Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
…
continue reading
Welcome to The Rocheston Cybersecurity Podcast, your go-to podcast for demystifying cybersecurity concepts in a global context. Hosted by Haja Mo who has a passion for cybersecurity education, this podcast breaks down complex topics into easy-to-understand explanations, ensuring that listeners of all backgrounds can grasp essential cybersecurity principles. In each episode, we delve into various cybersecurity concepts, making it easy for everyone to understand. Whether you're a tech enthusia ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
SAE International explores critical topics in transportation cybersecurity with industry, government, and legal experts.
…
continue reading
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
…
continue reading
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is essential to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked har ...
…
continue reading
C:\bot_run is a K-12 Podcast produced by Technology Directors who are navigating the complicated and ever-changing realm of cybersecurity. Monthly episodes feature guests and topics designed around dialogue and resources focused on educating and networking with technology professionals.
…
continue reading
Securely HERS is a cybersecurity podcast dedicated to providing women with practical advice and guidance to protect their personal and professional lives from cyber threats. Hosted by cybersecurity expert Veronica Duff, each episode features discussions on the latest cybersecurity trends, tips on how to secure personal devices and accounts, and interviews with industry professionals on various topics related to cybersecurity. Whether you're a beginner or an experienced user, Securely HERS pr ...
…
continue reading
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading
Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
The podcast for sales and marketing teams that tackles the question: How can cybersecurity companies grow sales faster? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the right place.
…
continue reading
1
Cybersecurity Basement – der Podcast für echten Security-Content
suresecure GmbH, Michael Döhmen, Andreas Papadaniil
Herzlich Willkommen im Cybersecurity Basement. In unserem Podcast sprechen vor allem Andreas Papadaniil und Michael Döhmen alle 14 Tage über Themen aus dem Bereich Cybersecurity. Dabei legen wir großen Wert auf Objektivität gelegt. Kein suresecure-Feature-Fucking, sondern ein seriöser, authentischer und ehrlicher Austausch aus Theorie und Praxis. Der Podcast richtet sich an IT- und Security-Entscheider und alle, die es mal werden wollen. Hier gibts kein Blabla, sondern Security als Handwerk. ...
…
continue reading
Cybersecurity Innovation Podcast is the show that experts in their field share the lessons they've learned, the tactics they use, and all other things that are driving innovation in the field.
…
continue reading
Host John Bambenek discusses complex cybersecurity issues
…
continue reading
Interviews with founders, startup-advising CISOs, venture capitalists, and analysts discussing the issues of cybersecurity, new threats, and emerging technology. The Genealogy of Cyber Security brings listeners into forward-thinking conversations with industry visionaries, to explore big ideas, and discuss out-innovating the competition.
…
continue reading
1
RSA Innovation Sandbox Finalist: Mitiga with CTO, Ofer Maor
14:35
14:35
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
14:35
In this conversation, we discuss: 👉 How Mitiga addresses security gaps in cloud environments 👉 The importance of simplifying complex security operations data for faster response times 👉 Emerging trends in cybersecurity threats for 2024 and how companies should prepare About our guest: Ofer Maor, the CTO and co-founder of Mitiga, brings his extensiv…
…
continue reading
1
Cybersecurity Awesomeness Podcast - Episode 59
13:45
13:45
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
13:45
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, celebrate Star Wars Day and discuss how the evil Empire failed due to security immaturity.Enterprise Management Associates + DEVOPSdigest による
…
continue reading
1
Mastering Cloud Security Essentials - Episode 8 : Guarding the Google Cloud: Strategies for GCP Security
4:12
4:12
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:12
Haja Mo による
…
continue reading
AI is all the rage. Or AI having rage is the bigger fear. Doesn't matter where you go, it's a topic of attention. The potential uses and abuses are touted on every news station and from every pundit, whether proponent or naysayer. But what's true? Especially in the realm of cybersecurity? Our engineers have on-the-ground knowledge of AI's capabilit…
…
continue reading
1
Hohe Sicherheitsstandards und trotzdem Opfer eines Cyberangriffs? Der Fall Varta AG
33:54
33:54
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
33:54
Dass auch Unternehmen mit hohen Sicherheitsstandards Opfer von Cyberangriffen werden können, zeigt der Fall der Varta AG. Eine Ransomware-Attacke zwang das Unternehmen im Februar 24 dazu, seine IT-Systeme und Produktionsanlagen herunterzufahren, was erhebliche Auswirkungen auf den Geschäftsbetrieb hatte. Obwohl die Produktion in einigen Bereichen w…
…
continue reading
1
Want to be a Successful CISO? Know Your Audience
31:06
31:06
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
31:06
In this episode, Jeffrey talks to Marcos Marrero, CISO at H.I.G. Capital. Jeffrey and Marcos discuss their favorite music-themed movies, how CISOs must move at the same speed as the business and the importance of being a master communicator.Jeffrey Wheatman による
…
continue reading
1
Critical infrastructure: Pending legislation and risks and rewards from AI.
23:35
23:35
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
23:35
Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to affect critical infrastructure, as well as the Department of Energy’s as…
…
continue reading
1
Episode #118 - Leadership Insights with a Navy SEAL Turned Tech Entrepreneur
45:15
45:15
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
45:15
In this episode of Cyber Rants, Zach and Lauro sit down with Ty Smith, a former Navy SEAL turned successful tech entrepreneur, to uncover invaluable leadership and mindset lessons. Ty draws from his combat experience and entrepreneurial journey to offer crucial insights for technology leaders. Tune in to learn how to build resilient teams, lead wit…
…
continue reading
1
Mastering Cloud Security Essentials - Episode 7 : Azure’s Armor: Best Practices for Microsoft’s Cloud
4:38
4:38
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:38
Haja Mo による
…
continue reading
1
Mastering Cloud Security Essentials - Episode 6 : Navigating the Nimbus: Securing AWS Environments
4:32
4:32
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:32
Haja Mo による
…
continue reading
1
Mastering Cloud Security Essentials - Episode 5 : Dual Keys to the Kingdom: The Power of 2FA in Cloud Security
4:14
4:14
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:14
Haja Mo による
…
continue reading
1
Mastering Cloud Security Essentials - Episode 4 : Fortresses in the Sky: Implementing Cloud Firewalls
4:33
4:33
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:33
Haja Mo による
…
continue reading
1
Mastering Cloud Security Essentials - Episode 3 : The Gatekeepers of the Cloud: IAM Fundamentals
4:33
4:33
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:33
Haja Mo による
…
continue reading
1
Mastering Cloud Security Essentials - Episode 2 : Orchestrating Safety: Docker and Kubernetes Security
4:56
4:56
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:56
Haja Mo による
…
continue reading
1
Mastering Cloud Security Essentials - Episode 1 : Lifting the Fog: An Intro to Cloud Security Fundamentals
4:21
4:21
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:21
Haja Mo による
…
continue reading
1
Internet of Things (IoT) Security - Episode 8 : The Future of IoT Security: Trends and Innovations to Watch
4:12
4:12
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:12
Haja Mo による
…
continue reading
1
Internet of Things (IoT) Security - Episode 7 : IoT in Healthcare: Safeguarding Medical Devices and Patient Data
4:38
4:38
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:38
Haja Mo による
…
continue reading
1
Internet of Things (IoT) Security - Episode 6 : Patch and Protect: The Role of Updates in IoT Security
4:32
4:32
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:32
Haja Mo による
…
continue reading
1
Internet of Things (IoT) Security - Episode 5 : IoT and Privacy: Balancing Innovation with User Rights
4:14
4:14
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:14
Haja Mo による
…
continue reading
1
Internet of Things (IoT) Security - Episode 4 : Building a Fortified IoT Ecosystem: Best Practices for Businesses
4:33
4:33
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:33
Haja Mo による
…
continue reading
1
Internet of Things (IoT) Security - Episode 3 : The Dark Side of Convenience: Vulnerabilities in IoT
4:33
4:33
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:33
Haja Mo による
…
continue reading
1
Internet of Things (IoT) Security - Episode 2 : Securing Your Smart Home: Practical Steps for Protection
4:56
4:56
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:56
Haja Mo による
…
continue reading
1
Internet of Things (IoT) Security - Episode 1 : The Rise of IoT: Navigating a Connected World
4:21
4:21
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:21
Haja Mo による
…
continue reading
1
Zero Trust Architecture - Episode 6 : Zero Trust in Action: Success Stories and Lessons Learned
4:38
4:38
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:38
Haja Mo による
…
continue reading
1
Zero Trust Architecture - Episode 5 : Continuous Monitoring and Analytics: The Watchful Eyes of Zero Trust
4:22
4:22
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:22
Haja Mo による
…
continue reading
1
Zero Trust Architecture - Episode 4 : Securing the Castle: Network Segmentation and Micro-segmentation in Zero
4:57
4:57
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:57
Haja Mo による
…
continue reading
1
Zero Trust Architecture - Episode 3 : The Role of Identity in Zero Trust: From Users to Devices
4:57
4:57
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:57
Haja Mo による
…
continue reading
1
Zero Trust Architecture - Episode 2 : Building the Foundation: Key Components of Zero Trust
4:34
4:34
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:34
Haja Mo による
…
continue reading
1
Zero Trust Architecture - Episode 1 : The Zero Trust Philosophy: A New Blueprint for Security
4:14
4:14
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:14
Haja Mo による
…
continue reading
1
Firewalls, IDS and Web Servers - Episode 7 : Standing Guard: Continuous Monitoring and Incident Response
4:05
4:05
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:05
Haja Mo による
…
continue reading
1
Firewalls, IDS and Web Servers - Episode 6 : Logically Speaking: Leveraging Log Management for Security
4:01
4:01
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:01
Haja Mo による
…
continue reading
1
Firewalls, IDS and Web Servers - Episode 5 : Behind Enemy Lines: Penetration Testing Your Web Server
4:39
4:39
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:39
Haja Mo による
…
continue reading
1
Firewalls, IDS and Web Servers - Episode 4 : Patchwork Security: The Art of Vulnerability Management
4:06
4:06
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:06
Haja Mo による
…
continue reading
1
Firewalls, IDS and Web Servers - Episode 3 : The Guardian at the Gates: Web Application Firewalls (WAF)
4:35
4:35
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:35
Haja Mo による
…
continue reading
1
Firewalls, IDS and Web Servers - Episode 2 : Intruder Alerts: Setting Up Web Server Intrusion Detection Systems
4:23
4:23
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:23
Haja Mo による
…
continue reading
1
Firewalls, IDS and Web Servers - Episode 1 : Castle Walls: Erecting Robust Web Server Defenses
4:15
4:15
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:15
Haja Mo による
…
continue reading
1
Web Application Attacks - Episode 9 : Infiltration Tactics: Uncovering Component Vulnerabilities
4:11
4:11
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:11
Haja Mo による
…
continue reading
1
Web Application Attacks - Episode 8 : Impersonation Games: The Dangers of Phishing Attacks in Web Security
4:10
4:10
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:10
Haja Mo による
…
continue reading
1
Web Application Attacks - Episode 7 : Crashing the Gates: Defending Against Distributed Denial of Service (DDoS)
4:29
4:29
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:29
Haja Mo による
…
continue reading
1
Web Application Attacks - Episode 6 : Broken Access: Elevating Privileges and Breaking Control
4:06
4:06
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:06
Haja Mo による
…
continue reading
1
Web Application Attacks - Episode 5 : Exposed Secrets: The Threat of Sensitive Data Exposure
4:06
4:06
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:06
Haja Mo による
…
continue reading
1
Web Application Attacks - Episode 4 : Identity Theft: Unraveling Cross-Site Request Forgery (CSRF)
4:21
4:21
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:21
Haja Mo による
…
continue reading
1
Web Application Attacks - Episode 3 : The World of Cross-Site Scripting (XSS)
3:54
3:54
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
3:54
Haja Mo による
…
continue reading
1
Web Application Attacks - Episode 2 : Beneath the Surface: Unpacking SQL Injection Attacks
4:07
4:07
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:07
Haja Mo による
…
continue reading
1
Web Application Attacks - Episode 1 : Diving into the Digital Abyss: Intro to Web App Attacks
2:59
2:59
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
2:59
Haja Mo による
…
continue reading
1
Vulnerability Management - Episode 8 : Learning from the Battlefield: Real-World Case Studies in Vulnerability Management
4:27
4:27
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:27
Haja Mo による
…
continue reading
1
Vulnerability Management - Episode 7 : Crafting a Cyber-Resilient Culture: Education and Awareness
4:15
4:15
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:15
Haja Mo による
…
continue reading
1
Vulnerability Management - Episode 6 : Tools of the Trade: Essential Technology for Vulnerability Management
4:13
4:13
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:13
Haja Mo による
…
continue reading
1
Vulnerability Management - Episode 5 : Closing the Gates: Strategies for Mitigating Identified Vulnerabilities
4:02
4:02
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:02
Haja Mo による
…
continue reading
1
Vulnerability Management - Episode 4 : Cyberthreat Intelligence: Navigating the Digital Threat Landscape
4:13
4:13
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
4:13
Haja Mo による
…
continue reading