show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
​Cyber​ ​Context​ ​exposes​ ​the​ ​story​ ​behind​ ​the​ ​story​ ​with​ ​information​ ​security​ ​that​ ​increasingly​ ​defines​ ​our​ ​economy.​ ​The​ ​podcast​ ​features​ ​Jonathan​ ​Moore,​ ​chief​ ​technology​ ​officer​ ​of​ ​SpiderOak,​ ​a​ ​leading​ ​voice​ ​in​ ​cyber,​ ​software​ ​design,​ ​and​ ​business.​ ​Co-host​ ​Christian​ ​Whiton​ ​is​ ​a​ ​PR​ ​guy​ ​and​ ​former​ ​diplomat​ ​and​ ​banker.​ ​
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
 
A place for everyday life, take a shot with me and vibe out. Adult Zone and content. Not for everyone... feel free to check out happs tv. for the live stream and much more. Instagram digiital vibes Support this podcast: https://anchor.fm/richard-campbell/support
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
Join Mat and Mike from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
 
Welcome to Darnley's Cyber Cafe - cheers to a new smooth, bold podcast set on sailing you on this long journey of cybersecurity. Our host Darnley (Previously on Darn IT Podcast) will discuss topics about cybersecurity, business, IT, and everything in between. Sit back with your java (not script) and enjoy.
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
 
“In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened." I am Alberto and this podcast is about my story, cybersecurity and hackers. https://podcast.darkweb.today/ https://twitter.com/ADanielHill https://twitter.com/Darkwebtoday https://darkweb.today http ...
 
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
 
(CS)²AI is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 20,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education and directly support cyber security professional development in every way. Founder, Derek Harp interviews the Cybersecurity leaders and brings relevant insights to help any company ...
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. Click Here. Produced by The Record Media
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
 
C
Cyber Security Inside

1
Cyber Security Inside

Tom Garrison and Camille Morhardt

Unsubscribe
Unsubscribe
Weekly
 
Cyber Security is no longer a topic that is addressed only by programmers and coders. CISOs and their executive peers need to think about “cyber security” differently. In this podcast, Tom Garrison, Vice President and GM of Client Security Strategy and Initiatives, and co-host Camille Morhardt, Director of Security Initiative & Communications, will discuss relevant topics in clear, easy to understand language. This podcast is intended for security experts and businesspeople alike. We will ha ...
 
C
Cyber Ways Podcast

1
Cyber Ways Podcast

Tom Stafford, Craig Van Slyke

Unsubscribe
Unsubscribe
Monthly
 
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
 
On this podcast you will meet fun and interesting wetware helping you see that hidden metaverse surrounding us in the Psyche and cyberspace and the data and especially that magical overlap. Im your host Ric and my job is be curious and learn alongside you while bringing some of my own optimism to you and that intentional and sometimes scary focus that just might elevate you and those systems and people you care about
 
Loading …
show series
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, Jan 17-21, is hosted by Rich Stroffolino with our guest, Julie Tsai, Cybersecurity Leader Thanks to our episode sponsor, Datadog Join Datadog in their upcoming webinar to learn how to dissect the anatomy of an attack vector in the cloud with the use of their unified Cloud Secu…
 
In today's podcast we cover four crucial cyber and technology topics, including: 1. Bank of Indonesia has data stolen by Conti ransomware operators 2. R.R. Donnnelly reports cyber incident; likely Conti attack 3. FBI links Diavol ransomware module to Trickbot operators 4. U.S. treasury sanctions Ukrainian for providing data to Russia’s FSB I'd love…
 
Sometimes you can't patch systems for a number of reasons, but how do you determine what is acceptable and what is a 'come in on the weekend' and fix it NOW?? Guest Links: https://twitter.com/CyberCaffeinate https://www.linkedin.com/in/davidklein2/ https://cymulate.com/ https://www.linkedin.com/company/cymulate/ https://cymulate.com/ecademy https:/…
 
As we move towards a greener future, we may meet our demise anyway. Cyber criminals love to attack critical infrastructure and we are about to hand them the silver platter. In this episode, Darnley discusses the main issues of green energy and why current technologies are antiquated and outdated. Should we wait until people get hurt or killed befor…
 
RedLine Stealer Delivered Through FTP https://isc.sans.edu/forums/diary/RedLine+Stealer+Delivered+Through+FTP/28258/ Google Camera Alters QR Codes https://www.heise.de/hintergrund/Googles-Kamera-verfaelscht-Links-in-QR-Codes-6332669.html https://www.androidpolice.com/google-camera-randomly-changes-some-qr-code-urls-on-android-12/ Linux Kernel Privi…
 
And we're back for season 7. This season has a theme of sorts, we are going back in time and looking at major vulnerabilities and incidents that have shaped information and cybersecurity. This week, Mat and Mike bring on Matthew Crain to discuss the impact and danger of the Log4j vulnerabilities and what new 3D printer to buy. ---------------------…
 
What do you picture when you read the word “hacker?” I always see Cereal, Matthew Lillard’s character, from the movie Hackers. A dude with weird hair, intense need to make information free, and copies of 2600 magazine scattered around his dank apartment. That image is, and always was, a fantasy. What hackers are, and what they’ve become, is complic…
 
In this episode of Cyber Ways, Tom and Craig discuss a classic behavioral security paper that explores how users rationalize their purposeful violations of security policy. Listen and learn the six common rationalizations and what security managers can do to reduce their effects. Citation: Siponen, M., & Vance, A. (2010). Neutralization: new insigh…
 
Security operations center (SOC) analysts are responsible for analyzing and monitoring network traffic, threats and vulnerabilities within an organization’s IT infrastructure. This includes monitoring, investigating and reporting security events and incidents from security information and event management (SIEM) systems. SOC analysts also monitor f…
 
- Can you tell us a bit about your background, how you got into the role you're in now? - For those unfamiliar with the term "Chaos Engineering" what is it and why should organizations be practicing it? - You currently support a program named Kessel Run, what do they do? - Performing something disruptive such as Chaos Engineering almost seems unhea…
 
Allan is joined by Rafal Los, industry innovator, strategist, and personality. His career spans 20+ years while working inside companies from the Fortune 10 to a firm of less than 10. Additionally, Rafal is a founder and host of the Down the Security Rabbithole Podcast - an industry podcast delivering a weekly take on cybersecurity since 2011. Join…
 
Today, Daryl Haegley joins Derek Harp for another episode in the Security Leader interview series! Daryl was a military officer and then became a civilian in DOD (Department of Defense) operations. He is now the Director of Mission Insurance and Cyber Deterrence for the DOD. Daryl has always been fascinated with technology. He links his fascination…
 
Today we hear from Doug Britton at Haystack, who has come up with a great approach that tells us whether a candidate will be successful in a cybersecurity career. The CATA (Cyber Aptitude and Talent Assessment) relates to cognitive skills in various cybersecurity practices and jobs. This is excellent for job seekers and hiring managers alike. Doug …
 
https://www.csoonline.com/article/3647209/why-you-should-secure-your-embedded-server-management-interfaces.html https://www.csoonline.com/article/3646613/cybercrime-group-elephant-beetle-lurks-inside-networks-for-months.html https://www.zdnet.com/article/when-open-source-developers-go-bad/ https://www.bleepingcomputer.com/news/microsoft/microsoft-r…
 
This week the guys discuss some of the bigger cybersecurity struggles for mid-market and emerging companies. Developing an effective incident response plan is a major challenge and when done incorrectly, can cause a lot of damage. The guys also share struggles SaaS companies face when they're inundated with cybersecurity questionnaires that are hol…
 
In this episode, I chat with Mike Robarts who is Executive of the UK Maritime Pilots Association. He tells us about his seafaring background and what threats and solutions there might be for cyber attacks in the maritime industry. Full news update on the next episode. As always, if you have any questions or wish to suggest a podcast episode or part…
 
Time for another round of security training. This time it’s John Strands Cyber Deception class. We’re also talking about job hunting Jason Blanchard style. LINKS 1. Active Defense & Cyber Deception w/ John Strand - Starts 1-24-22 2. Jason Blanchard: Twitter Account 3. Jason Blanchard: Twitch Account FIND US ON 1. Twitter - DamienHull 2. YouTube…
 
In this episode of Cyber Security Inside What That Means, Camille Morhardt jumps into the non-fungible token (NFT) conversation with Mic Bowman, Senior Principal Engineer at Intel. The conversation covers: - What an NFT is, with several examples - How an NFT is purchased and traded - How owning an NFT is different from owning the asset the NFT is c…
 
CSCP is back with this brand new season 3 Paddy Viswanathan is the CEO and founder of C3M. C3M Cloud Control is a cloud security platform that helps cloud and security teams continuously monitor and manage their cloud security posture. Frank and Paddy discuss risk assessment in the cloud, how to prevent breaches associated with a third party, and t…
 
Ready is a choice, it not worth waiting for. Do you regularly invest time with people who: * claim ready enough for action even while uncertain? * do work that matter for them regularly? * Dare find out if those they seek to serve care about having that work done?` What does Ready mean to you? often we forget to ask this critical question. * when i…
 
Joseph Weiss (www.controlglobal.com/unfettered) is an industry expert on control systems and electronic security of control systems, with more than 40 years of experience in the energy industry. Mr. Weiss spent more than 14 years at the Electric Power Research Institute (EPRI), the first 5 years managing the Nuclear Instrumentation and Diagnostics …
 
The Book of Boba Fett Episode 2 Review | BreakdownSUBSCRIBE 👉🏽👉🏾👉🏿 https://bit.ly/306mKTjOfficial TCN Merch 👉🏽👉🏾👉🏿 https://www.multiversemerch.comThe Cyber Nerds @JiCanWin @Geek Sensei &@Mr Blitztekspoiler review of and break down of @Star Wars The Book of Boba Fett Season 1 Chapter 2: The Tribes Of Tatooine --- Boba Fett faces new challenges on Ta…
 
Welcome to the first Cyber Security Brief of 2022! In this week’s podcast, Dick O’Brien and Brigid O Gorman chat about some of the biggest news stories of the last couple of weeks. The topics up for discussion in this episode include: FIN7 BadUSB attacks return, an interesting new multi-platform backdoor, and the latest way attackers are attempting…
 
Welcome to the first episode of the year 2022! Mike rang in the new year by being a little Covid slut. Johnny makes some big purchases and watches some hot new TV shows. A classic show.Enjoy!This episode is sponsored by Hempstreets!Use coupon code, HOOK, receive 15% of your ENTIRE purchase!hempstreets.comLeave us a voicemail at 219-552-1128For all …
 
The cyber industry is notorious for merger and acquisition activity. Some go well, some come with collateral damage -- loss of employees, poor technology integration and leadership friction. Sue Graham Johnston, VP & GM of AI-Driven SD-WAN at Juniper Networks, talks with us about coming over from an acquisition and how she and the Juniper team have…
 
Picture of the Week. Log4j's 5th update. Microsoft's Log4j scanner triggers false positives. Chinese government is annoyed with Alibaba. "Hack the DHS" Bug Bounty Expanded. COVID postpones the RSA Conference. DuckDuckGo continues to grow. The cost of cyber insurance will likely be rising or perhaps terminated. "The Matrix Resurrections" what a disa…
 
It’s going to take time, vigilance, and attention to detail to manage the Log4j risks. A North Korean APT is trying to install the Konni RAT into Russian diplomats’ devices. More hacktivist-looking incidents follow the anniversary of Iranian General Soleimani’s death. Other, self-inflicted, software supply chain incidents. The Kremlin is said to be…
 
2021 is drawing to a close, and it’s time to look back on the events of the past year. At the same time we look ahead to the brand new year to come. Welcome to part one of a special two-part episode of Cyber Security Sauna. In this episode we’re joined by F-Secure’s Chief Research Officer Mikko Hypponen, Security Consultant Adriana Verhagen, and AI…
 
This is the audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; Playing mind games with the enemy: How businesses can socially engineer threat actors https://www.scmagazine.com/analysis/leadership/playing-min…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login