show episodes
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
The C Suite podcast is elevating cyber literacy for everyday people. Join Claudette McGowan, TD Bank’s Global Executive Officer for Cyber Security, as she explores how cyber-attacks happen and what we can do to avoid them. From phishing schemes to robocalls and even huge corporate hacks, on this show, Claudette meets with C Suite leaders to discuss cyber challenges and ways to help people become more protected and resilient.
 
This is a weekly round-up of the most compelling cyber security intelligence originating from The Record and Recorded Future's research team — Insikt Group. Recorded Future is the global leader in security intelligence and every Friday we'll be highlighting the latest intelligence from criminal activity and nation state sponsored cyber campaigns to geo-political developments. Whether you're responsible for improving operational cyber security or strategically reducing risk, this podcast is f ...
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
It aims at creating awareness around hackers stealing financial information and how cyber crime continues to evolve, with new threats surfacing every year. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. At Hidden Files, hope listeners will be able to ...
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
 
We live in two worlds, the real world and the cyber world. Both worlds are interconnected and interdependent but very different. Different rules apply. We have no choice but to exist in both worlds. As innovation and digitalization accelerates, we need to understand the risks, consequences and safeguards necessary to safely protect businesses, people and society.Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force hosts the “Cyber Task Force” podcast. In each show, Paul ...
 
CYBER24 is a weekly podcast with one simple goal: to help business leaders and policy makers understand the often-intimidating subjects of cybersecurity and data privacy. Each week, our panel of rotating experts discusses the top cybersecurity issues and stories in the news. We decode the cybersecurity jargon to help you understand the complexities of cybersecurity and to help you ask the right questions of your IT and cybersecurity teams.
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organ ...
 
The Bid Picture is a weekly podcast that examines cybersecurity news and events and how we can learn from them and apply those lessons to our daily lives for robust cyber threat intelligence and awareness. For questions, comments, or any suggestions on which topics you would like to hear about on future episodes, please send an email to bidemi@thebidpicture.com. Thank you for your time, and God bless.
 
A technology podcast and an engaging platform for discussions and expert opinions on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and information security in support of technology and business. Winner of 2019-Outstanding Security Performance Awards, she is an acclaimed and well-known security expert and public speaker. On the podcast, she brings on different cybersecurity, privacy and risk management pr ...
 
Loading …
show series
 
It’s a new year with new goals. This year we’re focusing on IT management, Security and certifications. We’re also trying our best to finish our endpoint management project. We won’t be able to automate everything. Not yet anyway. LINKS 1. Microsoft Endpoint Manager 2. Automox FIND US ON 1. Facebook 2. Twitter - DamienHull…
 
Another File Extension to Block: JNLP https://isc.sans.edu/forums/diary/Another+File+Extension+to+Block+in+your+MTA+jnlp/27018/ SonicWall Vulnerability Used to Breach SonicWall https://www.sonicwall.com/support/product-notification/urgent-security-notice-netextender-vpn-client-10-x-sma-100-series-vulnerability-updated-jan-23-2021/210122173415410/ i…
 
We speak with John Karabin, Director of Cybersecurity at NTT Australia looking at their January threat report and specifically at their recommended Endpoint Device evasive attack stages. Also includes in-depth discussion on the Solarwinds breach and how it has reached Australian and APAC shores. Following John, we speak with Anthony Spiteri, Senior…
 
New year, same Mat and Mike! This week the guys welcome Dr. Melissa Dark of D.A.R.K. Enterprises to discuss the importance of teaching cybersecurity in K-12 schools and how to pick arguably the best cybersecurity company name. ------------------------- Follow us on all the things: Twitter: @PCyberTAP LinkedIn: Purdue cyberTAP Email the Cyber Tap wi…
 
SolarWinds and SUNBURST are still consuming the Infosec community and a few things have happened since our last episode. Since the Department of Justice has admitted that they were breached and that email inboxes were accessed, Kev tells us just how bad it is. We cover the saga from all angles, from Jetbrains to attribution and techniques to stock …
 
Well folks, whether you were #resistance or MAGA, he’s arrived. The 46th President of the United States, Joe Biden. What’s he going to do about Russian hackers? Big Tech? Disinformation? Facebook? The NSA, the CIA? All that and more on this week’s episode with Motherboard EIC Jason Keobler. See acast.com/privacy for privacy and opt-out information.…
 
We thought locking up data and demanding a ransom to decrypt it was bad. But ransomware criminals have stooped even lower and now, threats of public data exposure on top of multimillion-dollar ransoms are routine tactics. What's next? Where's ransomware going in 2021? Joining us to give his take is F-Secure's chief research officer and CISO MAG's C…
 
When protestors stormed Capitol Hill, physical security breach aside, there are implications for cyber security as well. Physical boundaries with even the best security forces failed to prevent insurgence from entering a highly secured located. This caused losses of information, in forms of physical and electronic.…
 
Learn about different cybersecurity roles and career paths in this wide-ranging conversation with today’s guest Tyler Cohen Wood. Tyler discusses working as a senior intelligence officer for the Defense Intelligence Agency (DIA), overseeing cyber risk for AT&T and writing her book Catching the Catfishers. We talk about online privacy, implementing …
 
This week, the guys discuss a disconnect between employees working remotely and their corporate IT departments hindering productivity for both parties, along with how the debate between IT providers leaning towards a self-service model for IT help. In addition, the guys discuss the recent shutdown of Parler and the issue of companies relying on a c…
 
Nuclear cyber security | OT miniseries We’re continuing our Operational Technology (OT) miniseries where we look into the security challenges in the OT space. This time, Robby is joined by Nicholas Burnet and Guido Villacis from EDF Energy, Europe’s largest nuclear provider. EDF owns and operates eight (soon nine) nuclear power stations in the UK, …
 
Ryan K. Louie, MD, Ph.D. is a board-certified psychiatrist focusing on the mental health impact of cybersecurity, and the psychiatry of entrepreneurship. Ryan received his MD and Ph.D. degrees from the Stanford University School of Medicine and completed residency training in psychiatry at the University of Hawaii Department of Psychiatry. Ryan com…
 
Richard Greenberg is the founder and CIO of Security Advisor LLC, speaker, advisor, and founder of the ISSA-LA Women in Security Forum. Richard is always looking on the bright side and sees failures and challenges as opportunities. The episode is brought you by Security Phoenix Ltd with the AppSec Phoenix platform you can make Application Security …
 
The Security Perimeter must follow wherever humans work and extend to wherever the assets reside, which in the last 12 month has meant anywhere and everywhere. SASE provides a fundamentally new way to think about delivering network security, enabling organisations to more flexibly adapt to new ways of working and the delivery of applications. Liste…
 
In this short mid-week episode, host Bidemi Ologunde does a deep dive on Fitbit, its data collection and usage policies and the privacy impacts of its imminent billion-dollar acquisition by Google. The episode also provides insights into how we can be aware and in control of the different ways our personal health information is being collected, agg…
 
You have worked for years or decades to build your business reputation. Customers have come to trust you for the quality of your service and all that takes a significant hit when a hacker penetrates your defenses and compromises the security of customer data. The good news is, if you handle the situation right and communicate effectively, you can a…
 
In this episode I talk about to former FBI Special Agent and current FireEye senior manager Rob Schuett on the blending of cyber and human intelligence tradecraft by our nation-state foes. Rob and I discuss some big cases he worked on, including the Su Bin case where a Chinese actor was arrested and convicted of stealing some critical defense-relat…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login