show episodes
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Bi-Weekly Cyber intellgence briefing, each episode includes update regrading some of the latest events happened in the cyber security world. This podcast is meant for people who wants to listen to a short (5 minute) overview about some of the latest events happened lately in the cyber world. The Podcast is not getting into technical details and anyone can understand.
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cyber security tips, tools, and more in the Alias Secure AF Cyber Security Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cyber security topics with coworkers and special guests. No matter where you are on the cyber security knowledge ladder, there's an episode here for you.
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
 
Discover the unique, inspiring, and often amusing stories behind what it takes to lead cybersecurity efforts in an organization. The Security Stories podcast features interviews with a diverse range of guests, each sharing their leadership experiences for the benefit of others in the cybersecurity industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
The C Suite podcast is elevating cyber literacy for everyday people. Join Claudette McGowan, TD Bank’s Global Executive Officer for Cyber Security, as she explores how cyber-attacks happen and what we can do to avoid them. From phishing schemes to robocalls and even huge corporate hacks, on this show, Claudette meets with C Suite leaders to discuss cyber challenges and ways to help people become more protected and resilient.
 
The Bid Picture podcast presents lessons we can learn from fascinating cybersecurity topics, news, events, and incidents, and how those lessons could influence our decisions, thoughts, opinions, and lifestyle choices, as well as how everything fits together to form the bigger picture of online security in this digital age. For listener questions to be addressed on podcast episodes, please email bidemi@thebidpicture.com or via Twitter @BidPicture.Thank you for your time.
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
Welcome to Cyber Career Chat, the podcast supporting innovation in the fast-paced world of cyber security. Join us as we explore the exciting career paths and opportunities available and keep up with industry developments in Australia and around the world. Cyber Career Chat is brought to you by the Workforce Development team at the New South Wales Cyber Cyber Security Innovation Node and proudly produced and supported by the Experts On Air Podcast Network.
 
Ann Johnson, Corporate Vice President, Business Development, Security, Compliance & Identity at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of tools and systems powered by AI, IoT, machine learning, and other emerging technology, as well as the impact on how humans work, communicate, ...
 
This is a weekly round-up of the most compelling cyber security intelligence originating from The Record and Recorded Future's research team — Insikt Group. Recorded Future is the global leader in security intelligence and every Friday we'll be highlighting the latest intelligence from criminal activity and nation state sponsored cyber campaigns to geo-political developments. Whether you're responsible for improving operational cyber security or strategically reducing risk, this podcast is f ...
 
The Voice of Cyber ® KBKast brings you interviews, discussions, and presentations from global leaders across information security and emerging technology. We spend time understanding what they do, and unpacking their thoughts on the constantly evolving technology and people elements in the security industry as they pertain to an executive audience.
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
CYBER24 is a weekly podcast with one simple goal: to help business leaders and policy makers understand the often-intimidating subjects of cybersecurity and data privacy. Each week, our panel of rotating experts discusses the top cybersecurity issues and stories in the news. We decode the cybersecurity jargon to help you understand the complexities of cybersecurity and to help you ask the right questions of your IT and cybersecurity teams.
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
 
Loading …
show series
 
CSCP is bringing back season 1 in a newly remastered version Chris will join us in the new season 3 in recording We talk all things Leadership, Risk Compliance with Chris Hodson CISO at Tanium After 17 years in cybersecurity, as well as talking all things cyber, Chris talks about the route he took to become a CISO and opens up on how to communicate…
 
In this episode, host Bidemi Ologunde discussed the context around the recent statement released on July 19 by the U.S., UK, NATO, Japan, Norway, and the EU that cast blame on China for recent massively disruptive cyberattacks; also why airline operators are now being increasingly targeted by cybercriminals; and finally the rising cybersecurity thr…
 
The Olympics are underway, and the authorities are on the alert for cyberattacks. Kaseya has a decryptor for the REvil ransomware, but it hasn’t said how it got the key. NSO Group says it’s not responsible for customer misuse of its Pegasus intercept tool. US policy toward Chinese cyber activities shows continuity, with some diplomatic intensificat…
 
NSO Group says to blame its customers Saudi Aramco confirms data leak Sophos to acquire Braintrace Thanks to our episode sponsor, Varonis We all know devasting ransomware goes beyond the endpoint. Big game ransomware defense for your cloud and on-prem data is on everyone’s mind. Varonis can help ease your worries with a free ransomware preparedness…
 
Akamai Outage https://isc.sans.edu/forums/diary/Lost+in+the+Cloud+Akamai+DNS+Outage/27660/ "Summer of SAM" Continues https://isc.sans.edu/forums/diary/Summer+of+SAM+Microsoft+Releases+Guidance+for+CVE202136934/27656/ Oracle Critical Patch Update https://www.oracle.com/security-alerts/cpujul2021.html Kaseya Decryptor Available https://www.kaseya.com…
 
Fascists love to perfect a look. Hugo Boss’ Nazi Uniforms, the striking headquarters of the Italian Fascist party, and the sleek presentation of Islamic State’s Dabiq all have one thing in common—they’re visually striking. So too with today’s extremists. Neo-Nazis from Atomwaffen Division to the Order of the 9 Angles have a certain aesthetic flair.…
 
We speak with Kshira Saagar, Chief Data Officer of Latitude Financial Services about what is Data Literacy and why it is important. Kshira has been consecutively recognised among the Top 10 Analytics Leaders in Australia, for 2019, 2020 and 2021. He is focused on helping key decision-makers and CxOs make smarter decisions using data, and strongly b…
 
In today's podcast we cover four crucial cyber and technology topics, including: 1. Telegram to push update following issues with encryption 2. FortiNet addresses flaw in management and analysis products 3. FormBook updated to Xloader; infects large number of MAC users 4. CODESYS industrial automation platform vulnerable I'd love feedback, feel fre…
 
Ann Johnson, Corporate Vice President, Security, Compliance, and Identity at Microsoft sits down with Microsoft colleague Tom Burt, Corporate VP of Customer Security and Trust, to talk all things cybersecurity. They dig deep into the severity of nation-state attacks, the Biden administration’s recent executive order on transparency in cybersecurity…
 
Leeann Nicolo is the Incident Response lead at The Coalition and specializes in digital forensics and cyber investigations. She has conducted investigations into ransomware, phishing, hacking, data breaches, trade secret theft, and employee malfeasance. Leeann has investigated thousands of digital devices and has extensive subject matter expertise …
 
Frank Smith joins us from Ntiva to talk about the new Cybersecurity Maturity Model Certification (CMMC), organizations achieving Level 1 and Level 3 maturity levels, and why CMMC is so important for government contractors. Plus he discusses security for federal entities and how to get started in a career in cyber compliance by becoming a Certified …
 
The Cybersecurity & Infrastructure Security Agency has a mandate for the print spooler service vulnerability. This mandate includes step by step instructions for fixing the vulnerability. For people like us, this is awesome! LINKS 1. us-cert.cisa.gov - Their website. 2. Emergency Directive 21-04 FIND US ON 1. Twitter - DamienHull…
 
You have quite a bit of experience and a lot of research into implementing secure software - but we'd like to dig into a little bit about where organizations should start - tools, multiple developers? What kind of baselines should be consider? There's an increased focus on secure software supply chains, especially with the recent Executive Order (E…
 
Ransomware payment amounts have skyrocketed over the past year. As threat actors keep getting richer, they have more resources to fuel their operations. Many people argue that the way to discourage ransomware is to implement an outright ban on ransom payments. Is this suggestion idealistic or realistic? How would such a ban affect companies, and wh…
 
On this week’s Cyber Security Brief, Gavin O’Gorman joins us to discuss the Kaseya ransomware supply chain attack that occurred over the July 4 holiday weekend in the U.S. The REvil/Sodinokibi ransomware gang were behind this attack, and Gavin and Dick O’Brien discuss whether this is a sign that we now need to be aware of ransomware actors targetin…
 
Devon Goforth has been with Mandiant Security Validation (formerly Verodin) since its early startup days in 2015, and had infused his background of electrical engineering, physics, and math with an interest in cyber security. He shares not only how the company and solutions have changed, but also current influences on the threat ecosystem, risks, a…
 
In this episode, retired FBI Special Agent and best selling author Scott Augenbaum introduces "The Cyber Secure Mindset." This is the first of a short series we are doing on how to help folks not be the next cyber victim. Thanks for listening. If you have questions, you can email me at darren@thecyburguy.com or find me at www.linkedin.com/in/darren…
 
https://www.csoonline.com/article/3623760/printnightmare-vulnerability-explained-exploits-patches-and-workarounds.html#tk.rss_all https://www.securityweek.com/continuous-updates-everything-you-need-know-about-kaseya-ransomware-attack https://www.databreachtoday.com/kaseya-raced-to-patch-before-ransomware-disaster-a-17006…
 
Lately, I’ve wondered what happens on pen testing engagements when a client is so secure, the engineers aren’t able to get very far. What prevents them from moving? And how upset do the pen testers actually get? So, with those questions in mind, I invited Alias engineers Andrew Lemon and Tanner Shinn for a little bit of story time. Like our show? S…
 
Welcome back to the Tenable Research Podcast. In this new episode we look back at June’s Microsoft patches, and ask Tenable staff research engineer Satnam Narang what he feels the reasons are for the number of patches generally decreasing both monthly and annually. We are also joined by director of product management Ray Carney, as we look into the…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login