×
Cybersecurity public
[search 0]
×
Best Cybersecurity podcasts we could find (updated December 2019)
Best Cybersecurity podcasts we could find
Updated December 2019
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government.
 
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
ITSPmagazine is free online publication that focuses on information technology, cybersecurity, data privacy, the InfoSec community and the influence that all this has on our everyday lives – as businesses, individuals and the society in which we live.Delivered through articles, podcasts, webcasts, webinars, live panels, event coverage and talk shows, our team of cybersecurity experts explores the topics that matter the most: the human element and its symbiotic effect on the latest in technol ...
 
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
 
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cybersecurity Effectiveness Podcast. Learn more about the Verodin Security Instrumentation Platform at https://www.verodin.com #InstrumentSecurity #ProveSecurity
 
I
InSecurity
Weekly
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
E
End of the Road
Weekly
 
Exploring the Horizons we never touch, because we are already there....with Michael Kokal Available on iTunes, Spotify Stitcher, Google play, or wherever you find your favorite podcasts.
 
CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Technology Policy Program and the International Security Program.Find the latest research from our scholars and CSIS events on this topic below.
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
S
Security Nation
Monthly
 
Security Nation is a podcast dedicated to celebrating the champions in the cybersecurity community who are advancing security in their own ways. We also cover the biggest events in security that you should know about.
 
A
AFP Conversations
Weekly
 
Corporate treasury and finance executives discuss their biggest challenges and insights: blockchain, fintech, cybersecurity, payments, risk, FP&A, budgeting, forecasting, leadership, career development, and more.
 
S
State of the Hack
Monthly
 
State of the Hack is hosted by FireEye's Christopher Glyer (@cglyer) and Nick Carr (@itsreallynick), that discusses the latest in information security, digital forensics, incident response, cyber espionage, APT attack trends, and tales from the front lines of significant targeted intrusions.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
C
Cyentia Podcast
Monthly
 
This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.
 
Don Pezet and Peter VanRysdam cover a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
C
CyberCast
Monthly
 
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today.
 
Cybersecurity Innovation Podcast is the show that experts in their field share the lessons they've learned, the tactics they use, and all other things that are driving innovation in the field.
 
R
RadioFreeHPC
Weekly
 
Podcast for fans of supercomputing and other tech topics. Since 2012. Stay "tuned"! https://podcasts.apple.com/us/podcast/radio-free-hpc-podcast/id557931368 http://RadioFreeHPC.com
 
Don Pezet and Peter VanRysdam cover a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
 
D
Defense in Depth
Weekly
 
Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
 
Entertaining stories of how others got into Information Security and Cyber Security so you can be inspired and learn from their experience.
 
Lighthearted security advice and banter from 1Password and guests.
 
Co-hosts Louisa and Beverley met 7 years ago over a shared passion for cybersecurity (and coffee - they live in Melbourne after all!). In this podcast, using their combined 30 years of global experience in cybersecurity, they will bring you the experts, the insights and the research impacting the cybersecurity profession today. Proudly independent they have full creative control over the show and invite listeners to provide feedback and ask questions to ensure this show always belongs to the ...
 
K
KnowTechTalk
Monthly+
 
 
I
InSecurity
Weekly
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
S
Securiosity
Weekly
 
Securiosity is a weekly cybersecurity podcast from Scoop News Group. Greg Otto and Jen O’Daniel will spend each week answering the overarching questions from the latest in security and privacy news. They’ll also talk to leaders in both the public and private sector on how they view the ever-changing cybersecurity landscape. Policy, research, venture capital…they’ll examine it all. If you’re curious like us, like and subscribe now. Securiosity. You have questions. So do we.
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
In its mission to deliver unique, most secure and highly versatile technologies to software publishers and intelligent device manufacturers, Wibu-Systems has developed CodeMeter, a comprehensive and award-winning suite of hardware- and software-based entitlement solutions for the protection of software rights and technical know-how against piracy, reverse engineering, tampering, sabotage, and espionage.
 
E
Eye on Security
Monthly
 
The latest on cybersecurity threats and news from FireEye.
 
M
Malicious Life
Monthly+
 
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
 
Passionate about creating a cyber security community for all levels within an organization. #CISOtalk
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
 
Constellations from Kratos is your connection to the innovators, business leaders, entrepreneurs and policy makers who are making ... and remaking ... today's satellite and space industries. The current explosion in innovation is revolutionizing communications, imagery, defense and research and has caused a culture shift within the traditional satellite and space industry landscapes. New Space versus Old Space, GEO versus LEO Satellites, Narrowband versus Wideband, High-Throughput Satellites ...
 
Fed up with tech hype and buzzwords? Looking for a tech podcast where you can learn and be inspired by real-world examples of how technology is transforming businesses and reshaping industries? Keep informed of the latest business and tech trends by listening to stories of other people in your field and how they are overcoming challenges with emerging technologies. Learn from the guest's actionable tips, and lessons learned to obtain greater clarity and how you can leverage technology. In th ...
 
Welcome to the BitSight Risk Review. Listen as we discuss the latest cybersecurity trends, current events, and talk more in-depth about the application of security ratings.
 
G
GovCast
Monthly+
 
GovCast tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered. 561480
 
H
Here's an Idea
Monthly
 
Here’s an Idea is a podcast series from Tech Briefs that goes behind the scenes of today's most innovative technologies and industries. Each episode takes on a different theme, and host Billy Hurley gives engineers, scientists, and industry experts the platform to discuss their process and share their insights.
 
Loading …
show series
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ux-in-cybersecurity/) Security products and programs may be functional and work correctly, but are they usable in the sense that it fits into the work patterns of our users? Check out this post for the discussion that is the basis of our c ...…
 
THE INTRO ​ Louisa and Beverley are at the SIT Summit today in Melbourne and this episode is an event special to help amplify the learnings for those who couldn't attend, wherever they are in the world! The Security Influence and Trust Group, founded in late 2015, is a community of people who believe that collaboration, consistent messages and ...…
 
The team at CyberIreland invited ITSPmagazine to join them for a joint event with Ireland Israel Business. During the event, Jacky Fox, Managing Director and Security Lead at Accenture Ireland and Vice Chair for Cyber Ireland, moderated a panel covering many aspects of cybersecurity in Ireland and in collaboration with Israel.The panelists — Da ...…
 
This episode focuses on privacy, buzzwords, and ethereum mining.By Eric English CISSP, CEH, ECSA, CHFI, SSCP
 
As the CodeMeter technology expands to welcome CodeMeter Cloud and reaps all of the mobility benefits associated with making licenses available in the cloud, anytime, and from any device, software developers should feel at home: All workflows for creating, delivering, changing, and managing licenses stay the same, whether you choose hard, soft, ...…
 
Digital technologies are creating new challenges for law enforcement agencies around the world. Cybercrime is proliferating due to the growing sophistication of online criminal networks and the difficulties of trans-national enforcement. Investigations of traditional crimes are also becoming more difficult as encryption, ephemerality, and other ...…
 
The threat landscape a mighty beast in and of itself -- vast and, perhaps more importantly, constantly changing. In this episode, Brian chats with industry thought leader John Pironti about using threat and security models to consistently monitor landscapes, test scenarios, and why you should prioritize risk management.…
 
The Cybersecurity Maturity Model Certification, or CMMC, is the next stage in the Department of Defense's (DoD) efforts to properly secure the Defense Industrial Base (DIB). In the simplest of terms, the DoD announced that it is creating a cybersecurity assessment model and certification program. Roger Bache, Chief Operating Officer at Forcepoi ...…
 
Daniel Hoban is Chief Strategy Officer for Nuspire. Dan has been working in the Managed Security space for over 15 years helping less mature companies in securing their networks. In this episode we discuss the evolution of managed detection response, and we discuss how Nuspire is seeing a uptick in Cybercrime targeting less mature Industry like ...…
 
Education is often overlooked but is an industry with complex, vulnerable and critical security issues today. Thousands of unmanaged devices, private student records, transient or at home uses, and sensitive research data creates a prime target for hackers and malicious actors. Education CISOs arguably have one of the toughest jobs in security, ...…
 
Recast An Audiogram on Social Media Page Glave was a tenured Associate Professor of Kinesiology with a focus in exercise science and was successful in her field. However she came to the realization that she can't see herself doing this for the rest of her life. This is her story. She offers lots of great advice on resume tips when switching, ho ...…
 
North Korea tried to hack banks, Cyber Command caught them and put their malware out in the open, and we wrote a story about it, the world keeps spinning along. In our interview we talk to Mourad Yesayan Managing Director at Paladin Capital Group. We will get into a deep discussion on the money flowing into cybersecurity and where consolidation ...…
 
Today's podcast warns about counterfeit running shoe sites that not only have fake products but also steal credit card numbers, why Facebook fired an employee, the ransomware crisis and more software updates availableBy ITWC
 
In an increasingly cashless world and online banking, where do parents begin to teach your children how to manage cash? Rather than telling young people what they should be doing when it comes to money, the team at gohenry is helping kids learn the ropes for themselves. The upshot is that our product gives kids a safe space to learn and occasio ...…
 
Flying false flags, and borrowing someone else’s attack tools as the mast you use to run them up. The Pensacola cyber attack has been identified as involving Maze ransomware. China moves toward building its own autarkic operating system. US Senate Judiciary Committee hearings take an anti-encryption turn. TrickBot is phishing with payroll phish ...…
 
Flying false flags, and borrowing someone else’s attack tools as the mast you use to run them up. The Pensacola cyber attack has been identified as involving Maze ransomware. China moves toward building its own autarkic operating system. US Senate Judiciary Committee hearings take an anti-encryption turn. TrickBot is phishing with payroll phish ...…
 
Passwords are a weakness in authentication when people are creating them. This episode talks about a survey and how bas individual password practices truly are. Source Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five ———— ...…
 
Maze Ransomware behind Pensacola Ransomware, Iran says it's defused large cyberattack on infrastructure & This new ransomware is targeting companies across Europe and the US - Plus More! Thank you to today’s sponsor: Get Smart Eye = Visit getsmarteye.com/james to schedule a demo today.By CyberHub Engage
 
Jay, Wade, Ben and David come together to talk about Veracode's State of Software Security report Volume 10. It can be found at Veracode's website: https://www.veracode.com/state-of-software-security-report
 
In a new report, "Holiday Season Cyber Heists" released Thursday morning, Carbon Black said that cybercrime activity tracked during 2019 is already setting the holiday shopping season for an upward trajectory in malware and ransomware attacks. From constantly-evolving malware like Kryptik, to island hopping attacks, holiday shoppers are the one ...…
 
In a new report, "Holiday Season Cyber Heists" released Thursday morning, Carbon Black said that cybercrime activity tracked during 2019 is already setting the holiday shopping season for an upward trajectory in malware and ransomware attacks. From constantly-evolving malware like Kryptik, to island hopping attacks, holiday shoppers are the one ...…
 
We're joined by special guest Jamie Bartlett, of the chart-topping "The Missing Cryptoqueen" podcast, in this bumper episode where we discuss his investigation into the OneCoin cryptocurrency scam, the Russian cybercriminals behind Evil Corp, and the mysterious leaks about the NHS that have turned oh-so-political... All this and much much more ...…
 
When Aman, Steve, and Jon first launched Toast as a consumer payments app for restaurants, they quickly found that they were blocked at every turn by tired, dated, legacy point of sale systems and that restaurants of all sizes were in search of a better solution. One that was easy to deploy could be accessed from anywhere, and intuitive to use. ...…
 
Maja is a practicing Oracle and Witch who performs public rituals and educational lectures. Maja's interest in Alchemy, magic and the esoteric sciences spans her entire lifetime. She has studied Biochemistry, oriental medicine, martial arts and acupuncture, and earned her Masters Degree in Transformational Psychology. She worked for 11 years as ...…
 
Iran says it’s stopped a cyber attack, and that an insider was responsible for a major paycard exposure. Trickbot is now working for the Lazarus Group. Influence operations both foreign and domestic concern British voters on the eve of the general election. The cryptowars are heating up again as the US Senate opens hearings on encryption. Pensa ...…
 
Iran says it’s stopped a cyber attack, and that an insider was responsible for a major paycard exposure. Trickbot is now working for the Lazarus Group. Influence operations both foreign and domestic concern British voters on the eve of the general election. The cryptowars are heating up again as the US Senate opens hearings on encryption. Pensa ...…
 
Hackers Can Mess With Voltages to Steal Intel Chips' Secrets, Facebook employee fired for taking bribes to reactivate shady ads & TrickBot gang is now a malware supplier for North Korean hackers - Plus More! Today’s sponsor: CyberHub USA"We prepare your people to protect and operate your business against cyber threats"Visit cyberhubusa.co today ...…
 
What does the future in space hold? Listen to Seamus Tuohy from Draper Labs talk about everything from what it will take to turn a wrench in space to servicing the upcoming space tourist industry. Fiber optic gyros and sensors will help astronauts to make better decisions and enable the ability to land autonomously. He talks about a reusable sp ...…
 
CISA Assistant Director of Stakeholder Engagement Daniel Kroese and Marsh Senior Vice President Stephen Vina discuss the importance of partnerships in federal government in tackling some of the most pressing cybersecurity concerns. For more episodes, head over to https://governmentciomedia.com/cybercast.…
 
Amazon AWS has announced a tool that will help detect and alert users if their S3 bucket is exposed to the public. This episode talks about the tool and everything it will provide. Amazon announcement. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee ...…
 
Welcome to the 122nd edition of the Kaspersky Transatlantic Cable podcast. This week, Dave and I take a look at what’s doing the rounds this week in the infosec world. To start, we take a look at how Evil Corp, a loose coalition of hackers has managed to steal over $100 million from victims – but now the FBI is offering a $5 million reward. Fro ...…
 
Today's podcast looks at reports of three recent email password-stealing scams listeners should be on the lookout forBy ITWC
 
This week, on a very special show recorded from his home studio in Atlanta, Rafal welcomes Mike Daugherty back onto the show to tell the story of his crazy journey and battle with the FTC. Highlights from this week's episode include... Mike gives a recap of the road to where he got Rafal and Mike discuss the last few years since episode 171: "W ...…
 
The International Trademark Association (INTA) is a global association of brand owners and professionals dedicated to supporting trademarks and related intellectual property (IP) to foster consumer trust, economic growth, and innovation. Members include more than 7,200 trademark owners, professionals, and academics from 191 countries, who benef ...…
 
Blockchain and AI and IoT, OH MY! “Whereas most technologies tend to automate workers on the periphery doing menial tasks, blockchains automate away the center. Instead of putting the taxi driver out of a job, blockchain puts Uber out of a job and lets the taxi drivers work with the customer directly.” -- Vitalik Buterin, co-founder Ethereum an ...…
 
Blockchain and AI and IoT, OH MY! “Whereas most technologies tend to automate workers on the periphery doing menial tasks, blockchains automate away the center. Instead of putting the taxi driver out of a job, blockchain puts Uber out of a job and lets the taxi drivers work with the customer directly.” -- Vitalik Buterin, co-founder Ethereum an ...…
 
The city of Pensacola is hit hard by an unspecified cyberattack. Ryuk ransomware decryptors may cause data loss. A new variant of Snatch ransomware evades anti-virus protection. The US Justice Department’s Inspector General has reported on the FBI’s Crossfire Hurricane investigation. Another unsecured database exposes PII. Keep an eye out for P ...…
 
The city of Pensacola is hit hard by an unspecified cyberattack. Ryuk ransomware decryptors may cause data loss. A new variant of Snatch ransomware evades anti-virus protection. The US Justice Department’s Inspector General has reported on the FBI’s Crossfire Hurricane investigation. Another unsecured database exposes PII. Keep an eye out for P ...…
 
Internet of Things Strikes Again! This time Jan. 14, 2020 will be a big problem date for health care IoT devices. This episode tells you why. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Secu ...…
 
Title: Cyber Resilient Organizations Description: This episode of the Information Security Podcast features an interview with Steve Hunt @Steve_Hunt from Hunt BI with host Rob Nettgen (@Robert_Nettgen). The conversation discusses and defines the term “Cyber Resilient Organization” and the role of a CISO to facilitate an organization to reach th ...…
 
GDPR Violation: German Privacy Regulator Fines 1&1 Telecom, NordVPN launches promised bug bounty program & No foreign PCs or software, China govt offices told. - Plus More! Thank you to today’s sponsor: Get Smart Eye = Visit getsmarteye.com/james to schedule a demo today.By CyberHub Engage
 
The apparent terror attack at Naval Air Station Pensacola spurs a debate among our panelists about whether the FISA Section 215 metadata program deserves to be killed, as Congress has increasingly signaled it intends to do. If the Pensacola attack involved multiple parties acting across US borders, still a live possibility as we talked, then it ...…
 
An Event Coverage Podcast With Sean MartinGuests:Eoin Byrne, Cyber IrelandJacky Fox, Cyber Ireland/AccenturePatricia Shields, KontexMattan Lass, Ireland Israel BusinessDuring this post-event wrap-up, we discuss the main takeaways from the keynote presentations, panel conversations, and hallway chats. The primary topics are:- Cross-country colla ...…
 
Sam Curry is Cybereason’s Chief Security Officer and an award-winning cyber security visionary. Sam & Ran discuss Sam’s upcoming webinar, in which he will present his insights into what 2020 will bring for the security industry: the rise of 5G cellular networks, The US Presidential Elections, the 2020 Tokyo Olympics and more. See here for more ...…
 
AFP 2020 in Las Vegas will be here before you know it. It's the most important event in treasury and finance, and that’s why the call for session proposals is already open. In this episode of AFP Conversations, we speak with Aurora Gregory, Marketing Communications Strategist and Author of “Get Picked: Tips, Tricks and Tools for Creating Irresi ...…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/trust-me-were-using-advanced-ai/) We're looking for a good reason to trust your AI on the latest CISO/Security Vendor Relationship Podcast. This episode was recorded in front of a live audience at Evanta's CISO Executive Summit in San Francisco. It is host ...…
 
By Sean Martin & Marco CiappelliGuests: Tonia Dudley and Daniel EliotIt’s the holiday season, and that means open season for cybercriminals. Just like the Elves in Santas’ Shop they work extra time for you. Either you have been good or bad it doesn’t matter because we are all in for the hunt. This is the time when consumers are looking for the ...…
 
d1g1t is an enterprise-level wealth management platform engineered to meet the needs of all firms providing investment advice, managing investment portfolio or selling wealth management products to individual investors and families. d1g1t has already signed 11 clients responsible for managing approximately CAD$50 billion of assets under managem ...…
 
Ocean Lotus puts down more roots in automobile manufacturing. Ransomware hits dentists’ IT providers as well as a Rhode Island town. The US is offering a reward of $5 million for information leading to the arrest or--and we stress “or”--conviction of Dridex proprietor Maksim Yakubets. Russian influence operations seem to be aiming at stirring t ...…
 
Google login Twitter login Classic login