Security Incident public
[search 0]
More
Download the App!
show episodes
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Artwork
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
  continue reading
 
Artwork
 
World-renowned aviation-industry consultants and former NTSB investigators John Goglia and Greg Feith have 100 years of worldwide aviation safety experience between them. In this hard-hitting podcast series they talk about everything aviation -- from the behind-the-scenes facts on deadly air crashes to topics of interest such as tips and tricks for navigating through airports and security, traveling with infants and children, unruly passengers, and packing your bags to ease through security.
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
Monthly
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Artwork

1
DIA Connections

Defense Intelligence Agency

Unsubscribe
Unsubscribe
Monthly
 
DIA Connections is an exciting new podcast featuring overlooked or unfamiliar aspects of who we are, what we do, and the countless ways we've impacted the lives of people everywhere. Since its creation in 1961, the Defense Intelligence Agency has been the nation's premier all-source military intelligence organization. Our team at DIA deploys globally, alongside warfighters and interagency partners, to defend America's national security interests. However, we are so much more, as this podcast ...
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

Unsubscribe
Unsubscribe
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Artwork

1
Soulful CXO Podcast

Soulful CXO, ITSPmagazine Soulful CXO, ITSPmagazine

Unsubscribe
Unsubscribe
Monthly+
 
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
  continue reading
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Bring Your Own Security Radio started in 2016 and has been going strong since. Hosted by Dave Howard, we dive into topics around IT Security. Backed by his CISSP, CEH, MCSE-Cloud, Incident Handling, Encryption and CCNA certifications and a 22 year (and still going) career in IT, you can be sure to find a wide range of topics.
  continue reading
 
Artwork

1
Loose Leaf Security

Liz Denys & Geoffrey Thomas

Unsubscribe
Unsubscribe
Monthly
 
Loose Leaf Security is a podcast about making good computer security practice for everyone. We believe you don't need to be a software engineer or security professional to understand how to keep your devices and data safe. In every episode, we tackle a typical security concern or walk you through a recent incident.
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork

1
Digital Detectives

Legal Talk Network

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
Artwork

1
Cyber Defense Indonesia

Cyber Defense Indonesia

Unsubscribe
Unsubscribe
Monthly
 
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
  continue reading
 
Artwork

1
Incident Evil

Daniel (Jake) Jacobs

Unsubscribe
Unsubscribe
Monthly
 
An Emergency Management Podcast. I'm Daniel Jacobs. A work for the Washington State Department of Corrections. I teach Emergency Management in the Prison Division. I have a BA in Emergency and Disaster Management and I am currently working on my MA in Homeland Security. This podcast is only for fun and self-development/improvement. It's my new hobby.
  continue reading
 
Loading …
show series
 
Sponsor by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEC Playground⁠ --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
  continue reading
 
Join Chris, Izar, and Matt as they sit around the Security Table to dissect and discuss the different stages of dealing with security incidents. In this episode, they explore the developer's stages of grief during an incident, and discuss a recent large-scale IT incident. They share insights from their multi-decade experience in security, analyze t…
  continue reading
 
It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last 5 years.What happens when your job is to operate in a crisis? Join us for the next episode of Secure Talk where we sit down with Vice Admiral Mike LeFevre (re…
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss the aftermath of the CrowdStrike failed software update. They express empathy for those impacted by the incident and discuss the importance of collaboration in the cybersecurity industry. They also explore the need for transparency from security vendors and the potential im…
  continue reading
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this week's update we hear testimony from FBI Director Chris Wray during which he warns Congress of concerns that groups may be plotting a terrorist attack like the ISIS raid on a concert hall in Russia. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply…
  continue reading
 
This week, on Enterprise Security Weekly, we've got: Identity Security gets more funding Wiz walks away BlackHat Announces Startup Spotlight Finalists Crowdstrike post mortem Simple Security Tricks are the Best Security Tricks Splitting the CISO role Web scraping for AI is out of control SEC vs Solarwinds Vaping the Internet Show Notes: https://sec…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
Edward Wu thinks so! Understandably so, as his startup, Dropzone.ai is making a big bet on generative AI to change the face (and pace) of security operations. We'll talk about what has changed here, and I have so many questions: after many generations of AI/ML technology in security, is the current gen really that dramatically different? Dropzone i…
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
For every citizen and business in the United States, cybercrime is a growing – and perhaps inescapable – threat. So, what do you do if you or someone you know falls victim to a cyberattack, data breach, or hack? The researchers at Cybercrime Magazine encourage you to file a complaint with the FBI’s Internet Crime Complaint Center and the appropriat…
  continue reading
 
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
  continue reading
 
Mark Sangster, cybersecurity author and expert, is the Chief of Strategy at Adlumin. In this episode, he joins host Heather Engel to explore the rising threat of nation-state cyberattacks and their impact on global security and politics. Cyber Tide is a Cybercrime Magazine podcast series brought to you by Adlumin. Working to revolutionize the way o…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Show Notes: https://securityweekly.com/psw-836…
  continue reading
 
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individua…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/…
  continue reading
 
A fatal midair collision involving a Cessna 172 illustrates several aviation safety concerns related to pilot training in and around airports with commercial operations. The incident involved a student and instructor on board performing touch-and-go landings and a Dash 8 departing on a passenger flight. While the event happened in Kenya, the circum…
  continue reading
 
Craig Nelson, leader of Microsoft's Red Team joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Craig explains how the Red Team simulates attacks on Microsoft's infrastructure to identify vulnerabilities and protect customer data stored in the cloud. He emphasizes the importance of these simulated attacks in prepar…
  continue reading
 
Security is a risk management discipline. No one understand that more than Jeff Recor. Jeff has built risk management practices for Deloitte, Grant Thornton, and Accenture and has recently formed his own risk consulting practice. In this unscripted interview, Jeff will share his insights on the evolution of security as a risk management discipline,…
  continue reading
 
Bob Maley is the Chief Security Officer at Black Kite. In this episode of Hidden Risk, he joins host Charlie Osborne to discuss what it means to be proactive in cybersecurity, including what type of information is needed to truly reduce risk, how companies can successfully demonstrate being proactive, and more. An award-winning intelligence platfor…
  continue reading
 
Loading …

Quick Reference Guide