show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
C
Click Here

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Weekly
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. If you want more stories like Click Her ...
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Alias Secure AF Cybersecurity Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cybersecurity topics with coworkers and special guests. No matter where you are on the cybersecurity knowledge ladder, there's an episode here for you.
 
I
InTechnology

51
InTechnology

Tom Garrison and Camille Morhardt

Unsubscribe
Unsubscribe
Weekly
 
Welcome to InTechnology, hosted by Tom Garrison and Camille Morhardt. In this podcast you will hear conversations with industry leaders and technical experts in cybersecurity, sustainability, and technology. Our guests will explain their approach to recognize emerging trends and to create best practices… where more and more, the health of an organization depends on embracing the interconnectedness of these three areas.
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
 
S
Smashing Security

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
The Secure Talk Cybersecurity podcast reviews the latest threats, tips, and trends related to cybersecurity, cryptocurrencies, and compliance. Host Mark Shriner interviews leading cybersecurity and cryptocurrency executives to discuss best practices related to IT security, data protection, cryptocurrency investment and usage.
 
Fed up with tech hype and buzzwords? Looking for a tech podcast where you can learn and be inspired by real-world examples of how technology is transforming businesses and reshaping industries? In this business technology podcast, you can keep informed of the latest business and tech trends by listening to the stories of other people in your field and how they are overcoming challenges with emerging technologies. Learn from the guest's actionable tips, and lessons learned to obtain greater c ...
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Twitter: @emsisoft Facebook: @Emsisoft
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
 
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
 
Interviews with founders, startup-advising CISOs, venture capitalists, and analysts discussing the issues of cybersecurity, new threats, and emerging technology. The Genealogy of Innovation brings listeners into forward-thinking conversations with industry visionaries, to explore big ideas, and discuss out-innovating the competition.
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Loading …
show series
 
Edward Amoroso is the founder and CEO of Tag InfoSphere. He also teaches courses on cybersecurity at NYU and the Stevens Institute of Technology. Previously, he was the CISO of AT&T for many years. Tag Cyber: https://www.tag-cyber.com Cybrary: https://www.cybrary.it SANS: https://www.sans.org Coursera: https://www.coursera.org Edward Amoroso Linked…
 
Graham Brooks, Senior Security Architect at Syxsense, discusses the recently released research from Syxsense and Enterprise Strategy Group (ESG) that shows that unmanaged device utilization is resulting in an increasing number of security incidents. Graham also talks about the "must haves" for any endpoint management platform and explains how IoT d…
 
Are you taking full advantage of the incredible cybersecurity industry events and resources to learn cybersecurity and grow as a professional? Simply Cyber welcomes Mari Galloway as she discusses her career journey and her many initiatives with Wicked6 and Women + Cybersecurity = Women's Society of Cyberjutsu A 501c3 National Non-Profit Cybersecuri…
 
This episode was recorded on 3/22/2023 Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our ecosystem of partners, customers, and industry exp…
 
In episode one our host Jeremy Ventura will be joined by Edwin Moreno, CISSP Field CTO from Mimecast and Karsten Chearis, Manager of Solutions Engineering at Rapid7. They'll be talking about Breaking Barriers Down: The Importance of Diversity & Inclusion in Cybersecurity and cover the following topics: 🤔 Learn why diversity in cyber is demanded for…
 
Faced with growing ransomware threats, phishing attempts and more, the Department of Veterans Affairs is reevaluating what it means to be “secure” in a hybrid environment. VA CISO Lynette Sherrill outlines the agency’s cybersecurity strategy and emphasizes the importance of identity management through multi-factor authentication and least privilege…
 
Cyberattacks against Canada’s agriculture industry. HItachi ransomware incident. African industrial sector targeted with malware. TSA issues new cybersecurity requirements for the aviation industry. CISA issues a guide for resilience in the maritime industry. Ransomware Vulnerability Warning Pilot supports critical infrastructure operators. Guest i…
 
In this episode, we sit down with Matt Bromiley to talk about some of the latest intel coming out of the LimaCharlie community Slack channel: CVE-2023-23397: A zero-touch exploit and affects all versions of Windows Outlook. CVE-2023-24880: An unpatched security bypass in Microsoft’s SmartScreen. security feature Mandiant observes China-nexus threat…
 
Threat group with novel malware operates in Southeast Asia. Data theft extortion on the rise. Key findings of Cisco's Cybersecurity Readiness Index. iPhones are no longer welcome in the Kremlin. Russian cyber auxiliaries and privateers devote increased attention to the healthcare sector. Chris Eng from Veracode shares findings of their Annual Repor…
 
We are excited to welcome back to the podcast Maria Roat, founder of MA Roat Consulting and former U.S. Deputy Federal Chief Information Officer. For our discussion we double click into the cyber workforce gap and how to attract diverse skillsets to the industry, introducing STEM earlier in education, understanding how to nurture non-traditional le…
 
ChatGPT is making headlines worldwide and its impact is making a lot of business owners uncomfortable. What is ChatGPT? How will this tool change how you do business? Is ChatGPT a security risk? What to expect from ChatGPT4? William Parks interviews LBMC's Data Insights team members to discuss this controversial topic, dive into facts your organiza…
 
Ashland CISO Bob Schuetter on brainstorming secure enterprise browsers in their startup's incubation period. Bob discusses building the cloud’s secure edge, and how new web browsers like Island’s (@island_io) will disrupt Data Loss Prevention (DLP), and the Virtual Desktop Infrastructure (VDI) industries. Bob and Paul explore exactly why DLP failed…
 
Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker to gain access to the systems and data of many organisations. To mitigate the risks of supply chain attacks, organisations should perform due diligence…
 
David Carvalho joins me in a conversation sharing his insights on how the Naoris Protocol is revolutionizing cybersecurity for enterprises and individuals in today's hyper-connected world. In this episode, we'll explore the decentralized cybersecurity mesh architecture (dCSMA) that protects networks and data by turning every connected device into a…
 
CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint advisory to share known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023. AA23-075A Alert, Technical Details, and Mitigations Stopransomware.gov is a whole-of-government approach that gives one central …
 
https://www.yourcyberpath.com/92/ In this short episode, our hosts Jason Dion and Kip Boyle discuss the critically important topic of password managers. In the beginning, Jason quickly describes password managers, their use cases and how they work, highlighting both the security and convenience aspects of using a password manager. Then, Kip goes ov…
 
How do you building a Security Operations Center from the ground up? On this episode of Secure AF, Gharrett Workun and Wade VanDeburgh met with us to discuss how they lead the development of a SOC, as well as strategized creative ways to keep their team engaged. Watch the full video at youtube.com/@aliasinfosec. Catch the whole episode now at secur…
 
Substack (FREE 90 Day Cybersecurity Roadmap here) - https://bowtiedcyber.substack.com Website - https://bowtiedcyber.com Twitter - https://twitter.com/bowtiedcyber Instagram - https://instagram.com/bowtiedcyber YouTube - https://www.youtube.com/channel/UCBjH0xZLiqXofqoLuFMTPLg Discord - https://bowtiedcyber.substack.com/p/discord-server-is-now-live…
 
Episode #6 - White House National Cybersecurity Strategy Top News Stories Death By Slides - White House National Cybersecurity Strategy What’chu Listening To - Talk about music That’s a Wrap Cybersecuritygrowth.com and cybersecuritygrowth.com/blog @shawnvalle or @cybersecuritygrowth This week we covered White House National Cybersecurity Strategy W…
 
Biden’s budget seeks increase in cybersecurity spending AT&T alerts 9 million customers of data breach after vendor hack GitHub makes 2FA mandatory next week for active developers Thanks to today's episode sponsor, Packetlabs Trust the ethical hackers at Packetlabs for expert penetration testing services. Our certified professionals specialize in s…
 
Kevin Flint's mission is to help B2B agencies, clients and solutions providers identify, form and grow prosperous relationships. As a B2B Agency Executive and Digital Media expert, he's spent the past two decades working with many of the most innovative B2B brands and marketers to evolve their marketing strategy and deliver superior ROI.…
 
In a continuing effort to bolster and secure the nation’s software supply chain, the Biden administration issued in the 2023 National Cybersecurity Strategy. This plan focus’ on enhancing the country’s defenses against emerging threats, such as ransomware and supply chain attacks. Listen to this podcast to better understand what's outlined in the r…
 
In this episode, host Bidemi Ologunde spoke with JT Taylor, the Senior Director of Fraud Investigations and Operations at ID.me, a cybersecurity company valued at over $1.5 billion. The conversation touched on the nuances of synthetic identity theft; how identity verification is a tool to recognize synthetic identity theft; how identity theft ties …
 
Loading …

Quick Reference Guide

Copyright 2023 | Sitemap | Privacy Policy | Terms of Service