Best data security breach podcasts we could find (Updated April 2018)
Related podcasts: Persistent Breach Data Advanced Security Tech Cpes Issmp Gray Threat Cissp Federal Cyber Hacking Joe Business Business News Data Breach Cybersecurity Technology  
Data security breach public [search 0]
show episodes
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
The cybersecurity industry’s premier podcasts featuring the latest information security news, interviews and information.
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
 
Manuel W. Lloyd is a top industry Virtual CIO helping healthcare and banking businesses achieve customer-vendor alignment, IT governance, and data security while avoiding costly and embarrassing data breaches. The program is supported by Holiday Delta, Inc dba Dominos Pizza, JTV Management, & Manuel W. Lloyd Consulting®
 
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
R
Risk & Repeat
Weekly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Organizations are facing a growing and rapidly evolving set of security threats, including: IT outsourcing, cybercrime, workforce mobility, Web 2.0, and data breaches. Lumension is the leading provider of operational endpoint security solutions that help protect your vital information and manage your critical risk across network and endpoint assets. Lumension delivers Vulnerability Management, Endpoint Protection, Data Protection, and Compliance and IT Risk Management solutions to more than ...
 
Truth is trending on the Veritas News Network! VNN is an online publication featuring the news and is dedicated to in-depth investigative reporting with a consumer advocacy focus. Our Managing Editor is a veteran investigative journalist who has won dozens of awards. Several categories of news are featured on the Veritas News Network include Citizen Journalism, Consumer News, Ripoffs & Scams, Consumer Advocacy, World News, US News, Crime, Economic News, Editorial & Opinion, Education, Health ...
 
I
Illumio
Rare
 
Illumio delivers adaptive security for every computing environment, protecting the 80 percent of data center and cloud traffic missed by the perimeter. The company’s Adaptive Security Platform™ visualizes application traffic and delivers continuous, scalable, and dynamic policy and enforcement to every bare-metal server, VM, container, and VDI within data centers and public clouds. Using Illumio, enterprises such as Morgan Stanley, Plantronics, NTT, King Entertainment, NetSuite, and Creative ...
 
Loading …
show series
 
Lately, dangerous data breaches seem like a daily deal. This week, The Checklist by Secure Mac hits part one of a two part look at the "Anatomy of a Data Breach." On this week's episode: How data breaches happen Notable data breaches What you (personally) can do to minimize the risk of a data breach Don't forget to check out our show notes: Sec ...…
 
https://www.bankinfosecurity.com/nj-ag-smacks-practice-hefty-fine-for-vendor-breach-a-10774 https://www.bankinfosecurity.com/panera-bread-data-leak-persisted-for-eight-months-a-10760 http://www.eweek.com/security/best-buy-delta-sears-hit-by-third-party-chat-widget-breach http://www.baltimoresun.com/news/maryland/crime/bs-md-ci-hack-folo-2018032 ...…
 
Plus... housing market breaking people's budgets, Ford SUV receives poor crash rating, selfie kid from Superbowl reunites with Justin Timberlake, Sears and Delta data breach, MoviePass adding more theaters, Facebook security leak grows bigger, Canadian man loses an incredible amount of weight, Royal Wedding budget revealed, debate sparks over s ...…
 
Dans cet épisode Emmanuel est de retour et assure l'intérim de Guillaume sur les blagues tout en discutant Java 10, Kubernetes et son écosystème, départs, rachats et IPO mais aussi diversité et Facebook avec Arnaud, Audrey et Vincent. Merci à Morgan pour sa crowdquestion sur les logs ! Enregistré le 29 mars 2018 Téléchargement de l'épisode LesC ...…
 
It’s easy to theorize about security, but the people putting identity programs into practice know firsthand what works and what should be discarded like yesterday’s newspaper Twitter feed. David Lee and Mike Kiser welcome Jom John, Managing Director of simplexiam, the first in a series of discussions with identity implementers about what they’v ...…
 
Welcome to episode 48 of This Week Online Today, where I will be talking to you about the big online news that has been happening this week today to make sure that you are ahead of the game when it comes to running your online brand successfully. And at the end of the show, I will also be giving you a bonus tip of the week to help you further. ...…
 
["Parent company Under Armour said the MyFitnessPal data included usernames, emails addresses, and hashed passwords. No payment info was accessed."] https://appadvice.com/post/myfitnesspal-data-breach/762237 upgrade your browser Security Brent Dirks just announced topBy jeanluc.kpodar@gmail.com.
 
If it seems like cybersecurity stories have started to pop up in the news more frequently, you’re not crazy. Although, headlines about cyber breaches, hacks and ransomware are still pushed off the front page by political gossip and other scandals, there is no doubt cybercrime is a topic of growing importance to business, elected officials and t ...…
 
In this episode, Tom Zinzi (Federal Sales Manager, BitSight) breaks down the results and implications from a recent BitSight Insights report which analyzes the security posture of US government contractors and subcontractors. Given that 50% of data breaches happen through third parties, US government agencies must ensure that their cybersecurit ...…
 
Goodbye Papercut Monster. Hello Electronic Personnel Files.Previously, we discussed records retention and how long employers need to hang on to all things having to do with hiring and retaining employees. As promised, we’ll now delve into best practices for storing that same information electronically. Take that, papercut monster!Know the Basic ...…
 
Staying secure online can be tough. Here are several Chrome security extensions that you should consider adding. https://www.makeuseof.com/tag/best-chrome-security-extensions/ MakeUseOf’s assessment of security and privacy buying solid security software 4 Things to Consider When Buying a Security Suite 4 Things to Consider When Buying a Securit ...…
 
Take a Network Break! In this week’s show, Dell EMC rolls out new branch hardware to run VNFs, the Sonic switch OS gets its turn in the open networking spotlight, and Innovium announces sampling of its Teralynx programmable ASIC. The IEEE ratifies a standard for 25Gbps over single-mode fiber, Dropbox embraces security researchers, and Micro Foc ...…
 
Unit 42 Threat Researcher, Ryan Olson, is joined in the studio by Rick Howard, Chief Security Officer at Palo Alto Networks for another season of their "Don't Panic" podcast. In this episode they talk discuss the two words that drive fear into every network administrator: data breach.
 
Facebook's founder, Mark Zuckerberg, admits the giant social network's made mistakes over the Cambridge Analytica data breach scandal and promises changes. How far is the European Union about to change the game? Also in the programme: What deal did the Nigerian authorities strike with Boko Haram to secure the release of abducted schoolgirls? An ...…
 
Privacy breaches and security incidents are occurring more often and are increasingly involving larger amounts of personal data. Why are security incidents continuing to increase? For a variety of reasons. While basic information security and privacy concepts are still the same as they have been for the past 30+ years, too many organizations do ...…
 
https://www.csoonline.com/article/3258817/data-breach/sec-guidance-on-it-security-would-you-report-security-risks-before-a-breach.html http://www.zdnet.com/article/hackers-are-selling-legitimate-code-signing-certificates-to-evade-malware-detection/ http://au.news.yahoo.com/a/39380423/equifax-expects-net-200-million-in-breach-related-costs-in-20 ...…
 
The rumor is NASA is hiding Aliens I would tend to not get to excitted over a story such as this but when a non-crack pot Doctor is saying it I have a tendency to get excitted. All the details on the show today, plus some mini rants from your beloved host as well. My … Continue reading NASA Hiding Aliens? #1263 → The post NASA Hiding Aliens? #1 ...…
 
https://Alphainvestors.ClubHey guys! Thanks for joining us here at https://Alphainvestors.Club where today we will be reviewing CryoCloud Crypto currency.The whole world is moving towards cloud storage. Using it almost certainly make you reliant on third parties to transfer and store data. This system has an intrinsic weakness of a trust based ...…
 
https://api.spreaker.com/v2/episodes/14179289/download.mp3 Mythos, Episode 2. UVB-76 Welcome to Mythos. Nothing weird is out of bounds in this blog turned story series, read by me, Gary S. Pritchett. Each episode begins innocently enough, with a brief introduction, then quickly spirals into mayhem with a reading from one of my own books…or take ...…
 
In EP#3 we speak with Charlie Langdon, CEO of Vault Data a cognitive software company. Charlie has tenure from companies such as GE, NEC, Active Voice and is an author and advisor. In this episode we hear a CEO's perspective on managing cyber risk and relate this to how Equifax executives could have handled the breach. We also explore how secur ...…
 
*/ Our tech-connected world faces threats against our data and technology. Both people and businesses must be vigilant to avoid a breach. In this FINRA Unscripted episode, hear from John Brady, FINRA's vice president for cybersecurity, ...…
 
If at first you don't succeed, try, try again. And that's just what we've been doing for the last five years, and we still haven't gotten it right. The big adventure is just 10 days away, and this time we're going in with a plan. Plus the dirty secret from Mobile World Congress 2018, Apple gets caught using Google's cloud, and finally a useful ...…
 
The GGB Podcast sits down with Willy Allison, the owner of the World Game Protection Conference, on how the upcoming show will be different than any of the previous 12 conferences. It’s been a wild year for security and surveillance in the casino industry. From several mass shootings at casinos around the world to the brazen cage robberies at c ...…
 
Patty Schmucker and the AMB Team – A look at 2018 broadcasting from Manhattan Beach and the World Wide Web you’re listening to CHS our healthy life dotnet as a service to our listeners this program is for general information and entertainment purposes only CHS are healthy life dotnet does not recommend endorsed or object to the views products o ...…
 
Harlan Kirschner – Global Beauty Distribution broadcasting from Manhattan Beach and the World Wide Web you’re listening to CHS are healthy life dotnet as a service to our listeners this program is for general information and entertainment purposes only CHS are healthy life dotnet does not recommend endorsed or object to the views products or to ...…
 
In this episode Armen is joined by Tamara McCleary, CEO of Thulium.co. They explore the benefits of accepting that digital business growth now depends on a great customer experience. Transcript Armen: Hi, I’m here with Tamara McCleary for today’s edition of Digital Identity 360. We’re actually on location at the Digital Identity Summit in San F ...…
 
Leading the latest edition of the ISMG Security Report: England's Court of Appeal rejects U.S. extradition request for suspected hacker Laurie Love. Also, what took Uber and Partners Health so long to come clean about their respective data breaches?
 
Millions of people are victims of identity theft each year. Post Equifax breach, the numbers will swell. The fraudsters are ever resourceful, picking and choosing data to fashion synthetic IDs. GIACT EVP of Product David Barnhardt tells PYMNTS' Karen Webster that for firms seeking to find out who's really who, the truth is in the details.https: ...…
 
1er épisode de Février 2018 Shameless plug Prochaines activités 8 février 2018 - ASIQ - La gestion des comptes à haut privilège 22 février 2018 - Hackfest/QuebecSec - Les étapes d’un incident de sécurité dans une perspective juridique 27 février 2018 - ISACA-Québec - La transformation des TI dans les entreprises à l’époque de l’infonuagique 13 ...…
 
Leading the latest edition of the ISMG Security Report: Inside the darknet marketplaces that serve cybercrime-as-a-service buyers and sellers. Also, why the healthcare sector remains so bad at detecting data breaches and blocking ransomware.
 
By Jamie Fox #protectveteranprivacy @veteranprivacy Rep. Mike Thompson Officially Inducted into the “VA Hall of Shame” Representative Mike Thompson and his VA liaison Rebecca Hermosillo have been officially inducted into the “VA Hall of Shame” for violating veterans’ privacy and ignoring constituents who report government corruption and who req ...…
 
By Jamie Fox #protectveteranprivacy @veteranprivacy On Thursday October 5, 2017, I sent the secretary of the VA, David Shulkin, an email titled “Repeatedly VIOLATED by corrupt VBA managers through privacy breaches – I respectfully request your assistance.” I then forwarded the same email I had sent to Shulkin, to Thomas Murphy, Acting Under Sec ...…
 
Upcoming Conferences ShmooCon 2018 - January 19-21, 2018 at the Washington Hilton in Washington, DChttp://shmoocon.org/ BSidesNYC January 20, 2018https://bsidesnyc.orghttp://www.securitybsides.com/ THOTCON 0x8 - May 4-5, 2018https://thotcon.org/SOLD OUT DerbyConSponsorships will open up the first week in March. Call for Trainers (CFT), Call for ...…
 
The biggest, baddest, worst hacks and vulnerabilities of 2017! All that coming up now on ThreatWire. ------------------------------- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat Wire RSS: https://shannon ...…
 
Google login Twitter login Classic login