Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
SC Media, and our sponsor Arctic Wolf, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
InfoSecSync is an Information Security Broadcast that promotes Information Security Awareness to the masses as well as industry professionals.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
"Data at Rest" is an accessible but informed discussion of current concepts, best practices, and personal experiences in computer security, network security, and information security overall, including interviews with expert guests and the history of each topic.
…
continue reading
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
…
continue reading
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
…
continue reading
1
🔴 April 24’s Top Cyber News NOW! - Ep 607
1:29:22
1:29:22
Play later
Play later
Lists
Like
Liked
1:29:22
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
Iranian hackers charged, Siemens fixing Palo bug, Russia hacks water plant
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56
Iranian nationals charged with hacking U.S. companies and agencies Siemens working to fix device affected by Palo Alto firewall bug Russian hackers claim cyberattack on Indiana water plant Thanks to this week's episode sponsor, Veracode Are you truly listening to both your security and development teams? Make informed decisions with Veracode. Our d…
…
continue reading
1
🔴 April 23’s Top Cyber News NOW! - Ep 606
2:04:49
2:04:49
Play later
Play later
Lists
Like
Liked
2:04:49
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05
For manufacturing companies, technology has taken over a good deal of the day-to-day operations occurring on the manufacturing floor. Things like robotics, CNC machines and automated inventory management. There are even systems that track what tools are used, by whom and for how long. This technology often works outside of or flies under the radar …
…
continue reading
1
TikTok ban update, Sandworm hits Ukraine, North Korean streaming animators
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03
TikTok ban passes the US House Sandworm targets critical Ukrainian orgs North Koreans animating streaming shows Thanks to this week's episode sponsor, Veracode AI coding companions assist in generating high-quality code snippets, while Veracode swoops in to conduct thorough security assessments, identifying and fixing vulnerabilities quickly. With …
…
continue reading
1
🔴 April 22’s Top Cyber News NOW! - Ep 605
1:36:41
1:36:41
Play later
Play later
Lists
Like
Liked
1:36:41
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
RedLine GitHub connection, MITRE Ivanti breach, E-ZPass spoof sites
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29
RedLine stealer GitHub connection MITRE’s breached was through Ivanti zero-day vulnerabilities Researchers find dozens of fake E-ZPass toll websites following FBI warning Thanks to this week's episode sponsor, Veracode Imagine your intelligent coding companion, backed by the robust security expertise of Veracode. Together, we form the ultimate duo,…
…
continue reading
In this episode we take a peek at the role of the security teams’ own culture and its impact on the broader organisational culture. This, is an important perspective, because whilst many commentators focus on influencing organisational culture they haven’t considered the role that the value and behaviours of the security team has in influencing pos…
…
continue reading
1
Week in Review: Cisco MFA breach, Bad bots surge, Microsoft mail breach fallout
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dan Walsh, CISO, Paxos Thanks to our show sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talking about it if you book a call. Ready to give the market leading …
…
continue reading
1
🔴 April 19’s Top Cyber News NOW! - Ep 604
1:33:13
1:33:13
Play later
Play later
Lists
Like
Liked
1:33:13
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
LabHost police bust, Michigan healthcare attack, Windows Fibers vulnerability
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09
Police bust reveals sophisticated phishing-as-a-service platform Overlooked Windows Fibers offer handy route for malicious payload deployment Michigan healthcare organization suffers data breach Thanks to today's episode sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talk…
…
continue reading
1
🔴 April 18’s Top Cyber News NOW! - Ep 603
1:34:18
1:34:18
Play later
Play later
Lists
Like
Liked
1:34:18
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
Managing Data Leaks Outside Your Perimeter
29:56
29:56
Play later
Play later
Lists
Like
Liked
29:56
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our sponsored guest, Mackenzie Jackson, developer…
…
continue reading
1
Water utility threats, GPT-4 hacking, SIM swap solicitation
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21
Sandworm-linked group tied to attack on water utilities GPT-4 reads security advisories Cell carrier workers solicited for SIM swaps Thanks to today's episode sponsor, Conveyor Conveyor is the market leading AI-powered platform that automates the entire customer security review process — from sharing your security posture and SOC 2 in a single port…
…
continue reading
1
🔴 April 17’s Top Cyber News NOW! - Ep 602
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
Cisco MFA breach, Bad Bots surge, LockBit 3.0 propagates
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38
Cisco announces breach of multifactor authentication message provider Bad bots drive 10% annual surge in account takeover attacks LockBit 3.0 variant generates custom, self-propagating malware Thanks to today's episode sponsor, Conveyor Conveyor is the AI security review automation platform helping infosec teams automate everything from securely sh…
…
continue reading
1
🔴 April 16’s Top Cyber News NOW! - Ep 601
1:04:50
1:04:50
Play later
Play later
Lists
Like
Liked
1:04:50
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170
30:00
30:00
Play later
Play later
Lists
Like
Liked
30:00
Manufacturing environments rely heavily on Operational Technology (OT) systems – such as industrial control systems, supervisory control, PLCs etc. to manage production processes. Compromises of these networks and systems can have devastating consequences, including: • Production disruptions and downtime • Safety hazards: • Data breaches and intell…
…
continue reading
1
Threads out in Turkey, Palo Alto backdoor, Microsoft' security overhaul
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
Meta to close Threads in Turkey Palo Alto fixes backdoor zero-day Details on Microsoft’s security overhaul Thanks to today's episode sponsor, Conveyor What are infosec teams measuring these days? More often than not, their impact on sales. As infosec teams become hands on in the sales cycle, proving your value becomes key. A director of GRC said la…
…
continue reading
1
Josh Grossman - building Appsec programs, bridging security and developer gaps
1:16:22
1:16:22
Play later
Play later
Lists
Like
Liked
1:16:22
Youtube VOD: https://youtu.be/G3PxZFmDyj4 #appsec, #owasp, #ASVS, #joshGrossman, #informationsecurity, #SBOM, #supplychain, #podcast, #twitch, #brakesec, #securecoding, #Codeanalysis Questions and topics: 1. The background to the topic, why is it something that interests you? How do you convince developers to take your course? 2. What do you think …
…
continue reading
1
🔴 April 15’s Top Cyber News NOW! - Ep 600
1:34:42
1:34:42
Play later
Play later
Lists
Like
Liked
1:34:42
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
U.S. surveillance reauthorization, Roku breach update, Microsoft breach exposed agencies
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03
House passes reauthorization of U.S. surveillance program Roku says 576,000 accounts compromised in latest security breach Microsoft breach exposed federal agencies Thanks to today's episode sponsor, Conveyor It’s Conveyor again, the market-leading AI software for answering security questionnaires and securely sharing your security posture and docu…
…
continue reading
1
🔴 April 12’s Top Cyber News NOW! - Ep 599
1:34:40
1:34:40
Play later
Play later
Lists
Like
Liked
1:34:40
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
…
continue reading
1
Week in Review: Government hospital warning, Sisence breach, Financial firms lose $12b
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Mike Levin, deputy CISO, 3M Thanks to our show sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated fast. With Vanta, you can automate compliance for in-demand frameworks like…
…
continue reading
1
Palo Alto patches, CISA’s Sisense warning, GitHub repos gamed
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45
Palo Alto Networks fixes several DoS vulnerabilities in PAN-OS operating system Sisense breach exposes customers to potential supply chain attack Threat actors gaming GitHub Search Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for…
…
continue reading
1
Change the Way You Think About Loss, Risk, and Revenue
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47
In this episode of The New CISO, Steve is joined by guest Ash Hunt, Global CISO at Apex Group Ltd. Today, Steve and Ash dive into the action of M&A (mergers and acquisitions) and how to conduct it well. As a CISO at one of the world’s largest administrators, Ash shares his valuable insight on loss, risk, and revenue generation in a constantly chang…
…
continue reading
1
🔴 April 11’s Top Cyber News NOW! - Ep 598
1:33:16
1:33:16
Play later
Play later
Lists
Like
Liked
1:33:16
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
…
continue reading
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Phil Davis, attorney, healthcare cyber…
…
continue reading
1
CISA malware analysis, "hunt forward" missions, Spectre v2
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
CISA expands automated malware analysis US Cyber Command launched “hunt forward” missions Spectre v2: Linux Boogaloo CHECK OUT Capture the CISO season 2 here. Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks …
…
continue reading
1
🔴 April 10’s Top Cyber News NOW! - Ep 597
1:32:03
1:32:03
Play later
Play later
Lists
Like
Liked
1:32:03
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
…
continue reading
1
Ukraine cyber head suspended, LG TV vulns, Microsoft exposed passwords
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55
Ukraine's head of cybersecurity suspended and assigned to combat zone Over 90,000 LG Smart TVs exposed to remote attack Microsoft exposed internal passwords in security lapse Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-de…
…
continue reading
1
🔴 April 9’s Top Cyber News NOW! - Ep 596
1:02:12
1:02:12
Play later
Play later
Lists
Like
Liked
1:02:12
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.hopp.to/antisyp…
…
continue reading
1
Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15
The cybersecurity threat landscape is constantly evolving, and experience has shown that everyone and every organization is prone to being breached. How do you prepare for what seems inevitable? You assume breach and plan accordingly. Cyber resilience has become a top priority as organizations figure out how to build a network that can either conti…
…
continue reading
1
Cyberattack impacts vet firm, data privacy bill movement, DOJ hack exposes thousands
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23
Cyberattack causes major disruptions for UK vet firm Data privacy bill pushes forward with bipartisan support Department of Justice hack exposes hundreds of thousands Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand fra…
…
continue reading
1
Managing messaging with management, becoming a CISO with Mary Gardner from Goldiknox
1:22:56
1:22:56
Play later
Play later
Lists
Like
Liked
1:22:56
Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time based on new information and experiences and do not represent views of past, present, or future employers. Recorded: 08 …
…
continue reading
1
🔴 April 8’s Top Cyber News NOW! - Ep 595
1:29:59
1:29:59
Play later
Play later
Lists
Like
Liked
1:29:59
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading
1
Hospital hack warning, Five Eyes follow-up, NYC municipal hack
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51
Government warns hospitals of hackers targeting IT help desks U.S. government contractor Acuity responds to alleged Five Eyes breach New York City becomes latest in municipal government hack attempts Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can auto…
…
continue reading
1
Week in Review: Five Eyes breach, Microsoft’s Chinese hack response, AT&T customer breach
27:37
27:37
Play later
Play later
Lists
Like
Liked
27:37
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by David Spark with guest Steve Gentry, Advisor, Clari Thanks to our show sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks like SOC 2, ISO 27001, and HI…
…
continue reading
1
🔴 April 5’s Top Cyber News NOW! - Ep 594
1:33:11
1:33:11
Play later
Play later
Lists
Like
Liked
1:33:11
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading
1
Five Eyes breach, cancer center breach, Pixel zero-day flaw
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55
Classified Five Eyes data theft announced Cancer center data breach affects 800,000 Android Pixel phone zero-day flaws being exploited by forensic companies Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks li…
…
continue reading
1
🔴 April 4’s Top Cyber News NOW! - Ep 593
1:36:25
1:36:25
Play later
Play later
Lists
Like
Liked
1:36:25
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Asses…
…
continue reading
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Paul Connelly, former CISO, HCA Health…
…
continue reading