Data Security สาธารณะ
[search 0]
เพิ่มเติม

ดาวน์โหลดแอปเลย!

show episodes
 
There are more information security and privacy threats than ever before. As more technologies emerge, more surveillance tactics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in t ...
 
Manuel W. Lloyd is a top industry Virtual CIO helping healthcare and banking businesses achieve customer-vendor alignment, IT governance, and data security while avoiding costly and embarrassing data breaches. The program is supported by Holiday Delta, Inc dba Dominos Pizza, JTV Management, & Manuel W. Lloyd Consulting®
 
This is “Life, Death and Data Breach”, a podcast about the pains and pitfalls of dealing with sensitive data in large and unorganized company repositories. Jeanne Somma, insights executive and counsel with ayfie and seasoned eDiscovery practitioner and Johannes Stiehler, CEO of ayfie and a linguist at heart discuss how to recognize and solve some of the challenges of discovering and protecting textual information. If you are a legal practitioner, data security officer or just interested in d ...
 
De podcast van G DATA waar een beeld wordt geschetst van de cyberdelicten en incidenten binnen onze samenleving. In deze serie gaan we in gesprek met Eddy Willems, Security Evangelist, geven we inzicht in de laatste security trends en bespreken we de preventieve maatregelen die genomen kunnen worden om cybercrime te voorkomen. Deze podcast geeft de echte waarheid weer over de vele cybergevaren die dagelijks op ons afkomen. Malware, spam, phishing, hacking, APT's, privacy, IoT en de gevaren e ...
 
JSA Podcasts is your source for the latest news and insights from the innovators behind today's top telecom, data center and technology companies. Topics include: -Best Industry Practices During the Covid-19 Pandemic -Digital Transformation-5G and Network Infrastructure-Network Security and AI-The Explosion of Internet of Things and Smart Cities-Sustainable Green Data Centers-Cloud Conversion & Scalability-Big Data & Real World Implementation Kicking off Q4, join us for our latest series ent ...
 
Data privacy is the footprint of our existence. It is our persona beyond ourselves, with traces of us scattered from birth certificates, Social Security numbers, shopping patterns, credit card histories, photographs, mugshots and health records. In a digital world, where memory is converted to 0’s and 1’s, then instantly transformed into a reproduction even in 3D, personal data is an urgent personal and collective subject. Those who wish to live anonymous lives must take extraordinary measur ...
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
 
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
 
Datacenter evolution it's a podcast focused on sharing helpful information about everything datacenter. Servers, Storage, Virtualization, The Cloud, Networking, Cyber Security and many other technical topics. The idea is to share valuable information to allow our listeners to make better and educated decision on their Datacenter. Our show will also provide career development information in the area of technology such us, the trending certifications, technologies to study and be good at, how ...
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other. We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals. This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
 
Welcome to the Swansea Cyber Law & Security Podcast. Sara Correia and Patrick Bishop bring you some news and discussion on the cyber law and security happenings of the last month. The views expressed on this podcast are personal and do not represent those of our employers or partner organisations. ​ - Sara Correia is an ESRC doctoral researcher at the Hillary Rodham Clinton School of Law - formerly the College of Law and Criminology, Swansea University (@SGCorreia). - Dr. Patrick Bishop is a ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
 
Transaction Trending is a podcast powered by the Electronic Transactions Association, the trade association and the voice of the payments technology industry. Join ETA CEO Jason Oxman twice a month for a look into the people, places and things that are shaping the payments technology industry, and our economy as a whole, for the better. We'll bring together diverse voices and perspectives, and explore a wide range of stories and trends. Log onto transactiontrends.com for the latest on the po ...
 
Loading …
show series
 
A casual and candid conversation on database security. Talking through the current data trends including the transition to the cloud and what this means for the database security practitioner. What pitfalls and tools can be used to help simplify and maximize the security professional's transition to a fully monitored data environment solving for Cl…
 
For Data Privacy Day month Rebecca is speaking with Kim Hakim, CEO & Founder of FutureCon Events, about how she handled needing to move...almost overnight!...all her 2020 conferences to being online events at the beginning of 2020 when COVID-19 started spreading through the USA. Kim also discusses some of the key privacy issues she had to address w…
 
Security Experts Michael Gray, CTO of Thrive and Jonathan Nguyen-Duy, VP, Field CISO Team at Fortinet discuss Lessons Learned from 2020 and their 2021 Predictions.โดย Jaymie Scotto & Associates
 
Today's podcast reports on the discovery of personal data on 500,000 left open on an Amazon blob, why a US firm agreed to pay $2 million penalty after data breach and a Facebook error discloses personal informationโดย ITWC
 
Today's podcast reports on the hack of a software firm's forum administrator account, COVID vaccine documents altered in a hack intimate photos from a discontinued app found unprotected and a warning about dating appsโดย ITWC
 
This exclusive interview with data center veteran, Braham Singh, CEO of BDx, explores the challenges BDx overcame to expand across Asia amid the pandemic rapidly. During the interview, Braham also discusses what lies ahead for BDx and provides insight into the future of the data center industry. Learn more about BDx at www.bdxworld.com SUBSCRIBE to…
 
Today's podcast reports on COVID scams aimed at executives, how a reporter was tricked by a phony Harvard job offer, and why temporarily Uber won and Twitter lost in Canadian courtsโดย ITWC
 
To help tech professionals get a stronger grasp on the important technology and how to leverage it within their own organisations, ISACA has released two new resources: Blockchain Framework and Guidance and Blockchain: An Executive View. Available for download here Blockchain Framework and Guidance For our 2021 opening episode, we speak with the le…
 
In the Security News, How two authors became part of WRT54G hacking history, European police and German law enforcement have taken down the illegal "DarkMarket" online marketplace, 70 unpatched Cisco vulnerabilities and why these are not a big deal, Adobe is blocking Flash content, most containers still run as root, watching private videos on YouTu…
 
Ubiquiti network gear has become a favorite among tech enthusiasts, but various Ubiquiti products have had some serious vulnerabilities in recent history. Listen in as we discuss hack, secure, and learn with Ubiquiti gear. We'll also discuss Ubiquiti's data breach announced Jan. 11and what that could mean to the security of your network. Visit http…
 
This morning's podcast looks at marketplace scams, why vulnerabilities are increasing, vulnerability reports climbing, an update for an F5 Network controller and moreโดย ITWC
 
Ryan Noon joins Paul, and the rest of the PSW team, this week to chat through the importance of resilience in everything companies do to protect cloud-stored data and IP, unpack growing enterprise demand for a "digital seatbelt," and explain why Material takes a fresh approach to email security: building products with the assumption that bad actors…
 
The DBoM consortium is a Linux Foundation project to be able to share information with third parties safely, securely, and with control over the information, even after handing it over! Unisys has just open-sourced the code to make this possible, and Chris was a big part of their effort. Using a blockchain-based approach, DBoM works to share softwa…
 
We all know asset management is one of the basics. In fact, it's literally the first two items on the Center for Internet Security's list of top 20 critical security controls. https://www.cisecurity.org/controls/cis-controls-list/ The term "basics" can be deceptive though. We typically expect something basic to also be easy. This is InfoSec though,…
 
This week, Beyond Security partners with Vicarius, Amazon’s Parler removal and what it means for Cloud onfidence, Kount sold to Equifax, McAfee vs Crowdstrike, JumpCloud raises some funds, Red Hat acquires StackRox, and SolarWinds warnings of weak security and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: h…
 
Join us for our latest series entitled ‘Data Movers’. Telecom PR pro, Jaymie Scotto Cutaia and top B2B social media influencer Evan Kirstel sit down with the most influential men and women of today’s leading telcos and data centers, supporting the network infrastructure requirements of our modern world. In this episode of Data Movers, we sit down w…
 
Today's podcast reports on the capture of a big criminal website, a hacker gets 12 years in prison, digital currency thefts, stolen COVID vaccine data leaked, stolen digital currency and moreโดย ITWC
 
A resilient enterprise is able to recover its key business services from a significant unplanned disruption, protecting its customers, shareholders and ultimately the integrity of the financial system. Avoiding disruption to a particular system that supports a business service contributes to operational resilience. Speaker Profile: Pranathi is an e…
 
In the Leadership and Communications section, How BISOs bridge the gap between corporate boards and cybersecurity, 5 questions CISOs should ask prospective corporate lawyers, Good Leadership Is About Asking Good Questions, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw202…
 
Learn why deepwatch chose Splunk as it’s one and only SIEM solution to deliver its Managed Detection & Response services to Fortune 2000 customers. Hear how deepwatch is leveraging a variety of Splunk capabilities and advanced API integrations to detect and respond to threats in customer environments. This segment is sponsored by deepwatch. Visit h…
 
Today's podcast reports on ransomware gangs going after executives, an Orion-related attack on the US court management and the availability of security updates for browsersโดย ITWC
 
In the Security News, Nissan Source code leaked, how the shady 0-Day sales game is evolving, Hack the Army 3.0 announced, creating your own custom encryption in python, FBI warns of swatting attacks targeting your smart device, & the rise of Uncaptcha3! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securi…
 
-What are we seeing from infosec graduates as they come into the enterprise to begin their careers? -How has data privacy changed since 2014? -Is the cloud a solution, or creates more problems? -How does the changing model of application architecture and security testing improve things? (DevOps, "shift left" testing, IAST, etc.) Visit https://www.s…
 
In this episode we cover recent security news including the latest on the SolarWind attack and updates for Security Center, Azure Stream Analytics, Google's Web Signin, Power BI and BGP improvements. Then we speak to Suren Jamiyanaa about Azure Firewall.
 
Today's podcast looks at the discovery of a new ransomware strain, a mistake that exposed the code of Nissan mobile apps and an unusual phishing scamโดย ITWC
 
The way we identify, prioritize, and mitigate software vulnerabilities was built in the reverse order. Why did it happen? Could a new remediation strategy finally form an alliance between IT and security teams? This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly…
 
The current ransomware, breaches, and nation state attacks have defenders feeling overwhelmed and under resourced. Can defensive teams really have defended against this type of supply chain attack and what can every security team do for best practices within Active directory and Azure federation to reduce your enterprises risk. Visit https://www.se…
 
In this episode, guest Drew Spaniel walks us through the new law passed in late 2020, The IoT Cybersecurity Improvement Act of 2020 (HR 1668), and how if will affect not just US federal government procurement, but IoT device manufacturers, and consumers as well. The Act calls for IoT devices to be secured by manufacturers based on NIST guidance and…
 
This week, Tyler Shields joins us for his first episode as Co-Host, and John Strand returns! In the Enterprise News, Two data security companies merge, Veracode's products are now available in the AWS Marketplace, Zscaler launches a program for organizations dealing with the SolarWinds attack, SolarWinds is being sued in a class action lawsuit, fun…
 
Interview by Jane Lo, Singapore Correspondent with Dr Bicky Bhangu, OBE, President, Southeast Asia, Pacific and South Korea at Rolls-Royce. Dr Bicky Bhangu is responsible for the regional strategy, external relations and governance of the operations across the company’s key businesses – Civil Aerospace, Defence and Power Systems. Dr Bhangu is Counc…
 
Today's podcast reports on record cyber attack numbers for December, stiff privacy fines in Europe levied under the GDPR in 2020 and attacks on healthcare sector continueโดย ITWC
 
In the leadership and communications section, 6 board of directors security concerns every CISO should be prepared to address, Four ways to improve the relationship between security and IT, CISO playbook: 3 steps to breaking in a new boss, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securitywe…
 
As businesses move into 2021, what insurance can they have to limit cyber risk? What does cyber insurance cover and not cover? How is it priced and secured?Data Privacy Detective guest Sean McGee is a Vice President of USI Insurance Services, an independent company serving global clientele and accessing global insurance markets. www.usi.com / Sean.…
 
Up Your game with the CISO STORIES Podcast! If anything this past year has taught us is that we can not go on our own, and leveraging the experiences from other CISOs is critical to our success. Join Todd as he introduces a new Podcast featuring actionable lessons from top-notch CISOs and Cybersecurity Leaders. Visit https://www.securityweekly.com/…
 
Join us for our latest series entitled ‘Data Movers’. Telecom PR pro, Jaymie Scotto Cutaia and top B2B social media influencer Evan Kirstel sit down with the most influential men and women of today’s leading telcos and data centers, supporting the network infrastructure requirements of our modern world. In this episode of Data Movers, we sit down w…
 
In this podcast I'll mention some of the more popular email scams people fell for in 2020, plus a sophisticated telephone banking scam involving a crook on the phone simultaneously with a victim and his bankโดย ITWC
 
Interview with Halvor Molland – Senior Vice President Communication & Public Affairs, Norsk Hydro ASA. Halvor Molland, is Senior Vice President Communication & Public Affairs, and a spokesperson for Norsk Hydro ASA, a global supplier of aluminium and aluminium solutions headquartered in Norway. An experienced journalist, he holds a Master of Scienc…
 
In this episode, guest John Prokap discusses the cyber security needs of small and mid-sized businesses, and if and when they need to hire a CISO. His discussion with hosts Malcolm and Chad covers: Why SMBs absolutely need a security program How and when to hire a vCISO, and when it's time to hire a full-time CISO How industry associations can help…
 
MySec.TV Tech & Sec Weekly - takeaway podcast: Link to the video version here Interview with Lloyd Damp, CEO, Southern Launch and James Powell, Co-founder, Dawn Aerospace. Southern Launch is developing a multi-user launch complex at the tip of the Eyre Peninsula in South Australia. It will provide complete launch infrastructure and a turn-key launc…
 
Taiwan is one of the “Four Asian Tiger” economies. Its companies hold 66% of the world’s semiconductor market. It consistently tops the USPTO per-capita list of patent files, and its population of about 25 million enjoys what is considered the world’s fastest internet connection. It is becoming a major player in data. Considered part of China by th…
 
Data privacy is about balancing individual concerns and community needs. Without assurance that private information will be responsibly shared and used, people may not share accurate information or be willing to provide data at all. But to get student aid, applications must reveal sensitive family financial information. To gauge student success, pe…
 
In the Security News, How suspected Russian hackers outed their massive cyberattack, Millions of Unpatched IoT, OT Devices Threaten Critical Infrastructure, Zodiac Killer Cipher Solved, a Security Researcher states ‘solarwinds123’ Password Left Firm Vulnerable in 2019, Why the Weakest Links Matter, and a 26-Year-Old Turns ‘Mistake’ of Being Added t…
 
SolarWinds is just the latest example of how the enterprise software supply chain, when compromised, can be used successfully by attackers. These coordinated and well-managed attacks prey on trust, so how can we trust our enterprise software? This segment is sponsored by Edgewise Networks. Visit https://securityweekly.com/edgewise to learn more abo…
 
On today's episode, Terry Cutler of Cyology Labs and I discuss two of the biggest stories of the week, and of the year: The hack of SolarWinds' Orion network management platform and the data theft by an employee of a Canadian credit union of information on nearly 10 million customersโดย ITWC
 
In this world of countless vulnerabilities, we need to find a way to identify threats. Prioritizing known vulnerabilities is a step in the right direction but definitely not enough. There is a need for a customized identifying threat process. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! …
 
Loading …

คู่มืออ้างอิงด่วน

Google login Twitter login Classic login