Cybersecurity 公開
[search 0]
もっと

Download the App!

show episodes
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Alias Secure AF Cybersecurity Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cybersecurity topics with coworkers and special guests. No matter where you are on the cybersecurity knowledge ladder, there's an episode here for you.
 
The Secure Talk Cybersecurity podcast reviews the latest threats, tips, and trends related to cybersecurity, cryptocurrencies, and compliance. Host Mark Shriner interviews leading cybersecurity and cryptocurrency executives to discuss best practices related to IT security, data protection, cryptocurrency investment and usage.
 
C
Cybersecurity Sense

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
月ごとの
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
 
Interviews with founders, startup-advising CISOs, venture capitalists, and analysts discussing the issues of cybersecurity, new threats, and emerging technology. The Genealogy of Innovation brings listeners into forward-thinking conversations with industry visionaries, to explore big ideas, and discuss out-innovating the competition.
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
 
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
 
Cybersecurity affects us all whether we are at home, managing a company, supporting clients, or even running a state or local government. Join the Center for Internet Security’s Sean Atkinson and Tony Sager as they discuss trends and threats, ways to implement controls and infrastructure, explore best practices, and interview experts in the industry. If you are interested in learning more about how to grow your cybersecurity program, CIS and its volunteer community are here to bring clarity ...
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono imprese, dalle grandi multinazionali alle piccole piccole aziende locali, enti e organizzazioni di ogni ordine e grado, e privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell'attacco, entità della struttura attaccata o danni provocati. Sophos te ne racconta 5 nella stagione 2020 della serie podcast "Sotto Attacco | i grandi crimini ...
 
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
 
Security and cybersecurity are critical concerns for any modern business, and startups are no exception. In order to compete in the digital age, startups need to be aware of the latest security threats and have a plan to protect their data and systems. The Startuprad.io security and cybersecurity track is designed to help companies stay ahead of the curve. We interview entrepreneurs who are active in the space and bring you the latest news from the world of cyber security. Our goal is to hel ...
 
Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies and businesses like yours.
 
Pour a glass and sit down with one of cybersecurity's most battle-worn CISOs Andy Bennett as he and his guests break down the complex problems, concepts, and technologies facing cybersecurity professionals today while exploring the complex flavors of our favorite distilled spirits. It's a free-flowing long-form conversation. Grab a seat and listen to security professionals break down cyber threats and actionable ways to be more resilient and prepared in the face of the world's biggest issues ...
 
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
 
When it comes to cybersecurity, reacting to a threat isn’t always enough; you have to get ahead and stay ahead of the escalating risks. Join Sid Yenamandra, co-founder & CEO of Entreda, the leading provider of comprehensive cybersecurity software tools for wealth managers and other regulated industries, as he interviews business professionals about what’s keeping them up at night, and how they’re successfully mitigating the looming vulnerabilities that may exist within their firms.
 
Loading …
show series
 
Ganesh Krishnan is the Co-Founder and CEO of Anzenna. Prior to founding Anzenna, Ganesh had worked in a number of top-level security and engineering roles for organizations including Yahoo!, LinkedIn, and Atlassian. He also launched Avid Secure in 2017 which was acquired just 18 months later. In this episode, Ganesh talks about why most cybersecuri…
 
On this first episode of The Breach Report, Ephraim Ebstein, CEO, and Damien Anderson, vCISO, of FIT Solutions discuss what's happening in the cybersecurity industry, what's NOT in the news, and how to protect your business from emerging cyber threats. To chat with one of our cybersecurity team about how to better protect your organization, click h…
 
About Emilio Salabarria: Emilio Salabarria is a highly accomplished expert in emergency management and cybersecurity. He's been serving as the Deputy Senior Executive Advisor at Cyber Florida since July 2022. Emilio brings a wealth of knowledge and expertise to the table when it comes to cybersecurity education, research, training and development, …
 
How a vCISO can help your organization? The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization. ========== How can a vCIS…
 
Hey, It's 5:05 on Wednesday, March 22nd, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from Ian Garrett in Arlington, Virginia, Edwin Kwan in Sydney, Australia, Katy Craig in San Diego, California and Marcel Brown in St. Louis, Missouri. Let's get to it. Revving Up for Troub…
 
This episode was recorded on 3/22/2023 Welcome to the Take Five Podcast from Fortinet where we provide five cybersecurity tips and best practices for today’s technology leaders. This podcast series taps into the experience of our Fortinet Field CISO team and the work being done with and through our ecosystem of partners, customers, and industry exp…
 
In episode one our host Jeremy Ventura will be joined by Edwin Moreno, CISSP Field CTO from Mimecast and Karsten Chearis, Manager of Solutions Engineering at Rapid7. They'll be talking about Breaking Barriers Down: The Importance of Diversity & Inclusion in Cybersecurity and cover the following topics: 🤔 Learn why diversity in cyber is demanded for…
 
Cyberattacks against Canada’s agriculture industry. HItachi ransomware incident. African industrial sector targeted with malware. TSA issues new cybersecurity requirements for the aviation industry. CISA issues a guide for resilience in the maritime industry. Ransomware Vulnerability Warning Pilot supports critical infrastructure operators. Guest i…
 
In this episode, we sit down with Matt Bromiley to talk about some of the latest intel coming out of the LimaCharlie community Slack channel: CVE-2023-23397: A zero-touch exploit and affects all versions of Windows Outlook. CVE-2023-24880: An unpatched security bypass in Microsoft’s SmartScreen. security feature Mandiant observes China-nexus threat…
 
Si chiama Il Verde e il Blu ed è una miniserie dedicata alla sostenibilità e all’innovazione andata in onda su Sky TG24. Vi proponiamo la puntata Blu in cui abbiamo parlato di cybersecurity e intelligenza artificiale. Con Claudio De Paoli, responsabile Centro di Eccellenza CyberSec BIP; Alessandro Manfredini, Group Security & Cyber Defence di A2A e…
 
Are you familiar with Business Email Compromise (BEC) and the threat that it poses to the Yale community? BEC is a form of social engineering designed to trick victims into thinking they have received a legitimate email from an organization or institution. A simple example is receiving an email that looks like it's coming from your boss, asking you…
 
We are excited to welcome back to the podcast Maria Roat, founder of MA Roat Consulting and former U.S. Deputy Federal Chief Information Officer. For our discussion we double click into the cyber workforce gap and how to attract diverse skillsets to the industry, introducing STEM earlier in education, understanding how to nurture non-traditional le…
 
ChatGPT is making headlines worldwide and its impact is making a lot of business owners uncomfortable. What is ChatGPT? How will this tool change how you do business? Is ChatGPT a security risk? What to expect from ChatGPT4? William Parks interviews LBMC's Data Insights team members to discuss this controversial topic, dive into facts your organiza…
 
Ashland CISO Bob Schuetter on brainstorming secure enterprise browsers in their startup's incubation period. Bob discusses building the cloud’s secure edge, and how new web browsers like Island’s (@island_io) will disrupt Data Loss Prevention (DLP), and the Virtual Desktop Infrastructure (VDI) industries. Bob and Paul explore exactly why DLP failed…
 
Web Applications, like most everything in cyberspace can be prone to vulnerabilities. If (or when) those vulnerabilities within the applications get exposed that you use on a daily basis to a hacker or cybercriminal, it could be very bad news and dangerous to you and your organization. This week, the guys talk about how they handle Web Application …
 
Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker to gain access to the systems and data of many organisations. To mitigate the risks of supply chain attacks, organisations should perform due diligence…
 
Musicals, emerging AI, and understanding the risk within your third-party ecosystem. Our guest this week is Eric Cowperthwaite, COO at Threathunter.ai by Milton Security.Jeffrey Wheatman による
 
CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint advisory to share known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023. AA23-075A Alert, Technical Details, and Mitigations Stopransomware.gov is a whole-of-government approach that gives one central …
 
https://www.yourcyberpath.com/92/ In this short episode, our hosts Jason Dion and Kip Boyle discuss the critically important topic of password managers. In the beginning, Jason quickly describes password managers, their use cases and how they work, highlighting both the security and convenience aspects of using a password manager. Then, Kip goes ov…
 
How do you building a Security Operations Center from the ground up? On this episode of Secure AF, Gharrett Workun and Wade VanDeburgh met with us to discuss how they lead the development of a SOC, as well as strategized creative ways to keep their team engaged. Watch the full video at youtube.com/@aliasinfosec. Catch the whole episode now at secur…
 
Substack (FREE 90 Day Cybersecurity Roadmap here) - https://bowtiedcyber.substack.com Website - https://bowtiedcyber.com Twitter - https://twitter.com/bowtiedcyber Instagram - https://instagram.com/bowtiedcyber YouTube - https://www.youtube.com/channel/UCBjH0xZLiqXofqoLuFMTPLg Discord - https://bowtiedcyber.substack.com/p/discord-server-is-now-live…
 
In episode 51 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss the strategic importance of using a roadmap to navigate your cybersecurity journey. Together, they point out that this journey is like many others. You need to know how to get packing, plan your route, hit the road, and take a snapshot of how far you've come…
 
Episode #6 - White House National Cybersecurity Strategy Top News Stories Death By Slides - White House National Cybersecurity Strategy What’chu Listening To - Talk about music That’s a Wrap Cybersecuritygrowth.com and cybersecuritygrowth.com/blog @shawnvalle or @cybersecuritygrowth This week we covered White House National Cybersecurity Strategy W…
 
In this episode, host Bidemi Ologunde discussed a new tool that helps young people remove explicit online images from the internet; the role of TikTok in enabling certain kinds of online vices; and the rising trend of an extortion scam that specifically targets teenage boys. Timestamps Part 1: "They create fake female accounts to target boys betwee…
 
Kevin Flint's mission is to help B2B agencies, clients and solutions providers identify, form and grow prosperous relationships. As a B2B Agency Executive and Digital Media expert, he's spent the past two decades working with many of the most innovative B2B brands and marketers to evolve their marketing strategy and deliver superior ROI.…
 
Loading …

クイックリファレンスガイド