Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Join Tenzin Wangyal Rinpoche, other CyberSangha® hosts, and invited guests for illuminating teachings, guided meditations, and science/spirituality dialogs.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Zaproszeni goście komentują ostatnie wydarzenia ze świata bezpieczeństwa teleinformatycznego.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Cybernormer er en podcast om teknologi og samfund. Den er produceret at Cybernauterne, et netværk af eksperter i cybersikkerhed, internetkultur og digital forståelse. Læs mere om os på vores hjemmeside cybernauterne.dk
…
continue reading
We Cover the Cyberspace.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Stand-Up Comic and host of ESPN's Sportscenter on Snapchat, Cy Amundson, brings comedy and sports together in hilarious hour-long podcast episodes.
…
continue reading
Το Podcast τροφή για το μυαλό σου: συμβουλές για την ζωή στο εξωτερικό, εμπειρίες, συζητήσεις για εκπαίδευση, εργασία και επιχειρείν. Προσθέστε βιβλία και κόμικ.
…
continue reading
Cyberpunk Cinema is the definitive dive into the dark future of science fiction. I will be breaking-down one film per week that best represents the thematic signatures of cyberpunk. So, do me a favor - it's time to access your cranial jacks, boot up your Ono Sendai Cyberspace 7, and slap on your damn mirrorshades! Join me as I take you through the matrix that is Cyberpunk Cinema!
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
Podcast francophone de vulgarisation des sujets de la cybersécurité, dans une ambiance décontractée. Animé par Michael VIRGONE, commercial et passionné de cyber depuis plusieurs années
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Cyber Inspiration podcast explores the minds of CTOs and CEOs, at the time they started their cyber security companies. We find out what happened in their technical or personal lives that motivated them to start the company. Cyber Inspiration will also cover social, technological and business aspects. This show is affiliated with https://www.security-architecture.org/ podcast! Patreon page https://www.patreon.com/cyber_Inspiration_2022
…
continue reading
theCUBEresearch principal Cybersecurity analyst Jon Oltsik hosts the newest SAM podcast focusing on bridging the gap between Cybersecurity and all other parts of tech
…
continue reading
Comedians and Friends Chad Daniels and Cy Amundson host a weekly podcast where they tell stories about their lives. For advertising opportunities please email [email protected] We wanna make the podcast even better, help us learn how we can: https://bit.ly/2EcYbu4 Privacy Policy: https://www.studio71.com/us/terms-and-conditions-use/#Privacy%20Policy
…
continue reading
Are you a cybersecurity professional who wants to be updated with the latest industry news, emerging threats and challenges but you've got no time to wade through white papers or the tech press? Are you a passionate person about cybersecurity who just wants to learn more on how to protect information? We've got you covered. The Cyberstar Talk's Podcast allows you to stay up to date as you’re going on with your daily grind. This channel will provide you with a bunch of exclusive and best inte ...
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
บอกเล่าเรื่องราวในโลกไอทีมาอยู่หน้าไมค์
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
Cybersicherheit auf die Ohren - mit CYBERSNACS, dem Podcast der Allianz für Cyber-Sicherheit. Regelmäßig stellen unsere Hosts Themen rund um Digitalisierung und Cyber-Sicherheit in der Wirtschaft vor. Dazu sprechen wir mit Expertinnen und Experten aus der Wirtschaft und dem IT-Bereich und geben im CYBERSNACS-Radar einen Ausblick auf aktuelle Entwicklungen. Wir nehmen uns die Zeit, Themen aus verschiedenen Blickwinkeln zu beleuchten. Dabei klären wir nicht nur die technischen Grundlagen, sond ...
…
continue reading
This week, Cy & Cody go on vacation and Chad has issues with Olivia's swimwear. Head on over to Chad's YouTube page to watch this episode! AND get ticket to go see Cy on the road in Fort Collins & Chicago! --- Follow us on Instagram! Chad Daniels (@ThatChadDaniels) is a Dad, Comedian, and pancake lover. With over 750 million streams of his 5 albums…
…
continue reading

1
Deebo, Tee Higgins, NFL Free Agency
45:09
45:09
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
45:09In this episode of The Cy Amundson Show, the NFL offseason is heating up, with trades, franchise tags, and the opening of free agency just a few days away... let's talk about it! SPORTS! ------------- The Cy Amundson Show (@cyamundsonshow) is one of the best sports comedy podcasts around with Cy Amundson (@cyamundson), Blake Wexler (@BlakeWexler), …
…
continue reading

1
SANS Stormcast Thursday Mar 13th: Exploiting Login Pages with Log4j; Patch Tuesday Fallout; Adobe Patches; Medusa Ransomware; Zoom and Font Library Updates;
5:56
Log4J Scans for VMWare Hyhbrid Cloud Extensions An attacker is scanning various login pages, including the authentication feature in the VMWare HCX REST API for Log4j vulnerabilities. The attack submits the exploit string as username, hoping to trigger the vulnerability as Log4j logs the username https://isc.sans.edu/diary/Scans%20for%20VMWare%20Hy…
…
continue reading

1
Embracing Fear, Cultivating Confidence
31:16
31:16
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
31:16Episode 14, Series 1: "Embracing Life with Wisdom & Compassion" Featuring: Tenzin Wangyal Rinpoche When you are caught in fear, you can feel small, uncertain, unsafe, ungrounded. You might be afraid of what will happen. You lack trust. You might find yourself thinking, “I will never be able to do that.” In a live online teaching, Tenzin Wangyal Rin…
…
continue reading

1
China, Clean Energy and the Future of U.S. Energy Security with Harry Krejsa
30:28
30:28
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
30:28In this episode of Cyber Focus, host Frank Cilluffo sits down with Harry Krejsa, Director of Studies at Carnegie Mellon University's Institute for Strategy and Technology. Krejsa, a former Pentagon and White House cyber strategist, discusses his latest report, Sunshield, which highlights the intersection of cybersecurity, U.S.-China competition, an…
…
continue reading
Sean Plankey nominated to head CISA Ballista Botnet hits TP-Link devices PowerSchool publishes breach report Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time chec…
…
continue reading

1
The X Attack - More Information Surfaces: Cyber Security Today for Wednesday, March 12, 2024
13:47
13:47
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
13:47Cybersecurity Today: From DDoS Attacks to Developer Sabotage In today's episode, host Jim Love discusses several major cybersecurity incidents: the pro-Palestinian group Dark Storm's claimed DDoS attack on X Twitter and its implications; the impact of budget cuts from the Department of Government Efficiency on the US Cybersecurity and Infrastructur…
…
continue reading

1
SANS Stormcast Wednesday Mar 12th: Microsoft Patch Tuesday; Apple Patch; Espressif ESP32 Statement
7:54
Microsoft Patch Tuesday Microsoft Patched six already exploited vulnerabilities today. In addition, the patches included a critical patch for Microsoft's DNS server and about 50 additional patches. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%3A%20March%202025/31756 Apple Updates iOS/macOS Apple released an update to address a single, alr…
…
continue reading

1
THEOS Cybernova – Kate Fazzini: Cyber Journalism, Crisis Comms & the Power of Storytelling
36:39
36:39
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
36:39How do journalists uncover the truth behind cybercrime? What makes or breaks a company’s crisis response? And why does storytelling matter in cybersecurity? In this episode, Kate Fazzini, cybersecurity journalist, author, and former reporter for The Wall Street Journal and CNBC, joins Paul Jackson for a deep dive into cyber journalism, crisis commu…
…
continue reading

1
Media Protection | Guide To NIST 800-171
10:21
10:21
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
10:21Welcome to episode nine of our NIST 800-171 series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/alerts/ to subscribe. ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefl…
…
continue reading

1
LockBit: The Unstoppable Ransomware? - Ep 140
23:54
23:54
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
23:54In this episode, we’re diving into the world of LockBit, one of the most notorious ransomware groups out there, and how it’s keeping law enforcement on its toes. We’ll break down their latest moves, the battle between hackers and agencies like the FBI, and what it means for cybersecurity moving forward. Here’s what we cover: The Kash Patel Incident…
…
continue reading
In this coffee break episode of Darnley’s Cyber Cafe, A massive cyberattack brought X, Elon Musk’s social media platform, to its knees. But who was behind it? Musk points to Ukraine, but could there be more to the story? In this episode of Darnley’s Cyber Cafe, we dissect the attack, the possible players involved, and the deeper implications for gl…
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. 00:00 ....coming up 00:22 intro 02:30 agenda 03:01 who are you wearing? 11:17 sponsorship - Cybersecurity Growth Consulting 12:20 nerd zone - This Week In Cyber 12:40 Disney hack 26:08 DISA Global Solutions 29:45 Orange's second breach 32:00 sponsorship - Cyber…
…
continue reading

1
When Microsoft Goes Down: Cyber Risk & Resilience
14:57
14:57
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
14:57The March 2025 Microsoft Outlook outage left thousands of organizations scrambling. But this wasn’t just an isolated event—recent outages from CrowdStrike, AT&T, and UK banks highlight the systemic risks businesses face. In this episode, we break down the latest Microsoft outage, discuss its impact on cyber insurance, and provide actionable steps t…
…
continue reading

1
Understanding Secure Business Networking with Tailscale’s VPN Solutions
22:24
22:24
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
22:24Send us a text Traditional VPNs can be complex, but Tailscale is changing the game. In this episode, Alex Kretzschmar, Head of Developer Relations at Tailscale joins Jason Pufahl, Michael Grande, and Dylan Marquis to explore how Tailscale’s modern VPN solution simplifies secure remote access, enhances Zero Trust networking, and improves business se…
…
continue reading
Four healthcare breaches expose over 560,000 records Cyber attack allegedly behind X outages Case against MGM ransomware attack dropped Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we…
…
continue reading

1
SANS Stormcast Tuesday Mar 11th: Shellcode as UUIDs; Moxe Switch Vuln Updates; Opentext Vuln; Livewire Volt Vuln;
4:59
Shellcode Encoded in UUIDs Attackers are using UUIDs to encode Shellcode. The 128 Bit (or 16 Bytes) encoded in each UUID are converted to shell code to implement a cobalt strike beacon https://isc.sans.edu/diary/Shellcode%20Encoded%20in%20UUIDs/31752 Moxa CVE-2024-12297 Expanded to PT Switches Moxa in January first releast an update to address a fr…
…
continue reading

1
CompTIA Network+ training: What to expect in a boot camp | Instructor Tommy Gober
17:41
17:41
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
17:41Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast In this episode of Cyber Work Hacks, Infosec Boot Camp Instructor Tommy Gober walks us through what his Network+ training course is like. He talks about the supportive learnin…
…
continue reading

1
AI in Cybersecurity: How Companies Can Stay Ahead of Evolving Threats
39:39
39:39
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
39:39In this episode… In this insightful conversation, Billy Spears discusses the intersection of AI and cybersecurity, emphasizing how companies need to embrace AI-driven solutions to detect and mitigate threats faster than ever. He shares how Teradata's AI Unlimited platform is helping organizations automate threat detection and analyze massive amount…
…
continue reading
ONCD set to consolidate power in U.S. cyber Undocumented commands found in Bluetooth chip used by a billion devices Japanese telecom NTT breach affects 18,000 companies Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but whe…
…
continue reading

1
New Ransomware As A Service Threats: Cyber Security Today for March 10, 2025
10:19
10:19
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
10:19This episode also covers recent ransomware as a service (RaaS) trends, including the rise of SpearWing and Akira groups, advanced ransomware techniques exploiting IoT vulnerabilities, and issues with the ESP32 microcontroller's hidden commands. Additionally, Signal President Meredith Whitaker warns about privacy risks in agentic AI systems. Tune in…
…
continue reading

1
SANS Stormcast: Webshells; Undocumented ESP32 Commands; Camera Used For Ransomware Distribution
6:45
Commonly Probed Webshell URLs Many attackers deploy web shells to gain a foothold on vulnerable web servers. These webshells can also be taken over by parasitic exploits. https://isc.sans.edu/diary/Commonly%20Probed%20Webshell%20URLs/31748 Undocumented ESP32 Commands A recent conference presentation by Tarlogic revealed several "backdoors" or undoc…
…
continue reading

1
Defensive Security Podcast Episode 299
1:07:40
1:07:40
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:07:40Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a Disney employee’s mishap with an AI tool that led to a significant hack, vulnerabilities in VMware ESX hypervisors, and a developer’s sabotage of their ex-employer. They also explore the implications of GitH…
…
continue reading

1
Hiring Fraud Exposed! Latest AI Threats to Business.
29:20
29:20
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
29:20🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now…
…
continue reading
In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis. Disc…
…
continue reading

1
Zero Trust. Social Engineering. Ron Woerner.
44:19
44:19
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
44:19Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
…
continue reading

1
Understanding Insider Threats With Eran Barak, CEO of MIND: Cyber Security Today for March 8, 2025
35:49
35:49
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
35:49Understanding Insider Threats in Cybersecurity with Eran Barak Join host Jim Love as he discusses the critical issue of insider threats in cybersecurity with Eran Barak, CEO of MIND, a data security firm. In this episode, they explore the various types of insider threats, from innocent mistakes to malicious actors, and how companies can effectively…
…
continue reading

1
Innovative Ways to Reduce Website Spoofing
59:25
59:25
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
59:25After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topics: new ways to reduce cyb…
…
continue reading

1
Week in Review: Hegseth orders stand down, ransomware by snailmail, Mark Cuban’s lifeline
25:18
25:18
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
25:18Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by David Spark with guest Brett Perry, CISO, Dot Foods Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocke…
…
continue reading

1
Episode 126: Typosquatting - How and Why It Works and How to Defend Against It
31:37
31:37
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
31:37Dive into the quirky underworld of digital misdirection in this episode, where we explore the art of typosquatting. Discover how a simple mistyped URL can turn into a gateway for cyber trickery, as we break down the many forms of typosquatting—from subtle misspellings that mimic trusted sites to more elaborate schemes designed to deceive. Learn why…
…
continue reading

1
Cybersecurity Awesomeness Podcast - Episode 100
13:34
13:34
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
13:34Chris Steffen and Ken Buckler from EMA discuss the latest news surround privacy issues in the UK regarding Apple phones.โดย Enterprise Management Associates + DEVOPSdigest
…
continue reading
Cybersecurity Today: Rising Fraud in Canada and Major Cyber Crime Crackdowns Welcome to another episode of Cybersecurity Today with your host, Jim Love. As fraud prevention month begins, we delve into the rising fraud rates in Canada, with new data from Equifax revealing Canadians' growing concerns about data protection, particularly among seniors …
…
continue reading
Ransomware gang bypasses EDR via a webcam Toronto Zoo updates January 2024 attack damage House bill requires federal contractors to implement vulnerability disclosure policies Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day…
…
continue reading

1
Unmasking Invisible Threats: Quantifying Cyber Security
1:04:12
1:04:12
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:04:12Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. David Mauro interviews Rob Black, the founder of Fractional CISO, about his journey in the cybersecurity industry and the challenges faced by medium-sized businesses. …
…
continue reading

1
SANS Stormcast Friday Mar 7th: Chrome vs Extensions; Kibana Update; PrePw0n3d Android TV Sticks; Identifying APTs (@sans_edu, Eric LeBlanc)
13:53
13:53
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
13:53Latest Google Chrome Update Encourages UBlock Origin Removal The latest update to Google Chrome not only disabled the UBlock Origin ad blocker, but also guides users to uninstall the extension instead of re-enabling it. https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html https://www.reddit.com/r/youtube/comments/1j2…
…
continue reading

1
The Top 10 Problems with Vulnerability Management
34:28
34:28
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
34:28Vulnerability management is not for the faint of heart. The pitfalls are many, and odds are you probably have at least one of these issues. Ivanti's Chris Goettl and Robert Waters run down the list of what can get in the way of vulnerability management done well -- from attack surface visibility to data overload and resource constraints -- all with…
…
continue reading

1
Episode 84 - Amir Khayat - CEO & Co-Founder of Vorlon
18:52
18:52
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
18:52Join Evgeniy Kharam on the Cyber Inspiration Podcast as he talks with Amir Khayat, the CEO and Co-Founder of Vorlon, a revolutionary cybersecurity company tackling third-party app breaches. In this episode, Amir shares his expertise in the cybersecurity space and discusses how Vorlon's proactive approach is changing the way companies address the gr…
…
continue reading

1
From Noise to Knowledge: Mastering Threat Intelligence Delivery with Rebecca Taylor and Ellen Hallam
21:26
21:26
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
21:26Welcome to Clearly Cyber, a podcast hosted by PRPR where we speak to a number of cyber security leaders and comms experts about how to communicate effectively in the cyber security industry. In this episode, we speak to threat intelligence experts, Rebecca Taylor from Secureworks, a Sophos Company, and Ellen Hallam from Bytes. (This episode was rec…
…
continue reading

1
Managers talk cyber S1-E1: Kfir Azoulay CEO & Co-Founder @Solveo on Business Email Compromise (BEC)
51:48
51:48
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
51:48הפרק הראשון של הפודקאסט "מנהלים מדברים סייבר" "הונאות מנהלים" היא התקפה של הנדסה חברתית דרך דואר אלקטרוני. כאשר התוקף מזייף הודעת דואר אלקטרוני כדי להערים על הקורבן לבצע פעולה כלשהי, לרוב, העברת כסף לחשבון או למיקום שבשליטת התוקף עו"ד הדס בן אברהם ונחשון פינקו מארחים את כפיר אזולאי חוקר הונאות סייבר, מנכ"ל ומייסד משותף בסולביאו בנושא הונאות מנהלים …
…
continue reading

1
teissTalk: Live at teissLondon2025 - Enhancing AppSec with Application Security Posture Management
58:48
58:48
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
58:48Fortifying security defences with automated root cause analysis and prioritisation Managing security risk urgency across your application pipeline with real-time visibility and data visualisation capabilities Driving efficiency and prioritisation across your security ecosystem with practical remediation actions This episode is hosted by Thom Langfo…
…
continue reading
Former top NSA cyber official protests probationary firings Differing names for hackers hinders law enforcement, says security agent Google releases AI scam detection for Android to fight conversational fraud Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to…
…
continue reading
US Cybersecurity Confusion, Massive ISP Cyber Attack, and Talent Shortages In this episode of 'Cybersecurity Today,' host Jim Love discusses the mounting confusion over the US cybersecurity stance on Russia, following conflicting reports about potential policy changes and operational directives. The show also covers a massive cyber attack that comp…
…
continue reading

1
SANS Stormcast Thursday Mar 6th: DShield ELK Analysis; Jailbreaking AMD CPUs; VIM Vulnerability; Snail Mail Ransomware
6:45
DShield Traffic Analysis using ELK The "DShield SIEM" includes an ELK dashboard as part of the Honeypot. Learn how to find traffic of interest with this tool. https://isc.sans.edu/diary/DShield%20Traffic%20Analysis%20using%20ELK/31742 Zen and the Art of Microcode Hacking Google released details, including a proof of concept exploit, showing how to …
…
continue reading

1
Choosing Wisdom: Discovering Joy in Difficult Truths
1:00:09
1:00:09
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:00:09Episode 13, Series 1: "Embracing Life with Wisdom & Compassion" Featuring: Emily McRae, Ph.D.; Margaret Plews-Ogan, M.D.; Geshe Tenzin Wangyal; and Alejandro Chaoul-Reich, Ph.D. “Truth is always joyful, though the journey to the truth may be painful,” writes Tenzin Wangyal Rinpoche. Why do some people thrive when facing adversity while others strug…
…
continue reading

1
Is Ransomware Dead? What Cyber Criminals Are Saying.
34:03
34:03
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
34:03Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tactics insight from the mouths of top cyber crime gang leaders. We bring you Inside the Corpo…
…
continue reading

1
Cyber Defense Radio - Sachin Jain - Eventus Security - Hotseat - Podcast - 2025
16:00
16:00
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
16:00Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Sachin Jain, Senior Vice President of Eventus Security, https://eventussecurity.com/, delivering award winning SOC as a Service and offers comprehensive cybersecurity solutions, including managed SOC, enterprise integration, cyber resilience, and incident …
…
continue reading

1
Encryption Under Siege? Governments, Cybersecurity, & Quantum - Ep 139
15:36
15:36
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
15:36In this episode of Reimagining Cyber we tackle two seismic shifts in digital security: the fight over encryption and the rise in quantum computing. First up, the UK's aggressive push against encryption. With legislation like the Investigatory Powers Act and the Online Safety Bill, the UK government is pressuring tech giants to create backdoors for …
…
continue reading