Cybersecurity 公開
[search 0]
もっと

Download the App!

show episodes
 
B
Breaking Into Cybersecurity

1
Breaking Into Cybersecurity

Renee Small/Christophe Foulon

Unsubscribe
Unsubscribe
ウィークリー+
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Connect with Renee Small on LinkedIn https://www.linkedin.com/in/reneebrownsmall/ Connect with Christophe Foulon on LinkedIn https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://cpf-coaching.com Develop Your Cybersecurity Career Path: How to Break into ...
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
C
Cybersecurity Sense

1
Cybersecurity Sense

LBMC Information Security

Unsubscribe
Unsubscribe
月ごとの
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
 
Ogni giorno, in ogni paese del mondo, avvengono nuovi attacchi informatici. Le vittime sono imprese, dalle grandi multinazionali alle piccole piccole aziende locali, enti e organizzazioni di ogni ordine e grado, e privati cittadini di ogni nazione ed età. Alcuni di questi attacchi hanno fatto la storia del cybercrime, per portata dell'attacco, entità della struttura attaccata o danni provocati. Sophos te ne racconta 5 nella stagione 2020 della serie podcast "Sotto Attacco | i grandi crimini ...
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://anchor.fm/amplifiedandintensified/support
 
America’s Leading Fractional Chief Information Security Officer. My team and I usually start with a scan of all devices on your network to determine what needs to be secured. Then we work with you to develop a complete plan to secure what needs to be secured on your networks. In certain cases, my team and I will help businesses source, monitor, and run their cybersecurity. I've been providing Cybersecurity to enterprises of all sizes, and Federal and State agencies since 1991.
 
Hello everyone! We created this channel to promote a better world by improving digital security and privacy. This is done by better education and information that anyone can use on a daily basis providing simple guidance. I welcome feedback, so if you have an idea please let me know by posting it inside the videos or by an email to: Podcast@thecybersecurityinsider.com I’m your host - Yigal Behar
 
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
 
https://petronellatech.com presents Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your network and dropping ransomware or malware pay ...
 
Dr. Rollan Roberts is an advisor and resource to national governments on strong Artificial Intelligence and quantum-proof Cybersecurity and was nominated to Central Command's Department of Defense Civilian Task Force. He is the CEO of Courageous!, a superhuman AI and Cybersecurity research and product development think tank that serves advanced national security initiatives of national governments. He served as CEO of the Hoverboard company, creating the best-selling consumer product worldwi ...
 
Wibu-Systems hat es sich zur Aufgabe gemacht, vielseitige und sichere Technologien zu entwickeln, die Herstellern von Software und intelligenten Geräten die Möglichkeit liefert ihre Produkte vor Piraterie, Reverse Engineering, Manipulation, Sabotage und Spionage zu schützen. Mit CodeMeter, einer umfassenden und preisgekrönte Suite von hardware- und softwarebasierten Lösungen, ist dies möglich.
 
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003, and it quickly became one of North America’s fastest-growing technology companies. At Herjavec Group, your IT security is our topmost priority as we work diligently around the clock to protect the assets of your business including employees, data, IT infrastructure, and information. Recorded and produced by Herjavec Group, The Cybersecurity Cast discusses the latest news, trends, vulnerabilities, and exploits in cybersec ...
 
Cybersecurity on the Front Lines is a new podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Sentinel IPS’ COO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
 
CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Technology Policy Program and the International Security Program. Find the latest research from our scholars and CSIS events on this topic below.
 
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Loading …
show series
 
Joining the podcast this week is Bash Kazi, CEO of Cyber Range Solutions. He shares perspective on the importance of experiential and continuous training across red team, blue team and threat hunting and creating real world environments to learn based on existing and emerging threats. He also shares some stories from the field such as a voter hacki…
 
When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software and operating system vulnerabilities. This is because as technological defenses become more and more robust, cybercriminals are increasingly targeting the weakest link in the chain: people. Using a va…
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** Hackers have no shame. Any opportunity they think they can exploit will be exploited. That includes a global pandemic that has taken the lives of …
 
Einblicke in die Underground Economy, die Bedrohung durch die Hacker.Nach etwa einem Jahr spreche ich wieder mit Carsten Meywirth, Leiter der Abteilung Cybercrime beim Bundeskriminalamt. Wir unterhalten uns über die Hintergründe der Underground Economy und das Vorgehen der Cyberkriminellen. Begleiten Sie unsere Gedanken und Einblicke zur Cybersiche…
 
Is there really such a thing as "offense" in cybersecurity? This week, the guys discuss how it's possible to proactively protect organizations against criminals and how to identify potential attacks so you can stop them before it's too late. They share the realities of offensive cybersecurity and "hacking back." Pick up your copy of Cyber Rants on …
 
Will Plummer, Chief Security Officer at RaySecur talks about best practices for mail screening and the prevention of phygital attacks.https://raysecur.com/https://raysecur.com/mail-security-report-2021/https://raysecur.com/case-study/presidential-candidate/www.securetalkpodcast.comCybersecurity Secure Talk による
 
In this episode, host Bidemi Ologunde discussed new results from an emerging body of research that shows the linkage between unhealthy social media habits and childhood experiences. I also discussed some helpful advice from psychologists for people who want to change their social media habits, new parents, and parents of older kids. Check out host …
 
Facebook Has No Idea Where Your Data Is and What They Do With It?! Facebook's about 18 years old coming on 20 Facebook has a lot of data. How much stuff have you given Facebook? Did you fall victim for that? Hey, upload your contacts. We'll find your friends. They don't know where your data is. [Following is an automated transcript] [00:00:15] This…
 
Breaking Into Cybersecurity: Christina Lemmon (Nanny to Cyber Engineer) 5.13.22 https://www.linkedin.com/in/christina-lemmon/ It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way. About Breaking…
 
Extended detection and response (XDR) collects threat data from previously siloed security tools across an organization’s technology stack for easier and faster investigation, threat hunting, and response. An XDR platform can collect security telemetry from endpoints, cloud workloads, network email, and more.With all of this enriched threat data fi…
 
Think about your business and everything that goes into defining who and what you are as that business. Your operations, the people you employ, the people and companies you serve. Your products or services. All the fruits of your labor and the reputation you’ve built. Disasters, like ransomware, wildfires, or pandemics often can’t be predicted but …
 
Tim Danks is the founder and an advisor/consultant for Global Risk Perspectives with 35 years of global experience in the Technology industry. In this episode, Banks discusses additional steps we need to take in terms of understanding our entire supply chain and identifying: What needs to be done to protect our critical infrastructure? Which aspect…
 
Il 17 gennaio 2022 Riccardo parte da Milano con la nebbia, il freddo, il cielo come una parete grigia. Come se fosse in una foto in bianco e nero. Va in Liguria. Dopo il tunnel dei Giovi, si ritrova in un film a colori. Le colline sono verdi, il mare è azzurro, il sole splende e illumina tutto. Nebbia e freddo sono alle spalle. Mentre è in sosta in…
 
As part of the KoMiK research project, over the past three years, practitioners and research partners have worked together to investigate how companies can best select and introduce digital collaboration systems: What preliminary considerations, analyses and introduction steps are useful? And what is the impact of digital communication and collabor…
 
Secrutiny’s Director of Technology, Adrian Taylor and AppOmni’s VP EMEA, Brandon Romisher team up to explore SaaS security; one of the most overlooked threats in the enterprise. Listen as they discuss topics around the growing attack surface, high-risk misconfigurations that we see in the wild, 3rd party risks, and how to adopt and implement reliab…
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login