show episodes
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
CISO Series Podcast

David Spark, Mike Johnson, and Andy Ellis

Unsubscribe
Unsubscribe
Weekly
 
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
  continue reading
 
Artwork
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

Unsubscribe
Unsubscribe
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
  continue reading
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork
 
If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been a consultant, practitioner, founder, and runs Security Weekly Labs. Tyler h ...
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Home Security Company is one of the leading companies that provides reliable and affordable home security systems across the USA. With security cameras, video doorbells, fire and carbon monoxide detectors, and wireless alarms, we provide comprehensive home security solutions to help you stay safe with peace of mind. visit https://homesecurity-company.com/ to get a free quote.
  continue reading
 
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
  continue reading
 
Artwork

1
AWS Podcast

Amazon Web Services

Unsubscribe
Unsubscribe
Weekly
 
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
  continue reading
 
The International Supply Chain Protection Organization (ISCPO) podcast is for those interested in learning about security in the supply chain and upcoming events. Support this podcast: https://podcasters.spotify.com/pod/show/iscpo360/support
  continue reading
 
"Secured" is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful ...
  continue reading
 
Welcome to The Peter Zeihan Podcast Series! Geopolitical Strategist Peter Zeihan is a global energy, demographic and security expert. If you want to stay informed on the realities of geography and populations, you've come to the right place. Zeihan's worldview offers insights into how global politics impact markets and economic trends, helping industry leaders navigate today’s complex mix of geopolitical risks and opportunities. Expect a forward-looking approach to what will drive tomorrow’s ...
  continue reading
 
Artwork

1
Farm Gate

ffinlo Costain

Unsubscribe
Unsubscribe
Weekly
 
The regenerative agriculture podcast, in search of practical solutions for ecological security. Produced by 8.9ha: https://www.8point9.com With financial support from Our Sankalpa Farming news, Regenerative farming, agroecology, land use, natural capital, land news
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
Connect

Axis Communications

Unsubscribe
Unsubscribe
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee and more! ClearedJobs.Net is a veteran-owned career site an ...
  continue reading
 
Artwork
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Defending the Edge is a monthly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as your new hosts as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork
 
We make the topic of privacy approachable. For both businesses and consumers. With so much of our lives taking place online today, it's easy to overlook the dangers associated with sharing your personal data with companies and strangers. Many people are aware that privacy is a problem but they don't know where to begin. Privacy Files explains the vast array of privacy issues facing society in easy-to-understand language. Then we give you practical solutions to quickly and effortlessly make t ...
  continue reading
 
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Artwork

1
Banking on Growth

Midwestern Securities

Unsubscribe
Unsubscribe
Monthly
 
Banking on Growth is a podcast for bankers and financial advisors operating in community-based banks and credit unions. Throughout this podcast, we'll chat with financial industry professionals and thought leaders at the forefront of developing creative solutions to assist community banks in delivering financial advisory services to their clients with the goal of helping the institution grow. We'll examine the most recent industry developments, technology, and best practices for providing hi ...
  continue reading
 
Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions and strategies for your retirement needs. With decades of financial experience, Ken and Nick offer tax recommendations, Social Security maximization, wealth management, retirement income planning and much more.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks Unit 42 and N2K Networks

Unsubscribe
Unsubscribe
Monthly+
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Artwork

1
Evergreen Electric Gates

evergreenelectricgates

Unsubscribe
Unsubscribe
Monthly
 
At Evergreen Electric Gates, we saw a need for high-quality security gate services and repairs in the Seattle, Washington area. Since our inception in 2008, we have dedicated ourselves to delivering exceptional gate solutions to residential and commercial clients throughout Seattle and its surrounding areas.
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
Weekly
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Artwork

1
LEAD I.T.

Casey Marquette

Unsubscribe
Unsubscribe
Daily+
 
The LEAD I.T. Podcast where the greatest minds in technology and security share their hard-earned lessons, insights, and stories. These are the transformation champions in tech. You'll discover the keys to success for leading innovation, growth, and change within your organization. This podcast is powered by Covenant Technologies and Cybertrust Network -- providing the Best Cybersecurity and IT Solutions For Your Business Your host CEO, Casey Marquette! Learn more about Covenant Technologies ...
  continue reading
 
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
  continue reading
 
Gregg MacInnis, Owner and President of Gmac Family Financial, joins you on Countdown to Retirement to offer up innovative financial strategies, solutions, security, and overall financial health. Listen as Gregg talks about his passion to serve his community and break down financial planning for your retirement.
  continue reading
 
Artwork

1
Let's Talk Azure!

Alan Armstrong & Sam Foot

Unsubscribe
Unsubscribe
Monthly+
 
Listen with Alan Armstrong and Sam Foot as we talk about all things Microsoft Azure! We are both technical consultants working with Azure day in, day out. Alan focuses on Identity and Security automation while Sam is a .NET developer deploying PaaS and SaaS solutions on Azure. Each episode we have a topic we cover and we highlight some key news that we are interested in. No fluff, sales or products here, just two technical people having a light hearted chat.
  continue reading
 
Artwork
 
CloudNext is your go-to source for cloud innovation and leaders' insight. Your way to stay up-to-date with the latest trends and innovations critical to Cloud, Security, and DevOps success. Pick the brains of C-level executives of renowned companies in tech, sharing their stories of innovation and personal growth. Explore their transformative insights as they fuse personal narratives with strategic advice, revealing how to achieve technological solutions for the challenges & pain points in t ...
  continue reading
 
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
  continue reading
 
Artwork

1
Immigration Nerds

Erickson Immigration Group

Unsubscribe
Unsubscribe
Monthly
 
EIG is a leading corporate immigration law firm, providing comprehensive business immigration, global migration, and compliance solutions that enable companies to hire the best and brightest talent worldwide. Founded in 1987 and immigration practice started in 1998, EIG has over 25 years of experience delivering its signature 'Perfect Plus' service — dedicated legal teams offering remarkable results, clear communication, innovative technology systems, and the highest level of information and ...
  continue reading
 
Loading …
show series
 
Send us a Text Message. Rapid Cycle Solutions provides consulting advice to their agency clients on data analytics and cloud computing, shares company founder and owner, Bill Engel. That means soft skills such as good communication, conflict resolution, and teamwork are critical, beyond technical skills. Bill’s Pro Interview Tip: He’s going to ask …
  continue reading
 
On this Solution Spotlight, guest Lee Parrish, author and CISO at Newell Brands, joins N2K President Simone Petrella to discuss his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security" and security relationship management. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Julie Rubash is the General Counsel and Chief Privacy Officer at Sourcepoint, a data privacy software company. She coordinates legal efforts for Sourcepoint and ensures that the product suite innovates and expands to meet the demands created by the ever-changing regulatory landscape. Julie brings over 15 years of legal experience and has worked at …
  continue reading
 
This Episode we’re heading back into the vaults to bring you the unabridged version of our fantastic and extremely popular interview with Bec McKeown, a chartered psychologist with extensive experience in carrying out applied research for organisations including the UK Ministry of Defence and the founder and director of Mind Science, an independent…
  continue reading
 
In this edition of the SecurityDNA podcast, host Steve Lasky has an inspiring discussion about the evolving world of security with Francis D’Addario, emeritus faculty for the Security Executive Council. Francis is a Lifetime Outstanding Security Performance Award (OSPA) recipient and his cross-functional teams have achieved reduced violent crime cl…
  continue reading
 
A major American chipmaker discloses a cyberattack. Cybercriminals exploit Progressive Web Applications (PWAs) to bypass iOS and Android defenses. Mandiant uncovers a privilege escalation vulnerability in Microsoft Azure Kubernetes Services. ALBeast hits ALB. Microsoft’s latest security update has caused significant issues for dual-boot systems. Th…
  continue reading
 
We're going to group therapy today, and on the docket for discussion is what makes Americans so difficult to understand? Not in a weird accent kind of way, but in a "why are we the way that we are" kind of way. *This video was recorded during my backpacking trip through Yosemite in the end of July. Full Newsletter: https://mailchi.mp/zeihan/lifes-g…
  continue reading
 
In this episode of "Reimagining Cyber," Rob Aragao hosts a conversation with Tammy Klutz, a best-selling author and current CISO at Trinseo. Tammy discusses her career trajectory, which includes leadership roles at Covanta Energy and Versum Materials, and shares insights from her recent book, Leading with Empathy and Grace: Secrets to Developing Hi…
  continue reading
 
Clayton Utz partner Brenton Steenkamp, leading the firm’s cyber and data governance practice, says no matter how well-prepared organizations think they are for a cyberattack, in reality they are far from it. And when the attack comes, they are caught like a rabbit in the headlights. Learn more, including a full transcript, on the RecordPoint websit…
  continue reading
 
The Dem’s 2024 party platform touches on cybersecurity goals. The feds warn of increased Iranian influence operations. A severe security flaw has been discovered in a popular WordPress donation plugin. The Lazarus Group exploits a Windows zero-day to install a rootkit. Krebs on Security takes a closer look at the significant data breach at National…
  continue reading
 
In this episode of Unspoken Security, host AJ Nash engages in an insightful conversation with Karla Reffold, Chief Product Officer at Surefire Cyber. The episode dives into the nuances of cybersecurity careers and leadership. Karla shares her journey from a background in recruiting and corporate governance to her current role in cybersecurity, high…
  continue reading
 
*This video was recorded during my backpacking trip through Yosemite in the end of July. The Baltic states - Estonia, Latvia and Lithuania - are taking one step closer to the Europeans with their upcoming electrical system swap. This switch from Russian to European electrical standards marks a significant shift for these nations. Full Newsletter: h…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is Fredrick Lee (Flee), CISO, Reddit. In this episode: The case for the technical CISO Making Recall safe for business The aches …
  continue reading
 
🎙️ Ready to take your business profile on Google to the next level? Check out our latest vblog on Google Business Profile Tips for Small Businesses! 🌟 Blog to Audio conversion makes it easy to listen on the go or while you work. 📱 Promoting: https://www.bizionictech.com - your one-stop-shop for all things tech and business growth! 💻 Don't miss out …
  continue reading
 
While CISOs are often responsible for technology implementation, they are not getting the support they need at a strategic level. The Accelerator found that 73% of CISOs expressed concern over cybersecurity becoming unwieldy, requiring risk-laden tradeoffs, compared to only 58% of both CIOs and CTOs. Understanding the C-suite’s business priorities …
  continue reading
 
The latest numbers show that if Congress fails to act, Social Security benefits could face up to a 25% cut in 2035. So, while the government’s Social Security Titanic heads for an iceberg, what can you do to fill a possible big income gap? In this episode of Countdown to Retirement, Gregg MacInnis explains how he can design a plan that can safely s…
  continue reading
 
Ken and Nick Tumolo touch on the impact of social security and pensions on retirement planning and the potential tax implications of withdrawing money from tax-deferred accounts. To schedule a Tumolo Financial Retirement Checkup visit TumoloFinancial.com Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions an…
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
Cisco Talos discovers vulnerabilities in Microsoft applications for macOS. OpenAI disrupts an Iranian influence campaign. Jewish Home Lifecare discloses a data breach affecting over 100,000. Google tests an auto-redaction feature in Chrome for Android. Unicoin informs the SEC that it was locked out of G-Suite for four days. House lawmakers raise co…
  continue reading
 
In this episode, we explore the rapid rise of AI in businesses and the pressing need for security teams to stay ahead of the curve. As organizations increasingly adopt AI technologies, the potential for Shadow AI and other security risks grows. Brad Bussie, Chief Information Security Officer at e360, discusses how security leaders can navigate this…
  continue reading
 
Simon is joined by Jason Hunter, AWS Principal Specialist Solutions Architect, do dive super-deep into how to make the most of DynamoDB. Whether you are new to DynamoDB, or have been using it for years - there is something in this episode for everyone!Shownotes:Jason's Blog Posts: https://aws.amazon.com/blogs/database/author/jzhunter/The Apache Ice…
  continue reading
 
*This video was recorded during my backpacking trip through Yosemite in the end of July. The US Navy and its fleet of carriers (and super-carriers) haven't had much of a challenge on the seas since WWII. But of all things, it might be some low-tech jet ski bombs that change the way the world's navies operate. Full Newsletter: https://mailchi.mp/zei…
  continue reading
 
The Trust Triumph John Wheeler, Cognizant SVP and Chief Security Officer, shares a powerful story of confronting a monumental challenge with his team that ultimately became a turning point in his leadership journey. In the crucible of adversity, he and his team forged an unbreakable bond, creating a foundation of trust that transcends typical workp…
  continue reading
 
Enjoy this special encore with CEO and co-founder of Dragos Robert Lee, as he talks about how he came to cybersecurity through industrial control systems. Growing up with parents in the Air Force, Robert's father tried to steer him away from military service. Still Rob chose to attend the Air Force Academy where he had greater exposure to computers…
  continue reading
 
Many cybersecurity experts are calling recent attacks on healthcare more sophisticated than ever. One attack disrupted prescription drug orders for over a third of the U.S. and has cost $1.5 billion in incident response and recovery services. Separately, an operator of over 140 hospitals and senior care facilities in the U.S. was also victimized. T…
  continue reading
 
Snir Ben Shimol from ZEST Security on their work, "How we hacked a cloud production environment by exploiting Terraform providers." In this blog, ZEST discusses the security risks associated with Terraform providers, particularly those from community sources. The research highlights the importance of carefully vetting providers, regular scanning, a…
  continue reading
 
Every so often it's helpful to get back to the basics when it comes to protecting individual privacy. In light of the recent major data breach, potentially exposing the social security numbers of every American, we're revisiting the core elements of the "privacy problem." In this episode of Privacy Files, we speak with entrepreneur and software dev…
  continue reading
 
Devo, the security analytics company, recently launched data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements. Enterprise security teams are struggling with growing data volumes—and they’re also up against headcount and budget constraints. These solutions offer security teams data control, cost optim…
  continue reading
 
Google and iVerify clash over the security implications of an Android app. CISA has issued a warning about a critical vulnerability in SolarWinds Web Help Desk. Ransomware attacks targeting industrial sectors surge. Microsoft is rolling out mandatory MFA for Azure. Banshee Stealer is a new macOS-targeted malware developed by Russian threat actors. …
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
If you live in Canada, the UK, or the US, it looks like a lot of your aggregated personal info has been leaked. Like - one big leak. 2.7 billion files just… out there. We’ll tell you more. Plus - you may be worried about safety and A.I., but are you worried enough? MIT doesn’t think so - we’ll tell you why. Check out our show notes: SecureMac.com/C…
  continue reading
 
*This video was recorded during my backpacking trip through Yosemite in the end of July. Unless you want to start buying your guacamole in dime bags, the US better start looking for some new avocado "dealers". Yes, we're talking about the cartels’ involvement in the avocado supply chains in Mexico. Full Newsletter: https://mailchi.mp/zeihan/the-mex…
  continue reading
 
In this episode of Essential Geopolitics, RANE’s Middle East and North Africa Analyst Kristin Ronzi discusses what Algeria’s current President Abdelmadjid Tebboune has accomplished during his first-term and what we can expect from a likely re-election. RANE is a global risk intelligence company that delivers risk and security professionals access t…
  continue reading
 
Alan and Sam talk about External Attack Surface Management (EASM) and how Microsoft's Defender EASM helps discover and monitor your digital assets. Here are a few things we covered: What is External Attack Surface Management? What is Defender EASM and how can it help identify your risks? How do you setup Defender EASM? how much does it cost? What d…
  continue reading
 
Microsoft urges users to patch a critical TCP/IP remote code execution vulnerability. Texas sues GM over the privacy of location and driving data. Google says Iran’s APT42 is responsible for recent phishing attacks targeting presidential campaigns. Doppelgänger struggles to sustain its operations. Sophos X-Ops examines the Mad Liberator extortion g…
  continue reading
 
Loading …

Quick Reference Guide