show episodes
 
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Unlearn

Barry O'Reilly

Unsubscribe
Unsubscribe
Monthly+
 
The way to think differently is to act differently and get comfortable with being uncomfortable. For business leaders, entrepreneurs, managers and anyone who wants to improve how they work and live: Welcome to the Unlearn Podcast. Host Barry O’Reilly, author of Unlearn and Lean Enterprise seeks to synthesize the superpowers of extraordinary individuals into actionable strategies you can use—to Think BIG, start small and learn fast, and find your edge with excellence.
  continue reading
 
Uncle Marv’s IT Business Podcast is a show designed for IT professionals and Managed Service Providers. The podcast aims to provide actionable advice and tips that help IT businesses grow and thrive in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, and industry pioneers who share their experiences, insights, and strategies for success. These discussions often cover topics such as: - Cloud computing and AI advancements - M ...
  continue reading
 
Artwork
 
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
  continue reading
 
Hosted by Karina Frias, Cyber Insights explores the cybersecurity industry, cyber career and cyber regulations through engaging with today’s cyber professionals. Learn more at:https://missionmatters.com/author/karina-frias/
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
The Logistics of Logistics is a podcast hosted by industry expert Joe Lynch. Joe interviews founders, executives, and innovators who are shaping the future of logistics and supply chain. Topics include transportation, logistics, warehousing, technology, supply chain, and ecommerce. The Logistics of Logistics audience expects an inside perspective of what’s next in logistics and supply chain delivered via podcasts, videos, and articles. Topics include: Transportation Topics Small package, Sma ...
  continue reading
 
Artwork

1
Think Cyber Secure

Think Cyber Secure

Unsubscribe
Unsubscribe
Monthly
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
  continue reading
 
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

Unsubscribe
Unsubscribe
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork

1
South West Cyber Beat

South West Cyber Resilience Centre

Unsubscribe
Unsubscribe
Monthly
 
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
  continue reading
 
A weekly update on all that is new in the world of GDPR, plus interesting guests, some 'how to' slots and details of new GDPR related solutions. UK based but with items of interest to a worldwide audience.
  continue reading
 
Artwork
 
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
  continue reading
 
Artwork

1
Small Business Cybersecurity Podcast

Small Business Cybersecurity Podcast

Unsubscribe
Unsubscribe
Monthly
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
  continue reading
 
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
  continue reading
 
The Cyber Sentinel Podcast with host Alan Adcock CEO, Automated Solutions Consulting Group, Inc. Alan founded ASC Group as a technology services provider for the small-to-midsize business community. Over time, they have evolved to specialize in data reliability and security for schools, medical practices, and remote workforces. Their clients can rely on their infrastructure to provide business continuity and rely on his team of network experts to uphold ethical business practices and standar ...
  continue reading
 
Artwork

1
OBBM Network

OffBeat Business Media, LLC

Unsubscribe
Unsubscribe
Monthly
 
Local business personalities on their successes, strengths, and perseverance in the marketplace to empower, inform and encourage the 80% of American micro to small businesses that tend to be family owned of 9 employees or less. Shows cover topics on business coaching, networking, health and fitness, criminal justice, cyber security, money, and veteran spotlights.
  continue reading
 
We do IT differently! Providing small-to-mid-sized business with tailored IT strategies, management and support that enables them grow faster. We make IT the competitive advantage of SMBs in Atlanta, Birmingham, and Greenville; providing cyber-security and compliance.
  continue reading
 
Artwork
 
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership.
  continue reading
 
Artwork

1
DevSec For Scale from Akeyless

Akeyless - The Secrets Management Company

Unsubscribe
Unsubscribe
Monthly
 
Cybersecurity. InfoSec. DevSecOps. AppSec. Should companies be talking about these subjects only when they become too large? NO! Should cybersecurity be a priority for every company, no matter the size? YES! According to a study by BullGuard study in 2020, 43% of SMB owners have no cybersecurity defense plan in place at all – leaving their most sensitive financial, customer and business data, and ultimately their companies, at significant risk. Many startup and SMB companies will admit that ...
  continue reading
 
Artwork

1
Finance

Salma Cormier

Unsubscribe
Unsubscribe
Monthly
 
Chancing coastal guests for a call center incipiency is a delicate proposition. The real challenge, still, comes latterly- delivering and meeting the prospects of those guests!
  continue reading
 
Artwork

1
AgBiz Cast

AgBiz Masters

Unsubscribe
Unsubscribe
Monthly
 
AgBiz Cast shares inspiring stories of young, beginning, and small farmers. Listen to graduates of the AgBiz Masters educational program to hear about their farming operations and gain advice for those looking to start their own business.
  continue reading
 
RSM’s talkBIG podcast will make you better with money. This is edutainment at it's finest, suited for financial geeks or newbies, discussing all things financial with straight shooting opinions from our hosts. Sit back and relax with a cold one and get your hit of personal and business money talk. This podcast delves into real life stories and inspires listeners to talk and think BIG. Setting you up to save, create and protect your wealth.
  continue reading
 
GREATER LONDON IT COMPANY Sonar IT are Greater London’s leading IT Company, providing a large range of IT services such as your day to day Service Desk support, Network support and consulting to small and medium-sized businesses.
  continue reading
 
Artwork
 
Information is power. And wherever there’s power, there are people looking to steal it. But that’s also where you’ll find us. We’re RSA Conference. And we’re here to stand against cyberthreats around the world. That means being here for you. Connecting you with the people and insights that will empower you to stay ahead of cyberthreats. We do this through our online outreach and with our events around the globe. And we make a great host, if we do say so ourselves. Some say it’s impossible to ...
  continue reading
 
Dive deep into the dynamic marketing realm in the digital age with The Backstory on Marketing and AI, hosted by Guy Powell, the visionary President of ProRelevant Marketing Solutions. This enlightening podcast is your gateway to understanding the intricate interplay between data-driven marketing strategies and cutting-edge AI technologies. Each episode brings to the table candid and insightful conversations with some of the industry's most influential leaders and analytics experts. They shar ...
  continue reading
 
Artwork

1
The Cyber Queens Podcast

Maril Vernon, Erika Eakins, and Amber Devilbiss

Unsubscribe
Unsubscribe
Monthly
 
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
  continue reading
 
Artwork
 
At Tech IT Out, we’re on a mission to demystify the ever-evolving world of information technology. But we’re not stopping there—we’re adding a dash of humor and practical insights to the mix. Because let’s face it: tech talk doesn’t have to be dull or intimidating. 🎧 Who’s It For? Whether you’re an IT professional, a small business owner, or simply a tech enthusiast, this podcast is for you. We’re here to empower our listeners by providing the knowledge and tools they need to confidently nav ...
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Artwork

1
Data Privacy Detective

Joe Dehner - Global Data Privacy Lawyer

Unsubscribe
Unsubscribe
Monthly
 
The internet in its blooming evolution makes personal data big business – for government, the private sector and denizens of the dark alike. The Data Privacy Detective explores how governments balance the interests of personal privacy with competing needs for public security, public health and other communal goods. It scans the globe for champions, villains, protectors and invaders of personal privacy and for the tools and technology used by individuals, business and government in the great ...
  continue reading
 
Recent studies show that 82% of cyber incidents result from unintended human behavior. Further, the errant behavior of only 5% of all users creates most of this risk. This is pretty alarming, and yet no one is talking about it. Modifying the behavior of these few individuals can have a force multiplier effect on reducing overall enterprise cyber risks. Welcome to Friendly Fire: Mitigating Unintentional User Risk. Where we explore Human Risk, to raise awareness across the industry, and stimul ...
  continue reading
 
The Solomon Success podcast is dedicated to the timeless wisdom of King Solomon and the Book of Proverbs in order to maximize one’s business and life. To our advantage, we can find King Solomon’s financial strategies in addition to many life philosophies documented in biblical scriptures. Focusing on these enduring fundamentals of success allows us to bypass the “get-rich-quick” schemes that cause many to stumble on their journey toward success. Our concern is not only spiritual in nature, b ...
  continue reading
 
Loading …
show series
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
  continue reading
 
G Mark Hardy and guest Deb Radcliff talk about experiences and takeaways from Black Hat, and delve into the dynamic world of cybersecurity. Deb shares her perspectives on the intersection of AI, DevSecOps, and cyber warfare, while highlighting insights from her 'Breaking Backbones' trilogy. Transcripts: https://docs.google.com/document/d/1XN9HjdljJ…
  continue reading
 
In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management. Segment Resources: https://www.adaptive-shield.com/land…
  continue reading
 
I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster stora…
  continue reading
 
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
Navigating Cybersecurity: Q&A Session with Marc In this special episode recorded outdoors, Marc answers listener questions about breaking into the cybersecurity field. Topics include gaining practical experience without an IT background, the importance of certifications, essential soft skills, networking strategies, handling job rejections, and mak…
  continue reading
 
Marnie Stockman shares her recent experiences, including a leadership training program for military personnel from partner countries. The discussion then moves to recap their previous interview, focusing on core values, leadership philosophy, and customer success. Marnie emphasizes the importance of personal leadership and how it applies to everyon…
  continue reading
 
Joe Ohr and Joe Lynch discuss cyber threats and solutions in the supply chain. Joe Ohr is the Chief Operating Officer at The National Motor Freight Traffic Association (NMFTA), a nonprofit membership organization that represents the interests of less-than-truckload (LTL) carriers. Summary: Cyber Threats and Solutions in the Supply Chain Joe Ohr and…
  continue reading
 
Can artificial intelligence make healthcare faster, cheaper, and more convenient? Rep. David Schweikert, R-Ariz., believes it can transform the medical landscape. From AI-powered diagnostics to driving down drug prices and providing free wearable tech for everyone, AI has the potential to overhaul the way we experience healthcare.…
  continue reading
 
Join us for an insightful discussion featuring one of our Program Committee members as she shares her experiences in building a startup. Inspiring women entrepreneurs to take risks demands that we also help them navigate the sometimes-tumultuous path to securing funding. We'll talk about what makes a successful pitch and how to engage with potentia…
  continue reading
 
Today on IT Unplugged, we're sharing game-changing insights for anyone navigating the complex world of nonprofit technology. I had the privilege of speaking with Abby, Executive Director of Jackie Nitschke Center, about how forward-thinking nonprofits are using IT to amplify their impact. Here's what you'll learn: · Innovative approaches to IT on a…
  continue reading
 
Leadership in digital ecosystems requires a commitment to safety, trust, and ethical practices. Our guest today, Dave Byrne, founder of Trust Raise and a member of the Irish Digital Board, shares his journey from major tech giants to establishing a company dedicated to improving the integrity of digital platforms. Dave Byrne has had an illustrious …
  continue reading
 
Research by Orange Tsai into Apache HTTPD's architecture reveals several vulns, NCC Group shows techniques for hacking IoT devices with Sonos speakers, finding use cases for WebAssembly, Slack's AI leaks data, DARPA wants a future of Rust, and more! Show Notes: https://securityweekly.com/asw-297
  continue reading
 
Nick Klingensmith and Joe Lynch discuss building resilient sales teams . Nick is the Founder and CEO of Stride Motivation, a company dedicated to transforming lives through inspiring keynote speeches and mindset coaching. Nick is an expert at helping achievement-driven professionals and leaders to overcome fear and rejection and push past self-limi…
  continue reading
 
Summer is coming to an end and fall is approaching, which means RSAC 2025 Call for Submissions will be opening soon. Each year, RSA Conference receives an incredible amount of submissions from speakers globally, but what makes a submission stand out to the Program Committee? As you explore topics and ideas, we want to share some helpful tips to kee…
  continue reading
 
Safeguarding Your Identity: Essential Tools and Techniques This episode focuses on the increasing dangers of data breaches and the various steps individuals can take to protect their personal information. Highlighting the threats posed by data breaches and data brokers, the discussion provides detailed reviews of free resources such as OperationPri…
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
This week we talk a lot about the CISO's relationship with the business and the challenges of being aligned and keeping up. We also talk about budget priorities, the challenge of doing security in small businesses, and the ever-present challenge of burnout. Finally, we discuss what servant leadership actually means. On this last topic, Ben makes a …
  continue reading
 
How are personal liability and indemnification impacting the CISO role? Darren Shou, Chief Strategy Officer from RSA Conference, describes the current landscape of CISO liability and the challenges facing CISOs today. He discusses the implications of the SEC's recent actions, including the charges against SolarWinds' CISO, and the growing trend of …
  continue reading
 
Loading …

Quick Reference Guide