Best data security breach podcasts we could find (Updated February 2018)
Related podcasts: Breach Data Persistent Advanced Security Tech Cyber Hacking Cpes Issmp Gray Threat Cissp Federal Joe Business Business News Data Breach Hack Software Development  
Data security breach public [search 0]
show episodes
 
T
The Standard Deviant Security Podcast | Bi-weekly show discussing cyber attacks, data breaches, malware, privacy issues, Internet culture and infosec
 
Are you ready for a completely different kind of information security podcast? The Standard Deviant Security Podcast is a bi-weekly show that takes an in-depth look at the people behind the cyber security stories you hear in the news. Each episode cuts through the noise and hype to deliver compelling and entertaining interviews with people that are challenging the status quo. Hosted by Tony Martin-Vegue -- www.thestandarddeviant.com
 
A
Advanced Persistent Security
Monthly
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
S
Security Wire Weekly
Rare
 
The cybersecurity industry’s premier podcasts featuring the latest information security news, interviews and information.
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
A
Advanced Persistent Security
Monthly
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
A
Advanced Persistent Security
Monthly
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
C
Customer-Vendor Alignment, IT Governance & Data Security
 
Manuel W. Lloyd is a top industry Virtual CIO helping healthcare and banking businesses achieve customer-vendor alignment, IT governance, and data security while avoiding costly and embarrassing data breaches. The program is supported by Holiday Delta, Inc dba Dominos Pizza, JTV Management, & Manuel W. Lloyd Consulting®
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
D
Data Breach Today Podcast
Daily
 
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
Defensive Security is a weekly information security podcast which reviews recent high profile security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
R
Risk & Repeat
Weekly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
O
Optimal Security Podcast Series
Monthly+
 
Organizations are facing a growing and rapidly evolving set of security threats, including: IT outsourcing, cybercrime, workforce mobility, Web 2.0, and data breaches. Lumension is the leading provider of operational endpoint security solutions that help protect your vital information and manage your critical risk across network and endpoint assets. Lumension delivers Vulnerability Management, Endpoint Protection, Data Protection, and Compliance and IT Risk Management solutions to more than ...
 
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
 
Defensive Security is a weekly information security podcast which reviews recent high profile security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
V
Veritas News Network - Truth is Trending
 
Truth is trending on the Veritas News Network! VNN is an online publication featuring the news and is dedicated to in-depth investigative reporting with a consumer advocacy focus. Our Managing Editor is a veteran investigative journalist who has won dozens of awards. Several categories of news are featured on the Veritas News Network include Citizen Journalism, Consumer News, Ripoffs & Scams, Consumer Advocacy, World News, US News, Crime, Economic News, Editorial & Opinion, Education, Health ...
 
I
Illumio
Rare
 
Illumio delivers adaptive security for every computing environment, protecting the 80 percent of data center and cloud traffic missed by the perimeter. The company’s Adaptive Security Platform™ visualizes application traffic and delivers continuous, scalable, and dynamic policy and enforcement to every bare-metal server, VM, container, and VDI within data centers and public clouds. Using Illumio, enterprises such as Morgan Stanley, Plantronics, NTT, King Entertainment, NetSuite, and Creative ...
 
P
Philipa Jane Business Consultant
 
Do you own a small to medium enterprise and need to become GDPR compliant? If you are not sure that you fall into the net requiring compliance, please feel free to get in touch with me to discuss. If you do need to become GDPR compliant and don't have the resources to hire a full-time officer, I am here to help you. With close to 20 years' IT, business and law experience, I will get you compliant as quickly and as painlessly as possible.I will discover your data with you, including that held ...
 
Loading …
show series
 
In this episode Armen is joined by Tamara McCleary, CEO of Thulium.co. They explore the benefits of accepting that digital business growth now depends on a great customer experience. Transcript Armen: Hi, I’m here with Tamara McCleary for today’s edition of Digital Identity 360. We’re actually on location at the Digital Identity Summit in San F ...…
 
Leading the latest edition of the ISMG Security Report: England's Court of Appeal rejects U.S. extradition request for suspected hacker Laurie Love. Also, what took Uber and Partners Health so long to come clean about their respective data breaches?
 
She released a new report Wednesday on Equifax’s massive 2017 data breach. https://www.vox.com/policy-and-politics/2018/2/7/16984522/elizabeth-warren-equifax-data-breach-cfpb report emerged six weeks sold $7 million contract eventually reversed announced revised up six weeks dropped testified broader issues pertaining to credit bureaus warned d ...…
 
L
La French Connection
 
Février 2018 Shameless plug Prochaines activités 8 février 2018 - ASIQ - La gestion des comptes à haut privilège 22 février 2018 - Hackfest/QuebecSec - Les étapes d’un incident de sécurité dans une perspective juridique 27 février 2018 - ISACA-Québec - La transformation des TI dans les entreprises à l’époque de l’infonuagique 13 avril 2018 - AS ...…
 
Leading the latest edition of the ISMG Security Report: Inside the darknet marketplaces that serve cybercrime-as-a-service buyers and sellers. Also, why the healthcare sector remains so bad at detecting data breaches and blocking ransomware.
 
In this episode: Issues facing businesses – Ransomware, employee negligence, malicious employee revenge, business email compromise. What constitutes a “breach,” as well as Utah’s Protection of Personal Information Act. Creating an Information Security Plan – Being proactive about assessing your company’s assets, risks and management. Creating p ...…
 
By Jamie Fox #protectveteranprivacy @veteranprivacy Rep. Mike Thompson Officially Inducted into the “VA Hall of Shame” Representative Mike Thompson and his VA liaison Rebecca Hermosillo have been officially inducted into the “VA Hall of Shame” for violating veterans’ privacy and ignoring constituents who report government corruption and who req ...…
 
By Jamie Fox #protectveteranprivacy @veteranprivacy On Thursday October 5, 2017, I sent the secretary of the VA, David Shulkin, an email titled “Repeatedly VIOLATED by corrupt VBA managers through privacy breaches – I respectfully request your assistance.” I then forwarded the same email I had sent to Shulkin, to Thomas Murphy, Acting Under Sec ...…
 
Upcoming Conferences ShmooCon 2018 - January 19-21, 2018 at the Washington Hilton in Washington, DChttp://shmoocon.org/ BSidesNYC January 20, 2018https://bsidesnyc.orghttp://www.securitybsides.com/ THOTCON 0x8 - May 4-5, 2018https://thotcon.org/SOLD OUT DerbyConSponsorships will open up the first week in March. Call for Trainers (CFT), Call for ...…
 
The biggest, baddest, worst hacks and vulnerabilities of 2017! All that coming up now on ThreatWire. ------------------------------- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat Wire RSS: https://shannon ...…
 
M
Mike Fabarez Sermons on Focal Point
 
Pastor’s Note Today in the Old Testament prophets we see again the theme of those who are lulled into complacency regarding their sin by the prosperity they have enjoyed. May it be a reminder to us that when “everything is going well” such peace and prosperity may not be indicative of our spiritual health. In Revelation 6 we begin to see the “s ...…
 
So much of security comes down to 4 little words: Keep it simple, stupid. CSO’s Steve Ragan and Fahmida Rashid explain why there’s no magical mystery cure for ransomware. Also, how much is data from the Equifax breach worth? (Hint: It's a whole lot less than you might think.)
 
Keyloggers were found in Wordpress and HP, mobile apps have all sorts of vulnerabilities, and Uber is hiding behind bug bounties? All that coming up now on ThreatWire. All that coming up now on ThreatWire. ------------------------------- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/ha ...…
 
SEC‘s Current Disclosure Guidance to Cybersecurity Risks and Cyber Incidents- On October 13, 2011, the SEC issued a Disclosure Guidance related to cybersecurity risks and cyber incidents. The guidance attempts to find a balance between satisfying the disclosure mandates of providing material information related to risks to the investing communi ...…
 
SEC Incorporates Cybersecurity Considerations in Disclosure and Supervisory Programs- The SEC incorporates cybersecurity considerations in its disclosure and supervisory programs, including in the context of the SEC’s review of public company disclosures. On September 26, 2016, Senator Mark R. Warner (D-VA), a member of the Senate Intelligence ...…
 
Paul reports on a flaw found in Dirty COW patch, Apache Software security updates, more hacks in 2018, and a MailSploit e-mail spoofing flaw! Jason Wood joins us to give expert commentary on a Federal Data Breach Legislation, and more on this episode of Hack Naked News! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode152 Visit http:/ ...…
 
Paul reports on a flaw found in Dirty COW patch, Apache Software security updates, more hacks in 2018, and a MailSploit e-mail spoofing flaw! Jason Wood joins us to give expert commentary on a Federal Data Breach Legislation, and more on this episode of Hack Naked News!Full Show Notes: https://wiki.securityweekly.com/HNNEpisode152 Visit http:// ...…
 
Melanie Mills of Melanie Mills Hollywood speaks with Patty Schmucker about all things glimmer and the behind the scenes of Dancing With The Stars on RadioAMB. broadcasting from Manhattan Beach and the World Wide Web you’re listening to CHS our healthy life dotnet as a service to our listeners this program is for general information and entertai ...…
 
In this PICNIC episode, we will welcome David Monahan, Research Director at Enterprise Management Associates. David is a senior information security executive with several years of experience. He has organized and managed both physical and information security programs, including security and network operations (SOCs and NOCs) for organizations ...…
 
Studies have shown that over 90% of cyber attacks start with a phishing email and that phishing is the main ingredient of most successful data breaches. While training employees not to click on unknown attachments can help, the reality is that human nature makes 100% prevention impossible. Thankfully, there are other strategies for assessing yo ...…
 
Recorded November 30, 2017 Topics -Buskoin -PHP: News Archive - 2017 -https://wiki.php.net/rfc/trailing-comma-function-calls -Dreaming code -“I’m thrilled to finally reveal that my secret project is bringing a Laracon to Australia!" -Laracon US 2018 is Announced - Laravel News -My Mental Health Toolbelt – Taylor Otwell – Medium -CompuServe’s fo ...…
 
In this episode Armen is joined by Vanita Pandey, VP of Product Marketing at ThreatMetrix. They explore the digital transformation of holiday eCommmerce, and how businesses must create seamless experiences in order to compete. Transcript Armen: Hi, thanks for joining us on today’s edition of Digital identity 360. I’m sitting here today with Van ...…
 
In this episode Armen is joined by Dasha Cherepennikova, Chief Strategy Officer of One World Identity. They discuss the importance of trust in the new age of digital identity. Transcript Armen: Hello! Welcome to Digital Identity 360, I’m Armen Najarian your host. I’m actually on location here at the Digital Identity summit in San Francisco, and ...…
 
R
Reed Smith Conversations
 
In this episode, we're interested in how collaboration works across a broad spectrum: from corporations to non-profit organizations to city governments to startups...even to artistic endeavors. This podcast’s wide-ranging conversations reveal the value of collaboration among individuals as well as major institutions. Just why does it work, and ...…
 
Did you know many small businesses are one fraudulent wire transfer away from going out of business? The average cost for a data breach for a U.S. company as of 2016 was seven million dollars. Many businesses have already been breached but don't even know it. So how do you protect yourself and your company's information secure? Scott Shackelfor ...…
 
As a small business owner, you need to decide how much money you should put back into your business, how much cash on hand you need, and how much to pay yourself. In this episode, hosts Elizabeth Larkin and Gene Marks answer the question: “I just started my business. I think I can afford to take a salary, but I’m not sure what to pay myself. Ar ...…
 
W
WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives
 
Producer/Host: Jim Campbell In the wake of years of huge data breaches, there is increasing talk of replacing vulnerable and increasingly ineffective Social Security numbers as a means of identification both online and off. It’s a hard problem, and the underlying questions that a Committee of the National Research Council asked 15 years ago abo ...…
 
On Monday, September 15th, 2008, tourists and locals stood outside and watched as employees of Lehman Brothers left the New York City headquarters on news that the bank would need to liquidate or file bankruptcy. 46 Days later, Satoshi Nakamoto posted the first white paper outlining Bitcoin. Less than 3 months later, the first Bitcoin code was ...…
 
W
WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives
 
Producer/Host: Jim Campbell Identity theft has been in the news lately due to huge data breaches like the one at Equifax. But at the center of that concern is a number, a number that serves as a universal identifier and thus is the key to stealing an identity and causing innocent people a world of hurt. That number, of course, is a Social Secur ...…
 
Events: Columbus Women in Technology Conference Tuesday, October 10, 2017 7:30 AM to 8:00 PM https://www.meetup.com/techlifecolumbus/events/242716289/ October 13th 3 - 7:30 pm https://www.riseofrest.com/rise-of-the-rest-100k-pitch-competition-faq/ October 14th 5 - 10 pm Licking County Historic Jail Beer Fest http://lcjail.org/jailhouse-rock-bee ...…
 
W
WashingTECH Tech Policy Podcast with Joe Miller
 
Bio Karan Chopra (@karchopra) a is Executive Vice President and Co-Founder of Opportunity@Work, where he provides leadership on strategic direction and execution of Opportunity@Work’s priorities and the TechHire initiative. He co-founded Opportunity@Work because he believes that meaningful work is not just a matter of economic wellbeing but of ...…
 
It's been 40 years since Apple introduced the Apple II, a computer that remained in production until 1993. In June, frustration with a OneNote synchronization problem drove me to Evernote. Now Evernote's flaws have driven me back to OneNote. I'll explain. In Short Circuits: Google announced a bunch of new hardware this week and artificial intel ...…
 
"Stealing Your Data - With Equifax, Yahoo, and other breaches in the news, Joe Gray with Sword & Shield Enterprise Security joins Liz to share insights on how scammers attack your data and ways you can protect the same."By david@americaswebradio.com.
 
7:05 - INTERVIEW -- MORGAN WRIGHT- Senior Fellow, Center for Digital Government - former executive at Cisco & Alcatel-Lucent and - former senior advisor for the US Department of State Antiterrorism Assistance Program -- Discuss the former Equifax CEO on the hill yesterday, Equifax scores big IRS fraud contract ... also Yahoo admits everyone was ...…
 
We hear so much about data breaches lately, so it seems fitting to have today's guest who is an expert in databases talk about securing data. Paul Nielsen the Author of the SQL Server 2008 Bible, is undeniably an expert on data security. Paul's company Tejon Tech, was also the winner of the 2017 Get in the Ring, for best startup idea. It is int ...…
 
We hear so much about data breaches lately, so it seems fitting to have today's guest who is an expert in databases talk about securing data. Paul Nielsen the Author of the SQL Server 2008 Bible, is undeniably an expert on data security. Paul's company Tejon Tech, was also the winner of the 2017 Get in the Ring, for best startup idea. It is int ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login