Phish відкриті
[search 0]
більше
Download the App!
show episodes
 
Welcome to 'Phishing for the News'—the podcast that hooks you with the juiciest updates in cybersecurity, tech, and AI! From breaking breaches to the latest government moves on digital defense, we reel in the headlines you need to stay ahead in this ever-evolving digital world. So grab your virtual net, and let's dive into the deep end of tech and security news!
  continue reading
 
Artwork

1
Analyze Phish

Earwolf & Harris Wittels, Scott Aukerman

Unsubscribe
Unsubscribe
Щомісяця
 
Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
  continue reading
 
Artwork

1
Phishy Business

Mimecast

Unsubscribe
Unsubscribe
Щомісяця+
 
Ready to change how you think about cybersecurity? Every other week, Mimecast’s Brian Pinnock and Alice Jeffrey are joined by a special guest for tales of risk, reward and just a dash of ridiculousness. Whether it’s a tech expert who is not your average CIO or an expert from a field you wouldn’t expect, we’ll be exploring the lesser seen side of cybersecurity – to learn how we can all improve in the fight to stay safe.
  continue reading
 
Artwork

1
The Phishing Report

Max Gibbard

Unsubscribe
Unsubscribe
Щомісяця
 
“The Phishing Report” is about technology and safely using these tools in today’s world. Whether you are in a big business, small business, governmental agency or nonprofit organization, protecting yourself from online harm and protecting your identity from theft is pretty important. Max Gibbard, from TeamLogic IT, in collaboration with special guests and subject matter experts in the cybersecurity arena, will share current research and best practices from across the industry. Each episode w ...
  continue reading
 
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
  continue reading
 
Loading …
show series
 
Today's SecureResearch Cyber Intelligence Brief contains information on: Unified Security Platform Benefits AI Security Challenges and Opportunities For more information in the SecureResearch Daily Cyber Intelligence Brief, email info@secureresearch.comSecureResearch
  continue reading
 
Here are some of the top critical bullet points from this week's SecureResearch Cyber Intelligence briefings: Multiple vulnerabilities were discovered in Suricata, a popular open-source intrusion detection and prevention system. While the specific details of the vulnerabilities are not publicly available, they are considered critical and should be …
  continue reading
 
Here's what we cover in today's SecureResearch Cyber Intelligence Brief: Multiple critical vulnerabilities were discovered across various sectors, including energy, industrial control systems, and enterprise software. Threat actors are actively exploiting some of these vulnerabilities. There is an increase in supply chain attacks targeting widely-u…
  continue reading
 
Here are some of the items in today's SecureResearch Cyber Intelligence Brief: ●Chinese Cyber Espionage Targeting Mobile Communications ●Actively Exploited Vulnerabilities in Widely Used Software ●Microsoft Defender for Cloud Recognized as a Leader in Cloud Security ●AI and Zero Trust as Key Security Strategies For more information in the SecureRes…
  continue reading
 
Today's SecureResearch Cyber Intelligence Report contains details on: Multiple critical vulnerabilities were found in ICS/OT systems affecting products from BD, Siemens, Rockwell Automation, Schneider Electric, and Hitachi Energy. CISA issued Binding Operational Directive 25-01, which mandates that federal agencies take action to secure cloud envir…
  continue reading
 
Here of some of the items covered in today's SecureResearch Cyber Intelligence Briefs: CISA is requesting public comment on a draft update to the National Cyber Incident Response Plan (NCIRP) by January 15, 2025. Siemens published a security advisory, AV24-719, for multiple vulnerabilities affecting industrial control systems. CISA released advisor…
  continue reading
 
Here are some key points from the SecureResearch cybersecurity intelligence briefs: Multiple vulnerabilities were found in widely used software like Suricata, the Linux Kernel (Red Hat, Ubuntu, and SUSE), Microsoft Edge, and IBM Products. The Italian Computer Security Incident Response Team (CSIRT Italy) released its weekly cybersecurity bulletin c…
  continue reading
 
Here are some of the items covered in this week's SecureResearch Daily Cyber Intelligence Briefs: Multiple critical vulnerabilities were discovered across various widely used software products, including Ivanti, Google Chrome, Adobe products, and Microsoft Windows and Office. Organizations must prioritize patching these systems to mitigate the risk…
  continue reading
 
Phishing for the News is brought to you by SecureResearch and based on the SecureResearch Daily Cyber Intelligence Brief. Here are some of the details of what we cover in today's brief: Siemens products have multiple critical vulnerabilities. Apple products have been found to have multiple vulnerabilities that could allow attackers to remotely exec…
  continue reading
 
Our podcast contains a summary of our daily intelligence report. Here are some of the items included this morning: Multiple critical vulnerabilities have been found in widely used software products, requiring immediate action to mitigate risks. These vulnerabilities affect products from vendors like Ivanti, Google, Microsoft, Adobe, Apple, HPE Arub…
  continue reading
 
Today's podcast covers some of the major cybersecurity items covered in the SecureResearch Daily Cybersecurity Intelligence brief. Our full brief contains details on the following items and more: Urgent Microsoft Update: Critical Remote Code Execution Vulnerabilities Patched Critical Adobe Products Flaws Permit Unrestricted Code Execution Schneider…
  continue reading
 
Here are some highlights from today's information security brief. The Phishing for the News Podcast covers some of the items from our daily brief. For more information email info@secureresearch.com: ●Drupal has patched a critical vulnerability (AV24-698). ●CISA has issued a critical security advisory, AV24–697. ●Dell has released a security advisor…
  continue reading
 
The Phishing for the News Podcast is based on the SecureResearch daily Cybersecurity Intelligence Briefings. Here are some of the headlines covered in this mornings security briefings: Critical Vulnerabilities Uncovered in Google Pixel Devices Critical Vulnerabilities Uncovered in Tenable Security Center Threaten Data Privacy Critical Vulnerabiliti…
  continue reading
 
The Phishing for the News podcast is based on the SecureResearch Daily Intelligence Report. Here is a summary of what we covered in our report: INTERPOL conducted a global operation called HAECHI-V, resulting in the arrest of 5,500 individuals connected to financial cybercrimes and the seizure of over $400 million in assets. The operation targeted …
  continue reading
 
The Phishing for the News podcast is based on the SecureResearch Cybersecurity Intelligence Report. Today's reporting contains information on: Critical Vulnerabilities in Mitel MiCollab SonicWall SMA 100 Series Vulnerabilities Global Cybersecurity Authorities Release Secure Tech Guidance Romania's Election Systems Targeted New Android Spyware Disco…
  continue reading
 
Summary of Security Updates for December 5, 2024 Critical Vulnerabilities in Veeam Products Zero-Day Vulnerabilities in I-O Data Routers New DroidBot Android Malware Critical Vulnerability in CyberPanel Critical XSS Vulnerability in SolarWinds Platform Critical Vulnerability in Infinix Mobile Devices Software CISA Guidance on Salt Typhoon Threat Hi…
  continue reading
 
Today's podcast covers recent cybersecurity news and focuses on a cyber espionage campaign targeting global telecommunications providers. The joint cybersecurity advisory from CISA, NSA, FBI, and international partners, warns of this significant threat. We'll discusses a range of CVEs impacting diverse systems. The podcast provides Cisco-specific g…
  continue reading
 
Today's podcast covers a range of critical cybersecurity vulnerabilities and updates. Here are the high level bullet points: Critical Vulnerability in Ubuntu - Users are urged to update immediately due to a critical vulnerability. Critical Vulnerabilities in IBM Security Verify Access Hardware - IBM has patched multiple vulnerabilities. Organizatio…
  continue reading
 
This podcast explores the critical vulnerabilities uncovered in various software and systems, along with a major international cybercrime crackdown. Tune in to understand the technical impact of these vulnerabilities, learn about potential indicators of compromise, and discover recommended actions to protect yourself and your organization. ●Android…
  continue reading
 
This podcast is currently in its pilot phase, actively developing a unique approach to information security news curation. Designed for CISOs, CTOs, CIOs, and Security Analysts, we're experimenting with innovative ways to deliver critical security insights. We're leveraging content from the SecureResearch Information Security mailing lists, which a…
  continue reading
 
In this episode of Phishy Business, we talk about the improper mindset of not thinking about security until after you have been breached, and some of the major problems this can cause. We do this through the lens of SIEM, ethical hacking, and a focus on the need for leadership in teaching organizations how to be secure. We also discuss how some IT …
  continue reading
 
In this episode of Phishy Business, we talk about various important discussions around AI, including the concerning issue of built-in bias and stereotypes. Imagine AI thinking that all doctors must be male, and all nurses must be female? Well, according to ChatGPT, they are. Our special guest is Ivana Bartoletti, Global Privacy Officer at Wipro. Iv…
  continue reading
 
In this episode of Phishy Business, we talk about how today's cybersecurity strategy needs to focus on risk while still allowing smooth operation of the business. We also discuss how cybersecurity must involve the board so that business goals and cyber strategy align. Our special guest is Theo Botha, Global Information Security Officer at Dr. Marte…
  continue reading
 
In this episode of Phishy Business, we feature a roundtable discussion with three members from the Center for Internet Security. Mimecast CMO Norman Guadagno hosts this wide-ranging discussion that covers many topics including cybersecurity trends in the public sector and why information sharing is essential to keeping our connected world safe. Our…
  continue reading
 
In this episode of Phishy Business, we talk about environmental, social, and governance, commonly known throughout the corporate world as ESG, and how cybersecurity fits into corporate sustainability. Our special guest is Garyn Rapson who is a partner and the head of ESG at African law firm Webber Wentzel. Garyn manages a team of nine lawyers that …
  continue reading
 
In this episode of Phishy Business, we talk about some of the cybersecurity trends and worries facing today’s global CIOs. Our special guest is Martin Wallgren who is the CIO of global logistics and shipping company, Gulf Agency Company, headquartered in Dubai. Martin says he is an entrepreneurial tech nerd with a business mindset who does business…
  continue reading
 
In this episode of Phishy Business, we talk about the psychology behind crime, particularly cybercrime and white-collar crime. We delve into the reasons why most cybercriminals are roaming free and don’t get caught, yet deep down, really want to tell their story. Our special guest is Mark T. Hoffmann, a crime and intelligence analyst and business p…
  continue reading
 
In this episode of Phishy Business, we bring you a special recording from the show floor at RSA Conference. Hosted by Mimecast’s CMO Norman Guadagno, this episode delves into cyber insurance and how managing risk has had to adapt to the modern digital economy. You’ll learn exactly what cyber insurance is, why it’s important and how insurers should …
  continue reading
 
In part two of this special RSA episode Mimecast CMO, Norman Guadagno, interviews another four guests live from the conference show floor. We talk about how cybersecurity has changed over the years, bringing more diversity to the industry and how exactly one becomes a CISO. Our guests for part two: Julian Waits, SVP business development at Rapid7 (…
  continue reading
 
In this episode of Phishy Business, Mimecast CMO and guest host Norman Guadagno, chats to four different people at this year’s RSA Conference in San Francisco. Our guests were interviewed in our very own podcast recording studio at the Mimecast booth. In part one of this two-part episode, we learn more about our guests' roles, their companies, and …
  continue reading
 
In this episode of Phishy Business, we discuss social engineering, the professional con game of burglary for hire, and different aspects of how this very specialized skill can impact organizations and individuals. Our special guest is Jenny Radcliffe, who was our very first interview on the podcast and made a return appearance in our episode on job…
  continue reading
 
In this episode of Phishy Business, we discuss some important ways to think about and look at risk and how its more about making decisions than assessing threats. Our special guest is Stefan Gershater, Director of Risk at Burberry. Stefan is a risk management expert, a biochemist, and a navy veteran. Stefan says that as a risk expert, he tries to m…
  continue reading
 
In this episode of Phishy Business, we discuss career coaching, looking at what it is, and how it can benefit all professionals, including those in the cybersecurity space. We delve into the differences between coaching and mentoring and discuss what to expect when working with a career coach. Our special guests are executive coach and mentor Fiona…
  continue reading
 
In this episode of Phishy Business, we discuss what can be a very scary side of AI – when bots start thinking for themselves. We delve into some examples of this actually happening, but also look at the good AI is providing humankind. Our special guest is Mo Gawdat, former chief business officer at Google X and bestselling author of the books Solve…
  continue reading
 
In this episode of Phishy Business, we discuss the idea of Work Inspired, a corporate culture where employees all love to work because it turns out that happy employees are very good for business. Our special guest is Aron Ain, award-winning, retired CEO of UKG, formerly known as Kronos. Aron now serves as Executive Chair of the UKG Board of Direct…
  continue reading
 
In this episode of Phishy Business, we discuss the very definition of ransomware and how it can be an overused and underdefined concept. We also take a closer look at the world of threat research. Our special guest is former professional hacker Charl van der Walt, Head of Security Research at Orange CyberDefense, who now spends his time asking and …
  continue reading
 
In this episode of Phishy Business, we discuss how cybersecurity marketing, sales, and support are for the most part inadequate, and how there can be a big disconnect between how marketers market and how technology professionals buy. We talk more about how marketing should consider the customer experience and how marketing departments should not on…
  continue reading
 
In this bonus episode of Phishy Business, we continue to recognize the value of the work of cybersecurity professionals. Join us as Peter Coroneos, Founder and Executive Chairman of Cybermindz.org, takes us through a 10-minute meditation aimed at lowering stress. This is a just a taste of the whole Cybermindz protocol, and worth a try!…
  continue reading
 
In this episode of Phishy Business, we honor and recognize the value of the work of those professionals who spend their days defending people and organizations from cyberattacks by taking a close look at one of the biggest problems the industry faces today: worker burnout and the associated mental health issues. Join us as we discuss how while many…
  continue reading
 
In this episode of Phishy Business, we discuss how criminals are like water because of how they flow, and adapt around obstacles and security measures, always looking for a way in no matter what security professionals put in their way. You’ll learn more about how well-thought-out cybersecurity strategies, tools, and responses can be, especially in …
  continue reading
 
In this episode of Phishy Business, we find out everything you may have wanted to ask your CISO or CIO but were too afraid to ask. Two very experienced information technology leaders delve deeper into the roles they play in keeping their organizations safe while balancing the nos and yesses they deal in every day. You’ll learn a lot more about that…
  continue reading
 
In this episode of Phishy Business, we take a look at data, which some have called the new gold or the new oil and discuss why it really is something more like the new uranium because it has such a huge potential to impact society, just like uranium did in the 20th century. And just like uranium, data can be used for good, and for bad. Join us as w…
  continue reading
 
In this episode of Phishy Business, we take a look at AI. We talk on the fact that the stigma of AI running amok in Terminator-fashion is a myth we must dispel in the face of all the good AI can do in protecting the world - from cyberattacks to helping with climate change. We also talk about the other major challenges that AI can be used to solve g…
  continue reading
 
In this episode of Phishy Business, we take a look at how cybersecurity awareness training needs to go beyond just having users sit through training, but in fact, has to work to change user behavior. Listen in to learn more about the importance of cybersecurity awareness training at organizations of all sizes across the globe and how, with today’s …
  continue reading
 
In this episode of Phishy Business, we take a look at bots. Listen in to learn more about what bots are, and what they do. Also, learn what can make them good…and what can make them bad. It would seem the answer lies within the intent of the person deploying them. Our special guests are Cyril Noel-Tagoe, Principal Security Researcher at Netacea, an…
  continue reading
 
In this episode of Phishy Business, we take a look at what has been called the smartest and biggest scam of the 21st century, OneCoin, a cryptocurrency that brought in $4 billion in investments via multi-level marketing and proved to be nothing but a scheme that made one woman who is still on the run very rich. This wasn’t a backroom con, but in fa…
  continue reading
 
In this episode of Phishy Business, we take a look at the skills shortage being faced by IT departments when it comes to hiring cybersecurity experts and how the Absa Cybersecurity Academy is working with its partner, the Maharishi Institute, to assist in helping marginalized South African youth to become certified cybersecurity experts. Together, …
  continue reading
 
In this episode of Phishy Business, we take a look at cyber crisis exercises and insider threats. Our special guest is Lisa Forte, an expert on running cyber crisis exercises and training high-risk staff on insider threats and social engineering, who was named one of the top 30 female cybersecurity leaders by SC Magazine. Lisa works hard to simulat…
  continue reading
 
In this episode of Phishy Business, we take a look at ways for children and teens to stay safe while online. Our special guest is Emma Sadleir, a leading expert in social media law who educates individuals and organizations about the legal, disciplinary, and reputational risks of social media. Emma is also the co-author of Selfies, Sex, and Smartph…
  continue reading
 
In this episode of Phishy Business, we take a look at advanced persistent threat groups, also known as APT Groups. Special guest Krijn de Mik, Incident Response and Intelligence Lead at Hunt & Hackett, where he specializes in investigations, forensic analysis, and tracking threat actors and threat actor groups, gives his insight on how organization…
  continue reading
 
Loading …

Короткий довідник