The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
The Secure Talk podcast reviews the latest threats, tips, and trends related to cybersecurity and compliance. Host, Mark Shriner, interviews leading cybersecurity executives, consultants, and educators and discuss best practices related to IT security and compliance. securetalkpodcast.com
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
Sleep at night knowing what's going on with your cybersecurity - America’s Leading Security Coach - FBI InfraGard Webinar Moderator - Network Security Since 1991 CraigPeterson.com
The monthly podcast for security professionals by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
Welcome to "In Check with Fintech", the PCN podcast series. In this podcast series we will talk about all things related to the payments & fintech industry, from open banking to blockchain, cybersecurity, ecommerce, merchants, acquirers, PSP's and more!
The Bid Picture is a weekly podcast that provides useful and actionable cyber intelligence by examining cybersecurity news and events, and how we can learn from them and apply those lessons to our daily lives.For questions, comments, or any suggestions on which topics you would like to hear about on future episodes, please send an email to bidemi@thebidpicture.com. Thank you for your time, and God bless.
GovCast, a production of GovernmentCIO Media & Research, tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered.
The official podcast of the annual Global Connected Aircraft Summit, featuring interviews with influencers across the connected aircraft ecosystem on topics such as airline business models and cockpit improvements, cybersecurity, to new IFEC technologies and more.
According to the Bureau of Labor Statistics (BLS), 'Black or African-American' people make up only 3% of the information security analysts in the U.S. The goal of our podcast is to be a resource, and catalyst in the education, advancement, and visibility of African American Cybersecurity professionals world-wide. Support this podcast: https://anchor.fm/blakcyber/support
We cover the latest in cybersecurity news, including what new threats are out there and what you can do to protect yourself and your clients.
The State Bar of Michigan podcast series, On Balance, features a diversified array of legal thought leaders. Hosted by JoAnn Hathaway of the bar’s Practice Management Resource Center and Tish Vincent of its Lawyers and Judges Assistance Program, the series focuses on the need for interplay between practice management and lawyer-wellness for a thriving law practice.
This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.
Your career-related cybersecurity show. Regularly we will be speaking with a variety of guests from industry leaders to new entrants into the space. Each sharing their journey to where they are today, views on the industry, and how others can find success navigating their career.
Online & Offline Safety Tips, Techniques & Technologies
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
A podcast hosted by technology leaders who spent years working in IT for a Fortune 500 Company and we are passionate about leadership, technology, and the community. We talk to non-profits, startups, to thought leaders, or anyone else that has an interesting or compelling story. We will be looking to see how people are utilizing (or not utilizing) technology, what problems they are solving, the challenges and pitfalls of managing technology, and try to have some fun along the way! Hosted by ...
A technology podcast and an engaging platform for discussions and expert opinions on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and information security in support of technology and business. Winner of 2019-Outstanding Security Performance Awards, she is an acclaimed and well-known security expert and public speaker. On the podcast, she brings on different cybersecurity, privacy and risk management pr ...
Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!
Security writer Steve Ragan talks with experts about the latest in cybersecurity, ransomware, malware, hacking and more. Stay informed, minimize risk and protect your organization. Catch new episodes weekly. 284975
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
reframe is a podcast series that brings you inspiring stories from successful people adding value to society. I'm always excited to meet my wonderful guests and talk to them about their journeys and practical advice they want to share with people like you, who want to grow in life. If you get value out of this podcast, please share it with your friends and subscribe on youtube, spotify, itunes or wherever you're listening, as it will really help me in growing the community and helping others ...
Added recently, check back soon.
Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!
This is a podcast where we explore the issues today with the insider threat, or human factor, of our organizations. We also talk about ways to tackle those issues through training, culture, and technology in order to help information security and business professionals reduce risks in their environments. We have a patreon page for the podcast, located at . I don't want to be too pushy for this, but a couple of you have asked about ways that you can support the show.
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
On Homeland Homeroom, we focus on how security issues affect your everyday life - from cybersecurity to elections to transportation. We talk to reporters, U.S. representatives and listeners like you about the latest security news and best practices for keeping yourself secure. Our hosts come from both sides of the aisle: James Norton is former deputy assistant undersecretary at DHS in the George W. Bush administration. Dena Graziano is former Democratic communications director for the House ...
Welcome to Lock and Code, a Malwarebytes podcast. Every two weeks, we serve up the latest cybersecurity headlines, plus we dig deep into some of the industry's most vexing topics. From deep state to deep fakes, we separate cybersecurity fact from fiction.
Securiosity is a weekly cybersecurity podcast from Scoop News Group. Greg Otto and Jen O’Daniel will spend each week answering the overarching questions from the latest in security and privacy news. They’ll also talk to leaders in both the public and private sector on how they view the ever-changing cybersecurity landscape. Policy, research, venture capital…they’ll examine it all. If you’re curious like us, like and subscribe now. Securiosity. You have questions. So do we.
LeetSpeak with Alissa Knight, bridging the gap between all things information security. We’ll talk about the latest threats, vulnerabilities, security conferences, malware and exploits, as well as interview CIOs and CISOs from around the world about information security topics that matter most. Alissa Knight, one woman, one mission, one voice
Digital Transformation Talk, hosted by Broadsuite Media Group’s Shelly Kramer, discusses new and existing collaboration technologies that will streamline communications across different platforms of business.
Every day we hear jargon and see writing from so-called “experts,” and we don’t know what we should follow and what we should avoid. Published practices aren’t always best practices!Listen to over 50 episodes from Sam Holcman’s weekly radio show, The 2020’s Enterprise with Sam Holcman which aired on VoiceAmerica Radio. Each episode gets to the bottom of what business executives, managers, practitioners, and staff actually need to create innovative solutions that deliver- no utopia required. ...
Do you want to dive into the ocean of IoT but don't know how to get started? Would you like to know more about the possibilities that lie in the digital future? Are you into digital trends that revolutionize today's industries? If so, this podcast is for you! Welcome to our podcast “Unlock the full potential of IoT”, a 360-degree view of the latest IoT trends. We talk to the innovators, experts and visionaries who work and play in digital transformation. Explore with us the practical ways to ...
Digital Transformation Talks Series, latest emerging trends and innovations
Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. His expertise ranges from architecting complete security infrastructure, to assessments for vulnerabilities, risk…
T
The CyberWire Daily


1
Happy Slam the Scam Day. Indian authorities continue to investigate grid incidents. CISA tells US Federal agencies to clean up Exchange bugs by noon tomorrow. Supply chain compromise.
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10
Indian authorities say October’s Mumbai blackout was “human error,” not cybersabotage. CISA directs US civilian agencies to clean up Microsoft Exchange on-premise vulnerabilities. More effects of the Accellion FTA supply chain compromise. Some trends in social engineering. Andrea Little Limbago brings us up to date on the RSA supply chain sandbox. …
I
ITSPmagazine Podcast


1
When Failure Is Not An Option, Organizations Turn To The Mainframe — Incorporating Mainframes Into Your Zero Trust Architecture | A Key Resources Story With Cynthia Overby
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01
As secure as the mainframe is, it is still another operating system with software running on it. Many information security programs tend to offer these systems special treatment, exemptions, and exceptions — especially when it comes to zero-trust frameworks. One organization — Key Resources — has been looking at this problem for quite some time, an…
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-much-log-data-do-you-need You're a CISO struggling with an influx of log data into your SIEM. What's the data you want to keep, and for how long? You want insights, but you also want to keep costs down. Holding onto everything is going to c…
T
The CyberWire Daily


1
RedEcho under investigation (amid reassurances). Stopping Operation Exchange Marauder. Containing Ursnif. Cyber proliferation. And another round in the Crypto Wars.
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27
India continues to investigate the possibility of RedEcho cybersabotage of its power distribution system, but says any hack was stopped and contained. Microsoft issues an out-of-band patch against a Chinese-run “Operation Exchange Marauder.” The financial sector works to contain an Ursnif outbreak. CISA issues ICS security advisories. Myanmar and t…
I
In Check with Fintech by PCN


1
Interview with Claire Gunter, Global Business Development Manager at EBANX
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10
We're back with more In Check with Fintech! This week, we are sitting down with Claire Gunter, Global Business Development Manager of EBANX, to talk about expanding into LatAm, moving into new markets during a pandemic, and how local payments can make a difference when moving into new markets. Enjoy listening!…
I
ITSPmagazine Podcast


1
The Quest For The Master Algorithm — How The Ultimate Learning Machine Will Remake Our World | A Conversation With Pedro Domingos
40:56
40:56
Play later
Play later
Lists
Like
Liked
40:56
Did we invent computers, robots, and A.I. because we are fundamentally lazy? It may look like it, but that is not the technological driver. On the opposite side, it has to do with doing more, faster, more effectively, and going above and beyond our human capabilities. This same thing can be said of a carved stone used as a tool by our ancestors, th…
C
CISO's Secrets

1
Ep. S1E5 - Johnathan Hunt, CISO at GitLab
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55
Episode 5 of CISO’s Secrets where host and CISO James Azar is joined by the great Johnathan Hunt CISO at GitLab to discuss Cloud Security and how securing the cloud and working in a SaaS environment can challenge a CISO and what Johnathan does to ensure he empowers his team and organization to be secure.…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON: WGAN Mornings News with Matt Gagnon: Why You Should Consider A Zero Trust Security Model and Is there a Chromebook in your Future?
7:24
7:24
Play later
Play later
Lists
Like
Liked
7:24
Good morning everybody! I was on WGAN this morning with Matt Gagnon. I went into a little detail about what a Zero Trust Security Model is and how it differs from a traditional network design and why you should be considering this type of system. Then we discussed the future of computing and why Chromebooks are so popular. Here we go with Matt. And…
T
The CyberWire Daily


1
India investigates the possibility of cybersabotage. Walls are opaque to defenders, too. Recommendations for cyber nonproliferation. SolarWinds updates (with an SEC appearance).
23:39
23:39
Play later
Play later
Lists
Like
Liked
23:39
Indian authorities continue to investigate the possibility that Mumbai’s power grid was hacked last October. Apple’s walled garden’s security can inhibit detection of threats that manage to get inside. An Atlantic Council report recommends international action against access-as-a-service brokers to stall proliferation of cyber offensive tools. Ben …
K
KnowTechTalk


1
Ep, 67 - Michelle Ragusa-McBain of JS Group
15:52
15:52
Play later
Play later
Lists
Like
Liked
15:52
Madeline Albright, the first female United States Secretary of State, has a famous quote: “There’s a special place in hell for women who don’t help other women.” Study after study shows women who support women are more successful in business. A woman alone has power; however collectively we have an impact. As we raise each other up we channel the p…
I
ITSPmagazine Podcast


1
2020 Inside The Mind Of A Hacker Report | There Will Always Be Hackers — We Just Need More | A Bugcrowd Story — Part 3 of 4 | With Robin Marte (@masonhck357) And Michael Skelton (@codingo)
50:58
50:58
Play later
Play later
Lists
Like
Liked
50:58
Forget about stereotypes of hackers being nefarious masterminds. Hackers are dynamic, young individuals who come from all walks of life — diversity is a big plus for this community — and so it is for the cybercriminals, but they actually are nefarious masterminds. Countless people are building the applications and systems we use at work and at home…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON - The Jim Polito Show - WTAG 580 AM: TikTok and Home Title Lock
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47
Good morning, everybody. I was on this morning on WTAG with Jim Polito. We discussed his newest foray into the social media platform, TikTok, and some of the problems with using TikTok. Then we got into a question from one of his callers about Home Title Lock. Here we go with Jim. For more tech tips, news, and updates, visit - CraigPeterson.com. --…
C
ConnectWise Podcast Network


1
Inside The Industry: How to Drive Efficiency, Maximize Profit, and Lead Happy Employees
25:01
25:01
Play later
Play later
Lists
Like
Liked
25:01
What's the secret to creating positive partner experiences? It starts with leading a team of happy employees. Join Craig Fulton, Chief Customer Officer, and Danielle Jackson, IT Nation Community Manager, as they discuss how getting your tech stack and processes in place can have a great impact beyond driving efficiency. Tune in now!…
B
Brakeing Down Security Podcast


1
2021-008-Jasmine jackson - TheFluffy007, Bio and background, Android App analysis - part 1
52:33
52:33
Play later
Play later
Lists
Like
Liked
52:33
@thefluffy007 A Bay Area Native (Berkeley) I always tell people my computer journey started at 14, but it really started at 5th grade (have a good story to tell about this) Was a bad student in my ninth grade year - almost kicked out of high school due to cutting. Had a 1.7 GPA. After my summer internship turned it around to a 4.0. Once I graduated…
The recent manipulation of GameStop stock points to the need for public companies to carefully monitor mentions of their firm on social media channels to look for signs of emerging fraudulent practices, says Chase Cunningham, chief strategy officer at Ericom Software.By BankInfoSecurity.com
T
The CyberWire Daily


1
“RedEcho’s”activity in India’s power grid is described. US report on Khashoggi murder declassified SolarWinds compromise inquiry updates. Ill-intentioned SEO. President’s Cup winner announced.
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30
Chinese cyber engagement with Indian critical infrastructure is reported: the objective isn’t benign from India’s point of view, but exactly what the objective is, specifically, remains a matter of speculation. The US Governemnt declassifies its report on the murder of Saudi journalist Jamal Khashoggi. The SolarWinds supply chain compromise remains…
On today’s program, a conversation with a pair of CEOs from leading companies in the cyber security industry. Joining us are Marten Mickos, CEO of bug bounty platform provider HackerOne, and Christopher Ahlberg, CEO at Recorded Future. They share their insights on what it takes to be a successful CEO in a rapidly changing cybersecurity field, the i…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON NH Today WGIR-AM 610: What Laptop Should You Buy
8:02
8:02
Play later
Play later
Lists
Like
Liked
8:02
Welcome, Craig Peterson here. This morning I was on with Chris Ryan on NH Today. He wanted to discuss what is the best technology to buy. We got into some details of the benefits and drawbacks of each. Here we go with Chris. These and more tech tips, news, and updates visit. - CraigPeterson.com --- Automated Machine Generated Transcript: Craig Pete…
G
Grassroots Security: Cybersecurity for Everyone


1
Denial of Service? What is it and what to do? | Grassroots Security (S2:E7)
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01
We've heard of a denial of service. But what is it? And what can we do? Blog Entry (With References): https://grassrootsecurity.com/2021/03/01/denial-of-service-what-is-it-and-what-to-do/By Neil Quiogue
L
Lock and Code

1
Defending online anonymity and speech with Eva Galperin
39:15
39:15
Play later
Play later
Lists
Like
Liked
39:15
Every few years, after the public learns about an ugly, online harassment campaign, a familiar response shoots forth: Change the way we talk to one another online, either by changing the law, or changing the rules for how we identify ourselves online.But these "solutions" could actually bring more problems, particularly for vulnerable communities.T…
T
The CyberWire Daily


1
Aarti Borkar: Make your own choices. [Product} [Career Notes]
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38
Head of Product for IBM Security Aarti Borkar shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche wor…
T
The Bid Picture (Simplified Cyber Threat Intelligence)


1
9: In Orlando, Florida, A College Professor and Her Two Daughters were Cyber-Pranked with Uber and Lyft Ride Requests and a Ridiculous Pizza Order.
26:27
26:27
Play later
Play later
Lists
Like
Liked
26:27
In this episode, host Bidemi Ologunde presents a December 2020 incident where a college professor and her two teenage daughters were pranked with Uber and Lyft ride requests and a ridiculous pizza order (they don't even eat pizza). Please send questions, comments and suggestions to bidemi@thebidpicture.com. Thank you for your time!…
T
The CyberWire Daily


1
Shining a light on China's cyber underground. [Research Saturday]
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11
Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citiz…
C
Craig Peterson - America's Leading Security Coach


1
Tech Talk with Craig Peterson Podcast: What really happened in TX, New MAC malware, Apples Electric Vehicles and More
1:19:15
1:19:15
Play later
Play later
Lists
Like
Liked
1:19:15
Welcome! It was also another busy week on the technology front and we are going to delve into what actually caused the energy problems in Texas. There is a new type of malware that is affecting Macs and it is has a different MO. Then we are going to discuss Apple and their ventures into automated electric cars and what we can expect. Why are states…
I
ITSPmagazine Podcast


1
Doing The Right Thing Is Always The Right Thing | A Conversation With Consumer Advocate Christopher Elliott | Tech Done Different With Ted Harrington
42:48
42:48
Play later
Play later
Lists
Like
Liked
42:48
What happens in society when consumers have little control over their customer service experience? Join us for this episode as consumer advocate, Christopher Elliott, shares some insights into the consumer/business relationship. You'll learn: why consumers need to understand the basics of security, and pay attention to what companies are claiming w…
T
The CyberWire Daily


1
Oxford lab studying the COVID-19 virus is hacked. Zoom impersonation campaign. Senators would’ve liked to have heard from Amazon about Solorigate. NSA likes zero trust. NIST IoT guidelines.
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45
Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cy…
The latest edition of the ISMG Security Report features an analysis of a federal crackdown on ICO cryptocurrency scams. Also featured: An update on the SonicWall hack investigation and the use of digital IDs to verify COVID-19 testing.By BankInfoSecurity.com
I
ITSPmagazine Podcast


1
How To Create A Programming Language, Using Your Time To Learn By Failing, And The Need To Be A Little Crazy | A Conversation With Keno Fischer | Elevate The Future With Ellen Xu
29:15
29:15
Play later
Play later
Lists
Like
Liked
29:15
As one of the core members in implementing the Julia programming language, Keno Fischer shares the advantages of Julia, behind the scenes of creating a coding language, and his vision for the future. Keno Fischer is the cofounder of Julia Computing and a Forbes 30 Under 30 in Enterprise Technology. Julia is one of the fastest modern open-source lan…
T
The CyberWire Daily


1
PLA spyware keeps Tibetans under surveillance. Cyber conflict between Ukraine and Russia, some conventionally criminal, other state-directed. US Executive Order addresses supply chain resilience.
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38
FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as…
I
ITSPmagazine Podcast


1
A Conversation With Shira Shamban | Candid CyberSec Podcast With Vandana Verma
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48
We are back with another Candid CyberSec podcast with a very amazing guest: none other than Shara Shamban. She's an amazing entrepreneur and information security person and we talked about the things we care about mutually. Shara has served for the armed forces. Listen in to hear about her experience in the military where in the country both men an…
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-should-finance-or-legal-mentor-cyber Cybersecurity leaders are constantly looking for ways to improve how they think about risk, and how they communicate risk. But they're not the only ones. Others have been managing risk long before CISOs exis…
C
ConnectWise Podcast Network


1
ConnectWise Tech Talk: Getting Started With Integrations
39:28
39:28
Play later
Play later
Lists
Like
Liked
39:28
Join the ConnectWise Invent team as they share details on the opportunities and tools available for extending ConnectWise products. The team will review how to access our APIs, resources available, the ConnectWise Marketplace and support options.
I
In Check with Fintech by PCN


1
Interview with Peter Krauss, CEO of ArrowEye Solutions
37:04
37:04
Play later
Play later
Lists
Like
Liked
37:04
In Check with Fintech is back! This week, we are sitting down with Peter Krauss, CEO of ArrowEye - the market leader in just-in-time digital card production. Listen in as we discuss how fintechs, banks, and non-financial businesses can use payment cards to bridge the gap between cash and digital payment methods, facilitate economic growth and drive…
I
ITSPmagazine Podcast


1
Ant Colonies, Metaverses, Virtual & Augmented Realities, Diversity, Ethics, And Some Thoughts About The Future | An Audio Signals Conversation With Antonia Forster
41:32
41:32
Play later
Play later
Lists
Like
Liked
41:32
Imagine you could experience worlds that you design and build the way you want them to be; alternative realities that you can enter and leave as you wish. Now, Imagine there's no countries, nothing to kill or die for... imagine all the people, livin' life in peace. You may say I'm a dreamer. But I'm not the only one. Certainly not the only one. The…
T
The CyberWire Daily


1
Accellion FTA compromise spreads. Ocean Lotus is back. LazyScripter seems to represent a new threat group. Notes from the SolarWinds hearings. New ICS threat actors.
25:59
25:59
Play later
Play later
Lists
Like
Liked
25:59
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
T
TNT - Technology and Things


1
#37 Big Breaches: Cybersecurity Lessons for Everyone
47:26
47:26
Play later
Play later
Lists
Like
Liked
47:26
Paul and guest host John Caruthers talk with Neil Daswani and Moudy Elbayadi and discuss their new book, "Big Breaches: Cybersecurity Lessons for Everyone"! In an engaging and exciting fashion, Big Breaches covers some of the largest security breaches plus technical topics behind them such as phishing, malware, third-party compromises, software vul…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON: WGAN Mornings News with Matt Gagnon: Texas Energy - Asleep at the Switch and State Vaccine Scheduling Websites are a Nightmare
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13
Good morning everybody! I was on WGAN this morning with Matt Gagnon. We really got into the power distribution issues in TX and it appears that the Energy department was really "asleep at the switch." Then we talked about the nightmare that these bureaucratic states are having with their vaccine scheduling websites. We discussed why they are having…
S
Siemens Advanta - Unlock the full potential of IoT


1
IoT: Where to begin and the value of partnerships
25:13
25:13
Play later
Play later
Lists
Like
Liked
25:13
How do you start your digital journey? What is the benefit for two huge corporates such as SAP and Siemens to work in partnerships and how can you profit from these alliances? Moving to ecosystems is the way forward. Revealing what it all has to do with the Siemens and SAP digital threat, our guests Thomas Saueressig, Member of the Executive Board …
I
ITSPmagazine Podcast


1
Starting or Running a Vulnerability Disclosure Program? Here’s What To Do Next | Redefining Responsible Disclosure With Chloé Messdaghi And John Jackson
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49
If a tree falls in a forest and no one is around to hear it, does it make a sound? Yes and no, it depends on who you ask. In our case, the answer is a solid FOR SURE. Especially once we consider the squirrels that live in the said forest — the criminal and the ethical ones. Listen up. In the cybersecurity community it is not uncommon to use the sen…
T
The CyberWire Daily


1
DDoS in hybrid war. Accellion compromise attributed. Initial access brokers. Agile C2 for botnets. US Senate’s SolarWinds hearing. US DHS cyber strategy. Shiny new phishbait.
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
I
ITSPmagazine Podcast


1
TMI? Staying Social Without Oversharing | A Conversation With Tim Sadler | Your Everyday Cyber With Limor Kessem And Diana Kelley
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13
Chances are you’re on at least one social media platform. It’s a great way to connect, but you need to connect and share mindfully. Tim Sadler helps us take a closer look at how to social safely. You can overshare on social media and it can get risky quickly if you share personal data like your birthday, you COVID vaccine card, or even the names of…
C
Craig Peterson - America's Leading Security Coach


1
AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Texas Energy Problems -- Could Mass be in for Something Similar? and Apple Goes All In on 6G
12:43
12:43
Play later
Play later
Lists
Like
Liked
12:43
Good morning, everybody. I was on this morning on WTAG with Jim Polito. We discussed the power situation in Texas and then brought it home to Mass and talked about whether we could be in for anything similar. We also discussed Green Energy and Nuclear Energy. Then we got into 6G -- yes that is not a typo, Apple is developing their own chips and dit…
T
The CyberWire Daily


1
Facebook takes down Myanmar military page. Chinese cyberespionage and cloned Equation Group tools. Supply chain compromises. Threat trends.
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49
Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accen…
Deepfakes continue to be a growing security concern. As the technology to alter video footage and replace one person's face with another’s has advanced in ease, sophistication and availability, the use of deepfakes has become more broadly prevalent, extending beyond novelty use to become another tool in the adversary’s playbook. Our guest today is …