Cybersecurity 公開
[search 0]
もっと

Download the App!

show episodes
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Connect with Renee Small on LinkedIn https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at https://www.magnetichiring.com/book Connect with Christophe Foulon on LinkedIn https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://cpf ...
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono imprese, dalle grandi multinazionali alle piccole piccole aziende locali, enti e organizzazioni di ogni ordine e grado, e privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell'attacco, entità della struttura attaccata o danni provocati. Sophos te ne racconta 5 nella stagione 2020 della serie podcast "Sotto Attacco | i grandi crimini ...
 
Cybersecurity on the Front Lines is a new podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Sentinel IPS’ COO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
 
America’s Leading Security Coach to Small Business, the FBI, Homeland Security, Department of Defense, Department of Energy, The Whitehouse, all major DoD contractors, including Raytheon, Boeing, Lockheed, BAE, and more. Dozens of US State, County, and City governments. School Districts, Hospitals, Doctors, and Clinics. All major financial institutions in the United States, including The Federal Reserve, Fidelity, Bank of America, Visa, M/C, etc. Providing Network Security since 1991.
 
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
 
Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, social engineering scams as well as hints and tips from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware payloads. If you are worried about uneducated emp ...
 
Secrutiny’s Magnify Cybersecurity Podcast brings you insights into current and future industry trends by placing today’s most pressing cybersecurity and business technology issues under the magnifying glass. Join industry leaders and IT veterans, as they share tips and tools to help you stay ahead of evolving threats, reduce risk and defend against cyberattacks.
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003, and it quickly became one of North America’s fastest-growing technology companies. At Herjavec Group, your IT security is our topmost priority as we work diligently around the clock to protect the assets of your business including employees, data, IT infrastructure, and information. Recorded and produced by Herjavec Group, The Cybersecurity Cast discusses the latest news, trends, vulnerabilities, and exploits in cybersec ...
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Technology Policy Program and the International Security Program. Find the latest research from our scholars and CSIS events on this topic below.
 
You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up. We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the busi ...
 
Dr. Rollan Roberts is an advisor and resource to national governments on strong Artificial Intelligence and quantum-proof Cybersecurity and was nominated to Central Command's Department of Defense Civilian Task Force. He is the CEO of Courageous!, a superhuman AI and Cybersecurity research and product development think tank that serves advanced national security initiatives of national governments. He served as CEO of the Hoverboard company, creating the best-selling consumer product worldwi ...
 
Loading …
show series
 
Tom Kellermann is the head of cybersecurity strategy for VMware. Prior to this role, Kellermann was the chief cybersecurity officer for Carbon Black. Tom serves as the Wilson Center’s Global Fellow for Cybersecurity Policy and sits on the Technology Executive Council for CNBC. In this episode, Kellermann discusses: The vulnerability of U.S. energy …
 
Part 2 of our two-part series with Mariam Baksh, Cybersecurity Policy Reporter at NextGov. As a reporter on the front lines of security policy as it happens Mariam shares perspective on how cyber picked her, rhetorical catchphrases shaping global perception and cyber responses, gaining clarity on if or where cyber policy and partisan lines are draw…
 
Craig Petronella, IT Cybersecurity and Compliance Expert with DFARS, CMMC, NIST, HIPAA, founder and CEO of https://compliancearmor.com, https://petronellatech.com and https://blockchainsecurity.com discusses cryptocurrencies such as Bitcoin, BTC, and altcoins such as Ethereum, ETH, Cardano, ADA, EOS, Siacoin, SC with BJ, Blake and Erin. Learn about…
 
We are excited to have Bethany Hardin discuss her journey of breaking into the industry and becoming an awesome Threat Intelligence analysts. This series was created by Renee Small & ☁️ Christophe Foulon ☁️ to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to bre…
 
Dr. Cole, a unique mixture of technologist, entrepreneur, and motivational coach who in addition to the above has sold two companies for $400M and $2.3B With more than 30 years of network security experience, Dr. Eric Cole is a distinguished cybersecurity expert and keynote speaker who helps organizations curtail the risk of cyber threats. Dr. Cole…
 
Thanks for downloading Podcast 1111 - May 1, 2021. Uber and Lyft have both sold their self-driving car divisions. Washington DC Police are in a lot of trouble due to Ransomware. The latest trend in Cloud Computing is hazardous. How to tell if your laptop is sick and how to fix it. Costs of Ransomware have doubled in 12 months. Why I think China is …
 
In this podcast, we’ll hear from Ken Kerruish, Information Security Officer at SPH Analytics, a leading healthcare measurement and analytics platform. Ken and his team are governed by the HITRUST framework, and are layered up from the outside to the core.Ted Gruenloh による
 
Ransomware and nation-state attacks are two of the biggest security threats out there, but what do they mean for you? That's exactly what Stanley Li and Sean Mahoney from Netswitch discuss on this latest episode...Netswitch Technology Management による
 
Sheryl Root is Program Director of Carnegie Mellon University's Silicon Valley MSc in Technology Ventures program and Sandy Carter is Vice President, Public Sector Partners and Programs at AWS. As two successful women in tech, Sandy and Sheryl recognize that there's a lot of work to be done to increase the number of women in tech, but they are nowh…
 
It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss updates to the #221in2021​ challenge, recent news, and hot topics in security. James Azar, CISO Talk podcast host, Naomi Buckwalter, CISO extraordinaire, & the crew are ready, as always, for a lively discussion. About Breaking Into Cybersecurity: This series was created by Renee Small & ☁️ …
 
I'm excited to have Brian Kelley on as today's guest. He will be speaking about autonomous vehicles and new opportunities in cyber! Brian Kelley is the Chief Technology Officer for the Ohio Turnpike & Infrastructure Commission. The Ohio Turnpike is a 241-mile toll road offering one of the safest, best and most convenient routes for motorists to rea…
 
This week we kick off a two-part series with Mariam Baksh, Cybersecurity Policy Reporter at NextGov. As a reporter on the front lines of security policy as it happens Mariam shares perspective on how cyber picked her, rhetorical catchphrases shaping global perception and cyber responses, gaining clarity on if or where cyber policy and partisan line…
 
It’s #CISOThursdays​ @ 1pm! Join us and our guest CISO as we discuss updates to the #221in2021 challenge, recent news, and hot topics in security. James Azar, CISO Talk podcast host, Naomi Buckwalter, CISO extraordinaire, & the crew are ready, as always, for a lively discussion. About Breaking Into Cybersecurity: This series was created by Renee Sm…
 
Federal Career Connection's Alex Harrington is back! Join Alex, a Certified Career Services Provider (CCSP) and Global Career Development Facilitator (GCDF), as he talks about getting to know the federal and public Cyber career landscape. Whether you have a technical background or not, Alex’s goal is to help you build your own cybersecurity career …
 
Ibrahim "Abe" Baggili is an internationally recognized expert in cybersecurity and digital forensics. He is the founder and co-director of the University of New Haven’s Cyber Forensics Research and Education Group. In this episode, Dr. Baggili discusses: The cybersecurity talent gap and how to address it; What it takes to build top-notch talent and…
 
Craig Petronella, IT Cybersecurity and Compliance Expert with DFARS, CMMC, NIST, HIPAA, founder and CEO of https://compliancearmor.com, https://petronellatech.com and https://blockchainsecurity.com interviews Jason Ciment, CEO of a digital marketing agency called Get Visible https://www.getvisible.com. Jason helps you get positioned as the #1 go-to…
 
This week we discuss the importance of a focus on assuring resiliency of critical functions as the cybersecurity path ahead with Eric Goldstein, Executive Assistant Director for Cybersecurity for the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Eric also shares insights on executing CISA’s mission in to…
 
We are excited to have Martha Laughman and Lynn Dohm discuss how WiCyS has partnered with Smoothstack apprenticeship to offer a cybersecurity apprentice to women veterans. This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps …
 
It's #CISOThursdays at 1pm eastern. Join Naomi Buckwalter, CISO extraordinaire & James J Azar, CISO Talk Podcast host as we discuss our forever hot topics! Bring your questions and join the conversation. Please donate to the Wounded Warrior Project and James will continue wearing his ugly, paisley shirts!! https://tiltify.com/@cisotalk/ciso-talk-pa…
 
Although the news of the growing attack surface continues to heighten, there has not been a necessary change in how we protect and defend. This what Kindervag has set out to change. In this episode, John Kindervag, the creator of zero trust, discusses: How to practically implement zero trust; Shifting focus from worrying about the attack surface to…
 
Angelique Slagle is the head of SAP’s Human Experience Management (HXM) Line of Business in North America. With an emphasis on customer success, she is responsible for driving HXM sales and the go-to-market strategy, as well as overseeing core operations including pipeline development, demand management, and revenue growth and acceleration. Angeliq…
 
This week we catch up with Lisa Donnan, Partner at Option3 Ventures to discuss the world of cyber venture capital and private equity and the importance of disruptive technology and commercialization for breaking through the white noise of the more than 3,500 cyber start-ups today. And she shares insights on why the SMB market is a $50B opportunity …
 
Mark Testoni, CEO at SAP National Security Services (SAP NS2)shares insights about the state of cyber security in the U.S. and provides ideas on how organizations and individuals can improve their security posture.Cybersecurity Secure Talk による
 
It’s #CISOThursdays​ @ 1pm eastern! Today's hot topic is internship programs. We will discuss why we need them in security and a glimpse into how to get one started. The $221in2021 #infosechires​ challenge is still on! Join James Azar, CISO Talk podcast host, Naomi Buckwalter, CISO extraordinaire, & the crew for a lively discussion. About Breaking …
 
Increasing compliance standards can be confusing and overwhelming but they also signal a recognition of the fact that one company's vulnerability affects us all in our interconnected digital world. In this episode, Mike Ferris and Mike Brooks of Abacode, a leading Managed Cybersecurity and Compliance Provider, discuss: The convergence of cybersecur…
 
Michel is the CEO and Co-Founder of Airbyte. He has been working in data engineering for the past 15 years. As head of integrations and engineering director at Liveramp (NYSE: RAMP), he grew the team responsible for building and scaling the data ingestion and data distribution connectors, syncing 100s TB every day.In 2020, he co-founded Airbyte, th…
 
This week we sit down with Charlene Mowery, Director of Strategic Initiatives at Red Hat who shares insights and lessons learned on leadership and moving forward seemingly impossible and incredibly complex multi-stakeholder initiatives to success, such as the Ford Island Master Development Agreement. She also dives into the impact of DevSecOps in r…
 
Welcome! For all of my listeners who purchased my course on Improving Windows Security - THANK YOU! We have a whopper of a warning this week about what the Department of Homeland Security is planning under the Biden Administration -- They are going to let Big Tech and Private Companies create the NO-Fly and Terrorist Watch Lists on their behalf -- …
 
It’s #CISOThursdays​ @ 1pm eastern. We will discuss the #infosechires #221in2021 challenge and our forever hot topics. Join James Azar, CISO Talk podcast host, Naomi Buckwalter, CISO extraordinaire, & the crew for a lively discussion. About Breaking Into Cybersecurity: This series was created by Renee Small & ☁️ Christophe Foulon ☁️ to share storie…
 
Making the transition to ERP – Easier and more affordable than you think! Craig Petronella, founder and CEO of ComplianceArmor.com, Petronella Cybersecurity and Blockchainsecurity.com interviews Len Reo of The Attivo Group. They discuss the importance of ERP systems and how to get a "single pane of glass" financial solution in place for your busine…
 
Having worked for both the White House and Huawei, Pudry explains that fear of Huawei is misdirected. Bad actors simply aren't asking permission from suppliers when hacking into their products. Andy Purdy is the Chief Security Officer for Huawei Technologies USA and former member of the White House staff. In this episode Purdy discusses: Expectatio…
 
I was on WGAN this morning with Matt Gagnon. He jumped right in with a question about the problems with the internet and why are there so many outages. Will they continue? What can be done? Then we talked about the Facebook hack and release of the personal information of 533 Million users and we wrapped up with a discussion about how long it will b…
 
It’s #CISOThursdays​ @ 1pm eastern! Join James Azar, Naomi Buckwalter, and the crew as we talk about forever hot topics, updates on the #221in2021 challenge, and more! About Breaking Into Cybersecurity: This series was created by Renee Small & ☁️ Christophe Foulon ☁️ to share stories of how the most recent cybersecurity professionals are breaking i…
 
Good morning, everybody. I was on this morning on WTAG with Jim Polito. Jim had been discussing doing his Show prep and how frustrated he was that he could not find more attributions for a story he wanted to discuss. I hopped on the phone and explained to him what was happening. Then when I joined him we continued the conversation about how Google …
 
We are excited to have FCC back for another discussion on breaking into federal careers! Lora L. Allen is back to share her expertise! Today's topic is: Career Pivots in Public Service & Federal Government. Lora is a Senior Consultant at Medallia for the Public Sector helping to drive broad-scale CX solutions through strategy and governance. Her ca…
 
The next two weeks we catch up with SC Media Editor-in-Chief Jill Aitoro for a two-part discussion on the latest hot cybersecurity news drivers such as the continuing Microsoft Exchange hacker feeding frenzy and continuing discoveries from the SolarWinds supply chain attack. Both of which raise more questions than answers in how we collectively sol…
 
Welcome, Craig Peterson here. This morning I was on with Chris Ryan on NH Today. We discussed first the big data dump of 533 Million Facebook user accounts available now for free online. Then he hit out of the park with this new news from the DHS who are now going to contract BIG TECH data and private contractors to compile lists of dissidents and …
 
Welcome! We have had a very busy week this week so this is a reply of the show aired the end of February. I'll be back next week. It was also another busy week on the technology front and we are going to delve into what actually caused the energy problems in Texas. There is a new type of malware that is affecting Macs and it is has a different MO. …
 
Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bib…
 
Nell'ottobre del 2020 l’Italia, come il resto del mondo, continua a fronteggiare l’emergenza pandemica, che sta riprendendo piede: contagi e vittime aumentano giorno dopo giorno. Ma nel Paese non si parla solo di quello: in quel mese, infatti, diventa legge la riduzione del numero dei parlamentari. Alla Camera si scende da 630 a 400 deputati, al Se…
 
There's no doubt that our world has changed, but there's a sharp distinction between acquiescing to our new state as 'normal' and adapting to the threats of our new reality. In this episode, Morgan Wright, Chief Security Advisor at SentinelOne, discusses: The SolarWinds and Accellion breaches and attribution of the attacks; How to secure critical i…
 
Good morning, everybody. I was on this morning on WTAG with Jim Polito. We discussed not only that Elon Musk's Tesla Organization is now accepting Bitcoin for payment but an additional interesting twist to that. Then we talked about the Suez Canal and the problems with the Ever Given. Here we go with Jim. For more tech tips, news, and updates, visi…
 
The next two weeks we catch up with SC Media Editor-in-Chief Jill Aitoro for a two-part discussion on the latest hot cybersecurity news drivers such as the continuing Microsoft Exchange hacker feeding frenzy and continuing discoveries from the SolarWinds supply chain attack. Both of which raise more questions than answers in how we collectively sol…
 
Welcome, Craig Peterson here. This morning I was on with Chris Ryan on NH Today. I jumped right into a conversation with regards to vaccines. I might disagree a bit with Chris on this subject a little. Anyway, then we got into the Conviction of the teen Twitter hacker who hacked accounts of celebrities, Elon Musk, Joe Biden, Barack Obama, and Kanye…
 
I know that I have been telling you about this course that I have been making for you -- Guess what it is done and this week, I will be making it available. It has taken a lot of work for both my wife, Karen and me but it is well worth it to get you this information on how you can Improve your Windows security. I walk you through all the basics of …
 
Mit der neuen Version der CodeMeter Protection Suite ist es nicht mehr notwendig, den Code in eine native Anwendung umzuwandeln und dann zu verschlüsseln. Bei Python kann nun der Original-Code in direkt verschlüsselt werden.Wibu-Systems による
 
Python has become an increasingly attractive choice for software developers, also thanks to the sheer range of solid, up-to-date resources for AI and machine learning applications. However, its simplicity makes it an appealing target for would-be attackers. With the latest iteration of CodeMeter Protection Suite, you no longer need to transform you…
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login