Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
A look at issues affecting the bank and insurance securities community
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
If you’re looking to understand the business of cybersecurity, then Business Security Weekly is your show! Matt Alderman, Jason Albuquerque, and Ben Carr cover cybersecurity for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your cybersecurity program, solve real problems, learn leadership ...
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
The Security professional’s podcast on how to start, manage, and drive a successful career in cyber security and risk management.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Weekly market commentary by Hedge Fund Manager Erik Townsend and interviews with the brightest minds in the world of finance and macroeconomics. Made possible by funding from Fourth Turning Capital Management, LLC
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to buildingspodcast@gmail.com Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
…
continue reading
Since 2007, Ricardo Vargas publishes the 5 Minutes Podcast where he addresses in a quick and practical way the main topics on project, portfolio and risk management.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Modern CTO is the #1 place where technology leaders and CTOs hang out. We live to bring tech leaders value. Listen in on our fun, intelligent and engaging podcast. We hang out with interesting and popular CTOs in Aerospace, Artificial Intelligence, Robotics + Many more industries. All of this, right here, right now, on the Modern CTO Podcast. What do you think of the show? Let us know here!
…
continue reading
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
…
continue reading
Unraveling the (con)fusion between Tech & Risk Management
…
continue reading
Leading practitioners in risk management share their knowledge and experiences. In each episode we'll cover topical risk issues or interview a leader in the field. Feedback and input are always welcome - tell us who you'd like to hear from and what subjects are of particular interest. Enjoy! Audio track: 'Saturn' by Marsel Minga
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
…
continue reading
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
…
continue reading
This podcast explores investment strategies, economics, personal finance, and stock analysis. It features real conversations and analysis to inform, educate, and entertain. Note that nothing in this podcast is investment advice and it is for entertainment & discussion purposes only. Do your own due diligence before making any investment. www.securityanalysis.org
…
continue reading
Welcome to the Church Security Accelerator – your go-to resource for church safety and security. Join host Simon Osamoh, an ex-UK detective, former head of counterterrorism at Mall of America, Minnesota and church security expert. As he shares tips and tool to help your church stay safe and secure! Stay protected and informed with our online training courses visit worshipsecurity.org.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
1
GSX Daily: Career Hunting? Know Your Self-Worth
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46
In this special GSX 2024 edition of the SM Highlights podcast, sponsored by Sign In Solutions, Orange County Convention Center security administrator Earl Biggett, Jr., CPP, shares some career advice—especially for people changing from the public to the private sector—and how working in concierge security positions changed his approach to his job a…
…
continue reading
1
SN 992: Password Manager Injection Attacks - Aging Media, Naval Starlink, adam:ONE
2:23:39
2:23:39
Play later
Play later
Lists
Like
Liked
2:23:39
Windows Endpoint Security Ecosystem Summit Aging storage media does NOT last forever How Navy chiefs conspired to get themselves illegal warship Wi-Fi adam:ONE named the #1 best Secure Access Service Edge (SASE) solution AI Talk Password Manager Injection Attacks Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf Hosts: Steve Gibson and Mikah Sar…
…
continue reading
1
Honing your security manager soft skills on the job | Guest Cicero Chimbanda
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02
Today, on Cyber Work Hacks, my guest, Infosec Skills author Cicero Chimbanda, gave us a Hack involving the role of Cybersecurity Manager. Studying security management techniques academically is one thing, but how do you develop your security manager skills ON THE JOB? Cicero has many insights, and we talk a bit about the importance of rapport and u…
…
continue reading
1
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374
1:44:09
1:44:09
Play later
Play later
Lists
Like
Liked
1:44:09
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
…
continue reading
Ken Johnson (@cktricky) abandons the podcast this week to attend a conference and play business, so Seth (@sethlaw) bring in Cloud Security Partners CTO John Poulin (@forced_request) as a co-host. John and Seth start off by discussing the difference in virtual and in-person training. This is followed by two articles. The first is from CrankySec, wh…
…
continue reading
1
Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376
1:52:31
1:52:31
Play later
Play later
Lists
Like
Liked
1:52:31
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
ASM and DNS Resolution: Dealing with DNS Poisoning at Scale
39:40
39:40
Play later
Play later
Lists
Like
Liked
39:40
In this more technical episode, we dive deep into the complexities of DNS and DNS resolution in the context of Attack Surface Management (ASM). Join us as we explore the unseen challenges that arise when scaling asset discovery, particularly when dealing with DNS wildcards and their implications for security scanning solutions. Our hosts, Michael a…
…
continue reading
Absolute AppSec welcomes Darren Meyer (@DarrenPMeyer on infosec.exchange and X platform) from Endor Labs as a guest on the show to discuss Endor Lab’s newly released 2024 Dependency Management Report. Implementation of reachability analysis as a sine qua non of effective dependency management is one of the top-line takeaways from the newly released…
…
continue reading
1
S15 E9 How the Role of vCISOs is Changing
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06
Greg Schaffer, founder of vCISO Services, LLC and a returning guest on Security Confidential, brings over 35 years of experience in IT and security, with 15 years as a CISO. He hosts the Virtual CISO Moment podcast and is the author of Information Security for Small and Midsized Businesses. 00:58 Our Guest01:59 What’s new with Greg?03:37 Changes in…
…
continue reading
The conversation delves into various pressing cybersecurity issues, including a recent attack on Hezbollah involving explosive pagers, the implications of cyber warfare, election interference by Iranian hackers, the severe impact of ransomware on healthcare, and the ongoing challenges of data privacy. The discussion also critiques the effectiveness…
…
continue reading
1
Ep:30 Practical Cybersecruity Advice You Can Use
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44
The source is an audio recording of a podcast episode focused on providing advice for those seeking to enter the cybersecurity field. The host, Marc, offers insights on acquiring practical experience, the importance of certifications, the significance of soft skills, strategies for successful job interviews, and effective networking methods. He emp…
…
continue reading
1
MacroVoices #446 Matt Barrie: AI’ll Be Back!
1:19:09
1:19:09
Play later
Play later
Lists
Like
Liked
1:19:09
MacroVoices Erik Townsend & Patrick Ceresna welcome back, Matt Barrie. They’ll discuss everything AI, exploring recent developments and what the future holds. https://bit.ly/3XslYP3 ⚫ Follow Matt Barrie on X: https://www.x.com/Matt_Barrie ✅Sign up for a FREE 14-day trial at Big Picture Trading: https://bit.ly/3WbYmgH 🔴 Subscribe to Patrick’s Youtub…
…
continue reading
1
Are Phishing Tests Helping or Hurting Our Security Program?
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Dennis Pickett, vp, CISO, Westat. In this episode: Not all educat…
…
continue reading
1
Building Culture, Navigating Careers, and Securing the Future with Jim Alkove, CEO of Oleria
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51
Jim Alkove, CEO and co-founder of Olaria, shares his career journey and insights on cybersecurity training and becoming a board advisor. He emphasizes the importance of starting at the beginning and gaining experience in software engineering during his time at Microsoft. Alkove highlights the need for a more diverse pool of candidates and situation…
…
continue reading
1
Lawrence Hamtil & Douglas Ott: Investment Prospects for the Southern United States
46:58
46:58
Play later
Play later
Lists
Like
Liked
46:58
This episodes features a discussion with Lawrence Hamtil and Douglas Ott. Lawrence is a partner and portfolio manager at Fortune Financial, and Douglas is the founder and chief investment officer at Andvari Associates. I’ve had Lawrence on the podcast before and I encourage you to check out that podcast, where we talked about a wide variety of topi…
…
continue reading
1
SN 992: Password Manager Injection Attacks - Aging Media, Naval Starlink, adam:ONE
2:23:38
2:23:38
Play later
Play later
Lists
Like
Liked
2:23:38
Windows Endpoint Security Ecosystem Summit Aging storage media does NOT last forever How Navy chiefs conspired to get themselves illegal warship Wi-Fi adam:ONE named the #1 best Secure Access Service Edge (SASE) solution AI Talk Password Manager Injection Attacks Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf Hosts: Steve Gibson and Mikah Sar…
…
continue reading
1
Asymmetric Encryption with Eli Holderness
38:35
38:35
Play later
Play later
Lists
Like
Liked
38:35
Do you know how asymmetric encryption works? While at the Kansas City Developers Conference, Richard sat down with Eli Holderness to discuss many of the encryption technologies being used today—and the new options coming in the future! Eli talks about how symmetrical encryption and public key encryption have been the focus of modern encryption, esp…
…
continue reading
1
EP 091 Danyetta Fleming CEO, 'Simple Cyber'
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53
Send us a text BIO Danyetta Fleming Magana is a Certified Information Systems Security Professional (CISSP) and Fellow with Institute of Strategic Risk Management (ISRM), who founded Covenant Security Solutions in 2003. Her goal is to push the envelope regarding how we think about our information and find new and innovative ways to secure our digit…
…
continue reading
1
Solving the Cybersecurity Data Problem - Padraic O'Reilly - BSW #364
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
…
continue reading
Since the very first days of the Internet, Warner Moore has been part of tech. His love for technology and for building things, for easily and effectively sharing information, and for communicating with people across the world are why he is dedicated to helping companies improve their tech. As the founder of Gamma Force, a large part of what he doe…
…
continue reading
1
S1E19 Bridging the Gap - from InfoSec to Fraud Fighter
31:30
31:30
Play later
Play later
Lists
Like
Liked
31:30
Guest: Mark Moore, VP Fraud Strategy and Prevention Episode Highlights: The Fraud-Tech Fusion: Mark shares his unique journey from InfoSec to Fraud, highlighting the increasing overlap between cybersecurity and fraud prevention in today's digital landscape. Outsmarting the Scammers: From the resurgence of check fraud on Telegram to sophisticated mu…
…
continue reading
In this episode, we discuss the importance of security and compliance for everyone in an organization. We emphasize that security is not just the responsibility of cybersecurity experts or compliance professionals, but something that every employee needs to be aware of. We highlight the risks of human error and the need for a culture of compliance …
…
continue reading
1
Soft Skills in Technical Sales to Connect and Sell More with Evgeniy Kharam
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29
Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales. From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech. Evgeniy Kharam has authored “Architecting Success: The Art …
…
continue reading
SAP systems are treated differently than many other enterprise applications from a cybersecurity perspective. Most SAP security teams are siloed and left to meet security objectives on their own. Since SAP is so integral to organizations, it is unusual for SAP security objectives to not be on the radar of an existing 24/7 cybersecurity team executi…
…
continue reading
Supply Chains are the lifeblood of modern organisations - and over time, we have increasingly come to rely on them to get the products (and services in this digital age) we need to continue doing business. Additionally, customer expectations have soared in respect of what 'timely delivery' means. In this discussion, Blake Tablak, CEO of Trax Techno…
…
continue reading
1
S29 Ep3: The AI-Quantum Revolution: Today, tomorrow and the future
35:20
35:20
Play later
Play later
Lists
Like
Liked
35:20
Today’s episode is the first of three conversations with ISF CEO Steve Durbin around the coming impact of technological development on society and business. We know that new technologies have always tested organisations, and technological innovation and integration into our lives and enterprises — it’s only accelerating. We offer an analysis of pot…
…
continue reading
1
Bonus Episode - Charting the Course: Hybrid Multicloud Strategies and AI Adoption in Canada
55:12
55:12
Play later
Play later
Lists
Like
Liked
55:12
In this episode, host KJ Burke and guest Jim Love discuss some of the insights coming out of the 2024 Hybrid Cloud Report.To learn more, visit cdw.caBy Jim Love
…
continue reading
1
What To Do When Your Roofing Insulation Is Wet
10:40
10:40
Play later
Play later
Lists
Like
Liked
10:40
Wet insulation isn’t just impacting your energy consumption—it can contribute to corrosion within the roof and even affect your warranty. These are your options if your insulation gets wet.By Endeavor Business Media
…
continue reading
1
What you will learn about cybersecurity soft skills | Guest Cicero Chimbanda
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58
Today on Cyber Work Hacks, my guest, Infosec Skills author Cicero Chimbanda, gives us another Hack for our Cybersecurity Managers. If you want to know more about Cicero’s Security Manager learning path for Infosec Skills, this is the episode for you, as we break down everything you’ll learn and how to apply it to your career! 0:00 - Infosec's secur…
…
continue reading
1
Are You Really Thinking Like a CTO? with Alan Williamson, CTO & Author
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02
Today, we’re talking to Alan Williamson, CTO & Author. We discuss why it’s crucial to grow beyond your technical skills, the best methods for communicating outside of your department, and how to actually use vision to define your path as CTO. All of this right here, right now, on the Modern CTO Podcast! To learn more about Alan Williamson and his b…
…
continue reading
1
Making Sense of Why We Developed the AI-Driven Project Manager Credential
5:51
5:51
Play later
Play later
Lists
Like
Liked
5:51
In this episode, Ricardo introduces the AI-Driven Project Manager Certification, explaining the rationale behind this certification. He highlights the growing hype around AI, with many project managers using AI terms without understanding the technology. The certification aims to ensure that professionals have the knowledge needed to manage AI-driv…
…
continue reading
Join Randy and Jim as they talk about the implications of last month's CrowdStrike outage, and how you, as a security leader, can help avoid that kind of impact in the future.By Jim Desmond & Randy Fields
…
continue reading
1
Episode 80: Episode 80 - Part 2 - Interviewing for less experienced security roles
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17
In this episode, Richard finishes his discussion regarding questions and answers to expect when interviewing for less experienced security roles.
…
continue reading
In this conversation, Myself and Aaron Shah from Cybermaxx discuss the complexities of cybersecurity, emphasizing the importance of understanding both offensive and defensive strategies. We explore the dichotomy in cyber operations, the adversarial mindset, and the common misconceptions clients have about their risk levels. The discussion also cove…
…
continue reading
1
Cybersecurity has too many distractions and can the White House fix BGP? - Harish Peri, Harry Wilson, Darren Guccione - ESW #375
2:30:27
2:30:27
Play later
Play later
Lists
Like
Liked
2:30:27
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
…
continue reading
1
S15 E8 AI, Fraud, and the Future of Cybersecurity
59:09
59:09
Play later
Play later
Lists
Like
Liked
59:09
#SecurityConfidential #DarkRhiinoSecurityDan Lohrmann is an internationally recognized cybersecurity leader, keynote speaker, and author with over 30 years of experience. He served as Chief Security Officer, CTO, and CISO for Michigan's government and received numerous national awards, including CSO of the Year and Computerworld Premier 100 IT Lead…
…
continue reading
1
MacroVoices #445 Jim Bianco: Still No Landing, and Inflation is Not Transitory
1:10:46
1:10:46
Play later
Play later
Lists
Like
Liked
1:10:46
MacroVoices Erik Townsend & Patrick Ceresna welcome back, Jim Bianco. They’ll discuss why Jim thinks the Fed has become political and risks a policy error, they also cover long-term inflationary trends, the role of precious metals in today's economy, and more. https://bit.ly/4d372MT ⚫ Follow Jim Bianco on X: https://www.x.com/biancoresearch 🔻Downlo…
…
continue reading
1
Who Is Responsible for Securing SaaS Tools?
35:23
35:23
Play later
Play later
Lists
Like
Liked
35:23
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Russell Spitler, CEO and co-founder, Nudge Security. In thi…
…
continue reading
Seth and Ken take the podcast global this week while traveling to Melbourne, Australia. The duo is joined this episode are joined by Paul McCarty and Daniel Ting, both involved in the local application security community. The discussion starts with a comparison of industries in Australia and the United States, both differences and similarities. Thi…
…
continue reading
1
Peeling Back the Layers of Veteran Suicide: The Mission of Willpower for Veterans
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03
SecurityDNA podcast host Steve Lasky has an impactful discussion with Donna Chapman, Director of the A&E Program at HID Global North America, about the challenges in dealing with veteran suicide after her 24-year-old son, Army National Guard Sgt. William Davidson, committed suicide during in Operation Enduring Freedom. Chapman is working to help tr…
…
continue reading
1
The Art of Recon: Strategies for Modern Asset Discovery
48:51
48:51
Play later
Play later
Lists
Like
Liked
48:51
Today, we explore the world of asset discovery and reconnaissance, particularly how these practices have evolved over time. Historically, discussions around reconnaissance have been overly simplistic and tool-centric, often focusing solely on the latest tools rather than the underlying principles and methodologies. Join us as we break down our appr…
…
continue reading
1
EP 090 Gavin Stone Former Spy: Revealing Body Language Insights for Security Professionals
1:02:27
1:02:27
Play later
Play later
Lists
Like
Liked
1:02:27
Send us a text Best Selling Author Former Spy Ranked #9 in the world Body Language Expert Guest host on NBC News Radio Trainer/Teacher/Mentor Hypnotist, Mind Control and NLP Practitioner BIO Gavin Stone served as a security and intelligence covert specialist. He has over 20 years of applied experience, globally de- ployed by government organization…
…
continue reading
1
Expanding Cybersecurity Careers Beyond Hacking with Ed Adams, CEO of Security Innovation
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03
In this episode, Gene Fay interviews Ed Adams, President and CEO at Security Innovation, about his journey into cybersecurity and his work in advancing software security practices. Ed shares his story of transitioning from quality assurance in software at Rational Software to founding Security Innovation, a company focused on application security a…
…
continue reading