Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidenc ...
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
Der wöchentliche Podcast "Cybersecurity ist Chefsache" ist eine Plattform, auf der verschiedene Experten aus der Welt der Digitalisierung & Cybersecurity zusammenkommen, um über aktuelle Themen, Trends und praktische Anwendungen zu sprechen. Der Gastgeber Nico Werner lädt dazu Freunde, Kollegen oder gleichgesinnte aus allen Branche ein, um Ihre Erfahrungen und Meinungen zu teilen und um aktuelle Themen rund um Digitalisierung, Cybersecurity, OT-Sicherheit, Datenschutz und Informationssicherh ...
…
continue reading
Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
1234, come la password che non dovreste mai scegliere. Come la password che la maggior parte degli utenti sceglie. Dalle truffe online agli intrighi internazionali, in ogni puntata approfondiamo la storia di cybersecurity del momento. A cura di Alberto Giuffrè
…
continue reading
In an age where cyber threats evolve with lightning speed, traditional defenses are no longer enough. AI in Cybersecurity: Protecting the Digital Future is your guide to understanding how artificial intelligence is revolutionizing the fight against digital crime. This comprehensive book delves into AI’s transformative role in cybersecurity, from identifying and mitigating sophisticated threats to mastering critical concepts like machine learning and anomaly detection.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Basement – der Podcast für echten Security-Content
suresecure GmbH, Michael Döhmen, Andreas Papadaniil
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast spricht Michael Döhmen alle 14 Tage mit spannenden Gästen über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. Ehrlich auf ...
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
Mahlzeit! Mundgerechte Cybersecurity am Mittag soll komplexe Zusammenhänge aus der Welt der Cybersecurity in kurzen Episoden für Verantrwortliche oder Entscheider verständlich erklären - kurz und prägnant! Herausgeber: 4S IT-Solutions AG Friedenstraße 106 67657 Kaiserslautern Deutschland Kontakt: [email protected] https://www.4s-ag.de
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading
Cybersecurity Ally is Fortra’s cybersecurity podcast covering security, today’s cyber threats, and everything you need for cyber news today. Listen now!
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
This first-of-its-kind audio drama from Dell explores what it takes to navigate the perilous and shifting terrain of the modern cybersecurity landscape, and how to best prepare yourself for what may be lurking around the next corner. Whether you're a tech professional or simply curious about the security of your personal data, these stories will help strengthen your defenses against a new kind of enemy. One you may not be expecting.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an e ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Welcome to Security Sutra, a sub-podcast of Startuprad.io™, dedicated to safeguarding your startup against cyber threats in today's digital landscape. As part of one of the top 20 entrepreneurship podcasts on Apple Podcasts worldwide, we bring you vital insights into cybersecurity, blending deep tech with entrepreneurship to empower your startup. Our podcast features a diverse range of guests, including industry-leading cybersecurity entrepreneurs, Emmy winners, New York Times best-selling a ...
…
continue reading
We are a discord community of cyber security enthusiasts. We host various "Ask Me Anythings" and put them here for people to enjoy any time they like. Discord: https://discord.gg/r4JxpJS
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Discussion
…
continue reading
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
…
continue reading
”Digital Defenders” is a must-listen podcast for anyone interested in staying ahead in the ever-evolving field of cybersecurity. Hosted by industry veterans, each episode delves into the latest threats, emerging technologies, and cybersecurity strategies. From interviews with leading experts to deep dives into case studies of significant security breaches, this podcast provides a comprehensive overview of the landscape. Whether you’re a professional in the field, a business owner concerned a ...
…
continue reading
Cybersecurity Thought Leader Kevin Greene, explores the latest news and developments in cybersecurity and information assurance on his debut podcast, "Cybersecurity Insights & Perspectives”... Follow him at @iamkevtorious
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Cyber Go-To-Market podcast for cybersecurity sales and marketing teams. Save Cybr Donut!
Andrew Monaghan
The podcast for sales and marketing teams that tackles the question: How can Cybr Donut grow ARR to $10m by the end of 2025? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts in our movement to Save Cybr Donut. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the ri ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
Cybersicherheit kann man auch hören, in unserem Podcast. Abonnieren sie uns und hören sie, was Experten aus der Branche zu sagen haben, ohne dass sie selbst ein Experte sein müssen, um es zu verstehen.
…
continue reading
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono di ogni tipo: le imprese (dalle grandi multinazionali alle Piccole e Medie Imprese); gli enti e le organizzazioni di ogni ordine e grado; i privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell’attacco, entità della struttura attaccata o danni provocati. Altri sono stati meno esposti alla luce dei media, ma hanno comunque creato grav ...
…
continue reading
Your daily cybersecurity news for cyber professionals.
…
continue reading
L’heure de la cybersécurité est un podcast passionnant de sensibilisation et qui vous tient informés des dernières actualités sur la cybersécurité en Afrique et dans le monde.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Host John Bambenek discusses complex cybersecurity issues
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Pensez cybersécurité est un balado ayant pour objectif, de sensibiliser les Canadiennes et les Canadiens aux enjeux de cybercriminalité, et de les aider à travers une série de conseils à mieux protéger leurs données en ligne. Animation : Winy Bernard
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Von Starseed
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chapter 17. AI for cloud security
10:22
10:22
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:22Von Starseed
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chapter 16. Understanding Privacy in the Era of AI and Cybersecurity
10:37
10:37
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:37Von Starseed
…
continue reading
![Artwork](/static/images/128pixel.png)
1
China's Cyber Campaigns: Salt & Volt Typhoon and Beyond
37:45
37:45
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
37:45Explore the cyber espionage campaigns of People's Republic of China (PRC)-affiliated threat actors, such as Volt Typhoon, targeting critical infrastructure.Understand their techniques, including living off the land (LOTL) tactics to maintain anonymity within IT infrastructures.Learn about recommended mitigations and best practices to strengthen net…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
State-Sponsored Cybercrime: When Nations Turn to Hackers
22:53
22:53
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:53Uncover the disturbing trend of nation-states utilizing cybercriminals to achieve their strategic objectives. This episode examines how countries like Russia, Iran, China, and North Korea leverage cybercriminals for espionage, disruption, and revenue generation. Explore the various ways states collaborate with cybercriminals, from purchasing malwar…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Questions Executives Should Ask About AI
1:01:09
1:01:09
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:01:09Unpacking AI: Executive Insights & Essential Questions Join us in this special edition of Hashtag Trending and Cybersecurity Today as we dive deep into AI with technology consultant Marcel Gagné and cybersecurity expert John Pinard. We discuss the necessity for executives to understand and implement AI despite limited knowledge, the need for questi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Navigating Singapore's PDPA: Protecting Personal Data in the Digital Age
18:51
18:51
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
18:51The podcast explores the key principles and obligations outlined in Singapore's Personal Data Protection Act (PDPA). It offers insights for organizations on how to comply with the PDPA's requirements for collecting, using, and disclosing personal data. It also examines individuals' rights to access and correct their personal data, ensuring a balanc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Awesomeness Podcast - Episode 97
14:31
14:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
14:31Chris Steffen and Ken Buckler from EMA discuss a recent announcement about organized ransomware attacks.Von Enterprise Management Associates + DEVOPSdigest
…
continue reading
![Artwork](/static/images/128pixel.png)
1
FBI Saves Millions and Lives in Cyber Hacking Take Down: Cyber Security Today for February 15, 2025
9:51
Cybersecurity Today: North Korean Hacks, AI Memory Breach, and School Data Comprimise In this episode of Cybersecurity Today, host Jim Love covers a range of crucial topics in the cybersecurity landscape. North Korean hackers are using new social engineering tactics to infiltrate systems by posing as South Korean officials, while prompt injection a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tools and Skills to Master as a Security Analyst - Part 2
52:37
52:37
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
52:37This episode focuses on essential skills and tools for aspiring cybersecurity analysts, including network monitoring, incident response, and phishing defense. The conversation emphasizes the importance of practical experience and understanding the fundamentals to successfully navigate careers in cybersecurity. • Importance of network monitoring in …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Securing Canada's Digital Future: The National Cyber Security Strategy 2025
14:21
14:21
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
14:21Dive into Canada's National Cyber Security Strategy for 2025 and explore how it aims to protect Canadians and businesses from evolving cyber threats.This podcast examines the strategy's key pillars, including forging partnerships, promoting innovation, and disrupting cyber threat actors.Discover how the government plans to engage with all levels of…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Spionaggio, come funziona uno spyware nello smartphone
12:24
12:24
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
12:24In questa puntata parliamo di Graphite, lo spyware dell’azienda Paragon che avrebbe intercettato attivisti e giornalisti. Ospite Riccardo MeggiatoVon Sky TG 24
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Meet an Attorney Who Keeps CISOs Out of Legal Hot Water
31:43
31:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:43In this episode, Jeffrey talks to Steven Teppler, a partner at Mandelbaum Barrett and the lead of the firm's Privacy and Cybersecurity practice group. Steve is an ISACA-certified Certified Data Privacy Solutions Engineer (CDPSE) and the firm's chief cybersecurity legal officer. They discuss sci-fi movies and the intersection of cybersecurity and la…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Phobos Ransomware: A Deep Dive into Tactics, Techniques, and Mitigation
22:32
22:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:32The Phobos ransomware, operating under a Ransomware-as-a-Service (RaaS) model since 2019, targets various sectors, demanding millions in ransom. This episode explores Phobos's tactics, such as exploiting vulnerable RDP ports, phishing campaigns, and open-source tools like Smokeloader, to infiltrate networks. Discover practical mitigation strategies…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 122: DeepSeek AI Security and Utility Considerations
37:12
37:12
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
37:12In episode 122 of Cybersecurity Where You Are, Sean Atkinson is joined by Rian Davis, Associate Hybrid Threat Intelligence Analyst at the Center for Internet Security® (CIS®); and Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at CIS. Together, they discuss security and utility considerations surrounding the DeepSeek AI model. Here are…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Effortless SAP Integration with CodeMeter License Central: Scenarios, Benefits, and Key Features
6:19
Wibu-Systems presents Conversations with Solution Partners: Our talk with INFORMATICS In this interview, experts Ruediger Kuegler, VP Professional Services at WIBU-SYSTEMS AG, and Henry Ritzlmayr, CTO at INFORMATICS Holding GmbH, discuss how SAP integrates with CodeMeter License Central to streamline licensing and subscription models. Discover: The…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Professional Association of CISOs: Redefining Cybersecurity Leadership - Ep 136
26:19
26:19
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:19In this episode of Reimagining Cyber, host Rob Aragao explores the role of the Professional Association of CISOs (PAC) with Demetrius Comes, a CISO executive advisor at EVOTEK and a leader within PAC. Comes, who has held cybersecurity leadership roles at companies like GoDaddy and Warner Brothers Games, discusses PAC’s mission to support CISOs thro…
…
continue reading
Scammers Exploit DeepSeek Hype & Jailbreak OpenAI's O3 Mini – TechNewsDay Update In this episode, we uncover how scammers are exploiting the recent hype around DeepSeek, a new AI model, by creating fake websites, counterfeit cryptocurrency tokens, and malware-laced downloads. We also discuss the jailbreaking of OpenAI's newly released O3 mini model…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Smart Cities: Promises, Perils, and the Power of Governance
16:39
16:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
16:39Dive into the transformative world of AI in urban environments, exploring both the exciting potential and the significant risks. From UN reports and cybersecurity concerns to real-world case studies, we uncover how AI is reshaping our cities. Join us as we discuss key questions about ethics, governance, and citizen empowerment in the age of AI-driv…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The OPM Security Debacle: Rogue Servers, Data Risks & What’s Next
13:29
13:29
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
13:29In this episode of Cyberside Chats, Sherri and Matt dive into a shocking new cybersecurity controversy at the Office of Personnel Management (OPM). A rogue email server, installed outside normal security controls, has raised alarms about data security risks to millions of federal employees. We compare this developing situation to the infamous 2015 …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Navigating IT and OT Integration Challenges with Richard Robinson
47:36
47:36
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
47:36In this episode of the To the Point cybersecurity podcast, hosts Jonathan Knepher and Rachael Lyon dive into the complex world of IT and OT network integration with Richard Robinson, CEO of Cynalytica. Richard shares his expertise on the critical differences between IT and OT networks, highlighting their unique security priorities and life cycles. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Overlooked Risks With IIoT in Industrial Cybersecurity
22:28
22:28
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:28Craig and Dino dive deep into the critical yet often overlooked aspects of industrial cybersecurity in relation to IIoT. They discuss the misconception that many OT assets are isolated when, in reality, they are interconnected and vulnerable. The conversation highlights the importance of complete asset inventory, IT-OT collaboration, and the hidden…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Decoding DORA: Navigating Digital Resilience in Finance
19:39
19:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
19:39The Digital Operational Resilience Act (DORA) is a European regulation designed to ensure the financial sector can withstand, respond to, and recover from ICT-related disruptions. This episode breaks down the key pillars of DORA, including ICT risk management, incident reporting, digital resilience testing, and third-party risk management, offering…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
E33 - Hackers Love OT - Here's How to Keep Them Out!
27:14
27:14
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:14Protecting Operational Technology Systems: Tips, Tricks, and Insights In this episode of Off the Wire, Tanner and Anthony dive deep into the world of operational technology (OT) systems, discussing what they are, their importance in various industries, and how to protect them effectively. The duo covers the significance of reliable hardware and sof…
…
continue reading
In this episode of Cyber Security Today with host Jim Love, we delve into the significant 35% drop in global ransomware payments in 2024, highlighting a growing resistance to hacker demands and improved law enforcement actions. We also discuss a national security crisis sparked by Treasury's DOGE access and its broader implications for intelligence…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Open Source: Innovationsmotor oder tickende Zeitbombe?
1:06:34
1:06:34
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:06:34Erweitere dein Wissen über digitale Sicherheit mit Cybersecurity ist Chefsache. In dieser Folge tauchen wir tief in die Welt von Open Source und Software-Sicherheit ein. Mein Gast ist Jasmin Mair, Global Product Security Manager bei Leica Microsystems, die sich seit Jahren mit der sicheren Entwicklung von Software und der Nutzung von Open Source im…
…
continue reading
AI is transforming security analytics and threat intelligence, empowering organizations to detect, analyze, and mitigate cyber threats with unprecedented speed and accuracy. By leveraging machine learning, predictive analytics, and automation, AI sifts through vast security data, identifies anomalies—even unknown threats—and provides actionable ins…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chapter 14. AI for incident response and automation
10:46
10:46
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:46AI is revolutionizing incident response, enabling security teams to detect, analyze, and mitigate cyber threats with unmatched speed and precision. Traditional methods struggle against the rising tide of sophisticated attacks, but AI-driven Security Orchestration, Automation, and Response (SOAR) platforms streamline threat management by automating …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chapter 13. how AI has transformed VAPT
20:48
20:48
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
20:48AI has revolutionized VAPT by automating reconnaissance, exploitation, and real-time security assessments, enhancing speed, accuracy, and scalability. It also strengthens authentication, adaptive access control, and SOC operations, making cybersecurity more proactive and resilient.Von Starseed
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISO's 20/20 Vision: Key Performance Indicators for Cybersecurity Success
24:14
24:14
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:14Are you ready to get a 360° view of your organization’s cybersecurity posture?In this episode, we dive into the 20 Key Performance Indicators (KPIs) that CISOs use to measure and enhance their security programs.Learn how to track risk reduction, incident detection, patch compliance, and more to make data-driven decisions and demonstrate the value o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Decoding NIS2: What It Means for Your Organization
41:15
41:15
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
41:15The NIS2 Directive is here, and it's changing the cybersecurity landscape for EU businesses. This episode breaks down the complex requirements of NIS2, explaining who it affects and what steps organizations must take to comply. We'll explore key changes, risk management measures, incident reporting, and the crucial role of management accountability…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DeepSeek: The Game-Changer in AI and the Impact on Cybersecurity
48:19
48:19
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
48:19In this episode of Cybersecurity Today, host Jim Love dives deep into the latest advancements in AI technology with a focus on the new open-source model, DeepSeek, from China. Love discusses the significant cost differences in training and running this model compared to competitors like OpenAI and highlights DeepSeek's efficiency and ability to run…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Auditing AI: Navigating Risks and Regulations
27:57
27:57
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:57As AI becomes more prevalent, understanding its risks and ensuring compliance are critical. This episode explores the crucial role of internal audit in guiding organizations toward responsible AI implementation. We delve into key areas like risk assessment, data governance, and transparency, offering insights for auditors and business leaders alike…
…
continue reading
Part two of a two part series. Every business needs a partner and retail is no different. The question is, have you vetted your partners cybersecurity practices to ensure that when you do work with them, they don’t become the weakest link in the security of your business? In our latest episode, TechTown wants to advance their selling strategies by …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode #128 - Executive Cybersecurity Awareness Training
25:21
25:21
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:21This week, we're launching a brand-new series of free cybersecurity training content designed to empower executive leaders and high-profile individuals. In this special training episode, the guys dive into the critical threats targeting executives and decision-makers—covering key tactics, real-world risks, and essential strategies to protect both p…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Awesomeness Podcast - Episode 96
16:53
16:53
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
16:53Chris Steffen and Ken Buckler from EMA discuss how tribal knowledge is lost during changes in leadership, as well as an update on DeepSeek AI.Von Enterprise Management Associates + DEVOPSdigest
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DeepSeek Security Concerns: Cyber Security Today for Friday, February 7, 2025
11:53
11:53
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
11:53Cybersecurity Today: EDR Evasion, SSH Backdoor, WhatsApp Zero-Click Hack, and DeepSeek AI In today's episode of Cybersecurity Today, host Jim Love discusses several pressing cybersecurity issues. The show covers Canada's Digital Governance Council's launch of a cyber ready validation program designed to help small and medium-sized businesses improv…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Decoding AI Risks: A Deep Dive into the MIT AI Risk Repository
21:26
21:26
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:26Explore the complex landscape of artificial intelligence risks with the MIT AI Risk Repository. This podcast delves into the repository's comprehensive database, causal and domain taxonomies, and methodologies for identifying and classifying AI threats. Join experts as they discuss how policymakers, auditors, academics, and industry professionals c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tools and Skills to Master as a Security Analyst - Part 1
55:05
55:05
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
55:05This episode is part one of two that focuses on essential tools and skills for aspiring security analysts. In this episode we discuss SIEM tools, vulnerability management, and endpoint protection. Check out the link for the resources. • Importance of SIEM tools for analyzing log data • Vulnerability management as a critical cybersecurity hygiene pr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tractor Tech Tug-of-War: Farmers, Manufacturers, and the Right to Repair
20:00
20:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
20:00This episode explores the growing conflict between farmers and agricultural equipment manufacturers over the right to repair their own machinery. We delve into how intellectual property laws and proprietary software limit farmers' access to repair tools and information, often creating a manufacturer monopoly. We also examine the ongoing legislative…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security Incident: Ein Jahr danach – Was hat sich verändert?
30:05
30:05
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
30:05In dieser Folge sprechen Michael und Jona über den Zustand eines Unternehmens ein Jahr nach einem Sicherheitsvorfall. Sie erklären, wie der ideale Verlauf aussieht: Notbetrieb innerhalb eines Monats, Normalbetrieb nach drei Monaten und langfristige Sicherheit nach einem Jahr. Erfolgreiches Incident Handling verhindert größere Schäden und jetzt ist …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Addressing Cybersecurity’s Education and Engagement Challenges
26:21
26:21
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:21In this episode, Jeffrey talks to Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. They discuss their favorite movie-based educators, the importance of cybersecurity awareness, the challenges in measuring its effectiveness and the need for engaging educational content.Von Jeffrey Wheatman
…
continue reading