Cybersecurity Secure Talk public
[search 0]
More

Download the App!

show episodes
 
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
 
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
 
The Bid Picture is a weekly podcast that provides useful and actionable cyber intelligence by examining cybersecurity news and events, and how we can learn from them and apply those lessons to our daily lives.For questions, comments, or any suggestions on which topics you would like to hear about on future episodes, please send an email to bidemi@thebidpicture.com. Thank you for your time, and God bless.
 
GovCast, a production of GovernmentCIO Media & Research, tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered.
 
According to the Bureau of Labor Statistics (BLS), 'Black or African-American' people make up only 3% of the information security analysts in the U.S. The goal of our podcast is to be a resource, and catalyst in the education, advancement, and visibility of African American Cybersecurity professionals world-wide. Support this podcast: https://anchor.fm/blakcyber/support
 
The State Bar of Michigan podcast series, On Balance, features a diversified array of legal thought leaders. Hosted by JoAnn Hathaway of the bar’s Practice Management Resource Center and Tish Vincent of its Lawyers and Judges Assistance Program, the series focuses on the need for interplay between practice management and lawyer-wellness for a thriving law practice.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
A podcast hosted by technology leaders who spent years working in IT for a Fortune 500 Company and we are passionate about leadership, technology, and the community. We talk to non-profits, startups, to thought leaders, or anyone else that has an interesting or compelling story. We will be looking to see how people are utilizing (or not utilizing) technology, what problems they are solving, the challenges and pitfalls of managing technology, and try to have some fun along the way! Hosted by ...
 
A technology podcast and an engaging platform for discussions and expert opinions on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and information security in support of technology and business. Winner of 2019-Outstanding Security Performance Awards, she is an acclaimed and well-known security expert and public speaker. On the podcast, she brings on different cybersecurity, privacy and risk management pr ...
 
reframe is a podcast series that brings you inspiring stories from successful people adding value to society. I'm always excited to meet my wonderful guests and talk to them about their journeys and practical advice they want to share with people like you, who want to grow in life. If you get value out of this podcast, please share it with your friends and subscribe on youtube, spotify, itunes or wherever you're listening, as it will really help me in growing the community and helping others ...
 
This is a podcast where we explore the issues today with the insider threat, or human factor, of our organizations. We also talk about ways to tackle those issues through training, culture, and technology in order to help information security and business professionals reduce risks in their environments. We have a patreon page for the podcast, located at . I don't want to be too pushy for this, but a couple of you have asked about ways that you can support the show.
 
On Homeland Homeroom, we focus on how security issues affect your everyday life - from cybersecurity to elections to transportation. We talk to reporters, U.S. representatives and listeners like you about the latest security news and best practices for keeping yourself secure. Our hosts come from both sides of the aisle: James Norton is former deputy assistant undersecretary at DHS in the George W. Bush administration. Dena Graziano is former Democratic communications director for the House ...
 
Securiosity is a weekly cybersecurity podcast from Scoop News Group. Greg Otto and Jen O’Daniel will spend each week answering the overarching questions from the latest in security and privacy news. They’ll also talk to leaders in both the public and private sector on how they view the ever-changing cybersecurity landscape. Policy, research, venture capital…they’ll examine it all. If you’re curious like us, like and subscribe now. Securiosity. You have questions. So do we.
 
Every day we hear jargon and see writing from so-called “experts,” and we don’t know what we should follow and what we should avoid. Published practices aren’t always best practices!Listen to over 50 episodes from Sam Holcman’s weekly radio show, The 2020’s Enterprise with Sam Holcman which aired on VoiceAmerica Radio. Each episode gets to the bottom of what business executives, managers, practitioners, and staff actually need to create innovative solutions that deliver- no utopia required. ...
 
Do you want to dive into the ocean of IoT but don't know how to get started? Would you like to know more about the possibilities that lie in the digital future? Are you into digital trends that revolutionize today's industries? If so, this podcast is for you! Welcome to our podcast “Unlock the full potential of IoT”, a 360-degree view of the latest IoT trends. We talk to the innovators, experts and visionaries who work and play in digital transformation. Explore with us the practical ways to ...
 
Loading …
show series
 
Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. His expertise ranges from architecting complete security infrastructure, to assessments for vulnerabilities, risk…
 
Indian authorities say October’s Mumbai blackout was “human error,” not cybersabotage. CISA directs US civilian agencies to clean up Microsoft Exchange on-premise vulnerabilities. More effects of the Accellion FTA supply chain compromise. Some trends in social engineering. Andrea Little Limbago brings us up to date on the RSA supply chain sandbox. …
 
As secure as the mainframe is, it is still another operating system with software running on it. Many information security programs tend to offer these systems special treatment, exemptions, and exceptions — especially when it comes to zero-trust frameworks. One organization — Key Resources — has been looking at this problem for quite some time, an…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-much-log-data-do-you-need You're a CISO struggling with an influx of log data into your SIEM. What's the data you want to keep, and for how long? You want insights, but you also want to keep costs down. Holding onto everything is going to c…
 
India continues to investigate the possibility of RedEcho cybersabotage of its power distribution system, but says any hack was stopped and contained. Microsoft issues an out-of-band patch against a Chinese-run “Operation Exchange Marauder.” The financial sector works to contain an Ursnif outbreak. CISA issues ICS security advisories. Myanmar and t…
 
We're back with more In Check with Fintech! This week, we are sitting down with Claire Gunter, Global Business Development Manager of EBANX, to talk about expanding into LatAm, moving into new markets during a pandemic, and how local payments can make a difference when moving into new markets. Enjoy listening!…
 
Did we invent computers, robots, and A.I. because we are fundamentally lazy? It may look like it, but that is not the technological driver. On the opposite side, it has to do with doing more, faster, more effectively, and going above and beyond our human capabilities. This same thing can be said of a carved stone used as a tool by our ancestors, th…
 
Good morning everybody! I was on WGAN this morning with Matt Gagnon. I went into a little detail about what a Zero Trust Security Model is and how it differs from a traditional network design and why you should be considering this type of system. Then we discussed the future of computing and why Chromebooks are so popular. Here we go with Matt. And…
 
Indian authorities continue to investigate the possibility that Mumbai’s power grid was hacked last October. Apple’s walled garden’s security can inhibit detection of threats that manage to get inside. An Atlantic Council report recommends international action against access-as-a-service brokers to stall proliferation of cyber offensive tools. Ben …
 
Madeline Albright, the first female United States Secretary of State, has a famous quote: “There’s a special place in hell for women who don’t help other women.” Study after study shows women who support women are more successful in business. A woman alone has power; however collectively we have an impact. As we raise each other up we channel the p…
 
Forget about stereotypes of hackers being nefarious masterminds. Hackers are dynamic, young individuals who come from all walks of life — diversity is a big plus for this community — and so it is for the cybercriminals, but they actually are nefarious masterminds. Countless people are building the applications and systems we use at work and at home…
 
Good morning, everybody. I was on this morning on WTAG with Jim Polito. We discussed his newest foray into the social media platform, TikTok, and some of the problems with using TikTok. Then we got into a question from one of his callers about Home Title Lock. Here we go with Jim. For more tech tips, news, and updates, visit - CraigPeterson.com. --…
 
What's the secret to creating positive partner experiences? It starts with leading a team of happy employees. Join Craig Fulton, Chief Customer Officer, and Danielle Jackson, IT Nation Community Manager, as they discuss how getting your tech stack and processes in place can have a great impact beyond driving efficiency. Tune in now!…
 
@thefluffy007 A Bay Area Native (Berkeley) I always tell people my computer journey started at 14, but it really started at 5th grade (have a good story to tell about this) Was a bad student in my ninth grade year - almost kicked out of high school due to cutting. Had a 1.7 GPA. After my summer internship turned it around to a 4.0. Once I graduated…
 
Chinese cyber engagement with Indian critical infrastructure is reported: the objective isn’t benign from India’s point of view, but exactly what the objective is, specifically, remains a matter of speculation. The US Governemnt declassifies its report on the murder of Saudi journalist Jamal Khashoggi. The SolarWinds supply chain compromise remains…
 
On today’s program, a conversation with a pair of CEOs from leading companies in the cyber security industry. Joining us are Marten Mickos, CEO of bug bounty platform provider HackerOne, and Christopher Ahlberg, CEO at Recorded Future. They share their insights on what it takes to be a successful CEO in a rapidly changing cybersecurity field, the i…
 
Welcome, Craig Peterson here. This morning I was on with Chris Ryan on NH Today. He wanted to discuss what is the best technology to buy. We got into some details of the benefits and drawbacks of each. Here we go with Chris. These and more tech tips, news, and updates visit. - CraigPeterson.com --- Automated Machine Generated Transcript: Craig Pete…
 
Every few years, after the public learns about an ugly, online harassment campaign, a familiar response shoots forth: Change the way we talk to one another online, either by changing the law, or changing the rules for how we identify ourselves online.But these "solutions" could actually bring more problems, particularly for vulnerable communities.T…
 
Head of Product for IBM Security Aarti Borkar shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche wor…
 
In this episode, host Bidemi Ologunde presents a December 2020 incident where a college professor and her two teenage daughters were pranked with Uber and Lyft ride requests and a ridiculous pizza order (they don't even eat pizza). Please send questions, comments and suggestions to bidemi@thebidpicture.com. Thank you for your time!…
 
Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citiz…
 
Welcome! It was also another busy week on the technology front and we are going to delve into what actually caused the energy problems in Texas. There is a new type of malware that is affecting Macs and it is has a different MO. Then we are going to discuss Apple and their ventures into automated electric cars and what we can expect. Why are states…
 
What happens in society when consumers have little control over their customer service experience? Join us for this episode as consumer advocate, Christopher Elliott, shares some insights into the consumer/business relationship. You'll learn: why consumers need to understand the basics of security, and pay attention to what companies are claiming w…
 
Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cy…
 
As one of the core members in implementing the Julia programming language, Keno Fischer shares the advantages of Julia, behind the scenes of creating a coding language, and his vision for the future. Keno Fischer is the cofounder of Julia Computing and a Forbes 30 Under 30 in Enterprise Technology. Julia is one of the fastest modern open-source lan…
 
FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as…
 
We are back with another Candid CyberSec podcast with a very amazing guest: none other than Shara Shamban. She's an amazing entrepreneur and information security person and we talked about the things we care about mutually. Shara has served for the armed forces. Listen in to hear about her experience in the military where in the country both men an…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-should-finance-or-legal-mentor-cyber Cybersecurity leaders are constantly looking for ways to improve how they think about risk, and how they communicate risk. But they're not the only ones. Others have been managing risk long before CISOs exis…
 
In Check with Fintech is back! This week, we are sitting down with Peter Krauss, CEO of ArrowEye - the market leader in just-in-time digital card production. Listen in as we discuss how fintechs, banks, and non-financial businesses can use payment cards to bridge the gap between cash and digital payment methods, facilitate economic growth and drive…
 
Imagine you could experience worlds that you design and build the way you want them to be; alternative realities that you can enter and leave as you wish. Now, Imagine there's no countries, nothing to kill or die for... imagine all the people, livin' life in peace. You may say I'm a dreamer. But I'm not the only one. Certainly not the only one. The…
 
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
 
Paul and guest host John Caruthers talk with Neil Daswani and Moudy Elbayadi and discuss their new book, "Big Breaches: Cybersecurity Lessons for Everyone"! In an engaging and exciting fashion, Big Breaches covers some of the largest security breaches plus technical topics behind them such as phishing, malware, third-party compromises, software vul…
 
Good morning everybody! I was on WGAN this morning with Matt Gagnon. We really got into the power distribution issues in TX and it appears that the Energy department was really "asleep at the switch." Then we talked about the nightmare that these bureaucratic states are having with their vaccine scheduling websites. We discussed why they are having…
 
How do you start your digital journey? What is the benefit for two huge corporates such as SAP and Siemens to work in partnerships and how can you profit from these alliances? Moving to ecosystems is the way forward. Revealing what it all has to do with the Siemens and SAP digital threat, our guests Thomas Saueressig, Member of the Executive Board …
 
If a tree falls in a forest and no one is around to hear it, does it make a sound? Yes and no, it depends on who you ask. In our case, the answer is a solid FOR SURE. Especially once we consider the squirrels that live in the said forest — the criminal and the ethical ones. Listen up. In the cybersecurity community it is not uncommon to use the sen…
 
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
 
Chances are you’re on at least one social media platform. It’s a great way to connect, but you need to connect and share mindfully. Tim Sadler helps us take a closer look at how to social safely. You can overshare on social media and it can get risky quickly if you share personal data like your birthday, you COVID vaccine card, or even the names of…
 
Good morning, everybody. I was on this morning on WTAG with Jim Polito. We discussed the power situation in Texas and then brought it home to Mass and talked about whether we could be in for anything similar. We also discussed Green Energy and Nuclear Energy. Then we got into 6G -- yes that is not a typo, Apple is developing their own chips and dit…
 
Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accen…
 
Deepfakes continue to be a growing security concern. As the technology to alter video footage and replace one person's face with another’s has advanced in ease, sophistication and availability, the use of deepfakes has become more broadly prevalent, extending beyond novelty use to become another tool in the adversary’s playbook. Our guest today is …
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login