show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
Discover the unique, inspiring, and often amusing stories behind what it takes to lead cybersecurity efforts in an organization. The Security Stories podcast features interviews with a diverse range of guests, each sharing their leadership experiences for the benefit of others in the cybersecurity industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Connect with Renee Small on LinkedIn https://www.linkedin.com/in/reneebrownsmall/ Connect with Christophe Foulon on LinkedIn https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://cpf-coaching.com Develop Your Cybersecurity Career Path: How to Break into ...
 
B
BarCode

1
BarCode

Chris Glanden

Unsubscribe
Unsubscribe
Monthly+
 
Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who wi ...
 
America’s Leading Security Coach to Small Business, the FBI, Homeland Security, Department of Defense, Department of Energy, The Whitehouse, all major DoD contractors, including Raytheon, Boeing, Lockheed, BAE, and more. Dozens of US State, County, and City governments. School Districts, Hospitals, Doctors, and Clinics. All major financial institutions in the United States, including The Federal Reserve, Fidelity, Bank of America, Visa, M/C, etc. Providing Network Security since 1991.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
 
The security story’s remained the same for some time: prevent, detect, respond. In our inaugural season of Security Sandbox, Relativity’s CSO and CIO, Amanda Fennell, shelves the tedium of convention and explores a new approach. From cooking to cars, she chats with her Calder7 team and other security luminaries—along with a few unusual guests—about using curiosity and personal passions to inspire strong security.
 
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
 
T
The New CISO

1
The New CISO

Steve Moore, Exabeam

Unsubscribe
Unsubscribe
Monthly+
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Every weekday, host Kai Ryssdal helps you make sense of the day’s business and economic news — no econ degree or finance background required. “Marketplace” takes you beyond the numbers, bringing you context. Our team of reporters all over the world speak with CEOs, policymakers and regular people just trying to get by.
 
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
The monthly podcast for security professionals by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
 
Welcome to the Blue Door Podcast, brought to you by O2 Business, where we discuss technology that can help organisations be their best. We're focused on discussing market trends, culture and mindset, technologies that make a difference, and the lessons that can be learned from experts and market leaders from different industries. We interview senior leaders from some of the largest organisations across the globe. So open that door, come on in and let's begin.
 
Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, social engineering scams as well as hints and tips from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware payloads. If you are worried about uneducated emp ...
 
The ConnectWise Podcast Network is the source for insight, analysis, tips and commentary on everything MSPs need to know, with shows and produced by ConnectWise, the Platform for What's Next. From the latest in cybersecurity to strategies on how to achieve greater success with managed services, listen now to discover how you can unlock unlimited potential for your MSP business.
 
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
Ted Harrington is the author of Hackable: How to do Application Security Right and the executive partner at Independent Security Evaluators. In this episode of Cybersecurity Unplugged, Harrington discusses: The dangers of connected medical devices and how he and his team have identified vulnerabilities in passive medical devices; How most organizat…
 
Cybersecurity Awareness Month turns 18 this October 2021. And just like other 18-year olds, it's graduated from dealing with fairly straight-forward problems to facing complex issues. But National Cyber Security Alliance (NCSA) Interim Executive Director Lisa Plaggemier tells us, that there are a few simple steps individuals and businesses can take…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Philip Wylie (The Hacker Maker)as a guest on the show — together they talk about: How Are Hackers Made? | Contextualizing Technology And Art | Why Computer Power Is Never Enough | What Could Cybersecurity Learn From Plants? | Vinyl Records & Video Cass…
 
We spent the last couple weeks going through all of our tools and systems in an effort to find weaknesses. This is what we learned. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.…
 
#CISOThursdays​: Breaking Into Cybersecurity + Michael Baker 10.21.21 It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. The crew is ready, as always, for a lively discussion. Our guest today is Michael Baker. About Breaking Into Cybersecurity: This series was created by Renee Small & ☁️ Christophe Fo…
 
This episode is one of the top downloaded episodes of 2021 thus far, Microsoft Is Now A Cybersecurity Monster. New shows will return Tuesday, Oct. 26th, 2021. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Wher…
 
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologi…
 
Alyssa Miller, Business Information Security Officer at S&P Global Ratings and author of the forthcoming book, “Cyber Defenders' Career Guide, is one of the most provocative, unfiltered and interesting voices in the cybersecurity community. She’s essential reading on infosec Twitter and a regular draw at conferences around the world. In this episod…
 
Cyberespionage seems undeterred by stern warnings. DDoS hits the Philippine Senate. The US Department of Homeland Security intends to issue cybersecurity regulations for passenger rail and airlines. The US Department of Justice intends to use the False Claims Act to bring civil actions against government contractors who fail to follow “recognized c…
 
All links and images for this episode can be found on CISO Series How do we turn the tide from reactive to proactive patch management? Does anyone feel good about where they are with their own patch management program? What would it take to get there? Check out this post and this post for the discussion that is the basis of our conversation on this…
 
This episode of ConnectWise Tech Talk is all about technologies to support a hybrid work environment. We're joined by experts from ESET, QuickPass, IBM MaaS360 and Storage Guardian to learn how these ConnectWise Ecosystem solutions help MSPs securely and effectively manage a hybrid workforce from colleagues to customers.…
 
Chinese surveillance tech pulled from US retailers Microsoft warns of rise in password spraying attacks The FTC is looking into the Facebook Files And now a word from our sponsor, Banyan Security Today, 75% of enterprises are using some form of hybrid-cloud deployment. Unfortunately, traditional network-centric security solutions like VPNs are not …
 
Kyle Tobener has seen many flavors of how to manage third-party security risk. He joins Tech Done Different to share many insights on this critical security domain. You'll learn: - why companies that have a unified system for third party/vendor security risk management are always in the best shape - why experience in third party security is like an…
 
We’ve said it before and we’ll say it again: There are issues in the global supply chain. One hiccup in the supply chain is a lack of truck drivers in the United States. Despite hiring bonuses of up to $10,000, fewer truck drivers are finding the stressful work and long hours worth it. And one of their biggest complaints? Difficulty finding a place…
 
Sudan is under a blackout as a military junta consolidates control over the government. Iran says a cyberattack--unattributed so far--was responsible for disrupting fuel distribution in that country. A novel loader is discovered. Operation Dark HunTor takes down a darkweb contraband market. The US FTC is looking into Facebook’s privacy settlement. …
 
Interview Links Check out the Ransomwhere site. Listen to our previous episode with Jack on election security. Rapid Rundown Links Read the CISA notification on the critical RCE vulnerability in Discourse. See Discourse’s announcement of the vulnerability on GitHub. Peruse Discourse’s technical blog post about it. Check out Discourse’s security pro…
 
Tesla rolled back an update that had a serious bug. This episode talks about auto-drive cars and the risks of software and the bugs that come with them in our ever-growing automated world. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-F…
 
Iranian gas stations out of service after cyberattack Nevada and North Dakota top cybercrime lists Researcher cracked 70% of sampled WiFi networks And now a word from our sponsor, Banyan Security Today, 75% of enterprises are using some form of hybrid-cloud deployment. Unfortunately, traditional network-centric security solutions like VPNs are not …
 
Predicted to be a $20 Billion cybercrime empire by the end of 2021, Ransomware is impacting businesses like never before… resulting in loss of revenue, reputation, and resources for organizations of all types. To put things in perspective, it is reported that an attack hits once every 11 seconds, and as if that stat isn’t hard enough to fathom, it’…
 
In Episode 25 of the Blue Door Podcast we continue our Lessons for Leaders series, and talk to Paul Asare-Archer, Director of Compliance at Virgin Media O2, who some long time listeners might remember from back in episode 7. As Black History Month comes to one end, we talk directly to Paul about his own story, and the lessons to share about diversi…
 
As congressional Democrats trim down the social-spending bill, a proposal for paid family leave may be cut from 12 to four weeks. The U.S. is one of only a handful of countries that don’t guarantee some paid family leave, and even at four weeks, would still be behind nearly every other country in the world. While such a policy could be vital to wor…
 
Notes on ransomware and privateering: Conti’s barking at its victims, someone’s exploiting billing software, and BlackMatter repeated some coding errors its DarkSide predecessor committed. GCHQ suggests that the UK will undertake a more assertive imposition of costs on cyber gangs. The US State Department will reestablish its cyber bureau. Software…
 
Internet connectivity with mainland China is strictly regulated by the government, with sweeping laws banning many types of content and sites, and ongoing traffic inspection. The patchwork of technical and regulatory requirements results in “choke points” for content providers and their customers, who grapple with application availability and perfo…
 
Millions of accounts from TikTok and Instagram were exposed by an insecure database used by a marketing firm. This data was collected through scraping. This episode goes into the details. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi…
 
We begin the episode with Michael Ellis taking a close look at the takedown of the ransomware gang. It’s a good story for the good guys, as REvil seems to have been brought down by the same tactic it used against so many of its victims—malware that lingered in the backups it used to restore its network. I note that this seems to be a continuation o…
 
All links and images for this episode can be found on CISO Series It’s extremely hard to tell if a cybersecurity leader is doing a good job. In fact, it’s tough for even them to know. Our best bet is watching for an improvement in the cybersecurity program over time. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Serie…
 
Microsoft report on Nobelium Healthcare organizations struggle with breaches ProtonMail wins appeal on surveillance data And now a word from our sponsor, Banyan Security Today, 75% of enterprises are using some form of hybrid-cloud deployment. Unfortunately, traditional network-centric security solutions like VPNs are not designed to meet the scale…
 
In the early ’90s, New Mexico had 34,000 acres devoted to the production of chiles, the pepper seen on menus across the state. But that number has dwindled, with some 8,000 acres set aside for chile production in recent years, according to the New Mexico Chile Association. The decline in chile production — largely the result of climate change and a…
 
Blog post that inspired this episode: https://lizsaling.com/SWE-team-five-pillars/ Liz Saling (@lizsaling) https://www.mindtools.com/pages/article/newLDR_86.htm http://www.mspguide.org/tool/tuckman-forming-norming-storming-performing https://michaelhyatt.com/3-roadblocks-to-avoid-for-optimal-team-performance Erin meyer is the one who did the netfli…
 
SolarMarket infestations are up, and circulating through WordPress sites. More indications that REvil was taken down by a US-led but thoroughly international public-private partnership, and the other Russian privateers have their noses seriously out of joint. Russia’s SVR is getting busy in software supply chains. Criminals take advantage of the po…
 
The global supply chain touches every aspect of our lives, from fuel prices to the availability of computer chips and supermarket products. In out latest podcast, Matt Butkovic, technical director of risk and resilience at Carnegie Mellon University’s Software Engineering Institute, discusses with Suzanne Miller the supply chain's silver thread of …
 
Mark Stavish is a respected authority on Western spiritual traditions with over 35 years experience in comparative religion, philosophy, psychology, and mysticism with emphasis on Western Spiritual Traditions. Mark is the author of 26 books, published in 9 languages including The Path of Alchemy and Egregores. He is the founder and director of the …
 
Recorded Future’s Insikt Group recently discovered a new Canada-focused darknet marketplace called WeTheNorth. This localized criminal marketplace features a variety of illegal goods and services for sale, many of which pose a threat to local and global enterprises. WeTheNorth administrators have gone to great lengths to create a marketplace geared…
 
This episode is one of the most downloaded of 2021 this far, Get A Google Voice Number. New shows will return Tuesday, Oct. 26th, 2021. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security…
 
Crypto-miner and malware found hidden inside npm libraries Facebook sues Ukrainian who scraped the data of 178 million users BlackMatter ransomware victims quietly helped using secret decryptor And now a word from our sponsor, Banyan Security Today, 75% of enterprises are using some form of hybrid-cloud deployment. Unfortunately, traditional networ…
 
Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to technology. While he had some bumps in th…
 
Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-comin…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login