Cybersecurity สาธารณะ
[search 0]
เพิ่มเติม

ดาวน์โหลดแอปเลย!

show episodes
 
B
Breaking Into Cybersecurity

1
Breaking Into Cybersecurity

Renee Small/Christophe Foulon

Unsubscribe
Unsubscribe
รายสัปดาห์+
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Connect with Renee Small on LinkedIn https://www.linkedin.com/in/reneebrownsmall/ Connect with Christophe Foulon on LinkedIn https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://cpf-coaching.com Develop Your Cybersecurity Career Path: How to Break into ...
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
 
C
Cybersecurity Unplugged

1
Cybersecurity Unplugged

CyberTheory

Unsubscribe
Unsubscribe
รายสัปดาห์
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
America’s Leading Cybersecurity Strategist. My team and I start with a scan of all devices on your network to determine what needs to be secured. Then we work with you to develop a complete plan to secure what needs to be secured on your networks. In certain cases, my team and I will help businesses source, monitor, and run their cybersecurity. I've been providing Cybersecurity to enterprises of all sizes, and Federal and State agencies since 1991.
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono imprese, dalle grandi multinazionali alle piccole piccole aziende locali, enti e organizzazioni di ogni ordine e grado, e privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell'attacco, entità della struttura attaccata o danni provocati. Sophos te ne racconta 5 nella stagione 2020 della serie podcast "Sotto Attacco | i grandi crimini ...
 
C
Cybersecurity Careers

1
Cybersecurity Careers

Niloufer Tamboly

Unsubscribe
Unsubscribe
รายเดือน
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
 
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
 
C
Cybersecurity Risk

1
Cybersecurity Risk

Dr. Bill Souza

Unsubscribe
Unsubscribe
รายเดือน
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
 
Cybersecurity on the Front Lines is a new podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Sentinel IPS’ COO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
 
Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, social engineering scams as well as hints and tips from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware payloads. If you are worried about uneducated emp ...
 
C
Cybersecurity Sense

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
รายเดือน
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003, and it quickly became one of North America’s fastest-growing technology companies. At Herjavec Group, your IT security is our topmost priority as we work diligently around the clock to protect the assets of your business including employees, data, IT infrastructure, and information. Recorded and produced by Herjavec Group, The Cybersecurity Cast discusses the latest news, trends, vulnerabilities, and exploits in cybersec ...
 
S
Small Business Cybersecurity Podcast

1
Small Business Cybersecurity Podcast

Small Business Cybersecurity Podcast

Unsubscribe
Unsubscribe
รายเดือน
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
C
Cybersecurity and Technology - Audio

1
Cybersecurity and Technology - Audio

Center for Strategic and International Studies

Unsubscribe
Unsubscribe
รายเดือน
 
CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Technology Policy Program and the International Security Program. Find the latest research from our scholars and CSIS events on this topic below.
 
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Dr. Rollan Roberts is an advisor and resource to national governments on strong Artificial Intelligence and quantum-proof Cybersecurity and was nominated to Central Command's Department of Defense Civilian Task Force. He is the CEO of Courageous!, a superhuman AI and Cybersecurity research and product development think tank that serves advanced national security initiatives of national governments. He served as CEO of the Hoverboard company, creating the best-selling consumer product worldwi ...
 
Loading …
show series
 
Sherry Lowe is the distinguished chief marketing officer at Exabeam. She was also the former CMO at Expanse and served in a similar role at Druva and Splunk. In this episode of Cybersecurity Unplugged, Lowe discusses: Standing out in a market full of lookalikes; Not allowing a focus on metrics to run and ruin marketing efforts; Eliminating the comp…
 
This week Dragos CEO and co-founder Rob Lee joins the podcast and breaks down the OT challenge that many businesses are facing today including a lack of clarity on who within the business owns OT and defining what acceptable OT risk means within the business. He also shares perspective on multi-factor authentication as one of the universal controls…
 
Rohan Sathe, CTO & Co-Founder of Nightfall talks about the different types of data loss prevention (DLP) tools and platforms and explains Nightfall's unique approach to DLP. Rohan also explains how his previous role as one of the founding engineers of Uber Eats put him on the path to looking for a better DLP solution. https://nightfall.ai/…
 
Today's episode reports on an email scam tricking verified Twitter users, a ransomware warning from the FBI, and Apple warns nine US State Department officials their devices have been hackedโดย TIWC
 
As part of the Canadian Intelligence apparatus, Maxime worked in positions ranging from development of cyber defense technologies through Counter Computer Network Exploitation and Counter Intelligence. Maxime led the creation of an advanced cyber security program for the Canadian government and received several Director’s awards for his service. Af…
 
In this episode, Lisa Forte, Partner at Red Goad Cybersecurity discusses what happens when organizations go unprepared for inevitable cyber breach. She explains how practicing your breach plan is the best line of defense in preparing your strategy.โดย Tripwire, Inc.
 
Breaking into Cybersecurity: Gabrielle B (From Actress to Pentester) 12/3/21 About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus …
 
Did Your Computer Have "Intel Inside"? It Won't For long! We're going to talk a little bit about shopping right now. Then we'll get into our chip crunch, and why Intel is being left on the side of the computer road. [Following is an automated transcript.] [00:00:16] There's lots of fun stuff to do. And it's kind of fun getting out of the house. Isn…
 
Ensuring quality automotive products in the age of cyber crime is becoming harder and harder due to the amount of endpoints that can easily be compromised within the supply chain. Regardless of where you sit within an organisation, with the increase of hybrid working and remote work, risks of ransomware still remain at large. CyberAngel recently re…
 
In this episode, Sean Mahoney and Stanley Li of Netswitch interview Mary Siero, who is a CISSP/CISM as well as an Instructor with the MIS Training Institute. On the call Sean, Stanley and Mary ask the question: 'Now you've started the path to improve your security and lower your risk, how do you measure success and ROI of your cybersecurity solutio…
 
In this new year's resolutions podcast, we discuss best practices that CISO's should consider adopting in 2022. Tune in as we explore the planning of a 12-18 month strategy, supply chain challenges, issues with poor cloud configurations, leveraging breach attack simulations, and why security controls are so important.…
 
This morning's podcast reports on an uptick in ransomware during the holidays, enterprise applications that need patching and moreโดย ITWC
 
#CISOThursdays​: Breaking Into Cybersecurity + Jules Okafor 12.02.21 It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. James Azar, CISO Talk podcast host & the crew are ready, as always, for a lively discussion. Our guest host today is the amazing Jules Okafor! About Breaking Into Cybersecurity: This…
 
Brad Hawkins, CEO of SaferNet, talks about the most common cyber threats and explains how VPNs can be used as the "foundation" for cyber security and to greatly reduce cyber risk. He also explains how not all VPNs are created equally, and talks about the different types of VPNs. https://www.safernetvpn.com/https://safernetbusinessvpn.com/https://ni…
 
Dr. Chase Cunningham, aka the ‘Doctor of Zero Trust’, is a recipient of industry awards like the Most Influential People in Security, and is currently Ericom’s chief strategy officer. In this episode of Cybersecurity Unplugged, Dr. Cunningham discusses: How the Zero Trust strategy was developed and has existed for nearly 20 years now; How to deal w…
 
Today's episode reports on the seizure of an alleged ransomware gang member's funds, a cloud computing security report from Google and more malware found in the Android storeโดย ITWC
 
This week we catch up with Dmitri Alperovitch, co-founder of the think tank Silverado Policy Accelerator (SPA) and co-founder of Crowdstrike. He shares details on the newly launched Alperovitch Institute at the Johns Hopkins School of Advanced International Studies offering MA-PhD programs that intertwine cybersecurity and statecraft giving student…
 
Today's episode reports on an email attack at Ikea, an evasive JavaScript loader discovered and malware found hiding in a calendar's impossible dateโดย ITWC
 
This video episode is available on Spotify and YouTube. On today's episode; EMOTET brought to you by LOCKBIT 2.0 Cybersecurity doesn't want Ransomware to go away Don't buy into the FUD MEAL Team SIX is on the case Every day is a day to look out for Ransomware attacks E-Commerce Linux servers hacked with shells PHISH and OSINT Targeting Packages by …
 
This episode reports on what e-tailers should be doing to make their sites safer, recent legal successes against cybercrooks and an Android update to watch forโดย ITWC
 
Today's episode reports on the discovery of new Windows zero-day bug, new cybersecurity resources for Canadian teachers and a holiday warning from the FBIโดย ITWC
 
James Fair, SVP of Technical Operations at Executech talks about managed services for cyber security, and shares his views on security best practices and mentoring and motivation.https://www.executech.com/โดย Cybersecurity Secure Talk
 
David Weeks is the senior director of partner experience for N-able. Weeks works side-by-side with top-performing N-Able MSPs and their global partner community. A big part of his role is to listen and engage with our partners so that we better understand their needs, share ideas more freely, and provide valuable insight into the current market con…
 
Today's episode reports on someone clumsily leaving a database of users of a sex video site open, free incident and vulnerability response advice for IT defenders and a report gives detailed look into the Conti ransomware gangโดย ITWC
 
Do You Think There's Nothing You Can Do to Keep the Bad Guys Out? What a week. The FBI got hacked. Homeland security supposedly is sending out emails about hackers in your network. This is what we're going to talk about to start with today. What are these new emails, and how are they trying to con you? [Automated Transcript Follows] This is a littl…
 
Special Edition: Breaking into Cybersecurity with Omkhar Arasaratnam 11.19.21 Omkhar will share his insights on improving the talent pipeline, how we can attract & retain talent, as well as insights from both the start-up and enterprise space. About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share sto…
 
This episode reports on vulnerabilities found in FatPipe appliances, and the BIOS of some Intel processors, a proposed data breach settlement in a Canadian class-action lawsuit the discovery of new malware hitting e-commerce sitesโดย ITWC
 
#CISOThursdays​: Breaking Into Cybersecurity + Frank Kim 11.18.21 It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. James Azar, CISO Talk podcast host, Naomi Buckwalter, CISO extraordinaire, & the crew are ready, as always, for a lively discussion. Today's guest is Frank Kim. About Breaking Into Cybe…
 
Tony Scott is the chairman of the TonyScottGroup and a senior advisor for cybersecurity and policy at Squire Patton Boggs, a prominent international law firm. Until January of 2017, he was serving as the CIO within the Obama administration. In this episode of Cybersecurity Unplugged, Scott discusses: How sacrificing security for interoperability go…
 
Curt Dukes, Executive Vice President and General Manager for Security Best Practices at the Center for Internet Security (CIS) joins the podcast this week. He shares insights from his more than 30 years with the NSA and how that journey led to the CIS and the synergies between the two organizations in providing cyber resources and fostering threat …
 
Today's episode reports on ransomware gangs being rich enough to buy zero-day vulnerabilities, a warning about vulnerable memory chips and the apparent return of Emotetโดย ITWC
 
Harshil Parikh, CEO of TROMZO talks about developer security friction and how best to engage developers to take security seriously.https://www.tromzo.com/โดย Cybersecurity Secure Talk
 
This episode reports on an attack on a Canadian health clinic, FBI email weakness exploited, a record DDoS attack and how fonts can be dangerousโดย ITWC
 
Loading …

คู่มืออ้างอิงด่วน

Google login Twitter login Classic login