Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
SCARY STORIES TO REAL LIFE EVENTS CHECK US OUT.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
Ride the cyber trails with one CISO (Allan Alford) and a diverse group of friends and experts who bring a human perspective to cybersecurity.
…
continue reading
Cyber Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims, and more.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
…
continue reading
Cybersecurity and book review and how cybersecurity needs to be managed how to speak to a board and many more. If this is something in your ballpark. Join the club.
…
continue reading
We Cover the Cyberspace.
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
…
continue reading
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
…
continue reading
"Secured" is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
1
Weird Dangerous Findings on The Dark Web
46:58
46:58
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
46:58
The dangers that lurk on the Dark Web. Many people who have visited have said they have seen things they never wanted to see. We take you there. We explain why it’s so important for everyone to know what’s there since we provide a roadmap to you, your family and the brands we all serve These are the true crime stories about what happens when we shi…
…
continue reading
1
Week in Review: CrowdStrike exec apologizes, NIST changes password rules, corporate hack-for-hire practices
31:44
31:44
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:44
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jason Elrod, CISO, Multicare Health System Missed the live show? Watch it on YouTube. And make sure to check out Jason’s book (coming soon) at CyberCISOmarksmanship.com, as well as his newsletter at LimitlessCyber.com. And huge thanks to…
…
continue reading
1
🔴 Sep 27s Top Cyber News NOW! - Ep 718
2:00:23
2:00:23
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
2:00:23
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
Cyber Defense Radio - Nitesh Sinha - Sacumen - Hotseat - Podcast - 2024
20:39
20:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
20:39
Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Nitesh Sinha, CEO & Founder of Sacumen, @Sacumensecurity (https://sacumen.com/), an extremely valuable, unique and award-winning pure-play security product development services company, engaged with 95+ security product companies & built 2750+ connectors. …
…
continue reading
1
Unpacking the new safe harbour protections and dodgy AI use in business
38:01
38:01
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
38:01
In this episode of the Cyber Uncut podcast, hosts Liam Garman and Daniel Croft unpack new “safe habour” protections unveiled by the federal government, before looking into some recent hacks and controversy surrounding artificial intelligence. The pair begin the podcast examining the new “safe harbour” protections unveiled by Minister for Cyber Secu…
…
continue reading
1
Arkansas Water Plant Forced Into Manual Mode And Bad Apple Update
14:46
14:46
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
14:46
✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefllc for real-time tweets. Follow our CEO Shawn Waldman for his insights @cyberwaldman. ✅LinkedIn: Shawn Waldman - / shawn-waldman-408b034 ✅LinkedIn: Chad Robinson - / chadwickrobinson ✅ LinkedIn: Secure…
…
continue reading
Patch for Critical CUPS vulnerability: Don't Panic https://isc.sans.edu/diary/Patch%20for%20Critical%20CUPS%20vulnerability%3A%20Don%27t%20Panic/31302Von Dr. Johannes B. Ullrich
…
continue reading
1
TCW Episode 41: Reminisce ISACA
33:59
33:59
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
33:59
In this week's episode we talk about the ISACA conference and what we found unique this year. Show Notes Fitspa conference registration https://fitspa.ug/2024/annual-conference Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyberweekly Follow Deogratius Okello http…
…
continue reading
1
Episode 415 - The Risk Story – Software Supply Chain Security
22:13
22:13
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:13
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
…
continue reading
1
Salt Typhoon’s cyber storm.
34:07
34:07
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
34:07
Salt Typhoon infiltrates US ISPs. Researchers hack the connected features in Kia vehicles.WiFi portals in UK train stations suffer Islamophobic graffiti. International partners release a joint guide for protecting Active Directory. A key house committee approves an AI vulnerability reporting bill. India’s largest health insurer sues Telegram over l…
…
continue reading
1
Is Smart A.I. Years Away?
15:27
15:27
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:27
Grab a coffee and join Darnley for a laid-back chat about OpenAI CEO Sam Altman’s recent comments on the intelligence age. Could we really see superintelligence in just a few years? Let’s talk it through! Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developme…
…
continue reading
1
The Cyber Tap #1 - CrowdStrike
36:22
36:22
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
36:22
George and Jim are joined by guests Phil and Jeremy to discuss the recent CrowdStrike outages and share how the outages affected them personally and professionally. ------------------------- Follow us on all the things: Twitter: @PCyberTAP LinkedIn: Purdue cyberTAP Email the Cyber Tap with suggestions (or be a guest) cybertappodcast@purdue.edu To l…
…
continue reading
1
The Crypto Wars: Privacy vs National Security | EP 6
12:12
12:12
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
12:12
Crypto Wars: The Ongoing Battle Between Privacy and Security Join Nathan from StationX as he delves into the history of the 'Crypto Wars,' a decades-long conflict over encryption between governments, technology companies, and privacy advocates. This episode covers major moments like the Clipper Chip controversy, the impact of the U.S. Patriot Act p…
…
continue reading
1
From Words to Code: Evolution in Leadership and Technology
53:49
53:49
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
53:49
In this inspiring episode, the guys sit down with April Barker, a seasoned entrepreneur and communications specialist, to explore her remarkable journey from the literary world to the forefront of technology. As the founder of Tech Queenz, April shares her passion for empowering others through innovative UX design and leadership. Dr. Joseph and Alf…
…
continue reading
1
CCT 179: Practice CISSP Questions - Data Security Controls, Labeling, and Cloud Access Security (CISSP Domain 2.6)
20:02
20:02
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
20:02
Send us a text Ever wondered about the real difference between a data leak and a data breach? Join me, Sean Gerber, on the latest episode of the CISSP Cyber Training Podcast as we unpack the nuances between these two critical cybersecurity concepts. Learn how data leaks often result from human mistakes like weak passwords, while data breaches invol…
…
continue reading
1
Zvika Ronen Co-Founder & CTO @FOSSAware about Open-Source cyber and Risk Management
46:11
46:11
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
46:11
השימוש בספריות קוד פתוח הפך לפרקטיקה מקובלת בכול פיתוח תוכנה, קיצור משך הפיתוח הוא משמעותי אבל טומן בחובו סיכונים עיסקיים וסיכוני סייבר משמעותים ללקוחות. המעבר של העולם התפעולי לבקרים מבוססי מערכת הפעלה סטנדרטית ותאומים דיגיטלים מוזיל עלויות ובאותה נשימה חושף את הסביבה התפעולית לסיכוני סייבר מוכרים מסביבות המחשוב הסטנדרטיות. נחשון פינקו מארח את צבי…
…
continue reading
1
teissTalk: Mitigating third-party risk with threat intelligence
43:43
43:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:43
A proactive approach to third-party risk - continuous monitoring of suppliers Using threat intelligence to identify third-party risk Effectively working with partners to mitigate third-party security risks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Chuck Brooks, Adjunct Professor, Georgetown University https:/…
…
continue reading
1
Ep. 47 - Cyber Insurance in Transition: The Intersection of Technology, Public-Private Collaboration and Reinsurance - with Oliver Brew
41:03
41:03
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
41:03
Discover how cutting-edge reinsurance strategies and public-private collaboration can address the biggest risks in cyber insurance In this episode, Oliver Brew, Cyber Practice Leader at Lockton Re, brings 25 years of experience to discuss the evolving cyber insurance landscape. He explores how advancements in technology are shaping the industry, fr…
…
continue reading
1
The Case for Regulation with Tim Brown
37:10
37:10
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
37:10
Howdy, y’all, and welcome to The Cyber Ranch Podcast! Our guest today is Tim Brown. If you don’t’ know who Tim Brown is, he is the CISO at SolarWinds, and as such, is one of us. Or maybe in a way, he is all of us, really. Tim advises and has held various other roles in the past, including product roles, which our listeners know are well-respected s…
…
continue reading
1
Episode 109: Current State of Pentesting - Internal and External
39:41
39:41
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
39:41
Text us feedback! In this episode, Spencer and Tyler share what they love and hate about the current state of penetration testing, they discuss current and future trends, and what it means to be a true cybersecurity partner. We hope you enjoy this episode! Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://…
…
continue reading
1
Evolving Cyber Threats: Insights from Former CISA Executive Brandon Wales
47:22
47:22
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
47:22
In this episode of Cyber Focus, Frank Cilluffo interviews Brandon Wales, the former Executive Director of the Cybersecurity and Infrastructure Security Agency (CISA), who served for over 19 years in the Department of Homeland Security (DHS). They discuss the evolution of the cyber threat landscape, lessons from significant incidents like SolarWinds…
…
continue reading
1
15. 5 Misconceptions about Security Awareness Training we see everyday (With Jonas Klærke Hejlskov - Customer Succes Manager at CyberPilot)
19:09
19:09
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
19:09
In today's episode, I've invited my dear colleague, Jonas Klærke Hejlskov, into the studio. He's here to talk about 5 misconceptions about security awareness training we see all the time. The misconceptions are: 1. A Few Big Events Are Enough for your security training 2. Grouping Training Topics By Category 3. Training Alone Makes You Secure 4. Tr…
…
continue reading
1
168. Exclusive: Senator Mark Warner on election fears and all things cyber and intelligence
35:27
35:27
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
35:27
We sat down with US Sen. Mark Warner of Virginia to talk about election interference, his recent hearing with tech execs on misinformation and disinformation, and the future of cybersecurity.Von Recorded Future News
…
continue reading
1
Defensive Security Podcast Episode 280
51:37
51:37
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
51:37
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kellett delve into key cybersecurity topics. They discuss a recent statement by CISA director Jen Easterly on holding software manufacturers accountable for product defects rather than vulnerabilities, and the need for derogatory names for threat actors to deter cybercri…
…
continue reading
1
Cybersecurity's future: Preparing the next gen of professionals | Guest Tia Hopkins
59:43
59:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
59:43
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/ In this episode of Cyber Work Podcast, Tia Hopkins, Chief Cybersecurity Resilience Officer at eSentire, returns to discuss her journey into tech and cybersecurity. She reflects on her early fascination with technology her impactf…
…
continue reading
1
Navigating IT Challenges in Luxury Movie Theaters at Emagine Entertainment with Chris Benson
36:15
36:15
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
36:15
In this episode… The world of IT is diverse, encompassing industries from corporate offices to entertainment venues. As Chris Benson shares his experiences working at Imagine Entertainment, he sheds light on how IT plays a critical role in maintaining a seamless movie-going experience. Imagine Entertainment is not your typical movie theater chain —…
…
continue reading
The Tor network allows for anonymous connections to unindexed search engines, including to online criminal services. Recently though, German authorities claimed to have de-anonymized a user using Tor and made an arrest. Has Tor finally been cracked, or is this a scare tactic to instill fear in threat actors? Sources: https://pastebin.com/Hfrrbdag…
…
continue reading
1
S1 E11 - In-Demand Skill Set - Implementing and Securing IPv6
20:23
20:23
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
20:23
We have been talking about migrating to IPv6 for years. However, with the rapid growth of mobile devices and cloud adoption, this can no longer be put off. Many network engineers and security practitioners have not focused their attention on developing the skills to properly implement and secure IPv6 creating a shortage of expertise. In this episod…
…
continue reading
1
Episode 26 - Addressing the Experience Gap
39:42
39:42
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
39:42
In this episode, Thea from CyberNorth meets with Nicola Taylor from ScotlandIS to talk about its work on nurturing future talent in cyber security and, in particular its focus on the Experience Gap. Find out more about ScotlandIS October is CyberFest - book your tickets now!
…
continue reading
1
Building a Purpose-Driven Security Culture – with Paige Adams
15:09
15:09
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:09
In this episode, Nico hosts Paige Adams, a Global Chief Information Security Officer (CISO), to discuss the evolution of Security Operations Centers (SOC) and the growing SIEM market. Paige offers insights on transitioning to modern SOC solutions, emphasizing the importance of phased implementation, stakeholder engagement, and continuous improvemen…
…
continue reading
1
EXPERT DISCUSSION: Chris Catanzaro on Ransomware Defense with Halcyon's Micro-Agent Technology
26:56
26:56
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:56
Welcome to 10 Questions to Cyber Resilience, presented by Assurance IT. In this bi-monthly series, we dive into the strategies and practices IT leaders use to enhance their cybersecurity. Each episode brings you closer to mastering cyber resilience through engaging interviews with industry experts. In this episode, we sit down with Chris Catanzaro,…
…
continue reading
1
NCF-358 Post Digital Transformation Cybersecurity
37:55
37:55
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
37:55
Welcome back, everybody, to New Cyber Frontier! Today we are going over Dr. Gorog’s trip he went on, to share the IEEE Digital Privacy initiative all over the world. In late June, he made multiple stops in Canada, Singapore, Milan Italy, Vienna Austria, Hungary Budapest, and Bristol England. During his trip, he spoke at different events and confere…
…
continue reading
1
Real-Life Horrors: Torture & Gore Crimes
11:36
11:36
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
11:36
Real-Life Horrors: Torture & Gore CrimesVon ROYAL XYZZY (CYBER GORE BEATS)
…
continue reading
1
From Physics to Cybersecurity: Antonio Deliseo’s Journey from Goldmines to Telstra
45:48
45:48
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
45:48
Shownotes Antonio Deliseo has been in the information security industry for decades. Currently working at Telstra, Antonio has enjoyed a long and winding career path and has plenty of stories and insights to share as a result. In this conversation with Cole Cornford, Antonio discusses how he got started in his career studying physics, overseeing cy…
…
continue reading
1
The Role of Threat Intelligence Sharing and Collaboration in Cyber Defense with Ryan Westman
50:00
50:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
50:00
The cyber threat landscape is evolving at an unprecedented pace, with increasingly sophisticated attacks from both nation-state actors and cybercriminals. Organizations must not only stay informed about emerging threats but also act swiftly to operationalize threat intelligence. Effective cybersecurity requires collaboration, cutting-edge tools, an…
…
continue reading
1
Resilient Cyber w/ Christina Liaghati - Navigating Threats to AI Systems
24:58
24:58
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:58
- For those that don't know you, can you tell us a bit about your background and your current role? - I know you help lead the ATLAS project for MITRE, what exactly is ATLAS and how did it come about? - The AI threat landscape is evolving quickly, as organizations are rapidly adopting GenAI, LLM's and AI more broadly. We are still flushing out some…
…
continue reading
In this episode, we explore the modern cybersecurity threat landscape, examining sophisticated attacks like ransomware-as-a-service, supply chain breaches, and file-less malware. We discuss essential defensive strategies, including the use of Zero Trust architecture, behavioral analytics, and other tools. Alongside these defenses, we emphasize the …
…
continue reading