Helping you understand cyber and technology subjects in simple language.
…
continue reading
Exploring both the practical realities and the exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Sjoukje & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Exp ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Creating connections and conversations about people, technology and the intersection of health and wellbeing. Recorded through the "cyber synaptic space." Catherine speaks to people who are considered experts in their fields. Important information for parents, teachers, professionals and anyone who wants to learn about cyberspace, digital parenting, security, data protection, counselling, health, wellbeing, personal growth and development. This is your acoustic & neuroplastic ride that will ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/siliconcurtain/subscribe A podcast about propaganda, digital disinformation, politics, corruption, hybrid warfare, weaponised conspiracy theories, social echo chambers and digital dystopias. 1984, Authoritarian, Autocracy, Autocrat, Big Brother, Brainwashing, Cold war, Cold war propaganda, Communism, Conflict, Conspiracy theories, Control, Cults, Cyber warfare, Deception, Dictator, Dictatorship, Digital dystopia, Digital media ...
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
The law affects our lives and our society in many unique and profound ways. Reasonably Speaking, produced by The American Law Institute, features interviews with legal experts on some of the most important legal topics of our time. Each episode takes you through the law in action, beyond courtrooms and casebooks. Whether you are a legal scholar or a concerned citizen, this examination of the relationship between our laws and our society will leave you with a better understanding of how we go ...
…
continue reading
Defuse / Diːˈfjuːz/ Verb: To Make A Situation Less Tense Or Dangerous. Join me in listening to this informative podcast that delves into the critical issues facing private and corporate clients. Each episode features global experts sharing their insights on preventing and resolving problematic behaviors and security issues that cause harm. The podcast covers a wide range of topics, including stalking, protective security, intelligence, psychological profiling, crisis management, risk managem ...
…
continue reading
Unexpected Perspectives is a thought-provoking and inspiring podcast hosted by Mark Segelov. Mark masterfully blends his engaging and inquisitive mind to delve deeper into topics with global thought leaders across the fields of Cyber Security, Technology, Sustainability, and Leadership. With years of industry experience, Mark brings a fresh outlook, challenging norms and diving deep into the latest trends. Join us for insightful conversations that redefine our understanding of these crucial ...
…
continue reading
Join CovertSwarm and special guests, as they discuss the latest Cyber Security news, trends, 0-day exploits and research. www.covertswarm.com
…
continue reading
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in for tech trends, hot topics and meet the people behind the tech landscape in senior living to gain practical technology knowledge you can apply in your community today. Powered by Parasol Alliance (www.parasolalliance.com), The Strategic Planning & Full-Service IT Partner Exclusively serving Senior L ...
…
continue reading
Former CIA Officer Bryan Dean Wright is back! The Wright Report is a morning news podcast, with updates from America and around the world. Bryan tracks down current events that others don't, and helps us understand why these developments are so important. Plus, he provides analysis based on his experiences as an Intelligence Officer, leaning on facts and data. As always, he leaves listeners with the ultimate decision of what to think about the issues -- and what we ought to do about them. Th ...
…
continue reading
The cyber security podcast from SE Labs. Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
…
continue reading
Cyber Security doesn't have to be a daunting task. Everyone has the right to be more secure and enjoy some privacy while surfing the web. That's where we come in. We will give you simple yet effective ways of staying safe and private online. And we'll do it in a language you'll understand. Learn how to be Cyber Smart because Privacy Matters.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
…
continue reading
Bi-Weekly Cyber intellgence briefing, each episode includes update regrading some of the latest events happened in the cyber security world. This podcast is meant for people who wants to listen to a short (5 minute) overview about some of the latest events happened lately in the cyber world. The Podcast is not getting into technical details and anyone can understand.
…
continue reading
Looking for your weekly dose of captivating conversation about Israel? Look no further than the Two Nice Jewish Boys Podcast - the longest-running Israeli podcast in English since 2016. Hosts Naor Meningher and Eytan Weinstein deliver free-flowing discussions with fascinating voices from across the country, covering politics, history, entertainment, science, and more. Through free speech and open dialogue, gain a deeper understanding of Israel and its people, and be exposed to Israeli societ ...
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
A podcast series aimed at helping Australians deepen their understanding of the local cyber security industry.
…
continue reading
Unspoken Security is a raw and gritty podcast for cybersecurity professionals who are looking to understand how the internet is being leveraged by threat actors. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share practical insights, and address the blunt truths surrounding cybersecurity. Ultimately, the lessons learned will enable security professionals to take an intel-driven, proactive approach to physical and cybersecurity that extends ...
…
continue reading
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
…
continue reading
imanmeet13 brings you "Cyber Safar" which is an audio version of his daily experience in Hacking & Digital World. It’s FREE to learn here! You don’t have to have a coding bone in yourself to understand technology. Every single successful person out there is a practitioner & has some or the other motivational routine as well. Stay Informative every single day with Cyber Safar when it comes to Technology, Hacking & Motivation. Got doubt? Contact me⤵️ Instagram = https://www.instagram.com/imanm ...
…
continue reading
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
How CISOs sleep at night - aka Assurance: The final episode of our special series on risk. Matt, Tom and Toby discuss how you can assure your risks, ensuring your risk understanding and prioritisation is correct, and your mitigation work effectively.If you want any cyber security support please get in contact with the team by email info@clearcutcyb…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 153: CISSP Practice Questions - Ransomware Attacks and Understanding IoT Trustworthiness (Domain 5)
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08
Send us a Text Message. Could a seemingly minor breach at a smaller bank signal bigger vulnerabilities in our financial system? On this episode of the CISSP Cyber Training Podcast, we deliver eye-opening insights on a recent cybersecurity incident involving the notorious ransomware group LockBit. While the U.S. Federal Reserve remained untouched, E…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity and AI: Meetings and Insights from the Nexus 2050 Conference
10:23
10:23
Play later
Play later
Lists
Like
Liked
10:23
This story was originally published on HackerNoon at: https://hackernoon.com/cybersecurity-and-ai-meetings-and-insights-from-the-nexus-2050-conference. The Nexus 2050 conference brought together experts and stakeholders to discuss a wide range of critical topics related to cybersecurity and global resilience. Check more stories related to cybersecu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
460. Mick Ryan - To Avoid Ukrainian Defeat by a Thousand Cuts the NATO Strategy Needs to Radically Change
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19
Barely a week goes by without things occurring that would have been inconceivable three years ago. Russian territory being hit by American made munitions, history’s most substantial sanctions in place against Russia, a near coup against the Kremlin, and Putin going cap-in-hand to Kim-Jong-Un to prop up his ailing military. What more can happen befo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
10 JULY 2024 NEWS: NATO Plots Your Future // Democrats at War // FBI Corruption // TWR Cyber Hack Update
38:07
38:07
Play later
Play later
Lists
Like
Liked
38:07
Donate (no account necessary) | Subscribe (account required) Dive into the latest episode of The Wright Report, hosted by Bryan Dean Wright, former CIA Operations Officer. This episode is packed with four crucial briefs that are shaping America and the world. NATO's Decisive Moment: We delve into the high-stakes discussions in Washington, D.C., whe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 982: The Polyfill.io Attack - Entrust Responds, Passkey Redaction Attacks
1:57:22
1:57:22
Play later
Play later
Lists
Like
Liked
1:57:22
Entrust Responds Other major Certificate Authorities respond Passkey Redaction Attacks Syncing passkeys Port Knocking Fail2Ban The Polyfill.io Attack Show Notes - https://www.grc.com/sn/SN-982-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT a…
…
continue reading
Entrust Responds Other major Certificate Authorities respond Passkey Redaction Attacks Syncing passkeys Port Knocking Fail2Ban The Polyfill.io Attack Show Notes - https://www.grc.com/sn/SN-982-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
453. Batu Kutelia - State Capture of Georgia and its Political Institutions by Russia is Nearly Complete.
50:28
50:28
Play later
Play later
Lists
Like
Liked
50:28
Batu Kutelia has over a decade of experience in international relations, and currently serves as a Senior Fellow at the Foreign Policy Research Institute. He is a former Ambassador to the USA and former Head of Georgia’s Foreign Intelligence Service. He is a member of the board at the Atlantic Council of Georgia and Professor at the Alte University…
…
continue reading
Donate (no account necessary) | Subscribe (account required) "And you shall know the truth, and the truth shall make you free." - John 8:32By Bryan Dean Wright
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Defuse Podcast – Family Office Risk Management with Edward V Marshall
54:56
54:56
Play later
Play later
Lists
Like
Liked
54:56
Send us a Text Message. The Defuse Podcast – Family Office Risk Management with Edward V Marshall From December 2023 to January 2024, Dentons, led by Edward Marshall, surveyed over 200 family office respondents from 33 countries worldwide, comparing the findings to the earlier research published in 2020. This survey went further than before by exam…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Technology Rationalization in Cybersecurity - Max Shier - BSW #355
1:00:30
1:00:30
Play later
Play later
Lists
Like
Liked
1:00:30
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
NCF-355 I'm an Average User - What does security do for me?
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49
Hello, everybody! Welcome back to New Cyber Frontier! Today we have our guest Dominic Paulo on the show for the second time. We have asked Mr. Paulo to lend his voice as an engaged but cautious technologist, and to discuss some trends that he sees with blockchain technologies. Mr. Paulo has taken some time to reflect on experienced positions from t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
33 Million Authy User Phone Numbers Breached
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45
Authy is an app that allows for multifactor authentication, recently the phone numbers of 33 million Authy customers were leaked due to an unsecured API, which could lead to attacks on those users. Sources: https://pastebin.com/qLsuL1QbBy Chloe Thonus
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Silicon Bites - Episode #51 - Far from Causing the War, NATO's Failure to Deter has Enabled Russia.
47:04
47:04
Play later
Play later
Lists
Like
Liked
47:04
Edition No51 | 08-07-2024~~~~~SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain~~~~~NEWS SOURCES: KYIV INDEPENDENThttps://kyivindependent.com/trump-reportedly-considering-making-deal-with-putin-to-foreclose-nato-ukraine-accession-officials-tell-politico/https://kyivindependent.com/nato-plans-to-es…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 156: Security Configuration Management, Change and Communication Best Practices (Domain 7.3)
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46
Send us a Text Message. Is a four-year college degree necessary to break into the world of cybersecurity? Discover why practical experience and industry certifications might just be your golden ticket to a thriving career in IT. In this episode of the CISSP Cyber Training Podcast, host Sean Gerber unpacks Domain 7.3 of the CISSP exam, emphasizing t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
08 JULY 2024 NEWS: Joe Biden & Parkinson’s Disease // Big Tech’s Secret Energy Grab // State of Our Economic Union // Elections in France, UK, and Iran
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10
Donate (no account necessary) | Subscribe (account required) In this episode of The Wright Report, we bring you the most pressing stories shaping America and the world today. Join Bryan Dean Wright, former CIA Operations Officer, as he dives into four crucial briefs: Biden's Health Concerns: President Joe Biden insists no one will push him out of t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From Hacked Teen to Cybersecurity Pro: Ron Eddings' Journey to the NSA & Hacker Valley Studios
57:01
57:01
Play later
Play later
Lists
Like
Liked
57:01
Send us a Text Message. What happens when a curious teenager gets hacked on AOL Instant Messenger and turns that experience into a thriving cybersecurity career? Join us as we sit down with Ron Edding from Hacker Valley Studios, who shares his journey from being a 13-year-old victim of hacking to becoming a professional at Booz Allen Hamilton by th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
457. Jon Sweet & Mark Toth - Ukraine has been Treated by History as a 'Corridor' and Pawn without Agency.
1:00:01
1:00:01
Play later
Play later
Lists
Like
Liked
1:00:01
Is Ukraine too corrupt to join NATO? Escalation management still holds sway. ----------Jon Sweet is an accomplished intelligence professional who served for 30 years within the Defence and Intelligence sector as an U.S. Army Military Intelligence Officer. He is now a freelance author, contributor and columnist for The Hill, The Messenger, Washingto…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and printer forensics ...
18:35
18:35
Play later
Play later
Lists
Like
Liked
18:35
Send us a Text Message. In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget. Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security. Event log cleared: Event ID 1102 ACSC Sysmon: ht…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
456. Cormac Smith - Negotiations for Putin only Provide a Pause for him to Rearm and Attack Uraine Again.
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50
Cormac Smith has worked in Public Relations and Corporate Communications for over three decades. Before moving into the government sector in 2000 I spent most of the 1990’s managing media relations in the pharmaceutical industry. He has held several senior communication management positions in local government, and Whitehall departments, but in 201…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
179 -Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 1
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49
We love to hear from you! It's easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one seems immune to these pervasive cyber threats. The frequency and scale of these incidents can make it seem like our digital world is und…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Understanding Authentication: A Guide to Cookie-Based and Session-Based Authentication
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32
This story was originally published on HackerNoon at: https://hackernoon.com/understanding-authentication-a-guide-to-cookie-based-and-session-based-authentication. Cookies-Based Authentication Vs. Session-Based Authentication: All You Should Know! Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
455. Philip Ingram - Putin is Making Little Headway in his War, but does he Understand he's now Losing?
54:43
54:43
Play later
Play later
Lists
Like
Liked
54:43
Philip Ingram is a journalist and consultant who has built on a long and senior military career as an intelligence, counterintelligence, security officer, and planner. Philip has extensive business experience, especially in steel manufacturing, and has set up companies from scratch, merged companies, taken over companies post sale assets. He also h…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Scum Are Free To Exploit Vulnerabilities Without Fear
8:54
8:54
Play later
Play later
Lists
Like
Liked
8:54
This story was originally published on HackerNoon at: https://hackernoon.com/cyber-scum-are-free-to-exploit-vulnerabilities-without-fear. Cyber Scum Are Free To Exploit Vulnerabilities Without Fear. 3 out of 1,000 malicious cyber incidents. Only 3 out of 1,000 are brought to justice Check more stories related to cybersecurity at: https://hackernoon…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
05 JULY 2024: Mini-Brief: Domestic, International, and Medical News
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55
Donate (no account necessary) | Subscribe (account required) Stay ahead of the news curve with The Wright Report, your go-to podcast for comprehensive insights into the most pressing domestic and international issues. Hosted by former CIA Operations Officer Bryan Dean Wright, each episode delves into the political, economic, and geopolitical develo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
60. Senior Sign- Streamlining Senior Living Admissions
21:39
21:39
Play later
Play later
Lists
Like
Liked
21:39
Our latest episode introduces Neil Krauss, founder and chief product officer of Senior Sign. Senior Sign is an e-signature software designed for senior living communities, offering features like compliance tracking, remote and mobile signing, electronic faxing, and centralized cloud storage for documents. The goal is to simplify and streamline the …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
450. Terron Sims - Trump's Plan for Ukraine and NATO is Becoming Clearer, and it's Not Good for Freedom.
48:49
48:49
Play later
Play later
Lists
Like
Liked
48:49
Whatever mistakes he has made in the war Vladimir Putin has retained the Escalation Initiative, always proving he can push the war to a new level of brutality, with the Western allies constantly playing catch-up, and in many ways placing restrictions and delays on Ukraine in terms of how it fights back. What are the implications of this dynamic for…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Effective Proxy Server Design and Implementation
15:53
15:53
Play later
Play later
Lists
Like
Liked
15:53
This story was originally published on HackerNoon at: https://hackernoon.com/effective-proxy-server-design-and-implementation. Explore the principles of proxy server design, key architectural considerations, and best practices for efficient and secure network management. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyber…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#356 - 4th of July Special: Biden-Trump Showdown, IDF Controversies and Eytan's New Baby Boy!
1:13:52
1:13:52
Play later
Play later
Lists
Like
Liked
1:13:52
WE'RE BACK!On today's episode we talked about:-Trump-Biden debate-Biden's mental decline-Israel's war efforts-Releasing Hamas prisoners-Israeli election debates-Military leadership criticism-Roger Waters' antisemitism-Jewish state expansionAnd much more! Tune in!By Eytan and Naor
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CCT 155: Practice CISSP Questions - Security Assessments, Account Management, Backup Verification (Domain 6)
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Send us a Text Message. Ever wondered how to secure your SaaS environment while mastering essential security testing techniques? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as we navigate the complexities of cybersecurity, starting off with some personal July 4th reflections and an insightful Forbes article on the pressing threats and…
…
continue reading
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Purandar Das, the Founder and CEO of Sotero, a global leader in data security and ransomware prevention. Their Data Security Platform provides an easy way to protect your data everywhere, all the time. It uses a multi-layered approach to keep your data secure and private, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
341. June 2024 Cyber Case Files (The Cyber Case Files Podcast).
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54
Send Bidemi a Text Message! In this episode of The Cyber Case Files Podcast, host Bidemi Ologunde discussed some of the U.S. federal investigations involving cybersecurity incidents in June 2024. You can get The Cyber Case Files Podcast wherever you listen to podcasts. Part 1: Major Fraud Against the U.S. - Hoau-Yan Wang Part 2: Sex Trafficking - M…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
04 JULY 2024: An American Hero: Hugh F. Redmond
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31
Donate (no account necessary) | Subscribe (account required) Join Bryan Dean Wright, former CIA Operations Officer, for a gripping Independence Day special on The Wright Report. In this episode, we delve into the extraordinary life of Hugh Redmond, a CIA officer who was imprisoned in China for nearly 20 years. Discover the incredible story of his s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CR071: Bridging the cloud infrastructure talent gap with software with Cory O'Daniel, Massdriver
1:07:58
1:07:58
Play later
Play later
Lists
Like
Liked
1:07:58
The rising shortage of IT professionals is a critical issue, driven by rapid technological advancements and a growing demand for specialized skills, leaving businesses struggling to fill crucial roles at a time that they are still struggling to implement and/or mature new devops concepts. This week, Dave and Rob talk to Cory O'Daniel, CEO and Co-Fo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#102 - Platform Engineering feat. Boyan Dimitrov // CTO @ SIXT
1:11:02
1:11:02
Play later
Play later
Lists
Like
Liked
1:11:02
Platform Engineering: Modularised, Standardised and Automated. Discover how to leverage platform engineering 🏗️ for convenience, standardization, automation, and reduced cloud costs in this CTO podcast featuring Boyan Dimitrov (CTO @ SIXT). SIXT is a leading global mobility provider serving customers in over 100 countries worldwide. With 800 tech e…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EPISODE 35: Can Cybersecurity Teams Flex Their Creativity To Keep Us All Safe?
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11
This Episode we are joined by Martina Mitz, a UX Psychologist, Strategist and Designer. In this episode “Can Cybersecurity Teams Flex Their Creativity To Keep Us All Safe?”, we’re going to talk about the natural intersection between psychology, UX and Cybersecurity, and the importance of understanding human behaviour to create user-centric digital …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
452. Tom Keatinge - Sanctions are one of the Best Levers Over Russian Illegality - If we Apply them Fully
46:46
46:46
Play later
Play later
Lists
Like
Liked
46:46
Tom Keatinge is the founding Director of the Centre for Finance & Security (CFS) at RUSI. According to The Economist, Tom Keatinge is one of a small group of '‘White collar vigilantes and poachers-turned-gamekeepers’. Tom’s research focuses on matters at the intersection of finance and security, including the use of finance as a tool of intelligenc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Balancing Usability and Security in the Wake of a Breach: An Interview With Magpie Protocol's CIO
5:32
5:32
Play later
Play later
Lists
Like
Liked
5:32
This story was originally published on HackerNoon at: https://hackernoon.com/balancing-usability-and-security-in-the-wake-of-a-breach-an-interview-with-magpie-protocols-cio. We sat with Dr. Ali Raheman, Founder of Magpie, to get his perspective on DeFi security concerns and their experience and learnings following getting hacked. Check more stories…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Solving Crimes with Data: The BTK Killer and the Power of Metadata Analysis
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58
This story was originally published on HackerNoon at: https://hackernoon.com/solving-crimes-with-data-the-btk-killer-and-the-power-of-metadata-analysis. Explore how metadata analysis led to the capture of the BTK killer and learn about the powerful role of tools like Metagoofil in modern cybersecurity efforts. Check more stories related to cybersec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
NDK’s Top 3 of Season 3: 'The future of OT Security is so exciting' with Danielle Jablanski
49:36
49:36
Play later
Play later
Lists
Like
Liked
49:36
Our top podcast episode of Season 3 is back in the spotlight, and it's a must-listen! Join us as we revsit our time meeting with Danielle Jablanski, exploring the exciting future of cybersecurity!. We explore the fascinating realm of smart cities and their development, while also delving deep into Danielle's expertise in OT security challenges and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Pre-election Conversation: "Ukraine must win" - Held 28th June at Ukrainian Cultural Centre, London.
1:15:30
1:15:30
Play later
Play later
Lists
Like
Liked
1:15:30
Ukraine Must Win: pre-election panel conversation with the participation of: - Edward Lucas- Paul Mason - Macer Giffordand moderated by Jonathan Fink (Silicon Curtain)----------Organiser: SupportUkraine.UK (Instagram @supportukraine.uk). Thanks to the Association of Ukrainians in Great Britain (AUGB) London Branch for hosting the event.All funds ra…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
03 JULY 2024 NEWS: Special Report - The Future of the Biden Presidency—and America
24:13
24:13
Play later
Play later
Lists
Like
Liked
24:13
Donate (no account necessary) | Subscribe (account required) In this special July 3rd episode of The Wright Report, former CIA Operations Officer Bryan Dean Wright delves into critical developments that could shape the future of America and the world. With fresh confirmations of President Joe Biden's cognitive decline and increasing calls from fell…
…
continue reading