Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
…
continue reading
The Security professional’s podcast on how to start, manage, and drive a successful career in cyber security and risk management.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
We live in two worlds, the real world and the cyber world. Both worlds are interconnected and interdependent but very different. Different rules apply. We have no choice but to exist in both worlds. As innovation and digitalization accelerates, we need to understand the risks, consequences and safeguards necessary to safely protect businesses, people and society.Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force hosts the “Cyber Task Force” podcast. In each show, Paul ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
…
continue reading
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
…
continue reading
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Crowdstrike: The Aftermath - PSW #836
1:59:49
1:59:49
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:59:49
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Tide. Nation-State Cyberattacks & Global Impact. Mark Sangster, Chief Of Strategy, Adlumin.
19:37
19:37
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
19:37
Mark Sangster, cybersecurity author and expert, is the Chief of Strategy at Adlumin. In this episode, he joins host Heather Engel to explore the rising threat of nation-state cyberattacks and their impact on global security and politics. Cyber Tide is a Cybercrime Magazine podcast series brought to you by Adlumin. Working to revolutionize the way o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Beyond the Password: 3 Essential Tips for Protecting Your Digital Identity
16:14
16:14
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
16:14
Send us a Text Message. Show Notes for Episode: Fortify Your Digital Life: Advanced Password Security Tips and Tools 🎧🔒 Welcome to another enlightening episode of the Bee Cyber Fit podcast! In this episode, we delve deep into the world of password security to help you master the art of safeguarding your online identity. Join hosts Wendy Battles and…
…
continue reading
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jul. 25, 2024. Security Firm Mistakenly Hires Hacker. WCYB Digital Radio.
2:47
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MS Patch Tuesday: Which Vulnerabilities Really Need Prioritizing - Douglas McKee - PSW #836
1:05:12
1:05:12
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:05:12
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Show Notes: https://securityweekly.com/psw-836…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MS Patch Tuesday: Which Vulnerabilities Really Need Prioritizing. - Douglas McKee - PSW #836
3:04:36
3:04:36
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
3:04:36
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ask Me Anything, Theresa Payton. Does Law Enforcement Use OSINT Techniques? Sponsored By Pipl.
4:46
Welcome to this week's "Ask Me Anything" on the Cybercrime Magazine Podcast, with host Theresa Payton, CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted". This special series is brought to you by Pipl AMA, the AI investigator. AMA answers questions about individua…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tony Reshef CaaS @Electra group and others on the roll of contract Ciso & being an ethical hacker
57:15
57:15
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
57:15
גופים רבים שאינם יכולים להרשות לעצמם סיסו במשרה מלאה פונים לאופציה של סיסו אס הסרבייס. נחשון פינקו מארח את טוני רשף הסיסו של אלקטרה, מדיקל ארליסיין ויווויזן בין שאר הדברים שהיא עושה בשיחה על המשמעות של סיסו אס הסרביס, ההבדל בין סיסו אס הסרביס ויעוץ סייבר. איך בונים את התפקיד על מנת שיהיה אפקטיבי? החשיבות של סקרי סייבר, תוכנית עבודה ובדיקות חדירות ל…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EPISODE 38: HACK THE PLANET! THE BEST AND WORST HACKER MOVIES REVIEWED!
32:09
32:09
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
32:09
Welcome to Compromising Positions! The award-winning tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This Episode we are joined by Simon Painter a senior software engineer with nearly 20 y…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Flash Point. Breaking News on Insider Threats to US Organizations
24:03
24:03
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
24:03
NEW! Text Us Direct Here! How would you know if a seemingly perfect employee was actually an imposter? Behind this facade was a North Korean operative, a meticulously trained spy. In Cyber Flash Point we cover Breaking News on Insider Threats to US Organizations. Topics: Insider Threats to US Organizations, how to reduce insider threats, top cyber …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Women Can Break Through Barriers in the Security Industry
24:50
24:50
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
24:50
Aileen Garcia was pursuing a career in interior design before a sudden change in trajectory took her into the male-dominated field of security technology – more specifically cybersecurity, where as fraud prevention manager at ClearSale she’s working to ensure all her team members are motivated to take a flexible approach toward their important work…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime Wire For Jul. 24, 2024. Cyberattack Strikes Croatia's Split Airport. WCYB Digital Radio.
1:19
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybercrime News For Jul. 24, 2024. Hackers Disable Heating in Lviv, Ukraine. WCYB Digital Radio.
2:54
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
You Can't Ease off the Security Gas Pedal — Especially in Healthcare
28:25
28:25
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
28:25
In this episode, Jeffrey talks to Adam Moore, Head of Global Cloud Solutions for Elekta. They discuss movies that look forward and backward, security threats — including AI — to healthcare data and why you can never say “we’re good” with your security posture.โดย Jeffrey Wheatman
…
continue reading
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What Enterprises Need to Know About ChatGPT and Cybersecurity
21:44
21:44
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
21:44
Many people are pondering whether generative artificial intelligence (AI) tool ChatGPT is a friend or a foe. In this ISACA podcast episode, Camelot Secure Director of Solutions Engineering Zachary Folks discusses not only his view of how ChatGPT can be considered an evolution of the encyclopedia, but importantly how it is aiding cybersecurity profe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Understanding U.S. Elections in the Context of Larger Geopolitical Trends
38:06
38:06
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
38:06
In this episode of the Applied Geopolitics podcast, Rodger Baker speaks with Matt Gertken about the importance of leveraging geopolitical analysis to contextualize elections. Matt is BCA Research’s Chief Strategist, Geopolitical Strategy and US Political Strategy. He oversees the firm’s coverage of market-relevant policy developments across the wor…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SAPwned, Squarespace Domain Hijacks, AIs Fixing Code, Infosec Investments - ASW #292
28:57
28:57
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
28:57
SAPwned demonstrates tenets of tenant isolation, a weak login flow puts Squarespace domains at risk, how AIs might (or might not) be useful for fixing code, getting buy-in for infosec investments, and more! Show Notes: https://securityweekly.com/asw-292
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Darknet Insights: Malware Trends and AI Threats - Ep 107
21:29
21:29
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
21:29
In this episode of Reimagining Cyber, host Rob Aragao interviews Ashley Jess, a senior intelligence analyst at Intel 471. Ashley discusses her transition from the FBI to her current role, highlighting her expertise in malware trends and AI abuse. The conversation explores the rise of info stealers, the decline of drainer malware, and the increasing…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ethical AI: Controlling AI Ethically while Navigating Cybercrime
54:00
54:00
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
54:00
NEW! Text Us Direct Here! We interview Steve Orrin, the CTO of Intel, who essentially make the chips (brains) of most computers on the planet. We discuss these topics: Controlling AI Ethically, how to control AI ethically, what are the ethical considerations of AI, use of AI in cybersecurity, use of AI in cybercrime, deep fakes, zero trust and more…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 984: CrowdStruck - Crowdstrike, Cellebrite, More Entrust
2:27:05
2:27:05
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
2:27:05
Cellebrite unlocks Trump's would-be assassin's phone. Cisco reported on a CVSS of 10.0 Entrust drops the other shoe Google gives up on removing 3rd-party cookies Miscellany Snowflake and data warehouse applications CDK auto dealership outage Polyfill.io and resource hashes MITM Blocking Copilot Blocking incoming connections via IP CrowdStruck Show …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 984: CrowdStruck - Crowdstrike, Cellebrite, More Entrust
2:27:05
2:27:05
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
2:27:05
Cellebrite unlocks Trump's would-be assassin's phone. Cisco reported on a CVSS of 10.0 Entrust drops the other shoe Google gives up on removing 3rd-party cookies Miscellany Snowflake and data warehouse applications CDK auto dealership outage Polyfill.io and resource hashes MITM Blocking Copilot Blocking incoming connections via IP CrowdStruck Show …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Risk Management Insights: What CEOs and Boards Really Need - Jeff Recor - BSW #357
32:39
32:39
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
32:39
Security is a risk management discipline. No one understand that more than Jeff Recor. Jeff has built risk management practices for Deloitte, Grant Thornton, and Accenture and has recently formed his own risk consulting practice. In this unscripted interview, Jeff will share his insights on the evolution of security as a risk management discipline,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Risk Management Insights: What CEOs and Boards Really Need - Jeff Recor - BSW #357
32:39
32:39
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
32:39
Security is a risk management discipline. No one understand that more than Jeff Recor. Jeff has built risk management practices for Deloitte, Grant Thornton, and Accenture and has recently formed his own risk consulting practice. In this unscripted interview, Jeff will share his insights on the evolution of security as a risk management discipline,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hidden Risk. What It Means To Be Proactive In Cybersecurity. Bob Maley, Black Kite.
11:03
11:03
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
11:03
Bob Maley is the Chief Security Officer at Black Kite. In this episode of Hidden Risk, he joins host Charlie Osborne to discuss what it means to be proactive in cybersecurity, including what type of information is needed to truly reduce risk, how companies can successfully demonstrate being proactive, and more. An award-winning intelligence platfor…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Killer Robots, Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet and More - SWN #400
34:11
34:11
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
34:11
Elon's Killer Robots, Crowdstrike and More Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet, and more, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-400
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Where Generative AI Can Actually Help Security (And Where It Doesn't) - Farshad Abasi, Allie Mellen - ASW #292
1:05:00
1:05:00
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:05:00
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Where Generative AI Can Actually Help Security (And Where It Doesn't) - Allie Mellen, Farshad Abasi - ASW #292
36:04
36:04
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
36:04
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Killer Robots, Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet and More - SWN #400
34:16
34:16
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
34:16
Elon's Killer Robots, Crowdstrike and More Crowdstrike, Southwest, Play, FrostyGoop, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-400
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Crisis Fighting: How to plan a successful security incident
47:12
47:12
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
47:12
It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last 5 years.What happens when your job is to operate in a crisis? Join us for the next episode of Secure Talk where we sit down with Vice Admiral Mike LeFevre (re…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Closing CISO-CEO Communication Gap Requires a Common Business Language - Sumedh Thakar, Jeff Recor - BSW #357
1:11:22
1:11:22
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:11:22
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Closing CISO-CEO Communication Gap Requires a Common Business Language - Sumedh Thakar, Jeff Recor - BSW #357
1:11:22
1:11:22
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:11:22
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Closing CISO-CEO Communication Gap Requires a Common Business Language - Sumedh Thakar - BSW #357
39:09
39:09
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
39:09
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
…
continue reading