show episodes
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
  continue reading
 
T
The Ransomware Files
Series avatar that links to series pageSeries avatar that links to series page

1
The Ransomware Files

Jeremy Kirk, Executive Editor, Information Security Media Group

Unsubscribe
Unsubscribe
Monthly
 
The Ransomware Files podcast tells the harrowing stories of technology experts who have fought back against ransomware, which is one of the greatest crime waves the internet has ever seen. It features in-the-trenches stories about how organisations recovered and frank human reflections from those who have faced file-encrypting malware, a potent weapon used by high-tech criminals.
  continue reading
 
The Financial Management (FM) magazine podcast series features conversations with executives and thought leaders in management accounting. We discuss topics including governance, risk management, performance management, technology, corporate strategy, and leadership. Interviews are conducted by FM editors and contributors.
  continue reading
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
  continue reading
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
From the makers of The Bugle, this is a weekly show that skips the news pages and takes a sideways glance at the nonsense contained within the culture, celebrity, tech, science and advice sections of the news. Alice Fraser is joined every show by two great comics from across the globe, bringing 30 minutes of smart satire alongside juvenile nonsense! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
  continue reading
 
G
Geekspeak
Series avatar that links to series pageSeries avatar that links to series page

51
Geekspeak

Louie Girardot, Matt McBrayer

Unsubscribe
Unsubscribe
Monthly
 
A beloved call-in tech talk show with Matt McBrayer, Louie Girardot and occasional special guests. Geekspeak airs on the first and third Monday of every month of KDNK at 4:30pm.
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
  continue reading
 
A podcast about IT Issues/Trends in K12 Schools. Current and Past Sponsors: Absolute, Aruba/HPE, ClassLink, Eaton, Fortinet, Infoblox, INVZBL, Jupiter Education, K12TechPro.com, Managed Methods, MidwestTechTalk, Papercut, Pondurance, PDS, Rise Vision, Ruckus/Commscope, SHI, StatusGator, SomethingCool.com, Tripp Lite, Vizor
  continue reading
 
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
  continue reading
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Loading …
show series
 
Paul Lewis, CEO of Calamu, goes deep into the evolving landscape of cybersecurity and data protection. He explores cutting-edge strategies for combating ransomware, the role of AI in both offensive and defensive cybersecurity tactics, and the future of data storage solutions. He also shares his expert views on the challenges and solutions in cyber …
  continue reading
 
Guest editors Ian Smith and Eleanor Morton join host Alice Fraser for episode 138 of The Gargle - the sonic glossy magazine to The Bugle, with one rule: no politics! Ransomware theft OpenAI firing Musk biopic Bat sex Reviews Story 1: https://arstechnica.com/security/2023/11/ransomware-group-reports-victim-it-breached-to-sec-regulators/ Story 2: htt…
  continue reading
 
Explore the October 2023 Ransomware Report from CYFIRMA, uncovering the ever-changing landscape of cyber threats. LockBit leads the charge with 66 victims. Manufacturing takes a hit with 64 incidents, stressing the need for specific defences. The USA is a prime target, enduring 151 ransomware incidents, and now, a new player, Hunters International,…
  continue reading
 
Guilherme Venere from Talos Outreach joins the show this week to talk about his research into the 8Base threat actor and its use of a variant of the Phobos ransomware. He recently published several works on the many variants of Phobos that exist in the wild, and why 8Base has been so successful using it for years now.…
  continue reading
 
Australian ports are recovering from a cyberattack. SysAid is hit by Cl0p user Lace Tempest. Ransomware targets China's largest bank. LockBit doxes Boeing as Boeing hangs tough on paying ransom. Docker Engine for DDoS. Rick Howard looks at the SEC’s targeting of SolarWinds’ CISO. And Anonymous Sudan claims attacks on ChatGPT and Cloudflare. For lin…
  continue reading
 
China's biggest bank, the Industrial and Commercial Bank of China's (ICBC), has been hacked by ransomware - and it has caused problems in America, the world's most important sovereign bond market. Roger Hearing looks at what this means for security at global financial institutions. We also look at why Polish truckers have spent almost a week blocka…
  continue reading
 
This week: A ransomware attack on China’s biggest bank; Don’t just worry about your regulators. Worry about your insurers; And if you are going on a BOOKING.COM holiday, watch out for the phish. Links to this week's articles are accessible from https://codeinmotion.ie/cyber321-20231110/. -------------------------------------------------------------…
  continue reading
 
In August 2021, a port in Houston, Texas, was attacked. Over the following months, a series of attacks occurred in various locations, reminiscent of a serial killer's pattern. Targets included telecommunications companies, government agencies, power plants, and water treatment facilities. How did Volt Typhoon manage to evade authorities and analyst…
  continue reading
 
Roger Hearing talks to Mitchell Baker the CEO of Mozilla, one of the oldest and most influential internet institutions about her hopes and fears over AI. He also finds out just how much shoppers in the US spent on this Cyber Monday/Black Friday weekend. And there are doubts over the COP28 climate summit hosts as secret documents show the United Ara…
  continue reading
 
Iranian hacktivists claim an attack on a Pennsylvania water utility. North Korea's increased attention to supply-chains. Rhysida's action against British and Chinese targets. Sandworm activity puts European power utilities on alert. Neanderthals and the Telekopye bot. Mirai-based botnet activity. Our guest is Chris Betz, the new CISO of AWS Securit…
  continue reading
 
Leaked documents revealed that UAE, hosts of the UN climate change conference COP 28, were planning to hold oil and gas talks with 15 countries. The documents were obtained by independent journalists at the Centre for Climate Reporting working alongside the BBC. Also, on the show what is a shadow bank and why one in China is under investigation. Sp…
  continue reading
 
On this week's episode, Adam and Andy talk about more things on security from Microsoft Ignite. From canary capabilities in MDE to Automatic Conditional Access Policies, there are a TON of really amazing announcements. Tune in to hear the 2nd half of Ignite news! ------------------------------------------- Youtube Video Link: ⁠⁠⁠⁠⁠⁠ ---------------…
  continue reading
 
The Ghost Squad Hackers, a hacking collective with origins in the Anonymous movement. Explore their motivations, notable cyber-attacks against government and corporate entities, and the broader implications of hacktivism in the digital age. Show Transcript Support us on Patreon! Shop Modem Mischief Merch Created, Produced & Hosted by Keith Korneluk…
  continue reading
 
On this episode of the Emerging Cyber Risk podcast, we Joel's latest book, "Secure Intelligent Machines". The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. This podcast epis…
  continue reading
 
Amidst the conflicts in Ukraine and Gaza, little attention has been paid to China’s ongoing coercion in the South China Sea. Yet Beijing and Manila are in the midst of an increasingly tense standoff over Second Thomas Shoal, which could easily escalate into a major crisis or even a conflict with cyber fallout. Link to the Research Report: WITH THE …
  continue reading
 
In 2016, Soleiman Faqiri was being held at the Central East Correctional Centre in Lindsay, Ont., awaiting trial. But 11 days after he went into custody, Faqiri, who lived with schizophrenia, died in a violent confrontation with guards. An inquest into Soleiman Faqiri's death is underway. CBC’s Shanifa Nasser walks us through the details.…
  continue reading
 
The impact of rising rent is being felt across the country — and with more people on the edge of affording rent, some municipalities are looking at rent banks as a possible solution. Matt Galloway discusses this with Gladys Wong, executive director of Neighbourhood Information Post; and a panel of Melissa Giles, managing director of the BC Rent Ban…
  continue reading
 
In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support for Rich Communication Services (RCS) and the potential security implications. Lastly, Tom and Kevin reflect on reports of AI-powered voice cloning scams ta…
  continue reading
 
This week, we invite our very own Chris Hare, N2K's Project Management Specialist Content Developer, to join and discuss her career. Growing up, Chris shares that she wanted to be a veterinarian, which slowly turned into her becoming a writer for the first part of her career. She shares that she started off writing marketing copy for the technology…
  continue reading
 
Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. The research states "The malware attacks using UDP, TCP…
  continue reading
 
The entrepreneur behind the $40bn collapse of crypto token TerraUSD, Do Kwon could be extradited to the US or South Korea to answer fraud charges following a court ruling in Montenegro. He sparked an international manhunt after fleeing an investigation in his native country of South Korea, following the sudden collapse of the TerraUSD and its siste…
  continue reading
 
A little-known field is growing in Canada, as public adjusters step in to represent homeowners in the wake of disaster. "It's like having a lawyer in a lawsuit," says Brandon Sobel, an insurer-turned-adjuster who sees a “massive power imbalance” between laypeople and the professionals who handle their claims – one he compares to a beer league team …
  continue reading
 
This week: As many of you may currently be finalising your income generation strategies for 2024, here’s the Top 3 from the world of cyber crime: A new entry at #3: Using the regulators. Back at #2: Using cyber attacks. But still at #1, for the 1197th week in a row: Using your staff! Links to this week's articles are accessible from https://codeinm…
  continue reading
 
This interview from October 20th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, our very own Simone Petrella is speaking with Tatyana Bolton from Google about ways to tackle the cyber talent gap.By N2K Networks
  continue reading
 
35-year-old heir to a banana business empire Daniel Noboa has been sworn in as Ecuador’s new president, with a promise to create jobs and curb violence in a country gripped by a bloody drug war. Mr Noboa holds a degree in business administration from New York University and three master’s degrees, from Harvard, Northwestern and George Washington un…
  continue reading
 
Geert Wilders is likely to be the new leader of the Netherlands. His far-right Freedom Party is set to win 37 seats with almost all the votes counted. "The PVV can no longer be ignored," he said. "We will govern." Mr. Wilders will have to form a coalition government. We explain how he’s expected to tackle the country’s economic issues. Rescue worke…
  continue reading
 
Loading …

Quick Reference Guide