Cybersec öffentlich
[search 0]
Mehr
Download the App!
show episodes
 
Artwork

1
Cybersecurity Growth

Cybersecurity Growth

icon
Unsubscribe
icon
Unsubscribe
Monatlich
 
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
  continue reading
 
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monatlich
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
Cybersecurity Where You Are

Center for Internet Security

icon
Unsubscribe
icon
Unsubscribe
Monatlich+
 
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
  continue reading
 
Der wöchentliche Podcast "Cybersecurity ist Chefsache" ist eine Plattform, auf der verschiedene Experten aus der Welt der Digitalisierung & Cybersecurity zusammenkommen, um über aktuelle Themen, Trends und praktische Anwendungen zu sprechen. Der Gastgeber Nico Werner lädt dazu Freunde, Kollegen oder gleichgesinnte aus allen Branche ein, um Ihre Erfahrungen und Meinungen zu teilen und um aktuelle Themen rund um Digitalisierung, Cybersecurity, OT-Sicherheit, Datenschutz und Informationssicherh ...
  continue reading
 
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
  continue reading
 
In an age where cyber threats evolve with lightning speed, traditional defenses are no longer enough. AI in Cybersecurity: Protecting the Digital Future is your guide to understanding how artificial intelligence is revolutionizing the fight against digital crime. This comprehensive book delves into AI’s transformative role in cybersecurity, from identifying and mitigating sophisticated threats to mastering critical concepts like machine learning and anomaly detection.
  continue reading
 
Artwork

1
Cybersecurity Basement – der Podcast für echten Security-Content

suresecure GmbH, Michael Döhmen, Andreas Papadaniil

icon
Unsubscribe
icon
Unsubscribe
Monatlich
 
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast spricht Michael Döhmen alle 14 Tage mit spannenden Gästen über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. Ehrlich auf ...
  continue reading
 
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
  continue reading
 
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: [email protected] https://www.4s-ag.de
  continue reading
 
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Artwork

1
The Cybersecurity Tapes

Dell Technologies

icon
Unsubscribe
icon
Unsubscribe
Monatlich
 
This first-of-its-kind audio drama from Dell explores what it takes to navigate the perilous and shifting terrain of the modern cybersecurity landscape, and how to best prepare yourself for what may be lurking around the next corner. Whether you're a tech professional or simply curious about the security of your personal data, these stories will help strengthen your defenses against a new kind of enemy. One you may not be expecting.
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

icon
Unsubscribe
icon
Unsubscribe
Monatlich+
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an e ...
  continue reading
 
Welcome to Security Sutra, a sub-podcast of Startuprad.io™, dedicated to safeguarding your startup against cyber threats in today's digital landscape. As part of one of the top 20 entrepreneurship podcasts on Apple Podcasts worldwide, we bring you vital insights into cybersecurity, blending deep tech with entrepreneurship to empower your startup. Our podcast features a diverse range of guests, including industry-leading cybersecurity entrepreneurs, Emmy winners, New York Times best-selling a ...
  continue reading
 
Artwork

1
The Cybersec Lounge

Kyle Simmons

icon
Unsubscribe
icon
Unsubscribe
Täglich+
 
We are a discord community of cyber security enthusiasts. We host various "Ask Me Anythings" and put them here for people to enjoy any time they like. Discord: https://discord.gg/r4JxpJS
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
  continue reading
 
”Digital Defenders” is a must-listen podcast for anyone interested in staying ahead in the ever-evolving field of cybersecurity. Hosted by industry veterans, each episode delves into the latest threats, emerging technologies, and cybersecurity strategies. From interviews with leading experts to deep dives into case studies of significant security breaches, this podcast provides a comprehensive overview of the landscape. Whether you’re a professional in the field, a business owner concerned a ...
  continue reading
 
The podcast for sales and marketing teams that tackles the question: How can Cybr Donut grow ARR to $10m by the end of 2025? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts in our movement to Save Cybr Donut. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the ri ...
  continue reading
 
Artwork

1
Cybersecurity Careers

Niloufer Tamboly

icon
Unsubscribe
icon
Unsubscribe
Monatlich
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
Artwork

1
Cybervize Cybersecurity

Alexander Busse | Cybervize

icon
Unsubscribe
icon
Unsubscribe
Monatlich
 
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
  continue reading
 
Artwork

1
Sotto Attacco | Cybersecurity

RADIO IT Podcast Network

icon
Unsubscribe
icon
Unsubscribe
Monatlich
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

icon
Unsubscribe
icon
Unsubscribe
Monatlich+
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Artwork

1
HACK MY CYBERSECURITY!

Ingram Micro Cloud

icon
Unsubscribe
icon
Unsubscribe
Monatlich
 
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
  continue reading
 
Artwork
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
  continue reading
 
Artwork

1
Breaking Into Cybersecurity

Christophe Foulon

icon
Unsubscribe
icon
Unsubscribe
Wöchentlich
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
Loading …
show series
 
Explore the cyber espionage campaigns of People's Republic of China (PRC)-affiliated threat actors, such as Volt Typhoon, targeting critical infrastructure.Understand their techniques, including living off the land (LOTL) tactics to maintain anonymity within IT infrastructures.Learn about recommended mitigations and best practices to strengthen net…
  continue reading
 
Uncover the disturbing trend of nation-states utilizing cybercriminals to achieve their strategic objectives. This episode examines how countries like Russia, Iran, China, and North Korea leverage cybercriminals for espionage, disruption, and revenue generation. Explore the various ways states collaborate with cybercriminals, from purchasing malwar…
  continue reading
 
Unpacking AI: Executive Insights & Essential Questions Join us in this special edition of Hashtag Trending and Cybersecurity Today as we dive deep into AI with technology consultant Marcel Gagné and cybersecurity expert John Pinard. We discuss the necessity for executives to understand and implement AI despite limited knowledge, the need for questi…
  continue reading
 
The podcast explores the key principles and obligations outlined in Singapore's Personal Data Protection Act (PDPA). It offers insights for organizations on how to comply with the PDPA's requirements for collecting, using, and disclosing personal data. It also examines individuals' rights to access and correct their personal data, ensuring a balanc…
  continue reading
 
Cybersecurity Today: North Korean Hacks, AI Memory Breach, and School Data Comprimise In this episode of Cybersecurity Today, host Jim Love covers a range of crucial topics in the cybersecurity landscape. North Korean hackers are using new social engineering tactics to infiltrate systems by posing as South Korean officials, while prompt injection a…
  continue reading
 
This episode focuses on essential skills and tools for aspiring cybersecurity analysts, including network monitoring, incident response, and phishing defense. The conversation emphasizes the importance of practical experience and understanding the fundamentals to successfully navigate careers in cybersecurity. • Importance of network monitoring in …
  continue reading
 
Dive into Canada's National Cyber Security Strategy for 2025 and explore how it aims to protect Canadians and businesses from evolving cyber threats.This podcast examines the strategy's key pillars, including forging partnerships, promoting innovation, and disrupting cyber threat actors.Discover how the government plans to engage with all levels of…
  continue reading
 
In this episode, Jeffrey talks to Steven Teppler, a partner at Mandelbaum Barrett and the lead of the firm's Privacy and Cybersecurity practice group. Steve is an ISACA-certified Certified Data Privacy Solutions Engineer (CDPSE) and the firm's chief cybersecurity legal officer. They discuss sci-fi movies and the intersection of cybersecurity and la…
  continue reading
 
The Phobos ransomware, operating under a Ransomware-as-a-Service (RaaS) model since 2019, targets various sectors, demanding millions in ransom. This episode explores Phobos's tactics, such as exploiting vulnerable RDP ports, phishing campaigns, and open-source tools like Smokeloader, to infiltrate networks. Discover practical mitigation strategies…
  continue reading
 
In episode 122 of Cybersecurity Where You Are, Sean Atkinson is joined by Rian Davis, Associate Hybrid Threat Intelligence Analyst at the Center for Internet Security® (CIS®); and Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at CIS. Together, they discuss security and utility considerations surrounding the DeepSeek AI model. Here are…
  continue reading
 
Wibu-Systems presents Conversations with Solution Partners: Our talk with INFORMATICS In this interview, experts Ruediger Kuegler, VP Professional Services at WIBU-SYSTEMS AG, and Henry Ritzlmayr, CTO at INFORMATICS Holding GmbH, discuss how SAP integrates with CodeMeter License Central to streamline licensing and subscription models. Discover: The…
  continue reading
 
In this episode of Reimagining Cyber, host Rob Aragao explores the role of the Professional Association of CISOs (PAC) with Demetrius Comes, a CISO executive advisor at EVOTEK and a leader within PAC. Comes, who has held cybersecurity leadership roles at companies like GoDaddy and Warner Brothers Games, discusses PAC’s mission to support CISOs thro…
  continue reading
 
Scammers Exploit DeepSeek Hype & Jailbreak OpenAI's O3 Mini – TechNewsDay Update In this episode, we uncover how scammers are exploiting the recent hype around DeepSeek, a new AI model, by creating fake websites, counterfeit cryptocurrency tokens, and malware-laced downloads. We also discuss the jailbreaking of OpenAI's newly released O3 mini model…
  continue reading
 
Dive into the transformative world of AI in urban environments, exploring both the exciting potential and the significant risks. From UN reports and cybersecurity concerns to real-world case studies, we uncover how AI is reshaping our cities. Join us as we discuss key questions about ethics, governance, and citizen empowerment in the age of AI-driv…
  continue reading
 
In this episode of Cyberside Chats, Sherri and Matt dive into a shocking new cybersecurity controversy at the Office of Personnel Management (OPM). A rogue email server, installed outside normal security controls, has raised alarms about data security risks to millions of federal employees. We compare this developing situation to the infamous 2015 …
  continue reading
 
In this episode of the To the Point cybersecurity podcast, hosts Jonathan Knepher and Rachael Lyon dive into the complex world of IT and OT network integration with Richard Robinson, CEO of Cynalytica. Richard shares his expertise on the critical differences between IT and OT networks, highlighting their unique security priorities and life cycles. …
  continue reading
 
Craig and Dino dive deep into the critical yet often overlooked aspects of industrial cybersecurity in relation to IIoT. They discuss the misconception that many OT assets are isolated when, in reality, they are interconnected and vulnerable. The conversation highlights the importance of complete asset inventory, IT-OT collaboration, and the hidden…
  continue reading
 
The Digital Operational Resilience Act (DORA) is a European regulation designed to ensure the financial sector can withstand, respond to, and recover from ICT-related disruptions. This episode breaks down the key pillars of DORA, including ICT risk management, incident reporting, digital resilience testing, and third-party risk management, offering…
  continue reading
 
Protecting Operational Technology Systems: Tips, Tricks, and Insights In this episode of Off the Wire, Tanner and Anthony dive deep into the world of operational technology (OT) systems, discussing what they are, their importance in various industries, and how to protect them effectively. The duo covers the significance of reliable hardware and sof…
  continue reading
 
In this episode of Cyber Security Today with host Jim Love, we delve into the significant 35% drop in global ransomware payments in 2024, highlighting a growing resistance to hacker demands and improved law enforcement actions. We also discuss a national security crisis sparked by Treasury's DOGE access and its broader implications for intelligence…
  continue reading
 
Erweitere dein Wissen über digitale Sicherheit mit Cybersecurity ist Chefsache. In dieser Folge tauchen wir tief in die Welt von Open Source und Software-Sicherheit ein. Mein Gast ist Jasmin Mair, Global Product Security Manager bei Leica Microsystems, die sich seit Jahren mit der sicheren Entwicklung von Software und der Nutzung von Open Source im…
  continue reading
 
AI is transforming security analytics and threat intelligence, empowering organizations to detect, analyze, and mitigate cyber threats with unprecedented speed and accuracy. By leveraging machine learning, predictive analytics, and automation, AI sifts through vast security data, identifies anomalies—even unknown threats—and provides actionable ins…
  continue reading
 
AI is revolutionizing incident response, enabling security teams to detect, analyze, and mitigate cyber threats with unmatched speed and precision. Traditional methods struggle against the rising tide of sophisticated attacks, but AI-driven Security Orchestration, Automation, and Response (SOAR) platforms streamline threat management by automating …
  continue reading
 
Are you ready to get a 360° view of your organization’s cybersecurity posture?In this episode, we dive into the 20 Key Performance Indicators (KPIs) that CISOs use to measure and enhance their security programs.Learn how to track risk reduction, incident detection, patch compliance, and more to make data-driven decisions and demonstrate the value o…
  continue reading
 
The NIS2 Directive is here, and it's changing the cybersecurity landscape for EU businesses. This episode breaks down the complex requirements of NIS2, explaining who it affects and what steps organizations must take to comply. We'll explore key changes, risk management measures, incident reporting, and the crucial role of management accountability…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love dives deep into the latest advancements in AI technology with a focus on the new open-source model, DeepSeek, from China. Love discusses the significant cost differences in training and running this model compared to competitors like OpenAI and highlights DeepSeek's efficiency and ability to run…
  continue reading
 
As AI becomes more prevalent, understanding its risks and ensuring compliance are critical. This episode explores the crucial role of internal audit in guiding organizations toward responsible AI implementation. We delve into key areas like risk assessment, data governance, and transparency, offering insights for auditors and business leaders alike…
  continue reading
 
Part two of a two part series. Every business needs a partner and retail is no different. The question is, have you vetted your partners cybersecurity practices to ensure that when you do work with them, they don’t become the weakest link in the security of your business? In our latest episode, TechTown wants to advance their selling strategies by …
  continue reading
 
This week, we're launching a brand-new series of free cybersecurity training content designed to empower executive leaders and high-profile individuals. In this special training episode, the guys dive into the critical threats targeting executives and decision-makers—covering key tactics, real-world risks, and essential strategies to protect both p…
  continue reading
 
Cybersecurity Today: EDR Evasion, SSH Backdoor, WhatsApp Zero-Click Hack, and DeepSeek AI In today's episode of Cybersecurity Today, host Jim Love discusses several pressing cybersecurity issues. The show covers Canada's Digital Governance Council's launch of a cyber ready validation program designed to help small and medium-sized businesses improv…
  continue reading
 
Explore the complex landscape of artificial intelligence risks with the MIT AI Risk Repository. This podcast delves into the repository's comprehensive database, causal and domain taxonomies, and methodologies for identifying and classifying AI threats. Join experts as they discuss how policymakers, auditors, academics, and industry professionals c…
  continue reading
 
This episode is part one of two that focuses on essential tools and skills for aspiring security analysts. In this episode we discuss SIEM tools, vulnerability management, and endpoint protection. Check out the link for the resources. • Importance of SIEM tools for analyzing log data • Vulnerability management as a critical cybersecurity hygiene pr…
  continue reading
 
This episode explores the growing conflict between farmers and agricultural equipment manufacturers over the right to repair their own machinery. We delve into how intellectual property laws and proprietary software limit farmers' access to repair tools and information, often creating a manufacturer monopoly. We also examine the ongoing legislative…
  continue reading
 
In dieser Folge sprechen Michael und Jona über den Zustand eines Unternehmens ein Jahr nach einem Sicherheitsvorfall. Sie erklären, wie der ideale Verlauf aussieht: Notbetrieb innerhalb eines Monats, Normalbetrieb nach drei Monaten und langfristige Sicherheit nach einem Jahr. Erfolgreiches Incident Handling verhindert größere Schäden und jetzt ist …
  continue reading
 
In this episode, Jeffrey talks to Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. They discuss their favorite movie-based educators, the importance of cybersecurity awareness, the challenges in measuring its effectiveness and the need for engaging educational content.Von Jeffrey Wheatman
  continue reading
 
Loading …

Kurzanleitung

Hören Sie sich diese Show an, während Sie die Gegend erkunden
Abspielen