show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Renee Small https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at: https://www.magnetichiring.com/book Christophe Foulon https://www.linkedin.com/in/christophefoulon/ Career Coaching - https://cpfcoaching.wordpress.com Support this podcast: https://anchor.fm/brea ...
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
 
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Matt Pincus interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
 
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
 
Discover the unique, strange, and often hilarious stories behind what it takes to lead cybersecurity efforts in an organization. Developed by Cisco, Security Stories is an interview-based podcast full of insights from those who are carving a path in this weird and wonderful industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
Wise Monkey Security Podcast provides cybersecurity ideas and expertise in simple instructions for anyone to incorporate into their daily lives or professional career. This podcast describes how to reduce data collection, address censorship, and strengthen your right to privacy. Wise Monkey Security addresses cybersecurity Architecture, Engineering, Governance, Incident Response, Digital Forensics, and Personal Security.
 
Cybersecurity on the Front Lines is a new podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Sentinel IPS’ COO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
 
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
Loading …
show series
 
When a digital device becomes our lifeline to the rest of the community and the world, we need to make sure that these digital lifeboats are secure. In this episode of Cybersecurity Unplugged, Christy Wyatt, CEO at Absolute, the leading company in endpoint resilience, discusses: How enterprises and educational institutions have adapted to the new n…
 
There is a lot of talk about "proactive cybersecurity" but what does that really mean and is it better than reactive security? On this week's show, the guys discuss proactive versus reactive cybersecurity considerations and where to focus. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next level? Visit us at…
 
The Picasso of Cyberattacks Has Only Just Begun – Part I Travis Howerton of C2 Labs joins the podcast for an insightful discussion on the global threat landscape through the lens of his more than 20+ years working on the front lines of national security with organizations such as National Nuclear Security Administration, Oak Ridge National Laborato…
 
Federal Career Connection is back to discuss the federal application process! Julie Broadway is the Deputy Program Director for Federal Career Connection. Throughout her federal career, Julie has been a catalyst throughout the Human Resource enterprise in areas to include staffing and placement, compensation, performance, classification and positio…
 
Stanley and Sean of Netswitch are joined by special guest and SIEM automation expert Chandra Pandey to discuss: -- Why is dynamic machine learning & AI automation so important to security? -- How to cope with the dynamic threat model. -- Why CyberRisk governance is driving the monitoring and reaction to security events. -- How effective security au…
 
Through the lens of the Florida water supply hack, Dale Peterson teaches how events like these remind us to take the necessary steps to maintain our cybersecurity. Founder and chair of S4 Events, Dale has been helping security professionals effectively and efficiently manage risk to their critical assets for over 15 years.…
 
Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident…
 
We're joined today by Wade Baker, co-founder of Cyentia Institute (@wadebaker) and Wolfgang Goerlich (@jwgoerlich), Advisory CISO at Cisco, for a fun discussion on security outcomes. Wade and Wolf dissect the results from Cisco's 2021 Security Outcomes Study, which seeks to answer the ultimate question, "What actually works in cybersecurity?" using…
 
Together we stand, divided we fall Come on now people, let's get on the ball and work together Come on, come on let's work together, now now people Because together we will stand, every boy every girl and a man -- Let’s Work Together, Canned Heat A truly rollicking episode of InSecurity finds Matt Stephenson trying to keep up with National Security…
 
We’re starting a new podcast series devoted to providing practical advice to pros trying to tackle their day-to-day cybersecurity challenges in the real world. To get there, we’re interviewing a few of our partners and customers, representing organizations of all shapes and sizes, and getting to know all the tools, policies, and procedures they rel…
 
India continues to investigate the possibility of RedEcho cybersabotage of its power distribution system, but says any hack was stopped and contained. Microsoft issues an out-of-band patch against a Chinese-run “Operation Exchange Marauder.” The financial sector works to contain an Ursnif outbreak. CISA issues ICS security advisories. Myanmar and t…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Malaysia Airlines discloses a nine-year-long data breach Policy Group Calls for Public-Private Cyber-Defense Program Multiple Exchange Server Zero-Days Under Attack by Chinese Hacking Group Google Patches Critical Remote Code Execution Vulnerability in Android CISO CONVERSATION…
 
This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar. The audio file was lost in several podcast platform transfers and I'm glad to be able to retain this interview for historical purposes. The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 w…
 
Indian authorities continue to investigate the possibility that Mumbai’s power grid was hacked last October. Apple’s walled garden’s security can inhibit detection of threats that manage to get inside. An Atlantic Council report recommends international action against access-as-a-service brokers to stall proliferation of cyber offensive tools. Ben …
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Suspected Chinese APT Group Targets Power Plants in India Universal Health Services lost $67 million due to Ryuk ransomware attack Ryuk Ransomware With Worm-Like Capabilities Spotted in the Wild SolarWinds security fiasco may have started with simple password blunders CISO CONV…
 
Tune into this episode of UMBC’s Mic’D Up with special guest, Paul Martin, ESEP, CTT+, graduate faculty with UMBC’s Systems Engineering Graduate Program. He speaks with us today about the field of systems engineering and why it’s critical that we have really great systems engineers dedicated to finding ways to make the world a better place. This st…
 
What's the secret to creating positive partner experiences? It starts with leading a team of happy employees. Join Craig Fulton, Chief Customer Officer, and Danielle Jackson, IT Nation Community Manager, as they discuss how getting your tech stack and processes in place can have a great impact beyond driving efficiency. Tune in now!…
 
Good surveillance can operate right under your nose without you even knowing they are there. And even though your tail may have all the advantages, you have one powerful tool that can flip the odds in your favor. In this episode, Andrew teaches you how spies beat surveillance in the field and how you can use the same skill to beat your opponents in…
 
In this episode, we start with a dramatization of a ransomware attack, which leads us to the ransomware lifecycle in real life. What is a ransomware attack incident response really like? How should you respond in the first hours? What does a 72-hour ransomware response look like? What should you do in the weeks and months following? Hear real-life …
 
@thefluffy007 A Bay Area Native (Berkeley) I always tell people my computer journey started at 14, but it really started at 5th grade (have a good story to tell about this) Was a bad student in my ninth grade year - almost kicked out of high school due to cutting. Had a 1.7 GPA. After my summer internship turned it around to a 4.0. Once I graduated…
 
Prologue This week, DJ McArthur joins James and Rafal to talk shop about his career in defending healthcare IT. The Cliff's Notes version is that it's more complex, more under siege, and more critical than ever. No problem, right? This episode has been a long-time coming, and DJ is an honest-to-goodness expert in the field. He teaches classes on th…
 
Chinese cyber engagement with Indian critical infrastructure is reported: the objective isn’t benign from India’s point of view, but exactly what the objective is, specifically, remains a matter of speculation. The US Governemnt declassifies its report on the murder of Saudi journalist Jamal Khashoggi. The SolarWinds supply chain compromise remains…
 
I believe that we should be teaching our kids, students and employees when and how to lie -- Maurice Schweitzer; professor, Wharton School at the University of Pennsylvania And, after all, what is a lie? 'Tis but The truth in masquerade. -- Lord Byron; Don Juan, Canto 11 This week, Matt Stephenson welcomes Attivo Networks CTO Tony Cole to InSecurit…
 
What if financial professionals could have access to information that has previously been unknown, like what others are thinking and feeling? Dan Seidman, Managing Director of Read Emotions, believes that reading hidden emotions is a behavioral science that can be applied to managing, coaching and business partnering. In this episode of AFP Convers…
 
In 2020, AARP was awarded the Malcolm Baldrige National Quality Award, the nation’s highest recognition for performance excellence that a U.S. organization can receive. Specifically, the Baldrige committee praised AARP’s Enterprise Dashboard, which enables leaders to sustain a focus on achieving the organization’s key objectives: grow impact, grow …
 
On today’s program, a conversation with a pair of CEOs from leading companies in the cyber security industry. Joining us are Marten Mickos, CEO of bug bounty platform provider HackerOne, and Christopher Ahlberg, CEO at Recorded Future. They share their insights on what it takes to be a successful CEO in a rapidly changing cybersecurity field, the i…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Vendor Quickly Patches Serious Vulnerability in NATO-Approved Firewall Microsoft Releases Open-Source Resources for Solorigate Threat Hunting Lazarus Targets Defense Companies with ThreatNeedle Malware SolarWinds Executives Blame Intern for Leaking Password CISO CONVERSATION WE…
 
Welcome, Craig Peterson here. This morning I was on with Chris Ryan on NH Today. He wanted to discuss what is the best technology to buy. We got into some details of the benefits and drawbacks of each. Here we go with Chris. These and more tech tips, news, and updates visit. - CraigPeterson.com --- Automated Machine Generated Transcript: Craig Pete…
 
Traditionally, finance has been about creating numbers and capturing data for a business. But how can we share that insight to stay relevant to business stakeholders? In this episode of AFP Conversations, Bryan Lapidus, FPAC, AFP’s Director of FP&A Practice, is joined by Jesper Sorensen, co-author of Implementing an Analytics Culture for Data Drive…
 
Betsy Bevilacqua is the current VP of Information Security at Chainalysis. Initially, she had her mind set on law school until she did a self-audit and realized that she enjoyed computers and tech much more. Her journey into infosec led her to move from Kenya to the US to obtain a degree in Security and explore various companies involved in academi…
 
Head of Product for IBM Security Aarti Borkar shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche wor…
 
Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citiz…
 
Welcome! It was also another busy week on the technology front and we are going to delve into what actually caused the energy problems in Texas. There is a new type of malware that is affecting Macs and it is has a different MO. Then we are going to discuss Apple and their ventures into automated electric cars and what we can expect. Why are states…
 
Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cy…
 
The Health IT field is extremely people-centered and produces a tangible outcome that impacts most everyone in society. The healthcare environment is rapidly changing, creating an ever-present need for qualified professionals to step up and contribute to important work that can make a true difference in the lives of others. Dr. Erin Van Dyke, gradu…
 
It’s #CISOThursdays​ @ 1pm, our new time! The #221in2021 #infosechires​ challenge is still on and we have gotten 15 people hired so far! Join James Azar, CISO Talk podcast host, Naomi Buckwalter, CISO extraordinaire, Dan Schaefer, peak performance coach, & the crew for a lively discussion. About Breaking Into Cybersecurity: This series was created …
 
In our latest episode of Security Nation, Ryan Weeks joined the podcast to discuss deploying thousands of assets into a hostile environment: the home offices of workers everywhere as they were forced remote amidst the pandemic. He’ll discuss how he balances privacy expectations with necessary regulations of workers’ computers and phones as they go …
 
FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Washington Senate OKs Measure Creating State Office of Cybersecurity Cyber Criminals Scanning for VMware vCenter Servers Affected by Critical Vulnerability Cybersecurity Agencies Warn of Accellion Vulnerability Exploits Microsoft Lures Populate Half of Credential-Swiping Phishi…
 
This week, the Technado crew welcomed Shane Hasert from CyberGRX to talk about the big issue of third-party app security. In the ‘What Grinds my Gears’ segment, he dove into his issues with the current state of third-party cyber risk management, or TPCRM. Then, in the news, the team discussed changes to the LastPass free service, Chrome OS taking m…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login