Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
Just two people trying to do IT and Security the right way.
S
Symantec Cyber Security Brief Podcast


1
Symantec Cyber Security Brief Podcast
Security Response Team
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
D
DARKWEB.TODAY - Hackers & Cyber SECURITY


1
DARKWEB.TODAY - Hackers & Cyber SECURITY
Alberto Daniel Hill
“In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened." I am Alberto and this podcast is about my story, cybersecurity and hackers. https://podcast.darkweb.today/ https://twitter.com/ADanielHill https://twitter.com/Darkwebtoday https://darkweb.today http ...
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec


1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
Cyber Security & Insurance Leaders is a bi-weekly podcast dedicated to helping Cyber Security and Insurance professionals hear about the latest developments, best practices and thought leadership from leaders in the market. If you’re looking to hear and learn from cyber insurance and security experts, this show is for you. Each episode features an interview with an executive or thought leader, discussing topics like: the cyber insurance industry as a whole, international growth, cyber claims ...
Cyber Security is no longer a topic that is addressed only by programmers and coders. CISOs and their executive peers need to think about “cyber security” differently. In this podcast, Tom Garrison, Vice President and GM of Client Security Strategy and Initiatives, and co-host Camille Morhardt, Director of Security Initiatives & Communications, will discuss relevant topics in clear, easy to understand language. This podcast is intended for security experts and businesspeople alike. We will h ...
C
Control System Cyber Security Association International: CS2AI

(CS)²AI is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 23,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education and directly support cyber security professional development in every way. Founder, Derek Harp interviews the Cybersecurity leaders and brings relevant insights to help any company ...
S
Sales Bluebird for cyber security sales teams & sales leaders


1
Sales Bluebird for cyber security sales teams & sales leaders
Andrew Monaghan
For salespeople and sales leaders at cybersecurity startups and companies about how to get better at your craft as a B2B cyber security seller and VP Sales / CRO. Includes SaaS sales and software sales. Actionable. Impactful. Sales tips. Sales ideas. Sales for startups. Cyber security sales.
S
SecurityLah - the Asian Cyber Security Show


1
SecurityLah - the Asian Cyber Security Show
SecurityLah
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
C
Cyber Security Effectiveness Podcast


1
Cyber Security Effectiveness Podcast
Mandiant Security Validation
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cyber Security Effectiveness Podcast.
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cyber security tips, tools, and more in the Alias Secure AF Cyber Security Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cyber security topics with coworkers and special guests. No matter where you are on the cyber security knowledge ladder, there's an episode here for you.
Bop
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
C
Cyber Security, Cyber Hygiene and IoT


1
Cyber Security, Cyber Hygiene and IoT
Cyber Podcast by Netonomy
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
Iam Talking about the Information Security & Hacking in upcoming episodes. Im a Cyber Security Trainer https://instagram.com/chaudharypawansohlot
N
National Cyber Security Radio By Gregory Evans


1
National Cyber Security Radio By Gregory Evans
National Cyber Security
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
This is a podcast about my journey into information security it will be full of things that I've learned over the years and also things that I have researched and find interesting and want to present to you the audience.
C
Cyber Security Course Arabic - الأمن الإلكتروني

1
Cyber Security Course Arabic - الأمن الإلكتروني
Cyber Security Course Arabic
Cyber Security Course Arabic كيف ابدأ في مجال أمن المعلومات الأمن الإلكتروني كيفية شراء البيتكوين في المملكة العربية السعودية ببطاقة الائتمان أسرع طريقة في ثواني تذكر الاشتراك عبر هذا الرابط ، كي تحصل على خصم 10٪ من جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 جزاكم الله خيرا
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
Onkar Gandhe is a well-known figure in the field of cyber security. Onkar Gandhe is the founder of three IT startups. With the establishment of Cyber Sakshar in Nashik, Maharashtra, Onkar Gandhe is paving the way for youngsters to fulfil their goals in the field of Cyber Security.
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
C
Cyber security risks and solutions


1
Cyber security risks and solutions
Cyber security risks and solut
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
D
DailyCyber The Truth About Cyber Security with Brandon Krieger


1
DailyCyber The Truth About Cyber Security with Brandon Krieger
Brandon Krieger
The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode.
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
A
Arisen Technologies – Best IT Company - Cyber Security


1
Arisen Technologies – Best IT Company - Cyber Security
Arisen Technologies
Arisen Technologies is the Best IT Company, which provides all IT services like Cyber Security, Web Designing, Development, etc. It’s founded in 2006.
Welcome to the Do we need better Cyber Security policies In Asian Countries - By Mario96 podcast, where amazing things happen.
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
A cybersecurity podcast helping you play defence in the digital universe. On this show we’ll be discussing everything from industry best practices to how to get the most out of your budget. We’ll be sitting down with industry experts, analysts and even CISOs from some of Australia’s largest organisations so you can learn how they’re playing defence in 2019.
Join Matt Chapman, a Cybersecurity Expert, and intellectual phenom, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
C
Cyber Security Interviews


1
Cyber Security Interviews
Douglas A. Brush | Weekly Interviews w/ InfoSec Pros
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
C
Cisco Security Intelligence Operations: Cyber Risk Report Podcast


Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
S
Swansea Cyber Law and Security Podcast


1
Swansea Cyber Law and Security Podcast
Cyber law and security news with Sara Correia and Patrick Bishop.
Welcome to the Swansea Cyber Law & Security Podcast. Sara Correia and Patrick Bishop bring you some news and discussion on the cyber law and security happenings of the last month. The views expressed on this podcast are personal and do not represent those of our employers or partner organisations. - Sara Correia is an ESRC doctoral researcher at the Hillary Rodham Clinton School of Law - formerly the College of Law and Criminology, Swansea University (@SGCorreia). - Dr. Patrick Bishop is a ...
S
Symantec Cyber Security Brief Podcast


1
Chinese cyber-espionage activity, Conti gang threatens Costa Rica government, and U.S. warns about North Korean citizens seeking jobs in IT
25:45
25:45
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
25:45
In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman discuss the recent in-depth whitepaper the Symantec Threat Hunter team produced about Chinese cyber-espionage activity, which details the most active groups operating out of that country at the moment, as well as the tactics, tools, and procedures they leverage, the custom malwar…
VMware bugs abused to deliver Mirai malware Microsoft to debut of zero trust GDAP tool Bank of Zambia refuses to pay ransom to cyberattack group Hive And now let’s thank today’s sponsor, Torq Myth 4: Automation Will Replace Skilled Security Professionals Not true. Any business that attempts to automate security will quickly find that most high-stak…
random twitter space --- Send in a voice message: https://anchor.fm/darkwebtoday/message
VMWare Flaws https://core.vmware.com/vmsa-2022-0014-questions-answers-faq https://blog.barracuda.com/2022/05/17/threat-spotlight-attempts-to-exploit-new-vmware-vulnerabilities/ Tesla BLE Proximity Authentication Vulnerable to Relay Attacks https://research.nccgroup.com/2022/05/15/technical-advisory-ble-proximity-authentication-vulnerable-to-relay-a…
Use Your Browser Internal Password Vault... or Not? https://isc.sans.edu/forums/diary/Use+Your+Browser+Internal+Password+Vault+or+Not/28658/ SQL Server Brute Forcing https://twitter.com/MsftSecIntel/status/1526680337216114693 UpdateAgent Adapts Again https://www.jamf.com/blog/updateagent-adapts-again/ Updated Exploited Vulnerabilities https://www.c…
S
Sales Bluebird for cyber security sales teams & sales leaders


1
127: 2 questions to ask the CEO/founder before joining a cyber security startup
11:31
11:31
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
11:31
At a startup, the founder usually has a big impact on everything to do with the company. With that being said, it’s not uncommon to have the founder come in and critique the work being done in every department. They are a part of the culture, character, messaging, vision and so much more that will directly affect the success of the company. So, wha…
C
Control System Cyber Security Association International: CS2AI

1
37: Engineers Should Consider a Cyber Security Career with Vivek Ponnada
39:22
39:22
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
39:22
Derek Harp is excited to have Vivek Ponnada, the Regional Sales Director for Nozomi Networks, joining him for another episode in the series on security leaders! Vivek was also a long-time contributor at GE. Vivek Ponnada has over 23 years of experience in Industrial Control Systems. He currently serves customers in Western Canada for Nozomi Network…
t
teissPodcast - Cracking Cyber Security


1
teissTalk: Testing your EQ - using emotional intelligence to retain talent and reduce cyber risk
47:35
47:35
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
47:35
Building, leading and retaining emotionally intelligent infosec teams How good EQ can help CISOs understand, communicate and address risk across the organisation Where can automation tools support analyst retention and EQ development?TEISS による
C
Cyber Security Inside


1
96. The Cybersecurity of IoT: Protecting Our Systems
27:53
27:53
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
27:53
In this episode of Cyber Security Inside, Camille and Tom get to chat with Malcolm Harkins, Chief Security & Trust Officer at Epiphany Systems, and Rob Bathurst, Co-Founder & Chief Technology Officer at Epiphany Systems about the Internet of Things and thinking like attackers to protect systems. The conversation covers: - How the systems in a build…
C
Cyber Security TLDR


1
Cyber Security News // Weekly Recap (05/08/22 to 05/14/22)
36:59
36:59
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
36:59
SHOW NOTES:Jon Good による
There could be a new job in my future. Before that happens, we need to organize our IT. We’re looking at patching, Microsoft Defender for Business, and data recovery. FIND US ON 1. Twitter - DamienHull 2. YouTubeSECTION 9 による
C
Cyber Security & Insurance Leaders


1
Ep 1 - Navigating the Tight-Knit Cyber Insurance Industry and Handling Cyber Claims – with Scott Godes
34:07
34:07
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
34:07
In our first episode of Cyber Security & Insurance Leaders, our host Anthony, CEO at Asceris, catches up with Scott Godes, Partner and Co-Chair at Barnes & Thornburg LLP. What's in it for you 1. How to navigate the liability-void between general insurance and professional liability insurance 2. The best metrics to measure success for and with your …
C
Cyber Security Weekly Podcast


1
Episode 322 - Russian Information Warfare and Cyber Threats – perspectives from a Native Georgian speaker and cybersecurity expert
Dr. Khatuna Mshvidobadze is a Professorial Lecturer of Cybersecurity at the George Washington University and Adjunct Professor of Cyber Security at Champlain College. She is also a Senior Fellow at the Rondeli Foundation in Tbilisi, Georgia. Earlier, she developed and taught cyber security courses for M.S. and M.P.S. programs at Utica College. She …
Team SecurityLAH continues the discussion on the appointment of CISO for organizations due to regulatory and environmental requirements, and at the same time tearing apart the formation of IT Security in organizations.SecurityLah による
random twitter space! --- Send in a voice message: https://anchor.fm/darkwebtoday/message
Buffalo massacre suspect signaled plans on Discord for months Google faces litigation for unauthorised use of medical records Venezuelan doctor accused of developing and distributing ransomware And now let’s thank today’s sponsor, Torq Myth 3: Only Enterprises Need Security Automation Debunked. While enterprises with thousands of endpoints and spra…
Costa Rican ransomware rhetoric somehow gets uglier DOJ files its first criminal cryptocurrency sanctions case Trying to fix open source supply chain security And now let’s thank today’s sponsor, Torq Myth 2: Security Automation Is Just a New Term for Automated Security Testing Wrong. While scanning and testing may be one example of a security auto…
Apple Patches Everything https://isc.sans.edu/forums/diary/Apple+Patches+Everything/28654/ Evil Never Sleeps: When Wireless Malware Stays on After Turning Off iPhones https://arxiv.org/pdf/2205.06114.pdf Third-Party Web Trackers Log What You Type Before Submitting https://homes.esat.kuleuven.be/~asenol/leaky-forms/…
Ukraine CERT-UA warns of new attacks launched by Russia-linked Armageddon APT Microsoft fixes new PetitPotam Windows NTLM relay attack vector Hackers are exploiting critical bug in Zyxel firewalls and VPNs And now let’s thank today’s sponsor, Torq Myth 1: Automation Is Only a Reactive Part of SecOps Incorrect. Proactive management of security incid…
From 0-Day to Mirai: 7 days of BIG-IP Exploits https://isc.sans.edu/forums/diary/From+0Day+to+Mirai+7+days+of+BIGIP+Exploits/28644/ Sonicwall Vulnerabilities Patched https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0009 Zonealarm Patch https://www.zonealarm.com/software/extreme-security/release-history Taking over npm account https://theh…
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, May 9-13, is hosted by Rich Stroffolino with our guest, Rich Lindberg, CISO, JAMS Thanks to our sponsor, Datadog Break down silos between DevOps and Security teams to enable collaboration and strengthen the security of your environment. In this on-demand webinar, hear from one…
Google will use mobile devices to thwart phishing attacks CISA urges organizations to patch actively exploited F5 BIG-IP vulnerability Kick China off social media, says tech governance expert Thanks to our episode sponsor, Datadog Break down silos between DevOps and Security teams to enable collaboration and strengthen the security of your environm…
When Get-WebRequest Fails You https://isc.sans.edu/forums/diary/When+GetWebRequest+Fails+You/28640/ HP PC BIOS Security Updates https://support.hp.com/us-en/document/ish_6184733-6184761-16/hpsbhf03788 INTEL BIOS Advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html Zyxel RCE Vulnerability https://www.rapid7.c…
S
Sales Bluebird for cyber security sales teams & sales leaders


1
126: Pipeline generation tips #6 with Theo Nasser, CEO and Co-Founder of Right-Hand Cybersecurity
5:30
5:30
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
5:30
The ongoing Pipeline Generation series has sales landscape leaders and experts pop by and share their pearls of wisdom on building and growing a sales pipeline. In this episode, Theo Nasser, CEO and Co-Founder of Right-Hand Cybersecurity, draws on his years of experience in creating and scaling businesses to tackle pipeline generation. He dives hea…
t
teissPodcast - Cracking Cyber Security


1
teissTalk: Risk-based versus compliance-based security programmes
46:03
46:03
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
46:03
"How did we get breached? We ticked all the boxes!": the limitations of compliance-base security Identifying what security controls to apply and when they should be applied to reduce risk Transitioning to risk-based security, and levelling up your security awareness programme
Old botnets are new again Meta withdraws Oversight Board guidance request EU proposes new CSAM rules Thanks to our episode sponsor, Datadog In this on-demand webinar, you’ll learn how to best utilize the suite of Datadog Cloud Security products to identify the root cause of an attack and how a unified platform provides real-time threat-detection an…
TA578 Using Thread-Hijacked Emails to Push ISO Files for Bumblebee Malware https://isc.sans.edu/forums/diary/TA578+using+threadhijacked+emails+to+push+ISO+files+for+Bumblebee+malware/28636/ Google Drive Emerges as Top App for Malware Downloads https://www.helpnetsecurity.com/2022/05/11/malicious-pdf-search-engines/ Vanity URL Abuse https://www.varo…
C
Cyber Security Inside


1
95. Live from The Green Room: Project Amber – Intel’s Next Innovation in Confidential Computing
18:53
18:53
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
18:53
In this episode of Cyber Security Inside Live from The Green Room, Camille talks with Raghu Yeluri, Intel Senior Principal Engineer and Lead Security Architect from Intel’s Vision Conference in Texas. The conversation covers: - A high-level definition of Project Amber and overview of what confidential computing is. - At the core, confidential compu…
Russian TV hacked on Victory Day US pledges to help Ukraine keep internet and lights running Pentagon’s concerns China may prompt vetting startups Thanks to our episode sponsor, Datadog In this on-demand webinar, you’ll learn how to best utilize the suite of Datadog Cloud Security products to identify the root cause of an attack and how a unified p…
Microsoft May 2022 Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+May+2022+Patch+Tuesday/28632/ Adobe Updates https://helpx.adobe.com/security/security-bulletin.html npm "foreach" package domain takeover https://www.theregister.com/2022/05/10/security_npm_email/Dr. Johannes B. Ullrich による
S
Sales Bluebird for cyber security sales teams & sales leaders


1
125: The power of asking short questions like Barbara Walters
14:32
14:32
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
14:32
Like in big news interviews, mastering the perfect question in sales can make all the difference. In this episode, Andrew dives into two interviews by Barbara Walters to glean what we can learn about question length. Barbara Walters is known for handling the big, tough interviews well and for getting to the core of her interviewees so much so that …
C
Control System Cyber Security Association International: CS2AI

1
36: The S4 Conference: Why You Should Attend Every Year
8:41
8:41
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
8:41
The S4 Conference is one of the pinnacle events of the year for anyone interested in hearing deep subject matter experts speak. It is definitely worth attending if you are not formally part of the (CS)²AI community. Today, Derek Harp shares a short podcast he created after attending the 22nd S4 Conference, held from the 19th to the 21st of April th…
Ransomware state of emergency in Costa Rica Microsoft launches service to fill the cyber skills gap College closes permanently due to ransomware Thanks to our episode sponsor, Datadog Break down silos between DevOps and Security teams to enable collaboration and strengthen the security of your environment. In this on-demand webinar, hear from one o…
Octopus Backdoor is Back with a New Embedded Obfuscated Bat File https://isc.sans.edu/forums/diary/Octopus+Backdoor+is+Back+with+a+New+Embedded+Obfuscated+Bat+File/28628/#comments CVE-2022-1388 (BIG-IP) Exploits https://twitter.com/sans_isc/status/1523741896707043328 https://github.com/horizon3ai/CVE-2022-1388 Trend Micro False Positive Aftermath h…
t
teissPodcast - Cracking Cyber Security


1
Digital forensics and incident response in the cloud
45:28
45:28
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
45:28
Preparation - choosing which events and resources should be logged in your cloud environment Applying a Zero Trust model when configuring your network - managing devices, permissions and applications Misconfigurations, vulnerabilities and patch management - best practice in reducing the opportunities for error…
Google Play now blocks paid app downloads, updates in Russia NIST releases updated guidance for defending against supply-chain attacks US State Department offering $10 million reward for information about Conti members Thanks to our episode sponsor, Datadog In this on-demand webinar, you’ll learn how to best utilize the suite of Datadog Cloud Secur…
F5 BIG-IP Unauthenticated RCE Vulnerability (CVE-2022-1388) https://isc.sans.edu/forums/diary/F5+BIGIP+Unauthenticated+RCE+Vulnerability+CVE20221388/28624/ QNAP QVR Update https://www.qnap.com/de-de/security-advisory/qsa-22-07 Raspberry Robin Worm https://redcanary.com/blog/raspberry-robin/ rubygems CVE-2022-29176 explained https://greg.molnar.io/b…
C
Cyber Security Inside


1
94. What That Means with Camille: Quantum Encryption in Outer Space
23:48
23:48
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
23:48
In this episode of Cyber Security Inside What That Means, Camille dives into next generation cryptography and quantum computing with Eddy Zervigon, CEO of Quantum Xchange and Independent Board Member. The conversation covers: - The new era of cryptography due to the advancement of quantum computing. - How two-factor authentication and the idea behi…
C
Cyber Security TLDR


1
Cyber Security News // Weekly Recap (05/01/22 to 05/07/22)
27:27
27:27
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
27:27
SHOW NOTES: https://www.jongood.com/cyber-security-news-weekly-recap-05-01-22-to-05-07-22/Jon Good による
random spaces night --- Send in a voice message: https://anchor.fm/darkwebtoday/message
C
Cyber Security Inside


1
92. Diversity and Careers in Cybersecurity: It Starts with Kids
27:24
27:24
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
27:24
In this episode of Cyber Security Inside, Camille and Tom chat with Abhilasha Bhargav-Spantzel, Partner Security Architect, about introducing cybersecurity to kids as well as making it more accessible to all. The conversation covers: - Different ways to get kids interested in cybersecurity from an early age, including competitions and education o…