
 
PEDALING TOWARDS THE STARS One fine day, in the squares of the city of Ciclopoli, large billboards appeared advertising a bicycle race; everyone could participate, from zero years and up. There wasn’t much information, but it suggested that those interested should contact the Association of Bicycles with Wheels, located at Via dei Manubri Number Ei…
  continue reading
 
The Soundside team is on a break this week for the 4th of July holiday, so we’re revisiting some of our favorite segments of the year. First up, when Seattle writer and illustrator Tessa Hulls started drafting the story of her grandmother’s life, she wanted to take on the role of neutral narrator, but that didn't last long. We’ll hear about her gra…
  continue reading
 
That camera above your head might not seem like a good foreign target, yet in the Ukraine there’s evidence of Russian-backed hackers passively counting the number of foreign aid workers at the local train stations. Andrew Hural of UnderDefense talks about the need to secure everything around a person, everything around an organization, and everythi…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/what-is-check-penetration-testing-and-why-do-you-need-it. What is CHECK Penetration Testing and Why do you need it? Read this article to find out. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content a…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/understanding-ip-geolocation-its-benefits-and-challenges. Explore how IP geolocation shapes user experience, security, and marketing strategies in a digital world, despite accuracy and privacy challenges. Check more stories related to cybersecurity at: https://hackernoon.c…
  continue reading
 
Tap to Pay could become more useful and more complicated with “Multi-Purpose Tap”, YouTube’s new policy now allows people to request the takedown of AI-generated content of themselves, and Paramount+ wants to merge with another streaming service. MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A s…
  continue reading
 
Surprise! Tune in for our bonus episode, as we host a founder-to-founder fireside chat. 🔥🪵 Join 1Password Founder, Sara Teare, and Self-eSTEM founder, Adamaka Ajaelo as they share their personal experiences as women in STEM careers and the things they've learned along the way. Settle in and learn how you can overcome some of the common challenges w…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss recommended settings for Exchange Online Protection (EOP) and Microsoft Defender for Office (MDO). They explain that EOP is the core security for M365 subscriptions, providing anti-malware, anti-spam, and anti-phishing protection. They also highlight the importance of the secure by…
  continue reading
 
The method of much of social science is "comparative statics." There's an amazing natura experiment going on, after Hurricane Maria changed the environment for the rhesus macaques of Cayo Santiago. Sometimes, you need a simulation to understand something is only obvious after the fact. These primates, known for their fierce competition and rigid hi…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is our sponsored guest, Jason Clark, chief strategy officer, Cyera. In this episode: Does AI require new security measures? Meeting the new SEC requirements…
  continue reading
 
The Soundside team is taking some time off this 4th of July week; some of us are on vacation, and others are working on upcoming shows. We’re going to revisit some of our favorite segments, and the hardworking producers who make Soundside, will be making the picks. Producer Noel Gasca's picks: Lily Gladstone chronicles Blackfeet Nation's reunion wi…
  continue reading
 
French antitrust regulators looking into Nvidia anti-competition practices, European Commission says Meta failed DMA compliance, Apple starting production on Airpods with cameras? MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A special thanks to all our supporters–without you, none of this would…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/a-deep-dive-into-path-traversal-vulnerabilities. Discover how path traversal attacks work and learn effective strategies to secure your web applications against these hidden threats. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Yo…
  continue reading
 
Jon DiMaggio is the chief security strategist at Analyst1 and has over 16 years of experience hunting, researching, and writing about advanced cyber threats. In 2022, Jon’s authored his first book, “The Art of Cyberwarfare,” which earned him the prestigious SANS Difference Makers Award, solidifying his status as a thought leader in the industry. Th…
  continue reading
 
Cyfirma research team has examined a variant of Lumma Stealer malware, and this report provides a comprehensive analysis of this advanced information-stealing malware, explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Lumma S…
  continue reading
 
Ismael Valenzuela, Vice President Threat Research & Intelligence, from Blackberry Threat Research and Intelligence team is discussing their work on "Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages." BlackBerry has identified Transparent Tribe (APT36), a Pakistani-based adva…
  continue reading
 
This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence. Enjoy, think, share with others, and subscribe to the "Musing On Society & Technology" newsletter on LinkedIn. Sincerely, Marco Ciappelli and TAPE3 ________ Marco Ciappelli is the host of the Redefining Society Podcast, part of the…
  continue reading
 
For months, one creature of the night has been drawing the fascination and exasperation of city leaders, police officers, and residents of one of Seattle’s trendiest neighborhoods. Some call him The Belltown Hellcat. Maybe you’ve caught a glimpse of his souped-up 2023 Dodge Charger Hellcat zipping by, or the car’s revving and backfiring has kept yo…
  continue reading
 
Guest: Abraham Aranguren, Managing Director at 7ASecurity [@7aSecurity] On LinkedIn | https://www.linkedin.com/in/abrahamaranguren/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/sean-martin Mar…
  continue reading
 
Guest: Jim Dempsey, Senior Policy Advisor, Stanford Program on Geopolitics, Technology and Governance [@FSIStanford]; Lecturer, UC Berkeley Law School [@BerkeleyLaw] On LinkedIn | https://www.linkedin.com/in/james-dempsey-8a10a623/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Cyb…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/can-your-java-cryptography-architecture-survive-a-quantum-attack. Learn how to optimize Java Cryptography Architecture (JCA) to withstand quantum computing threats, with best. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can a…
  continue reading
 
Meta may block news sites on Facebook in Australia, YouTube is working on plans for new YouTube Premium subscriptions, and the EU’s competition chief says Apple knows 100% that it is disabling competition. MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A special thanks to all our supporters–witho…
  continue reading
 
A little over a month ago, President William Ruto of Kenya made a triumphant state visit to the White House. During the visit, Kenya was designated a major NATO ally – the first in sub-Saharan Africa – and a few weeks later, Ruto attended the G7 Summit in Italy. But his government faces turmoil at home. Proposals for tax rises have sparked a wave o…
  continue reading
 
Guest: Wendi Whitmore, Palo Alto Networks [@PaloAltoNtwks] On Twitter | https://x.com/wendiwhitmore On LinkedIn | https://www.linkedin.com/in/wendiwhitmore2/ ______________________ Host: MK Palmore, Host of The Leadership Student Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/mk-palmore _____________________…
  continue reading
 
Loading …

Quick Reference Guide